The process of monitoring and capturing all data packets passing through a given network using a software application or hardware device
What is packet sniffing?
Session hijacking refers to an attack in which an attacker seizes control of ___ between two computers.
What is a valid TCP communication session?
An ___ is also referred to as a "packet sniffer", which intercepts packets traveling via various communication media and protocols, usually TCP/IP
What is IDS?
Who is George Russell?
The three roles of a web service consist of service provider, service requester, and service _____.
What is registry?
Sniffing through a hub, wherein the traffic is sent to all ports
What is passive sniffing?
One part of conduct a session hijacking attack.
What is tacking of a session, desynchronization of the session, or injection of commands during the session?
Packet filtering firewalls work at the ____ layer of the OSI model
What is network?
A computer system that stores, processes, and delivers web pages to clients via HTTP
What is a web server?
3 layers of web application architecture
What are client/presentation layer, business logic layer, and database payer?
Once the ____ table fills up on a switch, additional ARP request traffic floods every port on the switch.
What is CAM?
In a ____ attack, the attacker takes over an existing session either by breaking the connection on one side of the conversation or by actively participating.
What is active?
This type of honeypot does not emulate anything; they run actual vulnerable services or software on production systems with real OS and apps. They simulate all services and apps of a target network.
What is high-interaction?
A web server consists of a ______ ___. a server root, a virtual document tree, virtual hosting, and a web proxy
What is a document root?
This OWASP Top 10 App Security Risk describes vulnerabilities that allow untrusted data to be interpreted and executed as part of a command or query.
What are injection flaws?
This sniffing tool lets you capture and interactively browse the traffic running on a computer network.
What is wireshark?
A term used to describe a "Live, laugh, love" sign.
What is cheugy?
3 parts to firewall architecture
In this attack an attacker takes advantage of the DNS recursive method of DNS redirection
What is a DNS Amplification Attack?
Before Alex Albon's P10, this was the last year Williams scored points in any Grand Prix
What is 2017?
3 ways one might defend against sniffing
Anything listed on page 1202 :)
____ Level Highjacking can be defined as the interception of packets during the transmission between a client and the server in a TCP or UDP session.
2 of 4 general indications of a network intrusion
What is repeated probes of the available services on your machines, connections from unusual locations, repeated login attempts from remote hosts, or a sudden influx of log data?
What is Mercedes?