Attacks Flashcards

1
Q

A packet containing a long string of NOP’s followed by a command is usually indicative of what?

A

A buffer overflow attack.

A series of the same control, hexidecimal, characters imbedded in the string is usually an indicator of a buffer overflow attack. A NOP is a instruction which does nothing (No Operation - the hexadecimal equivalent is 0x90)

The Intel x86 processors use the hexadecimal number 90 to represent NOP (no operation). Many buffer overflow attacks use long strings of control characters and this is representative of that type of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A piece of malicious code that can take many forms and serve many purposes. Needs a host in which to live, and an action by the user to spread.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of malicious code that lays dormant until a logical event occurs (such as a specific person’s name is no longer in the payroll database)

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Many small attacks add up to equal a large attack (Movie: Office Space: stealing a fraction of a penny)

A

Salami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Similar to a virus, but does not need a host and is self replicating

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One program (usually some type of malicious code) masquerades as another. Common means of distributing Back Door Programs

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Altering/Manipulating data, usually before entry (Taco Bell: charge 50-cents for a taco and pocket other $1.50)

A

Data Diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Capturing and Viewing packets through the use of a protocol analyzer. (Passive Man-in-the Middle attack) Best defense: Encryption

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where an attacker steps in between two hosts and either monitors the exchange, or often disconnects one.

A

Session Hijacking

Where an attacker steps in between two hosts and either monitors the exchange, or often disconnects one. Session hijacks are active types of Man-in-the Middle attacks. Encryption prevents sniffing and mutual authentication would prevent a session hijack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Program that allows access (often administrative access) to a system that bypasses normal security controls. Examples are NetBus, Back Orifice, SubSeven

A

Back Door Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack on a RAS (Remote Access Server) where the attacker tries to find the phone number that accepts incoming calls. RAS should be set to use caller ID (can be spoofed), callback (best), and configured so that modem does not answer until after 4 calls.

A

Wardialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The purpose of these attacks is to overwhelm a system and disrupt its availability

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Characterized by the use of Control Machines (Handlers) and Zombies (Bots) An attacker uploads software to the control machines, which in turn commandeer unsuspecting machines to perform an attack on the victim. The idea is that if one machine initiating a denial of service attack, then having many machines perform the attack is better.

A

Distributed Denial of Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sending a Ping Packet that violates the Maximum Transmission Unit (MTU) size—a very large ping packet.

A

Ping of Death

Considered a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Overwhelming a system with a multitude of pings

A

Ping Flooding

Considered a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sending Malformed packets which the Operating System does not know how to reassemble. Layer 3 attack

A

Tear Drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attacks that overwhelm a specific type of memory on a system—the buffers. Is best avoided with input validation

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Similar to the Teardrop attack. Manipulates how a PC reassembles a packet and allows it to accept a packet much too large

A

Bonk

19
Q

Creates a “circular reference” on a machine. Sends a packet where source and destination are the same.

A

Land Attack

20
Q

Type of attack that exploits the three way handshake of TCP. Layer 4 attack. Stateful firewall is needed to prevent

A

Syn Flood

21
Q

Uses an ICMP directed broadcast. Layer 3 attack. Block distributed broadcasts on routers (aka block ICMP at the firewall)

A

Smurf

Considered a DDoS

22
Q

Similar to Smurf, but uses UDP instead of ICMP. Layer 4 attack. Block distributed broadcasts on routers

A

Fraggle

23
Q

What is the best defense for sniffing?

A

Encryption

24
Q

How would you prevent a session hijack?

A

Mutual Authentication

25
Q

How do you protect against wardialing?

A

RAS should be set to use caller ID (can be spoofed), callback (best but could be call forwarded), and configured so that modem does not answer until after 4 calls. Use authentication

Use a different number than your normal extension range for your modems

26
Q

How do you protect against buffer overflow?

A

Is best avoided with input validation

27
Q

How do you prevent against SYN flood?

