IP Vulnerabilities Flashcards

1
Q

ICMP Attacks

A

Threat actors can use ICMP echo packets (pings) to discover subnets and hosts on a protected network with the goal of generating DoS flood attacks, and to alter host routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoS Attacks

A

Threat actors attempt to prevent legitimate users from accessing information or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS Attacks

A

Similar to DoS, but features a simultaneous, coordinated attack from multiple source machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address spoofing attacks

A

Threat actors spoof the source IP address in an attempt to perform blind spoofing or non-blind spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On-path or MITM

A

Threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication of data. Could simply eavesdrop by inspecting captured packets or alter packets and forward them to their original destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Session hijacking

A

Threat actors gain physical access to the network and then use an on-path attack to hijack a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly