DoS
Denial of Service attack. Prevents access to network resources.
Varieties of DoS
Ping of Death, Smurf, SYN Flood, Tribe Flood Network, Tribe Flood Network 2000, Stacheldragt
Ping of Death
Type of DoS. One Ping request sends a huge amount of data instead of the small payload PING normally carries. Most modern OSes prevent this from working.
Smurf
Type of DoS. Attacker spoofs the source IP of a PING request. Sends PING request to all broadcast addresses. Router forwards reuqests to all hosts on the subnet. Response pings are sent back to victim.
SYN Flood
Type of DoS. Sending a TCP/IP packet with SYN flag set to 1 causes server to open a connection and respond with SYN/ACK, waiting for an ACK. Attacker doesn’t send ACK, forcing the server to keep the connection open, using a portion of memory. Server isn’t able to respond to legitimate requests.
Tribe Flood Network
Type of DoS. TFN. DDoS (Distributed Denial of Service) attack.
Tribe Flood Network 2000
Type of DoS. TFN2K. DDoS (Distributed Denial of Service) attack.
Stacheldraght
Type of DoS. Means barbed wire in German. Mix of techniques involving TFN and encryption.
Types of Viruses
Macro Virus, Boot-Sector Virus, Multipartite Viruses File Viruses
File Virus
Replaces some of all of a target program’s code with their own. The compromised file, when executed, does the damage.
Macro Virus
Script of commands written in software that supports macros (EG MS Office). Annoying but harmless.
Boot-Sector Virus
Infect the hard drive’s boot sector, pointing the PC in the wrong direction or removing reference to the OS.
Multipartite Virus
Affects the boot sector and the hard drive’s files at once.
Worms
Like viruses, but can replicate without users opening an infected file
Buffer Overflow
Injecing so much data into the forms of an application that the host crashes
War Driving
The practice of cruising around in a vehicle equipped with laptops, antennas, and wireless adapters to detect unsecured or poorly secured Wi-Fi networks. The goal might be to map network locations, analyze signal strengths, or, in some cases, exploit vulnerabilities.
War Chalking
The collection of information regarding wireless networks either in chalk on the sitewalk or online
3 ways to detect and defend against an intruder
Active Detection, Passive Detection, Proactive Defense Methods
Active Detection
This involves deliberately seeking out threats or unusual activity using tools or techniques that actively probe the environment.
Examples: Intrusion Detection Systems (IDS) like Snort that scan network traffic for malicious behavior, or port scanners that identify unauthorized open ports.
Pros: Real-time alerts and the ability to identify active threats quickly.
Trade-off: Can potentially alert intruders that you’re watching.
Passive Detection
Here, you monitor systems and networks quietly without interacting with them directly. It’s more stealthy.
Examples: Packet sniffers like Wireshark, or security logs and audit trails that detect anomalies over time.
Pros: Less likely to tip off intruders, useful for discovering sophisticated or stealthy attacks.
Trade-off: May not catch fast-moving or zero-day threats immediately.
Proactive Defense Methods
These are strategies or technologies used to prevent intrusions before they happen.
Examples: Firewalls, endpoint protection, multi-factor authentication, and security awareness training for users.
Pros: Reduces the attack surface and mitigates risk before breaches occur.
Trade-off: Needs constant updates and user compliance to remain effective.
The Ping of Death and SYN floods are examples of what types of attack?
DoS
How often should you update your virus definitions in your antivirus software?
You should update your virus definitions in your antivirus software as frequently as possible, ideally multiple times a day or whenever new updates are available
What type of attack injects a command that overflows the amount of memory allocated and executes commands that would not normally be allowed?
Buffer Overflow