Chapter 14 Flashcards
What does a Denial of Service Attack Do?
Prevents the user from accessing the network or its resources. p. 474
Name some Denial of Service Attacks.
The ping of death, unreachable gateway, Distributed DOS, Friendly DOS, physical attack, Permanent DOS, Smurf, SYN Flood, Stacheldraht, Reflective/Amplified attacks, ARP Cache Poisoning, Packet protocol abuse, p. 474-480
Describe the Ping of Death.
A lot of ICMP packets are sent to a remote host victim. This overwhelms their victims buffer p. 474
Why would an attacker make a host’s default gateway unreachable?
To get the host to change their gateway address to an address controlled by the attacker. p. 474
Define Botnet.
In a distributed DoS a group of people combine efforts to accomplish an attack. p. 475
true or false: A Phlashing Denial of Service attacks the firmware located in many systems.
True
What is a smurf?
Its an attack that floods its victim with spoofed broadcasts ping messages. p.477
Describe what happens during an SYN Flood.
A DOS attack that floods the receiving machine with lots of packets that cuase the victim to waste resources by holding connections open. p. 478
What does Stacheldraht mean?
its “barbed wire” in german. it incorporates TFN and adds encryption. p. 478
what protocols does a Reflective/Amplified Attack use to attack a victim?
DNS and NTP. p. 478
How does a DNS amplification attack work?
The attacker delivers traffic to the victim by reflecting it off a third party. p. 479
How is an NTP attack differ from a DNS attack?
Instead of the attacks being reflected from DNS servers they are reflected from NTP servers. p. 479
How is ARP cache poisoning accomplished?
By pinging a device with a spoofed IP address. p. 480
How is Packet/Protocol Abuse accomplished?
By concealing one protocol within another. It allows it to get passed a firewall. p. 480
Define Spoofing.
Changing a source IP address so that one computer appears to be a different computer. p. 481