1.4 Network Attacks Flashcards

1
Q

What is a Wireless Attack?

A

Wireless attacks are specific to wireless networks. Mostly these attacks attempt to gain unauthorized access to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the [8] types of wireless attacks?

A
  • Evil Twin
  • Rogue Access Point
  • Bluesnarfing
  • Bluejacking
  • Disassociation
  • Jamming
  • Radio Frequency Identification (RFID)
  • Near-Field Communication (NFC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Evil Twin?

A

Unauthorized wireless access points deceive users into believing that they are legitimate network access points.

  • Corporate Networks, Private Networks, and Public Wi-Fi Hotspots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Rogue Access Point?

A

An unauthorized wireless access point on a corporate or private network that allows unauthorized individuals to connect to the network.

  • Can allow man-in-the-middle attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluesnarfing?

A

A wireless attack is where an attacker gains access to unauthorized information on a wireless device by using a Bluetooth connection.

  • Close range attack
    *Bluetooth transmission limit is 328 ft
  • Can access and steal private information from Bluetooth Devices.
    Email messages
    Contact Information
    Calendar Entries
    Images, Videos, and other data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Bluejacking?

A

A wireless attack where an attacker sends unwanted Bluetooth signals from a smartphone, mobile phone, it laptop to other Bluetooth - enabled devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluetooth?

A

A short-range wireless radio network transmission medium is normally used to connect two personal devices, such as a mobile phone and a wireless headset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Wireless Disassociation?

A

A wireless attack where an attacker spoofs the MAC address of a wireless access point to force a target device to try and reassociate with the WAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Jamming?

A

A situation where radio waves from other devices (benign or malicious) interface with the wireless signals used to communicate over wireless networks. Also referred to as interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is RFID System Attack?

A

RFID: A technology that uses electromagnetic fields to automatically identify and track tags or chips affixed to selected objects and store information about the objects.

  • Tag and Reader
  • Inventory Management and Tracking
  • Human and Animal Identification and Tracking
  • Contactless Payments
  • Smart Cards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Near Field Communication (NFC)?

A

Commonly found on smartphones and many mobile device accessories, NFC is a standard that establishes radio communications between devices in close proximity. It is often used to perform device-to-device data exchanges, set up direct communications, or access more complex services. It lets you perform synchronization between devices by touching them together or bringing them within centimeters of each other. Many contactless payment systems are based on NFC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Initialization Vector (IV) Attack

A

A wireless attack where the attacker predicts or controls the IV used in an encryption process, rendering the encrypted data vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Initialization Vector (IV)?

A

A mathematical and cryptographic term for a random number is used to reduce predictability and repeatability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the top [10] wireless security best practices?

A
  • Disable SSID broadcasting (AKA hide your network)
  • Use MAC Filtering
  • Reduce the signal strength to only cover the area needed
  • Change default SSID and default admin passwords
  • Set policies for any devices that access the network
  • Enable a firewall at the WAP
  • Physically secure access to WAPs
  • Use an SSID that does not provide identifying information
  • Setup alerting for new MAC addresses that connect to the WAP
  • Review devices connected to the WAP regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is On-Path Attack? AKA Man-In-The-Middle

A

This attack happens when a hacker inserts themselves between a user and a website. There are many types of On-Path attacks such as eavesdropping, spoofing, or hijacking. Each attacker’s intent is different but these types of attacks can be mitigated by using a VPN, having an IDS in place, having strong firewall rules in place, using encrypted protocols, and regularly conducting penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Layer 2 Attacks?

A

Layer 2 of the Open Systems Interconnection (OSI) model is also known as the Data Link layer, where Ethernet operates.

17
Q

What is Address Resolution Protocol (ARP) Poisoning?

A

Layer 2 Attack: Changing the registration of IP to MAC address in the ARP table thereby transmitting falsified ARP resolution data

18
Q

What is Media Access Control (MAC) address?

A

The physical address of a network interface card (NIC)

19
Q

What is Domain Naming System (DNS)?

A

Resolves URL to IP addressing

20
Q

What is MAC Flooding?

A

Layer 2 Attack: An attack that floods a switch with Ethernet frames with a randomized source MAC address causes it to get stuck flooding once it can no longer properly forward traffic.

21
Q

What is MAC Cloning/Spoofing?

A

Layer 2 Attack: Used to impersonate another system, often a valid or authorized network device, to bypass port security or MAC filtering limitations.

22
Q

What is MAC Filtering?

A

Layer 2 Attack: This is a security mechanism intended to limit or restrict network access to those devices with known specific MAC addresses.

23
Q

What port is DNS?

A

Port 53

24
Q

What is Port 53?

A

DNS

25
Q

What is Domain Hijacking?

A

Is the act of changing the registration of a domain name without the permission of its original registrant, or by abuse of privileges on domain hosting and registrar software systems.

26
Q

What is DNS Poisoning?

A

It is an attack that uses altered Domain Name records to redirect traffic to a fraudulent site

27
Q

What is Uniform Resource Locator (URL) Redirection?

A

A vulnerability that allows an attacker to force users of your application to an untrusted external site

28
Q

What is Domain Reputation?

A

Is like a credit score for your sending email domain. Email service providers calculate your domain reputation on a scale of 0-100. The closer to 100 your domain score is, the more receiving email servers will trust your emails.

29
Q

What is Distributed Denial-Of-Service (DDoS)?

A

Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.

30
Q

What is a Smurf Attack?

A

This form of DRDoS uses ICMP echo reply packets (ping packets).

31
Q

What is a Powershell?

A

Powershell is an attacker’s tool of choice for conducting fileless malware attacks. Powershell is a powerful scripting language that provides unprecedented access to a machine’s inner core, including unrestricted access to Windows APIs.

32
Q

What is Python?

A

Scripting attacks are favored by cybercriminals and nation-states because they are hard to detect by endpoint detection and response (EDR) systems.

33
Q

What is Bourne Again Shell (Bash)?

A

The bash shell to run commands and run executables and automated tasks primarily in Linux, Unix, and MacOS.

34
Q

What are Macros?

A

A program or script is written in a language that is embedded into specific files, such as Word documents, Excel spreadsheets, and Adobe PDFs

35
Q

What is Visual Basic for Applications (VBA)?

A

Visual Basic for Applications is a computer programming language developed and owned by Microsoft. With VBA you can create macros to automate repetitive word and data processing functions and generate custom forms, graphs, and reports.