Network Attack Indicators
Recognition of network-based attacks including DDoS (amplified and reflected), DNS attacks (poisoning, spoofing), wireless attacks (evil twin, deauth), on-path attacks (MITM), and credential replay attacks.
Understanding Network Attack Indicators
Network attacks target the communication infrastructure that connects systems. Recognizing attack indicators in network traffic and behavior enables early detection and response before significant damage occurs.
Key network attack categories: • Denial of Service — DDoS, amplification, reflection attacks • DNS attacks — Poisoning, spoofing, hijacking • Wireless attacks — Evil twin, deauthentication, rogue AP • On-path attacks — Man-in-the-middle, interception • Credential attacks — Replay, session hijacking
Network monitoring and traffic analysis are essential for detecting these attacks.
Why This Matters for the Exam
Network attack indicators are heavily tested on SY0-701. Questions describe traffic patterns or network behaviors and ask you to identify the attack type.
Understanding these indicators helps with security monitoring, intrusion detection configuration, and incident response. Real-time detection of network attacks can prevent breaches.
The exam tests specific terminology (amplification vs. reflection) and the ability to recognize attacks from their indicators.
Deep Dive
Distributed Denial of Service (DDoS)
Overwhelming targets with traffic from multiple sources.
DDoS Types:
| Type | Method | Indicators |
|---|---|---|
| Volumetric | Flood with traffic | Bandwidth saturation, slow speeds |
| Protocol | Exploit protocol weaknesses | Connection table exhaustion, SYN floods |
| Application | Target app layer | Slow HTTP, resource exhaustion |
Amplification Attacks:
- •Attacker sends small request
- •Response is much larger (amplified)
- •Common amplification protocols: DNS (70x), NTP (500x), SSDP (30x)
Amplification Indicators:
- •Large amounts of UDP traffic from specific services
- •Traffic volume far exceeds request volume
- •Queries to services you don't use internally
Reflection Attacks:
- •Attacker spoofs victim's IP address
- •Sends requests to third-party servers
- •Servers respond to victim (reflected traffic)
Reflection Indicators:
- •Incoming traffic from many legitimate servers
- •No corresponding outbound requests
- •UDP responses without matching queries
DDoS General Indicators:
- •Sudden bandwidth consumption spike
- •Service unavailability
- •Slow network performance
- •Connection timeouts
- •IPS/firewall alerts on traffic volume
DNS Attacks
Attacks targeting the Domain Name System.
DNS Attack Types:
DNS Poisoning/Cache Poisoning:
- •Corrupting DNS resolver cache
- •Users directed to malicious IPs
- •Legitimate domain → attacker's server
DNS Spoofing:
- •Responding to queries with false information
- •Man-in-the-middle DNS responses
- •Redirect users to attacker-controlled sites
DNS Hijacking:
- •Compromising DNS server or records
- •Changing authoritative DNS data
- •Broad impact on all queries for domain
DNS Tunneling:
- •Encoding data in DNS queries/responses
- •Bypassing firewalls (DNS usually allowed)
- •Command and control communication
DNS Attack Indicators:
| Attack | Indicators |
|---|---|
| Poisoning | Users reaching wrong sites, certificate errors |
| Spoofing | DNS responses from unexpected sources |
| Hijacking | Nameserver records changed unexpectedly |
| Tunneling | Unusual DNS query patterns, long subdomains |
Wireless Attacks
Attacks targeting wireless network infrastructure.
Evil Twin:
- •Fake AP mimicking legitimate network
- •Same SSID, stronger signal
- •Intercepts all victim traffic
Evil Twin Indicators:
- •Duplicate SSIDs detected
- •Users reporting certificate warnings
- •Unexpected AP in wireless survey
- •Connection drops then reconnects
Deauthentication Attack:
- •Forcing clients off legitimate network
- •Captures handshakes for cracking
- •Denial of service to wireless users
Deauth Indicators:
- •Frequent disconnections
- •Deauth frames in wireless capture
- •Users unable to stay connected
- •Handshake capture attempts in logs
Rogue Access Point:
- •Unauthorized AP on network
- •May be malicious or just unauthorized
- •Bypasses network security
Rogue AP Indicators:
- •Unknown APs in wireless surveys
- •Network traffic from unexpected sources
- •Wired connections to unknown devices
On-Path Attacks (Man-in-the-Middle)
Intercepting and potentially modifying traffic between parties.
