Chapter 4 Network Attack Indicators Flashcards
What is an Evil Twin Attack?
An attack against the wireless protocol via substitute hardware. The attack uses an access point owned by an attacker that usually has been enhanced with high-power and higher-gain antennas to look like a better connection to the users and compuuters attaching to it.
What is a Rouge Access Point?
An Access Point that is usually placed on an internal network either by accident or for nefarious reasons.
What is Bluesnarfing?
Copying off the victims info such as e-mails, contact lists, calendars, and anything else that exists on that device
What is Bluejacking?
Sending unauthorized messages to another Bluetooth device
What is Disassociation Attacks?
Attacks against a wireless system designed to disassociate a host from the wireless access point and from the wireless network
What is Jamming?
A form of denial of service that specifically targets the radio spectrum aspect of wireless
What is Radio Frequency Identification (RFID) tags
Tags used to identify someone via radio frequency
What is Near Field Communications (NFC)?
A set of wireless tech that enable smartphones and other devices to establish radio communication over a short distance around 10 cm
What is a Initialization Vector (IV)?
Used in wireless systems as the randomization element at the beginning of a connection
What is the Man in the browser (MITB) attack?
A varient of a man in the middle attack, The first element is a malware attack that places a trojan element that can act as a proxy on the target machine. When a user enters info like entering a financial transaction, the malware takes that information after input and then changes it to performs another transaction
What is Address Resolution Protocol (ARP) Poisoning?
When an attacker sends messages, corrupts the ARP table, and causes packets to be misrouted
What is MAC flooding?
An attack where an attacker floods the table with addresses, making the switch unable to find the correct address for a packet
What is MAC cloning?
The act of changing a MAC address to bypass security checks based on the MAC address
What is Domain Hijacking?
The act of changing the registration of a domain name without the permission of its original registrant
What is DNS poisoning?
An attacker changes a DNS record through any of a multitude of means
What is a Universal Resource Locator (URL) Redirection?
a vulnerability which allows an attacker to force users of your application to an untrusted external site.
What is a Distributed Denial-of-service (DDoS) attack?
An attacker attempts to deny authorized users access either to specific information or to the computer system or network itself
What is a SYN flood attack?
The attacker sends fake communication requests to the targeted system. Which will be answered by the target system, then waits for the third part of the handshake which never come. With enough of them it can crash the system
What are Operational Technology (OT)?
Networks of industrial devices in cyber physical systems, These devices control physical processes like traffic lights, to refineries, and manufacturing plants
What is powershell?
A built-in command line tool suite that has a set of Windows commands
What are Macros?
Recorded sets of instructions, typically presented to an application to automate their function
Visual Basic for Applications (VBA) is a type of what?
Macro