Chapter 11: DoS Flashcards

1
Q

DoS goal

A

To remove the A from the Confidentiality, Integrity, & Availability triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Buffer Overflow

A

takes adv. of a flaw in a program’s coding by inputting more data than the program’s buffer, or memory space, has room for; once the buffer of a program is an overflow state, it can crash, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

C functions & signs of buffer overflow

A

Some C functions do not perform bounds checking, making it vulnerable to buffer overflow

gets(), scanf(), strcpy(), strcat() are common functions for buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stack pointer represents

A

the top of a stack; in a buffer overflow, the stack pointer is ignored an data is stacked over top of it creating False EIPs (Extended instruction pointer/point of execution) and False Stack pointers

When smashing the stack, the EIP points to injected malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NOP sled

A

shellcode (or machine code) used in buffer overflow attack; uses multiple “NO OPERATION” commands in a sequenced chunk; 0x90 will instruct an Intel processor to perform one clock cycle on empty process

Equates to a full CPU cycle w/ no acutal work being accomplished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Load Balancing

A

distributing workloads across multiple computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Buffer Overflow vs. Stack Overflow

A

Stack overflow is when the execution stack grows beyond the memory reserved whereas Buffer Overflow is any case in which a program writes beyond the end of the memory allocated (INCLUDING in the heap, not just the stack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SERVICE REQUEST FLOODS (DoS Attack)

A

1) SERVICE REQUEST FLOODS - flooding web server or web app w/ requests until all resources are used up; These are typically carried out by setting up repeated TCP connection to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SYN ATTACK/FLOOD (DoS Attack)

A

2) SYN ATTACK/FLOOD - This exploits the 3-way handshake; Done by forging SYN packets w/ a bogus source address. When victim system responds w/ a SYN-ACK, it goes to this bogus address, & since the address doesn’t exist, it causes the victim system to wait for a response that will never come; This ties up a connection up for 75 seconds, attacker can keep opening half open connections to keep systems out of service //THE ACK RESPONSE IS MISSING; Syn is sent, syn-ack replied;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICMP FLOOD ATTACK (DoS Attack)

A

3) ICMP FLOOD ATTACK - an ICMP request requires the server to process the request & respond; Attacks include smurf attacks, ICMP floods, ping floods, all of which flood the server w/ ICMP requetss w/ out waiting for the response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PING OF DEATH (DoS Attack)

A

4) PING OF DEATH - used back in the day; a ping packet that was larger than the allowable 64K was sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TEARDROP (DoS Attack)

A

5) TEARDROP - sending custom-crafted fragmented packets w/ offset values that overlap during the attempted rebuild making the target machine unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMURF (DoS Attack)

A

6) SMURF - spoofs the target IP & sends numerous ICMP echo requests to the broadcast address of intermediary sites; The intermediary sites amplify the ICMP traffic back to the source IP, saturating the NW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FRAGGLE (DoS Attack)

A

7) FRAGGLE - like SMURF attack but uses UDP instead of ICMP. Still uses an intermediary for amplification & spoofs target IP; The attack targets the UDP echo requests to the CHARGEN (character generator) port of the intermediary systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LAND (DoS Attack)

A

8) LAND - sends traffic to the target machine w/ the source spoofed as the target machine itself; The victim attempts to acknowledge the requests repeatedly w/ no end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PHLASHING (DoS Attack)

A

9) PHLASHING pushes bogus/incorrect updates to a system’s firmware, this system is said to be BRICKED, aka worthless computer

17
Q

HEAP

A

HEAP //dynamic storage location that does not have sequential constraints or organizational scheme; considered the larger pool of free storage for programs to use as needed; once dynamic memory space is no longer needed, it is freed

18
Q

STACK

A

STACK // linear in operation (top, bottom, LIFO); smaller pool of storage; memory allocated to a program for short-term processing, main action area where program variables are temporarily stored, added, & removed as needed; Can only see values from top down; LIFO; PUSH describes adding to a stack, POP is removing

19
Q

RFC 3704 FILTERING

A

1) RFC 3704 FILTERING //designed to block or stop packets from addresses that are unused or reserved in any given IP range

20
Q

BLACK HOLE FILTERING

A

2) BLACK HOLE FILTERING //a black hole or area is created on the NW where offending traffic is fowarded or dropped

21
Q

SOURCE IP REPUTATION FILTERING

A

3) SOURCE IP REPUTATION FILTERING //filters traffic based on reputation (determined by past history of attacks & other factors)

22
Q

NOP in Hex

A

0x90

23
Q

INGRESS/EGRESS FILTERING

A

Ingress filtering prevents DoS and DDoS
attacks by filtering for items such as spoofed IP addresses coming in from an outside
source. In other words, if traffic coming in from the public side of your connection has a
source address matching your internal IP scheme, then you know it’s a spoofed address.
Egress filtering helps prevent DDoS attacks by filtering outbound traffic that may prevent
malicious traffic from getting back to the attacking party.

24
Q

REVERSE PROXY

A

Similar to Load Balancer, sits in front of web server and distributes requests. Also caches content