9B: Attack LAN Protocols Flashcards
2.2 Given a scenario, perform active reconnaissance. 3.1 Given a scenario, research attack vectors and perform network attacks.
1
Q
Exploiting a misconfiguration to direct traffic to a different VLAN without authorization.
A
VLAN hopping
2
Q
Overflows the MAC table on a vulnerable switch so that it behaves like a hub, repeating frames out all ports.
A
Macof attack
3
Q
A rogue wireless access point that attracts Wi-Fi clients to connect to the network.
A
Wifi Pineapple
4
Q
Command-line tool used to poison responses to NetBIOS, LLMNR, and MDNS name resolution requests.
A
responder
5
Q
A network-based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to the same network the hashed credentials originated on.
A
pass the hash (PtH)