Network Attacks
BGP
How it Works
Let's Travel
The Future
100

This technique sends packets to identify active systems and open ports on a network.

What is Scanning?

100

This protocol is responsible for determining how data travels between different networks on the Internet.

What is BGP (Border Gateway Protocol)?

100

Application, Presentation, Session

What is the 4th layer of the TCP/IP Protocol Stack

100

This command sends ICMP Echo Requests to test reachability and measure round-trip time.

What is PING?

100

These are used in SSL/TLS to provide a server’s public key to a browser.

What are digital certificates?

200

This protocol is used by ping to check if a host is alive and can be abused for reconnaissance.

What is ICMP? (Internet Control Message Protocol)

200

This is a collection of networks under one organization that shares a common routing policy and uses BGP to communicate with others.

What is an Autonomous System (AS)?

200

TCP/IP Protocol Stack layers 1 and 2 

What is the Network Interface

200

This tool maps the path packets take by using increasing TTL values and ICMP Time Exceeded messages.

What is traceroute (or tracert)?

200

Browsers trust these entities to verify identities and sign certificates.

What are Certificate Authorities (CAs)?

300

This tool can perform port scanning, OS fingerprinting, and network mapping.

What is Nmap?

300

BGP chooses routes based on this factor, often preferring fewer hops between autonomous systems.

What is shortest path (AS path length)?

300

This type of address identifies a device across networks and is used by routers.

What is an IP address?

300

Your MAC address get used at this layer in the OSI Stack.

Layer 2 (Data Link – local network only)

300

This ensures that a certificate has not been altered and proves it was issued by a trusted authority.

What is a digital signature?

400

This attack tricks devices by sending fake MAC address mappings to redirect traffic.

What is ARP poisoning?

400

This fundamental weakness in BGP allows false routing information to spread globally.

What is lack of authentication / trust-based routing?

400

This process adds headers as data moves down the layers of the network stack.

What is encapsulation?

400

This device determines the best path for packets to travel between networks.

What is a router?

400

This attack occurs when an attacker presents a fake certificate to intercept communication.

What is a man-in-the-middle (middleperson) attack using a rogue certificate?

500

This attack sends small requests that trigger much larger responses to overwhelm a victim.

What is a DDoS amplification attack?

500

This attack occurs when an attacker falsely announces IP address ownership to redirect traffic to their network.

What is BGP route hijacking?

500

This process breaks data into smaller units and sends them across the network.

What is packetization (or data transmission using packets)?

500

Name the correct sequence: data is created, packaged with headers, sent across networks, and reconstructed at the destination.

Data Creation → Encapsulation → Transmission → Routing → Decapsulation

500

Infiltration, Aggregation, Exfiltration, and Persistence

What is the "anatomy of a hack"? Or the "cyber-criminal kill chain"