4.4 Common Networking attacks Flashcards
Denial of Service (DoS)
force a service to fail - overload the system
“friendly” DoS
unintentional failure of service often done by accident
Distributed DoS (DDoS)
launch an arm (botnets) of computers to bring down a service
use all the bandwidths or resources - traffic spike
DDoS Amplification
turn a small attack into a big attack often reflected off another device or service
-uses protocols with little to no authentication checks
NTP, DNS, ICMP
Social engineering principles
- Authority - act as someone in charge
- Intimidation - bad things might happen if you don’t help
- Consensus/ Social proof -convincing you to do something b/c apparently someone else did it for them
- Scarcity - acting like there is an expiry date to a certain task
- Urgency - work alongside scarcity/ act quick don’t think
- Familiarity/Liking - act like you know the same person
- Trust - convinces you there are trustable because say a job (it professional/cop)
Insider threats
having information that others do not have access too
Logic Bomb
a piece of often-malicious code that is intentionally inserted into software
Rouge Access Points
is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.
Wireless Evil Twins
When you configure an AP the exact same way as another then overpower the AP that is the target
Wardriving
is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone
Phishing
act of disguising a communication from an unknown source as being from a known
Social engineering with a touch of spoof
ususally done through: email/span
Vishing
information obtain via phone
Spear Phishing
a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim
Ransomware
when someone takes control of personal information or data and asks for money in return
DNS poisoning
a hacker technique that manipulates known vulnerabilities within the domain name system (DNS)