1.2 Flashcards
(37 cards)
Most common network attacks are?
Reconnaissance attacks, access attacks, Denial of Service, Distributed Denial of Service attacks
What are reconnaissance attacks are trying to do?
Attempt to gather information about the victim before launching an attack, example use cdp, whois, ping sweeps etc.
Explain social engineering
In an attack that tries to use people to do thing or spill info
social engineering - phishing
a message with a link that goes to a dodgy site but looks legit
social engineering - spear phishing
targeted phishing attack for an person/organzation
social engineering - whaling
targeted emails for top execs
social engineering - pharming
used to direct a customers url from a valid resource to a malicious one that could be made to appear as the valid site to the user.
social engineering - smishing
attack through a text
social engineering - vishing
attack through phone
social engineering - baiting
leaving an infected device lying around
What is privilege escalation
process of taking some leve of access and achieving an even greater level of access to a router and then uses a brute-force attack against the router
What are back doors?
When attackers gain access to a system they usually want future access. a backdoor application can be installed to either allow future access or to collect information to use in further attacks.
How can backdoors be installed?
by users clicking something without realizing the link they click or the files they open is a threat. Can also be implemented as a result of a virus or worm.
6 types of access attacks
Password, Trust exploitation, port redrection, mitm, buffer overflow, ip, mac, dhcp spoofing
what is a convert channel?
effective mechanism for sending and receiving information data between machines without alerting any firewalls. Die Daten unter einem anderen Protokoll verkleiden.
How to get a password? And which type of attack?
Trying to get ciritical passwords using methods like social engineering or brute force etc. Access attack
What is trust exploitation? which type of attack?
using unauthorized privileges to gain access to a system. access attack
What is MITM? which type of attack?
Man in the middle, when the attacker places themselves in the middle of 2 devices in order to eavesdrop or manipulate date, access attack
What is buffer overflow? which type of attack?
causing the buffer to overflow and crashing the system, leading to a DoS attack
What is ip, mac, dhcp spoofing? which type of attack?
an attack that makes it look like it is coming from the source - using a rogue dhcp server to respond to requests or exhausting the genuine server’s pool. access attack
What are Dos and DDoS attack attempt to do?
They try to consume all of a computers critical resources in order to make it unavailable for use.
From which source is DDoS? And what can this attack use?
DDoS is an attack from all sources and can use reflection and amplification.
What is reflection and amplification in combination with DDoS?
Reflection is when the attacker send a flood of protocol requests packets to various ip host, while amplification a small forged attacked gets a big reply from reflectors, called the avalanche effect.
DDoS - ping of death?
sending a malicious ping to a computer causing a crash - not done anymore