Chap3-1 Flashcards

1
Q

Physical Layer attacks- Cut cable & barrier to radio waves It is called ……….. and it affects ……………

A

It is called disconnection

It affects Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Layer attack- Tapping on wire/cable It is called ………… and it affects ………

A

It is called Eavesdropping,

It affects Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical Layer attack - Interference and Jamming like …….. it affects ………….

A

Provide 120 v ac in a cable to cause damage

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Layer attack - Interception like ……….. it affects ……………….

A

Splice a cable with attacker in between, Can change messages

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How we can Attack CSMA/Cd and what it will result in nd what it affects

A

Keep transmitting Brute force;
Denial of service
Affects Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAM Table

A

Content addressable Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CAM table stores information such …………..

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All CAM tables have fixed size

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC Flooding Attack

A

MACOF tool keep sending random source MAC and IP address, this will lead to flooding the CAM table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Macof is a tool that can flood a switch with a lot of mac addresses

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Countermeasures for MAC Flooding

Attack

A
1-) Port Security, Allows you to specify MAC addresses for each port , upoon detection of invalid MAC block it
2-) SMART CAM table
Active hosts never get overwritten
Time our inactive entries
3-) Speak first
Require host to send traffic first
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC address spoofing

A

Tools to change MAC address like SMAC on windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DHCP

A

Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DHCP Function

A

Dynamically assigns IP addresses and configuration information on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DHCP attack (tool is called DHCPx / Gobbler)

A

Tool looks at entire DHCP and tries to lease all DHCP addresses

It is called Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Countermeasures for DHCP attack

A

Restrict number of MAC addresses on a port

Will not able to lease more IP addresses than MAC addresses

17
Q

What can attacker do if he is the DHCP server

A

He can send wrong configuration like himself as default gateway

18
Q

DHCP snooping

A

It is like a firewall between untrusted hosts and trusted DHCP servers

19
Q

e

A

e

20
Q

DHCP Man-in-the-Middle Attack

A

Spoofing MAC addresses where attacker can obtain all MAC

Block other machines from gettting on Network

Set up a fake DHCP server and set default gateway to attacker IP

21
Q

Countermeasures for DHCP MIM

A

Authentication of the remote system

22
Q

ARP - Address Resolution Protocol

A

Map IP address to MAC address

23
Q

ARP- Attacks

ARP cache poisoning

A

Replace entries with your own entries which will lead to session hijacking, man in the middle attacks, Denial of sercvice

24
Q

ARP attack tool example is ettercap

A

TRUE

24
Q

ARP attack tool example is ettercap

A

TRUE

25
Q

Solution to ARP poisoning attack

A

Smart switches that keep track of MACs

26
Q

ARP attack clean up

A

Attacker corrects ARP tables entries & traffic flows return to normal

27
Q

Countermeasures to ARP attacks

A

Dynamic ARP Inspection, if there is non matching then it is an attacker and it will get blocked

28
Q

ARP: Man-in-the-middle Attack

A

Some servers use IP addresses for authentication. This is the case for many application like Apache, attacker let the server believe the evil host (E) has the
legitimate IP, he will take the traffic and forwarded to the trusted host

29
Q

Man-in-the-middle Attack difficulties

A

evil host E, trusted host T, and server S.

T might broadcast new ARPs, which can
correct S’s ARP cache. S then sends TCP replies to T,
who will send back TCP reset to S (because such TCP
connection does not exist between S and T). This will
end the evil host’s connection with S.
 Solution for proper attack:
 Shutdown T (denial of service)
 Flood S with forged ARP message
 Prevent T from sending ARP broadcast: how? give T everything
before it needs them

30
Q

ARP Cache Poisoning Protection

A

 Use intrusion detection tools: detect fake ARP
messages and maintain consistency of the ARP table
Use strong authentication rather than source IP
address. VPN protocols like SSH