This attack consists of an attacker using automated scripts to try out possible passwords until the correct one works. They are very time consuming because they take a systematic approach to trying all possible permutation of characters in a sequence. The longer the password, the longer it takes.
What is a Brute-Force Attack?
According to the CompTIA A+ exam, RAID stands for this.
What is Redundant Array of Independent Disks?
This is a group of internet-connected devices, each of which are used to perform attacks, steal data, send spam, and allow the attack to access the device and its connection.
What is a botnet?
This c word is a formal synonym of the verb "guess" that means "to form an opinion or idea without proof or sufficient evidence."
What is conjecture?
*** DAILY DOUBLE ***
This is a malicious type of software or hardware designed to track every keystroke and report it back to a hacker. Typically, a user will download a software believing it to be legitimate, only for it to install this.
What is a keylogger?
This attack consists of an attacker putting lists of commonly used passwords into attack dictionaries. Threat actors typically use automated scripts to match the original password with the suggestions from the gathered attack dictionary.
What is a Dictionary attack?
This RAID level stripes data evenly across two or more disks to increase performance, but provides no fault tolerance or redundancy.
What is RAID 0?
his set of tools and techniques that attackers use to maintain communication with compromised devices following their initial exploitation is known as this.
What is Command and Control (C2)?
This e word means "of or relating to the regions beyond the earth" or "of or resembling heaven." It can also mean "lacking material substance" and "relating to, containing, or resembling a chemical ether."
What is ethereal?
*** DAILY DOUBLE ***
This s word refers to a place or state in which there is great confusion, disorder, or destruction.
What is shambles?
With this attack, bad actors take advantage of the tendency for users to reuse the same usernames and passwords for multiple accounts. By using credentials exposed in data breaches, the automate the process of trying those credentials on multiple sites at the same time.
What is Credential Stuffing Attack?
This RAID level consists of an exact copy (or mirror) of a set of data on two or more disks with no parity, striping or spanning of disk space across multiple disks.
What is RAID 1?
This DDOS tool was used by Anonymous for several attacks, targetting a site and flooding the server with TCP, UDP or HTTP packets. Has capabilities of allowing your host machine to join a voluntary botnet.
What is the Low Orbit Ion Cannon (LOIC)?
This m word refers to someone or something that shows extreme or excessive care in the consideration or treatment of details.
What is meticulous?
*** DAILY DOUBLE ***
This RAID level combines the advantages (and disadvantages of RAID 0 and RAID 1 in one single system. This is a nested or hybrid RAID configuration, providing security by mirroring all data on secondary drives while using striping across each set of drives to speed up data transfers.
What is RAID 10?
This attack is a different mixture of password-cracking attacks. It's performed whenever the hacker knows a leaked password of yours and assumes you use a variation of it. The hacker uses a predefined list of phrases people often use to create passwords but extends them by adding variables - random symbols and numbers.
What is a Hybrid Attack?
This RAID level uses block-level striping with distributed parity to have redundancy while increasing write performance. Uses a minimum of three drives, and is still functional if only one drive fails.
What is RAID 5?
This Windows-only password recovery tool handles an enormous variety of tasks, including recovering passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.
What is Cain and Abel?
This l word means to criticize someone or something very harshly. Is also sometimes used as a synonym of beat meaning "to assault".
What is lambaste?
*** DAILY DOUBLE ***
This is a http denial-of-service tool that has been around for several years. Written in Python, it generates unique HTTP requests that are designed to stress test web servers against resource exhaustion.
What is HULK? (HTTP-Unbearable-Load-King)
This type of attack uses password hashes that the bad actor has gathered. They can then see if it matches any of the precomputed hashes in their own database table.
What is a Rainbow Table Attack?
This RAID level uses block-level striping with double parity, allowing it to have redundancy, but has a performance penalty on write operations because of the associated parity calculations, doubling CPU overhead on write operations. Uses a minimum of 4 drives, and because of the double parity, can have two drives fail and still be functional.
What is RAID 6?
This DDOS tool specializes in shutting down hosts, network devices and servers by overwhelming them with different protocols such as UDP/TCP, ICMP, HTTP, L2CAP, ARP, and IEEE.
What is Raven-Storm?
This r word can refer specifically to a small building or area that provides soldiers with protection from attack, or more broadly to any safe or protected place, whether literal or figurative.
What is redoubt?
*** DAILY DOUBLE ***
This flag indicates that the connection is being torn down; both the sender and receiver send these segments to gracefully terminate the connection in TCP communications.
What is FIN?