Week 1 - Network Attacks Flashcards

1
Q

What is a DNS Cache Poisoning Attack?

A

Tricks a DNS server into accepting a fake DNS record to redirect you to a compromised DNS server

(then it feeds you fake DNS addresses when you try to access legit websites)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can a DNS Cache Poisoning Attack spread to other networks?

A

Yes, if other DNS servers get their info from a compromised server they’ll be serving bad DNS entries to other hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a man(meddler)-in-the-middle attack?

A

An attacker places themselves in between two hosts who think they’re communicating with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is session hijacking done?

A

If you forget to log out of a website, an attacker could steal the session token you generated when you authenticated yourself to the website and impersonate you on the website itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Rogue AP attack?

A

when an attacker accesses an access point that was installed without the network admin’s knowledge

(plugging in your own router into the company’s network to create a simple wireless network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the purpose of an Evil Twin attack?

A

It tricks you into connecting to a network that seems identical to yours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DoS attack?

A

A denial-of-service attack overwhelms the network/server to prevent access to the service (for users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does PoD stand for? What type of attack is this? (2)

A

Ping of Death
a DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a PoD attack work?

A

Intentionally crashes a system by sending a larger ping than the IP was made to handle by causing a buffer overflow

(can potentially allow the execution of malicious code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Ping Flood?

A

Sends tons of ping packets to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of pings does a Ping Flood send?

A

ICMP echo requests since a ping expects an equal number of ICMP replies (but will be overflooded with the Ping Flood)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a SYN Flood?

A

The server is bombarded with SYN packets (client wants to SYN to the server), server sends back SYN-ACK packets but attacker does not respond with ACK messages so the connection stays open and takes up resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Since the TCP connection in a SYN Flood stays open, we also refer to them as what type of attacks?

A

Half-Open attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DoS attack using multiple systems called?

A

DDoS, Distributed Denial-Of-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly