Network Attacks Flashcards
Denial of Service (DoS) Attack
Occurs when one machine continually floods a victim with requests for services
Distributed Denial of Service (DDoS) Attack
Occurs when an attacker uses multiple computers to ask for access to the
same server at the same time
Botnet
A collection of compromised computers (zombies) under the control of a master node
On-Path/ Man-in-the-Middle (MITM) Attack
Occurs when an attacker puts themselves between the victim and the
intended destination
DNS Poisoning
Occurs when an attacker manipulates known vulnerabilities within the
DNS to reroute traffic from one site to a fake version of that site
Rogue DHCP Server
A DHCP server on a network which is not under the administrative
control of the network administrators
IP Spoofing
Modifying the source address of an IP packet to hide the identity of the
sender or impersonate another client
IP spoofing is focused at Layer 3 of the OSI model
MAC Spoofing
Changing the MAC address to pretend the use of a different network
interface card or device
MAC Filtering
Relies on a list of all known and authorized MAC addresses
ARP Spoofing and prevention
Sending falsified ARP messages
that can be used as a precursor to other attacks
set up good VLAN segmentation within your network
VLAN Hopping
Ability to send traffic from one VLAN into another, bypassing the VLAN
segmentation you have configured within your Layer 2 networks
Malware
Designed to infiltrate a computer system and possibly damage it without
the user’s knowledge or consent
Ransomware
Restricts access to a victim’s computer system or files until a ransom or
payment is received
Rogue Access Point
A wireless access point that has been installed on a secure network
without authorization from a local network administrator
Evil Twin
Wireless access point that uses the same name as your own network