Network Attacks Flashcards
Wireless
Evil Twin:
Unexpected duplicate wireless networks with similar names.
Sign: Users connecting to a malicious access point unwittingly.
Wireless
Rogue Access Point:
Unauthorized wireless access points on the network.
Sign: Unauthorized devices connecting to the network.
Wireless
Bluesnarfing:
Unauthorized access to Bluetooth-enabled devices.
Sign: Unauthorized access to Bluetooth devices and data theft.
Wireless
Bluejacking:
Unsolicited messages or files sent via Bluetooth.
Sign: Unexpected pop-up messages or files on Bluetooth devices.
Wireless
Disassociation:
Frequent disconnections from the wireless network.
Sign: Network interruptions and potential denial of service.
Wireless
Jamming:
Sudden disruptions in wireless signal strength.
Sign: Inability to connect or maintain wireless connections.
Wireless
RFID/NFC Attacks:
Unauthorized RFID/NFC device scanning.
Sign: Unauthorized access to RFID/NFC data or systems.
Wireless
Initialization Vector (IV):
Abnormal patterns in IVs in wireless traffic.
Sign: Suspected encryption vulnerabilities or weak keys.
On-Path Attack (MITM/MITB)
Unusual Network Behavior:
Suspicious redirection of traffic.
Sign: Intercepted or manipulated communication between parties.
Layer 2 Attacks
ARP Poisoning:
Frequent ARP table changes or conflicts.
Sign: Misdirected network traffic or man-in-the-middle attacks.
Layer 2 Attacks
MAC Flooding:
Excessive MAC address table entries.
Sign: Network slowdown or failure due to resource exhaustion.
Layer 2 Attacks
MAC Cloning:
Duplicate MAC addresses on the network.
Sign: Unauthorized devices impersonating legitimate ones.
DNS Attacks
Domain Hijacking:
Sudden changes in DNS records.
Sign: Unauthorized control over domain settings.
DNS Attacks
DNS Poisoning:
Incorrect DNS resolutions.
Sign: Users redirected to malicious websites.
DNS Attacks
URL Redirection:
Unwanted URL redirects.
Sign: Users directed to malicious websites.