Denial-of-Service Flashcards

1
Q

What are the three categories of Denial of Service attacks?

A

Volumetric Attacks, Protocol Attacks, and Application Layer Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a volumetric attack?

A

Volumetric attacks achieve their goal by consuming the bandwidth of a target or service. Their magnitude is measured in bits per second and they can be either a flood attack or an amplification attack.

Examples of volumetric attacks include:

  • UDP flood attack
  • ICMP flood attack
  • Ping of Death attack
  • Smurf attack
  • Pulse Wave attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a protocol attack?

A

Protocol attacks consume other resources, like connection state tables in network hardware like load balancers, firewalls, or servers, in order to achieve their goal. These attacks are measured in packets per second.

Examples of protocol attacks include:

  • Syn flood attack
  • Fragmentation attack
  • Spoofed session attack
  • ACK flood attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an application layer attack?

A

Application layer attacks consume the resources or services of an application in order to make the application unavailable to legitimate users. Application layer attacks are measured in requests per second.

Examples include:

  • HTTP GET/POST attack
  • Slowloris attack
  • UDP application layer flood attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a smurf attack?

A

A smurf attack involves sending ICMP ECHO requests to a network’s broadcast address while spoofing the source IP address, imitating the intended victim, in order to bring the victim offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a pulse-wave DDoS attack?

A

In a pulse wave DDoS attack, attackers send a highly repetitive, periodic train of packets as pulses to the target victim every 10 minutes, and each specific attack session can last for a few hours to days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CORE Impact?

A

CORE Impact finds vulnerabilities in an organization’s web server. This tool allows a user to evaluate the security posture of a web server by using the same techniques currently employed by cyber criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NetVizor?

A

NetVizor is a desktop and child monitoring spyware that comes with an unparalleled task recording feature-set that in secret records everything employees do on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is HULK?

A

HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes and its generated traffic also bypasses caching engines and hits the server’s direct resource pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a phlashing attack?

A

Phlashing is a permanent denial of service (DoS) attack that exploits a vulnerability in network-based firmware updates. Such an attack is currently theoretical but if carried out could render the target device inoperable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is back-chaining propogation (when referring to an attack toolkit transfer)?

A

In this technique, the attacker places an attack toolkit on their own system, and a copy of the attack toolkit is transferred to a newly discovered vulnerable system. The attack tools installed on the attacking machine use some special methods to accept a connection from the compromised system and then transfer a file containing the attack tools to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is central source propagation (when referring to an attack toolkit transfer)?

A

In this technique, the attacker places an attack toolkit on a central source and a copy of the attack toolkit is transferred to a newly discovered vulnerable system. Once the attacker finds a vulnerable machine, they instruct the central source to transfer a copy of the attack toolkit to the newly compromised machine, on which attack tools are automatically installed under management by a scripting mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spyware propagation (when referring to an attack toolkit transfer)?

A

As its name implies, spyware is installed without user knowledge or consent, and this can be accomplished by “piggybacking” the spyware onto other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is autonomous propagation (when referring to an attack toolkit transfer)?

A

In autonomous propagation, the attacking host itself transfers the attack toolkit to a newly discovered vulnerable system, exactly at the time it breaks into that system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RFC 3074 filtering?

A

RFC 3704 is a basic access-control list (ACL) filter, which limits the impact of DDoS attacks by blocking traffic with spoofed addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is packet traceback?

A

Packet traceback refers to tracing back attack traffic. It is similar to reverse engineering. In this method, the targeted victim works backward by tracing the packet to its source. Once the victim identifies the true source, they can take steps to block further attacks from that source by developing the necessary preventive techniques

17
Q

What is traffic pattern analysis?

A

Traffic pattern analysis can help network administrators to develop new filtering techniques for preventing attack traffic from entering or leaving their networks

18
Q

What is zombie zapper?

A

When a company is unable to ensure the security of its servers and a DDoS attack starts, the network IDS notices the high volume of traffic, which indicates a potential problem. The targeted victim can run Zombie Zapper to stop packets from flooding the system

19
Q

Which algorithm does the “sequential change-point detection” technique use to identify and locate the DoS attacks?

A

Cumulative Sum Control Chart (CUSUM)

20
Q

Which DoS/DDoS countermeasure is achieved by implementing a honeypot?

  • Deflecting attacks
  • Degrading Services
  • Absorbing Attacks
  • Mitigating Attacks
A

Deflecting attacks

21
Q

What is ingress/egress filtering?

A

Ingress filtering protects against flooding attacks that originate from valid prefixes (IP addresses). Egress filtering scans the headers of IP packets going out of the network

22
Q

What is TCP intercept?

A

In the TCP intercept mode, the router intercepts the SYN packets sent by the clients to the server and matches with an extended access list. If there is a match, then on behalf of the destination server, the intercept software establishes a connection with the client. Similarly, the intercept software also establishes a connection with the destination server on behalf of the client. Once the two half connections are established, the intercept software combines them transparently.

Thus, the TCP intercept software prevents the attempts of fake connection from reaching the server. It acts as a mediator between the server and the client throughout the connection.