Network Attacks Flashcards

(62 cards)

1
Q

Occurs when one machine is continually flooding a victim with requests for sevices

A

Denial of Service (DoS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A specific type of DoS attack that occurs when an attacker initiates multiple TCP sessions, but never complete those sessions

A

TCP SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when an attacker pings a subnet broadcast with a spoofed source IP, making the victimized server appear as the source

A

Smurf Attack (ICMP Flood)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Occurs when an attacker uses many computers all at the same time, asking for access to a single server

A

Distributed Denial of Service (DDoS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet - Collection of compromised computers

Zombie - Any one of the individually compromised computers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network attack technique that attempts to compromise the security of a network switch by attempting to overflow the switch’s MAC table

A

MAC Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Normally, a switch utilizes its MAC table to associate switchports with connected device MAC address

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Occurs when an attacker captures sensitive data by forcing the switch to broadcast traffic

A

Data Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Arises from MAC flooding, causing a DoS attack by overwhelming the network with unnecessary traffic

A

Disrupting Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bypassing Security Measures

A

MAC flooding can bypass security measures like MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To secure your networks you should:

A

Use anomaly-based Intrusion Detection System (IDS)

Configure port security to limit MAC addresses per port

Set MAC address limits per switchport

Implement VLANs to segregate traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A fundamental concept in IP networking that is used to map an IP address to MAC addresses on a local area network

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack wherein an attacker sends falsified ARP messages over a LAN | attacker aims to associate their MAC address with a target IP address

A

ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP spoofing can be used to initiate an on-path attack inside of a Layer 2 network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A form of attack that corrupts the ARP cache (ARP table) in the network

A

ARP Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP poisoning allows an attacker to alter the network traffic flow, and enable data interception, session hijacking, or Dos attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP Spoofing - Conducts a more targeted attack

ARP Poisoning - Target all devices in a LAN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How to detect ARP attacks?

A

Use ARP monitoring tools to track ARP address mappings

Alert network admins of unusual ARP traffic patterns

Configure IDSs to detec traffic anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How to prevent ARP spoofing and ARP poisoning?

A

Static ARP Entries - Manually inputting ARP mappings to prevent spoofing

Dynamic ARP Inspection - Switches inspect ARP packets, dropping suspicious mappings based on trusted MAC-IP pairs

Network Segmentation - Dividing the network into smaller segments limits the impact of ARP attacks and simplifies network management

VPNs or Encryption Technologies - VPN and encryption safeguard data against alterations from successful ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Used to partition any broadcast domain and isolate it from the rest of the network at the data link layer (Layer 2) of the OSI model

A

Virtual Local Area Network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Layer 3 routing is used, enabling application of access control lists to segregate and filter traffic between VLANs efficiently

A

As a network penetration tester, breaking out of a VLAN from a user’s workstation is necessary to access sensitive network areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technique that exploits a misconfiguration to direct traffic to a different VLAN without proper authorization | Double Tagging, switch spoofing, mac table overflow attack

A

VLAN Hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A method where the attacker tries to reach a different VLAN using vulnerabilities in the trunk port configuration

A

Double Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Inner tag - True destination

