Network Attacks Flashcards

1
Q

What’s the difference between a hub and a switch network?

A

Hub sends all incoming data to all nodes; nodes ignore if not addressed to them.

Switches know which connection goes to which node, so sends packets to the right node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the OSI 7 Layer Model?

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TCP/IP?

A

Transmission Control Protocol / Internet Protocol is a set of networking protocols that allows two or more computers to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a socket?

A

Socket bound to a port that the TCP layer can identify the application that data is destined to be sent to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is port spoofing?

A

Port spoofing is using different ports meant for acceptance of other data.

If security infrastructure only determines traffic legitimacy by port, they won’t notice port spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is deep packet inspection?

A

Used to locate, identify, classify, reroute or block packet with specific data or code payloads that conventional packet filtering cannot detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is port scanning?

A

A process which checks a host ports to see which are open, closed or filtered and listens to data arriving at and leaving a port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some basic scans?

A
  • Zenmap Quick Scan
  • TCP Connect Scan
  • Specific Port Scan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is TCP Connect() Scan?

A
  • Known as Vanilla scan
  • If port is reachable, connect for further probing.
  • Very noisy and will get logged.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are pros & cons of TCP Connect() scan?

A

Pros: no special privileges required, accurate in determining TCP services, can find open, closed & filtered ports

Cons: slow, easily detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is half open scan?

A

Immediately end connection using RST packet but port remains open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are pros & cons of a TCP SYN scan?

A

Pros: faster, stealthy & find open, closed and filtered ports

Cons: requires privilege, and some firewalls watch for SYNs to restricted ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are five of the advanced port scanning techniques?

A
  • Random
  • Slow
  • Fragmentation
  • Decoy
  • Coordinated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is fragmentation scan?

A

All IP packets that carry data can be fragmented, so we split probe packets into several IP fragments, firewalls may assume this fragment was allowed before already, so let through.

Advantage: difficult to detect scan

Disadvantage: not working on all OS, can crash firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a decoy scan?

A

Scanning by spoofing multiple addresses so the server does not know who is the actual scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is packet sniffing?

A

It is a technique whereby packet data flowing across the network is detected and observed.

17
Q

What is passive sniffing?

A

It is for hub networks where you rely on the promiscuous mode feature of a network interface controller to sniff packets since all packets are transmitted to every node.

18
Q

What is active sniffing?

A

It is for switch networks where an attacker spoofs the ARP reply to cause network switch to push traffic meant for one node to the attacker node.

19
Q

What is Address Resolution Protocol?

A

Primarily used to translate IP address to Ethernet MAC addresses; each host maintains a table (ARP cache) of IP to MAC addresses.

Consists of request & reply message type with NO authentication so request & replies can be forged.

20
Q

What is ARP poisoning?

A

A forged ARP reply is sent to source of ARP request; source computer ARP cache is updated with forged entry.

By spoofing network switch, all hosts on subnet will route through the attacker’s machine; otherwise you have to poison ARP cache of every host on the subnet.

21
Q

What are the 3 ways to ARP poison?

A
  • Broadcast Request
  • Request Response
  • Unsolicited Response