Network-Based Attacks Flashcards
What is a set of formal rules that describe the functionality of how to send and receive data?
A protocol
What is a software implementation that executes the formal rules of a protocol for a specific computing platform?
A service
Through what method does Linux implement protocols such as DNS?
Daemons
Which Nmap enumeration script can assist with conducting cache snooping against an internal DNS server?
dns-cache-snoope.nse
What kind of attack is characterized by an attacker knowing the websites an organization frequents, and infecting the webpage with malware?
Waterholing
Which attack method is characterized by impersonating a victim’s DSN server, forcing them to navigate to a malicious website?
DNS spoofing
Which attack method is characterized by overwriting the DNS resolver cache on a DNS server with a malicious web address, sending the user a malicious site instead of the intended one?
DNS cache poisoning
What is a type of attack where a malicious device sends a false ARP message to other hosts on the network in an attempt to impersonate another machine, thus linking its MAC address with another host IP on the network?
ARP poisoning/spoofing
What kinds of services does NetBIOS provide?
Protocol management, messaging, data transfer, hostname resolution
Which protocol mimics the functionality of DNS for IPv4 and IPv6 hostname resolution for hosts operating on small networks, and what port does it operate on?
LLMNR, on port 5355/UDP
Which tool is a Python script that acts as a poisoner for LLMNR, NBT-NS and MDNS and aids pentesters by poisoning name resolution and compromising usernames and hash values with a rogue authentication server?
Responder
What sequence of protocols do most Windows hosts follow for hostname resolution?
Windows hosts will try DNS first, then LLMNR, and if that is unavailable, then NetBios Name Service (NBNS).
What service do Microsoft Windows clients connect to to obtain and configure the automatic web proxy settings for Internet Explorer, and is a popular vector for Responder attacks?
WPAD (Windows Proxy Auto-Discovery Protocol)
What are two methods to mitigate WPAD (Windows Proxy Auto-Discovery) protocol attacks?
1) Create an entry in your DNS server to point to your organization’s proxy server 2) Disable auto-detect settings in Internet Explorer, preferably with a group policy
Which built-in tool in Responder allows you to perform relay attacks against NTLM?
Multi-Relay
What are three attacks against user passwords?
Brute-Force & Dictionary Attacks, Password Spraying, and Hash Cracking