Chapter 1.4 - Network Attacks Flashcards
Given a scenario, analyze potential indicators associated with network attacks
Evil Twin
Access point that looks like an existing network
Wireless version of phishing
Rogue Access Point
Unauthorized wireless access point
Not necessarily malicious
Potential backdoor
Bluesnarfing
Access a Bluetooth device and transfer data
Examples: contact list, calendar, emails, pictures, videos, etc.
Bluejacking
Sending unsolicited messages to another device via Bluetooth
Disassociation
Cyberattack where a hacker forces a device to lose internet connectivity either temporarily or for an extended time
Wireless DoS attack
Jamming
Prevent wireless communication by transmitting interfering wireless signals
DoS
Could be accidental: microwaves, lights, etc.
Radio Frequency Identification (RFID)
Electromagnetic fields to automatically identify and track tags attached to objects
Examples: access badges, pet/ animal identification, etc.
Near-field Communication (NFC)
Set of communication protocols that enables communication between two electronic devices over a short distance
Initialization Vector (IV)
A type of nonce
Used for randomizing an encryption scheme
Examples: encryption ciphers, WEP, SSL implementations
On-Path Network Attack (man-in-the-middle attack/ main-in-the-browser attack)
When an aggressor sits in the center between two stations and can catch, and sometimes, change that data that is being sent intelligently across the organization
Address Resolution Protocol (ARP) Poisoning
A form of spoofing attack that hackers use to intercept data
Used by attacker in an on-path attack
Media Access Control (MAC) Flooding
The flooding of MAC addresses in the MAC table forcing out the legitimate MAC addresses
Switch begins flooding traffic to all interfaces
Switch turns into a hub and all traffic is transmitted to all interfaces
MAC Cloning
Attacker changes their MAC address to match the MAC address of an existing device
Domain Hijacking
Getting access to the domain registration letting you have control where the traffic goes
DNS Poisoning
When fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website
Uniform Resource Locator (URL) Redirection
Vulnerability which allows an attacker to force users of your application to an untrusted external site
Click a link and get sent to a malicious site
Domain Reputation
The health or condition of your branded domain
Example: email - might not be able to send or receive emails
Domain Name System
The system by which internet domain names and addresses are tracked and regulated
Distributed Denial-of-service (DDoS)
An army of computer to overload and bring down a service
Use all bandwidth or resources
Application DoS
Making an application break or work harder
Examples: fill disk space, overuse of resources, increase response time
Operational Technology (OT) DoS
Overload the hardware and software for industrial equipment
Examples: Power grids, traffic lights, etc.
PowerShell (Malicious Code)
Attacks windows systems by accessing domains and files
.ps1 file extension
Python (Malicious Code)
Attacks infrastructure (routers, switches, servers) and used for cloud orchestration
.py file extension
Bash (Malicious Code)
Used in shell script to attack the Linux/ Unix environment (web, database, etc.)
.sh file extension