Section 15: Network Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/51

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

52 Terms

1
New cards

DoS Attack

Denial of Service attack that floods a network or system with excessive traffic to cause downtime.

2
New cards

DDoS Attack

Distributed Denial of Service attack that uses multiple devices (botnets) to amplify the attack.

3
New cards

Volumetric Attack

A type of DDoS attack that overwhelms bandwidth with excessive traffic.

4
New cards

SYN Flood

A DoS attack where the attacker sends multiple SYN requests to a server but never completes the handshake, overloading the server.

5
New cards

MAC Flooding

A technique that overloads a network switch’s MAC address table with fake MAC addresses, forcing it into flooding mode.

6
New cards

Port Security

A method to prevent MAC flooding by limiting the number of MAC addresses that can be learned on a port of a switch.

7
New cards

ARP Spoofing

An attack that tricks devices into sending traffic to the attacker’s MAC address, enabling Man-in-the-Middle attacks.

8
New cards

Dynamic ARP Inspection (DAI)

A security feature that helps to prevent ARP attacks by validating ARP responses.

9
New cards

VLAN Hopping

Exploiting misconfigured VLANs to gain unauthorized access to traffic on another VLAN.

10
New cards

DNS Poisoning (Spoofing)

An attack that injects false DNS records into a cache, redirecting users to malicious sites.

11
New cards

MitM Attack (On-Path Attack)

An attack where a malicious actor intercepts and manipulates communication between two parties.

12
New cards

Evil Twin Attack

A rogue Wi-Fi access point that mimics a legitimate access point to steal credentials.

13
New cards

Phishing Attack

A social engineering attack where attackers masquerade as trusted entities to steal sensitive information.

14
New cards

Spear Phishing

A targeted phishing attack that uses personalized information to trick a specific victim.

15
New cards

Whaling

A phishing attack that targets high-profile individuals such as CEOs and executives.

16
New cards

Ransomware

Malware that encrypts files on a victim’s device and demands ransom for restoration.

17
New cards

DNS Amplification Attack

A DDoS technique that exploits vulnerabilities in DNS or NTP to multiply attack traffic.

18
New cards

Trojan Horse

Malware disguised as legitimate software, containing a harmful payload.

19
New cards

WIDS (Wireless Intrusion Detection System)

A system used to monitor wireless networks for unauthorized access points.

20
New cards

Storm Control

A feature on switches that helps to prevent MAC flooding by blocking excessive traffic.

21
New cards

Firewall

A security device or software that monitors and controls incoming and outgoing network traffic.

22
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

23
New cards

Encryption

The process of encoding information to prevent unauthorized access, commonly used to secure communications.

24
New cards

Static ARP Entries

Fixed mappings of IP addresses to MAC addresses that help prevent ARP spoofing.

25
New cards

TLS/SSL

Protocols used to secure communications over computer networks.

26
New cards

DNSSEC

A suite of extensions to DNS which adds a layer of security by enabling DNS responses to be verified.

27
New cards

Vishing

Voice phishing, a type of social engineering attack conducted over the phone to steal personal information.

28
New cards

Tailgating

A social engineering technique where an unauthorized person follows an authorized person into a restricted area.

29
New cards

Baiting

A social engineering attack that exploits human curiosity to lure victims into a trap.

30
New cards

Emergency Language in Emails

Urgent wording often used in phishing emails to manipulate victims into acting quickly.

31
New cards

Software Update/ Patching

Regularly updating application software to protect against vulnerabilities.

32
New cards

Rogue Access Points

Unauthorized wireless access points that can compromise network security.

33
New cards

Botnets

Networks of compromised computers used to execute DDoS attacks or spread malware.

34
New cards

Generic Greetings in Phishing Emails

Commonly used phrases in phishing attempts that lack personalization, often a red flag.

35
New cards

Smurf Attack (ICMP Flood)

Occurs when an attacker pings a subnet broadcast with a spoofed source IP, making the victimized server appear as the source

36
New cards

Data Snooping

Occurs when an attacker captures sensitive data by forcing the switch to broadcast traffic

37
New cards

Double Tagging

A method where the attacker tries to reach a different VLAN using vulnerabilities in the trunk port configuration

38
New cards

Switch Spoofing

Occurs when an attack attempts to use the Dynamic Trunking Protocol (DTP) to negotiate a trunk port with a switch

39
New cards

MAC Table Overflow Attack

Allows VLANs to no longer be enforced, will make the switch acts as a hub

40
New cards

DNS Tunneling

Involves using the DNS protocol to encapsulate non-DNS traffic to attempt to bypass the org’s firewall rules

41
New cards

Domain Hijacking

Involves changing the registration of a domain name without the permission of the original registrant

42
New cards

DNS Zone Transfer Attacks

An attack in which the attacker tries to get a copy of the entire DNS zone data by pretending to be an authorized system

43
New cards

On-path Attack

Attack where the attacker or pentester places their workstation between two hosts to capture, monitor, and relay communications

44
New cards

Replay Attack

Occurs when an attacker captures valid data and repeats it either immediately or with a delay

45
New cards

Relay Attack

Occurs when the attacker is able to insert themselves between two hosts and become part of the conversation

46
New cards

SSL Stripping

Redirecting HTTPS requests to HTTP in an attempt to trick the encryption application

47
New cards

Downgrade Attack

An attack in which the attacker attempts to have a client or server abandon its higher security mode in favor of a lower security mode

48
New cards

Rogue Devices

Unauthorized device or service on a corporate or private network that allows unauthorized individuals to connect to that network

49
New cards

Network Tap

Physical device that is attached to cabling to record packets passing over the network segment

50
New cards

Worm

A piece of malicious software that can replicate itself without user interaction

51
New cards

RAT

  • Remote Access Trojan

  • Provides the attacker with remote control of a victim machine

52
New cards

Rootkit

Malicious software (malware) designed to gain unauthorized access to a computer or network while hiding its presence. Rootkits often allow attackers to take control of a system, steal data, install additional malware, and bypass security measures.