18. Network Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Flashcard 1
Q: What is a network

A: A network is a collection of interconnected computers with shared resources that must be protected from unwanted inspection, modification, and attacks.

2
New cards

Flashcard 2
Q: How is network security defined

A: Network security is about protecting the network infrastructure to ensure the integrity, confidentiality, and availability of resources.

3
New cards

Flashcard 3
Q: Why can switched Ethernet hinder direct packet sniffing

A: Switched Ethernet forwards packets only to the intended recipient’s port, making direct sniffing more difficult than in a hub-based network.

4
New cards

Flashcard 4
Q: What is MAC flooding

A: MAC flooding involves overwhelming a switch with bogus MAC addresses to overflow its address table, causing it to behave like a hub and broadcast traffic to all ports.

5
New cards

Flashcard 5
Q: How does MAC duplicating (or cloning) work as an attack

A: An attacker sets their host’s MAC address to match that of a target machine, bypassing MAC-based filtering and receiving traffic intended for the target.

6
New cards

Flashcard 6
Q: What is the purpose of the Address Resolution Protocol (ARP)

A: ARP maps IP addresses to MAC addresses within a local network, enabling proper Ethernet communication between hosts.

7
New cards

Flashcard 7
Q: How does ARP spoofing (or poisoning) work

A: In ARP spoofing, an attacker sends forged ARP replies to victims to poison their ARP cache, redirecting traffic through the attacker’s machine for interception or manipulation.

8
New cards

Flashcard 8
Q: What is the effect of ARP spoofing in a switched network

A: It enables a man-in-the-middle (MITM) attack where the attacker can intercept, modify, or drop data between two victim hosts.

9
New cards

Flashcard 9
Q: What are some common ARP spoofing defenses

A: Defenses include using static ARP entries for critical addresses, cache poisoning resistance measures (like ignoring unsolicited replies), and monitoring tools such as arpwatch.

10
New cards

Flashcard 10
Q: What is the purpose of DHCP in a network

A: DHCP dynamically assigns IP addresses and other network configuration details (like default gateway and DNS servers) to hosts on a network.

11
New cards

Flashcard 11
Q: How can an attacker exploit DHCP through server spoofing

A: By operating a rogue DHCP server, an attacker can assign malicious IP configurations (such as a bogus default gateway), redirecting traffic to enable MITM attacks.

12
New cards

Flashcard 12
Q: What is DHCP starvation

A: DHCP starvation occurs when an attacker floods the DHCP server with fake requests using spoofed MAC addresses, exhausting the available IP addresses and denying service to legitimate clients.

13
New cards

Flashcard 13
Q: What role does DHCP snooping play in defense

A: DHCP snooping filters DHCP packets on untrusted ports, maintains a binding table of legitimate leases, and helps prevent rogue DHCP servers and starvation attacks.

14
New cards

Flashcard 14
Q: What is a port in networking, and why is it important

A: A port is an endpoint for network communications, and knowing which ports are open on a host helps determine which services are running and potentially exploitable.

15
New cards

Flashcard 15
Q: How can attackers use port scanning

A: Attackers use tools like nmap, ZMap, or Shodan to scan for open ports, fingerprint services, and gather information for subsequent exploits.

16
New cards

Flashcard 16
Q: What is the significance of TCP’s three-way handshake

A: The three-way handshake (SYN, SYN-ACK, ACK) establishes a reliable TCP connection; understanding it is key to recognizing various TCP-based scans and attacks.

17
New cards

Flashcard 17
Q: What are common TCP flags, and what do they do

A: Common TCP flags include SYN (initiate connection), ACK (acknowledge receipt), FIN (finish communication), and RST (reset connection), each controlling aspects of connection management.

18
New cards

Flashcard 18
Q: What is a SYN scan, and why is it used

A: A SYN scan (half-open scan) sends a SYN packet to initiate a connection; if a SYN-ACK is received, the port is considered open. It’s fast and stealthier than a full connection scan.

19
New cards

Flashcard 19
Q: How does a FIN scan differ from other TCP scans

A: In a FIN scan, a FIN packet is sent to a port; closed ports typically reply with an RST, while open ports usually ignore the FIN, helping determine port status.

20
New cards

Flashcard 20
Q: What is TCP fingerprinting

A: TCP fingerprinting analyzes how a host responds to specific TCP packets to deduce its operating system and software version, using variations in parameters like initial packet size, TTL, and window size.

21
New cards

Flashcard 21
Q: What is TCP hijacking

A: TCP hijacking involves injecting spoofed TCP segments with correct sequence and acknowledgment numbers to insert data or reset connections, potentially desynchronizing the legitimate session.

