Joe Raine
Cybersecurity Professional
Joe Raine
Cybersecurity Professional

Blog Post

1.4 Given a Scenario Analyse potential indicators associated with network attacks

January 19, 2023 Learning, Security+
1.4 Given a Scenario Analyse potential indicators associated with network attacks

Definitions

Evil TwinAccess point which looks like a legitimate access point but is actually malicious
Often copies SSID
Rogue Access PointUnauthorized access point on a network
BluesnarfingUnauthorized access to data on a device via bluetooth
BluejackingSending unsolicited messages to another device via Bluetooth
Disassociation AttacksDenial of service attack which prevents WAP from being able to communicate to network
DeauthenticationAlternative name for disassociation 
JammingTransmissing interfering wireless signals to disrupt signal
Constant JammingConstant non-stop jamming
Sporadic JammingSporadically containing random/legit data
Reactive JammingJamming only activates when someone tries to communicate
Fox HuntTerm for locating a wireless jammer
RFIDRadio frequency identifier – short range technology based on radar
IVRandom sequence of numbers added to an encryption key to complicate decryption
On-path attackAlternatively known as man-in-the-middle attack
Attacker sits in middle of conversation and intercepts traffic
Often modifies and redirects
Layer 2 attacksAttacks which occur on the data-link OSI level
ARP PoisoningAddress resolution poisoningSpoofing an access point to intercept data 
MAC FloodingWhen a switch is flooded with MAC addresses to overload the MAC address table
Frame SwitchingWhen a Switch uses it’s MAC address table to determine where to route traffic
MAC CloningSpoofing a clients MAC address to appear as an existing device
Domain JackingGaining access to domain host account to change destination IP
DNS PoisoningModifying the configuration of the DNS server so it provides incorrect IP address ranges for a destination
Domain ReputationThe trustworthiness of your domain across the web
Friendly DDOSAn unintentional DDOS
DDOS AmplificationAttack aimed at causing victims server to use larger amounts of resources per response
Application DOSDOS attack aimed at breaking application or exhausting all resources
Operational Technology DOSAttack aimed at knocking out industrial hardware or software
BashName for Linux Shell Scripts
ShellName of Linux version of CMD
MacrosScripts which automate function within an application
CmdletsTerm for commands executed on powershell using CMD

Given a Scenario Analyse potential indicators associated with network attacks

Questions

What’s the danger of an unintended Rogue Access Point?Not managed by company security so cannot be secured
What are the two types of rogue access point?Wireless Access PointWireless sharing on an OS
How can you detect a Rogue Access Point?Periodic survey round the office detecting and comparing wireless devices
How can you prevent a Rogue Access Point?Network Access Control
What is an example of Network Access Control?801.1x
How can an Evil Twin be prefered over a legitimate Access Point?Rogue access point overpowers signal of legitimate access point
Where are Evil Twin attacks most effective?Open networks (e.g. coffee shop)
How can you secure traffic over an open network?HTTPSVPN
What is the range for Bluejacking?10 meters
What is an alternative use for Bluejacking?Add action prompts to message (e.g. add to contacts)
What kind of attack is wireless deauthentication?Type of DDOS
Why is wireless deauthentication possible?Older methods of 802.1x sent management frames in unencrypted format
How do you protect against deauthenticaion attacks?Use modern version of 802.1x (802.1w on) as the management frames are now encrypted
Is jamming always intentional?No, accidental jamming can be caused by:Fluorescent lightsMicrowave
What are the three jamming types?Constant
Sporadic
Reactive
What reduces jamming effectiveness?Distance
How do you eliminate jamming?Find and stop source
Directional antennae
What technology does RFID rely on?Radar
Four types of RFID attacksData Capture
Reader spoofing (modify contents)
Signal Jamming
Decryption of data
What is the issue of cryptography without randomisation?If you know the encryption key it can be decrypted
How do you add randomisation to a cryptograph?Cryptographic Nonce
What type of attack does Cryptographic Nonce stop?Replay Attack
What is typically used to provide cryptographic nonce?IVSalting
What is the difference between IV and Salting when providing Nonce?IV = transmitting password hashes
Salting = Storing password hashes
How would you achieve a on-path attack?ARP Poisoning
How does ARP Poisoning work?Attacker sends out unsolicited broadcast to client spoofing AP details. 
Client updates DNS records to recognise attackers device as the AP
Attacker spoofs client address data to relay between itself and legitimate AP
How many bits in a MAC address?48
How many bytes in a MAC address?6
What the makeup of a MAC address?First 3 bytes are OUI
Last 3 bytes are Network Interface Controller Specific 
What does OUI signify?The Manufacturer
What does Network Interface Controller Specific signify?Serial number
How does a MAC address work in a network?Data is sent to different devices on LAN by referencing the MAC address
How does a switch keep track of MAC addresses?Builds a MAC address table
What is also recorded to a MAC address tableOutput interface
What is an Output InterfaceWhich interface to send data out of to reach the MAC address
What happens when a MAC address table becomes full?It’ll default to acting like a hub and send traffic down all available interfaces
How can MAC flooding be exploited?Can listen at a unprotected interface to collect traffic not intended for them
How can you protect against MAC flooding?Switch port security (e.g. disable all unused ports!)
What are the 5 ways attackers can profit of URL highjacking?Advertising sites
Sell badly spelt domain to actual owner
Redirect to competitor
PhishingMalware
Two examples of domain reputationEmail reputation: if reported as spam too frequently your emails will be flagged as spam
Domains with malware at destination are flagged and blocked
Examples of friendly DOSLayer 2 loopBandwidth DOS
Three examples of Operating TechnologyElectric Grids
Traffic Control
Industrial equipment
What are the five main types of scripts used in attacks?Powershell
Python
Shell Script
Macros
Visual Basic (VBA)
Write a comment