Network Sniffing Module 08
26 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the process of monitoring all data packets that pass through a given network?

Packet sniffing

What is the primary difference between a hub and a switch in computer networking?

  • A hub only sends data to the specified destination port, whereas a switch transmits data to all ports.
  • A switch is faster than a hub, but a hub can handle more traffic.
  • A hub is more secure than a switch, but a switch provides more flexibility.
  • A hub transmits line data to each port and has no line mapping, whereas a switch looks at the MAC address for each frame and sends data to the required port. (correct)
  • Packet sniffing programs can capture data packets from any network.

    False

    What technique is used to manipulate the functionality of the switch to see all traffic passing through it?

    <p>Packet Sniffing</p> Signup and view all the answers

    What is the purpose of ARP spoofing?

    <p>ARP spoofing involves sending a fake ARP reply to the target machine, causing all traffic intended for the gateway to be redirected through the attacker's machine.</p> Signup and view all the answers

    What is the primary purpose of MAC flooding?

    <p>To force a switch to behave like a hub, allowing for packet sniffing.</p> Signup and view all the answers

    What is the key difference between passive and active sniffing?

    <p>Passive sniffing involves capturing and monitoring traffic without sending any packets, while active sniffing actively injects packets into the network to manipulate the switch and view traffic.</p> Signup and view all the answers

    Which of the following protocols are vulnerable to sniffing when passwords are sent in cleartext?

    <p>All of the above</p> Signup and view all the answers

    What is a Denial-of-Service (DoS) attack?

    <p>A DoS attack is designed to overload a target system or network with excessive traffic, making it inaccessible to legitimate users.</p> Signup and view all the answers

    How do malicious traffic and regular traffic differ in a DoS attack?

    <p>Malicious traffic consumes all available bandwidth, while regular traffic uses a small amount of bandwidth.</p> Signup and view all the answers

    What is a Distributed Denial-of-Service (DDoS) attack?

    <p>A DDoS attack involves multiple compromised computers, known as zombies or botnets, coordinated by an attacker to overwhelm a single target system.</p> Signup and view all the answers

    Which of the following are impacts of DDoS attacks?

    <p>Loss of goodwill</p> Signup and view all the answers

    DDoS attacks primarily focus on consuming network bandwidth and overloading resources.

    <p>True</p> Signup and view all the answers

    Which of the following are examples of Volumetric DDoS attack techniques?

    <p>ICMP flood attack</p> Signup and view all the answers

    Which of the following are examples of Protocol DDoS attack techniques?

    <p>All of the above</p> Signup and view all the answers

    What is the main goal of an Application Layer DDoS attack?

    <p>Application Layer DDoS attacks aim to disrupt a specific service or application by targeting its functionality and consuming its resources, often through exploits like a buffer overflow or by sending excessive requests.</p> Signup and view all the answers

    What is a SQL injection attack?

    <p>A technique for gaining unauthorized access to a database or retrieving information directly from it by exploiting vulnerabilities in web applications.</p> Signup and view all the answers

    What are the primary goals of SQL injection attacks?

    <p>Both A and B</p> Signup and view all the answers

    SQL injection attacks primarily target databases and not web applications.

    <p>False</p> Signup and view all the answers

    What are the five categories of attack through SQL injection?

    <p>The five categories of attack through SQL injection are Authentication and Authorization Bypass, Information Disclosure, Compromised Data Integrity, Compromised Availability of Data, and Remote Code Execution.</p> Signup and view all the answers

    Which of the following server-side technologies are commonly used to create dynamic, data-driven websites and web applications?

    <p>All of the above</p> Signup and view all the answers

    SQL injection attacks only affect web applications built using specific programming languages.

    <p>False</p> Signup and view all the answers

    What are the main reasons why SQL injection attacks occur?

    <p>Lack of proper input validation</p> Signup and view all the answers

    How do SQL injection attacks exploit vulnerabilities in web applications?

    <p>SQL injection attacks exploit vulnerabilities in web applications by injecting malicious SQL commands into user-supplied data, which is then passed to the database for execution.</p> Signup and view all the answers

    HTTP GET requests are more secure than HTTP POST requests because the data is sent in the URL.

    <p>False</p> Signup and view all the answers

    What is the main purpose of HTTP POST requests?

    <p>HTTP POST requests send data to a web server, often for submitting forms or uploading files, using the message body to transmit the data.</p> Signup and view all the answers

    Study Notes

    Module 08: Sniffing

    • Packet sniffing is monitoring and capturing all data packets passing through a network using software or hardware.
    • It lets attackers observe and access network traffic.
    • Packet sniffing collects sensitive information like Telnet passwords, email traffic, syslog traffic, router configurations, web traffic, DNS traffic, FTP passwords, chat sessions, and account information.
    • In hub-based networks, sniffing is easy as all traffic passes through all connected devices.
    • Modern networks use switches, making sniffing more complex. Switches examine MAC addresses to direct traffic.
    • Attackers can manipulate switches to see all traffic.
    • Sniffers capture data only from the subnet.
    • Promiscuous mode on Network Interface Cards (NICs) allows capturing all data packets.
    • Passive sniffing monitors traffic without sending packets (hubs).
    • Active sniffing injects packets (switches), often using ARP spoofing or MAC flooding.
    • ARP spoofing sends fake ARP replies to redirect traffic through the attacker's machine.
    • MAC flooding overwhelms the switch's table to make it act as a hub.

    Module 10: Denial-of-Service

    • Denial-of-service (DoS) attacks limit legitimate users' access by overloading resources.
    • Attackers can flood a victim system with non-legitimate requests to exhaust resources.
    • Flooding can involve excessive traffic.
    • Examples include flooding IRC, TCP/IP stack with corrupt packets, or infinite-loop attacks.
    • DoS aims to deny service rather than gain access to data.
    • DoS attacks can be categorized as volumetric, protocol, or application layer attacks.

    Module 15: SQL Injection

    • SQL injection exploits unsanitized input vulnerabilities.
    • Attackers inject malicious SQL queries to manipulate the database or retrieve data.
    • SQL is used by database servers for commands like INSERT, UPDATE, and SELECT.
    • Unsanitized input allows attackers to execute arbitrary SQL code by injecting malicious queries.
    • SQL injection attacks can compromise database integrity, availability, and authorization.
    • Authorization bypass allows access to accounts without valid credentials.
    • Information disclosure retrieves sensitive information from the database.
    • Compromised data integrity alters data or inserts harmful content.
    • Compromised availability deletes or corrupts database information.
    • Remote code execution allows control of the server.
    • Server-side technologies like ASP.NET and databases often have vulnerabilities that can result in SQL injection attacks.
    • HTTP POST requests transmit data in the message body, which can also contain embedded SQL queries.
    • Proper validation of input values from users is vital to prevent SQL injection vulnerabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the intricacies of packet sniffing in this quiz, which covers the techniques used to monitor and capture network traffic. Learn about the vulnerabilities of hub-based versus switch-based networks and the methods attackers employ, such as ARP spoofing and promiscuous mode. Test your understanding of how sensitive information can be collected through sniffing.

    Use Quizgecko on...
    Browser
    Browser