15 D6 Flashcards
Auditing:
__ - Determines whether a port is open, closed, or filtered.
Port Scanning
Auditing:
__ - A scanned list is derived from the discovery options and address group options.
Targeting
Bonk or Boink?
___ has the ability to attack a range of ports.
Boink
___ Attacks occur when multiple compromised systems take part in flooding the bandwidth or resources of a targeted system.
DDoS
Host-based Security:
4 Methods of detecting packets sniffer are:
___ ___ ___ ___
Latency Tests
ARP Method
Ping Method
DNS Queries
A ___ Attack occurs when the attacker changes his IP to that of the victim and pings the broadcast IP of the victim’s network. All hosts within the target network reply to the victim with an ICMP echo reply, exhausting resources.
Smurf Attack
___ and ___ attacks are the reverse concept of teardrop, instead of setting the offset lower, they make it larger than the correct one.
Bonk and Boink Attacks
___ Attack is a popular DoS attack against Windows NT 4.0, Win 2000, and Win XP and is a NetBIOS session request flooder
NBTStream Attack
___ uses control flags of the TCP 3 way handshake. Attacker sends thousands of SYN flags to victim port, if the port is open the victim replies with SYN/ACK, but the handshake is never completed.
SYN Flood Attack
A ___ attack sends overlapping fragmented UDP packets to the target.
Teardrop attack
___ Attack uses UDP instead of ICMP. Normally the destination port is 7 (echo) or 19 (chargen).
Fraggle Attack
Auditing:
__ - Performs various tests including registry checks, ICMP, and TCP fingerprinting to determine target OS.
OS Detection
___ is an application used to launch a DDoS, with little or no knowledge of how it works. Generates thousands of TCP, UDP, and/or HTTP requests to overwhelm a server/host.
Low Orbit Ion Cannon (LOIC)
Vulnerability Scanning/Patching:
___ is a 4step procedure that begins once the scanner receives the job file.
Auditing
___ - user types in target URL, sets this application to operate in supercharged or normal mode, and ‘fires’. The program sends traffic to that URL in an attempt to overload the site and bring it down.
High Orbit Ion Cannon (HOIC)