1.4 potential indicators associated with network attacks. Flashcards
Wireless Disassociation
DoS attack on the wireless network
sends forged deauthentication frames to a wireless access point or client device, causing the device to disconnect from the network
802.11 management frames are unencrypted
802.11w encrypted the frames
Initialization vector (IV)
Cryptographic Nonce
a random number that’s used to provide a high level of security during encryption and decryption.
salt to hash
on-path browser attack
a type of interception attack where an attacker places themselves between two devices and intercepts or modifies communications between the two.
The attacker can:
* Alter messages
* Insert malicious content
* Redirect the communication to a different destination
* Collect information
* Impersonate either of the two agents
DNS Poisoning
modifies the DNS records
entering false information into a domain name server’s cache. This causes DNS queries to produce incorrect responses, which can send users to the wrong website.
Domain Hijacking
Changes DNS Settings
* Denying the owner administrative access
* Spreading malware
* Conducting phishing attacks
* Redirecting traffic to other websites
Powershell
.ps1
cmd for system admins
Active Directory
attackers can access files in AD and administer in the system
Python
.py general purpose scripting language
works across all OS
attack scripting and infrastructure
Shell/Bash Script
Linux cmd
#! shebang
control the OS
Macros
application specific and is designed to make the application easier to use
attackers can create automated exploits within the application
VBA
Visual Basic for Applications
Microsoft Office specific
automates processes within office applications
attackers gain access to OS