Module2: Denial of Service and Social Engineering Flashcards

1
Q

Why are DoS attack considered so ‘nasty’?

A
  • One of the easiest attacks to launch
  • Hard to trace the attacker
  • Solving the attack often involves shutting down the service - self DoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two types of DoS attacks?

A
  • Flooding DoS attack

- Logic DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a flooding DoS attack?

A

Flood of real-looking but unnecessary data so that its resources are consumed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a logic DoS attack?

A

Exploit the vulnerabilities of the target intelligently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 10 types of DoS attacks?

A
  • ping Flood
  • TCP/SYN attack
  • Land attack
  • Other TCP attacks
  • Tear drop attack
  • Ping of death
  • Smurf attack
  • UDP Flood
  • HTTP verb attacks
  • SSL-based DDoS attacks
  • Botnet based DDoS attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DoS ping attack?

A

Send large ‘pings’ to a server non-stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DoS TCP-SYN attack?

A

Victim is flooded with spoofed TCP SYN requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DoS Land attack?

A

Attacker sends a TCP SYN segment that has been tweaked so that the source IP address and the destination IP address are both that of the victim machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DoS tear drop attack?

A

An attacker repeatedly fragments IP packets, sends all but one packet to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DoS ping of death attack?

A

Fragmented ping packet - breaks several systems vulnerable to this attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a DoS smurf attack?

A

ICMP echoes on a network are redirected to the victims host. The ICMP echo was tweaked with source IP = the victims IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a DoS UDP flood?

A

Spams all ports with UDP requests for ICMPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DoS HTTP Verb attack?

A

Make several get requests from a single page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DoS SSL-based attack?

A
  • SSL connections are heavy

- Make several requests to high-load sections of the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DoS botnet attack?

A

Deploy a botnet to attack a host with a SYN attack - Mirai is an example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you prevent DoS attacks?

A
  • Block invalid requests
  • Whitelist IP addresses
  • CAPTCHA
  • Match incoming requests (counter-attack)
  • Backup
  • DDoS protective service
  • Redundancy
17
Q

What are the four social engineering ‘tricks’?

A
  • Impersonation
  • Ingratiation (appeal to vanity)
  • Diffusion of responsibility (convince that information has been given by other people in the company)
  • Plain old friendliness (appeal to the helpful nature)
18
Q

What is dumpster diving?

A

Collect information from company’s trash.

19
Q

What is social engineering by phone?

A

Call up and imitate someone.

20
Q

What is shoulder surfing?

A

Watch over your shoulder and get information.

21
Q

What is baiting?

A

Send legit email - get user’s information

22
Q

What is phishing?

A

Legit looking email to extract information from user

23
Q

What is pharming

A

altering DNS poisoning

24
Q

What is phlashing?

A

Permanent DoS

25
Q

What is reverse social engineering?

A

Get the victim to contact the attacker

26
Q

How can you mitigate social engineering attacks?

A
  • Education

- Policies