4.2 Summarize various types of attacks and their impact to the network. Flashcards
1
Q
What is a DoS?
A
- Denial of Service
- An action or series of actions that cause a system to fail.
- Hacker takes advantage of a failure or vulnerability.
- “friendly” DoS (Layer 2 loop without STP; or Bandwidth DoS).
2
Q
What is a DDoS?
A
- Distributed Denial of Service
- Multiple devices acting in unison to deny service
- Botnet (At its peak, Zeus botnet infected over 3.6 million PCs)
3
Q
What is VLAN hopping?
A
- VLANs are separated into their own network
- Some configurations do not need a router and can connect to other VLANs
4
Q
What is MAC flooding?
A
- the “physical” address of a network adapter
- 48 bits / 6 bytes long, displayed in hexadecimal
- The MAC table is only so big, attacker starts sending traffic with different source MAC addresses to force out legitimate MAC addresses.
5
Q
What is ARP spoofing?
A
- Attacker sits on the path between client and router and sends fake ARP packets that link an attacker’s MAC address with an IP of a computer already on the LAN.
6
Q
What is ARP poisoning?
A
- The attacker changes company’s ARP Cache table, so it contains falsified MAC maps.
7
Q
What is DNS poisoning?
A
- Send a fake response to a valid DNS request which requires redirection of the original request or the resulting response.
8
Q
What is DNS spoofing?
A
- Modifying the client host file which would take precedent over the DNS queries.
9
Q
What is a rogue device (DHCP or AP)?
A
- IP addresses assigned by a non-authorized server (no inherent security in DHCP).
- Client is assigned a invalid or duplicate address.
10
Q
What is an “evil twin”?
A
- Someone who is trying to leverage a wireless access point as a way to maliciously attack your network.
- They can do this by: configuring access point to look like existing network, overpowering the existing access points so that the false one is only being accessed.
11
Q
What is an “on-path” attack?
A
- The attacker needs to be able to sit between the client and the services that they are trying to access (via switch, router, piece of equipment).
12
Q
Switch Spoofing
A
- A VLAN hopping technique that support automatic configuration with no authentication required
- You are essentially presenting yourself as a switch and you can send trunk negotiation.
- You now have ability to send information to any VLAN that you are connecting with.
13
Q
Double Tagging
A
- Another form of VLAN hopping
- Used in trunking between switching
- Takes advantage of the “native” VLAN configuration.
- First “native” VLAN tag is removed; second “fake” tag is now visible to the second switch and packet is forwarded to the target.
- To prevent: don’t put any devices on the “native VLAN, change the “native” VLAN ID, force tagging of the “navtive” VLAN