Network Attacks Flashcards

(12 cards)

1
Q

What are the two ways of achieving a DoS attack?

A
  1. TCP SYN Flood: Initiating a flood of unfinished TCP handshakes
  2. Smurf Attack (ICMP Flood): Sending ICMP ping to a subnet broadcast address from the spoofed IP of the server to attack, now the whole subnet answers back to the server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 goals of a MAC Flooding attack?

A

Through the MAC Flooding, the switch falls back to work as a hub, that allows eavesdropping that otherwise wouldnt be possible.

  • Data Snooping
  • Disrupting Services
  • Bypassing Security Measures (MAC Filtering)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be done to prevent MAC flooding (5 things)?

A
  • Use IDS
  • Network monitoring
  • Use Port Security
  • Limit MAC addresses per port
  • Implement VLANs to segregate traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ARP Spoofing/Poisoning and what are the 3 goals?

A

ARP Spoofing: The attacker sends falsified ARP messages over a LAN to associate his MAC address with a legitimate IP to get the traffic.

ARP Poisoning: Similar but aims to corrupt the whole ARP cache and attack more than one device.

The goals can be:
- Data interception
- On-Path Attacks
- Network disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can be done to prevent ARP attacks (4 things)?

A
  • Static ARP entries (only viable in smaller networks)
  • Dynamic ARP Inspection
  • Network Segmentation
  • VPNs or Encryption Technologies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is VLAN Hopping and how to achieve it (3 ways)?

A

VLAN Hopping is an attack where the attacker wants to direct traffic to a different VLAN than the one he is currently in.
There are 3 ways to achieve this:
1. Double Tagging
2. Switch Spoofing (Uses Dynamic Trunking Protocol)
3. MAC Table Overflow (VLANs stop being enforced)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 most important types of DNS Attacks?

A
  1. DNS Cache Poisoning (to redirect traffic to a fake site)
  2. DNS Amplification Attacks (Overwhem the server)
  3. DNS Tunneling (Hide other traffic in DNS traffic)
  4. Domain Hijacking
  5. DNS Zone Transfer Attacks (Steal all DNS entries for a domain)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 forms of On-Path attacks?

A

Replay Attack: Attacker intercepts the data and repeats it to send it to the real destination.

Relay Attack: Here the attacker is able to insert himself into the conversation and read & modify all traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SSL Stripping and a Downgrade Attack?

A

SSL Stripping tries to redirect HTTPS requests to HTTP to get around the encryption.

A downgrade attack is the alternative if SSL Stripping is not possible. There you try to have the client or server abandon the higher security mode in favor of a lower security mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 5 detection mechanisms to detect rogue devices?

A
  1. Visual Inspection of ports/switches
  2. Network mapping & host discovery
  3. Wireless monitoring
  4. Packet sniffing & traffic flow
  5. NAC & IDS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 4
types of social engineering?

A
  • Phishing: Regular Phishing, Spear Fishing, Whaling & Vishing
  • Tailgating: Regular Tailgating, Piggy Backing & Shoulder Surfing
  • Dumpster Diving
  • Eavesdropping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 6 types of malware?

A
  • Virus: Malicious code thats run without the users knowledge
  • Worms: Malware replicating itself through vulnerability exploitation
  • Trojans: Virus disguised as something harmless. Used to get full control over a device
  • Ransomware: Type of malware that encrypts all data and requests a ransom to get the key to decrypt the data
  • Spyware/Adware: Used to collect information without users knowledge like passwords, but in case of adware also behavior data
  • Rootkit: Virus to get root level access over a machine, often sitting on kernel level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly