Recognizing Security Threats Flashcards
Ping of death and Unreachable gateway are two types of what?
DOS attacks
What feature of loadbalancers can be employed to mitigate DDoS attacks?
TCP SYN cookie option
what type of permanent DoS attack can be done remotely?
Phlashing denial of service
what type of DoS attack involves spoofing a victim’s IP address to send large of number of pings to the network broadcast address so that the victims machine will be overwhelmed with the responses?
Smurfing
list the steps of a SYN Flood DoS attack
1) attacker sends SYN with flag set to 1
2) server responds with SYN-ACK and reserves memory waiting for response
3) attacker does not respond and instead sends another SYN and continues until memory is used up
Which type of DDoS attack tool incorporates Tribal Flood Network techniques
Stacheldraht
What two techniques enhance the effectiveness of a DoS attack?
Reflective/Amplified
DNS amplification attack works by the attacker sending what to an open resolver (DNS server)? Then what happens?
the attacker sends a small DNS message using the victim’s IP address as the source. It returns all known information about the DNS zone to the victim’s server.
Which version of NTP can prevent an NTP reflection attack?
4.2.7
What packet/protocol abuse software is used by attackers to by-pass firewall restrictions? How does it do it?
Iodine
It allows IPv4 traffic to be encapsulated in DNS packets
list 5 types of spoofing
1) ARP spoofing (attacker’s MAC becomes the gateway)
2) MAC spoofing (forges MAC address)
3) IP Spoofing
4) Email Spoofing
5) DNS spoofing (cache poisoning)
What simple technique can be applied to defeat brute force attacks?
Setting an account lock-out policy
Session Fixation, Session Sidejacking and Cross-site scripting are techniques used in what type of attack?
Session Hijacking
what type of session hijacking involves an attacker setting the session ID ahead of time then disconnecting the user after authentication has completed to steal their ID?
Session Fixation
an attacker steals the session key from memory on the victim’s computer, what attack is this called?
Session sidejacking