On Path Attacks 2.4 Flashcards

1
Q

In an […] attack, an attacker sits in the middle of a conversation between two or more devices and is able to see, redirect, and possibly even modify the data being sent between them

A

On Path / Man in the Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of On Path attack, […], has the attacker send fake ARP messages to link the MAC address of their computer with the IP address of a legitimate device

A

ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In an […] attack, malware on a victims PC uses a proxy to redirect all internet traffic to the attackers PC before being sent out of the network. This means all data, even if encrypted, is sent in-the-clear to the attackers PC

A

On Path Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The attack initiated after gaining information through an On Path attack is called a […] attack.

The goal is to use the information and pose as someone else to gain access to more sensitive systems

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a user authenticates with a web server, it gains a session ID

In a […] attack, an attacker steals the session ID that’s associated with a user which could then be used to impersonate them

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To prevent session hijacking you should […] your data end to end so an attacker never sees it in the first place

A

Encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly