Network Attacks Flashcards
§ A logical communication endpoint that exists on a computer or server
Port
A logical communication opening on a server that is listening for a
connection from a client
Inbound Port
A logical communication opening created on a client in order to call out
to a server that is listening for a connection
Outbound Port
Ports 0 to 1023 are considered ______ and are assigned by the
Internet Assigned Numbers Authority (IANA)
Well-Known Ports
Ports 1024 to 49,151 are considered ______ and are usually assigned
to proprietary protocols
Registered Ports
Ports 49,152 to 65,535 can be used by any application without being
registered with IANA
Dynamic or Private Ports
Any port that is associated with a service or function that is non-essential
to the operation of your computer or network
Unnecessary Port
A logical communication opening on a server that is listening for a
connection from a client
Inbound Port
Term used to describe many different types of attacks which attempt to
make a computer or server’s resources unavailable
Denial of Service (DOS)
A specialized type of DoS which attempts to send more packets to a
single server or host than they can handle
Flood Attack
An attacker attempts to flood the server by sending too many ICMP echo
request packets (which are known as pings)
Ping Flood
Attacker sends a ping to subnet broadcast address and devices reply to
spoofed IP (victim server), using up bandwidth and processing
Smurf Attack
Attacker sends a UDP echo packet to port 7 (ECHO) and port 19
(CHARGEN) to flood a server with UDP packets
Fraggle Attack
Variant on a Denial of Service (DOS) attack where attacker initiates
multiple TCP sessions but never completes the 3-way handshake
SYN Flood
A specialized network scan that sets the FIN, PSH, and URG flags set and
can cause a device to crash or reboot
XMAS Attacj
An attack that sends an oversized and malformed packet to another
computer or server
Ping of Death
Attack that breaks apart packets into IP fragments, modifies them with
overlapping and oversized payloads, and sends them to a victim machine
Teardrop Attack
Attack which exploits a security flaw to permanently break a networking
device by reflashing its firmware
Permanent Denial of Service
Attack that creates a large number of processes to use up the available
processing power of a computer
Fork Bomb
A group of compromised systems attack simultaneously a single target to
create a Denial of Service (DOS)
Distributed Denial of Service (DDoS)
Attack which relies on the large amount of DNS information that is sent in
response to a spoofed query on behalf of the victimized server
DNS Amplification
Identifies any attacking IP addresses and routes all their traffic to a nonexistent server through the null interface
Blackholing or Sinkholing
Occurs when an attacker masquerades as another person by falsifying
their identity
Spoofing
What can prevent small scale DDoS?
IPS