Outer tag - Native VLAN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
One where commands are sent to the victim, but the attacker or pentester does not get to see any of the responses
Blind Attack
26
The other reason for using double tagging is when obtaining a response back is not necessarily required
DoS or Stress Testing Attack
27
Occurs when an attacker attempts to use the Dynamic Trunking Protocol (DTP) to negotiate a trunk port with a switch
Switch Spoofing
28
To prevent a switch spoofing attack:
Always configure switch ports to have dynamic switch port modes disabled by default
29
Allows VLANs to no longer be enforced
MAC Table Overflow Attack
30
Switch - Selectively transmits frames Hub - Repeats every frame it receives
31
A fundamental component of the Internet that is responsible for translating human-freindly domain names into IP addresses
Domain Name System (DNS)
32
Involves corrupting DNS resolver cache with false information to redirect traffic
DNS Cache Poisoning (DNS Spoofing)
33
How to prevent DNS cache poisoning:
Utilize DNS security extensions (DNSSEC) Implement secure network configurations and firewalls
34
An attack is which the attacker exploits the DNS resolution process to overwhelm a target system with DNS response traffic
DNS Amplification Attack
35
Involves using the DNS protocol to encapsulate non-DNS traffic to attempt to bypass the organization's firewall rules
DNS Tunneling
36
Involves changing the registration of a domain name without the permission of the original registrant
Domain Hijacking (Domain Theft)
37
How to prevent domain hijacking:
Conduct regular updates Ensure that account registration info is secure Use domain registry lock services
38
An attack in which the attacker tries to get a copy of the entire DNS zone data by pretending to be an authorized system
DNS Zone Transfer Attacks
39
Attack where the attacker or penester places their workstation between two hosts to capture, monitor, and relay communications
On-path Attack
40
Occurs when an attacker captures valid data and repeats it either immediately or with a delay
Replay Attack
41
Occurs when the attacker is able to insert themselves between two hosts and become part of the conversation
Relay Attack
42
Replay - Data is captured and directly passed on Relay - Data is intercepted, modified, and then passed on
43
Network devices are identified using the hardware interface MAC address and their IP address
44
Unauthorized device or service on a corporate or private network that allows unauthorized individuals to connect to that network
Rogue Devices
45
Process of identifying and removing machines on the network that are not supposed to be there
Rogue System Detection
46
What is a rogue system?
network taps wireless access point (WAP) servers wired and wireless clients software smart appliances
47
Physical devices that is attached to cabling to record packets passing over the network segment
Network Tap
48
Device that can be connected to the network and extend the physical network into the wireless spectrum
Wireless Access Point (WAP)
49
How can you figure out what rogue device there are and how do you detect them?
Visual inspection of ports and switches - ensure that an attacker didn't install additional equipment or counterfeit equipment with fake asset tags. Conduct monthly or quarterly inventories Conduct network mappings and host discovery - Using enumeration scanners can identify hosts via banner grabbing or fingerprinting of devices across the network Wireless monitoring (Wireless sniffing and discovery) - This is used to find unknown or unidentifiable service set identifiers (SSIDs) showing up within range of the office Packet sniffing and traffic flow - This is used to identify the use of unauthorized protocols on the network and unusual peer-to-peer communications flows NAC and intrusion detection - Automated network scanning and defense and remediation suites are combined to try to prevent rogue devices from accessing the network Intrusion detection involves scanning the network and flagging any new things
50
Sending an email in an attempt to get a user to click a link
Phishing
51
Sending out emails to capture the most people and doesn't really target any particular person or group
Phishing
52
More targeted form of phishing
Spear Phishing
53
Focused on key executives within an organization | CEO, COO, CFO, CIO
Whaling
54
Entering a secure portion of the organization's building by following an authorized person into the area without their knowledge or consent
Tailgating
55
Similar to tailgating, but occurs with the employee's knowledge or consent
Piggybacking
56
Coming up behind an employee and trying to use direct observation to obtain information
Shoulder Surfing
57
A piece of malicious software disguised as a piece of harmless or desirable software
Trojan Horse
58
Provides the attacker with remote control of a victim machine
Remote Access Trojan (RAT)
59
A company implements VLANs to segregate its departments' network traffic. During a security audit, a potential vulnerability is identified where an attacker could gain unauthorized access to another VLAN. What technique could the attacker use?
VLAN Hopping
60
Cozyco Investments has experienced a cyberattack aimed at intercepting web traffic to steal sensitive information, it involved a technique that corrupts the DNS cache of a server to redirect users to malicious websites. Which of the following is the most likely to have been used?
DNS poisoning
61
While connecting to a public Wi-Fi network at a coffee shop, you unknowingly connect to a rogue access point set up by an attacker to intercept your data. This scenario is an example of:
Evil Twin
62
Bankco, a financial institution, is concerned that the sensitive data that it transmits between branches over a wide area network (WAN) could be compromised. Considering this, what type of attack could intercept and manipulate this data in transit?
On-path attack