Network Attacks Flashcards
Denial of Service (DoS) Attack
Occurs when one machine continually floods a victim with requests for services
Smurf Attack (ICMP Flood)
Occurs when an attacker sends a ping to a subnet broadcast address with the source IP spoofed to be that of the victom server
Distributed DDos
Occurs when an attacker uses multiple computers to overload a server
On-path/Man in the middle attack
Occurs when an attacker puts themselves between the victim and the intended destination
Session Hijacking
Takes over the session completely; exploits session ids
DNS Poisoning
Occurs when an attacker manipulates known vulnerabilities within the DNS to reroute traffic from one site to a fake version of that site
Rogue DHCP Server
any DHCP server you don’t have control over that’s on your network
Spoofing
pretending to be someone else; change your IP to someone else’s etc.
VLAN Hopping
Ability to send traffic from one VLAN into another, bypassing the VLAN segmentation you have configured within your Layer 2 Networks
Malware
malicious software; damages systems
Virus
malicious code run on a machine without the user’s knowledge
Worms
a piece of mal software that can replicate itself without any action by the user
Trojan Horse
a piece of malicious software disguising as a piece of harmless software
Spyware
Gathers information about you
Key Logger
captures any key strokes made on the victim machine