Lesson 19: Applying Network Hardening Techniques Flashcards
Define enumeration
The process of extracting user names, machine names, network resources, shares and services from a system.
What are two types of enumeration attacks?
- Footprinting
- Fingerprinting
Define footprinting enumeration
Bad actor discovery tactic detecting topology and infrastructure to find indicators of compromise.
Define fingerprinting enumeration
Bad actor discovery tactic detecting software, network protocols, operating systems, or hardware devices on the network to find indicators of compromise.
What is the basic definition of a spoofing attack?
Attack technique where the threat actor disguises their identity or impersonates another user or resource.
What are different types of spoofing attacks?
- Phishing/Pharming
- Packet/protocol spoofing (ARP/DNS/IP/MAC)
- Man-in-the-Middle (MitM); On-path attack
- Rouge DHCP
Define a denial of service (DoS) attack
Deliberate attempt to make a website/application or network unavailable to users, by flooding it with network traffic.
What are the typical effects of a denial of service (DoS) attack?
1 . Resource exhaustion (CPU/RAM/etc.)
2. exploit vulnerabilities in application software/hardware
How can a denial of service (DoS) attack be manipulated?
A blinding attack using DoS to divert attention and resources from the real target
What is the new term for a Man-in-the-Middle (MitM) attack?
On-path attack
Define an on-path (Man-in-the-middle) attack
Attacker relays and possibly alters the communications between two parties.
Define the process of MAC/IP spoofing
Altering the MAC/IP address of their device to mimic that of a legitimate device present on the network
What is the role of IP spoofing in a denial of service (DoS) attack?
To mask the origin of the attack and make it harder for the target system to block packets from the attacking system.
Define ARP spoofing
Bad actor sends fake ARP packets that link an attacker’s MAC address with an IP of a computer already on the LAN.
Define ARP poisoning
After a successful ARP spoofing, a hacker changes the company’s ARP table, so it contains falsified MAC maps.
What is a potential cause of an ARP poisoning attack directed at a default gateway?
All traffic destined for remote networks will be sent to the attacker.
Define a rouge DHCP server and its function
Attacker sets their machine as the subnets default gateway or DNS server to intercept traffic
Define DNS poisoning and its purpose
Attack where a threat actor injects false resource records into a client or server cache to redirect a domain name to an IP address of the attacker’s choosing.
Define VLAN hopping
Exploiting a misconfiguration to direct traffic to a different VLAN without authorization.
How is VLAN hopping performed?
Attacker crafts a frame with two VLAN tag headers. The first trunk switch to inspect the frame strips the first header, and the frame gets forwarded to the target VLAN.
What is another way to perform VLAN tagging
Attaching a device that spoofs the operation of a switch to the network and negotiating the creation of a trunk port. As a trunk port, the attacker’s device will receive all inter-VLAN traffic.
What is one way VLAN tagging be mitigated?
Ensuring that the native VLAN uses a different ID compared to any user accessible VLAN
What is another way VLAN tagging can be mitigated?
Ensuring that trunk ports are pre-determined in the switch configuration and that access ports are not allowed to auto-configure as trunk ports.
Define a rouge access point
One that has been installed on the network without authorization.
Define an evil twin
A rogue AP masquerading as a legitimate AP deceiving users into believing that it is a legitimate network access point.
What is the purpose/function of an evil twin AP?
To harvest authentication information
What is a method to prevent a rouge AP?
Using EAP-TLS security authentication server and clients perform mutual authentication.
What network/security appliances can detect rouge APs?
Wireless intrusion detection system (WIDS) or wireless intrusion prevention system (WIPS)
Define a deauthentication attack
Type of denial-of-service attack that targets communication between a client and AP
How can deauthentication attacks be mitigated?
The wireless infrastructure supports Management Frame Protection - AP and clients must both support the MFP protocol
Define a distributed DoS (DDoS) attack
Involves the use of infected Internet-connected computers and devices to disrupt the normal flow of traffic to a server or service by overwhelming the target with traffic.
Define a SYN flood attack
Type pf DDoS attack that exploits the 3-way handshake by flooding the target with SYN connection request packets with fake IPs causing the server to temporarily maintain a new open port connection for a certain length of time.
Define a botnet
Group of hosts or devices that have been infected by a control program called a bot that enables attackers to exploit the hosts to mount attacks.
How is a botnet created?
A threat actor will first compromise one or two machines to use as handlers; handlers are used to compromise a number of zombie hosts with DoS tools create the botnet.
Once a botnet is created, what is the network between the bots and the handler defined as?
command and control (C-and-C or C2) network.
What is the basic definition of malware?
Software that serves a malicious purpose, typically installed without the user’s consent/knowledge.
What are different types of malware?
- Viruses/worms
- Trojans
- Potentially unwanted programs (PUPs)/Potentially unwanted applications (PUAs)
- Ransomeware
Define a trojan malware
Malware concealed within an installer package for software that appears to be legitimate.