ch8 Short
ch8 Short
Malware Inspection
● Cybersecurity teams investigate malware and viruses using a
sandbox, an isolated virtual machine.
Network Attacks
● Malicious, unauthorized attempts to disrupt, compromise, or
gain access to networks and data.
○ Pivoting
○ DNS Attacks
DDoS Attacks
● DoS: One host disrupts victim services.
● Examples:
DNS Attacks
● DNS translates domain names (e.g., www.packtpub.com) into
IP addresses.
● Attacks:
Wireless Attacks
● Wireless networks offer convenience but are vulnerable.
● Attack methods:
● Types:
○ Session replay: Captures session tokens via XSS, MITM,
or man-in-the-browser.
Credential Replay
● Use of tools like keyloggers, Wireshark, tcpdump, or malware
to steal credentials.
● Attack types:
Malicious Code
● Code intended to steal data, disrupt systems, or cause
damage.
● Examples:
● Examples:
○ Out-of-cycle logging