Network Attacks Flashcards
DoS: TCP SYN Flood
Occurs when an attacker initiates multiple TCP sessions, but never completes them
DoS: Smurf Attack (ICMP Flood)
Occurs when an attacker sends a ping to a subnet broadcast address with the source IP spoofed to be that of the victim server
DDoS Attack
Occurs when an attacker uses multiple computers to ask for access to the same server at the same time.
(Ex: Botnet/Zombies)
On-Path/Man-in-the-Middle Attack
Occurs when an attacker puts themselves between the victim and the intended destination
Session Hijacking
Occurs when an attacker guesses the session ID that is in use between a client/server and takes over the authenticated session
DNS Poisoning
Occurs when an attacker manipulates known vulnerabilities within the DNS to reroute traffic from one site to a fake version of that site
DNSSEC
Uses encrypted digital signatures when passing DNS info between servers to help protect it from poisoning
Ensure server has the latest security patches/updates
Rogue DHCP Server
A DHCP server on a network which is not under the administrative control of network admins
IP Spoofing
Modifying the source address of an IP packet to hide the identity of the sender or impersonate another client (Layer 3)
ARP Spoofing
Sending falsified ARP messages over a LAN
Can be used as a precursor to other attacks
To avoid: Set up good VLAN segmentation
VLAN Hopping
Ability to send traffic from one VLAN to another, bypassing the VLAN segmentation configured (Layer 2)
Double Tagging
Connecting to an interface on the switch using access mode with the same VLAN as the native untagged VLAN on the trunk
Attacker tries to reach a different VLAN using the vulnerabilities in the trunk port configuration
Switch Spoofing
Attempting to conduct a DTP (Dynamic Trunking Protocol) negotiation
To avoid: Disable dynamic switchport mode on your switchports
Malware
Designed to infiltrate a computer system & possibly damage it without the user’s knowledge/consent
Virus
Made up of malicious code that is run on a machine without the user’s knowledge & infects it whenever the code is run