CEH Chapter 12
What could you use to inform a defensive strategy?
Attack life cycle
What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable that has been allocated space for 8 bytes?
Buffer overflow
What does a defense in breadth approach add?
Consideration for a broader range of attacks
If you were to see the following in a packet capture, what attack would you expect is happening? %3Cscr_ipt%3Ealert('wubble');%3C/sc_ript%3E
Cross-site scripting
Which protocol is commonly used for amplification attacks?
DNS
What would the Low Orbit Ion Cannon be used for?
Denial of service attacks
What is the purpose of a SYN flood?
Fill up connection buffers at the operating system.
What security element would be a crucial part of a defense in depth network design?
Firewall
What attack injects code into dynamically allocated memory?
Heap spraying
How does a slowloris attack work?
Holds open connection buffers at the web server
What protocol is used for a Smurf attack?
ICMP
What protection could be used to prevent an SQL injection attack?
Input validation
What information does a buffer overflow intend to control?
Instruction pointer
What is the target of a command injection attack?
Operating system
What element could be used to facilitate log collection, aggregation, and correlation?
SIEM
If you were to see or 1=1 in a packet capture, what would you expect was happening?
SQL injection
What technique does a slow read attack use?
Small file retrieval requests
What has been done to the following string? "%3Cscrip_t%3Ealert('wubble');%3C/scrip_t%3E"
URL encoding
What is the target of a cross-site scripting attack?
User
If you were to see the following in a packet capture, what would you think was happening? <!ENT_ITY xxe SYSTEM "file:///et_c/passwd" >]>
XML external entity injection