Section 4.2 Flashcards
Describe Denial of Service attacks
It’s when a malicious actor overwhelms a network or service to make it unavailable
What is ARP poisoning/spoofing?
when an on-path attacker sends an ARP response to the host and changes the host’s local ARP cache with a spoofed MAC address
What is DNS poisoning?
modification of DNS records to redirect to malicious websites
Why would a malicious actor want to use spoofed credentials?
to avoid detection and gain access
What can be spoofed on a network?
IP address, DNS, ARP, MAC address
What are commonly spoofed for social engineering?
Email addresses, phone numbers, voice, video
Why is it bad to store passwords in plain text?
Because if an attacker acquires the file, they’ll have access to all the passwords.
How should passwords be stored?
hashed and salted
What is a brute force attack?
When a malicious actor uses a trial and error process to figure out the password.
What technique is used to execute VLAN Hopping?
by double-tagging
How can you detect and block rogue DHCP communication?
by enabling DHCP snooping
What is an Evil Twin?
an access point made to look like a legitimate one
How is an Evil Twin different from a Rogue Access Point?
Evil Twin is intentionally malicious
Rogue Access Points are unauthorized and can be accidental
What is a Deauthentication attack?
a wireless attack that sends fake deauthentication packets to devices to disconnect them from an AP
What’s the difference between Tailgating and Piggybacking?
Tailgating: authorized person is unaware
Piggybacking: authorized person is aware