1.4 Given a scenario, analyze potential indicators associated with network attacks Flashcards

1
Q

Evil twin (Wireless attack)

A

An evil twin is a malicious fake AP (access point) that is set up to appear to be a legitimate, trusted network.

The attacker may have used a more powerful AP, placed the evil twin closer to the target, or used another technique to make the AP more likely to be the one the target will associate with.

Once a client connects to the evil twin, the attacker will typically provide internet connection so that the victim does not realize that something has gone wrong. The attacker will then capture sensitive data in victims network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rogue access point (Wireless attack)

A

Rogue access points are APs added to your network either intentionally or unintentionally. Once they are connected to your network, they can offer a point of entry to attacker or other unwanted users.

It is important to monitor you network and facilities for rogue APs.

Wireless intrusion detection systems or features can continuously scan for unknown APs and then determine if they are connected to you network by combining wireless network testing with wired network logs and traffic information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing (Wireless attack)

A

Bluesnarfing is unauthorized access to a Bluetooth device, typically aimed at gather information like contact lists or other details the device contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluejacking (Wireless attack)

A

Bluejacking simply sends unsolicited messages to Bluetooth enabled devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disassociation (sometimes referred to Disassociation)
(Wireless attack)

A

A Wi-Fi disassociation attack is when an attacker breaks the connection between a victim and a wireless access point. This type of attack involves an attacker posing as the victim, and sending a message to the wireless access point telling it to disassociate from the victim device. This is a type of Denial of Service (DOS) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jamming (Wireless attack)

A

Jamming will block all the traffic in the range or frequency it is conducted against.

Since jamming is essentially wireless interference, jamming may not always be intentional—-in fact, running into devices that are sending out signals in the same frequency range as Wi-Fi devices isn’t uncommon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RFID or Radio Frequency Identification (Wireless attack)

A

RFID vulnerable to several classes of attack, like sniffing (or eavesdropping), spoofing, cloning, replay, relay, and DoS attack

Radio-Frequency Identification (RFID) uses radio waves to transmit information from a “tag” that stores the information, to a “reader” that retrieves information from a tag.

RFID tags come in both passive and active varieties:

Passive tags have no power source of their own, and instead use power wirelessly transferred by the reader to transmit their information, while active tags contain their own power source.

Active tags can be read from up to hundreds of meters away, while passive tags have a much shorter range, usually less than a meter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NFC or Near Field Communication (Wireless attack)

A

Built on RFID, often used with payment systems. Subject to many of the same vulnerabilities as RFID, sniffing (or eavesdropping), spoofing, cloning, replay, relay, and DoS attack.

NFC or Near Field Communication is used for short-ranged communication between devices. You’ve likely seen NFC used for payment terminals using Apple Pay or Google Wallet with phones. NFC is limited to about 4 inches of range and primarily used for low-bandwidth, device-to-device purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initialization Vector or IV (Wireless attack)

A

The original implementation of wireless security was WEP (Wired Equivalent Privacy). WEP used a 24-bit IV, which could be reverse-engineered once enough traffic from a network was captured.

After the traffic was analyzed, the initialization vector or IV used to generate an RC4 key stream could be derived, and all traffic sent on the network could be decrypted.

WPA2 and WPA3 do not use weak initialization vectors like this, making this attack useless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On-path attack

A

On-path attack occurs when a person uses a packet sniffer between the sender and the receiver of a communication on the network and listens in on or intercepts the information being transferred, modifying its contents before resending the data to its destination.

To prevent on-path attacks, a unique server host key can be used to prove its identity to a client as a known host.

packet sniffing can be prevented by encrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the OSI model?

A

The OSI or Open System Interconnection model is made up of seven layers, typically divided into two groups: the host layers and media layers.

Layers 1-3, the Physical, Data Link, and Network layers, are considered media layers and are used to transmit frames or logical groups of bit, and to make networks of systems or devices work properly using addressing, routing, and control schemes.

Layers 4-7, the host layers, ensure that data transmission is reliable, that sessions can be managed, that encryption is handled and that translation of data from the application to the network and back works, and that APIs and other high-level tools work.

WE DONT NEED TO MEMORIZE THE OSI MODEL

  1. Application Layer—— (Human/computer interaction)
  2. Presentation Layer——- (Format data, handles data encryption, compression)
  3. Session Layer ——(Authentication, sessions, permissions)
  4. Transport Layer —— (Transmission of data, error control)
  5. Network Layer ——- (Physical path decisions, addressing, routing, switching)
  6. Data Link Layer ——- (Data format for the network, error detection, flow control)
  7. Physical Layer —— (Sends electrical impulses (bits))
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP or Address Resolution Protocol
poisoning (Layer 2 attacks)

A

ARP or Address Resolution Protocol poisoning attacks send malicious ARP packets to the default gateway of a network with the intent of changing the pairings of MAC addresses tot IP addresses that the gateway maintains.

