DoS and DDoS Attacks - Denial of Service (DoS) floods a network or system with excessive traffic to cause downtime, while Distributed Denial of Service (DDoS) uses multiple devices (botnets) to amplify the attack.
Common Types of DDoS Attacks - Volumetric attacks overwhelm bandwidth, protocol attacks target network infrastructure (e.g., SYN floods), and application-layer attacks disrupt services like HTTP and DNS.
MAC Flooding - Overloads a network switch’s MAC address table by sending excessive fake MAC addresses, forcing it into flooding mode and allowing an attacker to capture unicast traffic.
How to Prevent MAC Flooding - Implement Port Security on switches to limit MAC addresses per port and enable dynamic ARP inspection (DAI).
ARP Attacks - Involves spoofing ARP messages to trick devices into sending traffic to an attacker’s MAC address, allowing Man-in-the-Middle (MitM) attacks and packet sniffing.
How to Prevent ARP Attacks - Use Dynamic ARP Inspection (DAI) and static ARP entries to verify valid ARP responses.
VLAN Hopping - Exploiting misconfigured VLANs to gain unauthorized access to traffic on another VLAN, often through switch spoofing or double-tagging attacks.
How to Prevent VLAN Hopping - Disable unused switch ports, set manual trunking, and restrict VLAN assignments.
DNS Attacks - Includes DNS poisoning (injecting fake DNS records), DNS hijacking (redirecting traffic), and amplification attacks (massive DNS queries overwhelming a target).
On-Path Attack (MitM) - An attacker secretly intercepts and manipulates network traffic between two parties, often using ARP spoofing, DNS poisoning, or rogue access points.
How to Prevent On-Path Attacks - Use encryption (TLS/SSL, VPNs), static ARP entries, and secure DNS (DNSSEC).
Rogue Devices and Attacks - Rogue APs (unauthorized wireless access points) can bypass network security, allowing attackers to intercept data or conduct Evil Twin attacks.
How to Prevent Rogue Devices - Implement 802.1X authentication, enable Wireless Intrusion Detection Systems (WIDS), and monitor for unauthorized devices.
Social Engineering Attacks - Psychological manipulation to trick people into revealing sensitive information or granting unauthorized access (e.g., phishing, pretexting, baiting, tailgating).
Understanding Phishing Attacks - Attackers impersonate trusted sources via email, phone, or text to steal credentials, money, or personal information. Variants include spear phishing (targeted) and whaling (high-profile targets).
How to Identify Phishing Emails - Look for urgent language, spoofed domains, unexpected attachments, and generic greetings.
Malware Attacks - Malicious software that disrupts, damages, or gains unauthorized access to a system. Includes viruses, worms, Trojans, ransomware, and spyware.
How to Prevent Malware - Use updated antivirus software, firewalls, regular patching, and avoid downloading unknown files or clicking suspicious links.
DoS vs. DDoS - DoS is a single-source attack; DDoS uses multiple systems (botnets) to flood a network or service.
What is a SYN Flood? - A DoS attack where the attacker sends multiple SYN requests to a server but never completes the handshake, overloading it.
What is an amplification attack? - A DDoS technique that exploits a service (like DNS or NTP) to multiply attack traffic against a target.
How can you mitigate DDoS attacks? - Use rate limiting, traffic filtering, firewalls, and DDoS protection services like Cloudflare or AWS Shield.
Why does MAC flooding work? - Overloads a switch’s MAC address table, forcing it into flooding mode, making it act like a hub and exposing all traffic.
How do switches defend against MAC flooding? - Port security, which limits MAC addresses per port, and storm control, which blocks excessive traffic.
How does an ARP spoofing attack work? - The attacker sends fake ARP replies, mapping their MAC address to a legitimate IP, intercepting traffic.
What tools can detect ARP attacks? - Wireshark, ARPwatch, and Dynamic ARP Inspection (DAI).
Two types of VLAN hopping attacks? - Switch Spoofing (tricking a switch into granting VLAN access) and Double Tagging (modifying VLAN tags to jump networks).
What setting prevents VLAN hopping? - Disable Dynamic Trunking Protocol (DTP) and use manual VLAN assignments.
What is DNS poisoning? - An attack that injects false DNS records into a cache, redirecting users to malicious sites.
How can DNS attacks be prevented? - Use DNSSEC, encrypted DNS (DoH/DoT), and configure DNS filtering.
What is a DNS amplification attack? - A DDoS attack that exploits open DNS resolvers to send large responses to a victim’s IP, overwhelming their network.
How does an attacker perform a MitM attack? - They intercept communication using ARP poisoning, rogue APs, or compromised routers to eavesdrop or manipulate data.
What prevents MitM attacks? - Encryption (TLS, VPNs), static ARP entries, and secure authentication (e.g., multifactor authentication).
What is an Evil Twin attack? - A rogue Wi-Fi access point that mimics a legitimate one to steal credentials and intercept traffic.
How do you detect rogue access points? - Use Wireless Intrusion Detection Systems (WIDS) and scan for unauthorized SSIDs.
What are common social engineering methods? - Pretexting, baiting, tailgating, phishing, and vishing (voice phishing).
How can employees protect against social engineering? - Security awareness training, verifying requests, and using multifactor authentication (MFA).
What is spear phishing? - A targeted phishing attack that uses personal information to trick a specific victim into revealing credentials.
What is whaling? - A phishing attack aimed at high-profile individuals like CEOs and executives.
How can you identify a phishing email? - Look for misspellings, urgent language, fake links, and verify the sender’s email domain.
What is the difference between a virus and a worm? - A virus needs a host file to spread, while a worm is self-replicating across networks.
What is a Trojan horse? - Malware that disguises itself as legitimate software but contains a malicious payload.
How does ransomware work? - Encrypts files on a victim’s device and demands a ransom to restore access.