Network Attacks Flashcards
Malware
Spoofing
Packet Sniffing
using hardware or software tools to capture and inspect data in transit
Packet Flooding
backdoors
eaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms
intended to help programmers conduct troubleshooting or administrative tasks.
packet sniffing
using hardware or software tools to capture and inspect data in transit
DDos attack
attack that targets a network or server and floods it with network traffic from multiple servers/computers
DOS attack
like a ddos, but can be anything that stops the network from working
TCP Handshake: Syn
A synchronize request from client to server to sync data flow
TCP Handshake: Syn/Ack
An acknowledgement of the request to sync and agreement to procced
TCP Handshake: Ack
A final message to acknowledge an open the sync from the client to the server
ICMP DOS attack
attacker repeatedly sending ICMP packets to a server
Syn flood DOS Attack
Flooding the server with syn requests to shut it down
Ping of death
AN ICMP DOS attack where a single oversized (more than 64KB) ICMP packet is sent
tcpdump
command-line network protocol analyzer
lightweight, converts key information about network traffic into formats easily read by humans
displays the source IP address, destination IP addresses, and the port numbers being used in the communications.