{"id":65,"date":"2023-01-19T21:37:59","date_gmt":"2023-01-19T21:37:59","guid":{"rendered":"https:\/\/justatrainingblog.co.uk\/?p=65"},"modified":"2023-01-19T21:40:00","modified_gmt":"2023-01-19T21:40:00","slug":"1-4-given-a-senario-analyse-potential-indicators-associated-with-network-attacks","status":"publish","type":"post","link":"https:\/\/justatrainingblog.co.uk\/?p=65","title":{"rendered":"1.4 Given a Scenario Analyse potential indicators associated with network attacks"},"content":{"rendered":"\n<p><strong><span style=\"text-decoration: underline;\">Definitions<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Evil Twin<\/td><td>Access point which looks like a legitimate access point but is actually malicious<br>Often copies SSID<\/td><\/tr><tr><td>Rogue Access Point<\/td><td>Unauthorized access point on a network<\/td><\/tr><tr><td>Bluesnarfing<\/td><td>Unauthorized access to data on a device via bluetooth<\/td><\/tr><tr><td>Bluejacking<\/td><td>Sending unsolicited messages to another device via Bluetooth<\/td><\/tr><tr><td>Disassociation Attacks<\/td><td>Denial of service attack which prevents WAP from being able to communicate to network<\/td><\/tr><tr><td>Deauthentication<\/td><td>Alternative name for disassociation&nbsp;<\/td><\/tr><tr><td>Jamming<\/td><td>Transmissing interfering wireless signals to disrupt signal<\/td><\/tr><tr><td>Constant Jamming<\/td><td>Constant non-stop jamming<\/td><\/tr><tr><td>Sporadic Jamming<\/td><td>Sporadically containing random\/legit data<\/td><\/tr><tr><td>Reactive Jamming<\/td><td>Jamming only activates when someone tries to communicate<\/td><\/tr><tr><td>Fox Hunt<\/td><td>Term for locating a wireless jammer<\/td><\/tr><tr><td>RFID<\/td><td>Radio frequency identifier &#8211; short range technology based on radar<\/td><\/tr><tr><td>IV<\/td><td>Random sequence of numbers added to an encryption key to complicate decryption<\/td><\/tr><tr><td>On-path attack<\/td><td>Alternatively known as man-in-the-middle attack<br>Attacker sits in middle of conversation and intercepts traffic<br>Often modifies and redirects<\/td><\/tr><tr><td>Layer 2 attacks<\/td><td>Attacks which occur on the data-link OSI level<\/td><\/tr><tr><td>ARP Poisoning<\/td><td>Address resolution poisoningSpoofing an access point to intercept data&nbsp;<\/td><\/tr><tr><td>MAC Flooding<\/td><td>When a switch is flooded with MAC addresses to overload the MAC address table<\/td><\/tr><tr><td>Frame Switching<\/td><td>When a Switch uses it\u2019s MAC address table to determine where to route traffic<\/td><\/tr><tr><td>MAC Cloning<\/td><td>Spoofing a clients MAC address to appear as an existing device<\/td><\/tr><tr><td>Domain Jacking<\/td><td>Gaining access to domain host account to change destination IP<\/td><\/tr><tr><td>DNS Poisoning<\/td><td>Modifying the configuration of the DNS server so it provides incorrect IP address ranges for a destination<\/td><\/tr><tr><td>Domain Reputation<\/td><td>The trustworthiness of your domain across the web<\/td><\/tr><tr><td>Friendly DDOS<\/td><td>An unintentional DDOS<\/td><\/tr><tr><td>DDOS Amplification<\/td><td>Attack aimed at causing victims server to use larger amounts of resources per response<\/td><\/tr><tr><td>Application DOS<\/td><td>DOS attack aimed at breaking application or exhausting all resources<\/td><\/tr><tr><td>Operational Technology DOS<\/td><td>Attack aimed at knocking out industrial hardware or software<\/td><\/tr><tr><td>Bash<\/td><td>Name for Linux Shell Scripts<\/td><\/tr><tr><td>Shell<\/td><td>Name of Linux version of CMD<\/td><\/tr><tr><td>Macros<\/td><td>Scripts which automate function <strong>within <\/strong>an application<\/td><\/tr><tr><td>Cmdlets<\/td><td>Term for commands executed on powershell using CMD<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Given a Scenario Analyse potential indicators associated with network attacks<\/strong><\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Questions<\/span><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>What\u2019s the danger of an unintended Rogue Access Point?<\/td><td>Not managed by company security so cannot be secured<\/td><\/tr><tr><td>What are the two types of rogue access point?<\/td><td>Wireless Access PointWireless sharing on an OS<\/td><\/tr><tr><td>How can you detect a Rogue Access Point?<\/td><td>Periodic survey round the office detecting and comparing wireless devices<\/td><\/tr><tr><td>How can you prevent a Rogue Access Point?<\/td><td>Network Access Control<\/td><\/tr><tr><td>What is an example of Network Access Control?<\/td><td>801.1x<\/td><\/tr><tr><td>How can an Evil Twin be prefered over a legitimate Access Point?<\/td><td>Rogue access point overpowers signal of legitimate access point<\/td><\/tr><tr><td>Where are Evil Twin attacks most effective?<\/td><td>Open networks (e.g. coffee shop)<\/td><\/tr><tr><td>How can you secure traffic over an open network?<\/td><td>HTTPSVPN<\/td><\/tr><tr><td>What is the range for Bluejacking?<\/td><td>10 meters<\/td><\/tr><tr><td>What is an alternative use for Bluejacking?<\/td><td>Add action prompts to message (e.g. add to contacts)<\/td><\/tr><tr><td>What kind of attack is wireless deauthentication?