Attackers will send ARP replies that claim that the IP address for a target machine is associated with their MAC address, causing systems and the gateway to send traffic intended for the target system to the attacker’s system.

Attackers can use this to conduct on-path attacks by then relaying the traffic to the target system, or they can simply collect and use the traffic they receive. ARP poisoning can also be used to create a denial of service by causing traffic not to reach the intended system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Media Access Control or MAC flooding (Layer 2 attacks)

A

MAC flooding targets switches by sending so many MAC addresses to the switch that the CAM (Content Addressable Memory) or MAC table that stores pairings of ports and MAC addresses is filled

Since these tables have a limited amount of space, flooding them results in a default behavior that sends out traffic to all ports when the destination is not known to ensure traffic continues to flow.

MAC flooding can be prevented by using port security, which limits how many MAC addresses can be learned for ports that are expected to be used by workstations or devices. In addition, tools like NAC or other network authentication and authorization tools can match MAC addresses to known or authenticated systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC cloning (Layer 2 attack)

A

MAC cloning duplicates the media access control of a device (hardware address)

Attackers may choose to do this to bypass MAC address restricted networks or to acquire access that is limited by MAC address.

NAC or Network Access Control capabilities or other machine authentication and validation technologies can help identify systems that are presenting a cloned or spurious MAC address

Spurious —- not being what it purports to be; false or fake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Hijacking (Domain Name System or DNS attack)

A

Domain hijacking changes the registration of a domain, through technical means like a vulnerability with a domain registrar or control of a system belonging to an authorized user, or through nontechnical means such as social engineering.

The end result, of domain hijacking is that the domain’s settings and configuration can be changed by an attacker, allowing them to intercept traffic, send and receive email, or otherwise take action while appearing to be the legitimate domain holder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS poisoning (Domain Name System or DNS attack)

A

DNS poisoning can be accomplished in multiple ways. One form is another form of the on-path attack where an attacker provides a DNS response while pretending to be an authoritative DNS server.

DNS poisoning van also involve poisoning the DNS cache on systems. Once a malicious DNS entry is in a system’s cache, it will continue to use that information until the cache is purged or updated.

In a DNS cache poisoning attack, hackers alter a domain name system (DNS) to a “spoofed” DNS so that when a legitimate user goes to visit a website, instead of landing on their intended destination they actually end up at an entirely different site. Usually, this happens without users even knowing, as the fake sites are often made to look like the real ones.

17
Q

Uniform Resource Locator or URL redirection (Domain Name System or DNS attack)

A

URL redirection can take many forms, depending on the vulnerability that attackers leverage, but one of the most common is to insert alternate IP addresses into a system’s hosts file.

The host file is checked when a system looks up a site via DNS and will be used first, making a modified hosts file a powerful tool for attackers who can change it.

18
Q

Domain reputation (Domain Name System or DNS attack)

A

Domain Reputation, services and tools provide information whether a domain is a trusted email sender or or is a source of spam email

19
Q

DDoS Network

A

Volume-based attacks targeting flaws in in network protocols, often using botnets, using techniques such as UDP, ICMP flooding, or SYN flooding (TCP).

UDP floods take advantage of the fact that UDP doesn’t use a three-way handshake like TCP does, allowing UDP floods to be executed simply by sending massive amounts of traffic that the target host will receive and attempt to process.

ICMP floods, sometimes called ping floods, send massive numbers of ICMP packets, with each requesting a response.

20
Q

DDoS Application

A

Exploit weaknesses in the application layer (layer 7) by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.

21
Q

DDoS Operational Technology or OT

A

Targets the weaknesses of software and hardware devices that control systems in factories, power plants, and other industries, such as IoT devices.

Often targets weaknesses similar to application and network techniques

22
Q

Malicious code or script execution

A
  1. Powerscript (Windows based)
    —- Fileless virus
    —- Powershell allows remote and local execution, network access, and many other capabilities.
  2. Python
  3. Bash (Linux)
    —- Restricted shell that limits what users can do, including things like specifying commands names, containing slashes, importing function definitions from the shell environment, and others.
  4. Macros
  5. Visual Basic for Applications or VBA
    —- VBA is used to write programs for the Windows operating system and runs as an internal programming language in Microsoft Office (MS Office, Office) applications such as Access, Excel, PowerPoint, Publisher, Word, and Visio.