Chapter 5 - Attacks Flashcards

1
Q

What is the difference between a Hacker and a Cracker?

A

Hackers have the knowledge to break into systems without malicious intent.

A Cracker breaks into machines with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are typical examples of basic counter measures against hackers?

A

Patching Systems

System Hardening
- The practice where unused/unnecessary ports and services are removed/disabled.

System Isolation
- Air gapping systems if necessary

Cyber Awareness for employees

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a SYN Floor DDos attack?

A

When the client withholds the 3rd Ack packet to complete the TCP handshake.

Instead of the final Ack being sent, the client sends another SYN request to the server.

The server maintains half-sessions consuming network and hardware resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a PING of Death DDoS attack?

A

A typical ping request is 32 bytes in size, attackers can change this to 64kb in size which consumes hardware and network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a LAND DDoS attack?

A

A Local Area Network Denial (LAND) attack tricks a system into sending packets to itself in an endless loop - this can crash an entire system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two different wireshark modes?

A

Promiscuous Mode:
- The system captures all data it receives, even data not meant for that system.

Non-Promiscuous Mode:
- The system only captures data directed at the system’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two different types of network scans?

A

ARP Scans:
- ARP messages to identify live hosts within a network
- ARP responses includes MAC addresses
- ARP scans does not traverse routers and thus only effective in a single network/subnet

SYN Scans:
- SYN packets are sent to try and establish connections.
- Live hosts responds with a SYN/ACK message
- Client sends a RST message to reset the connection
- Attacker now know that is a live host open for a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does operating system scans identify the OS type and version?

A

Data packet fields for:

Time to Live (TTL) and TCP Window size are fields that can determine OS version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Salami Attack?

A

A Salami Attack is an attack vector where small/minor actions are conducted such as stealing 0.01% per transaction but over time, this will have a large impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Man in the Middle Attack?

A

A Man in the Middle Attack is a form of eavesdropping attack.

The attack sits in between two communicating users and has access to the stream of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Replay Attack?

A

A Replay Attack is when captured data packets via a sniffer is used later to impersonate a user and their subsequent system access.

This is prevented by Kerberos and CHAPS that use time-stamps and number used only once (nonce)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Session Hijack Attack?

A

A session hijack is when a threat actor captures session information and takes over the session by impersonating one of the parties involved in the connection through the use of cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DNS Cache Poisoning?

A

A DNS Cache Poisoning attack is when users are redirected away from legitimate sites and towards malicious hosts.

The DNS server’s own cache, not just the client side cache.

A DNS server’s cache is used when a DNS server queries another DNS server.

DNSSEC protects from this type of attack as each DNS response to the client is accompanied with a RRSIG which validates the record is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Smurf and Fraggle attack?

A

A Smurf and Fraggle attack is a form of DOS attack.

The attack broadcasts ICMP ping packets to multiple endpoint in a network but spoofs the originating IP address as the target IP address.

Hosts that responds to the ping packet then responds to the target host flooding it with network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Buffer Overflow Attacks?

A

Buffer Overflow Attacks is when an application processes more data than its allocated space in memory.

Attackers insert a large number of No Operation Commands (NOOP) with the intent to break out of an application’s allocated memory space.

Once out of the allocated memory space then attackers can write malicious code in free memory - out of the applications’ allocated memory space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are SQL injections attacks?

A

SQL injection attacks can grant attackers access to unauthorized database data or authenticate without the need of credentials.

Two SQL syntaxes are common in making these attack types possible:

semi-colon (;) indicates the end of a SQL statement

two hyphens (–) indicates to ignore the follow statement

Preventing SQL injection attacks require proper input validation and the use of SQL stored procedures.

SQL stored procedures ensures SQL commands are executed server side - not client side.

This prevent direct user interaction with SQL queries.

17
Q

What are Cross Site Scripting Attacks?

A

A XSS attack is when attackers inject malicious code into a webpage and directs the target to open/interact with the webpage.

Host website is typically legitimate site that has been compromised to host malicious code.

18
Q

What are Cross Site Request Forgery (CSRF) attacks?

A

A Cross site request forgery attack is when attackers craft a weblink whereby commands are present in the weblink themselves such as password change commands.

Since the user is authenticated via historical cookies, CSRF commands would be an authenticated command.

Asking the user to reauthenticate themselves prior to making actionable changes will prevent such CSRF attacks.

19
Q

What are the three main social engineering factors in phishing attacks?

A

Impersonation

Identification of a problem

Dire consequences

20
Q

What is a spearphish?

A

A spearphish is a directed, highly targeted phishing attack directly at a limited/group of individuals.

21
Q

What is vishing?

A

Phishing but uses telephony system.

22
Q

What is smishing?

A

Phishing but uses text messages/SMS

23
Q

What is a typical WPA2 countermeasure against wireless attacks?

A

WPA2 uses a 802.1x authentication server running a RADIUS service.

This 802.1x server requires all users to pass through authentication before being allowed into the network.

24
Q

How does WPA3 improve over WPA2?

A

WPA3 protects from brute-force attacks and uses a 192-bit cryptography rather than 128-bit used in WPA2.

25
Q

What does Wireless Intrusion Detection/Prevention Systems monitor (WIDPS)?

A

WIDPS monitor:

Rouge Access Points: where an access point is connected physically to a network and an attacker then connects wirelessly.

Evil Twin Access Point: When an attacker names an AP as something legitimate to try and direct users to connect to the Access Point.

26
Q

What are Wi-Fi protected setup attacks (WPS)?

A

A Wifi-Protected Setup allows users to configure wireless devices.

WPS is protected by a PIN which can be brute-forced.

A countermeasure to this would be to disable the WPS service when not it use to prevent any form of WPS attacks.

27
Q

What are the typical user awareness countermeasures against cyber attacks?

A

Acceptable use policy of company devices.

Initial training when hired.

Annual refresher training.

Newsletter and periodic updates.

28
Q

What are the two different types of input validation?

A

Client Side and Server Side

29
Q

What is Application Review as a countermeasure?

A

Applications prior to release should undergo testing for bugs an any vulnerabilities.

Line-by-line peer review can be conducted to look for any issues with an application.

30
Q

What is Code Signing as a countermeasure?

A

Certificates can be issued to be associated with software to let users know that the file has not lost integrity through distributions.