Chapter 1.4 - Network Attacks Flashcards

Given a scenario, analyze potential indicators associated with network attacks

1
Q

Evil Twin

A

Access point that looks like an existing network
Wireless version of phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rogue Access Point

A

Unauthorized wireless access point
Not necessarily malicious
Potential backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing

A

Access a Bluetooth device and transfer data
Examples: contact list, calendar, emails, pictures, videos, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluejacking

A

Sending unsolicited messages to another device via Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disassociation

A

Cyberattack where a hacker forces a device to lose internet connectivity either temporarily or for an extended time
Wireless DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jamming

A

Prevent wireless communication by transmitting interfering wireless signals
DoS
Could be accidental: microwaves, lights, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Radio Frequency Identification (RFID)

A

Electromagnetic fields to automatically identify and track tags attached to objects
Examples: access badges, pet/ animal identification, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Near-field Communication (NFC)

A

Set of communication protocols that enables communication between two electronic devices over a short distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initialization Vector (IV)

A

A type of nonce
Used for randomizing an encryption scheme
Examples: encryption ciphers, WEP, SSL implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On-Path Network Attack (man-in-the-middle attack/ main-in-the-browser attack)

A

When an aggressor sits in the center between two stations and can catch, and sometimes, change that data that is being sent intelligently across the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Address Resolution Protocol (ARP) Poisoning

A

A form of spoofing attack that hackers use to intercept data
Used by attacker in an on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Media Access Control (MAC) Flooding

A

The flooding of MAC addresses in the MAC table forcing out the legitimate MAC addresses
Switch begins flooding traffic to all interfaces
Switch turns into a hub and all traffic is transmitted to all interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC Cloning

A

Attacker changes their MAC address to match the MAC address of an existing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Hijacking

A

Getting access to the domain registration letting you have control where the traffic goes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS Poisoning

A

When fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uniform Resource Locator (URL) Redirection

A

Vulnerability which allows an attacker to force users of your application to an untrusted external site
Click a link and get sent to a malicious site

17
Q

Domain Reputation

A

The health or condition of your branded domain
Example: email - might not be able to send or receive emails

18
Q

Domain Name System

A

The system by which internet domain names and addresses are tracked and regulated

19
Q

Distributed Denial-of-service (DDoS)

A

An army of computer to overload and bring down a service
Use all bandwidth or resources

20
Q

Application DoS

A

Making an application break or work harder
Examples: fill disk space, overuse of resources, increase response time

21
Q

Operational Technology (OT) DoS

A

Overload the hardware and software for industrial equipment
Examples: Power grids, traffic lights, etc.

22
Q

PowerShell (Malicious Code)

A

Attacks windows systems by accessing domains and files
.ps1 file extension

23
Q

Python (Malicious Code)

A

Attacks infrastructure (routers, switches, servers) and used for cloud orchestration
.py file extension

24
Q

Bash (Malicious Code)

A

Used in shell script to attack the Linux/ Unix environment (web, database, etc.)
.sh file extension

25
Q

Macros (Malicious Code)

A

Use to automate functions and make application easier to use
Attackers create automated exploits by the user opening the file and have the macro run

26
Q

Visual Basic for Applications (VBA) (Malicious Code)

A

Automates processes within Windows applications
CVE-2010-0815 / MS10-031 - Allows arbitrary code embedded in a document to run

27
Q

On-Path Browser Attack

A

An aggressor is on the same computer as the victim using malware that takes information from victim

28
Q

Denial of Service

A

Overload a service and force it to fail