On-Path Attack Methods:
| Method | Description |
|---|---|
| ARP spoofing | Redirect LAN traffic through attacker |
| DNS spoofing | Redirect by DNS manipulation |
| SSL stripping | Downgrade HTTPS to HTTP |
| Session hijacking | Take over established session |
On-Path Attack Indicators:
- •ARP table showing unexpected MAC addresses
- •Certificate warnings
- •HTTP where HTTPS expected
- •Duplicate MAC addresses on network
- •Slow network performance
- •Changed session tokens
SSL Stripping Indicators:
- •Sites loading as HTTP instead of HTTPS
- •Lock icon missing from browser
- •Users reporting insecure warnings
- •Downgrade from secure to insecure
Credential Replay
Capturing and reusing authentication credentials or tokens.
Replay Attack Types:
- •Captured password hashes replayed
- •Stolen session tokens reused
- •Kerberos ticket replay
- •OAuth token theft and replay
Credential Replay Indicators:
- •Same credentials used from different locations
- •Session tokens appearing in unusual contexts
- •Authentication without password entry
- •Impossible login timing (too fast from different locations)
Prevention:
- •Time-stamped authentication
- •One-time tokens
- •Challenge-response protocols
- •Session binding to client characteristics
How CompTIA Tests This
Example Analysis
Scenario: Network monitoring shows massive inbound UDP traffic on port 53 (DNS) from thousands of different IP addresses—all legitimate DNS servers. The organization's internet connection is saturated. No corresponding outbound DNS queries were made to these servers.
Analysis - DNS Amplification/Reflection DDoS:
Indicators Present: • High volume UDP port 53 traffic • Traffic from legitimate DNS servers • No matching outbound requests • Bandwidth saturation
Attack Type: DNS Amplification with Reflection
How It Works: 1. Attacker sends DNS queries with spoofed source IP (victim's IP) 2. Queries sent to many open DNS resolvers 3. DNS servers respond to victim (reflection) 4. Responses larger than queries (amplification ~70x) 5. Victim overwhelmed with traffic
Why DNS Is Used: • UDP allows spoofing (no handshake) • DNS often allowed through firewalls • Amplification factor is significant • Many open resolvers available
Response: 1. Contact ISP for upstream filtering 2. Implement rate limiting on DNS traffic 3. Block specific attacking IPs if identifiable 4. Consider DDoS mitigation service 5. Report to DNS servers being abused
Key insight: Inbound responses without outbound requests, combined with volume, indicates reflection attack with spoofed source IP.
Key Terms to Know
Common Mistakes to Avoid
Exam Tips
Memory Trick
"DDWOC" - Network Attack Categories
- •DDoS (volumetric, protocol, application)
- •DNS attacks (poisoning, spoofing, tunneling)
- •Wireless (evil twin, deauth, rogue AP)
- •On-path (MITM, ARP spoofing, SSL strip)
- •Credential replay (token/hash reuse)
- •Amplification vs. Reflection:
- •Amplification = Add volume (bigger response)
- •Reflection = Redirect (spoofed IP bounces traffic)
DDoS Amplification Factors: "NDS" - NTP (500x), DNS (70x), SSDP (30x)
- •On-Path Indicators: "CASC"
- •Certificate warnings
- •ARP table anomalies
- •Slow performance
- •Connection downgrades (HTTPS→HTTP)
Evil Twin Detection: "See TWIN networks? That's suspicious!" Duplicate SSIDs = potential attack
Test Your Knowledge
Q1.An organization receives massive volumes of DNS response traffic from thousands of DNS servers, but made no corresponding DNS queries. What type of attack is this?
Q2.Users report frequent wireless disconnections. Packet capture shows numerous deauthentication frames. What attack is likely occurring?
Q3.A network analyzer detects that the gateway's MAC address in the ARP table has changed to match an unknown device. What type of attack does this indicate?
Want more practice with instant AI feedback?
Practice with AIContinue Learning
Ready to test your knowledge?
Practice questions on network attack indicators and other Objective 2.4 concepts.