Network Attacks Flashcards
Denial of Service
Occurs when one machine continually floods a victim with requests for services
TCP SYN Flood
Occurs when an attacker initiates multiple TCP sessions, but never completes them
Smurf Attack (ICMP Flood)
Occurs when an attacker sends a ping to a subnet broadcast address with the source IP spoofed to be that of the victim server
Distributed Denial of Service (DDOS)
Occurs when an attacker uses multiple computers to ask for access to the same server at the same time
Botnet
A collection of compromised computers under the control of a master node
On-Path/Man-in-the-Middle (MITM) Attack
Occurs when an attacker puts themselves between the victim and the intended destination
Session Hijacking
Occurs when an attacker guesses the session ID that is in use between a client and a server and takes over the authenticated session
DNS Poisoning
Occurs when an attacker manipulates known vulnerabilities within the NDS to reroute traffic from one site to a fake version of that site
DNSSEC
Uses encrypted digital signatures when passing DNS information between servers to help protect it from poisoning
Rogue DHCP Server
A DHCP server on a network which is not under the administrative control of the network administrators
Spoofing
Occurs when an attacker masquerades as another person by falsifying their identity
IP Spoofing
Modifying the source address of an IP packet to hide the identity of the send or impersonate another client
MAC Spoofing
Changing the MAC address to pretend the use of a different network interface card or device
MAC Filtering
Relies on a list of all known and authorized MAC addresses
ARP Spoofing
Sending falsified ARP messages over a local area network
VLAN Hopping
- Ability to send traffic from on VLAN into another, bypassing the VLAN segmentation you have configured within your Layer 2 networks
Double Tagging
Connecting to an interface on the switch using access mode with the same VLAN as the native untagged VLAN on the trunk