Chapter 5 - Networking And Server Attacks Flashcards
2 types of networking-based attacks
1) interception attacks
2) poisoning attacks
3 of the most common interception attacks
1) Man-in-the-Middle (MITM)
2) Man-in-the-Browser (MITB)
3) Replay
Man-in-the-Middle (MITM)
An attack that intercepts legitimate communication and forges a fictitious response to the sender.
Man-in-the-Browser
An attack that intercepts communication between a browser and the underlying computer.
Replay attack
An attack that makes a copy of the transmission before sending it to the recipient.
ARP poisoning
An attack that corrupts the ARP cache.
MAC spoofing
Imitating another computer by means of changing the MAC address.
DNS poinsoning
An attack that substitutes DNS addresses so that the computer is automatically redirected to an attackers device.
Some types of server attacks
1) Denial of service
2) Web server application attacks
3) Hijacking
4) Overflow attacks
5) Advertising attacks
6) Exploiting browser vulnerabilities
Denial of service (DoS)
An attack that attempts to prevent a system from performing its normal functions by overwhelming the system with requests.
Distributed denial of service (DDoS)
An attack that uses many computers to perform a DoS attack.
2 types of web server application attacks
1) cross-site attacks
2) injection attacks
2 types of cross-site attacks
1) cross-site scripting (XSS)
2) cross-site request forgery (XSRF)
Cross-site scripting (XSS)
An attack that objects scripts into a web application server to direct attacks at client.
Cross-site request forgery (XSRF)
An attack that uses the users web browser settings to impersonate that user.
Injection attack
An attack that introduces new input to exploit a vulnerability.
Session hijacking
An attack in which an attacker attempts to impersonate the user by using the users session token.
Domain hijacking
An attack that occurs when a domain pointer that links a domain name to a specific web server is changed.
Clickjacking
Hijacking a mouse click.
Buffer overflow attack
An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
Integer overflow attack
An attack that occurs when an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.