Attacks Flashcards

1
Q

Denial of Service Attack

A

In a DoS attack, a hacker overloads a specific server with so much data that the server is too busy to service valid requests coming from real clients on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(SYN) flood (DoS)

A

“SYN is an aspect of TCP/IP that allows systems to synchronize with each other while communicating. One system sends a SYN packet that is acknowledged by another system. The target system then waits for another acknowledgement from the sender. This process can be abused by a malicious hacker by sending forged SYN packets to a host that is unable to reply to the request because the return address is incorrect. This causes the host to halt communications while waiting for the other system to reply. overloaded and unable to respond to legitimate requests. If the host is flooded with a high number of forged SYN packets, it will be This process can be abused by a malicious hacker by sending forged SYN packets to a host that is unable to reply to the request because the return address is incorrect. This causes the host to halt communications while waiting for the other system to reply. overloaded and unable to respond to legitimate requests.
If the host is flooded with a high number of forged SYN packets, it will be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Back Door

A

“A back door is traditionally defined as a way for a software programmer to access a program while bypassing its authentication schemes.
In hacking terms, a back door is a program secretly installed on an unsuspecting user?s computer so the hacker can later access the user?s computer, bypassing any security authentication systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Back Door Mitigation

A

Anti-virus programs can detect the presence of back-door programs. Personal firewalls can also detect suspicious incoming and outgoing network traffic from a computer. Port-scanning software can also be used to identify any open ports on the system, including those you do not recognize. These open ports can be cross-referenced with lists of ports used by known back-door programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blue jacking

A

Blue jacking is the sending of unsolicited messages (think spam) over the Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluesnarfing

A

Bluesnarfing is the gaining of unauthorized access through a Bluetooth connection. This access can be gained through a phone, PDA, or any device using Bluetooth. Once access has been gained, the attacker can copy any data in the same way they would wi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cross-site scripting (XSS)

A

is a type of computer security vulnerability typically found in web applications which enable malicious attackers to inject client-side script into web pages viewed by other users. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Cross-site scripting carried out on websites were roughly 80% of all security vulnerabilities documented by Symantec as of 2007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data emanation

A

as unprotected and unsecured wireless communications can be easily intercepted and an unauthorized user can steal user names and passwords and sensitive private data. All information on an unsecured WLAN is transmitted in clear text, and any wireless user can use a protocol analyzer or sniffer application to view the data traversing the WLAN. All WLANs should communicate using secure encrypted channels to prevent eavesdropping from unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS Poisoning

A

“The DNS poisoning technique takes advantage of a DNS server?s tables of IP addresses and host names by replacing the IP address of a host with another IP address that resolves to an attacker?s system.
For example, a malicious user can masquerade her own web server by poisoning the DNS server into thinking that the host name of the legitimateweb server resolves to the IP address of the rogue web server. The attacker can then spread spyware, worms, and other types of malware to clients connecting to her web server. This type of attack has a great potential for damage, as several thousand clients can be using the DNS server or its cache of IP addresses and host names, and all of themwill be redirected to the poisoned address in the DNS cache tables.
The malicious attacker can perform this attack by exploiting vulnerabilities in a DNS server that does not perform authentication or any type of checks to ensure the DNS information is coming froman authentic source. This information can be passed fromone DNS server to another, almost like a worm, and the rogue address can be quickly spread.
DNS poisoning attacks can be mitigated by ensuring that your DNS sever updates its information only from authoritative sources by proper authentication or the use of secure communications.MostDNSsoftware has been updated to prevent these types of attacks, and typically only out-of-date DNS software is vulnerable to DNS poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS Poisoning Mitigation

A

DNS poisoning attacks can be mitigated by ensuring that your DNS server updates its information only from authoritative sources by proper authentication or the use of secure communications. Most DNS software has been updated to prevent these types of attacks, and typically only out-of-date DNS software is vulnerable to DNS poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domain Kiting

A

refers to the practice of registering a domain name, then deleting the registration after the five-day grace period, and then re-registering it to start another five-day grace period. This results in the domain being registered to the user without his having to pay for the registered domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dynamic NAT

A

Provides a pool of various external IP addresses that can be used when an internal client wants to access something externally. Dynamic NAT helps in environments that have only a limited amount of external addresses to use and not all of the clients are going to be active at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extranet

A

“An extranet is an extension of your private network or intranet.
An extranet extends outside the body of your local network to enable other companies or networks to share information. For example, an automobile manufacturing company could have an extranet that connects selected business partners, so they can access and share specific information on availability and inventories between the networks. These are often referred to as business-to-business (B2B) communications or networks because one company uses the internal resources and services of another.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC address-based VLAN

A

“Tracks clients and their respective VLAN memberships through the MAC address of their network card. The switches maintain a list of MAC addresses and VLAN membership, and they route the network packets to their destinations, as appropriate.
The advantage of MAC address-based VLANs is if their VLAN membership changes, they needn?t be physically moved to another port. One drawback of this method is that being part of multiple VLANs can cause confusion with the switch?s MAC address tables. This model is recommended for single VLAN memberships. “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Man-in-the-middle (MITM) bucket-brigade attack, or sometimes Janus attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Man-in-the-middle Mitigation

A

“To prevent man-in-the-middle attacks, a unique server host key can be used to prove its identity to a client as a known host. This has been implemented in newer versions of the SSH protocol, which was vulnerable to man-in-the-middle attacks in the past.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Access Control

A

“Network access control (NAC) lets your network devices allow or deny access to clients based on predefined access policies.
These policies set out rules for what clients can access the network and define a minimum set of parameters to which clients must adhere to ensure they are properly
configured. NAC policies help prevent viruses and worms that have infected a client on your network from infecting other systems by
denying the client access to the network based on its current status.”

