Podcast
Questions and Answers
What is the primary goal of social engineering attacks?
What is the primary goal of social engineering attacks?
- To install the latest operating system updates
- To manipulate individuals into divulging confidential information or performing actions (correct)
- To improve network security protocols
- To physically damage computer hardware
What is 'pretexting' in the context of social engineering?
What is 'pretexting' in the context of social engineering?
- Creating a false scenario to convince a victim to provide information (correct)
- Sending unsolicited emails in bulk
- Physically following someone into a secured area
- Looking over someone's shoulder to steal information
What does a threat actor do in a phishing attack?
What does a threat actor do in a phishing attack?
- Pretends to be someone they are not to gain trust
- Rummages through trash bins for confidential documents
- Inconspicuously observes someone's shoulder to steal information
- Sends fraudulent emails disguised as legitimate communications (correct)
What is the main characteristic of a 'spear phishing' attack?
What is the main characteristic of a 'spear phishing' attack?
What is another term for 'spam'?
What is another term for 'spam'?
What is 'something for something' or quid pro quo in social engineering?
What is 'something for something' or quid pro quo in social engineering?
What is the social engineering attack known as 'baiting'?
What is the social engineering attack known as 'baiting'?
What is the main action performed by a threat actor during 'impersonation'?
What is the main action performed by a threat actor during 'impersonation'?
What is 'tailgating' in the context of physical security?
What is 'tailgating' in the context of physical security?
What is 'shoulder surfing'?
What is 'shoulder surfing'?
What does 'dumpster diving' involve?
What does 'dumpster diving' involve?
What is the Social Engineering Toolkit primarily designed for?
What is the Social Engineering Toolkit primarily designed for?
What is a key recommendation for protecting against social engineering attacks?
What is a key recommendation for protecting against social engineering attacks?
What is a Denial of Service (DoS) attack intended to do?
What is a Denial of Service (DoS) attack intended to do?
What is a common characteristic of a 'Overwhelming Quantity of Traffic' DoS attack?
What is a common characteristic of a 'Overwhelming Quantity of Traffic' DoS attack?
What happens in a 'Maliciously Formatted Packets' DoS attack?
What happens in a 'Maliciously Formatted Packets' DoS attack?
What is the key difference between a DoS and a DDoS attack?
What is the key difference between a DoS and a DDoS attack?
In a DDoS attack, what is a 'botnet'?
In a DDoS attack, what is a 'botnet'?
What is the purpose of the CnC system in a DDoS attack?
What is the purpose of the CnC system in a DDoS attack?
What is a key vulnerability of IP addressed described?
What is a key vulnerability of IP addressed described?
What is the purpose of ICMP in the context of network attacks?
What is the purpose of ICMP in the context of network attacks?
What is the goal of amplification and reflection attacks?
What is the goal of amplification and reflection attacks?
What is the primary action in address spoofing attacks?
What is the primary action in address spoofing attacks?
What does a 'Man-in-the-Middle (MITM)' attack involve?
What does a 'Man-in-the-Middle (MITM)' attack involve?
What is the purpose of using an ICMP access control list (ACL)?
What is the purpose of using an ICMP access control list (ACL)?
What is the function of ICMP echo request and echo reply messages?
What is the function of ICMP echo request and echo reply messages?
What is the purpose of an ICMP unreachable message?
What is the purpose of an ICMP unreachable message?
What type of attack is a Smurf attack?
What type of attack is a Smurf attack?
In amplification attacks, what data is contained within the ICMP echo request messages?
In amplification attacks, what data is contained within the ICMP echo request messages?
What is the purpose of MAC address spoofing attacks?
What is the purpose of MAC address spoofing attacks?
What is the role of the switch when it receives a frame with a newly-configured MAC address in a MAC spoofing attack?
What is the role of the switch when it receives a frame with a newly-configured MAC address in a MAC spoofing attack?
What is a result of a successful MAC address spoofing attack?
What is a result of a successful MAC address spoofing attack?
What is a key function of TCP?
What is a key function of TCP?
What is the initial step in the TCP three-way handshake?
What is the initial step in the TCP three-way handshake?
What is exploited in a TCP SYN Flood attack?
What is exploited in a TCP SYN Flood attack?
What is the result of a successful TCP SYN Flood attack?
What is the result of a successful TCP SYN Flood attack?
What is the purpose of a TCP reset attack?
What is the purpose of a TCP reset attack?
What is the purpose of the FIN flag in TCP during terminating a connection?
What is the purpose of the FIN flag in TCP during terminating a connection?
What must a threat actor do to conduct a successful TCP session hijacking?
What must a threat actor do to conduct a successful TCP session hijacking?
What is a characteristic of UDP?
What is a characteristic of UDP?
What commonly happens in a UDP flood attack?
What commonly happens in a UDP flood attack?
Flashcards
Social Engineering
Social Engineering
An attack that attempts to manipulate individuals into divulging confidential information or performing certain actions.
