Cyber Attacks Flashcards
Wiretapping
Attacker eavesdrops on a network to acquire information normally at physical layer
Port scanning
When an attacker uses a software like nmap that sends thousand of tcp/ip packets to well known ports to see if they’re open and tells a hacker what service or app is running on a system. This can be stopped by packet filtering firewall
ARP poisoning
Used to manipulate arp cache system mapping of MAC addresses
They send incorrect MAC addresses to a system
Tricks a switch into redirecting traffic to the hacker
Man in the middle
Impersonate both the sender and the receiver intercepting all traffic
Ping of death
Attacker sends an icmp packet that’s too large and causes the system to crash or stop functioning
Ping flood
Attacker overwhelms victims computer with a large amount of icmp echos or ping request to overload, crash or slow down the system
Smurf attack
A DDOS ATTACK that is sent to a broadcast ip address connected to all the computers on a network. The attacker spoofs the return address to the victim. The victim is bombarded with reply’s from other computers
Mitigate ddos attacks
Packet filtering firewall that blocks icmp packets over a certain number of block all icmp packets together
SQL injection
An attacker is trying to obtain info from or take over a database
They enter sql commands into input boxes instead of basic text
Buffer overflow
When an attacker enters text that is too large to fit within a region of memory called a buffer allowing the attacker to retrieve it from a different region in the database
Botnet
Malware that can takeover a pc allowing it to be remotely controlled