DENIAL OF SERVICE AND SESSION HIJACKING
by Atiqah Didi
1. Question 12 : A
1.1. Sequence number indicates where the packets is located in the data stream so the receiving station can reassemble the data
2. Question 13 : A,B,C
2.1. All data can be gather in a session-hijacking attack. Authentication information is not accessible because session hijacking occurs after the user has authenticated
3. Question 14: C
3.1. This hijacking method requires the attacker to guess the sequence numbers of data packets sent between the victim’s computer and server.
4. Question 15: A
4.1. Juggernaut is a Linux based tool.
5. Question 16: B
5.1. Encryption make any informtion the hacker gathers during a session hijacking attempt unreadable
6. Question 17: B
6.1. Sniffing used to locate the sequence number to initiate a session-hijacking attack
7. Question 18 : D
7.1. Hijacking is a type of network security attack in which the attacker takes control of a TCP sessions
8. Question 20 : B
8.1. ISN is Initial sequence numbers refers to unique 32-bit sequence number assigned to each new connection on a TCP based data communication
9. Question 19 : D
9.1. FIN and RST. Because RST causes immediate connection termination, while in FIN you get a confirmation.
10. Question 11 : D
10.1. TTYWatcher works only on Sun Solaris Systems.
11. Question 1 : B
11.1. Any Traffic coming from unused or reversed IP Addresses is bogus and should be filtering at the ISP before enters the Internet link.
12. Question 2 : A
12.1. A zombie known as Bots. Bots are software applications that run automated tasks over the Internet , perform simple repetitive task and used by malicious hackers to launch DoS attacks.
13. Question 3 : C
13.1. Trinoo is an attack tool that performs using UDP protocol. Trinoo's master component is capable of broadcasting many UDP packets to a designated or targeted computer.
14. Question 4 : A
14.1. The first phase of the DDoS attack is 'Intrusion' into remote systems to turn them into 'zombies'.
15. Question 5 : C
15.1. Targa can run 8 different DoS attacks. Targa can launch DoS attack in all possible types of DoS attacks. I
16. Question 6 : A
16.1. A Smurf attack is a resource consumption attack using ICMP Echo as the mechanism. Smurf exploits ICMP by sending a spoofed ping packet addressed to the network broadcast address and has the source address listed as the victim.
17. Question 7 : B
17.1. In a DoS land (Local Area Network Denial) attack, the attacker sends a TCP SYN spoofed packet to victim IP Address, enter a loop and repeatedly replies to itself.
18. Question 8 : A
18.1. Ping of Death is a type of DoS attack in which an attacker attempts to crash or freeze the victim comp or service by sending oversized packets using a simple ping command.
19. Question 9 : C
19.1. DoS is an attack on a computer or network that reduce,restricts or prevents accessibility of system or service to its legitimate users.
20. Question 10 : B
20.1. Incapacitate a system or network