4.3 Network Hardening Techniques Flashcards
SNMP is used for?
a protocol used to manage network devices (mostly to query devices)
What is the secured version of SNMP?
SNMP v1 and SNMP v2 = unencrypted
SNMP v3 is the encrypted version
Footprinting allows a threat actor to discover the:
topology and general
configuration of the network and security systems
Footprinting can be done by:
social engineering attacks—persuading users to give information or locating information that has been thrown out as trash, for instance.
Port scanning specifically aims to enumerate the:
TCP or UDP application ports on which a host
will accept connections.
Fingerprinting allow: s a threat actor to identify device and:
OS types and versions
Spoofing Attacks
Descrbie what is spoofing?
attacker disguises his or her identity
The term spoofing covers a wide range of different attacks. Spoofing can include any type of attack where the attacker disguises his or her identity, or in which the source of network information is forged to appear legitimate.
Spoofing Attacks
Which protocols are commonly exploited in spoofing attacks?
a) TCP and UDP
b) HTTP and HTTPS
c) ARP and DNS
d) FTP and SSH
c) ARP and DNS
How DNS poisoning works?
Attacker change the IP address of a DNS