Network Attacks Flashcards

1
Q

What is 802.1X?

A

A network protocol for network access control.

Forces users connecting to the network to authenticate regardless of the connection type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When you authenticate to a network using 802.1X network access control where is your authentication request sent to and validated?

A

RADIUS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of network attack, while not always being inherently malicious, happens when an unauthorized wireless access point is added inside of your network?

A

Rogue access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of network attack sets up an access point to look like an existing network, tricking people into connecting to a network that they did not intend to?

A

Evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network attack uses bluetooth connectivity to send unsolicited messages to other devices without giving additional access to the device or posing any security risk other than the unsolicited messages?

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of network attack happens over a bluetooth connection and is used to transfer data from a bluetooth enabled device without authentication?

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of network attack takes advantage of unencrypted 802.11 communications and is able to kick an end user off a network causing a significant DoS attack?

A

Wireless deauthentication

Wireless disassociation attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of network attack decreases the signal-to-noise ratio at a network device using a physical device, in order to deny service to people trying to use it?

A
Wireless jamming.
Radio frequency (RF) jamming.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which types of attack are common with RFID technology?

A

RFID attacks:
Viewing communications (especially in the data is being transmitted unencrypted)
Spoofing the RFID reader, and writing your own data to the RFID tag
Signal jamming for the purpose of DoS
Decrypting communications, as many of the default decrpytion keys are on google.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is NFC?

A

Near field communication. It is a two way wireless communication.
Builds on RFID which is mostly one way.
Short range with encryption support.
Helps with bluetooth pairing and payment systems (like apple pay, holding your phone up to the card machine to pay) by putting a device or tag in close proximity to a reader.
Can also be used to build an NFC access token or identity “card”
Suffers from mostly all of the same attacks as RFID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cryptographic nonce?

A

An arbitrary number that is used once, for the time being.
A random or pseduo-random number, something that can’t be reasonably guessed.
Can also be a counter, as long as both sides can keep track of the count.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How would a nonce be used during the login process?

A

The server would first give you a nonce.
And then calculate your password hash using the nonce.
The end result is that each password hash sent to the host will be different, so a replay attack will not work, if the has is captured in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Since a nonce is most commonly associated with password randomization, how would a nonce be typically used to store a random password hash on a database permanently even if multiple users had the same password?

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAN IN THE MIDDLE NOW IS CALLED WHAT?

A

On-path attacks.

PLEASE REMEMBER THIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of attack creates an environment where all network traffic to the router from a victim’s computer on a local network is relayed through an attackers computer using mac address spoofing and a cache of which IP addresses belong to which mac address?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of attack takes place when an attacker’s trojan/malware will latch onto a victim’s browser and proxy all browser traffic of the victim through the attacker’s malware.

A

On-path browser attack

17
Q

How would one usually maintain a loop-free environment when dealing with network switches?

A

By using “Spanning Tree Protocol” (STP)

18
Q

When a switch is adding entries to its mac address table, what does it store other than just the mac addresses?

A

Output interfaces.
The switch stores the information about which output interface the traffic should be sent out on with each mac address in the table.

19
Q

Which network attack takes place when an attacker forces legitimate MAC addresses out of a MAC table by sending traffic with different source MAC addresses until the table is completely filled?

A

MAC flooding

20
Q

How does a switches’ behavior change once its MAC table is completely full?

A

It starts sending traffic to all interfaces, basically becoming a hub, and this makes a great opportunity for an attacker who has done some MAC flooding to start capturing all network traffic from all devices.

21
Q

Which attack is taking place when an attacker changes their MAC address in their network drivers to match the MAC address of a legitimate device that is on the network or has recently left the network?

A

MAC spoofing/MAC cloning

22
Q

What would be a way of effectively doing a dns poisoning attack on one victim without needing to take control over an entire dns server?

A

By modifying the client host file in a victim’s computer. The client host file takes precedent over DNS queries.

23
Q

Which attack would be taking place if an attacker were able to change the IP address that is sent out to those making queries to a DNS server to the IP of their own malicious website rather than the real IP address?

A

DNS poisoning/DNS spoofing

24
Q

Which attack would be taking place if an attacker gained access to the account that controls a domain at whichever registrar a site uses, through whatever means (maybe brute force, phishing, etc) , and made changes to the DNS names and DNS IP addresses associated with that particular website?

A

Domain hijacking

25
Q

What is the general wide-reading term for an attack where an attacker will obtain a domain name with a very similar name to a well known and trusted domain already in existence?

A

Domain hijacking

26
Q

Which specific type of attack would be taking place when an attacker obtained a URL very similar to a known and trusted domain/brand but with a small misspelling, typo, or using a different TLD?

A

Typosquatting/brandjacking

27
Q

What would be a direct future consequence to a business if their email services were infected/controlled for a period of time, causing malware or suspicious emails to be sent out on their behalf, OR, if their website were hijacked for a period of time and was serving malware or suspicious content?

A

The DOMAIN REPUTATION associated with the site(s) or email addresses would take a big hit. Sometimes causing their emails to end up in the spam folder or dropped, or causing search engines to give warnings while loading their website about the potential security risks associated with it or completely remove them from the search results, thus causing the company/brand to lose out on sales and customers.

28
Q

Which type of attack would be taking place if an attacker were to launch an army of computers in their botnet to use all the bandwidth or resources of a service, in order to bring it down?

A

DDoS

Distributed denial of service

29
Q

Which type of attack is taking place when an attacker is able to turn a very small message into a much larger message using another device or service (such as a dns server) to bring down a service or network.

A

DDoS amplification

30
Q

Which specific type of attack would be taking place if an attacker were to get the victim machines of his botnet to send a spoofed dns query to open dns resolvers which will turn into a very large response, with the goal of overwhelming a web server who has been spoofed in the original query?

A

DNS amplification DDoS

31
Q

What would be the typical machines controlled by hardware and software in an OT environment?

A

An operational technology environment (OT) would be one with industrial equipment, like electric power grids, traffic control, manufacturing plants, etc.

32
Q

Which program would be used to run a program with the extension .ps1?

A

Windows Powershell