Analyzing Potentially Malicious Activity Flashcards
Distributed denial of service attack (DDoS attack)
An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with requests or response traffic.
Traffic Spike
A sharp increase in connection requests in comparison with a baseline.
Beaconing
A means for a network node to advertise its presence and establish a link with other nodes, such as the beacon management frame sent by an AP. Legitimate software and appliances do this, but it is also associated with Remote Access Trojans (RAT) communicating with a Command & Control server.
Internet relay chat (IRC)
A group communications protocol that enables users to chat, send private messages, and share files.
ARP Spoofing
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
Rogue Device
An unauthorized device or service, such as a wireless access point DHCP server, or DNS server, on a corporate or private network that allows unauthorized individuals to connect to the network.
Non-standard Port
Communicating TCP/IP application traffic, such as HTTP, FTP, or DNS, over a port that is not the well-known or registered port established for that protocol.
mismatched port/application traffic
Communicating non-standard traffic over a well-known or registered port.
Worm
type of malware typically results in high volumes of traffic saturating switches and router interfaces
How does 802.1x help protect against rogue devices?
802.1x limits network access to only pre-authorized devices.
Privilege Escalation
The practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application.
Nessus
One of the best-known commercial vulnerability scanners, produced by Tenable Network Security
OpenVAS
An open-source vulnerability scanner, originally developed from the Nessus codebase at the point where Nessus became commercial software.
Qualys
A cloud-based vulnerability management solution. Users install sensor agents at various points in their network, and the sensors upload data to the cloud platform for analysis
Nmap
An IP and port scanner used for topology, host, service, and OS discovery and enumeration