Network Attacks Flashcards

1
Q

How does a TCP Reset Attack work?

A

By sending a RST packet to immediately break the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a TCP Flooding Attack work?

A

By sending continuously sending packets that do not finish the 3rd step of the TCP handshake (sending acknowledgment packet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a countermeasure to the SYN flooding attack

A

SYN Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do SYN cookies work?

A

They do not store half open connections in queue.
This is done by asking for a hashed sequence number that can be decrypted using only a secret key from the server.
This value is H.
H will be sent as initial sequence number from the server.
H will not reach the attacker as the attacker must create half open connections to random IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the goal of the TCP session hijacking attack?

A

To inject data in a TCP connection, triggering buffer overflow at the receivers machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the requirement for the TCP session hijacking attack in terms of the sequence number?

A

It must inject data at the next sequence number.
If a packet uses x + theta, then the injected data will be stored theta spaces later, having no effect.
Furthermore, if theta is too large, it may fall out of the boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What countermeasures exist to make it difficult for attackers to spoof packets

A

Randomise initial sequence number.
Encrypt TCP payload and header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly