Security Threats Flashcards

1
Q

What is a smuf attack?

A

When an attacker sends a packet with the destination address set as the broadcast address and the source address as the victims IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you prevent a smuf attack?

A

no “ip directed-broadcast” command on any L3 interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an ICMP based MiTM attack?

A

An attack that uses either the ICMP redirect or router discovery message to redirect traffic to a compromised host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ICMP tunneling?

A

Where data is injected into the payload of an ICMP echo or echo reply packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you mitigate an ICMP MiTM attack?

A

Disable ICMP redirects on all L3 interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you mitigate an ICMP tunneling attack?

A

By blocking ICMP traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ICMP fingerprinting?

A

A method to determine the OS of a machine based on ICMP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With ICMP fingerprinting what value dictates a windows machine?

A

A value of 128 in the TTL field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With ICMP fingerprinting what value dictates a Linux machine?

A

A value of 64 in the TTL field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you mitigate an ICMP fingerprinting attack?

A

By blocking ICMP traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you recognize an ICMP fingerprinting attack?

A

By observing a large amount of ICMP traffic hitting multiple IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you recognize an smuf attack?

A

By observing a large number of ICMP echo replies being directed to a single host. Or ICMP echo packets with a destination address equalling the braodcast address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you recognize ICMP MiTM attacks?

A

By observing ICMP redirects on a network directing hosts to send traffic to a different destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you recognize and ICMP tunneling attack?

A

Requires a stateful Firewall that can inspect ICMP by looking into the payload to detect tunneled data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly