Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
What kind of info can be revealed with port scanning? |
* os version * valid username
|
|
What tool can be used to identify apps running on a server? |
nmap |
|
In which case is splicing the cable detectable? * optical cable * copper cable |
optical |
|
What is inductance? On which medium is it possible? |
Inductance allows a physically close attacker to
|
|
Name 3 tools that attacker can use to let user B on machine Y, act as user A on machine X without password |
rlogin, rhost, ssh |
|
buying www.uwaterlo.ca is an example of ____ |
spoofing |
|
How does session hijacking work? (2) |
1 )TCP protocol sets up state at sender and receiver 2) cookie sniff/steal |
|
TCP includes a mechanism that asks a sender
|
An attacker could just ignore these requests |
|
How can buffer overflow happen in tcpip? |
the value in the packet’s length field could be |
|
How does XSS work? |
Code steals sensitive information (e.g., cookie)
|
|
How does CSRF attack work? |
Code performs malicious action at some web site |
|
Name 5 ways of DoS |
* cutting wire or jamming wireless signal * flooding a node by overloading its internet capacity or processing capacity * ping attack * smurf attack * SYN attack |
|
What's a smurf attack? |
Spoof (source) address of sender end node in ping |
|
What is SYN flood attack? |
DoS attack where Attacker sends many SYNs, but no ACKs
|
|
Name two ways of modifying packets to cause DoS |
• Send packet fragments that cannot be reassembled properly |
|
What is blackhole attack? |
Malicious router announces low cost for victim |
|
Other name for blackhole attack? |
Packet drop attack |
|
How does DNS attack work? |
• DNS cache poisoning can lead to packets being routed to the wrong host |
|
In a DDoS attack, Attacker breaks into machines using ______ and installs malicious software
|
* Trojan, buffer overflow,. . . * zombie/bot * botnet |
|
What is fast flux? |
• A single host name maps to hundreds of addresses of infected machines |
|
How does Domain generation algorithm make it harder to shut down botnets? |
Domain Generation Algorithm |
|
How did Storm Worm defend itself? |
As a self-defence mechanism, it ran DDoS attacks |
|
What is the difference between privileged and sandboxed application? |
Sandboxed: The application will run with restricted access that is intended to protect your computer and personal information |