Network Attacks Flashcards
What is a DNS Poisoning attack?
The act of entering false information into a DNS cache, so that DNS queries return an incorrect response and users are directed to the wrong websites. Also known as DNS spoofing.
What is a DNS Hijacking attack?
A type of DNS attack in which DNS queries are incorrectly resolved in order to unexpectedly redirect users to malicious sites.
What is a Domain Hijacking attack?
A type of attack in which someone takes over a domain, often through social engineering.
What does Address Resolution Protocol (ARP) do?
ARP sits between the Network and Data layer, translating between the two of them. It translates from MAC to IP.
What is ARP Poisoning?
A type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table.
What is MAC Cloning?
When a bad actor spoofs the MAC address of another system to intercept traffic intended for that computer.
What is MAC Flooding?
When a bad actor floods a switch with bogus MAC addresses. As a result, the MAC address table begins to fill. The switch then fail-opens, which essentially turns it into a hub. A bad actor can now sniff out any packets they want.
What is a Denial of Service (DoS) attack?
An attack that is meant to shut down a machine or network, making it inaccessible to its intended users.
What is a Distributed Denial of Service (DDoS) attack?
An attack against a network or website using many pcs. It often includes a botnet.
What are the three types of DDoS attacks?
Reflected DDos, Amplified DDoS, and Coordinated DDoS
What is a Reflected DDoS?
A DDoS attack in which a service request is created using the spoofed IP address of the target. These requests to something like a time server are routed to the target to overwhelm it.
What is an Amplified DDoS?
A DDoS attack in which a service request is created using the spoofed IP address of the target. The service request asks for an increased payload to overwhelm the target.
What is a Coordinated DDoS?
A DDoS attack in which multiple attackers are attempting to bring the target offline.
What is a Man-in-the-Middle attack?
An attacker captures traffic between an authorized user and a user. They can play that traffic back to the server later to gain access to some kind of resource.
What is a Man-in-the-Browser attack?
A form of man-in-the-middle attack where an attacker is able to insert himself into the communications channel between two trusting parties by compromising a Web browser used by one of the parties, for the purpose of eavesdropping, data theft and/or session tampering.