DOS Attacks (Lesson 12) Flashcards

1
Q

Email Flooding/bombing

A

A form of denial of service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DOS Categories

A

Bandwidth Consumption
-attackers will consume all available bandwidth to a particular network
Resource Starvation
-focuses on consuming system resources rather than network resources (e.g. CPU utilization, memory, file-system quotas)
Programming Flaws
-failures of an application, or operating system to handle exceptional conditions (normally result when a user sends unintended data to the vulnerable element)
Routing and DNS attacks
-involves attackers manipulating routing table entries to deny service to legitimate systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Poisoned Traffic

A

malformed or invalid data that can’t be properly handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute-force resource

A

simply use up all available capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stateful resource

A

take advantage of client/server relationship in protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

POD

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smurf/ping flooding/ICMP storm

A

Attacker sends a large stream of spoofed ping packets to a broadcast address (an IP address that services a network of computers)
Hosts reply to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SYN Flooding

A

Exploits the synchronization protocol used to initiate connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Resource Starvation Attack

A

One method utilizes two UDP services
-Echo: the server returns whatever the client sends
-Chargen: The server sends a datagram containing a random number of characters each time the client sends a datagram.
Now, an intruder will spoof a packet and connects the Echo service on one machine to the chargen service on another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Teardrop attack

A

Some implementations of the TCP/IP IP fragmentation re-assembly code do not properly handle overlapping IP fragments. Teardrop is a widely available attack tool that exploits this vulnerability. Any remote user can crash a vulnerable machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protection from DOS and DDOS attacks

A

Best way would seem to be to stop the attack before it happens
-Detect and Remove Trojans/zombies from servers, use file-integrity checking programs
Block “marching orders”
-e.g. one method to send the “attack” order is to send an unsolicited ICMP ping response – firewalls should be set to block this. Broadcasts should not send ping requests. Limit ability to spoof.
Block the attack at the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mitigating the Effects of DoS

A

Acknowledges that we can’t stop DoS
Harden the network
Avoid putting “all of your eggs in one basket”
Use Load balancers
can employ “delayed binds” which drop sessions
can also drop “Silent” TCP sessions
Adjust state limits (e.g. wait time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PING (Acronym)

A

Packet Internet Groper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP SYN Scanning

A

“half open” scanning. Sends a SYN packet to each remote port. Open ports respond with a SYN/ACK packet. Closed ports usually respond with an RST packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP FIN Scanning

A

Sends a FIN packet (normally sent to clear connection when conversation is finished). Closed ports usually respond with an RST packet. Open ports usually ignore FIN packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UDP Scanning

A

often more difficult than TCP since UDP services may not respond. If a ICMP “port unreachable” message is received, however, it is an indication the service is NOT running.

17
Q

Fragmentation Scanning

A

break scan up into several smaller packets. This may result in being able to hide the scan from firewalls and IDS.

18
Q

Relay or bounce scanning

A

send scan through another system (proxy or forwarding gateway), may confuse/hide origin of attack

19
Q

Decoy scanning

A

send a large number of spoofed packets along with your real one so they hide the real scan.

20
Q

Ways to recognize scanning

A

System log file analysis – look for multiple, short duration connections or connection attempts.
Network traffic – monitor the volume of inbound and outbound network traffic. If you have established a profile of what is normal activity you will be able to recognize spikes in the activity level which may indicate scanning activity.
Firewall and router logs – look for multiple rejections or access violations coming from the same source or group of sources.
Intrusion detection systems – most IDS contain built-in methods for examining traffic to detect scanning attempts.

21
Q

Defending Against Scanning

A

Block ports at your router/firewall.
Block ICMP, including echo
Create a DMZ
Use bastion hosts/proxy servers
Use NAT to hide private, internal IP addresses
Remove default/sample materials
Remove unnecessary services
Restrict permissions
Change default headers associated with services
Keep applications and operating systems patched
Establish a “Honeypot” to trap attackers

22
Q

Eavesdropping - Cellular Intercepts

A

extremely vulnerable to interception

23
Q

Eavesdropping - Pager Intercepts

A

Fairly simple to do

24
Q

Defeating Sniffing Attacks

A

Detecting and Eliminating Sniffers
-Possible on a single box if you have control of the system
-Difficult (depending on OS) to impossible (if somebody splices network and adds hardware) from network perspective
Safer Topologies
-Sniffers capture data from network segment they are attached to, so – create segments
Encryption
-If you sniff encrypted packets, who cares?
(outside of traffic analysis, of course)

25
Q

Traffic Analysis Tips

A

Looks at activity, not contents
Pen Registers and Trap & Trace
-pen registers provide access to the numbers that are dialed from a phone
-trap & trace provides incoming numbers
Location Tracking
-possible with cellular phones
-can work even when phone not in use

26
Q

.rhosts file

A

used to establish a trusted relationship between machines. Used by rlogin, rsh, and rcp to determine which remote hosts and users are considered “trusted” and are allowed to access the host without supplying a password.
- rlogin (remote login), rsh (remote shell), rcp (remote copy)

27
Q

/etc/hosts.equiv file

A

/etc/hosts.equiv are essentially equivalent to a system-wide .rhosts file and contain lines with hostnames.

28
Q

Blind Spoofing

A

In non-blind spoofing the response sent by the target machine can be observed (sniffed).
In blind spoofing, the target’s responses can not be observed.
Attacker must find way to guess sequence numbers.

29
Q

Spoofing Prevention Tips

A

General rule of thumb: Don’t have any trusted relationships if you can help it.
Don’t accept packets from outside of your network that claim to be originating from inside of your network.