1.4 - Network Attacks Flashcards

1
Q

What is a Rogue Access Point attack?

A

A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker. An illegitimate access point plugged into a network to create a bypass from outside into the legitimate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Evil Twin?

A

A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. Copy of a legitimate access point. Can scrape credentials or reroute to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Bluejacking?

A

When someone pulls data from an active bluetooth connection. Sending of unsolicited messages to another device via Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Bluesnarfing?

A

When someone puts data in an active bluetooth connection in an unauthorized manner. Can access data on another device. Older devices are more vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Wireless Disassociation Attack?

A

A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Wireless Jamming?

A

Interrupting wireless (typically 2.4GHz) signals whether intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some ways that an attacker might cause a wireless jamming?

A

1) Sending constant, random bits
- Can be legitimate - Data sent at random times
2) Reactive jamming - only disrupt when someone in
particular tries to use wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Radio Frequency Identifier (RFID) attack?

A

An attack that uses middleware to intercept data sent from an RFID device and an RFID reader. It can be used to either clone or spoofing. They can also jam the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Near Field Communication (NFC) attack?

A

A device is placed that pulls data from an NFC device. It can be used to modify data or eavesdrop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a cryptographic nonce.

A

A random or pseudo-random number. A password can be calculated using the nonce which makes it impossible to do a replay attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a salt.

A

A type of nonce most commonly associated with password randomization. It makes the password unpredictable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define an on-path attack.

A

An attacker captures traffic between an authorized user and a user. They can play that traffic back to the server later to gain access to some kind of resource. Often referred to as a mitm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ARP Poisoning?

A

A type of on-path attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Address Resolution Protocol (ARP) do?

A

ARP sits between the Network and Data layer, translating between the two of them. It translates from MAC to IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define on-path browser attack.

A

A form of on-path attack where an attacker is able to insert himself into the communications channel between two trusting parties by compromising a Web browser used by one of the parties, for the purpose of eavesdropping, data theft and/or session tampering. Also known as a man-in-the-browser attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is MAC Cloning?

A

When a bad actor spoofs the MAC address of another system to intercept traffic intended for that computer.

17
Q

What is MAC Flooding?

A

When a bad actor floods a switch with bogus MAC addresses. As a result, the MAC address table begins to fill. The switch then fail-opens, which essentially turns it into a hub. A bad actor can now sniff out any packets they want.

18
Q

What is a DNS Poisoning attack?

A

The act of entering false information into a DNS cache, so that DNS queries return an incorrect response and users are directed to the wrong websites. Also known as DNS spoofing.

19
Q

What is a DNS Hijacking attack?

A

A type of DNS attack in which DNS queries are incorrectly resolved in order to unexpectedly redirect users to malicious sites.

20
Q

What is a Domain Hijacking attack?

A

A type of attack in which someone takes over a domain, often through social engineering.

21
Q

What is URL hijacking?

A

Targeting people on the internet who incorrectly type a website’s domain name in the browser.

22
Q

Name a few things that could negatively affect a domain’s reputation.

A

1) Phishing email from the domain
2) Infected systems being seen by search engines

23
Q

What is a Denial of Service (DoS) attack?

A

An attack that is meant to shut down a machine or network, making it inaccessible to its intended users.

24
Q

What is a “friendly” DoS?

A

An unintentional DoS that can include but is not limited to: creating a loop by not having STP, overusing the bandwidth with one machine starving others, or electrical issues caused by an accident (water line breaks).

25
Q

What is a Distributed Denial of Service (DDoS) attack?

A

An attack against a network or website using many pcs. It often includes a botnet.

26
Q

Define DDoS amplification.

A

Using internet services to overwhelm a victim. NTP, DNS, ICMP. You reflect the DDoS attack off of another device or service.

27
Q

What is a Reflected DDoS?

A

A DDoS attack in which a service request is created using the spoofed IP address of the target. These requests to something like a time server are routed to the target to overwhelm it.

28
Q

What is an Amplified DDoS?

A

A DDoS attack in which a service request is created using the spoofed IP address of the target. The service request asks for an increased payload to overwhelm the target.

29
Q

What is a Coordinated DDoS?

A

A DDoS attack in which multiple attackers are attempting to bring the target offline.

30
Q

Define an application DoS.

A

An attack in which the attacker focuses on breaking or overworking an application. They can also force the overuse of a measured cloud resource or increase the cloud server response time. Both of these force the owner to spend more money and time.

31
Q

Define Operational Technology (OT) DoS.

A

A DoS that is focused on hardware and software for industrial equipment (i.e. electric grids, traffic control, manufacturing plants, etc.). This can affect power grids, traffic lights, manufacturing plants, etc.

32
Q
A