Security (V) Flashcards
VLAN Hopping
*Ability to send traffic from one VLAN into another, bypassing VLAN segmentation
*Sending packets to a port not usually accessible from an end system
ARP Spoofing
Sending falsified ARP Messages over a local area network
Spoofing
Occurs when an attacker masquerades as another person by falsifying their identity
On-Path/Man-in-the-Middle (MITM) Attack
Occurs when an attacker puts themselves between the victim and the intended destination.
Session Hijacking
Attacker guesses the session ID in use between a client and server and takes over the authenticated session.
DNS Poisoning
An attacker manipulates known vulnerabilities within DNS to reroute traffic to a fake version of a site.
Rogue DHCP Server
A DHCP server on a network which is not under the administrative control of the network admins
TCP SYN Flood
Occurs when an attacker initiates multiple TCP sessions, but never completes them.
Smurf Attack (ICMP Flood)
An attacker sends a ping to a subnet broadcast address with the source IP spoofed to that of the victim server.
Purging/Sanitizing
Removes data which cannot be reconstructed using any known forensic techniques
Clearing Technique
Removes data with a certain amount of assurance that it can’t be reconstructed.
Access Control Vestibule (Mantrap)
An area between two doorways that holds people until they are identified and authenticated.
Network Access Control (NAC)
Ensures a device is scanned to determine its current state of security prior to being allowed network access.
Persistent Agent
A piece of software installed on a device requesting access to the network
Non-Persistent Agent
Requires the users to connect to the network and go to a web-based captive portal to download an agent onto their devices.
Zero-Day Vulnerability
A new vulnerability that no one knows about yet.