9B: Attack LAN Protocols Flashcards

2.2 Given a scenario, perform active reconnaissance. 3.1 Given a scenario, research attack vectors and perform network attacks.

1
Q

Exploiting a misconfiguration to direct traffic to a different VLAN without authorization.

A

VLAN hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Overflows the MAC table on a vulnerable switch so that it behaves like a hub, repeating frames out all ports.

A

Macof attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A rogue wireless access point that attracts Wi-Fi clients to connect to the network.

A

Wifi Pineapple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command-line tool used to poison responses to NetBIOS, LLMNR, and MDNS name resolution requests.

A

responder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network-based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to the same network the hashed credentials originated on.

A

pass the hash (PtH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly