Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain One

Subdomain 1.4

Given a scenario, analyze potential indicators associated with network attacks

Terms: 25

Wireless

Some wireless attack vectors include evil twins, rogue access points wireless attack vectors includePotential indicators of wireless network attacks can include unusual network activity, unauthorized access points, unusual wireless activity, unusual device behavior, unusual login activity, and more.

Evil twin
Rogue access point
Bluesnarfing
Bluejacking
Disassociation
Jamming
Radio Frequency Identification (RFID)

Near-field communication
Initialization vector (IV)

On-path attack (previously known as man-in-the-middle attack/man-in-the-browser attack)

Layer 2 attacks

Attacks that target the data link layer of the OSI model. The data link layer is responsible for transferring data between adjacent network nodes in a wide area network (WAN) or local area network (LAN).

Address resolution Protocol (ARP) poisoning

Media access control (MAC) flooding
MAC cloning

Domain name system (DNS)

Attacks that target the DNS. DNS is responsible for translating human-readable domain names into machine-readable IP addresses. Attackers can exploit vulnerabilities in the DNS to prevent users from accessing certain websites, or redirect them to malicious sites.

Domain hijacking
DNS poisoning
Uniform Resource Locator (URL) redirection
Domain reputation

Distributed Denial-of-Service

An attack where multiple systems, which are infected with malware, target a particular system to cause a Denial of Service attack. The attacker uses multiple servers and internet connections to flood the targeted resource with traffic, making it unavailable to legitimate users.

Network
Application
Operational technology (OT)

Malicious code or script execution

The use of malware or scripts to exploit vulnerabilities in a system to gain unauthorized access to sensitive data.

PowerShell
Python

Replace <target_ip> with the IP address of the target server, <target_port> with the port number, and <threads> and <packets> with the desired number of threads and packets, respectively.

Note: GitHub provides more information about SimpleDDoS.

Bash
Macros
Visual Basic for Applications (VBA)

Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.