编程代写 Introduction to Security: Week 3 – Attacking Networks

Introduction to Security: Week 3 – Attacking Networks

Copyright By PowCoder代写 加微信 powcoder

Denial of Service

Definitions

You need to be this type of user in order to sniff or record network traffic

What is root / superuser

This is the first phase of the Cyber Kill Chain

What is reconnaisance

Dubbed as a “Swiss Army Knife” of networking; creates arbitrary TCP and UDP connections and listeners

What is Netcat

A type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer

What is the Ping of Death

This is network of infected machines, can be used to perform Distributed Denial of Service attacks

What is a botnet

In order to look at all packets regardless of destination address, your network card must be in this mode

What is promiscuous mode

By default, Nmap uses this type of scan

What is a SYN scan

Written by Gordon ” ” Lyon, this tool has become the quintessential network exploration tool

What is Nmap

This DDoS attack is also known as a half-open attack, which aims to make a server unavailable to legitimate traffic by consuming all available server resources

What is SYN flood

This is an infected and compromised machine or computing device

What is a zombie

In this type of network, packets flow through all devices on network but you look at only the packets addressed to you

What is an unswitched network

If ports are closed on a target and you send “junk” to it, this packet will be sent by the target

What is a packet containing RST

Written by in 2009, CNN called this “The scariest search engine on the Internet”

What is SHODAN

This is a DDoS attack in which an attacker attempts to flood a targeted server with Internet Control Message Protocol (ICMP) packets

What is a Smurf Attack

These are attackers who controller a botnet

What is a bot master (or bot herder)

In this type of network, packets flow through specific devices on network

What is a switched network

Running this type of scan in Nmap will send packets with FIN, PSH, URG flags

What is an Xmas scan

This is a Python program that enables the user to send, sniff, dissect, and forge network packets

What is Scapy

The DDoS attacks Against Dyn and in 2016 were of this variety

What is DNS amplification

This is an infrastructure to control malware and botnets

What is Command and Control (C&C)

A switched network doesn’t mean you can’t sniff the network traffic, you can do this instead

What is ARP spoofing (or ARP cache poisoning or ARP poison routing)

In this type of scan in Nmap, you must use real live IP addresses, else risk DDoSing the target

What is a decoy scan

An old Windows-based tool to do network packet sniffing, password cracking, and even ARP poisoning

What is Cain and Abel

Amplification-based DDoS attacks like Smurf and DNS amplification use these to cause great damage

What are spoofed source IP addresses

These are specially crafted TCP sequence numbers to help deter a type of DDoS attack

What are SYN cookies

Click to zoom

Continue ESC

Reveal Correct Response Spacebar

Attacking Networks

Press F11 Select menu option View > Enter Fullscreen for full-screen mode

Original source: https://jeopardylabs.com/

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com