Module 2 part 1 Flashcards
Denial of Service & Social Engineering (28 cards)
What is Denial of Service (DoS) ?
- prevent legitimate users from accessing a resource, e.g., server.
- not obtaining sensitive information.
- The objective is to disable the system
Why is DoS considered “nasty”?
- One of the easiest attacks to launch
- Hard to trace the attacker
- Distributed DoS
What are the current and early motives of DoS attack?
Early DoS attacks largely proofs of concept or pranks.
Current : Recognition Political Competitive edge Extortion
What are the 6 classification of DoS attacks ?
VSSSDP
- volume
- source
- symmetry
- direction
- state change
- protocol layer
what are the examples of DoS attack by volume?
- Flooding DoS Attack large volume
- Logic DoS Attack low volume
What is flooding DoS attack ?
- overwhelm a system by sending a flood of real- looking but unnecessary data so that its resources are consumed
- bandwidth
- processing power
- memory capacity
- Network connections
What is logic DoS attack?
- exploit the vulnerabilities of the target intelligently, e.g alter the configuration of a router or access point to disable the system.
What is single source DoS attack?
- single connection to flood target or logic attack.
eg. low orbit ion canon
What is Distributed DoS (DDoS) attack ?
- multiple source simultaneously
- deploy botnets, malware or UDP servers.
What is symmetric DoS attack?
- the amount of resource required by the attacker matches the amount of resource flood the server.
e. g needs 1Gbps attacker generate 1Gbps
What is asymmetric DoS attack ?
- resource used are much less from the attacker than the victim.
e. g reflective Dos attack.
What is direct DoS attack ?
- attack directly from hacker’s machine
What is Reflective DoS attack?
- use intermediary devices to deliver attack traffic.
- Source IP address = Victim Server’s IP address
What is reflective and amplified DoS attack ?
- attack traffic is amplified by the intermediary devices.
- size of response packets is larger
What is permanent DoS attack?
- disable system permanently
- destroy firmware
- PDoS
What is recoverable Dos attack?
- system can recover after attack ends.
Dos attack by protocol layers. What are the layers DoS attack can perform?
- application layer
- transport layer
- networks layer
- data link. physical layer
What are the 11 DoS Techniques and Tools ?
1: Ping flood
2: TCP SYN attack
3: Land Attack aka Synonymous IP attack
4: Other TCP attacks SYN- ACK Flood, Fragmented ACK Flood, RST or FIN Flood.
5: Tear Drop attack
6: Ping of Death
7: Smurf attack
8: UDP Flood attacks
9: HTTP VERB attacks
10: reflection and Amplification attacks.
11: Notnet based DoS attacks
How can we mitigate DoS attacks ?
- Traffic monitoring
- Egress Filtering
- Install patches against well-known DoS attacks
- know you customer
- overprovision bandwidth
- use DDoS detection and mitigation services
- recovery plan
- prevention of botnet- based attack
Give tools of IP address finder and explain how it works ?
- nslookup
- dig
sends queries to domain name servers about networks and extracts the IP address blocks assigned to a particular network
Give tools for finding web server information and explain how it works ?
-netcraft
web based tool- lists information such as the type and version of the web server, geographical location, last update, etc.
What is the tool for ip address tracer?
Traceroute
sends ICMP request packets increasing TTL start with 1
What is the tool for ip address finder how it works ?
Iplocation.net
finds geolocation of an IP address
Port scan tool?
Nmap
Hosts port