S15-Network Attacks Flashcards
Denial of Service (DoS) Attack
Occurs when one machine is continually flooding a victim with requests for services
What do attackers typically use to conduct a DoS attack?
- TCP SYN Flood
- Smurf Attack (ICMP Flood)
TCP SYN Flood
denial-of-service (DoS) attack that exploits the TCP handshake process to overload a server.
How does a TCP SYN Flood Overload a Server?
Attackers send a large number of SYN packets to the server, but they don’t complete the handshake by sending the final ACK packet creating half-open connections
Smurf Attack (ICMP Flood)
type of Distributed Denial-of-Service (DDoS) attack that floods a victim server with ICMP echo request packets.
How does a Smurf Attack Overload a server?
The attacker sends ICMP echo request packets with a spoofed source IP address to the target network’s broadcast address.
Each device on the network responds by sending an ICMP echo reply packet to the spoofed source IP overwhelming the target server with ICMP echo reply packets.
Distributed Denial of Service (DDoS) Attack
An attacker uses many computers to make requests to a single server at once
Botnet
Collection of compromised computers
MAC Flooding
MAC flooding is a network attack that exploits a switch’s ability to learn MAC addresses by sending a large number of fake MAC addresses to overwhelm its memory (Mac Table) causing the Switch to behave like a hub and broadcast traffic on all ports.
Why would an attacker want to conduct a MAC flooding attack?
- Data Snooping
- Disrupting Services
- Bypassing security measures
Data Snooping (Mac Flooding)
Attacker captures sensitive data by forcing the switch to broadcast traffic
Disrupting Services (Mac Flooding)
A Broadcasting switch resulting from a MAC flood attack can overwhelm a network with excessive traffic
Bypassing security measures (Mac Flooding)
MAC flooding can bypass security measures like MAC address filtering
What measures can you take to defend against MAC Flooding
- Use anomaly-based intrusion detection system (IDS)
- Employ Network monitoring Tools
- Limit MAC addresses per port through Port security config
- Set MAC address limits per switchport
- Use VLANs to segregate traffic
Address Resolution Protocol (ARP)
Protocol that is used to map an IP address to a MAC address on a LAN
ARP Spoofing
An attacker sends false ARP messages over a LAN in an attempt to associate their MAC address with a target IP address
ARP Poisoning
Attack that corrupts the ARP cache (ARP table) in the network Targeting all devices in a LAN
What techniques attackers use to conduct ARP attacks?
IP-MAC Scanning:
- Scan for IP-MAC pairs, utilize software to send fake ARP responses
ARP Flood:
- Conduct Arp poisoning through an ARP flood
How can you prevent ARP attacks?
- Static ARP Entries
- Dynamic ARP inspection
- Network Segmentation
- VPNs or Encryption Tech.
Static ARP Entries (ARP attacks)
Manually inputting ARP mappings to prevent spoofing
- Not scalable
Dynamic ARP inspection (ARP Attacks)
Switches inspect ARP packets, dropping suspicious mappings based on trusted MAC-IP pairs
- Dynamic ARP inspection (DAI) is a feature on most modern switches
Network Segmentation (ARP Attacks)
Dividing the network into smaller segments limits the impact of ARP attacks
VPNs & Encryption Tech. (ARP Attacks)
Safeguard Data against Alterations from successful ARP spoofing
VLAN
Used to Partition and isolate a broadcast domain at the Data Link Layer (L2)