A

Stateful firewall is needed to prevent

28
Q

How do you protect against Smurf?

A

Block distributed (directed) broadcasts on routers

aka block ICMP at the firewall

29
Q

How do you protect against Fraggle?

A

Block distributed (directed) broadcasts on routers

Similar to Smurf, but uses UDP instead of ICMP. Layer 4 attack.

30
Q

Sending malformed or improper data in the IMCP header. Considered a “covert channel” attack

A

Loki

31
Q

Driving around looking for unsecured wireless networks

A

War driving

32
Q

Unauthorized wireless access points offer the opportunity for what type of attack?

A

Man in the middle attacks

33
Q

Sniffing wireless signals

A

Airsnarfing

34
Q

Sending SPAM to nearby bluetooth devices

A

Blue Jacking

Mitigation:
Disable it if you’re not using it
Disable auto-discovery
Disable auto-pairing

35
Q

Copies information off of remote devices

A

Blue Snarfing

Mitigation:
Disable it if you’re not using it
Disable auto-discovery
Disable auto-pairing

36
Q

Allows full use of phone
Allows one to make calls
Can eavesdrop on calls

A

Blue Bugging

Most serious of Bluetooth attacks

Mitigation:
Disable it if you’re not using it
Disable auto-discovery
Disable auto-pairingx

37
Q

Whats is a TCP SYN flood?

A

Category: Network Attack

Type: common TCP denial of service

Info: A system must keep track of any remote system that starts a TCP three-way handshake. Attacker sends many SYNs but never ACKs. The victims half-open connection table will start to fill.

Result: If the attacker can exhaust that table then no new connections can be made.

38
Q

What is a LAND attack?

A

Category: Network Attack

Type: Single Packet DoS

Info: a single packet DoS attack involving the victim’s web service listening on Port 80. A packet is forged from the victim’s IP Address / Port 80 to the victim’s IP Address / Port 80.

Result: The victim’s computer sometimes get confused and crashes.

39
Q

What is a Fraggle Attack?

A

Category: Network Attack

Type: DoS

Info: Based on Smurf Attack using UDP echo packets in place of ICMP. Attacker forges UDP packets from the victim to the UNIX services Port 7 (echo, which “echos” characters back tot he sender) and Port 19 (which is Character Generator, which sends a stream of characters back to the sender).

Result: Victim is overwhelmed by characters.

40
Q

What is a Teardrop attack?

A

Category: Network Attack

Type: DoS

Info: Attack replies on fragmentation reassembly. The attacker sends multiple large overlapping IP fragments.

Result: System may crash as it attempts to reassemble the bogus fragments.

41
Q

What is an ARP scan attack?

A

Once an attacker is on the LAN, Layer 2 scans and attacks are possible.

ARP scan is a Layer 2 scan that sends ARP requests for each IP address on a subnet, learning the MAC address of each system.

42
Q

What is a TCP scan attack?

A

Sends a TCP SYV packet to ports on a host, reporting those that answer SNY/ACK.

A “connect scan” completes the three way handshake
A “half-open scan” does not complete the TCP handshake

half-open connections have advantages because they often are not logged.

Attackers can also craft packets with strange flag combinations (SYN/RST, all TCP flags set, no flags set, etc.). Attackers may be able to determine OS version by the way these packets are handled.

43
Q

What is a UDP scan attack?

A

Sends UDP packets to ports on a system and listens for answers.

UDP scans are harder and slower than TCP scans. Unlike TCp, there is no connection and no universal way for UDP service to respond to a UDP packet.

44
Q

What type of attack inserts tagging values into network and switch-based protocols with the goal of manipulating traffic at the Data Link Layer?

A

VLAN Hopping

Attacker can have a system act as though it is a switch. The system understands the tagging values being used in the network and trunking protocols, and can insert itself between other VLAN devices and gain access tot he traffic going back and forth.