network attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

DoS attack

makes a resource unavailable for legit use

  • sends a huge number of requests to a server

  • requires a massive amount of bandwidth

  • is easy to block

2
New cards

DDoS

denial of service attack that leverages botnets

3
New cards

amplification factor of DDoS attack

  • the degree to which the attack increases in size

  • reply/request = amplification

  • 512 bytes/64 bytes= 8x amplification

4
New cards

eavesdropping attack

  • rely on a compromised communications path:

    • network device tapping

    • DNS poisoning

    • ARP poisoning

5
New cards

on path attacks

attacks like man in the middle and man in the browser because the attacker is on path between the user and service

  • On-Path Attack - intercepts a session

    • End Result: 1 active session, but hackerman is intercepting "good" traffic and replacing it with "bad" traffic

6
New cards

replay attack

uses previously captured data such as an encrypted authentication token to create a seperate connection the server that’s authenticated, but does not involve the real end user

-Replay Attack - copies a session

  • End Result: 2 active session, one "good" and one "evil"

7
New cards

preventing replay attacks

include a unique characteristic: token, timestamp

prevent reuse of captured credentials

8
New cards

SSL stripping

tricks browsers into using unencrypted communications

9
New cards

DNS poisoning

inserts incorrect DNS records to redirect traffic to the attacker’s system

10
New cards

typosquatting

an attack that consists of registering domain names similar to official sites, hoping that users will make a typo and visit their site

11
New cards

domain hijacking

an attack where the attacker gains control of an organization’s domain registration

12
New cards

URL redirection

attacker places redirects on a trusted site to content hosted on a malicious site

13
New cards

domain reputation

threat intelligence capablity that scores domains as either benign or malicious

14
New cards

address resolution protocol (ARP)

translates logical IP addresses into the hardware MAC addresses on local area networks

15
New cards

ARP poisoining

involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table. ARP Protocol translates IP addresses into MAC addresses. a successful attack allows an attacker to alter routing on a network, effectively allowing for a man in the middle attack

16
New cards

MAC flooding

  • switches maintain MAC address tables in memory, MAC flooding attacks attempt to overwhelm this table

  • rapidly cycles addresses on a single system, and causes switches to forget where systems are located. Switches respond by broadcasting traffic

  • can be prevented by using port security

17
New cards

MAC spoofing/cloning

alters the assigned hardware address of a system to assume a false identity or engage in a MAC flooding attack

18
New cards

IP spoofing

alters the IP address of a system, normally cant be used for two way communication

19
New cards

anti spoofing controls

  • ingress filtering- blocks inbound traffic that contains spoofed source addresses

  • egress filtering- blocks outbound traffic that contans spoofed source addresses

20
New cards

Wifi Protected Setup (WPS)

allows for quick setup of devices

  • should be disabled because its insecure, the pin is easily cracked

21
New cards

jamming and interference attacks

DoS attacks are easy on wireless

  • radio spectrum is open

  • loudest signal always wins

22
New cards

wardriving attack

attackers cruise areas using tools to capture info about WiFi networks

23
New cards

rogue access point

  • bypasses authentication and can cause interference

  • can be detected with intrusion detection capabilities

24
New cards

evil twin

fake access point

25
New cards

disassociation

wireless access points may forse a wireless device to immediately disconnect from the network

  • can be used by attackers to gather authentication info or conduct DoS attacks

26
New cards

bluejacking

attacker sends bluetooth spam to user device, attacker tries to entice user to take some action

27
New cards

bluesnarfing

exploits firmware flaw in older BT devices, the attacker forced pairing between devices and the connection granted access to the device

28
New cards

What command may be used to change the MAC address of a Linux system?

ifconfig

29
New cards

What type of packet do participating systems send during a Smurf attack?

ICMP echo request