1.4 Network Attacks Flashcards

1
Q

Evil Twin

A

This is a malicious fake access point that is set up to appear to be a legit trusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rogue Access Point

A

These are access points added to your network either intentionally or unintentionally. Once connected to your network they can offer a point of entry to attackers or unwanted users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing

A

This is unauthorized access to a bluetooth device, typically aimed at gathering info like contact lists or other details the device contains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluejacking

A

Sends unsolicited messages to bluetooth-enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disassociation

A

This describes what happens when a device disconnects from an access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jamming

A

This will block all the traffic in the range or frequency it is conducted against. A jammer sends powerful traffic to drown out traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Radio frequency identification (RFID)

A

This is a short range wireless technology that uses a tag and a receiver to exchange information. (usually between a foot to 100 meters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Near-field communication (NFC)

A

This is used for very short range communication between devices, usually within 4 inches and often used with apple pay or google wallet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-path attack

A

This attack occurs when an attacker causes traffic that should be sent to the intended recipient to be relayed through a system or device the attacker controls. (man-in-the-middle attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Address resolutions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Address resolution protocol (ARP) poisoning

A

Send malicious ARP packets to the default gateway of a network with the intent of changing the pairings of MAC addresses to IP addresses that the gateway maintains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Media access control (MAC) flooding

A

This is targeting switches by sending so many MAC addresses to the switch that the CAM or MAC table that stores pairings of ports and MAC addresses is filled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC cloning

A

This duplicates the media access control address of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain name system (DNS)

A

This is what is used to send users traffic whenever they try to visit a site using a human readable name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain hijacking

A

This changes the registration of a domain, either through a vulnerability or control of a system. The domains settings and configurations can be changed by an attacker, allowing them to intercept traffic, send and receive email or take action while appearing to be the legit domain holder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS poisoning

A

An attacker provides a DNS response while pretending to be an authoritative DNS server.

17
Q

Uniform Resource locator (URL) redirection

A

This is to insert alternate IP addresses into a systems hosts file

18
Q

Domain reputation

A

This provides information about whether a domain is a trusted email sender or sends a lot of spam email.

19
Q

Distributed denial of service (DDoS)

A

This is conducted from multiple locations, networks, or systems, making it difficult to stop and hard to detect. This attack occurs when there is a massive amount of resources that try to overwhelm the system or network.

20
Q

Network

A

Malicious actors commonly use large-scale botnets to conduct network DDoS attacks

21
Q

Application

A
22
Q

Operational technology (OT)

A

This is the software and hardware that controls devices and systems in buildings, factories, powerplants and other industries.

23
Q

Powershell

A

Fileless malware often leverages powershell to download and execute itself once it leverages a flaw in a browser or plug-in to gain access to a windows system.

24
Q

Python

A

Used to run code that can be hard to detect on linux systems, allowing remote access and other activities to occur

25
Q

Bash

A

This can be used to create persistent remote access using bind or reverse shells and other exploit tools

26
Q

Macros

A

These are included in office documents that require users to enable them,

27
Q

Visual Basic for applications (VBA)

A