4.4 Common Networking attacks Flashcards

1
Q

Denial of Service (DoS)

A

force a service to fail - overload the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“friendly” DoS

A

unintentional failure of service often done by accident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed DoS (DDoS)

A

launch an arm (botnets) of computers to bring down a service

use all the bandwidths or resources - traffic spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DDoS Amplification

A

turn a small attack into a big attack often reflected off another device or service

-uses protocols with little to no authentication checks
NTP, DNS, ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social engineering principles

A
  1. Authority - act as someone in charge
  2. Intimidation - bad things might happen if you don’t help
  3. Consensus/ Social proof -convincing you to do something b/c apparently someone else did it for them
  4. Scarcity - acting like there is an expiry date to a certain task
  5. Urgency - work alongside scarcity/ act quick don’t think
  6. Familiarity/Liking - act like you know the same person
  7. Trust - convinces you there are trustable because say a job (it professional/cop)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insider threats

A

having information that others do not have access too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logic Bomb

A

a piece of often-malicious code that is intentionally inserted into software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rouge Access Points

A

is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Evil Twins

A

When you configure an AP the exact same way as another then overpower the AP that is the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wardriving

A

is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

act of disguising a communication from an unknown source as being from a known

Social engineering with a touch of spoof

ususally done through: email/span

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vishing

A

information obtain via phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A

a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

when someone takes control of personal information or data and asks for money in return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS poisoning

A

a hacker technique that manipulates known vulnerabilities within the domain name system (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofing

A

pretending to be something you aren’t

MAC spoofing
IP address spoofing

17
Q

Wireless de-authentication

A

a significant wireless DoS attack - someone constantly turning off the wireless access

18
Q

Brute force attack

A

an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

19
Q

VLAN hopping

A

a method of attacking a network by sending packets to a port that is not normally accessible from a given end system.