1.4 network attacks Flashcards
Rogue Access Point
Unauthorized Access point that does not have any security features
Evil Twin
Access Points that are made to look exactly like the Access Points on your network.
Bluejacking
Unsolicited message sent over Bluetooth
Bluesnarfing
Uses Bluetooth to access data on device
Disassociation
DoS attack the causes devices not be connected to a network
Jamming
DoS attack that cause a prevention in wireless communication because you decrease the signal-to-noise ratio
RFID
Radar tech that doesn’t need power to transmit data.
RFID attack is data stolen because its unsecured
NFC
Same as RFID but has encryption
On-path browser Attacks
(man-in-the-browser attack) Malware on the victims machine without them knowing
Mac Flooding
Switch Table is full so it turns its self to a HUB. Slows down traffic and capture all network
Mac Cloning
Attacker changes their MAC address to a existing MAC address
DoS
On-path Attacks
(man in the middle attack) redirects traffic and ARP Poisoning attacks
DNS Poisoning/ Spoofing
Redirects all traffic to an attackers website
ARP Poisoning
Takes the router IP and MAC. Changes the MAC to the attacker’s MAC then sends info to the victim. Now the victim thinks its talking to the router but instead talks to the attacker
Domain Hijacking
Attacker hack the Domain Registration Account and changes the IP address to theirs. Attackers tries to get login credentials to change it.
URL Hijacking/Redirection
Taking the URL and making it similar to your actual URL name. Attackers sell the bad spelled name back to you.
Domain Reputation
(Security Posture) Sending Spam, bad websites that has malware, website will be Index by search engines.
DoS
(denial of Service)
Force a service to fail
DDoS
(distributed denial of service) When many systems are used to cause a DoS
OT (Operational Tech)
DoS for Operational Tech. causing industrial and hard ware equipment to stop working (traffic lights, Electric grids, etc.)
PowerShell
Command line for Windows systems
good for attacking windows system
Python
common script language for many systems
Bash
uses Shell Script to script Linux/Unix
Macros
a automated script that attackers use. User just needs to open the file.