What are the two ways of achieving a DoS attack?
What are the 3 goals of a MAC Flooding attack?
Through the MAC Flooding, the switch falls back to work as a hub, that allows eavesdropping that otherwise wouldnt be possible.
What can be done to prevent MAC flooding (5 things)?
What is ARP Spoofing/Poisoning and what are the 3 goals?
ARP Spoofing: The attacker sends falsified ARP messages over a LAN to associate his MAC address with a legitimate IP to get the traffic.
ARP Poisoning: Similar but aims to corrupt the whole ARP cache and attack more than one device.
The goals can be:
- Data interception
- On-Path Attacks
- Network disruption
What can be done to prevent ARP attacks (4 things)?
What is VLAN Hopping and how to achieve it (3 ways)?
VLAN Hopping is an attack where the attacker wants to direct traffic to a different VLAN than the one he is currently in.
There are 3 ways to achieve this:
1. Double Tagging
2. Switch Spoofing (Uses Dynamic Trunking Protocol)
3. MAC Table Overflow (VLANs stop being enforced)
What are the 5 most important types of DNS Attacks?
What are the 2 forms of On-Path attacks?
Replay Attack: Attacker intercepts the data and repeats it to send it to the real destination.
Relay Attack: Here the attacker is able to insert himself into the conversation and read & modify all traffic.
What is SSL Stripping and a Downgrade Attack?
SSL Stripping tries to redirect HTTPS requests to HTTP to get around the encryption.
A downgrade attack is the alternative if SSL Stripping is not possible. There you try to have the client or server abandon the higher security mode in favor of a lower security mode.
What are 5 detection mechanisms to detect rogue devices?
What are the 4
types of social engineering?
What are the 6 types of malware?