1.4 Flashcards

Given a scenario, analyze potential indicators associated with network attacks

1
Q

Rouge Access Point

A

Unauthorized wireless access point, not necessarily malicious as it may be added by an employee. It is a significant potential backdoor to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Evil Twin

A

A rouge access point that looks legitimate but is actually malicious. Attackers configure an access point to look like an existing network and may even try to overpower the existing access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

A

Sending of unsolicited messages to another device via Bluetooth. Attacker needs to be close to the machine, about 10 meters. Low priority attack, only sending messages to a user’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A

Access a Bluetooth-enabled device and transfer data. This was the first major security weakness in Bluetooth and was patched in 2003. Modern Bluetooth devices are not prone to this attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Deauthenication

A

A Denial of Service (DoS) attack that is difficult to combat as there is not much you can do. Attackers target the way 802.11 communicates by taking advantage of disassociation frames. 802.11w (2014) encrypts these frames to help alleviate this issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Radio Frequency (RF) Jamming

A

DoS attack that prevents wireless communication. Attackers decrease the signal-to-noise ratio at the receiving device, making it so the receiving device can’t hear the good signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless Jamming

A

Attacker can attack in a few ways, like sending random bits of data, or sending constant legitimate frames to take all the bandwidth. Attacker may also utilize Reactive jamming or jamming only when someone else tries to communicate. Attackers need to be somewhere close.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RFID Attacks

A

Attackers may try to capture data between the tag and the reader. They may also try to spoof the reader and write their own data to the tag. DoS may also be used by signal jamming the Radio Frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptographic nonce

A

A nonce is arbitrary number, some random or pseudo-random number. In cryptography a nonce is used to help add some randomization to the encrypted data, protecting against attacks like replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Salt

A

A nonce most commonly associated with password randomization. Password storages should always be salted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On Path Attacks

A

Formerly known as man-in-the-middle attack, where the attacker sits between two ends of a conversation, having the data pass through the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On-Path Browser Attack

A

Formerly known as main-in-the-browser, the malware/trojan runs on the victims machine to proxy the traffic. Everything will look normal to the victim, but the attacker can see all the data in its raw unencrypted form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC Flooding

A

Attackers take advantage of the limitation of the size of MAC tables. They will send traffic with different source MAC addresses, and the switch will try to keep up. When the switch cannot add more to the MAC table, the switch will start acting as a hub and sends all frames to all interfaces on the switch. The attacker can then easily capture network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC Cloning/MAC Spoofing

A

Attacker changes their MAC address to match the MAC address of an existing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS Poisoning

A

Advanced attacker can modify the DNS server. This can be done by targeting the client host file, as it takes precents over DNS queries. Attacker can also utilize on-path attacks to change the ip while the traffic is in motion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain Hijacking

A

Attacker can get access to the domain registration and control where the traffic flows. By getting access to the account they do not need to touch the actual servers.

17
Q

URL Hijacking

A

Attackers can create domains that are similar to the legitimate website, and they can either place ads to get income from this, or attempt to resell it to the actual owner. Attackers also commonly use this as a phishing site. Typosquatting is a common type of URL hijacking