1.4 Network Attacks Flashcards

1
Q

Define Evil Twin attack (2 methods)

A
  1. Wireless attack where a malicious access point placed near a valid WiFi network and disguised to trick users into connecting to it, instead of the valid WiFi network

OR

  1. Malicious access point’s broadcast overpowers the valid access points so users connect to it instead
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to protect against Evil Twin attacks

A

Encrypt communications, such as using a VPN connection when on WiFi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Rouge Access Point attack

A
  1. Installation of a wireless access point on the network that is not authorized
  2. Can be done for malicious intent, or non-malicious intent, such as by an employee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Bluesnarfing (2)

A
  1. Connecting via Bluetooth to a device to access data on a mobile device, such as contact lists, emails, calendars, and other data on it
  2. Vulnerability is patched in newer versions of Bluetooth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Bluejacking

A

Sending unsolicited messages to a mobile device via Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Wireless Disassociation attack

A

Denial of Service attack capitalizing on older 802.11 versions taking advantage of unencrypted management frames to forcibly disconnect other clients from the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Wireless Jamming attack

A

A Denial of Service attack where the attacker creates additional noise over a WiFi channel to interrupt connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to detect a jamming attack

A

Fox-hunt, using a directional antenna to find the source of interference and eliminate it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define RFID (2 types)

A
  1. Passive - RFID chip is not powered
  2. Active - RFID chip is powered by a battery, some can be re-written
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RFID & NFC Vulnerabilities

A
  1. Intercepting wireless data - data transmissions may or may not be encrypted
  2. Jamming - Denial of Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Initialization Vector (IV)

A

A random value added to an encryption key when encrypting data to strengthen the encryption against being broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IV Vulnerability and WEP/WPA, aka IV Attack (2)

A
  1. WEP & WPA use a 24-bit IV allowing the encryption to be easily broken due to the occurrence of repeated values
  2. WPA2 & 3 use a 48-bit IV making it very difficult to crack due to it not being repeated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define On-Path-Attack (previously known as man-in-the-middle or man-in-the-browser)

A

Interception and relay of communications without being detected by end devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2 Examples of On-Path-Attacks

A
  1. ARP Poisoning - requires on-network access by a device that intercepts communications during transmission over the network
  2. On-Path browser attack uses malware to intercept communications sent from a web browser prior to encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define ARP Poisoning

A
  1. A malicious on-network device redirects network communications through it by poisoning the ARP cache of 2 different devices, such as a router and workstation computer, to impersonate those devices
  2. Takes advantage of ARP’s lack of security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define MAC Flooding

A

Flooding a switch with spoofed MAC addresses to fill up its MAC address table causing it to function as a hub and broadcast all traffic through every port

17
Q

How to prevent MAC Flooding attack

A

Most switches have configuration options to prevent MAC Flooding

18
Q

Define MAC Address Cloning/Spoofing

A

Device can impersonate another device by altering its MAC Address to intercept network communications

19
Q

Define 3 methods to execute a DNS Poisoning Attack

A
  1. Modify “hosts” file on local computer to redirect traffic to a malicious site
  2. On-path attack to intercept DNS queries and redirect traffic to a malicious site
  3. Modify the DNS Server records to redirect traffic to a malicious site
20
Q

Define Domain Hijacking

A

Cracking password to gain access to modifying DNS records

21
Q

Define URL Hijacking

A

Creating a URL that closely resembles a valid URL to trick users into visiting a malicious site, often due to common typos

22
Q

Define Domain Reputation attack

A

If malware infects an email server or web server, the domain may get blacklisted as a source or spam or malicious web site

23
Q

Define Distributed Denial of Service (DDoS) attack

A

An attack where many devices (botnet) are used to simultaneously attack a system to affect its availability

24
Q

What are the 3 primary areas vulnerable to denial of service attacks?

A
  1. Network
  2. Applications
  3. Operational Technology
25
Q

3 Examples of Operational Technology vulnerable to denial of service attacks

A
  1. Traffic lights
  2. Power grid
  3. Manufacturing plants
26
Q

2 Examples of Applications vulnerable to denial of service attacks

A
  1. Web-based applications
  2. Cloud-based services
27
Q

2 Examples of Network vulnerabilities to denial of service attacks

A
  1. Switches
  2. DNS
28
Q

Define scripting attack and what it uses

A

Command-line utilities in OS provide an entry point for launching malicious attacks, i.e. PowerShell, Python, Linux shell scripts, macros, VBA