Chapter 4 Network Attack Indicators Flashcards
1
Q
Wireless
A
- A target for hackers.
- A common networking technology that has a substantial number of standards and processes to connect users to networks via radio signals.
2
Q
Evil Twin
A
- An attack against the wireless protocol via substitute hardware.
- Uses an access point owned by an attacker that usually has been enhanced with higher-power and higher-gain antennas.
3
Q
Rouge Access Point
A
- An attacker can attempt to get clients to connect to it as if it were authorized and then simply authenticate to the real access point.
4
Q
Bluesnarfing
A
- The attacker copies off the victim’s information, and other pertinent information on the person’s device.
5
Q
Bluejacking
A
- Sending of unauthorized messages to another Bluetooth device.
6
Q
Disassociation
A
- Attacks against a wireless system are attacks designed to disassociate a host from the wireless access point and from the wireless network.
7
Q
Jamming
A
- A form of denial of service that specifically targets the radio spectrum aspect of wireless.
8
Q
Radio Frequency Identification (RFID)
A
- RFID tags come in several different forms and can be classified as either active or passive.
9
Q
Initialization Vector (IV)
A
- Used in wireless systems as the randomization element at the beginning of a connection.
- Attacks against it are aimed at determining the IV
9
Q
Near Field Communication (NFC)
A
- Enables smartphones and other devices to establish radio communication over a short distance.
10
Q
Media Access Control (MAC) Flooding
A
- An attacker floods the table with addresses, making the switch unable to find the correct address for a packet.
11
Q
MAC Cloning
A
- The act of changing a MAC address to bypass security checks based on the MAC address.
12
Q
Domain Name System (DNS)
A
- The phone book for addressing
- Provides the correct address to get the pack destination.
- Can control where all the packets go.
13
Q
DNS Poisoning
A
- When changes to the network occur resulting in different DNS lookups.
13
Q
Domain Hijacking
A
- The act of changing the registration of a domain name without permission of its original registration.
14
Q
nslookup
A
- ## This command shows a series of DNS queries executed on a Windows machine.
15
Q
Universal Resource Locator (URL) Redirection
A
- Man in the Middle attack where all your traffic is being read and redirected.
16
Q
Domain Reputation
A
- If you do not protect your address, an attacker make associate your IP address with spam, botnets, or other bad behaviors, then the reputation of the IP address will suffer.
17
Q
Denial-of-Service (DoS) Attack
A
- The attacker attempts to deny authorized users access to specific information or to the computer system or network itself.
18
Q
Distributed Denial-of-Service (DDoS) Attack
A
- Sending so many requests that the machine is overwhelmed.
19
Q
How is a NETWORK used in a DDoS attack
A
- A network of attack agents (Zombies) is created by the attacker, and upon receiving the attack command from the attacker.
20
Q
How can applications be compromised by a DDoS attack?
A
- The objective of an application level DDoS attack is to consume all resources or to put the system into a failed state.
21
Q
Operational Technology (OT)
A
- The name given to networks of industrial devices in cyber-physical systems.
- Usually computers control physical processes.
22
Q
PowerShell
A
- A built-in command-line tool suite that has a rich set of Microsoft Windows commands.
- Completely integrated with the Windows Environment.
- Used
23
Q
Python
A
- An effective scripting tool used for good at automating tasks and data analysis.
24
Q
Bash, Bourne Again Shell
A
- An interpreter that processes shell commands on Linux system.
- Takes commands in plaintext format and calls OS services to perform the specified tasks.
25
Q
Macros
A
- Recorded sets of instructions, typically presented to an application to automate their function.
- Comes the risk in the form of unwanted macros calling the system and performing system activities.
26
Q
Visual Basic for Applications (VBA)
A
- An older technology from Microsoft that was used to automate many internal processes in applications.
- Even though this is an outdated tool, still can be used as a vector for attackers.