Chapter 7 Protecting Against Advanced Attacks Flashcards
____ attacks typically include sustained, abnormally high network traffic
DDoS
_______ occurs when one person or entity impersonates or masquerades as someone or something else.
Spoofing
____ flood attacks disrupt the TCP handshake process and can prevent legitimate clients from connecting.
SYN
True or False: In a SYN attack, the attacker never finishes the handshake sequence
True
The attacker floods the server with SYN packets but never sends the final ACK packets
True or False: Attackers often spoof the source IP address when conducting SYN flood DoS attacks
True
A ________ attack is a form of active interception or active eavesdropping. It uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two.
man-in-the-middle(MITM)
_____ ______ is one way that an attacker can launch an MITM attack.
Address Resolution Protocol (ARP) poisoning
Kerberos helps prevent man-in-the-middle attacks with ______ ______.
mutual authentication
______ ______ is an attack that misleads computers or switches about the actual MAC address of a system.
ARP poisoning
_____ resolves the IP addresses of systems to their hardware address and stores the result in an area of memory known as the ARP cache.
ARP
True or False : The ARP request broadcasts the MAC address and essentially asks, “Who has this MAC address?”
False
It broadcasts the IP address
True or False : The computer with the IP address in the ARP request responds with its MAC address. The computer that sent the ARP request caches the MAC address for the IP.
True
True or False : In a man-in-the-middle attack, an attacker can redirect network traffic and, in some cases, insert malicious code.
True
An attacker can also use ARP poisoning in a ____attack.
DoS
The ____ ____ is the IP address of a router connection that provides a path out of the network.
default gateway
True or False : If all the computers cache a bogus MAC address for the default gateway, a few of them can reach it.
False
None of them can reach the default gateway and it stops all traffic out of the network.
A ___ ____ attack attempts to modify or corrupt DNS results.
DNS poisoning
True or False : Many current DNS servers use Domain Name System Security Extensions(DNSSEC) to protect the DNS records and prevent DNS poisoning attacks.
True
A ______ attack is another type of attack that manipulates the DNS name resolution process.
pharming
True or False : Pharming attacks on the client computer modify the hosts file used on Windows systems.
True
An _____ _____ is a type of DDoS attack which typically uses a method that significantly increases the amount of traffic sent to, or requested from, a victim.
amplification attack
A _____ attack spoofs the source address of a directed broadcast ping packet to flood a victim with ping replies.
smurf
__ amplification attacks send DNS requests to DNS servers spoofing the IP address of the victim.
DNS
True or False : DNS poisoning attacks attempt to corrupt DNS data.
True
True or False : Amplification attacks increase the amount of traffic sent to or requested from a victim and can be used against a wide variety of systems, including individual hosts, DNS servers, and NTP servers.
True
A ____ ____ attack attempts to guess all possible character combinations.
brute force
List the two types of brute force attacks
- Online
2. Offline
An ______ password attack attempts to discover a password from an _____ system.
online
______ password attacks attempt to discover passwords from a captured database or captured packet scan.
Offline
True or False : One of the first steps to thwart offline brute force attacks is to use complex passwords and to store the passwords in an encrypted or hashed format.
True
A ______ attack is one of the original password attacks which uses a ______ of words and attempts every word in the _____ to see if it works.
dictionary
_____ attacks attack the ____ of a password instead of the password.
Hash
True or False : Most authentication protocols encrypt the password or the hash before sending it across the network.
True
In a _______ attack, the attacker discovers the hash of the user’s password and then uses it to log on to the system as the user.
pass the hash
True or False : Any authentication protocol that passes the hash over the network in an unencrypted format is susceptible to a pass the hash attack
True
Mostly associated with MS LAN Manager (LM) and NT LAN Manager (NTLM). Two older MS security protocols used to authenticate MS clients
______ uses a number used once (nonce) on both the client and the authenticating server.
NTLMv2
What is a better alternative to NTLM?
NTLMv2 or Kerberos
In a ______ attack, an attacker is able to create a password that produces the same hash as the user’s actual password.
birthday
A hash _____ occurs when the hashing algorithm creates the same hash from different passwords.
collision
True or False : Birthday attacks on hashes are thwarted by decreasing the number of bits used in the hash to decrease the number of possible hashes.
False
Birthday attacks on hashes are thwarted by increasing the number of bits used in the hash to increase the number of possible hashes
______ attacks are a type of attack that attempts to discover the password from the hash. It is a huge database of precomputed hashes.
Rainbow table
______ passwords is a common method of preventing rainbow table attacks, along with other password attacks such as dictionary attacks.
Salting
A ____ is a set of random data such as two additional characters.
salt
True or False : Using additional characters add complexity to the password, and also result in a different hash than the system would create using only the original password. This causes password attacks that compare hashes to fail.
True
A _____ attack is one where an attacker _____ data that was already part of a communication session. In this scenario, a third party attempts to impersonate a client that is involved in the original session.
replay
True or False : Many protocols use timestamps and sequence numbers to thwart replay attacks.
True