1.4 Network attacks Flashcards

1
Q

What is a rogue access point?

A

a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to prevent a rogue access point?

A
  • period review of the building access point
  • use a NAC that require to everybody to authenticate over the network before access it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a wireless evil twins?

A

evil twin is a copy of a legitimate access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is rogue access point vs evil twin?

A

A rogue access point is an illegitimate access point plugged into a network to create a bypass from outside into the legitimate network. By contrast, an evil twin is a copy of a legitimate access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to protect from evil twins?

A

make sure a vpn is install and the data are encrypted over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is bluesnarfing?

A

form of hacking that lets attackers access a device through its discoverable Bluetooth connection. Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is bluejacking?

A

Bluejacking is used for sending unauthorized messages to another Bluetooth device. This is not a big security concern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a wireless disassociation attack?

A

The attack involves sending forged deauthentication packets to a wireless access point (AP), causing the target device to disconnect from the network.
The attacker sends a large number of deauthentication packets with a spoofed source address to the AP or client device, making it appear as if the packets are coming from the network’s legitimate source. This causes the target device to disconnect from the network and may prevent it from reconnecting for a period of time.
It is used to steal data, do MITM and as a form of DoS,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a wireless jamming attack?

A

The jamming attack is one of the serious threats to wireless sensor networks ( WSNs ) using the IEEE 802.15. 4 standard. In such an attack, jammers, who launch the attack, can dramatically degrade the network performance by interfering transmitting packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is RFID?

A

Radio Frequency Identification. Technology use in badge access, line tracking and anything that need to be tracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How RFID technology work ?

A

An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are RFID attacks?

A
  • data capture (view communication) done via MITM
  • spoof the reader
  • Denial of service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is NFC?

A

NFC, or near-field communication, is a short-range wireless technology that allows your phone to act as a transit pass or credit card, quickly transfer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are NFC attacks?

A
  • remote capture of data
  • frequency jamming lead to denial of service
  • relay/ replay attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between NFC and RFID?

A

NFC is a subset of RFID technology that was initially designed to support short-range communication for mobile devices. Through magnetic field induction, NFC enables two devices to send messages when they’re near one another. Today, NFC is part of all cell phones and most modern credit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is on-path attack/MITM?

A

An on-path attack is an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network. This is a type of attack that can occur without anyone knowing that anyone is sitting in the middle of the conversation.

17
Q

What is ARP poisoning and how it is used in MITM?

A

It is a type of MITM. ARP Poisoning (also known as ARP Spoofing) is a type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table. ARP Protocol translates IP addresses into MAC addresses.

18
Q

What is a MAC adress?

A

Media Access Control: the physical address of a device. Composed of 48 bits/6 bytes long and display in hexadecimal:
- the 1st 3 bytes are the OUI (the manufacturer id)
- the last 3 bytes are the Network Interface Controller-Specific (the serial nb)

19
Q

How LAN switches and MAC are related?

A

The switches are designed to work at the MAC address level and interpret what’s in the frame. The switches maintain a MAC adress table

20
Q

How MAC address table work in switches?

A

Switches examing the incoming traffic and adds unknown MAC address to the MAC address table and assign an interface

21
Q

What is MAC flooding?

A

Attacker starts sending traffic with different source MAC address that will be added to the MAC address table until the table fills up. The switch begins flooding trafic to all interfaces. Attacker can easily capture all network traffic. However flooding can be restricted in the switch’s port security settings

22
Q

What is MAC cloning/ MAC spoofing?

A
  • An attacker changes their MAC address to match the MAC address of an existing device.
  • Can create a DoS attack
  • Switches have option to stop MAC adress spoofing
23
Q

What are the different type of DNS attacks

A
  • DNS spoofing/ poisoning
  • DNS hijacking
  • DNS amplication
  • DNS tunneling
24
Q

What is DNS poisoning?

A

Also known as DNS spoofing, this attack involves an attacker injecting fake DNS data into a DNS resolver’s cache, redirecting legitimate traffic to a malicious website or server.

25
Q

What is DNS hijacking?

A

In this attack, the attacker gains unauthorized access to a DNS server and modifies the DNS records, redirecting legitimate traffic to a malicious website or server.

26
Q

Difference between DNS hijacking and DNS poisoning?

A

Domain hijacking changes the DNS settings, while DNS poisoning modifies the DNS records.

Domain hijacking occurs when an attacker gains control of a domain name and changes its DNS settings.

DNS poisoning occurs when an attacker modifies a DNS server’s records so that it resolves queries incorrectly.

27
Q

What is DNS amplification?

A

In this attack, the attacker spoofs the victim’s IP address and sends DNS queries to open DNS resolvers, which then respond to the victim with amplified responses, causing a denial-of-service (DoS) attack.

28
Q

What is a DoS attack?

A

attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash

29
Q

What is a DDoS ?

A

attack occurs when multiple machines are operating together to attack one target. DDoS attackers often leverage the use of a botnet—a group of hijacked internet-connected devices to carry out large scale attacks

30
Q

What are common denial-of-service attacks?

A
  • Smurf Attack
  • SYN flood
  • Fill the disk space
31
Q

How to prevent DoS attack?

A
  • Install and maintain antivirus software.
  • Install a firewall and configure it
32
Q

What is a DNS tunneling attack?

A

In this attack, the attacker creates a covert communication channel over DNS, allowing them to bypass network security measures and exfiltrate sensitive data.