<\/td><td>Type of DDOS<\/td><\/tr><tr><td>Why is wireless deauthentication possible?<\/td><td>Older methods of 802.1x sent management frames in unencrypted format<\/td><\/tr><tr><td>How do you protect against deauthenticaion attacks?<\/td><td>Use modern version of 802.1x (802.1w on) as the management frames are now encrypted<\/td><\/tr><tr><td>Is jamming always intentional?<\/td><td>No, accidental jamming can be caused by:Fluorescent lightsMicrowave<\/td><\/tr><tr><td>What are the three jamming types?<\/td><td>Constant<br>Sporadic<br>Reactive<\/td><\/tr><tr><td>What reduces jamming effectiveness?<\/td><td>Distance<\/td><\/tr><tr><td>How do you eliminate jamming?<\/td><td>Find and stop source<br>Directional antennae<\/td><\/tr><tr><td>What technology does RFID rely on?<\/td><td>Radar<\/td><\/tr><tr><td>Four types of RFID attacks<\/td><td>Data Capture<br>Reader spoofing (modify contents)<br>Signal Jamming<br>Decryption of data<\/td><\/tr><tr><td>What is the issue of cryptography without randomisation?<\/td><td>If you know the encryption key it can be decrypted<\/td><\/tr><tr><td>How do you add randomisation to a cryptograph?<\/td><td>Cryptographic Nonce<\/td><\/tr><tr><td>What type of attack does Cryptographic Nonce stop?<\/td><td>Replay Attack<\/td><\/tr><tr><td>What is typically used to provide cryptographic nonce?<\/td><td>IVSalting<\/td><\/tr><tr><td>What is the difference between IV and Salting when providing Nonce?<\/td><td>IV = transmitting password hashes<br>Salting = Storing password hashes<\/td><\/tr><tr><td>How would you achieve a on-path attack?<\/td><td>ARP Poisoning<\/td><\/tr><tr><td>How does ARP Poisoning work?<\/td><td>Attacker sends out unsolicited broadcast to client spoofing AP details.\u00a0<br>Client updates DNS records to recognise attackers device as the AP<br>Attacker spoofs client address data to relay between itself and legitimate AP<\/td><\/tr><tr><td>How many bits in a MAC address?<\/td><td>48<\/td><\/tr><tr><td>How many bytes in a MAC address?<\/td><td>6<\/td><\/tr><tr><td>What the makeup of a MAC address?<\/td><td>First 3 bytes are OUI<br>Last 3 bytes are Network Interface Controller Specific\u00a0<\/td><\/tr><tr><td>What does OUI signify?<\/td><td>The Manufacturer<\/td><\/tr><tr><td>What does Network Interface Controller Specific signify?<\/td><td>Serial number<\/td><\/tr><tr><td>How does a MAC address work in a network?<\/td><td>Data is sent to different devices on LAN by referencing the MAC address<\/td><\/tr><tr><td>How does a switch keep track of MAC addresses?<\/td><td>Builds a MAC address table<\/td><\/tr><tr><td>What is also recorded to a MAC address table<\/td><td>Output interface<\/td><\/tr><tr><td>What is an Output Interface<\/td><td>Which interface to send data out of to reach the MAC address<\/td><\/tr><tr><td>What happens when a MAC address table becomes full?<\/td><td>It\u2019ll default to acting like a hub and send traffic down all available interfaces<\/td><\/tr><tr><td>How can MAC flooding be exploited?<\/td><td>Can listen at a unprotected interface to collect traffic not intended for them<\/td><\/tr><tr><td>How can you protect against MAC flooding?<\/td><td>Switch port security (e.g. disable all unused ports!)<\/td><\/tr><tr><td>What are the 5 ways attackers can profit of URL highjacking?<\/td><td>Advertising sites<br>Sell badly spelt domain to actual owner<br>Redirect to competitor<br>PhishingMalware<\/td><\/tr><tr><td>Two examples of domain reputation<\/td><td>Email reputation: if reported as spam too frequently your emails will be flagged as spam<br>Domains with malware at destination are flagged and blocked<\/td><\/tr><tr><td>Examples of friendly DOS<\/td><td>Layer 2 loopBandwidth DOS<\/td><\/tr><tr><td>Three examples of Operating Technology<\/td><td>Electric Grids<br>Traffic Control<br>Industrial equipment<\/td><\/tr><tr><td>What are the five main types of scripts used in attacks?<\/td><td>Powershell<br>Python<br>Shell Script<br>Macros<br>Visual Basic (VBA)<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Definitions Evil Twin Access point which looks like a legitimate access point but is actually maliciousOften copies SSID Rogue Access&#8230;<\/p>\n","protected":false},"author":1,"featured_media":66,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[2,4],"tags":[],"class_list":["post-65","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-learning","category-security"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/65","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=65"}],"version-history":[{"count":3,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/65\/revisions"}],"predecessor-version":[{"id":70,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/65\/revisions\/70"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=\/wp\/v2\/media\/66"}],"wp:attachment":[{"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=65"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=65"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/justatrainingblog.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}