Q: 1
[Incident Handling and Response Process]
Alice is a disgruntled employee. She decided to acquire critical information from her organization for
financial benefit. To acccomplish this, Alice started running a virtual machine on the same physical
host as her victim's virtual machine and took advantage of shared physical resources (processor
cache) to steal data (cryptographic key/plain text secrets) from the victim machine. Identify the type
of attack Alice is performing in the above scenario.
Options
Discussion
Option A is the right pick. Side channel attacks are all about exploiting hardware resources like CPU cache, which fits this scenario better than the other choices. Service hijacking might look tempting but doesn't involve this kind of info leak. Disagree?
A
Seen questions like this in official practice tests. If you want more on side channel techniques, the EC-Council courseware actually covers some solid scenarios.
That's a classic case of a side channel attack (A).
Be respectful. No spam.