On-path Attacks 2.4 Flashcards

1
Q

On-Path Attack

A
  • Formerly known as a Man in the Middle Attack
  • An attacker places themselves of two hosts communicating with each other.
  • The attacker can monitor and redirect traffic traversing the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Resolution Protocol (ARP)

A
  • Helps a device know where to send a packet to.
  • Uses a MAC or layer 2 addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP Message Types

A
  • ARP Request
  • ARP Reply
  • Reverse ARP Request
  • RARP Reply
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARP Poisoning

A
  • Also known as, ARP spoofing
  • Attacker can send messages, corrupt ARP table, and cause packets to be misrouted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On-Path Browser Attack

A
  • A MITM attack, formerly “Man in the Browser Attack”
  • Involves browser helper objects and browsers to conduct attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Process of an On-Path Browser Attack

A
  • Malware/Trojan will do all of the proxy work
  • Everything will look normal on the victim’s device.
  • Malware waits for the user to login into something important.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly