Module 4- Attacking what we do Flashcards
(194 cards)
Which foundational component of enterprise communication must be protected in addition to the network infrastructure itself?
Protocols and software that provide services over the network, as they are also targets for threat actors.
Which request is broadcast by a host to discover the MAC address of a device with a specific IP address?
An ARP Request is broadcast by a host to all others on the network segment to identify the MAC address for a given IP.
What happens after a host receives an ARP Request and finds a matching IP address?
It sends an ARP Reply back to the requesting host with its MAC address.
What kind of ARP message can a client send without receiving a request?
A gratuitous ARP is an unsolicited ARP Reply sent by a device, usually upon startup, to announce its IP and MAC address.
When is a gratuitous ARP typically sent?
When a device first boots up to inform other devices on the local network of its MAC and IP address.
What do other hosts do when they receive a gratuitous ARP?
They store the MAC and IP address from the gratuitous ARP in their ARP tables.
Which vulnerability arises from the ability of any host to send a gratuitous ARP?
Any host can claim ownership of any IP/MAC combination, which opens the door to ARP cache poisoning.
Which attack involves corrupting the ARP cache of local devices to reroute traffic?
ARP poisoning, which allows a threat actor to impersonate another device and intercept communications.
What is the goal of a threat actor conducting an ARP poisoning attack?
To associate their MAC address with the IP address of the default gateway in the ARP caches of local hosts.
Which address is typically impersonated in ARP cache poisoning to perform MiTM attacks?
The IP address of the default gateway is commonly spoofed.
What does associating a malicious MAC with the gateway IP allow a threat actor to do?
It places the attacker between the victim and external systems, enabling a man-in-the-middle (MiTM) attack.
What vulnerability exists in the way ARP operates that makes poisoning possible?
Any host can send gratuitous ARP Replies claiming any IP/MAC combination, allowing threat actors to insert false entries into ARP caches.
Why is ARP considered vulnerable despite being foundational to local IP-to-MAC resolution?
It lacks authentication, allowing any device to send false replies and manipulate ARP tables.
Which type of attack involves corrupting the ARP table of devices to intercept or redirect traffic?
ARP cache poisoning, which allows attackers to launch man-in-the-middle (MiTM) attacks by sending false MAC-to-IP mappings.
Which type of packet does a computer send when it wants to discover the MAC address of an IP address on the same local network?
An ARP Request, which is broadcasted to all devices on the subnet to find the matching MAC address for a given IP.
What response does a legitimate device send when it receives an ARP Request for its IP address?
An ARP Reply, which provides its MAC address so that the requester can update its ARP cache.
What is the name for an unsolicited ARP Reply sent by a device to announce its presence on the network?
A gratuitous ARP, which is typically sent when a device boots up to update other hosts’ ARP tables.
What’s the difference between passive and active ARP poisoning?
Passive ARP poisoning involves eavesdropping on data, while active poisoning involves modifying or injecting malicious data.
What does ARP stand for, and what is its function?
Address Resolution Protocol, used to map IP addresses to MAC addresses within a local network.
What are some tools mentioned that can be used to perform ARP MiTM attacks?
dsniff, Cain & Abel, ettercap, and Yersinia.
What network protocol helps convert domain names like www.cisco.com into numerical IP addresses?
The Domain Name Service (DNS), which resolves human-readable names to IPv4 or IPv6 addresses.
What does DNS use to identify the type of data being returned in a response?
Resource Records (RR), which specify the type of DNS information included in the response.
Why is DNS a tempting target for attackers in enterprise environments?
Because compromising DNS can misdirect users to malicious sites or disrupt the functionality of entire networks.
What type of attack targets DNS services to manipulate name resolution or reroute traffic?
A DNS attack, where an attacker could corrupt or hijack the DNS resolution process.