701 - Chapter 7 Flashcards
What is an attack from one attack against one Target? And what is an attack from two or more computers against a single target? And what is the goal of both of these attacks? What is an indicator of this attack?
Denial of service DOS… distributed
denial of service DDOS… resource exhaustion… A high amount of network traffic on the network interface card
What are the two major variants of a DDOS attack?
Reflected and amplified
Which variant of a DDOS attack involves using third-party servers to redirect traffic to the Target?
Reflected
Which variant of a DDOS attack involves combining reflection techniques with amplification to generate an even greater volume of traffic directed at the target?
Amplified
This common denial of service/distributed denial of service attack, disrupts the TCP handshake process and can prevent legitimate clients from connecting?
SYN Flood attack
How does a SYN flood attack work?
The attacker never completes the last step of the handshake process by sending the ACK packet and the attacker sends a barrage of SYN packets leaving the server with multiple half open connections
This attack occurs when an attack or creates a fake identity, certificate, file, or other object in an attempt to fool and unsuspecting user or system? And what is an example that occurs when one person or entity, impersonates or masquerades as someone or something else?
Forgery…spoofing
What are three common spoofing methods?
Email address, IP address, media access control MAC address
This attack is a form of active interception and modification or active monitoring. It uses a separate computer that accepts traffic from each party in a conversation and forward to the traffic between the two? And what is another name for this attack?
On – path attack… Man in the middle attack
What are two indicators of an on path attack?
A delay in the communication between the two computers due to having to go through the man in the middle and the computer certificates used to create to secure sessions, may not be issued by a trusted certificate authority. Therefore users will receive certificate warnings and can only continue if they ignore the warnings.
What other technology is susceptible to on path attacks if administrators ignore warnings regarding previously established keys were changed?
Secure shell sessions SSH
This attack changes, an encrypted hTTPS connection to an unencrypted HTTP connection? With this attack, when does the attack have to occur to be successful? And what is an indication of this attack?
SSL stripping… at the beginning of the TLS negotiation… If the browser URL indicates not secure or the URL includes http instead of https
What attack attempts to modify or corrupt DNS data that is stored on a DNS server? And what is an indicator of this attack?
DNS poisoning… When the user attempts to go to a known website, but as directed to a different one…
What what is another a type of attack that manipulates DNS and redirect users to different websites? What is the major difference between this attack and a DNS poisoning attack? And what is modified?
Pharming…pharming attacks corrupt DNS information on a user system… the hosts file
What attack is used to redirect traffic to a different page within a site internally or externally??
URL redirection
This attack changes, a domain name registration without permission from the owner?
Domain hijacking attack
What uses block lists of known malicious domain names and either refuses to provide IP addresses for those malicious sites or provide incorrect results for them?
DNS filtering
What enables a request to be intercepted and does not allow the request to reach the server or site requested?
A DNS sinkhole
What can be useful in identifying potentially malicious websites?
DNS log files
What attack captures data in a session to impersonate one of the parties in the session? This attack can occur on what types of network? And what is an effective countermeasure against this type of attack?
Replay attack…wired and wireless networks… Timestamps, sequence number, multifactor authentication
What protocol helps prevent replay attack by using time stamped tickets?
Kerberos
What is the practice for developers of checking data for validity before using it called?
Input validation
True or false improper input handling or the lack of input validation is one of the most common security issues with web-based application applications
True
What are the different types of attacks that can occur without input validation?
Buffer overflow, SQL injection, DLL injection, cross site scripting
What are four input validation checks that a developer can use on a webpage?
Verifying proper characters that should be in a field, blocking HTML code, preventing the use of certain characters, implementing bound or range checking
Where are the two locations that a developer can perform input validation? Of these two, which is the most secure? And why?
Client side and server side…server side… because it is possible to bypass client side validation techniques
What is another input validation technique? And how does it work?
HTML escaping or HTML and coding… It works by replacing HTML symbols with their ASCII replacement characters