Chapter 7 - Networking Protocols and Threats

123456789101112131415161718
Across
  1. 2. A reflection-based DDoS attack that uses spoofed DNS queries to flood a target.
  2. 5. Exploiting the grace period in domain registration to avoid paying for it.
  3. 6. A DDoS attack using spoofed ping requests to flood a target via a broadcast address.
  4. 7. Taking over an established TCP session without the user’s knowledge.
  5. 8. A hardware-based DoS attack that renders the device unusable.
  6. 11. An attack that overwhelms a system with continuous ICMP echo requests.
  7. 15. A random number used once to prevent replay attacks.
  8. 16. An anonymous connection to a system using no credentials.
  9. 17. Capturing and reusing data transmissions to gain unauthorized access.
  10. 18. A security feature that detects and prevents flooding attacks.
Down
  1. 1. Targeting a site visited by victims to infect them with malware.
  2. 3. An attack that sends fake ARP messages to redirect network traffic.
  3. 4. A social engineering attack that tricks users into revealing sensitive information.
  4. 6. A DoS attack that exploits the TCP handshake by sending repeated SYN requests.
  5. 8. A DoS attack that sends malformed or oversized ping packets to crash a system.
  6. 9. Faking data such as IP or MAC addresses to disguise an attack.
  7. 10. A malware attack where the browser is controlled to alter transactions or data.
  8. 12. A variant of the Smurf attack that uses UDP instead of ICMP.
  9. 13. A DoS attack that sends fragmented packets that systems can't reassemble.
  10. 14. A type of DoS attack that replicates processes endlessly to exhaust system resources.