Chapter 3- Explaining Network Technologies and Tools Flashcards
Sniffing Attack
Attackers often use a protocol analyzer to captive data sent over a network. After capturing the data, attackers can easily read data within the protocol analyzer when it has been sent in clear text
Denial of Service
Attack is a service attack from a single source that attempts to disrupt the services provided by another system.
Distributed DOS
Attacks include multiple computers attacking a single target
Poisoning attack
Many protocols store data in cache for temporary access. Poisoning attacks attempt to corrupt the cache with different data
ARP Poisoning
Use ARP protocol to give clients false hardware address updates and attackers use it to redirect or interrupt network traffic.
SMTP
Simple Mail Transfer protocols transfer email between clients and SMTP servers
POP3 Post Office Protocol 3
A protocol used to transfer email from mail severs to clients
IMAP4 Internet Message Access Protocol
Used to store email on an email server
Kerberos
Kerberos is the authentication protocol used in Windows domains and some unix environments.
LDAP
The protocol used to communicate with directories such as ADDS
DNS poisoning
When successful, attackers modify the DNS cache with a bogus IP address
DNSSEC
A suite of extensions to DNS that provides validation for DNS responses