Cmmon TCP/IP Attacks Flashcards

1
Q

Man-in-the-Middle Attack

A
  • Attacker inserts themselves in the middle of a conversation between two systems and exploits the real-time traffic
  • eg: ICMP Redirect, DNS Spoofing, DHCP spoofing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Session Hijacking

A
  • also known as sidejacking.
  • attacker gains physical access to the network and hijacks the session.
  • stealing session cookies is an example
  • sniffing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP Address spoofing

A
  • Attacker impersonates another device to excite an attack.

* pretend to be something that you’re not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS

A
  • Denial of Service Attack
  • Attacker attempt to prevent legitimate users from accessing information or services by flooding the network with traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DDoS

A

• A simultaneous, coordinated attack from multiple source machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smurf Attack

A

• Attacker uses large number of ICMP packets via a broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack Surface

A
  • All of the different points, the “attack vectors” in a given computing device or network that are accessible to an unauthorized user or attacker
  • Attack Surface can be broken down into 4 different areas: Network, Software, Physical, social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack Vector

A
  • Methods used by a hacker to exploit the systems, software, network.
  • eg: Malware - viruses, email spams, ads, and spyware
  • SQL Injection, DDoS Attack’s, Phishing, Eaves dropping, Malware injection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly