Denial of Service Flashcards
Random Scanning
Each compromised computer probes
random addresses
Permutation Scanning
All compromised computers share a
common pseudo-random permutation of the
IP address space
Signpost Scanning
Uses the communication patterns of the
compromised computer to find new target.
Hitlist Scanning
A portion of a list of targets is supplied to
a compromised computer
subnet proofing
generate random addresses within a given address space
Random spoofing
generate 32-bit numbers and stamp packets with them
Fixed spoofing
the spoofed address is the address of the target
Goal of DDOS
take out a large computer site / app / infra with as little computing resources as possible
What are the reasons why the UDP-based NTP protocol is particularly vulnerable to amplification attacks?
A small command can generate a large response
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimate NTP servers
Which of the following are true?
The server must reject all TCP options because the server discards the SYN queue entry
SYN cookies lead to overall slower performance
SYN cookies require modified versions
The server must reject all TCP options because the server discards the SYN queue entry
With regards to a UDP flood attack, which of the following are true?
- Attackers can spoof the IP address of their UDP packets
- the attack can be mitigated with firewalls
- firewalls can’t stop a flood because the firewall is susceptible to flooding
- Attackers can spoof the IP address of their UDP packets
- firewalls can’t stop a flood because the firewall is susceptible to flooding
What is the main idea behind slowing down DOS attackers?
Slow down the hacker!
What are client puzzles and what do they do?
- everyone must submit a puzzle solution with requests during a DOS attack which slows down the requests
- When there is no attack, no solution is needed
Why is SSL/TLS handshake vulnerable to DDOS?
TBD
What are client puzzles and what are they used for?
TBD