ch 5 Flashcards
Three most common attacks are
Man in the middle
Man in the browser
Replay attacks what are these classified as?
Interception attacks
Two computers are sending and receiving data with a computer between them.
(MITM) Man in the middle
Occurs between a browser and the underlying computer.
Usually begins with a Trojan infecting the computer and installing an “extension” into the browser configuration.
(MITB) man in the browser
attacker makes a copy of transmission before sending it to the original recipient.
Preventing replay attacks, both sides can communicate and negotiate a random key. Use timestamps in all messages and reject all message that fall outside of the time.
Replay
The act of introducing a substance that harms or destroys.
Three types of attacks that inject “poisoning”
Poisoning
Address resolution protocol, if the IP address for a device is known but the MAC address is not, the sending computer sends the ARP packet to determine the MAC address.
Relies upon Mac Spoofing
ARP Poisoning
Domain name system is the current basis for name resolution to the IP address.
Two locations for DNS poisoning / Local host table / external DNS server.
DNS poisoning
exploiting a software vulnerability to gain access to resources that the user normally would be restricted from accessing.
Privilege Escalation
when a lower privilege user access functions restricted to higher privilege users.
Vertical privilege escalation-
User restricted privilege access different restricted functions of a similar user.
Horizontal privilege escalation
Compromised server can provide threat actor’s with its privileged contents to provide an opening for attacking any of the devices that access that server.
Server attacks
deliberate attempt to prevent authorized users from accessing a system by overwhelming it with requests.
(DoS) Denial of Service
Using hundreds of thousands of devices flooding the server with requests.
(DDoS) distributed Denial of Service
attack broadcasts a network request to all the computers on the network but changes the address from which the request come from IP Spoofing.
Smurf attack
– floods victims by redirecting valid responses to it.
DNS amplified attack
Takes advantage of procedures for initiating a session.
SYN flood attack
– an attack that exploits previously unknown vulnerabilities, victims have not time to prepare for or defend against the attack.
Zero Day attack