1.4 potential indicators associated with network attacks. Flashcards

1
Q

Wireless Disassociation

A

DoS attack on the wireless network
sends forged deauthentication frames to a wireless access point or client device, causing the device to disconnect from the network
802.11 management frames are unencrypted
802.11w encrypted the frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Initialization vector (IV)

A

Cryptographic Nonce
a random number that’s used to provide a high level of security during encryption and decryption.
salt to hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

on-path browser attack

A

a type of interception attack where an attacker places themselves between two devices and intercepts or modifies communications between the two.

The attacker can:
* Alter messages
* Insert malicious content
* Redirect the communication to a different destination
* Collect information
* Impersonate either of the two agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS Poisoning

A

modifies the DNS records
entering false information into a domain name server’s cache. This causes DNS queries to produce incorrect responses, which can send users to the wrong website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domain Hijacking

A

Changes DNS Settings
* Denying the owner administrative access
* Spreading malware
* Conducting phishing attacks
* Redirecting traffic to other websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Powershell

A

.ps1
cmd for system admins
Active Directory

attackers can access files in AD and administer in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Python

A

.py general purpose scripting language
works across all OS

attack scripting and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shell/Bash Script

A

Linux cmd
#! shebang
control the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Macros

A

application specific and is designed to make the application easier to use

attackers can create automated exploits within the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VBA

A

Visual Basic for Applications
Microsoft Office specific
automates processes within office applications

attackers gain access to OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly