• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back

denial of service

prevents the victim computer from accessing local or remote services or programs

Man in the Middle (MIM)
attacker is able to read messages between two victims
Hijack
attacker commandeers (takes over) the victims computers connection
break-in
attacker gains unauthorized access to the victim computers
ping/UDP Flood
excessive amount of ICMP packets
SYN Flood
sends bogus TCP connecton requests
MAC Flood
excessive amount of packets through a switch
Distributed Denial of Service (DDoS)
army of "slave" computers launch large bandwidth-flooding attacks
Ping of Death
over-sized ICMP packet
Smurf
ICMP packets to the broadcast IP address of a large subnet, send a barrage of response packets to the victim
WinNuke
"out-of-band/urgent" TCP packet
Teardrop
overlapping fragments
Land
ideentical source and destination IP
ARP Poison (arp spoofing)
fake address resolution packet to a victim which trick the victim coputer into sending its packets to the attacker
ICMP Redirect
fake message packets which alter the victims routing table
DNS Spoofing
fake domain name resoluton packets trick the victim computer into sending its packets to the attadker
DNS Cache Poison
fake domain name resolution to a victim resolver server
Agressive exploits
launched from the attacker against the victim
Passive exploits
victim connects to the attacker
Buffer Overflow
input more informatoin in memory than it was designed to hold
Buffer Over Read
read (view) more informatoin from memory than it was intended to give
SMB Relay
attacker relays credentials back to the victim to gain access
SMB DoS
malformed header to port 445
Virus
hostile progaram, imbeds itself in abother program and propogates itself
Worm
hostile program propogates without imbedding
Trojan
hostile program masquerading as a helpful program
Spyware
collects and sends information on users
Adware
downloads and displays advertisements
Backdoor

allows unauthorized access, bypassing the normal authentication procedures

Key logger
copies the user's keystrokes
Rootkit
covers his/her tracks
Fork Bomb
large number of processes
Decompression bomb
inflates or expands to an enormous size
Dumpster diving
victim trash bin
Online Attack
uses internet to gain the trust of the victim
TCP Kill
bogus reset packets to the victim
SSL/SSHV1 MiM
sends fake certificate with public key to the victim
Dictionary
encrypts a predetermined list of words until it finds matches
Brute Force
encrypts every possible combination of characters and symbolsuntil it finds a match
Rainbow Tables

precomputed table of encrypted (hashes)