Module 3: Network Security Concepts Flashcards
Describe the Attack Type
Eavesdropping Attack
Also called sniffing or snooping
This is when a threat actor captures and “listens” to network traffic.
Describe the Attack Type
Data Modification Attack
If threat actors have captured enterprise traffic, they can alter the data in the packet without the knowledge of the sender or receiver.
Describe the Attack Type
IP Address Spoofing Attack
A threat actor constructs an IP packet that appears to orginate from a valid address inside the corporate intranet.
Describe the Attack Type
Password-based Attacks
Specifically what can be done with a valid user account password
Used the password of a valid user account, to obtain lists of other users, network information, change server and network configurations, and modify, reroute, or delete data.
Describe the Attack Type
Denial of Service Attack
(DoS)
Prevents normal use of a computer or network by flooding traffic to either slow down or shut down systems and networks.
Describe the Attack Type
Man-in-the-Middle Attack
(MitM)
When a threat actor positions themselves between a source and destination. They can now actively monitor, capture, and control the communication transparently.
Describe the Attack Type
Compromised-key Attack
If a threat actor obtains a secret key, it becomes compromised. It can be used to gain access to secure communications without the sender or receiver being aware of the attack.
Describe the Penetration Testing Tool
Password Crackers
List some tools
Used to find or ‘recover’ a password, either by removing the original password or by discovery by repeated guessses (Brute Force Attack) or using lists of commonly used passwords (Dictionary Attacks)
e.g. John the Ripper, Ophcrack, L0phtCrack, THC Hydra, RainbowCrack, Medusa
Describe the Penetration Testing Tool
Wireless Hacking Tools
List some tools
Used to discover and hack wireless networks.
Aircrack-ng, Kismet, InSSIDer, KisMAC, Firesheep, NetStumbler
Describe the Penetration Testing Tool
Network Scanning and Hacking Tools
List some tools
Used to probe network devices, servers, and hosts for open TCP or UDP ports.
Nmap, SuperScan, Angry IP Scanner, NetScan Tools
Describe the Penetration Testing Tool
Packet Crafting Tools
List some tools
Used to probe and test a firewall’s robustness using specifically crafted forged packets.
Hping, Scapy, Socat, Yersinia, Netcat, Nping, Nemesis
Describe the Penetration Testing Tool
Packet Sniffers
List some tools
Used to capture and analyse packets within traditional Ethernet LANs or WLANs.
Wireshark, Tcpdump, Ettercap, Dsniff, EtherApe, Paros, Fiddler, Ratproxy, SSLstrip
Describe the Penetration Testing Tool
Rootkit Detectors
List some tools
Directory and file integrity checker to detect root kits.
AIDE, Netfilter, PF: Open BSD Packet Filter
Describe the Penetration Testing Tool
Fuzzers
List some tools
Used by threat actors to discover a computer’s security vulnerabilities.
Skipfish, Wapiti, W3af
Describe the Penetration Testing Tool
Forensic Tools
List some tools
Used to discover evidence existing on a computer.
Sleuth Kit, Helix, Maltego, Encase
Describe the Penetration Testing Tool
Debuggers
List some tools
Used to reverse engineer binary files when writing exploits.
GBD, WinDbg, IDA Pro, Immunity Debugger
Describe the Penetration Testing Tool
Hacking Operating Systems
List some tools
Specially designed operating systems preloaded with tools optimised for hacking.
Kali Linux, Knoppix, BackBox Linux
Describe the Penetration Testing Tool
Encryption Tools
List some tools
Used to encode data to prevent unauthorised access, whether for legitimate or malicious means.
VeraCrypt, CipherShed, OpenSSH, OpenSSL, Tor, OpenVPN, Stunnel
Describe the Penetration Testing Tool
Vulnerability Exploitation Tools
List some tools
Used to identify whether a remote host is vulnerable to a security attack.
Metasploit, Core Impact, Sqlmap, Social Engineer Toolkit, Netsparker
Describe the Penetration Testing Tool
Vulnerability Scanners
List some tools
Used to scan a network or system to identify open ports or other weaknesses.
Nipper, Secunia PSI, Core Impact, Nessus, SAINT, Open VAS
Question
Which penetration testing tool uses algorithm schemes to encode the data, which then prevents access to the data.
Name the tool, not the attack type!
List some tools
Encryption Tools
VeraCrypt, CipherShed, OpenSSH, OpenSSL, Tor, OpenVPN, Stunnel
Question
Which penetration testing tools is used by black hats to reverse engineer binary files when writing exploits? They are also used by white hats when analysing malware.
List some tools
Debuggers
GBD, WinDbg, IDA Pro, Immunity Debugger
Question
Which penetration testing tool is used to probe and test a firewall’s robustness?
List some tools
Packet Crafting Tools
Hping, Scapy, Socat, Yersinia, Netcat, Nping, Nemesis
Question
Which penetration testing tool is used by white hats to sniff out any trace of evidence existing on a computer?
List some tools
Forensic Tools
Sleuth Kit, Helix, Maltego, Encase