Networks Attacks Flashcards

1
Q

What is Wireless

A

Wireless communication is the transfer of information between two or more points that do not use an electrical conductor as a medium for the transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Evil twin

A

A wireless access point that deceives users into believing that it is a legitimate network access point.

might just have a similar name (SSID) to the legitimate one, or the attacker might use some DoS technique to overcome the legitimate WAP. This attack will not succeed if authentication security is enabled on the WAP, unless the attacker also knows the details of the authentication method. However, the evil twin might be able to harvest authentication information from users entering their credentials by mistake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Rogue access point

A

A rogue access point is one that has been installed on the network without authorization, whether with malicious intent or not. It is vital to periodically survey the site to detect rogue WAPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Bluesnarfing

A

A wireless attack where an attacker gains access to unauthorized information on a device using a Bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluejacking

A

Sending an unsolicited message or picture message using a Bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Disassociation

A

Rather than fully deauthenticating the station. A disassociated station is not completely disconnected, but neither can it communicate on the network until it reassociates.

sends a stream of spoofed frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Jamming

A

An attack in which radio waves disrupt 802.11 wireless signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Near-field communication (NFC)

A

A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Radio frequency identifier (RFID)

A

A means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Initialization vector (IV)

A

Initialization vector (IV) or starting variable (SV)[1] is an input to a cryptographic primitive being used to provide the initial state. The IV is typically required to be random or pseudorandom, but sometimes an IV only needs to be unpredictable or unique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is On-path attack (previously known as man-in-the-middle attack/man-in-the-browser attack)

A

An attack when the web browser is compromised by installing malicious plug-ins or scripts, or intercepting API calls between the browser process and DLLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Layer 2 attacks

A

Is the process of using devices and MAC addresses on a LAN to segment a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Address resolution protocol (ARP) poisoning

A

A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Media access control (MAC) flooding

A

A variation of an ARP poisoning attack where a switch’s cache table is inundated with frames from random source MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is MAC cloning

A

MAC Cloning is setting the MAC address of your PC or any other MAC address as your device WAN port and this is one of the methods to fix connectivity issues. MAC stands for Media Access Control and this is the hardware address that the Network Interface Card is manufactured with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Domain name system (DNS)

A

The Domain Name System (DNS) resolves fully qualified domain names (FQDNs) to IP addresses. It uses a distributed database system that contains information on domains and hosts within those domains. The information is distributed among many name servers, each of which holds part of the database. The name servers work over port 53. Domain name resolution is a security-critical service and the target of many attacks on both local network and the Internet.

17
Q

What is Domain hijacking

A

A type of hijacking attack where the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity. Sometimes referred to as brandjacking.

18
Q

What is DNS poisoning

A

A network-based attack where an attacker exploits the traditionally open nature of the DNS system to redirect a domain name to an IP address of the attacker’s choosing.

19
Q

What is Universal resource locator (URL) redirection

A

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet. It is also referred to as a web address. You redirect it.

20
Q

What is Domain reputation

A

If your domain, website, or email servers have been hijacked, they are likely to be used for spam or distributing malware. This will lead to complaints and the likelihood of the domain being listed on a blacklist.

21
Q

What is Distributed denial-of-service (DDoS)

A

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

22
Q

What is Network DDOS attack

A

Some types of DDoS attacks simply aim to consume network bandwidth, denying it to legitimate hosts, by using overwhelming numbers of bots. Others cause resource exhaustion on the hosts’ processing requests, consuming CPU cycles and memory. This delays processing of legitimate traffic and could potentially crash the host system completely.

23
Q

What is Application DDOS attack

A

Targets vulnerabilities in the headers and payloads of specific application protocols.

24
Q

What is Operational technology (OT) DDOS attack

A

An OT is a communications network designed to implement an industrial control system rather than data networking.
DDoS attacks against the controllers in such networks can use the same techniques as against computer networks. Also, because of the limited processing ability of some controller types, older DDoS techniques and still be applied

25
Q

What is Malicious code or script execution

A

Automation using scripting means that each configuration or build task is performed by a block of code. The script will take standard arguments as data, so there is less scope for uncertainty over configuration choices leading to errors. A script will use the following elements:

Parameters that the script takes as input data (passed to the script as arguments).
Branching and looping statements that can alter the flow of execution based on logic conditions.
Validation and error handlers to check inputs and ensure robust execution.
Unit tests to ensure that the script returns the expected outputs, given the expected inputs.

26
Q

What is PowerShell

A

A command shell and scripting language built on the .NET Framework.
The preferred method of performing Windows administration tasks

27
Q

What is Python

A

High-level programming language that is widely used for automation.
Is a popular language for implementing all kinds of development projects, including automation tools and security tools, as well as malicious scripts (python.org).

28
Q

What is Bash

A

A command shell and scripting language for Unix-like systems. The most common Linux command line.

29
Q

What Macros

A

A sequence of actions performed in the context of a word processor, spreadsheet, or presentation file. While the user may be able to record macro steps using the GUI, ultimately macros are coded in a scripting language.

30
Q

What is Visual Basic for Applications (VBA)

A

Programming languages used to implement macros and scripting in Office document automation.