4.2 Summarize various types of attacks and their impact to the network. Flashcards

1
Q

What is a DoS?

A
  • Denial of Service
  • An action or series of actions that cause a system to fail.
  • Hacker takes advantage of a failure or vulnerability.
  • “friendly” DoS (Layer 2 loop without STP; or Bandwidth DoS).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a DDoS?

A
  • Distributed Denial of Service
  • Multiple devices acting in unison to deny service
  • Botnet (At its peak, Zeus botnet infected over 3.6 million PCs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is VLAN hopping?

A
  • VLANs are separated into their own network
  • Some configurations do not need a router and can connect to other VLANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is MAC flooding?

A
  • the “physical” address of a network adapter
  • 48 bits / 6 bytes long, displayed in hexadecimal
  • The MAC table is only so big, attacker starts sending traffic with different source MAC addresses to force out legitimate MAC addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ARP spoofing?

A
  • Attacker sits on the path between client and router and sends fake ARP packets that link an attacker’s MAC address with an IP of a computer already on the LAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ARP poisoning?

A
  • The attacker changes company’s ARP Cache table, so it contains falsified MAC maps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DNS poisoning?

A
  • Send a fake response to a valid DNS request which requires redirection of the original request or the resulting response.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DNS spoofing?

A
  • Modifying the client host file which would take precedent over the DNS queries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a rogue device (DHCP or AP)?

A
  • IP addresses assigned by a non-authorized server (no inherent security in DHCP).
  • Client is assigned a invalid or duplicate address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an “evil twin”?

A
  • Someone who is trying to leverage a wireless access point as a way to maliciously attack your network.
  • They can do this by: configuring access point to look like existing network, overpowering the existing access points so that the false one is only being accessed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an “on-path” attack?

A
  • The attacker needs to be able to sit between the client and the services that they are trying to access (via switch, router, piece of equipment).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Switch Spoofing

A
  • A VLAN hopping technique that support automatic configuration with no authentication required
  • You are essentially presenting yourself as a switch and you can send trunk negotiation.
  • You now have ability to send information to any VLAN that you are connecting with.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Double Tagging

A
  • Another form of VLAN hopping
  • Used in trunking between switching
  • Takes advantage of the “native” VLAN configuration.
  • First “native” VLAN tag is removed; second “fake” tag is now visible to the second switch and packet is forwarded to the target.
  • To prevent: don’t put any devices on the “native VLAN, change the “native” VLAN ID, force tagging of the “navtive” VLAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly