DDoS Botnets Flashcards

1
Q

Availability attack on physical layer?

A

Cut wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability attack on data link layer?

A

WiFi Deauthentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability attack on network layer?

A

ICMP ping flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability attack on transport layer?

A

TCP SYN flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability attack on Application layer?

A

HTTP flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe ICMP flood

A

Attacker spoofs their IP, sends packet to server
Server responds to spoof IP
Server gets overloaded with lots of fake requests
Server goes down
Genuine client cannot connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does TCP protocol work?

A

Needs handshake, SYN - SYN ACK - ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does UDP protocol work?

A

Does not need connection, only request-response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of DDoS attacks. What do they do?

A

(3)
Volumetric attack - high volume of traffic
Protocol attack - exploits vulnerabilities in network protocols
Application layer attack - target specific application to exhaust resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe an amplification DDoS attack

A

Uses an intermediary server that returns a large response to a query

Requirements:
- server provides large responses on small queries
- ability to spoof address (to send attack to someone else)

Can be done on many protocols, usually UDP
Popular: DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layers are targeted by protocol attacks?

A

Network
Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe a TCP SYN flood

A

Between SYN and ACK, server is waiting and memory is allocated for connection

Send spoofed SYN packet, server waits for response, memory is blocked, users cannot reach server anymore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to defend against TCP SYN flood attack?

A

But a cryptographic value in sequence number, so you dont have to allocate memory anymore, when ACK comes you can verify value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to measure TCP SYN floods

A

Backscatter

if we have a lot of IP addresses we can identify ongoing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application layer attack characteristics

A

Hard to identify, since it closely resembles normal user traffic

17
Q

Describe a HTTP flood

A

Attacker requests many pages or files from a website
Attacker must complete TCP handshake to do this, cannot be spoofed

18
Q

DDoS mitigation

A

(4)

Redundant network infrastructure
Traffic filtering
Content Delivery Networks - distribute content over large network to absorb and mitigate ddos traffic by serving content from distributed servers
Web app firewalls - can protect from app layer attacks by identifying malicious traffic

19
Q

What is a botnet?

A

network of compromised computers (bots) under the control of a single entity, usually malicious actor

20
Q

What is the purpose of botnets?

A

typically used for various malicious activities, including distributed denial of service (DDoS) attacks, spreading malware, and stealing sensitive information.

21
Q

Describe the architecture of a botnet

A

(3)
- infected bots
- command and control (C2 or C&C) -> bots receive commands through C2 infrastructure
- communication channels (IRC, HTTP, P2P, Blockchain…)

22
Q

How does Mirai work?

A
  • Infects IoT devices.
  • Propagates like a worm.
  • C2 servers are centralized.
  • Telnet-like communication channel
23
Q

How to mitigate botnets?

A

(3)
- Securing devices to make harder to compromise a large number of devices.
- Taking down command and control infrastructure. -> The servers are often international and
require collab between law-enforcement agencies.
- Blocklisting devices that are infected by a botnet so that owners clean them

24
Q

What does DGA refer to?

A
  • Domain Generation Algorithm
  • Since domain name/ip can be taken down, generate lots
25
Q

What is peer to peer architecture in a botnet?

A

Since Command and Control servers might be taken down. -> Using the bots as C2 channel makes the botnet redundant. (bots do everything themselves)

26
Q

How does a blockchain architecture look like when it comes to botnets?

A
  • sending C2 location through blockchain
  • Decentralized
  • blockchain will not be taken down