Flashcards in chapter 14 Deck (21):
Denial of service( DoS)
DoS prevents users from accessing network and resources.
what are some of DoS ?
The Ping of death
distributed DoS DDos
A ping of death?
sending a humongous ICMP packet to a remote host victim
distributed DoS DDos?
is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.
is a group of programs connected on the internet for the purpose of performing a task in a coordinated manneer.
is a group of infected computers that are under the control of one or more individuals. The infected computers are used to perform tasks impossible for a single computer, such as distributing millions of SPAM e-mail's or a Distributed Denial of Service (DDoS) attack.
Traffic spike is _____
is one of DDoS attack is a major spike in traffic in the network
we recognize the traffic spike using what?
a network intrusion detection system ( IDS)
it is a vertion of a DoS attack tat flood it's victim with spoofed broadcast ping messages.
how does smurf work?
-smurf involves stealing someone IP address.
-A smurf attack refers to a malicious network attack on a computer with the end-goal of rendering the victim's computer unusable. An attacker does this attack by creating a spoof, or virtual copy, of a victim's IP address and broadcasts that IP address by attaching the victim's IP address to a broadcast IP address. Once the victim's IP address is broadcasted, most networked devices respond to the IP address by sending a data packet back to the source from which the broadcast came. Therefore, if an attacker is broadcasting a victim's IP address, all of the replies can become so overwhelming that they render a victim's computer inert.
permanent DoS attack
known as Phlashing is a permanent denial of service (DoS), it attack that firmware located in many systems.
Alternatively referred to as an SYN flood, an SYN attack is a Denial of Service (DOS) attack on a computer or network. It is carried out by flooding the network with spoofed SYN packets or packets that contain an address that never responds to the SYN/ACK requests. Essentially, the connection queues fill up with bad connections, and service is denied to legitimate users.
is a program that can be used to perpetrate several different DDoS attacks
A DNS amplification attack
A DNS amplification attack is a form of reflection attack, The attacker spoofs look-up requests to domain name system (DNS) servers to hide the source of the exploit and direct the response to the target.
NTP reflection attack:
the attacker and his bots sends a small spoofed 8 byts UDP to NTP servers that requests a large amount of data to be sent to the target IP.
the NTP attack can be prevented using which version of NTP?
ARP cache poisoning
the cache can be poisoned by pinging a device with incorrect IP address
is a form of a password attack
how to prevent a brute force attack?
setting an account lockout policy , that is going to lock up the account after a number of failed attemps.
a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.