18
Q

Network address translation (NAT)

A

is a service that allows private IP addresses on your internal network to be translated into routable addresses for communication on the Internet.

19
Q

NULL sessions

A

A null session is a session established with a server when no credentials are supplied.

20
Q

Null Sessions Mitigation

A
21
Q

Overloaded NAT

A

Shares one single external address for all internal clients by assigning an individual port socket address that is mapped to the one external address. This technique is also called port address translation (PAT) and is widely used in home-based network devices

22
Q

Port-based VLAN

A

“Uses the specific port of a network switch to configure VLANs, where each port is configured as part of a particular
VLAN. To assign a client workstation to that VLAN, it must be plugged into that port.

23
Q

Privilege escalation

A

“Privilege escalation refers to the practice of exploiting coding bugs that exist within software.

In certain situations, it can be possible for an unauthorized user to gain more privileged access to a network device by taking advantage of the bug exploit to bypass the device security and perform commands with higher privileged access than expected.”

24
Q

Protocol-based VLAN

A

The most flexible and logical type of VLAN uses the addresses of the IP layer to assign VLAN settings, so an entire IP subnet can be assigned a certain VLAN membership.

25
Q

Replay

A
26
Q

Replay Mitigation

A

“To prevent replay attacks from succeeding, timestamps or sequence numbers can be implemented.
This allows the authentication system to accept only network packets that contain the appropriate stamp or sequence number.
If the timestamp is beyond a certain threshold, the packet is discarded.”

27
Q

Rogue access points

A

With wireless networks, much of the typical physical security that prevents someone fromplugging into a network is unavailable.Anyone within the vicinity of a WLAN can connect to it easily with the use of a laptop or other wireless-equipped device. Unauthorized users can also set up their own wireless access points to which unsuspecting users connect and transmit sensitive and private data, including user name and password credentials, directly on the hacker?s network.

28
Q

Smurf Attack

A

A smurf attack uses a spoof attack combined with a DDoS attack to exploit the use of IP broadcast addressing and ICMP A hacker uses a smurf utility to build a network packet with a spoofed IP address that contains an ICMP ping message addressed to an IP broadcast address broadcast address includes all nodes of a certain network, and messages to that address will be seen by all of them. The ping echo responses are sent back to the target address. The amount of pings and echo responses can flood the network with raffic, causing systems on the network to be unresponsive

29
Q

Smurf Attack Mitigation

A

To prevent smurf attacks, IP broadcast addressing should be disabled on the network router, because this broadcast addressing is used only rarely.

30
Q

Spoofing

A
31
Q

Spoofing Mitigation

A
32
Q

SSID broadcast

A

Broadcasting your SSID

33
Q

TCP/IP Hijacking

A

An unauthorized user can effectively hijack a network connection of another user. For example, by monitoring a network transmission, an attacker can analyze the source and destination IP addresses of the two computers. Once the attacker knows the IP address of one of the participants, she can knock them off their connections using a DoS or other type of attack, and then resume communications by spoofing the IP address of the disconnected user. The other user is tricked into thinking he is still communicating with the original sender.

34
Q

TCP/IP Hijacking Mitigation

A
35
Q

The firewall device

A

“is used to regulate network traffic and prevent access to the private network from a public network such as the Internet.
The firewall uses a special set of rules to permit or deny network access, as appropriate, such as allowing only FTP traffic to a specific server. “

36
Q

Virtual LAN

A

A VLAN is a type of logical network that exists as a subset of a larger physical network. Smaller networks can be fairly easily divided into segments, with little administrative overhead. Splitting a network into segments allows network data and broadcast traffic to stay on the local segment,without broadcasting data to the entire network. Segmentation of LANs also provides extra security, because a user on one LAN will not have access to another LAN without special permission.

37
Q

War driving

A

Hackers have been known to roam neighborhoods with a large corporate presence, using simple laptops with wireless connectivity to connect to unprotected WLANs and access their resources.

38
Q

Weak passwords

A

Select a password that is at minimum eight characters in length, that includes both uppercase and lowercase characters, numbers, and special characters such as the # symbol.

39
Q

XSS Mitigations

A

Their impact may range from a petty nuisance to a significant security risk, depending on the sensitivity of the data handled by the vulnerable site, and the nature of migitgations any security mitigations are implemented by the site’s owner.

40
Q

Static NAT

A

Provides a one-to-one address mapping in which one internal address is mapped to one public external address

41
Q

Dynamic NAT

A

Provides a pool of various external IP addresses that can be used when an internal client wants to access something externally. Dynamic NAT helps in environments that have only a limited amount of external addresses to use and not all of the clients are going to be active at the same time

42
Q

Overloaded NAT

A

Shares one single external address for all internal clients by assigning an individual port socket address that is mapped to the one external address. This technique is also called port address translation (PAT) and is widely used in home-based network devices