Networking Review II Flashcards
Explain in simple terms what is taking place in each of the three packets:
- **A device is asking who the owner of
192.168.47.254
is.** - **A device responds “I am the owner, and here is my MAC address.”**
- **Then, a malicious device says, “Actually, I am the owner, here is a new MAC address.”**
What type of attack is this?
This is an ARP poisoning attack
What is the MAC address of the good device?
00:50:56:f9:f5:54
What is the MAC address of the hacker’s device?
00:0c:29:1d:b3:b1
What negative impact might this type of attack have?
Traffic can be routed to the hacker’s device instead of the correct, intended device.
Explain in simple terms what is taking place
There are many DHCP requests requesting IP addresses from the DHCP server.
What type of attack is this?
DHCP starvation
Why is the destination IP 255.255.255.255
for all packets?
This is a broadcast IP, it is broadcasting the message across the whole local network to all devices.
What negative impact might this type of attack have?
The DHCP server could run out of IP addresses and not be able to issue IPs to new devices connecting on the network.
Explain in simple terms what is taking place
There are many SYN requests. These are checking all the ports to see which are open.
What type of attack is this?
SYN Scan.
Is this type of activity always an attack? In other words, can a security professional benefit from what is taking place?
A security professional can use this same method to determine which ports are open in case they need to close them
What negative impact might this type of attack have?
A hacker could use this method to determine what ports exist, and which are open. Then the attacker could launch attacks against the open ports, as the ports can identify what services are potentially running.
What are the different security types available for Wireless communications? List them in order from least to most secure.
WEP > WPA > WPA2
What is 802.11
Standards for wireless network devices.