Network Attacks Flashcards

1
Q

What is a DNS Poisoning attack?

A

The act of entering false information into a DNS cache, so that DNS queries return an incorrect response and users are directed to the wrong websites. Also known as DNS spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a DNS Hijacking attack?

A

A type of DNS attack in which DNS queries are incorrectly resolved in order to unexpectedly redirect users to malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Domain Hijacking attack?

A

A type of attack in which someone takes over a domain, often through social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Address Resolution Protocol (ARP) do?

A

ARP sits between the Network and Data layer, translating between the two of them. It translates from MAC to IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ARP Poisoning?

A

A type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is MAC Cloning?

A

When a bad actor spoofs the MAC address of another system to intercept traffic intended for that computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MAC Flooding?

A

When a bad actor floods a switch with bogus MAC addresses. As a result, the MAC address table begins to fill. The switch then fail-opens, which essentially turns it into a hub. A bad actor can now sniff out any packets they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Denial of Service (DoS) attack?

A

An attack that is meant to shut down a machine or network, making it inaccessible to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Distributed Denial of Service (DDoS) attack?

A

An attack against a network or website using many pcs. It often includes a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of DDoS attacks?

A

Reflected DDos, Amplified DDoS, and Coordinated DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Reflected DDoS?

A

A DDoS attack in which a service request is created using the spoofed IP address of the target. These requests to something like a time server are routed to the target to overwhelm it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Amplified DDoS?

A

A DDoS attack in which a service request is created using the spoofed IP address of the target. The service request asks for an increased payload to overwhelm the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Coordinated DDoS?

A

A DDoS attack in which multiple attackers are attempting to bring the target offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Man-in-the-Middle attack?

A

An attacker captures traffic between an authorized user and a user. They can play that traffic back to the server later to gain access to some kind of resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Man-in-the-Browser attack?

A

A form of man-in-the-middle attack where an attacker is able to insert himself into the communications channel between two trusting parties by compromising a Web browser used by one of the parties, for the purpose of eavesdropping, data theft and/or session tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Rogue Access Point attack?

A

A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker. An illegitimate access point plugged into a network to create a bypass from outside into the legitimate network.

17
Q

What is an Evil Twin?

A

A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. Copy of a legitimate access point. Can scrape credentials or reroute to malicious websites.

18
Q

What is a Disassociation Attack?

A

A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point.

19
Q

What is an Initialization Vector?

A

Extra data tied to encryption to make it harder to spot similarities between packets that have been encrypted. It is random.

20
Q

What is an Initialization Vector Attack?

A

An attack that is focused on the initialization vector.

21
Q

What is a Radio Frequency Identifier (RFID) attack?

A

An attack that uses middleware to intercept data sent from an RFID device and an RFID reader. It can be used to either clone or spoofing.

22
Q

What is a Near Field Communication (NFC) attack?

A

A device is placed that pulls data from an NFC device. It can be used to modify data or eavesdrop.

23
Q

What is Jamming?

A

Interrupting wireless (typically 2.4GHz) signals whether intentionally or unintentionally.

24
Q

What is Bluejacking?

A

When someone pulls data from an active bluetooth connection.

25
Q

What is Bluesnarfing?

A

When someone puts data in an active bluetooth connection in an unauthorized manner.