🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Practical Packet Analysis - Security Scenarios
28 Questions
0 Views

Practical Packet Analysis - Security Scenarios

Created by
@JoyfulLorentz

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

How can we filter for port 443?

tcp.port == 443

How can we be more accurate when filtering for port 443?

(tcp.srcport == 443 && ip.src == 64.13.134.52) || (tcp.dstport == 443 && ip.dst == 64.13.134.52)

What if we wanted to check all the responses from the target?

ip.src == 64.13.134.52

How can we filter for open ports only?

<p>tcp.flags.syn == 1 &amp;&amp; tcp.flags.ack==1</p> Signup and view all the answers

What is a gratuitous ARP?

<p>An ARP packet sent out with the MAC address without a request for it.</p> Signup and view all the answers

How can an attacker use gratuitous ARPs?

<p>To place a device between the router and target.</p> Signup and view all the answers

What is the purpose of using gratuitous ARPs?

<p>To update ARP caches of other devices.</p> Signup and view all the answers

Why is it important to know the MAC address of the target?

<p>To impersonate the default gateway.</p> Signup and view all the answers

What type of attack involves using gratuitous ARPs?

<p>ARP poisoning.</p> Signup and view all the answers

What happens when an attacker successfully uses gratuitous ARPs?

<p>They can intercept and manipulate network traffic.</p> Signup and view all the answers

What is the first step of attacking a network?

<p>Reconnaissance</p> Signup and view all the answers

What type of scan sends a SYN request to hosts and port numbers to scan for potential services?

<p>SYN Scan</p> Signup and view all the answers

How does SYN Scan determine which ports are open on a target host?

<p>By analyzing the reply to the SYN request</p> Signup and view all the answers

What does a target host's response of SYN/ACK indicate during a SYN Scan?

<p>Port is open</p> Signup and view all the answers

In SYN Scan, what does a target host's response of RST indicate?

<p>Port is closed</p> Signup and view all the answers

How can Wireshark help in identifying which ports are open, closed, and filtered during a SYN Scan?

<p>By analyzing the conversations and packets captured</p> Signup and view all the answers

How does session hijacking work?

<p>By taking the session cookie and using it to access the currently logged in session.</p> Signup and view all the answers

What was the purpose of FireSheep addon?

<p>To hijack sessions over an open WIFI network.</p> Signup and view all the answers

How has the mass adoption of HTTPS impacted session hijacking?

<p>It has made session hijacking increasingly difficult due to encryption.</p> Signup and view all the answers

What method can be used in a man-in-the-middle attack to intercept traffic and pretend to be the destination?

<p>Access to an approved root CA on the target's machine.</p> Signup and view all the answers

What is typically encrypted when using HTTPS?

<p>Everything transmitted over HTTPS is encrypted.</p> Signup and view all the answers

What can be observed in Wireshark when the session is transmitted over plain HTTP?

<p>Session cookies can be intercepted and viewed in plain text.</p> Signup and view all the answers

What is the purpose of ransomware?

<p>Encrypt or lock out a computer until a sum of money is paid</p> Signup and view all the answers

What is the significance of the C2 sequence in the context of cyber attacks?

<p>All suspicious communications occur to the same server and script with various alphanumeric sequences</p> Signup and view all the answers

How is encryption typically performed in cyber attacks?

<p>Using asymmetric encryption</p> Signup and view all the answers

What is the role of browser extensions in changing session cookies?

<p>To change the current session cookie to the intercepted one</p> Signup and view all the answers

What type of file was involved in the attack scenario described?

<p>Flash application</p> Signup and view all the answers

What is the action taken by the user that leads to the suspicious POST requests?

<p>Downloading a flash file</p> Signup and view all the answers

More Quizzes Like This

Wireshark Network Traffic Analysis
6 questions
Wireshark: Network Packet Analysis
12 questions
Packet Analysis and Ettercap Tool
18 questions
Wireshark Basics Quiz
10 questions

Wireshark Basics Quiz

UnmatchedMandolin avatar
UnmatchedMandolin
Use Quizgecko on...
Browser
Browser