Section 15 Network Attacks Flashcards

1
Q

A logical communication endpoint that exists on a computer or server.

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A logical communication opening on a server that is listening for a connection from a client.

A

Inbound Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A logical communication opening created on a client in order to call out to a server that is listening for a connection.

A

Outbound Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ports 0 to 1023 are considered well known and are assigned by the Internet Assigned Numbers Authority (IANA).

A

Well Known Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ports 1024 to 49,152 to 65,535 can be used by any application without being registered with IANA.

A

Registered Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any port that is associated with a service or function that is non-essential to the operation of your computer or network.

A

Unnecessary Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Term used to describe many different types of attacks which attempt to make a computer or server’s resoruces unavailable.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A specialized type of DoS which attempts to send more packets to a single server or host than they can handle.

A

Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker attempts to flood the server by sending too many ICMP echo request packets (Which are known as pings).

A

Ping Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A distributed denial-of-service attack in which large numbers of Internet Control Message Protocol packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacker sends a UDP echo packet to port 7 (ECHO) and port 19 (CHARGEN) to flood a server with UDP packets.

A

Fraggle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Variant on a Denial of Service (DoS) attack where attacker initiates multiple TCP sessions but never completes the 3 way handshake.

A

SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A specialized network scan that sets the FIN, PSH, and URG flags and can cause a device to crash reboot.

A

XMAS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack that sends an oversized and malformed packet to another computer or server.

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attack that breaks apart packets into IP fragments, modifies them with overlapping and oversized payloads, and sends them to a victim machine.

A

Teardrop Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack which exploits a security flaw to permanently break a networking deice by reflashing its firmware.

A

Permanent Denial of Service

17
Q

Attack that creates a large number of processes to use up the available processing power of a computer.

A

Fork Bombs

18
Q

Attack which relies on the large amount of DNS information that is sent in response to a spoofed query on behalf of the victimized server.

A

DNS Amplification

19
Q

Identifies any attacking IP addresses and routes all their traffic to a non-existent server through the null interface.

A

Blackholding or Sinkholding

20
Q

Occurs when an attacker masquerades as another person by falsifying their identity.

21
Q

Exploitation of a computer session in an attempt to gain unauthorized access to data, services, or other resources on a computer or server.

22
Q

Attacker guesses the session ID for a web session, enabling them to takeover the already authorized session of the client.

A

Session Theft

23
Q

Occurs when an attacker takes over a TCP session between two computers without the need of a cookie or other host access.

A

TCP/IP Hijacking

24
Q

Occurs when an attacker blindly inject data into the communication stream without being able to see if it is successful or not.

A

Blind Hijacking

25
Attack that uses multiple transport layers to trick a user into clicking on a button or link on a page when they were intending to click on the actual page.
Clickjacking
26
Attack that causes data to flow through the attacker's computer where they can intercept or manipulate the data.
Man in the Middle (MITM)
27
Occurs when a Trojan infects a vulnerable web browser and modifies the web pages or transactions being done within the browser.
Man in the Browser (MITB)
28
Network based attack where a valid data transmission is fraudulently or maliciously rebroadcast, repeated, or delayed.
Replay Attack
29
A connection to the windows interprocess communications share (IPC$).
Null Connections
30
Occurs when the name resolution information is modified in the DNS server's cache.
DNS Poisioning
31
Occurs when an attacker requests replication of the DNS information to their systems for use in planning future attacks.
Unauthorized Zone Transfer
32
Occurs when an attacker modifies the host file to have the client bypass the DNS server and redirects them to an incorrect or malicious website.
Altered Hosts File
33
Occurs when an attacker redirects one website's traffic to another website that is bogus or malicious.
Pharming
34
Attack that exploits a process in the way a domain name is registered so that the domain name is kept in limbo and cannot be registered by an authenticated buyer.
Domain Name Kiting
35
Protocol for mapping on Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
ARP
36
Attacks that exploits the IP address to MAC resolution in a network to steal, modify, or redirect frames within the local area network.
ARP Poisoning