Network Attacks and Defences Lecture 7

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

A comprehensive set of 50 question-and-answer flashcards covering sniffing, ARP/DHCP, MITM, DoS/DDoS, DNS and DNSSEC, Wi-Fi security, and firewall/IDS concepts from the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

What is packet sniffing in network security?

Eavesdropping on network communications by capturing packets in transit.

2
New cards

Which element of the CIA triad does packet sniffing primarily violate?

Confidentiality.

3
New cards

Why is passive sniffing easy on non-switched (hub) networks?

Hubs send every packet to every port, so any host can see all traffic without special effort.

4
New cards

In VirtualBox, which network option simulates a hub to enable sniffing?

Promiscuous Mode = Allow All.

5
New cards

Why are layer-1 hubs rare today?

They are noisy, insecure, and inefficient compared with switches.

6
New cards

What major risk do open wireless networks pose?

Attackers can freely capture and inspect all unencrypted traffic.

7
New cards

What does the tool Driftnet do?

Listens to network traffic and extracts images from observed TCP streams.

8
New cards

Name a historic example of a physical network tap operation.

Operation Ivy Bells, where the CIA/Navy tapped Soviet under-sea cables.

9
New cards

Give one modern hardware device used for network MITM/tapping.

Hak5 LAN Turtle (or an optic-fibre tap).

10
New cards

What legitimate switch feature mirrors traffic to a monitoring port?

SPAN (Switch Port Analyzer) / mirror port.

11
New cards

What is the purpose of ARP (Address Resolution Protocol)?

To map an IP address to its corresponding MAC address on a LAN.

12
New cards

How is an ARP request sent and how is an ARP reply sent?

Request: broadcast to all hosts; Reply: unicast to the requester.

13
New cards

What information is stored in an ARP cache?

IP-to-MAC address mappings learned recently.

14
New cards

What is ARP cache poisoning?

Injecting forged ARP replies so a victim stores the attacker’s MAC for a valid IP.

15
New cards

Where must the attacker be located to perform ARP poisoning effectively?

On the same subnet/broadcast domain as the victims.

16
New cards

Describe MITM via ARP poisoning.

Attacker tricks both victim and gateway into mapping each other’s IP to attacker’s MAC, relaying traffic through the attacker.

17
New cards

Name a switch feature that mitigates ARP cache poisoning.

Dynamic ARP Inspection (DAI).

18
New cards

What problem does DHCP solve for a new host?

Provides initial network configuration (IP, DNS server IP, gateway IP).

19
New cards

List the four messages in a DHCP handshake in order.

1) Discover, 2) Offer, 3) Request, 4) Acknowledgement.

20
New cards

Why are ARP and DHCP vulnerable to spoofing?

They use broadcasts and have no built-in authentication, so the first response wins.

21
New cards

Differentiate DoS and DDoS attacks.

DoS uses one source to overwhelm a target; DDoS uses many compromised systems to amplify the effect.

22
New cards

What is TCP RST (reset) injection?

Sending forged RST packets with correct ports/sequence numbers to forcibly close a TCP connection.

23
New cards

What knowledge does an attacker need for TCP RST injection?

Source/Destination IPs and ports plus correct sequence/ack numbers (often from sniffing).

24
New cards

What is a SYN-flooding attack?

Sending a large number of TCP SYNs (often with spoofed IPs) to exhaust a server’s half-open connection table.

25
New cards

How do SYN cookies defend against SYN floods?

Server encodes state in the SYN-ACK’s sequence number (cookie) and postpones resource allocation until the client’s ACK proves legitimacy.

26
New cards

What is an amplification attack?

Spoofing small requests to services that send large responses, causing traffic amplification toward the victim.

27
New cards

Give an example of an amplification attack using ICMP.

Smurf attack: broadcast ICMP echo requests with victim’s spoofed IP; many hosts reply, flooding the victim.

28
New cards

How does DNS amplification work?

Spoof DNS queries that yield large responses, so the DNS server floods the victim with amplified traffic.

29
New cards

What is hosts-file poisoning?

Altering a local hosts file so domain names resolve to attacker-chosen IPs.

30
New cards

Explain DNS cache poisoning via spoofed UDP response.

Attacker sniffs query and sends a fake DNS reply faster than the real server, inserting malicious IPs into the cache.

31
New cards

Requirement for LAN-side DNS spoofing attacks?

Attacker must be on the same subnet and able to sniff traffic (e.g., open Wi-Fi or MITM).

32
New cards

What cryptographic mechanism does DNSSEC add to DNS records?

Digital signatures (RRSIG) verified with public keys (DNSKEY).

33
New cards

How does DNSSEC establish trust in name-server public keys?

A certificate-like chain of DS records from the root down the hierarchy creates inherited trust.

34
New cards

List the common Wi-Fi security modes from weakest to strongest (legacy).

Open, WEP, WPA, WPA2 (and WPA3 modern).

35
New cards

Why is WEP considered insecure?

Uses RC4 with a 24-bit IV and fixed key; attackers can collect IVs and recover the key in minutes.

36
New cards

State one design goal of WPA2.

Encrypt traffic so attackers without the Wi-Fi password cannot read packets.

37
New cards

Briefly describe the WPA2 4-way handshake purpose.

Derives fresh Pairwise Transient Key (PTK) from the pre-shared key (PSK) and nonces to encrypt traffic.

38
New cards

How can an attacker perform an offline brute-force attack against WPA2-PSK?

Capture the 4-way handshake, guess passwords offline, derive PTK, and verify MIC until a match is found.

39
New cards

Name two notable WPA/WPA2 vulnerabilities disclosed after deployment.

Key Reinstallation Attack (KRACK, 2017) and Hashcat’s PMKID offline crack (2018).

40
New cards

What 2019 attack highlighted weaknesses in early WPA3 implementations?

Dragonblood attack.

41
New cards

What is the primary purpose of a firewall in network security?

Provide a single controlled point for inbound/outbound traffic based on security policy.

42
New cards

How does a stateless (packet-filter) firewall differ from a stateful firewall?

Stateless inspects each packet’s header only; stateful tracks connection states and can detect spoofed or out-of-sequence packets.

43
New cards

What extra visibility does an application-layer (Layer-7) firewall provide?

Examines protocol content (e.g., HTTP) to block attacks like SQL injection or XSS.

44
New cards

Describe the traditional DMZ segmentation model.

Internet-facing servers are isolated in a DMZ; north-south traffic restricted, east-west internal traffic more lenient.

45
New cards

What is microsegmentation?

Applying granular, zero-trust policies between individual servers or workloads to limit lateral movement.

46
New cards

List the three main detection methodologies used by IDS/IPS systems.

Signature-based, anomaly-based, and stateful protocol analysis.

47
New cards

What is the difference between IDS and IPS?

IDS monitors and alerts; IPS is inline and can actively block or drop malicious traffic.

48
New cards

What tool can monitor ARP traffic to detect poisoning attempts?

arpwatch.

49
New cards

Which legacy protocols should be avoided because they transmit data unencrypted?

FTP, Telnet, HTTP, SMTP, etc.

50
New cards

Name two secure protocols recommended to protect against sniffing and MITM.

SSL/TLS (e.g., HTTPS) and SSH.