Session 4 : Network specific threats and attacks Flashcards
DOS?
- Aimed at making a machine or network resource unavailable to its intended users
Types of DOS?
- Volume-based attacks
- Protocol attacks
- Application layer attacks
2 vraients of DOS?
- DDoS
* Many computers send overwhelming fake to a website to make in slow or unavailable. - Unintentional DoS
* Real visitors accidentally overload a website, causing it to crash
DoS mitigation strategies?
- Employ traffic filtering techniques that identify and block malicious traffic while allowing legitimate users access.
- Outsourcing traffic management to third-party service that specialize in DDoS protection.
Spoofing?
Someone pretend to be a legitimate person to trick people or system.
Types of Spoofing?
- Email Spoofing
- IP Spoofing
- DNS Spoofing
- Website Spoofing
- ARP Spoofing
Network sniffing?
Capturing sensitive information travel over a network and manipulate data flow.
Traffic Redirection?
Capture and change the normal path of network data, to an attacker’s device.
Common methods
* ARP spoofing
* DNS hijacking
Enables MitM attacks
Sniffing and TR detection challenges?
- Stealthy nature
- Encrypted traffic
MitM?
An attacker secretly intercepts and possibly alters the communication between two parties,
making each believe they are directly communicating to each other.
How it works:
- ARP Spoofing
- DNS Hijacking
- SSL Stripping
Let attacker capture sensitive data or modify communication.
Prevent MitM?
- Encryption : use strong protocols to secure data. (HTTPS, VPN, SSH)
- Authentiation : employ mutual authentication to verify botj ends of a connection.
- Network security : use secure network configurations and monitoring tools to detect unusual routing
Message Integrity Attacks?
capture the messages trasmitted over networks, and altering them for malicious purpose.
Message integrity attacks types?
- Modification Attacks : altering existing messages in transit, mislead recipients into acting false information.
- Replay Attacks : capture a message and retransmit it later to trick the recipient or gain unauthorized access.
- Falsification : completly replace a legitimate message with fraudulent one.
Routing attaks?
Target the mechanism that manage how data packets are directed across network.
Routing attacks types
- DOS
- Routing table poisoning
Traffic analysis?
Intercepting and observing network traffic to get valuable insights.
- Exploiting network metadata
- DOS