Pretexting
Pretexting
A type of social engineering attack where a threat actor pretends to need personal or financial data to confirm the identity of the recipient.
Phishing
Phishing
A fraudulent email disguised as being from a legitimate source to trick the recipient into installing malware or sharing personal information.
Spear Phishing
Spear Phishing
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Something for Something
Something for Something
Signup and view all the flashcards
Baiting
Baiting
Signup and view all the flashcards
Impersonation
Impersonation
Signup and view all the flashcards
Tailgating
Tailgating
Signup and view all the flashcards
Shoulder Surfing
Shoulder Surfing
Signup and view all the flashcards
Dumpster Diving
Dumpster Diving
Signup and view all the flashcards
Social Engineering Toolkit (SET)
Social Engineering Toolkit (SET)
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Overwhelming Quantity of Traffic
Overwhelming Quantity of Traffic
Signup and view all the flashcards
Maliciously Formatted Packets
Maliciously Formatted Packets
Signup and view all the flashcards
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS)
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
Spoofed source IP address
Spoofed source IP address
Signup and view all the flashcards
ICMP attacks
ICMP attacks
Signup and view all the flashcards
Amplification and reflection attacks
Amplification and reflection attacks
Signup and view all the flashcards
Address spoofing attacks
Address spoofing attacks
Signup and view all the flashcards
Man-in-the-middle attack (MITM)
Man-in-the-middle attack (MITM)
Signup and view all the flashcards
ICMP router discovery
ICMP router discovery
Signup and view all the flashcards
Non-blind spoofing
Non-blind spoofing
Signup and view all the flashcards
Blind spoofing
Blind spoofing
Signup and view all the flashcards
Spoofing MAC address
Spoofing MAC address
Signup and view all the flashcards
TCP Segment Header
TCP Segment Header
Signup and view all the flashcards
URG
URG
Signup and view all the flashcards
SYN
SYN
Signup and view all the flashcards
ACK
ACK
Signup and view all the flashcards
PSH
PSH
Signup and view all the flashcards
FIN
FIN
Signup and view all the flashcards
RST
RST
Signup and view all the flashcards
Reliable delivery
Reliable delivery
Signup and view all the flashcards
Flow control
Flow control
Signup and view all the flashcards
Stateful communication
Stateful communication
Signup and view all the flashcards
Step 1/3 TCP three-way handshake
Step 1/3 TCP three-way handshake
Signup and view all the flashcards
Step 2/3 TCP three-way handshake
Step 2/3 TCP three-way handshake
Signup and view all the flashcards
Step 3/3 TCP three-way handshake
Step 3/3 TCP three-way handshake
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
Study Notes
Social Engineering Attacks
- Social engineering is an access attack used to manipulate individuals into divulging confidential information or performing certain actions
- Techniques can be performed in person, over the phone or online
Social Engineering Attack Types
- Pretexting: A threat actor pretends to need personal or financial data to confirm the recipient's identity
- Phishing: A fraudulent email disguised as being from a legitimate source tricks the recipient into installing malware or sharing personal data
- Spear Phishing: A targeted phishing attack tailored for a specific individual or organization
- Spam: Unsolicited email, also known as junk mail, containing harmful links, malware, or deceptive content
- Something for Something or "Quid pro quo": A threat actor requests personal data in exchange for something such as a gift.
- Baiting: A threat actor leaves a malware-infected flash drive in a public location
- Impersonation: A threat actor pretends to be someone else to gain the victim's trust
- Tailgating: A threat actor quickly follows an authorized person into a secure location
- Shoulder Surfing: A threat actor steals passwords or other information by inconspicuously looking over someone's shoulder
- Dumpster Diving: A threat actor rummages through trash bins to find confidential documents
Social Engineering Toolkit (SET)
- A tool designed to assist white hat hackers and network security professionals in creating social engineering attacks for network testing purposes
Denial of Service (DoS) Attacks
- DOS attacks cause an interruption of network services
- Overwhelming Quantity of Traffic: A threat actor floods a network with data, causing slow response times or crashes
- Maliciously Formatted Packets: A threat actor sends a corrupted packet to a host, causing it to slow down or crash
Distributed Denial of Service (DDoS) Attacks
- Similar to a DoS attack, the DDoS attack comes from multiple, coordinated sources
- A threat actor builds a network of infected hosts (zombies) and uses a command and control, CnC system to control them
- Bot malware turns infected hosts into the zombies, which form a botnet
- The CnC makes the botnet conducts the DDoS attack
IPv4 and IPv6
- IP doesn't validate the source IP addresses, enabling threat actors to send packets using spoofed IP addresses
- Attackers tamper with IP headers
- Security analysts need to understand IPv4 and IPv6 headers
Common IP Related Attacks
- ICMP Attacks: Threat actors use Internet Control Message Protocol (ICMP) echo packets (pings) to discover subnets and hosts
- Amplification and Reflection Attacks: Threat actors use these attacks to prevent legitimate users from accessing services using DoS and DDoS attacks
- Address Spoofing Attacks: Threat actors spoof the source IP address in an IP packet to perform blind or non-blind spoofing
