course hero which of the following are mobile network based attacks? (choose all that apply

by Hollie Mraz 10 min read

Why is DNS spoofing used?

DNS spoofing lets hackers divert traffic to an IP address other than where it was originally directed. Spoofing attacks are used more frequently (and successfully) on unprotected non-enterprise systems than on larger enterprise systems because the latter are usually equipped with better detection and mitigation tools.

What is a sniffing attack?

A sniffing attack involves an attacker getting into the network data-stream and reading, monitoring or capturing full packets of data flowing between a client and a server. A hacker intercepting a network packet containing unencrypted information can cause severe damage to the organization or entity that owns the data. Data compromised may include sensitive information like account credentials, bank details, and different kinds of Personally Identifiable Information (PII). Sniffing attacks can either be active (involving both data access and manipulation) or passive (where the attacker only sees the information but does not actively interfere in its transmission). Examples of tools used for sniffing attacks are Wireshark, tcpdump, dSniff and Debookee.

What are some examples of sniffing attacks?

Examples of tools used for sniffing attacks are Wireshark, tcpdump, dSniff and Debookee.

How does a firewall work?

The firewall acts as a filter between a local system and internet traffic that it detects to be malicious. Firewalls deal with bad network packets by (1) discarding them or modifying them to make them safe, or by (2) copying them to a log or audit trail.

How does eavesdropping work?

Eavesdropping attacks are similar to sniffing attacks, except that they are usually passive, easier to carry out and may not involve full packets of data. They involve an attacker listening to information flowing between networks to get private information, and often target one-on-one communication. These, too, are difficult to detect. Investopedia describes eavesdropping attacks as involving a weakened connection between client and server that allows the attacking entity to send network traffic to itself. “Any device in the network between the transmitting device and the receiving device is a point of weakness, as are the initial and terminal devices themselves”, it says. Tools used to carry out these attacks include Wireshark, tcpdump, and Ettercap.

What is spoofing an IP address?

Spoofing refers to a malicious actor pretending to be a legitimate entity or someone s/he is not. In the context of network security, it usually means “a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server”.Attackers often gain access to otherwise off-limits networks that use IP addresses for user authentication by using IP address spoofing. They may also use what is known as ARP spoofing to link their own Media Access Control (MAC) to a legit IP address, thus gaining access to data meant for a different IP owner. DNS spoofing lets hackers divert traffic to an IP address other than where it was originally directed. Spoofing attacks are used more frequently (and successfully) on unprotected non-enterprise systems than on larger enterprise systems because the latter are usually equipped with better detection and mitigation tools.

How does TCP-level filtering work?

TCP-level filtering works by “reassembling and examining all the packets in each TCP session”. It can also be used for DNS filtering, in addition to providing Virtual Private Network (VPN) functionality for traffic encryption purposes.

image