![](https://static.isu.pub/fe/default-story-images/news.jpg?width=720&quality=85%2C50)
1 minute read
Injections
Topic Details
Intimidation Consensus Scarcity Familiarity Trust Urgency
Advertisement
Given a scenario, analyze potential indicators to determine the type of attack. 1. Malware
Ransomware Trojans Worms Potentially unwanted programs (PUPs) Fileless virus Command and control Bots Cryptomalware Logic bombs Spyware Keyloggers Remote access Trojan (RAT) Rootkit Backdoor 2. Password attacks
Spraying Dictionary Brute force - Offline - Online Rainbow table Plaintext/unencrypted 3. Physical attacks
Malicious Universal Serial Bus (USB) cable Malicious flash drive Card cloning