BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-50 Topic 6 Question 95 Discussion

Actual exam question for Eccouncil's 312-50 exam
Question #: 95
Topic #: 6
[All 312-50 Questions]

Jake, a network security specialist, is trying to prevent network-level session hijacking attacks in his company.

While studying different types of such attacks, he learns about a technique where an attacker inserts their machine into the communication between a client and a server, making it seem like the packets are flowing through the original path. This technique is primarily used to reroute the packets. Which of the following types of network-level session hijacking attacks is Jake studying?

Show Suggested Answer Hide Answer
Suggested Answer: B

A man-in-the-middle attack using forged ICMP and ARP spoofing is a type of network-level session hijacking attack where an attacker inserts their machine into the communication between a client and a server, making it seem like the packets are flowing through the original path. This technique is primarily used to reroute the packets and intercept or modify the data exchanged between the client and the server.

A man-in-the-middle attack using forged ICMP and ARP spoofing works as follows1:

The attacker sends a forged ICMP redirect message to the client, claiming to be the gateway. The ICMP redirect message tells the client to use the attacker's machine as the next hop for reaching the server's network. The client updates its routing table accordingly and starts sending packets to the attacker's machine instead of the gateway.

The attacker also sends a forged ARP reply message to the client, claiming to be the server. The ARP reply message associates the attacker's MAC address with the server's IP address. The client updates its ARP cache accordingly and starts sending packets to the attacker's MAC address instead of the server's MAC address.

The attacker receives the packets from the client and forwards them to the server, acting as a relay. The attacker can also monitor, modify, or drop the packets as they wish. The server responds to the packets and sends them back to the attacker, who then forwards them to the client. The client and the server are unaware of the attacker's presence and think they are communicating directly with each other.

Therefore, Jake is studying a man-in-the-middle attack using forged ICMP and ARP spoofing, which is a type of network-level session hijacking attack.


Network or TCP Session Hijacking | Ethical Hacking - GreyCampus

Contribute your Thoughts:

Annice
2 months ago
I'm not sure, but I think D) TCP/IP Hijacking could also be a possibility as it involves manipulating the TCP/IP protocol to hijack a session.
upvoted 0 times
...
Ashlyn
2 months ago
I agree with Jillian, because in this type of attack, the attacker can intercept and modify the communication between the client and server.
upvoted 0 times
...
Lachelle
2 months ago
I'm going with option B. Forged ICMP and ARP spoofing are definitely techniques used in man-in-the-middle attacks to reroute the traffic.
upvoted 0 times
...
Cristy
2 months ago
Ha! Reminds me of that time I accidentally rerouted the office internet through my desktop during a prank. Good thing the IT guy had a sense of humor about it.
upvoted 0 times
...
Art
2 months ago
Hmm, I'm not so sure. The description also mentions that the attacker is making it seem like the packets are flowing through the original path. That sounds more like TCP/IP hijacking to me.
upvoted 0 times
Dawne
11 days ago
Definitely, knowing the different types of network-level session hijacking attacks is crucial for network security specialists like Jake.
upvoted 0 times
...
Marisha
12 days ago
That makes sense. It's important for Jake to understand how attackers can reroute packets in order to prevent such attacks.
upvoted 0 times
...
Annett
13 days ago
Yes, TCP/IP hijacking is all about manipulating the communication flow between the client and server.
upvoted 0 times
...
Sanda
16 days ago
I think you're right, TCP/IP hijacking does involve rerouting packets through the original path.
upvoted 0 times
...
Candida
20 days ago
Thanks for pointing that out, TCP/IP hijacking it is!
upvoted 0 times
...
Mireya
21 days ago
Yes, TCP/IP hijacking is the correct answer in this case.
upvoted 0 times
...
Dahlia
21 days ago
D) TCP/IP Hijacking
upvoted 0 times
...
Adaline
22 days ago
I think you're right, TCP/IP hijacking does involve rerouting packets through the original path.
upvoted 0 times
...
Phillip
23 days ago
D) TCP/IP Hijacking
upvoted 0 times
...
Daryl
24 days ago
C) UDP Hijacking
upvoted 0 times
...
Roslyn
28 days ago
B) Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing
upvoted 0 times
...
Beckie
1 months ago
C) UDP Hijacking
upvoted 0 times
...
Elfrieda
1 months ago
B) Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing
upvoted 0 times
...
Lindy
1 months ago
A) RST Hijacking
upvoted 0 times
...
Pamela
2 months ago
A) RST Hijacking
upvoted 0 times
...
...
Jillian
2 months ago
I think the answer is B) Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing.
upvoted 0 times
...
Frankie
2 months ago
I think it's definitely a man-in-the-middle attack. The attacker is inserting their machine into the communication path to reroute the packets - that's classic man-in-the-middle stuff.
upvoted 0 times
Lenna
24 days ago
D) TCP/IP Hijacking
upvoted 0 times
...
Rolande
1 months ago
C) UDP Hijacking
upvoted 0 times
...
Terina
1 months ago
B) Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing
upvoted 0 times
...
Mariko
2 months ago
A) RST Hijacking
upvoted 0 times
...
...

Save Cancel