Network Attacks Flashcards
§ A logical communication endpoint that exists on a computer or server
Port
A logical communication opening on a server that is listening for a
connection from a client
Inbound Port
A logical communication opening created on a client in order to call out
to a server that is listening for a connection
Outbound Port
Ports 0 to 1023 are considered ______ and are assigned by the
Internet Assigned Numbers Authority (IANA)
Well-Known Ports
Ports 1024 to 49,151 are considered ______ and are usually assigned
to proprietary protocols
Registered Ports
Ports 49,152 to 65,535 can be used by any application without being
registered with IANA
Dynamic or Private Ports
Any port that is associated with a service or function that is non-essential
to the operation of your computer or network
Unnecessary Port
A logical communication opening on a server that is listening for a
connection from a client
Inbound Port
Term used to describe many different types of attacks which attempt to
make a computer or server’s resources unavailable
Denial of Service (DOS)
A specialized type of DoS which attempts to send more packets to a
single server or host than they can handle
Flood Attack
An attacker attempts to flood the server by sending too many ICMP echo
request packets (which are known as pings)
Ping Flood
Attacker sends a ping to subnet broadcast address and devices reply to
spoofed IP (victim server), using up bandwidth and processing
Smurf Attack
Attacker sends a UDP echo packet to port 7 (ECHO) and port 19
(CHARGEN) to flood a server with UDP packets
Fraggle Attack
Variant on a Denial of Service (DOS) attack where attacker initiates
multiple TCP sessions but never completes the 3-way handshake
SYN Flood
A specialized network scan that sets the FIN, PSH, and URG flags set and
can cause a device to crash or reboot
XMAS Attacj