• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

What kind of info can be revealed with port scanning?

* os version


* valid username


What tool can be used to identify apps running on a server?

nmap

In which case is splicing the cable detectable?


* optical cable


* copper cable

optical

What is inductance? On which medium is it possible?

Inductance allows a physically close attacker to
eavesdrop without making physical contact


Name 3 tools that attacker can use to let user B on machine Y, act as user A on machine X without password

rlogin, rhost, ssh

buying www.uwaterlo.ca is an example of ____

spoofing

How does session hijacking work? (2)

1 )TCP protocol sets up state at sender and receiver
end nodes and uses this state while exchanging
packets
• Attacker can hijack such a session and masquerade as
one of the endpoints


2) cookie sniff/steal

TCP includes a mechanism that asks a sender
node to _____ if the network is congested. What can an attacker do with it?


An attacker could just ignore these requests

How can buffer overflow happen in tcpip?

the value in the packet’s length field could be
smaller than the packet’s actual length, making buffer overflow possible

How does XSS work?

Code steals sensitive information (e.g., cookie)
contained in the web page and sends it to attacker


How does CSRF attack work?

Code performs malicious action at some web site
(e.g., user’s bank) if user is currently logged in there
• http://www.bank.com/transferMoneyToAttacker

Name 5 ways of DoS

* cutting wire or jamming wireless signal


* flooding a node by overloading its internet capacity or processing capacity


* ping attack


* smurf attack


* SYN attack

What's a smurf attack?

Spoof (source) address of sender end node in ping
packet by setting it to victim’s address
• Broadcast ping packet to all nodes in a LAN

What is SYN flood attack?

DoS attack where Attacker sends many SYNs, but no ACKs


Name two ways of modifying packets to cause DoS

• Send packet fragments that cannot be reassembled properly
• Craft packets such that they are all hashed into
the same bucket in a hash table

What is blackhole attack?

Malicious router announces low cost for victim
destination and discards any traffic destined for victim

Other name for blackhole attack?

Packet drop attack

How does DNS attack work?

• DNS cache poisoning can lead to packets being routed to the wrong host

In a DDoS attack, Attacker breaks into machines using ______ and installs malicious software
• Machine becomes a ____ and waits for attack
command from attacker
• A network of bots is called a ______


* Trojan, buffer overflow,. . .


* zombie/bot


* botnet

What is fast flux?

• A single host name maps to hundreds of addresses of infected machines

How does Domain generation algorithm make it harder to shut down botnets?

Domain Generation Algorithm
• Infected machine generates a large set (50,000 in the case
of Conficker) of domain names that changes every day
• It contacts a random subset of these names for updates
• To control the botnet, authorities would have to take
control of 50,000 different domain names each day

How did Storm Worm defend itself?

As a self-defence mechanism, it ran DDoS attacks
against Internet addresses that scanned for it

What is the difference between privileged and sandboxed application?

Sandboxed: The application will run with restricted access that is intended to protect your computer and personal information