Section 19.184 On-path Attacks Flashcards
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
On-path Attacks
An attack where the attacker positions their workstation logically between two hosts during communication
■ The attacker transparently captures, monitors, and relays communications between those hosts
Methods for On-Path Attacks
ARP Poisoning
Manipulating Address Resolution Protocol (ARP) tables to redirect
network traffic
Methods for On-Path Attacks
DNS Poisoning
Altering DNS responses to reroute traffic
Methods for On-Path Attacks
Rogue Wireless Access Point
Creating a fake wireless access point to intercept traffic
Methods for On-Path Attacks
Rogue Hub or Switch
Introducing a malicious hub or switch to capture data on a wired network
Replay Attack
Occurs when an attacker captures valid data and then replays it immediately or
with a delay
■ Common in wireless network attacks; can also be used in wired networks
Relay Attack
The attacker becomes part of the conversation between two hosts
■ Serves as a proxy and can read or modify communications between the hosts
■ Any traffic between the client and server goes through the attacker
Challenges with Replay and Relay
Encryption can make interception and crafting communication difficult
■ Strong encryption schemes like TLS 1.3 can pose significant challenges for
attackers
■ Techniques like SSL stripping may be used to downgrade encryption to an unsecured connection
SSL Stripping
○ An attack that tricks the encryption application into presenting an
HTTP connection instead of HTTPS
○ Enables attackers to capture unencrypted data when the user
believes they are using a secure connection
Downgrade Attack
An attacker forces a client or server to abandon a higher security mode in favor
of a lower security mode
■ Scope of Downgrade Attacks:
● Downgrade attacks can be used with various encryption and protection methods, including Wi-Fi and VPNs
● Any situation where a client agrees to a lower level of security that is still backward compatible can be vulnerable to a downgrade attack