CCIE Wireless Written Exam: Header Attacks - Exam 400-351 - Cisco

Header Attacks

Question

Which two statements about header attacks are true? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

AB.

Header attacks are a type of cyber attack where the attacker manipulates various headers in network protocols to gain unauthorized access, steal data, or launch other malicious activities. The question asks for two statements that are true about header attacks. Let's go through each statement and see which ones are true.

A. An attacker can use IPv6 Next header attacks to steal user data and launch phishing attacks. IPv6 Next header attacks involve exploiting vulnerabilities in the Next Header field of the IPv6 protocol to launch attacks. This statement is true as attackers can manipulate the Next Header field to hide malicious packets and bypass security measures to steal user data or launch phishing attacks.

B. An attacker can leverage an HTTP response header to write malicious cookies. HTTP response headers are sent by web servers to web clients in response to a request. They contain information about the content and behavior of the web page. This statement is true as attackers can modify the response headers to inject malicious code into cookies and trick users into unknowingly downloading malware or revealing sensitive information.

C. An attacker can use vulnerabilities in the IPv6 routing header to launch attacks at the application layer. IPv6 routing headers are used to guide packets through the network. This statement is also true as attackers can exploit vulnerabilities in the routing header to launch attacks at the application layer, such as denial of service (DoS) attacks or injection of malicious code.

D. An attacker can execute a spoofing attack by populating the RH0 routing header subtype with multiple destination addresses. The RH0 routing header subtype is used in IPv6 to specify a list of intermediate nodes through which the packet should be routed. This statement is true as attackers can manipulate the routing header to execute a spoofing attack by populating the RH0 routing header subtype with multiple destination addresses, which could allow the attacker to intercept and modify packets.

E. An attacker can use HTTP Header attacks to launch a DoS attack. HTTP headers are used to exchange information between the client and the server. This statement is true as attackers can manipulate the headers to launch DoS attacks by flooding the server with requests or injecting malicious code into the headers.

F. An attacker can leverage an HTTP response header to inject malicious code into an application. As mentioned earlier, HTTP response headers contain information about the content and behavior of the web page. This statement is also true as attackers can inject malicious code into the response headers to execute a variety of attacks, including cross-site scripting (XSS) attacks and injection attacks.

In summary, the two true statements about header attacks are:

  • An attacker can use IPv6 Next header attacks to steal user data and launch phishing attacks.
  • An attacker can leverage an HTTP response header to write malicious cookies.