Chapter 33 - Security Architectures Flashcards
Define Vulnerability
Anything that can be considered a weakness that can compromise the security of a network.
Define Exploit
Anything that can be used to take advantage of a known Vulnerability
Define Threat
Occurs when someone intends to exploit a vulnerability for malicious intent
Define Mitigation Technique
Something used to prevent or counteract threats
What is a Spoofing Attack?
- An attack in which someone replaces the source IP address/MAC address of a Packet/Frame with a fake one.
What is a DOS attack?
- Denial of Service
- When an attacker is able to deplete a system of resources so much so that it is unable to provide services to legitimate users and potentially crashes.
- Can be a flood of UDP packets, TCP connections, or ICMP echo requests
What is the difference between DOS and DDoS?
- A DoS attack generally only comes from a single device
- A DDoS (Distributed Denial of Service) attack will be Distributed to come from many devices that are all controlled by a central device. Known as a botnet.
What different forms of attacks can be caused by address spoofing?
- DOS attacks
- Reflection attacks
- Amplification attacks
- Man-In-The-Middle attacks
What is an example of a DOS attack?
- The attacker can send TCP SYN segments from a fake address to a server that will respond with a SYN-ACK.
- The connection will not be completed as the fake address will not receive the reply.
- The server will then keep the connection in its connection table until it times out but in the meantime many more of these connections can be started, causing the server’s connection table to become congested.
- (Other examples could be filling up a DHCP server’s leases with fake MACs to prevent legitimate users from getting addresses or giving an ARP table false information)
What is a Reflection attack?
- The attacker will send traffic from the spoofed address of a live host to a server of some sort (the reflector)
- The reflector will send the response back to the victim instead of the attacker. If there are multiple reflectors involved then this can cause more issues.
What is an Amplification attack?
- An attacker uses a protocol/service to amplify the traffic that it is already sending via reflection to a victim to overwhelm it.
- NTP and DNS can be utilised for amplification attacks.
What is a Man-In-The-Middle attack?
- A form of attack in which an attacker places themself between the source and destination of traffic and can eavesdrop on and manipulate data in transit. One form of this uses ARP spoofing.
- In order to begin this type of Man-In-The-Middle attack, the attacker will listen for ARP requests being broadcast throughout the network.
- Once it receives a broadcast, it waits a short time (so that if the real host responds, its ARP record in all other hosts’ ARP tables will be overwritten) before it replies with a spoofed IP address (the one in the request) and its own MAC address.
- Traffic intended for the legitimate host will then be forwarded to the false host.
What is a Reconnaissance Attack?
- Used to learn more information about a system prior to an attack in order to potentially do more damage.
What are some of the tools that can be used for Reconnaissance attacks?
- nslookup - Used to find the address space of a company using an FQDN owned by that company
- whois/dig - Used to find extra DNS information about domain owners, contact information, mail servers, authoritative name servers, etc.
- Ping Sweeps - Used to ping all addresses in a targeted range to find out which hosts respond
- Port Scanning - Used to sweep a range of UDP and TCP ports to see if a host answers
What are Buffer Overflow attacks?
- When an attacker purposefully sends data that is too large for the receiver’s buffer size and, if there is such a vulnerability, can cause data to overflow into other areas of memory. This can cause the system to run slow and potentially crash.
- Malicious code could also be stored inside this overflowed area and the receiver could accidentally run it.