- Man-in-the-Middle (MITM) Attack: Threat actors position themselves between a source and destination to monitor, capture and control communication
ICMP Attacks in Detail
- Reconnaissance and scanning attacks are performed via ICMP
- Attackers map out network topology and discover active hosts
- ICMP identifies the host OS and determines firewall state
- ICMP can be used for DoS attacks
Strict ICMP Access Control List (ACL) Filtering
- Networks should have strict ICMP ACL filtering on the network edge to avoid ICMP probing from the internet
- Security analysts should be able to detect ICMP-related attacks by looking at captured traffic and log files
- Firewalls and Intrusion Detection Systems (IDS) automatically detect such attacks and generate alerts
- ICMP echo request and echo reply is is used to perform host verification and DoS attacks
- ICMP Unreachable is used for reconnaissance and scanning attacks
- ICMP Mask Reply maps an internal IP network
- ICMP Redirects lure a target host through a compromised device thus creating a MITM attack
Amplification and Reflection Techniques
- Threat actors create DoS attacks using amplification and reflection
- Amplification: Threat actors forwards ICMP echo request messages to many hosts using the victim’s spoofed source IP address
- Reflection: The hosts reply to the victim using the spoofed IP address to overwhelm it
- Resources exhaustion attacks consume the resources of a target host to either crash it or consume the resources of a network
Address Spoofing Attacks
- Threat actors create packets with false source IP addresses to hide their identity or impersonate a legitimate user
- Spoofing is incorporated into attacks such as Smurf attacks
Types of Spoofing Attacks
- Non-blind spoofing: The attacker can see the traffic being sent between the host and target and uses this to inspect reply packets and determine firewall state etc
- Blind spoofing: The attacker cannot see the traffic and is often used in DoS attacks
MAC Address Spoofing Attacks
- Threat actors alter the MAC address of their host to match a known address of a target host
- The attacking host sends a frame throughout the network with the newly-configured MAC address
- When the switch receives the frame, it examines the MAC address
CAM Table Manipulation
- The switch overwrites the current CAM table entry and assigns the MAC address to the new port, then forwards frames destined for the target host to the attacker
- This is another spoofing example
TCP Segment Header
- TCP segment information appears immediately after the IP header
- URG: Urgent pointer field significant
- SYN: Synchronize sequence numbers
- ACK: Acknowledgement field significant
- PSH: Push function
- FIN: No more data from sender
- RST: Reset the connection
TCP Services
- Reliable delivery: TCP incorporates acknowledgments to guarantee delivery
- Flow control: TCP implements flow control to address issues with guaranteed delivery
- Stateful communication: Two parties use TCP for stateful communication during the TCP three-way handshake
TCP Three-Way Handshake
- The initiating client requests a TCP connection to a server
- The server acknowledges the client and sends a request to the client to connect back to the server
- The client acknowledges the server, creating connection
TCP Attacks
- Network applications use TCP or UDP ports
- Threat actors use port scans to discover their services
TCP SYN Flood Attack
- Exploits the TCP three-way handshake by flooding the network with SYN requests aimed at a target
- The threat actor sends multiple TCP SYN session requests with a randomly spoofed source IP address to a target, flooding the target
- The target device gets overwhelmed by the amount of requests and eventually crashes
TCP Reset Attack
- Used to terminate TCP communications between hosts which can be done civilly or uncivilly
- A civil TCP connection closes using a four-way exchange using FIN and ACK segments from each TCP
- An uncivil TCP connection closure occurs when a host receives a TCP segment with the RST bit set to tear down the connection
Terminating a TCP Connection
- Client-side terminates the process
- The client has no more data to send in and sends a segment with the FIN flag set
- The server sends an ACK to acknowledge the receipt of the FIN to terminate the session from client to server, and vice versa
TCP Session Hijacking
- Attack that takes over already authenticated host to communicate with a target
- The threat actor spoofs the IP address of one host, predicts the next sequence number, and sends an ACK to the other host
- Data can be sent from the target device but can't be received by it
UDP Segment Header and Operation
- Commonly used by DNS, TFTP, NFS, SNMP, media streaming and VoIP
- Connectionless transport layer protocol with much lower overhead
- Does not offer retransmission, sequencing, and flow control for reliability
UDP Attacks
- Not protected by any encryption by default which means traffic can be inspected or changed
- Alterations change the checksum of the data, but the checksum is optional, and may not be used
- If it is used, the attacker can create a new checksum for the data
UDP Flood Attacks
- In a UDP flood attack, the resources on a network are consumed
- A tool is used that sends UDP packets from a spoofed host to a server on the subnet
- The program sweeps through all known ports trying to find closed ports, which triggers an ICMP port unreachable message, which creates additional traffic
- The result is very similar to a DoS attack
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.