Network threats Flashcards
What are the common Network Attacks?
DOS
Spoofing
Session Hijacking
Replay Attacks
Transitive Attacks
DNS Attacks
ARP Poisoning
What is a port?
Logical communication endpoint that exists on a computer or server
What is an inbound port
A logical communication opening on a serve that is listening for a connection from a client
What is an outbound port
Logical communication opening on a client that is used to send requests and data to another devices listening inbound port
What are the well known ports
0-1023 They are designated by IANA
What are the registered ports
1024-49,151 | Considered registered and assigned to proprietary protocols
What are the Dynamic\private ports
49,152 to 65,535 These can be used by any application without being registered by IANA
What is a DOS attack and the 5 main methods?
An attack with the intention of rendering a server or computer un-usable |
Common Methods:
Flood Attack
Fork Bomb
Ping of death
TearDrop
Permanent DOS
What are the different methods of flood attacks
Pingflood
Smurf Attachk
Fraggle Attack
SYN Attack
XMAS Attack
Describe a Smurf Attack
Attacker sends a ping to the subnet broadcast address, and devices reply with their IP, causing increase in bandwidth usage
Describe a Fraggle Attack
Attacker sends a UDP echo packet to port 7 and 19 to flood a server with UDP packets
SYN Attackes
Attacker iniciates multiple TCP session, but never completes the 3 way handshake
What is a Ping of death
Attack that sends an oversized and malformed packet to another computer or server
What is a Tear Drop Attack
Packets are broken into IP fragments, modified with overlapping and oversized payloads, and then sent to a vitcim
PDOS - what is it?
An attack which exploits a security flaw to permanently breaking a network device by flashing its firmware with unsigned software