MOD 10 - Denial of Service Flashcards

1
Q

Slowloris attack

A

DOS attack against a web server by sending many partial HTTP requests. Server opens multiple connections, waiting for the requests to complete, which never do. Attacker keeps doing this to max out the server’s connection pool, and legit users won’t be able to initiate their own requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Botnets

A

Review what a botnet is, typical setup, and Scanning Methods for Finding Vulnerable Machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hit-List scanning

A

With this technique, you first build a (hit) list of machines that might potentially be vulnerable to attack (to get them to join your botnet). Then you scan those machines. Any you can take-over, you can now have them help you to scan the rest of your list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ping Of Death

A

Sending malformed or oversized ICMP ping packets in an attempt to crash the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SYN Flood / TCP SYN attack

A

Abuses the TCP 3-way handshake and sends many SYN packets (connection requests) to overwhelm the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero-Day

A

New or unknown vulnerability for which there is no defense in place yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*Cognitive radios

A

Implement Cognitive Radios in the physical layer to handle wireless jamming and scrambling attacks. These devices can automatically move your communications to an unused (un-attacked) channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly