Deck 8: Session Hijacking

Full screen (f)
exit full mode
Question
Hijacking differs from spoofing in that the takeover occurs during an authenticated session.
Use Space or
up arrow
down arrow
to flip the card.
Question
A TCP session can be hijacked only before the hosts have authenticated successfully.
Question
A successful hijacking takes place when a hacker intervenes in a TCP conversation and then takes the role of either host or recipient.
Question
Hunt performs sniffing in addition to session hijacking.
Question
Since UDP does not have many error recovery features, it is more resistant to hijacking.
Question
TCP works with ____ to manage data packets on the network.

A)IP
B)FIN
C)ARP
D)SSH
Question
A TCP connection can be broken either by exchanging the FIN packets or by sending ____ packets.

A)ACK
B)END
C)STP
D)RST
Question
____ solves the ACK storm issue and facilitates TCP session hijacking.

A)SSL
B)Storm watching
C)Packet blocking
D)Encryption
Question
A route table has two sections: the active routes and the ____.

A)close routes
B)active connections
C)alternate routes
D)passive routes
Question
A(n) ____ on a computer stores the IP address and the corresponding MAC address.

A)IP table
B)TCP table
C)UDP table
D)ARP table
Question
_________________________ occurs when a hacker takes control of a TCP session between two hosts.
Question
____________________ is a debugging technique that allows packets to explicitly state the route they will follow to their destination rather than follow normal routing rules.
Question
A(n) ____________________ shows the way to the address sought, or the way to the nearest source that might know the address.
Question
____________________ was developed by Pavel Krauz, inspired by Juggernaut, another session hijacking tool.
Question
____________________ refers to setting an IDS rule to watch for abnormal increases in network traffic and to alert the security officer when they occur.
Question
Describe the three-way handshake authentication method of TCP.
Question
How can you stop a continuous ACK transfer by resynchronizing the client and server?
Question
Describe the reason why an ACK storm happens.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Session Hijacking
1
Hijacking differs from spoofing in that the takeover occurs during an authenticated session.
True
2
A TCP session can be hijacked only before the hosts have authenticated successfully.
False
3
A successful hijacking takes place when a hacker intervenes in a TCP conversation and then takes the role of either host or recipient.
True
4
Hunt performs sniffing in addition to session hijacking.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Since UDP does not have many error recovery features, it is more resistant to hijacking.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
TCP works with ____ to manage data packets on the network.

A)IP
B)FIN
C)ARP
D)SSH
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
A TCP connection can be broken either by exchanging the FIN packets or by sending ____ packets.

A)ACK
B)END
C)STP
D)RST
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ solves the ACK storm issue and facilitates TCP session hijacking.

A)SSL
B)Storm watching
C)Packet blocking
D)Encryption
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
A route table has two sections: the active routes and the ____.

A)close routes
B)active connections
C)alternate routes
D)passive routes
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) ____ on a computer stores the IP address and the corresponding MAC address.

A)IP table
B)TCP table
C)UDP table
D)ARP table
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
_________________________ occurs when a hacker takes control of a TCP session between two hosts.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is a debugging technique that allows packets to explicitly state the route they will follow to their destination rather than follow normal routing rules.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____________________ shows the way to the address sought, or the way to the nearest source that might know the address.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ was developed by Pavel Krauz, inspired by Juggernaut, another session hijacking tool.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ refers to setting an IDS rule to watch for abnormal increases in network traffic and to alert the security officer when they occur.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
Describe the three-way handshake authentication method of TCP.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
How can you stop a continuous ACK transfer by resynchronizing the client and server?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Describe the reason why an ACK storm happens.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.