Chapter 14 - Supplement - Sheet1 Flashcards
DoS
Denial of Service attack. Prevents access to network resources.
Varieties of DoS
Ping of Death, Smurf, SYN Flood, Tribe Flood Network, Tribe Flood Network 2000, Stacheldragt
Ping of Death
Type of DoS. One Ping request sends a huge amount of data instead of the small payload PING normally carries. Most modern OSes prevent this from working.
Smurf
Type of DoS. Attacker spoofs the source IP of a PING request. Sends PING request to all broadcast addresses. Router forwards reuqests to all hosts on the subnet. Response pings are sent back to victim.
SYN Flood
Type of DoS. Sending a TCP/IP packet with SYN flag set to 1 causes server to open a connection and respond with SYN/ACK, waiting for an ACK. Attacker doesn’t send ACK, forcing the server to keep the connection open, using a portion of memory. Server isn’t able to respond to legitimate requests.
Tribe Flood Network
Type of DoS. TFN. DDoS (Distributed Denial of Service) attack.
Tribe Flood Network 2000
Type of DoS. TFN2K. DDoS (Distributed Denial of Service) attack.
Stacheldraght
Type of DoS. Means barbed wire in German. Mix of techniques involving TFN and encryption.
Types of Viruses
Macro Virus, Boot-Sector Virus, Multipartite Viruses File Viruses
File Virus
Replaces some of all of a target program’s code with their own. The compromised file, when executed, does the damage.
Macro Virus
Script of commands written in software that supports macros (EG MS Office). Annoying but harmless.
Boot-Sector Virus
Infect the hard drive’s boot sector, pointing the PC in the wrong direction or removing reference to the OS.
Multipartite Virus
Affects the boot sector and the hard drive’s files at once.
Worms
Like viruses, but can replicate without users opening an infected file
Buffer Overflow
Injecing so much data into the forms of an application that the host crashes
War Driving
Driving around using high powered anttenaes to try to break into wireless networks.
War Chalking
The collection of information regarding wireless networks either in chalk on the sitewalk or online
3 ways to detect and defend against an intruder
Active Detection, Passive Detection, Proactive Defense Methods
Active Detection
Actively deteting common hacking methods, scanning for suspicious activity, etc
Passive Detection
Logging activity to be later reviewed if a threat is identified by another detection technique
Proactive Defense Methods
Proactively searching for holes in your own security
The Ping of Death and SYN floods are examples of what types of attack?
DoS
How often should you update your virus definitions in your antivirus software?
Once a week
What type of attack injects a command that overflows the amount of memory allocated
and executes commands that would not normally be allowed?
Buffer Overflow
What type of virus attacks executable programs?
A File Virus
What kind of tool could a hacker use to intercept traffic on your network?
Packet Sniffer
What type of virus uses Microsoft’s Visual Basic scripting language?
A Macro Virus
What is it called when someone intercepts traffic on your network that’s intended for a
different destination computer?
Man-in-the-middle attack
If someone installed a wireless router on your network without your knowledge, that
would be called ___________________.
A rogue access point
What software application can help automatically ensure that your Windows-based
computers have the most current security patches?
Windows Update
The two different types of virus scans are ___________________.
On-demand and on-access virus scans