Module 8 Flashcards

1
Q

Name 3 of the most common interception attacks:

A
  1. Man-in-the-Middle (MITM)
  2. Session Replay
  3. Man-in-the-Browser (MITB)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Man-in-the-middle (MITM) attack?

A
  • An attack that intercepts legitimate communication to eavesdrop on the conversation or impersonate one of the parties.
    • goal of an MITM attack is to eavesdrop on the conversation or impersonate one of the parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is session replay?

A
  • An attack in which an attacker attempts to impersonate the user by using the user’s session token.
    • session ID is a unique number that a web server assigns a specific user for the duration of the user’s visit (session)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Man-in-the-Browser (MITB)?

A
  • An attack that intercepts communication between a browser and the underlying computer.
    • occurs between a browser and the underlying computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Open Systems Interconnection (OSI) reference model?

A
  • Separates networking steps into a series of seven layers. Within each layer, different networking tasks are performed that cooperate with the tasks in the layers immediately above and below it. Each layer in the sending device corresponds to the same layer in the receiving device.
    • Note: OSI model was designed so that each layer is compartmentalized: different layers work without the knowledge and approval of the other layers. This means that if one layer is compromised, the other layers are unaware of any problem, which results in the entire communication being compromised.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the following OSI Layer 2 attack: address solution protocol poisoning.

Describe ARP Poisoning:

A
  • Address Solution Protocol (ARP): A device using TCP/IP on an Ethernet network can find the MAC address of another endpoint based on the IP address
    • ARP Poisoning: An attack that corrupts the ARP cache (impersonates another person’s identity (spoofing))
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the following OSI Layer 2 attack: Media access control attacks

A
  • Manipulates MAC addresses through spoofing. The target for these attacks is a network switch.
    • Network Switch: Device that connects network devices and has a degree of “intelligence”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two common attacks involving spoofing MAC addresses on a switch?

A
  1. Mac Cloning:An attack that spoofs a MAC address on a device so that the switch changes its MAC address table to reflect the new association of that MAC address with the port to which the attacker’s device is connected.
  2. Mac Flooding: An attack in which the memory of a switch is flooded with spoofed packets to force it to function like a network hub and broadcast frames to all ports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DNS attack and what are the two main consequences of this type of attack?

A
  • DNS-based attack substitutes a DNS address so that the computer is silently redirected to a different device.
  1. URL Redirection: An attack in which a user is redirected to another site.
  2. Domain Reputation: An attack in which the status of a site is manipulated to earn a low domain reputation score.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DNS Poisoning?

A

An attack that substitutes DNS addresses in a local lookup table so that the computer is automatically redirected to an attacker’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DNS Hijacking?

A

An attack that infects an external DNS server with IP addresses pointing to malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a distributed denial of service (DDoS)

A

Attack that uses many computers to bombard a system with “bogus” requests, overwhelming the system so that it cannot respond to legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is PowerShell?

A

A task automation and configuration management framework from Microsoft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Visual Basic for Applications (VBA)?

A
  • An eventdriven Microsoft programming language.
    • Used to create Macros: A series of instructions that can be grouped together as a single command.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What sort of protections has Microsoft implemented for macro attacks? (List 3)

A
  • Protected View (read only mode for Office files)
  • Trusted Documents
  • Trusted Location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Python?

A
  • A popular programming language that can run on several OS platforms.
17
Q

What is Bash?

A
  • The command language interpreter for the Linux/UNIX OS.
18
Q

What is tracert and traceroute? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Shows the details about the path a packet takes from a computer or device to a destination

19
Q

What is nslookup and dig? (OS Network Reconnaissance and Discovery Tools)

A

A DNS diagnostic utility; can be used in interactive mode but the non-interactive version of nslookup is easier and therefore is used more often

20
Q

What is theHarvester? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Provides information about email accounts, user names, and hostnames/subdomains from different public sources

21
Q

What is dnsenum? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

List DNS information of a domain

22
Q

What is sn1per? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Penetration testing tool

23
Q

What is Cuckoo? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Automated malware analysis system

24
Q

What is Nessus (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Vulnerability assessment tool

25
Q

What is scanless? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Tool for using websites to perform port scan

26
Q

What is nmap? (Third-Party OS Network Reconnaissance and Discovery Tools)

A

Network discovery and security auditing

27
Q

List some Linux text file manipulation tools:

A

head, tail, cat, grep, chmod, logger

28
Q

What are scripting tools used for? Name a popular scripting tool:

A
  • used to create scripts that facilitate tasks.
  • Popular scripting tool is Powershell or Python
29
Q

What is OpenSSL?

A

A cryptography library that offers open source applications of the TLS protocol.

30
Q

What is packet analysis?

A
  • examines the entire contents of the packet, which consists of the header information and the payload.
  • can also be used extensively for security
31
Q

What is Wireshark?

A

A popular GUI packet capture and analysis tool.

32
Q

What is Tcdump and Tcreplay?

A
  • Tcdump: A command-line packet analyzer.
  • Tcreplay: A tool for editing packets and then replaying the packets back onto the network to observe their behavior.
33
Q

What is industrial camoflauge?

A

An attempt to make the physical presence of a building as nondescript as possible so that to a casual viewer, the building does not look like it houses anything important.

34
Q

List some types of external perimeter defenses that can be used to restrict access to a physical location?

A

barriers, personnel, and sensors.

35
Q

List some types of internal physical security controls that can be used to secure a location:

A
  • Locks
  • Secure Areas
  • Protected Cable Distribution
  • Fire suppression
36
Q

What is computer hardware security?

A
  • Physical security of protecting endpoint hardware, such as laptops that can easily be stolen.
37
Q

What are some methods to physically protect endpoint hardware security?

A
  • Cable lock (device inserted into the security slot of a portable device to prevent its theft.)
  • Safe or Vault
38
Q

What is electromagnetic interference (EMI)? What is one method for protecting against EMI?

A
  • Electromagnetic fields that computer systems, printers, and similar digital electronic devices emit that cause interference
  • Faraday Cage: A metallic enclosure that prevents the entry or escape of an electromagnetic field.