SEC CONCEPTS Flashcards
________ exist to connect devices on a network by using packet switching to receive and forward data to the destination device.
When exploited, ________ are able to be manipulated and configured in a way that allows for network packet sniffing
Switches
is an open-source collection of tools for network auditing and penetration testing (hacking into a network), and is one of many tools that can be used to sniff network traffic and passwords.
Dsniff
is a utility within the Dsniff collection, that is capable of conducting an attack known as Mac Flooding
Macof
is an attack that attempts to overload a switch by sending the targeted switch network traffic with different source MAC addresses.
MAC flooding
When the target switch receives a new frame with an unknown MAC, the switch will add it into its?
MAC Address Table (MAT)
If the switch receives thousands of theses new MAC addresses, ______________________________________________________________. The switch no longer is able to keep track of where these devices are and will then begin sending traffic to every interface that is on the switch, reducing the switch to a hub.
eventually the MAT will become filled and will not be able to add any more additional devices, and then can not start directing individual frames anymore
This enables an attacker to utilize a packet analyzer to easily capture packets and see anything on the network. During a MAC Attack can also shut down entirely, this is known as fail-open repeating mode and is a type of Denial-of-Service.
Mac Flooding
is a type of exploit at the switch that consists of compromising the ARP table by manipulating the MAC addresses so that IP addresses will point to another machine.
ARP Poisoning (aka ARP Spoofing)
ARP Poisoning (aka ARP Spoofing) is considered to be a type of ___________ attack where the ARP cache is poisoned and all packets are sent to the access point.
Man-In-The-Middle(MITM)
(True or False) ARP Spoofing can be considered a Man-In-Middle Attack?
True
What type of attack attempts to overload the MAT on a switch?
MAC Flood
provides a great amount of detailed information about the target router and situational awareness surrounding the target router and its environment.
Router reconnaissance
The scanning methods that are used to _________ routers, are the same methods that are used to enumerate any host target. IP addresses are scanned to identify available ports and services. Banner grabbing can also be used to identify the service version of ports that have been discovered
enumerate
is an application layer protocol that runs on UDP and is utilized to manage network devices that run on the IP Layer (i.e. Routers)
SNMP or Simple Network Management Protocol
SNMP passwords
- Read community strings are public and the device configuration of the device can be viewed with this password.
- Read/Write community strings are private. The device configuration is able to be modified with this password.
____________ is a virtual hierarchical database that is used by SNMP to internal manage network objects. SNMP passwords can be used to view and/or modify network objects.
Management Information Database (MIB)
____________ is an SNMP application that utilizes multiple GETNEXT requests, in order to search for and obtain SNMP data. It can be used as an enumeration tool gather to information that specifically pertains to routers. When port 161 (SNMP) is open and has a valid community string, router information is easily searchable
SNMPwalk
Router and SNMP enumeration can lead to the following:
- Network resource information (Routers, devices, share drives, etc)
- ARP and routing tables
- Traffic Statistics
- Network addressing topologies
- Information about network owner and location of the routing device
- Identify potential targets on network
- Routing policies and rules
- Implemented Security levels