Protecting Your Network Flashcards
when an attacker targets a DNS server with a bad one, sending spoofed DNS info, which will be cached and spread to other devices
DNS cache poisoning
extensions added for domain name resolution to prevent DNS cache poisoning, used by all the DNS root and top-level domains
Domain Name System Security Extensions (DNSSEC)
whenever one does something with a protocol that it was never meant to do and results in a threat
protocol abuse
the insertion of unwanted information into a packet using special software with the aim of breaking another system
malformed packets
the way and attack takes advantage of a vulnerability
attack surface
the process of attacking the ARP caches on hosts and switches, such as by sending false information
ARP cache poisoning
Cisco technology for avoiding ARP cache poisoning by keeping track of known good IP addresses and MAC addresses, in switches
Dynamic ARP Inispection (DAI)
technology that creates a list of MAC addresses for known DHCP servers and clients, used to prevent someone unknown (MAC address) sending DHCP server messages; sends an alarm to the appropriate person
DHCP snooping
a key network hardening technique, enchanced by adding DAI or DHCP snooping
switch port protection
single computer under the control of an operator in a DDoS attack
zombie/bot
a group of computers under the control of an operator in a DDoS atatck
botnet
attack that sends a large amount of packets to a server with that server’s IP address set as the source
reflection/reflective DDoS
form of DoS attack with the aim of kicking a client off of its WAP; a rogue AP nearaby acts as an alternative
deauthentication (deauth) attack
DoS attack lacking any malice from the attacker, such as when a site/server cannot handle the legitimate load it is under
friendly/unintentional DoS
unintentional DoS attack where a popular sites references a smaller site, resulting in a massive amount of traffice to that smaller site
slashdotting/Reddit hug of death
attack where the culprit tries to intercept a valid computer session to get authentication data
session hijacking
the addition of redundancy to a system to prevent loss?
fault tolerance
an attack where a malicious user probes an open port to gain information about the running services
banner grabbing
attack that takes a system connected to one VLAN and use switch commands to change the switch port connection to a trunk link
VLAN hopping
list on many devices that defines what a user can do with that device’s shared resources
access control list (ACL)
attack that uses encryption to lock a user out of a system, such as encrypting the hard drive; usually used to force users to pay money to get the device decrypted - crypto-ransomware
crypto-malware
program (not stand-alone) that is designed to replicate and activate (by user action); often replicates as code added to boot sector or extra code added to the end of executables; only replicates to other applications on a drive or to other drives; needs a host file to infect
virus
program that replicates exclusively through a network, replicating itself to any computer it sees on the network; can exploit vulnerabilities in program code, attack program code, programs, OS’s, protocols, etc.; does not need host files to infect
worm