22
New cards

Flashcard 22
Q: What is an “ACK storm” in TCP hijacking

A: An ACK storm occurs when injected data causes both endpoints to continuously send acknowledgments in an attempt to resynchronize the connection, leading to network congestion.

23
New cards

Flashcard 23
Q: How do hosts resolve domain names to IP addresses

A: Hosts use DNS to convert human-readable domain names into IP addresses, using a distributed system of authoritative name servers and caching mechanisms.

24
New cards

Flashcard 24
Q: What is DNS cache poisoning

A: DNS cache poisoning occurs when an attacker injects forged DNS responses to corrupt a DNS resolver’s cache, causing users to be redirected to malicious sites.

25
New cards

Flashcard 25
Q: How does the bailiwick check help prevent DNS cache poisoning

A: Bailiwick checking restricts additional data in DNS responses to only the domain originally queried, preventing attackers from injecting unrelated fraudulent records.

26
New cards

Flashcard 26
Q: Why are DNS query IDs and destination port randomization important

A: Randomizing query IDs and using a wide range of ephemeral ports make it harder for attackers to successfully guess the values needed to forge DNS responses.

27
New cards

Flashcard 27
Q: What are secure DNS options that mitigate cache poisoning

A: Options include DNSSEC (which uses digital signatures to validate responses) and DNS over HTTPS (which encrypts DNS traffic).

28
New cards

Flashcard 28
Q: What is TLS, and why is it important

A: TLS (Transport Layer Security) provides encrypted communication, ensuring confidentiality, data integrity, and authentication between clients and servers over a network.

29
New cards

Flashcard 29
Q: How has TLS evolved over time

A: Starting from SSL 1.0 and evolving through SSL 3.0, TLS 1.0, 1.1, 1.2, and 1.3, newer versions address vulnerabilities and improve performance and security standards.

30
New cards

Flashcard 30
Q: What is the role of certificates in TLS

A: Certificates (typically in X.509 format) authenticate the server’s identity and establish a chain of trust, with digital signatures linking certificates to trusted authorities.

31
New cards

Flashcard 31
Q: What is forward secrecy in TLS

A: Forward secrecy ensures that session keys derived during the TLS handshake cannot be recovered even if the server’s private key is compromised later, provided a Diffie-Hellman (DH) suite is used.

32
New cards

Flashcard 32
Q: What is Encrypted ClientHello (ECH) in TLS

A: ECH is a proposed enhancement that encrypts the ClientHello message—hiding the domain the client wants to contact—to prevent eavesdroppers from knowing the target domain.

33
New cards

Flashcard 33
Q: What is a downgrade attack in the context of TLS

A: A downgrade attack forces clients to use older, less secure TLS/SSL versions by interfering with handshake messages, potentially exposing them to known vulnerabilities.

34
New cards

Flashcard 34
Q: What was the TLS POODLE attack

A: The POODLE attack exploited vulnerabilities in SSL 3.0’s CBC padding, allowing attackers to decrypt portions of secure communications when older protocol versions were allowed.

35
New cards

Flashcard 35
Q: What caused the Heartbleed bug in TLS

A: Heartbleed was a bug in OpenSSL’s implementation of the TLS Heartbeat extension that allowed attackers to read random memory, potentially leaking sensitive data like keys and passwords.

36
New cards

Flashcard 36
Q: What is the purpose of security indicators (e.g., locks) in web browsers

A: Security indicators help users identify whether a connection is encrypted via TLS, warn of potential errors (like expired certificates), and encourage safe browsing practices.

37
New cards

Flashcard 37
Q: How can attackers use fingerprinting techniques in network attacks

A: By analyzing network responses, such as variations in TCP/IP header fields or timing differences, attackers can deduce the operating system and software versions, aiding in targeted exploits.

38
New cards

Flashcard 38
Q: What is the role of tools like ZMap and Shodan in network security

A: ZMap performs high-speed, Internet-wide scans to map device distributions, while Shodan searches for connected devices and services—both useful for attackers and defenders during reconnaissance.

39
New cards

Flashcard 39
Q: How do switches and routers affect the way network attacks are conducted

A: They segment and route traffic; however, misconfigurations or inherent design limitations (like MAC flooding or ARP spoofing) can be exploited to bypass security controls.

40
New cards

Flashcard 40
Q: Why is continuous monitoring and timely patching essential for network security

A: Because networks are dynamic, and new vulnerabilities (such as those in TLS implementations or DNS configurations) can emerge, proactive monitoring and patching help mitigate risks