1.4 Network Attacks Flashcards
Define Evil Twin attack (2 methods)
- Wireless attack where a malicious access point placed near a valid WiFi network and disguised to trick users into connecting to it, instead of the valid WiFi network
OR
- Malicious access point’s broadcast overpowers the valid access points so users connect to it instead
How to protect against Evil Twin attacks
Encrypt communications, such as using a VPN connection when on WiFi networks
Define Rouge Access Point attack
- Installation of a wireless access point on the network that is not authorized
- Can be done for malicious intent, or non-malicious intent, such as by an employee
Define Bluesnarfing (2)
- Connecting via Bluetooth to a device to access data on a mobile device, such as contact lists, emails, calendars, and other data on it
- Vulnerability is patched in newer versions of Bluetooth
Define Bluejacking
Sending unsolicited messages to a mobile device via Bluetooth
Define Wireless Disassociation attack
Denial of Service attack capitalizing on older 802.11 versions taking advantage of unencrypted management frames to forcibly disconnect other clients from the access point
Define Wireless Jamming attack
A Denial of Service attack where the attacker creates additional noise over a WiFi channel to interrupt connectivity
How to detect a jamming attack
Fox-hunt, using a directional antenna to find the source of interference and eliminate it
Define RFID (2 types)
- Passive - RFID chip is not powered
- Active - RFID chip is powered by a battery, some can be re-written
RFID & NFC Vulnerabilities
- Intercepting wireless data - data transmissions may or may not be encrypted
- Jamming - Denial of Service
Define Initialization Vector (IV)
A random value added to an encryption key when encrypting data to strengthen the encryption against being broken
IV Vulnerability and WEP/WPA, aka IV Attack (2)
- WEP & WPA use a 24-bit IV allowing the encryption to be easily broken due to the occurrence of repeated values
- WPA2 & 3 use a 48-bit IV making it very difficult to crack due to it not being repeated
Define On-Path-Attack (previously known as man-in-the-middle or man-in-the-browser)
Interception and relay of communications without being detected by end devices
2 Examples of On-Path-Attacks
- ARP Poisoning - requires on-network access by a device that intercepts communications during transmission over the network
- On-Path browser attack uses malware to intercept communications sent from a web browser prior to encryption
Define ARP Poisoning
- A malicious on-network device redirects network communications through it by poisoning the ARP cache of 2 different devices, such as a router and workstation computer, to impersonate those devices
- Takes advantage of ARP’s lack of security
Define MAC Flooding
Flooding a switch with spoofed MAC addresses to fill up its MAC address table causing it to function as a hub and broadcast all traffic through every port
How to prevent MAC Flooding attack
Most switches have configuration options to prevent MAC Flooding
Define MAC Address Cloning/Spoofing
Device can impersonate another device by altering its MAC Address to intercept network communications
Define 3 methods to execute a DNS Poisoning Attack
- Modify “hosts” file on local computer to redirect traffic to a malicious site
- On-path attack to intercept DNS queries and redirect traffic to a malicious site
- Modify the DNS Server records to redirect traffic to a malicious site
Define Domain Hijacking
Cracking password to gain access to modifying DNS records
Define URL Hijacking
Creating a URL that closely resembles a valid URL to trick users into visiting a malicious site, often due to common typos
Define Domain Reputation attack
If malware infects an email server or web server, the domain may get blacklisted as a source or spam or malicious web site
Define Distributed Denial of Service (DDoS) attack
An attack where many devices (botnet) are used to simultaneously attack a system to affect its availability
What are the 3 primary areas vulnerable to denial of service attacks?
- Network
- Applications
- Operational Technology
3 Examples of Operational Technology vulnerable to denial of service attacks
- Traffic lights
- Power grid
- Manufacturing plants
2 Examples of Applications vulnerable to denial of service attacks
- Web-based applications
- Cloud-based services
2 Examples of Network vulnerabilities to denial of service attacks
- Switches
- DNS
Define scripting attack and what it uses
Command-line utilities in OS provide an entry point for launching malicious attacks, i.e. PowerShell, Python, Linux shell scripts, macros, VBA