Denial of Service and Social Engineering Flashcards

1
Q

What is a DoS attack

A

A denial of service or DoS attack is one in which the primary goal of the perpetrator is to prevent legitimate users from accessing a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is DoS considered a nasty attack?

A

Easy to launch, hard to trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two broad types of DoS

A

Flooding attack - overwhelm a system by sending a flood of real looking but unnecessary data so that its resources are consumed
Logic DoS attack - exploit the vulnerabilities of the target intelligently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a ping flood

A

the hacker sends large ping packets continuously to the target machine, thus overwhelming it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a TCP SYN attack

A

the victim server is flooded with spoofed TCP SYN requests at a high rate from fake source IP addresses. The attacker does not send the second SYN-ACK segment resulting in a number of half open TCP connections on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a land attack?

A

Attacker sends a TCP SYN segment that has been tweaked so that the source IP address and the destination IP address are both that of the victim machine. The victim machine receiving this segment opens an empty TCP connection with itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a tear drop attack?

A

this attack uses fragmented IP packets to launch the Dos attack. In a tear drop attack the attacker repeatedly fragments IP packets and sends all but one fragment in each packet to the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a ping of death?

A

This attack uses a fragmented ping packet. Sending a large ping packet will result in fragmentation. This has been known to cause many systems to crash, freeze or reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a smurf attack?

A

In the smurf attack, the attacker broadcasts an ICMP echo request to a network. The packet has been tweaked so that the source IP address is that of the victim. This will result in all the hosts on the network sending ICMP replies to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a UDP flood?

A

attacker sends a UDP packet to a random port on a victim machine. When the victim machine received this, it sends an ICMP destination unreachable reply since there is probably no application on this port. If a large number of such UDP packets are sent on different ports the victim machine will be overloaded trying to determine if there are awaiting applications and then generating and sending ICMP replies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an HTTP VERB attack

A

HTTP VERBs include POST, GET, PUT etc. DoS attacks can target HTTP servers using these methods. There are several types of HTTP VERB attacks including excessive VERB, excessive VERB single session, Multiple VERB single request, Recursive GET, and SQL attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an SSL-based DDos attack?

A

In an SSL-based DDoS attack, the attacker sends queries to load heavy parts of a website, the decryption and search operations are done at the server side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Botnet DDoS attacks?

A

Linux based botnets are being increasingly used to launch DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some mitigation strategies for DoS attacks?

A
Traffic monitoring
Egress filtering
Install packages against well known DoS attacks
Know your custimers
Overprovision bandwidth
Sign up for DDoS Detection and Mitigation
Have a disaster recovery plan in place
Prevention of botnet-based DDoS attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is social engineering?

A

It is the art and science of getting people to comply to your wishes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some tricks that social engineers use?

A

Impersonation, Ingratiation, Diffusion of responsibility, Plain old friendliness

17
Q

What are some techniques that social engineers use?

A

dumpster diving, social engineering by phone, shoulder surfing, baiting, online ads, phishing, pharming and phlashing, hacking gmail and FB, get passwords through fraudulent websites, reverse social engineering