Module 2 part 1 Flashcards

Denial of Service & Social Engineering

1
Q

What is Denial of Service (DoS) ?

A
  • prevent legitimate users from accessing a resource, e.g., server.
  • not obtaining sensitive information.
  • The objective is to disable the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is DoS considered “nasty”?

A
  • One of the easiest attacks to launch
  • Hard to trace the attacker
  • Distributed DoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the current and early motives of DoS attack?

A

Early DoS attacks largely proofs of concept or pranks.

Current :
Recognition
Political
Competitive edge
Extortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 6 classification of DoS attacks ?

A

VSSSDP

  • volume
  • source
  • symmetry
  • direction
  • state change
  • protocol layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the examples of DoS attack by volume?

A
  • Flooding DoS Attack large volume

- Logic DoS Attack low volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is flooding DoS attack ?

A
  • overwhelm a system by sending a flood of real- looking but unnecessary data so that its resources are consumed
  • bandwidth
  • processing power
  • memory capacity
  • Network connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is logic DoS attack?

A
  • exploit the vulnerabilities of the target intelligently, e.g alter the configuration of a router or access point to disable the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is single source DoS attack?

A
  • single connection to flood target or logic attack.

eg. low orbit ion canon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Distributed DoS (DDoS) attack ?

A
  • multiple source simultaneously

- deploy botnets, malware or UDP servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is symmetric DoS attack?

A
  • the amount of resource required by the attacker matches the amount of resource flood the server.
    e. g needs 1Gbps attacker generate 1Gbps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is asymmetric DoS attack ?

A
  • resource used are much less from the attacker than the victim.
    e. g reflective Dos attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is direct DoS attack ?

A
  • attack directly from hacker’s machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Reflective DoS attack?

A
  • use intermediary devices to deliver attack traffic.

- Source IP address = Victim Server’s IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is reflective and amplified DoS attack ?

A
  • attack traffic is amplified by the intermediary devices.

- size of response packets is larger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is permanent DoS attack?

A
  • disable system permanently
  • destroy firmware
  • PDoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is recoverable Dos attack?

A
  • system can recover after attack ends.
17
Q

Dos attack by protocol layers. What are the layers DoS attack can perform?

A
  • application layer
  • transport layer
  • networks layer
  • data link. physical layer
18
Q

What are the 11 DoS Techniques and Tools ?

A

1: Ping flood
2: TCP SYN attack
3: Land Attack aka Synonymous IP attack
4: Other TCP attacks SYN- ACK Flood, Fragmented ACK Flood, RST or FIN Flood.
5: Tear Drop attack
6: Ping of Death
7: Smurf attack
8: UDP Flood attacks
9: HTTP VERB attacks
10: reflection and Amplification attacks.
11: Notnet based DoS attacks

19
Q

How can we mitigate DoS attacks ?

A
  • Traffic monitoring
  • Egress Filtering
  • Install patches against well-known DoS attacks
  • know you customer
  • overprovision bandwidth
  • use DDoS detection and mitigation services
  • recovery plan
  • prevention of botnet- based attack
20
Q

Give tools of IP address finder and explain how it works ?

A
  • nslookup
  • dig

sends queries to domain name servers about networks and extracts the IP address blocks assigned to a particular network

21
Q

Give tools for finding web server information and explain how it works ?

A

-netcraft

web based tool- lists information such as the type and version of the web server, geographical location, last update, etc.

22
Q

What is the tool for ip address tracer?

A

Traceroute

sends ICMP request packets increasing TTL start with 1

23
Q

What is the tool for ip address finder how it works ?

A

Iplocation.net

finds geolocation of an IP address

24
Q

Port scan tool?

A

Nmap

Hosts port

25
Q

Wireless network information gather tool ?

A

Netstumbler MAC address of access points active sniffer

Kismet passive sniffer

26
Q

Vulnerability scanning platform ?

A

NESSUS

Nexpose

27
Q

Web server scanner ?

A

NIKTO

28
Q

Network infrastructure scanner

A

Nipper Studio

Finds vulnerability fro switches routers and firewalls