1.4 Given a scenario, analyze potential indicators associated with network attacks. Flashcards

1
Q

Evil twin

A

Using a false AP, cloning the identity of a legit AP based on client device’s request to connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rogue WAP

A

Access point not authorized by network authorities, usually aren’t configured well for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing

A

Unauthorized access of data via bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluejacking

A

Sending unsolicited messages to bluetooth-capable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disassociation

A

A wireless management frame, disconnecting clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Radio frequency identifier (RFID)

A

Tracking technology based on ability to power a radio transmitter using current generated in an antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jamming

A

Transmission of radio signals to prevent reliable communications by decreasing effective signal-to-noise ratio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Near field communication (NFC)

A

A standard establishing radio communications between devices in close proximity

Derivative from RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initialization vector (IV)

A

Mathematical and cryptographic term for random number

Most modern crypto functions use IV’s to increase security by reducing predictability & repeatability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On-path attack (previously known as man-in-the middle attack/man-in-the-browser attack)

A

Initially a communications eavesdropping attack, where an attacker then positions themselves between a client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Countermeasures to on-path attacks

A

Strong encryption protocols

Strong authentication

Domain Name System Security Extensions

Mutual cert. authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 2 attack

A

Falsifying layer 2 IP-to-MAC address resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Media access control (MAC) flooding

A

Uses flooding attack to compromise a switch so that the switch gets stuck into flooding all network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC cloning

A

Altering a system’s software copy of NIC’s MAC creating frames w/modified or spoofed MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Countermeasures to MAC cloning

A

Using intelligent switches monitoring for odd MAC address uses

Using NIDS monitoring for MAC address use and abuses

Maintaining an inventory of devices and MAC addresses to confirm if device is authorized or unknown/rogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain name system (DNS)

A

Domain Name System (DNS) translates domain names to IP addresses so browsers can load Internet resources.

17
Q

Domain hijacking

A

Changing the registration of a domain name w/o authorization of valid owner

Accomplished by stealing owner’s login, using XSRF, session hijacking, on-path attack, or exploiting flaw in domain registrar’s systems

18
Q

Methods of DNS poisoning

A

Rogue DNS server

DNS poisoning of zone file

Alter HOSTS file

Corrupt IP config via DHCP to change a DNS lookup address

Proxy falsification to redirect DNS traffic

19
Q

DNS poisoning

A

Act of falsifying DNS info used by client to reach a desired system

20
Q

Universal resource locator (URL) redirection

A

Force users of an application to an untrusted external site

21
Q

Domain reputation

A

Scoring system used to determine site legitimacy

22
Q

Distributed denial-of-service (DDoS)

A

Using one or more intermediary systems serving as attack platforms to perform DoS

These systems are known as bots, zombies, or agents

23
Q

Denial of service (DoS)

A

Form of attack w/the goal of preventing victimized system from performing legit activity

24
Q

Distributed reflective denial-of-service (DRDoS)

A

Employs amplification or bounce network that is an unknowing participant.

Attacker sends spoofed message packets to network’s broadcast address, then each host responds to that packet, with that response going to a victim

25
Q

DoS/DDoS/DRDoS attacks

A

Smurf
-Form of DRDoS
-Uses ICMP reply packets

Fraggle
-Form of DRDoS
-Uses UDP packets

SYN Flood
-Attack is an exploitation of TCP three-way handshake to perform resource exhaustion
-Sending numerous SYN packets w/o ACK packets

Ping of death
-Sending fragments to victim, which when re-assembled result in oversized ping packet, resulting in buffer overflow

Xmas attack
-Using XMAS scan to perform DoS

Teardrop
-Partial transmission of fragmented packets causing target to consume system resources holding onto the incomplete reassembles

Land attack
-SYN Flood where source and dest. address are both set to victim’s address causing logical error

26
Q

Protections to DoS/DDoS/DRDoS attacks

A

Firewalls, routers, and IDSs that can detect and auto block port or filter packets based on source/dest. address

Disable echo replies on external systems

Disable broadcast features on border systems

Block spoofed packets from entering or leaving

Keep all systems patched

Use a flood guard

27
Q

Network DoS Attack

A

Attempt to consume all bandwidth of connection

28
Q

Application DoS Attack

A

Attempt to consume all system resources through app queries or half-open connections

29
Q

Operational technology (OT) DoS Attack

A

Focused on OT systems, a collection of computer systems designed to monitor/manipulate physical world

30
Q

Malicious code or script execution

A

PowerShell - ps1

Python - py

Bash - sh

Macros

Virtual Basic for Applications (VBA)

31
Q
A