DDoS Flashcards

1
Q

DDoS, SSL, TLS

3 types of DDoS attacks?

A

Application layer attack, protocol attacks, volumetric attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDoS, SSL, TLS

How do you combat DDoS attacks?

A

Can’t handle it by blocking IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS, SSL, TLS

What do you generally need to launch a DDoS attack?

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DDoS, SSL, TLS

What are application layer attacks?

A

Anything that relies on OSI layer 7 or other high layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DDoS, SSL, TLS

Example of an appliation layer attack?

A

HTTP Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DDoS, SSL, TLS

What is HTTP Flood?

A

Requests that are easy for a client to generate, but hard for a server to handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS, SSL, TLS

What happens during a HTTP Flood attack?

A

Server flooded with requests, each of which is a heavy-lift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDoS, SSL, TLS

What kind of botnet do you need to launch an application layer attack?

A

Generally a large one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS, SSL, TLS

What are protocol-based attacks?

A

Exploit a protocol that’s low on the OSI stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS, SSL, TLS

Example of a protocol-based attack?

A

SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS, SSL, TLS

What is a SYN Flood?

A

Send a ton of SYN with spoofed return IP. Server sends SIN-ACK and ties up a port waiting for a reponse that won’t come.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDoS, SSL, TLS

What kind of botnet do you need to launch an application layer attack?

A

Generally a large one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DDoS, SSL, TLS

What are Volumetric Attacks?

A

Send small requests that return large payloads. Spoof the return address to the system you’re attacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS, SSL, TLS

Example of a Volumetric Attack?

A

DNS Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DDoS, SSL, TLS

What is the “Volume” in Volumetric Attacks?

A

The number of servers that send a response to your spoofed IP addr, not related to packet size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DDoS, SSL, TLS

How does DNS Amplification work?

A

Attacker makes ton of requests to a large number of DNS servers, spoof response, ton of DNS servers reply to the target system.

17
Q

DDoS, SSL, TLS

What kind of botnet do you need to launch an application layer attack?

A

Almost any side – easy to send a few, responses are large

18
Q

DDoS, SSL, TLS

Example of insecure (old) and secure (new) hashing algorithms?

A

MD5 is old, SHA2-256 is new

19
Q

DDoS, SSL, TLS

SSL vs. TLS?

A

TLS is newer and more secure than SSL