8: 7 Network Attacks Flashcards

1
Q

DoS Attack

A

Denial of Service attack makes a system unavailable for legit users by sending a huge number of requests to a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dos Limitations

A

Easy to block based on IP address, require a huge bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS attacks

A

Utilizes botnets to overwhelm a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf attack

A

Attacker sends echo requests to third-party servers with a forged victim IP address, and then send reply to the victim’s IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amplified DDoS attacks

A

Sends small requests that lead to large replies- looking for the higher amplification factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Eavesdropping Attacks

A

Theft of information as a user communicates with a server over the web. Relies on compromised Communication path (network device tapping, DNS poisoning, ARP poisoning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Man-in-the-middle Attack

A

Attacker tricks the user to establish a communication channel with the attacker, who then communicates with the server on behalf of the client while reading the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay Attack

A

Uses previously captured data to create a separate attack at a later date - just has the encoded version of the credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defeat replay attacks

A

Use a token session system, and timestamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL Stripping

A

Tricks browser into using unencrypted communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Domain Name System, translates common domain names into IP address for the purpose of network routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hierarchical DNS lookup

A

Root Nameserver, then .org nameserver, then specific .org nameserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Poisoning

A

Inserting incorrect DNS records in a valid DNS Server than will then redirect the user to the attacker’s server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Typosquatting

A

Registering many domain names with similar address hoping to capture legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Hijacking

A

Taking over control of an organization’s valid domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

URL Redirection

A

Attacker places redirects on a trusted site to content hosted on a malicious site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP

A

Address Resolution Protocol - protocol that translates IP address to hardware MAC addresses on local area networks

18
Q

ARP poisoning

A

Only works on LAN - Confuses system that the gateway device is different than expected.

19
Q

MAC flooding attack

A

Rapidly cycle addresses on a single system to overwhelm the table that maintains MAC addresses in memory, causing switch to forget where system is located, which will then broadcast traffic

20
Q

MAC Spoofing/Cloning

A

Alterns the assigned hardware address of a system to assume a false identity or engage in a MAC flooding attack

21
Q

IP Spoofing

A

Alters the IP address of a system and normally can’t be used for two-way communication - difficult to reconfigure network to receive return traffic at a spoofed IP address.

22
Q

Anti-Spoofing controls

A

Ingress Filtering - blocks inbound traffic that contains spoofed source addresses
Egress filtering - blocks outbound traffic that contains spoofed source addresses

23
Q

Wireless Attacks on WEP

A

Attackers get enough Initialization vectors to reconstruct the encryption key

24
Q

Wireless Attacks on WPA

A

WPA depends on RC4, but also TKIP (changing keys each time). Issue is with hashing function.

25
WPS
Wi-Fi Protect Setup - allows quick setup of devices (press button on both devices, uses 8-digit WPS PIN)
26
Issues with WPS
Trivial to guess the WPS PIN (11000 guesses) gives access to the network. WPS PIN cannot change on a device.
27
Jamming and Interference Attacks
DoS attack that broadcasts a strong signal that over the same spectrum that overwhelms the signal
28
Wardriving
Cruise neighborhoods and commercial areas using tools that capture information about Wi-Fi network.
29
Rogue Access Point
Connecting an unauthorized AP to a corporate network. Bypasses authentication, can interfere with legitimate wireless use.
30
Rogue AP Detection
Built-in detection systems of Enterprise grade wireless.
31
Evil twins
Fake AP with SSID of legitimate network, then redirect users to phishing IDs
32
Disassociation Attack
Disconnects a client from a network using a deauthentication frame - spoofed frame believed to come from access point, so disconnects.
33
Goals of Disassociation Attack
Gather authentication information for cryptographic attacks, can deny service too
34
NFC
Near Field Communication system (30-50 feet apart)
35
Bluetooth
NFC technology used to connect speakers, headsets, keyboards, and similar devices
36
Bluejacking
Attack sends bluetooth spam to a user's device
37
Bluesnarfing
Attacker force pairing between devices in older bluetooth devices
38
NFS Security Improvements
Turn off discoverable mode when not in use, apply firmware updates, watch for suspicious activities
39
RFID
Chips embedded in many items and may be read by scanners
40
RFID Security Concerns
Businesses want strong authentication and encryption to protect the integrity of RFID systems Consumers want privacy safeguards to protect their personal information