Chapter 5 - Networking And Server Attacks Flashcards

1
Q

2 types of networking-based attacks

A

1) interception attacks

2) poisoning attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 of the most common interception attacks

A

1) Man-in-the-Middle (MITM)
2) Man-in-the-Browser (MITB)
3) Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Man-in-the-Middle (MITM)

A

An attack that intercepts legitimate communication and forges a fictitious response to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man-in-the-Browser

A

An attack that intercepts communication between a browser and the underlying computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Replay attack

A

An attack that makes a copy of the transmission before sending it to the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARP poisoning

A

An attack that corrupts the ARP cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC spoofing

A

Imitating another computer by means of changing the MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS poinsoning

A

An attack that substitutes DNS addresses so that the computer is automatically redirected to an attackers device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Some types of server attacks

A

1) Denial of service
2) Web server application attacks
3) Hijacking
4) Overflow attacks
5) Advertising attacks
6) Exploiting browser vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of service (DoS)

A

An attack that attempts to prevent a system from performing its normal functions by overwhelming the system with requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Distributed denial of service (DDoS)

A

An attack that uses many computers to perform a DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 types of web server application attacks

A

1) cross-site attacks

2) injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 types of cross-site attacks

A

1) cross-site scripting (XSS)

2) cross-site request forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cross-site scripting (XSS)

A

An attack that objects scripts into a web application server to direct attacks at client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cross-site request forgery (XSRF)

A

An attack that uses the users web browser settings to impersonate that user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Injection attack

A

An attack that introduces new input to exploit a vulnerability.

17
Q

Session hijacking

A

An attack in which an attacker attempts to impersonate the user by using the users session token.

18
Q

Domain hijacking

A

An attack that occurs when a domain pointer that links a domain name to a specific web server is changed.

19
Q

Clickjacking

A

Hijacking a mouse click.

20
Q

Buffer overflow attack

A

An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

21
Q

Integer overflow attack

A

An attack that occurs when an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.