Attack Types Flashcards

1
Q

ARP Poisoning, Spoofing, and Man-in-the-Middle

A

Redirects your traffic, then passes it on to the destination

You never know your traffic was redirected

ARP has no security, relies on security in the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Denial of service

A

Force a service to fail

Overload the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Replay Attack

A

Useful information is transmitted over the network

Network Tap is used to access to the raw network data

Data is replayed to appear as someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spoofing

A

Pretend to be something you aren’t

Fake web server, fake DNS server, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS Poisoning

A

Modify the DNS server

Modify the client host file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pharming

A

Redirection to a bogus site

Combines farming with phishing

Farming - Harvest large groups of people

Phishing - Collect access credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spam

A

Unsolicited email, traditionally for advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spim

A

Spam over IM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spit

A

Spam over internet telephony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stopping Spam

A

White list to only allow known senders

Black list to remove the bad senders

Bayesian filtering can filter based on certain words/phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

Social engineering with a touch of spoofing

Often delivered by spam, IM, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spear Phishing

A

More believable phishing with inside information

Spear phishing the CEO is “whaling”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Xmas Tree Attack

A

Send a carefully crafted packet to a host

URG, PUSH, and FIN are set - 00101001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transitive attacks

A

A trusts B, B trusts C, therefore A trusts C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Client-side attacks

A

Attack the client - Bad programming makes it easier

Browsers, media players, office applications, email clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Attacks

Brute force

Dictionary attack

Hybrid attack

Birthday attack

Rainbow tables

A

Guess the password, calculate the hash

Use common words as passwords

Combine brute force and dictionary attacks

The same hash value for two plaintexts

An optimized, pre-built set of hashes

17
Q

Watering Hole Attack

A

Determine which website the victim group uses

Infect one of these third-party sites

18
Q

URL Hijacking

A

Typosquatting / brandjacking