8: 7 Network Attacks Flashcards

1
Q

DoS Attack

A

Denial of Service attack makes a system unavailable for legit users by sending a huge number of requests to a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dos Limitations

A

Easy to block based on IP address, require a huge bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS attacks

A

Utilizes botnets to overwhelm a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf attack

A

Attacker sends echo requests to third-party servers with a forged victim IP address, and then send reply to the victim’s IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amplified DDoS attacks

A

Sends small requests that lead to large replies- looking for the higher amplification factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Eavesdropping Attacks

A

Theft of information as a user communicates with a server over the web. Relies on compromised Communication path (network device tapping, DNS poisoning, ARP poisoning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Man-in-the-middle Attack

A

Attacker tricks the user to establish a communication channel with the attacker, who then communicates with the server on behalf of the client while reading the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay Attack

A

Uses previously captured data to create a separate attack at a later date - just has the encoded version of the credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defeat replay attacks

A

Use a token session system, and timestamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL Stripping

A

Tricks browser into using unencrypted communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Domain Name System, translates common domain names into IP address for the purpose of network routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hierarchical DNS lookup

A

Root Nameserver, then .org nameserver, then specific .org nameserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Poisoning

A

Inserting incorrect DNS records in a valid DNS Server than will then redirect the user to the attacker’s server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Typosquatting

A

Registering many domain names with similar address hoping to capture legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Hijacking

A

Taking over control of an organization’s valid domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

URL Redirection

A

Attacker places redirects on a trusted site to content hosted on a malicious site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP

A

Address Resolution Protocol - protocol that translates IP address to hardware MAC addresses on local area networks

18
Q

ARP poisoning

A

Only works on LAN - Confuses system that the gateway device is different than expected.

19
Q

MAC flooding attack

A

Rapidly cycle addresses on a single system to overwhelm the table that maintains MAC addresses in memory, causing switch to forget where system is located, which will then broadcast traffic

20
Q

MAC Spoofing/Cloning

A

Alterns the assigned hardware address of a system to assume a false identity or engage in a MAC flooding attack

21
Q

IP Spoofing

A

Alters the IP address of a system and normally can’t be used for two-way communication - difficult to reconfigure network to receive return traffic at a spoofed IP address.

22
Q

Anti-Spoofing controls

A

Ingress Filtering - blocks inbound traffic that contains spoofed source addresses
Egress filtering - blocks outbound traffic that contains spoofed source addresses

23
Q

Wireless Attacks on WEP

A

Attackers get enough Initialization vectors to reconstruct the encryption key

24
Q

Wireless Attacks on WPA

A

WPA depends on RC4, but also TKIP (changing keys each time). Issue is with hashing function.

25
Q

WPS

A

Wi-Fi Protect Setup - allows quick setup of devices (press button on both devices, uses 8-digit WPS PIN)

26
Q

Issues with WPS

A

Trivial to guess the WPS PIN (11000 guesses) gives access to the network. WPS PIN cannot change on a device.

27
Q

Jamming and Interference Attacks

A

DoS attack that broadcasts a strong signal that over the same spectrum that overwhelms the signal

28
Q

Wardriving

A

Cruise neighborhoods and commercial areas using tools that capture information about Wi-Fi network.

29
Q

Rogue Access Point

A

Connecting an unauthorized AP to a corporate network. Bypasses authentication, can interfere with legitimate wireless use.

30
Q

Rogue AP Detection

A

Built-in detection systems of Enterprise grade wireless.

31
Q

Evil twins

A

Fake AP with SSID of legitimate network, then redirect users to phishing IDs

32
Q

Disassociation Attack

A

Disconnects a client from a network using a deauthentication frame - spoofed frame believed to come from access point, so disconnects.

33
Q

Goals of Disassociation Attack

A

Gather authentication information for cryptographic attacks, can deny service too

34
Q

NFC

A

Near Field Communication system (30-50 feet apart)

35
Q

Bluetooth

A

NFC technology used to connect speakers, headsets, keyboards, and similar devices

36
Q

Bluejacking

A

Attack sends bluetooth spam to a user’s device

37
Q

Bluesnarfing

A

Attacker force pairing between devices in older bluetooth devices

38
Q

NFS Security Improvements

A

Turn off discoverable mode when not in use, apply firmware updates, watch for suspicious activities

39
Q

RFID

A

Chips embedded in many items and may be read by scanners

40
Q

RFID Security Concerns

A

Businesses want strong authentication and encryption to protect the integrity of RFID systems
Consumers want privacy safeguards to protect their personal information