Week 1 - Network Attacks Flashcards
What is a DNS Cache Poisoning Attack?
Tricks a DNS server into accepting a fake DNS record to redirect you to a compromised DNS server
(then it feeds you fake DNS addresses when you try to access legit websites)
Can a DNS Cache Poisoning Attack spread to other networks?
Yes, if other DNS servers get their info from a compromised server they’ll be serving bad DNS entries to other hosts
What is a man(meddler)-in-the-middle attack?
An attacker places themselves in between two hosts who think they’re communicating with each other
How is session hijacking done?
If you forget to log out of a website, an attacker could steal the session token you generated when you authenticated yourself to the website and impersonate you on the website itself
What is a Rogue AP attack?
when an attacker accesses an access point that was installed without the network admin’s knowledge
(plugging in your own router into the company’s network to create a simple wireless network)
What’s the purpose of an Evil Twin attack?
It tricks you into connecting to a network that seems identical to yours
What is a DoS attack?
A denial-of-service attack overwhelms the network/server to prevent access to the service (for users)
What does PoD stand for? What type of attack is this? (2)
Ping of Death
a DoS attack
How does a PoD attack work?
Intentionally crashes a system by sending a larger ping than the IP was made to handle by causing a buffer overflow
(can potentially allow the execution of malicious code)
What is a Ping Flood?
Sends tons of ping packets to a system
What type of pings does a Ping Flood send?
ICMP echo requests since a ping expects an equal number of ICMP replies (but will be overflooded with the Ping Flood)
What is a SYN Flood?
The server is bombarded with SYN packets (client wants to SYN to the server), server sends back SYN-ACK packets but attacker does not respond with ACK messages so the connection stays open and takes up resources
Since the TCP connection in a SYN Flood stays open, we also refer to them as what type of attacks?
Half-Open attacks
What is a DoS attack using multiple systems called?
DDoS, Distributed Denial-Of-Service