Chapter 7 Flashcards
Protecting Against Advance Attacks
DoS
Denial-of-Service is and attack from a single source that attempts to disrupt the services provided by the attacked system
DDoS
Distributed Denial of Service is an attack on a system launched from multiple sources intended to make a computers resources or services unavailable to users
DDoS attacks typically include sustained, abnormally high network traffic
Escalation
Filler
Privilege
Filler
MAC Spoofing
An attack that changes the source MAC address
IP Spoofing
An attack that changes the source IP address
MITM
Man-in-the-Middle is an attack using active interception or eavesdropping
It uses a third computer to capture traffic sent between two other systems
ARP Poisoning
An attack that misleads systems about the actual MAC address of a system
ARP Request
filler
ARP Reply
filler
DNS Poisoning
An attack that modifies or corrupts DNS results
DNSSEC helps prevent DNS poisoning
DNSSEC
Domain Name System Security Extensions is a suite of extensions to DNS used to protect the integrity of DNS records and prevent some DNS attacks
Amplification Attack
An attack that increases the amount of bandwidth sent to a victim
Brute Force
A password attack that attempts to guess a password
Online brute force attacks guess passwords of online systems
Offline attacks guess passwords contained in a file or database
Dictionary
A password attack that uses a file of words and character combinations
The attack tries every entry within the file when trying to guess a password
Hash
A number created by executing a hashing algorithm against data, such as a file or message
Hashing is commonly used for integrity
Common hashing algorithms are MD5, SHA-1, and HMAC
MD5
Message Digest 5 is a hashing function used to provide integrity
MD5 creates 128-bit hashes, which are also referred to as MD5 checksums
Experts consider MD5 cracked
SHA
Secure Hash Algorithm is a hashing function used to provide integrity
Versions include SHA-1, SHA-2, and SHA-3
Pass the Hash
A password attack that captures and uses the hash of a password
It attempts to log on as the user with the hash and is commonly associated with the Microsoft NTLM protocol
Birthday
A password attack named after the birthday paradox in probability theory
The paradox states that for any random group of 23 people, there is a 50 percent chance that 2 of them have the same birthday
Collision
A hash vulnerability that can be used to discover passwords
A hash collision occurs when two different passwords create the same hash
Rainbow Table
A file containing precomputed hashes for character combinations
Rainbow tables are used to discover passwords
PBKDF2 and bcrypt thwart rainbow table attacks
Salt
A random set of data added to a password when creating the hash
PBKDF2 and bcrypt are two protocols that use salts
Replay Attack
An attack where the data is captured and replayed
Attackers typically modify data before replaying it
Known Plaintext
A cryptographic attack that decrypts encrypted data
In this attack, the attacker knows the plaintext used to create chiphertext
Typo Squatting
The purchase of a domain name that is close to a legitimate domain name
Attackers often try to trick users who inadvertently use the wrong domain name
Also called URL hijacking
Hosting a Malicious Website
filler
Earning Ad Revenue
filler
Reselling the domain
filler
Clickjacking
An attack that tricks users into clicking something other than what they think they’re clicking
Session Hijacking
An attack that attempts to impersonate a user by capturing and using a session ID
Session IDs are stored in cookies
Domain Hijacking
An attack that changes the registration of a domain name without permission from the owner
Man-in-the-Browser
An attack that infects vulnerable web browsers
It can allow the attacker to capture browser session data, including keystrokes