1.4 network attacks Flashcards

1
Q

Rogue Access Point

A

Unauthorized Access point that does not have any security features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evil Twin

A

Access Points that are made to look exactly like the Access Points on your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

A

Unsolicited message sent over Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A

Uses Bluetooth to access data on device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disassociation

A

DoS attack the causes devices not be connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jamming

A

DoS attack that cause a prevention in wireless communication because you decrease the signal-to-noise ratio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RFID

A

Radar tech that doesn’t need power to transmit data.
RFID attack is data stolen because its unsecured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NFC

A

Same as RFID but has encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-path browser Attacks

A

(man-in-the-browser attack) Malware on the victims machine without them knowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mac Flooding

A

Switch Table is full so it turns its self to a HUB. Slows down traffic and capture all network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mac Cloning

A

Attacker changes their MAC address to a existing MAC address
DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On-path Attacks

A

(man in the middle attack) redirects traffic and ARP Poisoning attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS Poisoning/ Spoofing

A

Redirects all traffic to an attackers website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP Poisoning

A

Takes the router IP and MAC. Changes the MAC to the attacker’s MAC then sends info to the victim. Now the victim thinks its talking to the router but instead talks to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Domain Hijacking

A

Attacker hack the Domain Registration Account and changes the IP address to theirs. Attackers tries to get login credentials to change it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

URL Hijacking/Redirection

A

Taking the URL and making it similar to your actual URL name. Attackers sell the bad spelled name back to you.

15
Q

Domain Reputation

A

(Security Posture) Sending Spam, bad websites that has malware, website will be Index by search engines.

16
Q

DoS

A

(denial of Service)
Force a service to fail

17
Q

DDoS

A

(distributed denial of service) When many systems are used to cause a DoS

18
Q

OT (Operational Tech)

A

DoS for Operational Tech. causing industrial and hard ware equipment to stop working (traffic lights, Electric grids, etc.)

19
Q

PowerShell

A

Command line for Windows systems
good for attacking windows system

20
Q

Python

A

common script language for many systems

21
Q

Bash

A

uses Shell Script to script Linux/Unix

22
Q

Macros

A

a automated script that attackers use. User just needs to open the file.