Introduction to Security: Week 3 – Attacking Networks
Copyright By PowCoder代写 加微信 powcoder
Denial of Service
Definitions
You need to be this type of user in order to sniff or record network traffic
What is root / superuser
This is the first phase of the Cyber Kill Chain
What is reconnaisance
Dubbed as a “Swiss Army Knife” of networking; creates arbitrary TCP and UDP connections and listeners
What is Netcat
A type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer
What is the Ping of Death
This is network of infected machines, can be used to perform Distributed Denial of Service attacks
What is a botnet
In order to look at all packets regardless of destination address, your network card must be in this mode
What is promiscuous mode
By default, Nmap uses this type of scan
What is a SYN scan
Written by Gordon ” ” Lyon, this tool has become the quintessential network exploration tool
What is Nmap
This DDoS attack is also known as a half-open attack, which aims to make a server unavailable to legitimate traffic by consuming all available server resources
What is SYN flood
This is an infected and compromised machine or computing device
What is a zombie
In this type of network, packets flow through all devices on network but you look at only the packets addressed to you
What is an unswitched network
If ports are closed on a target and you send “junk” to it, this packet will be sent by the target
What is a packet containing RST
Written by in 2009, CNN called this “The scariest search engine on the Internet”
What is SHODAN
This is a DDoS attack in which an attacker attempts to flood a targeted server with Internet Control Message Protocol (ICMP) packets
What is a Smurf Attack
These are attackers who controller a botnet
What is a bot master (or bot herder)
In this type of network, packets flow through specific devices on network
What is a switched network
Running this type of scan in Nmap will send packets with FIN, PSH, URG flags
What is an Xmas scan
This is a Python program that enables the user to send, sniff, dissect, and forge network packets
What is Scapy
The DDoS attacks Against Dyn and in 2016 were of this variety
What is DNS amplification
This is an infrastructure to control malware and botnets
What is Command and Control (C&C)
A switched network doesn’t mean you can’t sniff the network traffic, you can do this instead
What is ARP spoofing (or ARP cache poisoning or ARP poison routing)
In this type of scan in Nmap, you must use real live IP addresses, else risk DDoSing the target
What is a decoy scan
An old Windows-based tool to do network packet sniffing, password cracking, and even ARP poisoning
What is Cain and Abel
Amplification-based DDoS attacks like Smurf and DNS amplification use these to cause great damage
What are spoofed source IP addresses
These are specially crafted TCP sequence numbers to help deter a type of DDoS attack
What are SYN cookies
Click to zoom
Continue ESC
Reveal Correct Response Spacebar
Attacking Networks
Press F11 Select menu option View > Enter Fullscreen for full-screen mode
Original source: https://jeopardylabs.com/
程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com