Lesson 10 - Chapter 2: Network Threats Flashcards
What are attack vectors?
different ways to infiltrate systems
The CompTIA A+ exam calls attack vectors what?
threats
What is a Zero-Day Attack?
an attack on a vulnerability that wasn’t known to the software developers
(exposes an unknown vulnerability, developer has 0 days to fix it!)
What is Spoofing?
Pretending to be someone/something you’re not by placing false information into your packets
What are 4 examples of the types of data that can be spoofed?
- Source MAC address and IP address (to make you think it came from somewhere else)
- Email address
- Web address (you’re not actually on that page)
- User name (not really that user)
What is an on-path attack? What is it also called? (2)
Also called a man-in-the-middle (MITM) attack
an attacker intercepts traffic between 2 systems, reading and changing the data then sending it forward
What kind of attack is it when a person using special software on a wireless network makes all the clients this his laptop is a wireless access point?
on path attack (MITM)
Can an attacker gain access to passwords, shared keys, and other sensitive information in an on-path attack? When?
yes (when using special software on a wireless network to make clients think his laptop is a wireless access point)
What is session hijacking?
similar to MITM, tries to intercept a valid computer session to get authentication information
What’s the difference between session hijacking and a MITM attack?
session hijacking only tries to get authentication information it doesn’t listen in like MITM
What are Evil Twin attacks?
an attacker inserts a rogue access point into a wireless network so users connect to the device instead of the real AP to intercept their traffic/info
(Wi-Fi intrusion)
What ways can an Evil Twin attack be set up?
smartphone or other Wi-Fi-capable device, but typically a wireless network AP
How do you prevent/detect evil twins?
contract for a professional site survey to be performed periodically at random
What is brute force?
a method where a threat agent guesses all possible values for some data
(doesn’t just apply to passwords)
How do you protect against brute force attacks on a password?
set up a password policy that locks a system after a c ertain number of invalid password guesses
(doesn’t do much for other types of brute force attacks)
What are some things that can be brute-forced? (3)
- search
- net
- us
- search for open ports
- network IDs
- user names
etc
What is a DoS attack?
a single device attempts to bog down/crash another device by overwhelming its Internet connection with connection requests
(rapidly repeating pings, page requests, etc)
What does DDoS stand for?
Distributed Denial of Service
What is a DDoS attack?
uses multiple coordinated devices to perform the DoS attack (several devices attempt to bog down a device with connection requests)
What types of devices are usually involved in a DDoS attack?
zombie members of a botnet (compromised by malware)
What is a SQL injection?
when an attacker inserts malicious SQL statements into the coding of a web page