Network Attacks Flashcards

(39 cards)

1
Q

What is a Denial of Service (DoS) Attack?

A

Occurs when one machine overwhelms a victim system with continuous service requests, leading to resource exhaustion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a TCP SYN Flood attack involve?

A

Initiating multiple TCP sessions without completing them, leading to half-open connections and resource exhaustion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the TCP Handshake process?

A

Involves SYN, SYN/ACK, and ACK packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a SMURF Attack work?

A

Attacker sends a ping to a subnet broadcast address with a spoofed source IP, causing all devices to respond to the victim server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Distributed Denial of Service (DDoS) Attack?

A

Involves multiple machines simultaneously overwhelming a single server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Botnet?

A

A collection of compromised computers under the control of a Command and Control (C2) server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ‘Zombie’ in the context of DDoS attacks.

A

Individually compromised computers within a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What challenges do cloud-based resources present during DDoS attacks?

A

They can horizontally scale to handle increased demand but may incur substantial costs for illegitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is MAC Flooding?

A

A network attack technique aimed at compromising a switch’s security by overflowing its MAC table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the normal operation of a switch?

A

Utilizes MAC tables to associate MAC addresses with switchports for efficient data forwarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the implication of Data Snooping in MAC Flooding?

A

Attackers can capture sensitive data by forcing the switch into hub mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ARP Spoofing?

A

Occurs when an attacker sends falsified ARP messages, linking their MAC address with a legitimate IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between ARP Spoofing and ARP Poisoning?

A

ARP Spoofing targets a single host’s traffic, while ARP Poisoning affects all hosts in a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does VLAN Hopping exploit?

A

Misconfigurations to gain unauthorized access to different VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DNS Cache Poisoning?

A

Corrupting DNS resolver cache with false information to redirect traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a common method for mitigating DNS Amplification Attacks?

A

Limit the size of DNS responses or rate limit DNS response traffic.

17
Q

What is an On-Path Attack?

A

An attack where the penetration tester places their workstation between two hosts to capture, monitor, and relay communications.

18
Q

What is a Replay Attack?

A

Occurs when an attacker captures valid data and repeats it either immediately or with a delay.

19
Q

What is a Relay Attack?

A

An attack where the attacker becomes a proxy between two hosts, intercepting and potentially modifying communications.

20
Q

What are Rogue Devices?

A

Unauthorized devices or services on a network that allow unauthorized individuals to connect.

21
Q

What is a common method for detecting Rogue Systems?

A

Visual Inspection, Network Mapping, and Host Discovery.

22
Q

What is Social Engineering?

A

Any attempt to manipulate users into revealing confidential information or performing actions detrimental to security.

23
Q

What is Phishing?

A

Sending deceptive emails to trick users into revealing sensitive information.

24
Q

What is the purpose of Dumpster Diving?

A

Scavenging for personal or confidential information in trash or recycling.

25
What is Malware?
Short-hand term for malicious software designed to infiltrate a computer system.
26
What is a Virus?
Malicious code that infects a computer when run.
27
What does Ransomware do?
Restricts access until a ransom is paid, often by encrypting files or changing passwords.
28
What is a Remote Access Trojan (RAT)?
A type of Trojan that provides the attacker with remote control of a victim's system.
29
What is a Rootkit?
Malware that gains administrative control without detection.
30
What is malware that restricts access until a ransom is paid called?
Ransomware ## Footnote Ransomware encrypts files or changes passwords, demanding payment for access.
31
What notable example of ransomware cost Atlanta over $17 million to fix?
SamSam (2018) ## Footnote SamSam is a specific case of ransomware that had a significant financial impact.
32
What type of malware gathers information without consent?
Spyware ## Footnote Spyware can include various types such as adware and keyloggers.
33
What is adware?
A type of spyware for advertising ## Footnote Adware is designed to display advertisements to users.
34
What is a keylogger?
A type of spyware that captures keystrokes ## Footnote Keyloggers can be used to steal sensitive information like passwords.
35
What is a rootkit?
Malware that gains administrative control without detection ## Footnote Rootkits are particularly difficult to detect and often require booting from an external device to remove.
36
Name one method to prevent malware infections.
Always check files for malware before downloading or installing ## Footnote This is a key practice to avoid malware infections.
37
Why is it important to keep software up to date?
To patch vulnerabilities ## Footnote Regular updates can help protect against known security flaws.
38
What should be used to protect against malware?
Reputable antivirus software and firewalls ## Footnote These tools help detect and prevent malware infections.
39
What is one best practice for user safety regarding malware?
Educate users about safe browsing and downloading practices ## Footnote User awareness is crucial for preventing malware infections.