Lecture 8a Flashcards
(53 cards)
What do threat actors prioritize in their attacks?
Targeting networks
What can exploiting a single network vulnerability expose?
Hundreds or thousands of devices
What are some attacks that target a network or processes relying on a network?
Interception attacks Layer 2 attacks DNS attacks Distributed denial of service attacks Malicious coding and scripting attacks
What is a Man-in-the-Middle (MITM) attack?
A threat actor positioned between two parties to eavesdrop or impersonate
What are the two phases of a typical MITM attack?
Intercepting traffic and decrypting transmissions
What does a replay attack do?
Makes a copy of a legitimate transmission and uses it later
What techniques do threat actors use to steal an active session ID?
Network attacks endpoint attacks and Man-in-the-Browser (MITB)
What is a Man-in-the-Browser (MITB) attack?
An attack intercepting communication between a browser and computer to steal or manipulate data
What is Layer 2 in the OSI model responsible for?
Dividing data into packets
What is ARP poisoning?
Manipulating the Address Resolution Protocol to link IP addresses to wrong MAC addresses
What are common MAC spoofing attacks?
MAC cloning and MAC flooding
What happens in a MAC cloning attack?
Attacker spoofs a valid MAC address and the switch updates its MAC table incorrectly
What happens in a MAC flooding attack?
Attacker overflows switch MAC table with fake MAC addresses to disrupt normal traffic
What does DNS stand for?
Domain Name System
What happens in a DNS-based attack?
A DNS address is substituted to redirect a computer to a malicious device
What are two consequences of a successful DNS attack?
URL redirection and damage to domain reputation
What is DNS poisoning?
Modifying a local DNS lookup table to point to a malicious domain
Where can DNS poisoning occur?
Local host table or external DNS server
What is DNS hijacking?
Infecting an external DNS server with malicious IP addresses to redirect users
How do attackers exploit DNS hijacking?
By exploiting protocol flaws to insert fraudulent DNS entries into authentic DNS servers
What is a denial of service attack?
An attack to prevent authorized users from accessing a system by overwhelming it with requests
What is a distributed denial of service (DDoS) attack?
A DoS attack using many infected devices to flood a server with requests
What types of languages are used in malicious coding and scripting attacks?
PowerShell VBA Python and Bash