1.4 Network Attacks Flashcards

1
Q

Unauthorized access point on a network that may or may not be malicious. Poses backdoor vulnerabilities to your network

A

Rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious access point that has the same SSID as your network but is controlled by an attacker. Can overpower legitimate access points to hijack network traffic.

A

Evil Twin AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of sending unsolicited messages to a phone via Bluetooth connection

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack that involves the transfer of data to an attacking device via Bluetooth connection

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does an attacker exploint within a network packet in order to perform a wireless disassociation attack?

A

802.11 Management Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are working on your laptop when all of a sudden the wireless connection to your WIFI drops. It then proceeds to come back and drop off repeatedly. What type of attack are you likely subject to?

A

Wireless Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This type of jamming involves the transmission of interfering wireless signals to decrease the recipiant’s signal-to-noise ratio. Can sometimes be unintentional from microwaves, flourescent lights, etc.

A

Radio Frequency (RF) Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An arbitrary number used in cryptography which is random, only used once, and is used to calculate a randomized hash for password and encryption. Secures against replay attacks, and is used “for the time being”

A

Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of nonce that is used for randomizing encryption schemes in encryption ciphers, WEP, and some SSL implementations.

A

Initialization Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A nonce most commonly associated with password randomization. Prevents passwords within a database being correlated in the event of a breach.

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Formerly known as man-in-the-middle attacks, this type of attack involves the attacker being on the network between you and your traffic’s destination. Traffic is redirected to the attacker, and then passed on to its destination.

A

On Path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This attack utilizes the limited size of a MAC address table by sending requests from many different MAC addresses. When the address table is full it begins forwarding all traffic out of all ports.

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Doing this will allow an attacker to change their MAC address in order to circumvent filters on a network

A

MAC Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack that injects a malicious IP address into a DNS cache of a DNS server or a client computer in order to direct web traffic to the wrong place.

A

DNS Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of attack involves getting access to the domain registration, effectively transferring domain ownership to the attacker.

A

Domain Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Takes advantage of poor spellings of domain names in order to redirect web traffic to a malicious site

A

Typosquatting/URL Hijacking

17
Q

This is what it’s called when a system is forced to fail in some capacity, or completely. Can be malicious or benign.

A

Denial of Service (DoS)

18
Q

Botnets are often used to carry out this type of attack that attempts at bringing down a service through a swarm of traffic spiking (i.e. consuming bandwidth or memory)

A

Distributed denial of service (DDoS)

19
Q

When a DDoS attack is reflected off of another device or service, such as using NTP, DNS, or ICMP to multiply the attack traffic

A

DDoS Amplification

20
Q

What could be a possible consequence for a DoS attack performed on a cloud-based application?

A

More resources consumed means more money the target has to pay the cloud provider

21
Q

What is it called when a DoS attack is carried out on hardware and software for industrial equipment, electric and utility grids, etc.?

A

Operational Technolgy (OT) DoS

22
Q

What are the main applications that can be exploited for scripting and automation attacks?

A

PowerShell

Python

Unix/Linux Shell

Macros

Visual Basic for Applications (VBA)

23
Q
A