Score Common TCP/IP Attacks Flashcards
(112 cards)
TCP/IP include for main protocols ?
Ip
TCP
UPD
ICMP
What is a MITM attack ?
An MITM attack intercepts communication between two systems. Essentially, the attacker inserts a device into a network that grabs packets that are streaming past. Those packets are then modified and placed back on the network for forwarding to their original destination.
What is Session Hijacking ?
Session hijacking is a twist on the MITM attack. The attacker gains physical access to the network, initiates a MITM attack, and then hijacks that session. In this manner, an attacker can illicitly gain full access to a destination computer by assuming the identity of a legitimate user. The legitimate user sees the login as successful but then is cut off. Subsequent attempts to log back in might be met with an error message that indicates that the user ID is already in use.
what is Ip address spoofing ?
Attackers spoof the source IP address in an IP packet. IP spoofing can be used for several purposes. In some scenarios, an attacker might want to inspect the response from the target victim (non-blind spoofing); in other cases, the attacker might not care (blind spoofing). Blind IP address spoofing is most frequently used in DoS attacks. Some reasons for non-blind spoofing include sequence-number prediction, hijacking an authorized session, and determining the state of a firewall.
Describe a DoS attack
an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites that you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts, or other services that rely on the affected computers.
What is a DDos
A DDoS attack is a DoS attack that features a simultaneous, coordinated attack from multiple source machines. The best-known example of a DDoS attack is the “smurf” attack.
What is a Resource exhaustion attack ?
Resource exhaustion attacks are forms of DoS attacks. These attacks cause the server’s or network’s resources to be consumed to the point where the service is no longer responding, or the response is significantly reduced. By targeting IP routers, an attacker may adversely affect the integrity and availability of the network infrastructure, including end-to-end IP connectivity. Router resources that are commonly affected by packet flood attacks include the following: CPU, packet memory, route memory, network bandwidth, and vty lines.
a connectionless protocol that is mainly used to route information across the internet
an IP
a connectionless protocol that does not use any port number and works on the network layer
ICMP
What does ICMP unreachables mean ?
ICMP unreachables are commonly used by attackers to perform network reconnaissance. In cyber security, network reconnaissance refers to the act of scanning the target network to gather information about the target.
What is ICMP mask reply ?
A feature that malicious insiders or outsiders can use to map your IP network. This feature allows the router to tell a requesting endpoint what the correct subnet mask is for a given network.
describe an ICMP redirect attacks ?
A router uses IP redirects to inform the sender of a better route to a destination, intended for hosts on its directly connected networks. However, attackers can exploit this to send an ICMP redirect to a victim’s host, redirecting all traffic through a router they control. This ICMP redirect attack is a type of MITM attack, where the attacker intercepts all communication between the source and destination.
What is ICMP router discovery ?
ICMP Router Discovery Protocol (IRDP) allows hosts to locate routers that can be used as a gateway to reach IP-based devices on other networks. Because IRDP does not have any form of authentication, it is impossible for end hosts to tell whether the information they receive is valid or not. Therefore, an attacker can perform a MITM attack using IRDP.
What is Firewalk ?
Firewalking is an active reconnaissance technique that employs traceroute like techniques to analyze IP packet responses to determine the gateway access list filters and map out the networks.
What is ICMP tunneling ??
An ICMP tunnel creates a hidden connection between two remote computers using ICMP echo requests and replies. This method can bypass firewall rules by disguising traffic within ICMP packets. Without deep packet inspection or log review, detecting this type of tunneling traffic is difficult.
what is ICMP-based operating system fingerprinting
Operating system fingerprinting identifies the OS running on a device. ICMP can be used for active scanning; for example, a TTL value of 128 typically indicates a Windows machine, while a TTL of 64 suggests a Linux-based system.
what are the DoS service attacks that use ICMP
ICMP flood attack
Smurf attack
What is a ICMP flood attack
The attack overwhelms the targeted resource with ICMP echo request packets, large ICMP packets, and other ICMP types to significantly saturate and slow down the victims network infrastructure.
Which information can an attacker use within the ICMP to determine which type of operating system the device is running?
total length
TTL value
version
checksum
TTL value
Which option is used to establish a covert connection between two remote computers, using ICMP echo requests and reply packets, and which can be used to bypass firewall rules?
Smurf attack
Firewalking
ICMP tunneling
ICMP-based operating system fingerprinting
ICMP tunneling
Which application-layer protocol that uses UDP to manage and monitor devices on the network could be exploited if it is not secured on devices?
TFTP
SNMP
HTTPS
FTP
SMTP
SNMP
what is the UDP Vulnerabilities with checksum ?
Optional and easily recomputed, making it vulnerable to alteration by attackers.
What are the different UDP Vulnerabilities ?
Checksum:
Source Verification
Eavesdropping
No Encryption
What are common UDP attacks ?
Dos Attacks
Source IP spoofing