CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 40


Which of the following attacks, if successful, could give an intruder complete control of a software-defined networking (SDN) architecture?

Show Answer
Correct Answer: A

A brute force password attack on the Secure Shell (SSH) port of the controller, if successful, could indeed give an intruder complete control of a software-defined networking (SDN) architecture. The controller in an SDN architecture is the critical component responsible for managing and controlling the flow of network traffic. If an attacker gains access to the controller through SSH, they can manipulate the network's configuration, including flow rules, access policies, and other settings, effectively taking control of the entire network. This level of access would allow them to perform a range of malicious activities, such as redirecting traffic, creating backdoors, and disabling security mechanisms.

Discussion

17 comments
Sign in to comment
N00b1eOption: A
Sep 9, 2022

If you can get control of the controller, do you not own the network?

dev46
Sep 18, 2022

I will go with A too, the SDN controller is the heart. Compromising controller can initiate other attacks defined in B, C and D. https://www.routerfreak.com/9-types-software-defined-network-attacks-protect/

franbarpro
Oct 12, 2022

"YES" but how are you going to brute force the SSH password.

ccKane
Sep 23, 2023

Not the question. It is stated: "If successful..." therefore no matter how.

jackdryan
Apr 23, 2023

A is correct

franbarproOption: B
Sep 7, 2022

Agree with B https://www.networkworld.com/article/2840273/sdn-security-attack-vectors-and-sdn-hardening.html#:~:text=SDN%20Attack%20Vectors,new%20paradigm%20for%20network%20virtualization.

HeadAttacksOption: B
Jan 11, 2023

The defualt MaxAuthTries for SSH 6. So not really vulnerable to Brute Force.

HeadAttacks
Jan 11, 2023

Though the "if successful" clause is tricky. I guess to good accidently successfully brute force something in 6 tries.

invincible96Option: B
Mar 22, 2023

In a software-defined networking (SDN) architecture, the controller is responsible for managing and controlling the network devices through OpenFlow messages. An attacker who gains control of the SDN controller can potentially manipulate the network traffic, leading to various security risks. Sending control messages to open a flow that does not pass a firewall from a compromised host within the network is a type of attack called a "flow rule modification attack." This attack can allow an attacker to inject malicious traffic into the network or bypass security controls, giving the attacker complete control over the network.

Bach1968Option: B
Jul 5, 2023

The attack that could give an intruder complete control of a software-defined networking (SDN) architecture is option B: Sending control messages to open a flow that does not pass a firewall from a compromised host within the network. In software-defined networking, the SDN controller is responsible for managing and controlling the network infrastructure. By sending control messages to open a flow that bypasses the firewall from a compromised host within the network, an attacker can gain unauthorized access and manipulate the network's behavior. B

Dee83Option: A
Jan 21, 2023

A. A brute force password attack on the Secure Shell (SSH) port of the controller, if successful, could give an intruder complete control of a software-defined networking (SDN) architecture. The controller is the central point of management and control in SDN architecture, and if an attacker can gain access to the controller, they can manipulate the network's flow tables and gain complete control of the network's traffic. A Brute force attack on SSH port is a method of attempting to gain access to a remote system by trying every possible combination of characters for the password.

Azurefox79Option: A
Mar 16, 2023

SSH has to be open for admin efforts, therefore it is vulnerable to brute force. This is why I would use MFA if that's an option or at least a 24+ character password. Think Unifi wireless Network, if they get in, they have control.

A1nthemOption: B
Apr 27, 2023

SDN has Controlplane(routing) and Data plane(forwarding data).

KelvinYauOption: A
Jun 1, 2023

Voted A

HughJassoleOption: A
Jun 18, 2023

A. "By compromising the SDN controller, a hacker could have total control of the network." I googled B and C and those don't come up, so I don't think they are valid. D. is just sniffing traffic. This seems too easy, but based on all my research A it is.

HughJassole
Jul 9, 2023

I researched this more and thought about it, A doesn't make sense because once you ssh into a system you need to become root to do any damage, otherwise it's pointless. B. is absolutely correct: "If an attacker could create a flow that bypasses the traffic steering that guides traffic through a firewall the attacker would have a decided advantage." "The attacker would want to instantiate new flows by either spoofing northbound API messages or spoofing southbound messages toward the network devices. If an attacker can successfully spoof flows from the legitimate controller then the attacker would have the ability to allow traffic to flow across the SDN at their will and possibly bypass policies that may be relied on for security." https://www.networkworld.com/article/2840273/sdn-security-attack-vectors-and-sdn-hardening.html

homeyslOption: A
Oct 11, 2023

easy one. A is my answer.

UkpesOption: B
Oct 30, 2023

This type of attack, known as a flow rule modification attack, can allow an attacker to inject malicious traffic into the network or bypass security controls, giving the attacker complete control over the network.

ParikshitcyberOption: B
Mar 20, 2024

While gaining SSH access to the controller through a brute force password attack option A is indeed a serious security concern and could potentially allow an attacker to gain administrative access to the SDN controller, it may not necessarily result in complete control of the entire SDN architecture. On the other hand, option B describes an attack scenario where a compromised host within the network sends control messages to the SDN controller to open a flow that bypasses the firewall. This attack directly targets the SDN architecture itself and could potentially give the intruder complete control over network traffic flows, allowing them to manipulate traffic and potentially compromise other network devices or services. Thats why it is B

25cbb5fOption: A
Apr 3, 2024

Out of the options provided, the attack most likely to give an intruder complete control of an SDN architecture is: A. A brute force password attack on the Secure Shell (SSH) port of the controller Here's why: Why SDN Controllers are Critical Targets: SDN separates the control plane (where network configuration happens) from the data plane (where traffic flows). The controller is the central, highly privileged component that orchestrates the entire network. Compromising it would grant an attacker substantial power. Brute Force and SSH: A brute force attack attempts to guess the controller's administrative credentials through repeated login attempts. SSH is a common remote management protocol, and if its protection is weak, a successful brute force attack can lead to control plane takeover.

Jenkins3molOption: A
Apr 30, 2024

My AI told me that A is correct. So that is it.

duplexjayOption: A
May 31, 2024

A gives complete control while B gives complete access.

CCNPWILLOption: B
Jun 3, 2024

Most of these SDN questions and compromising it CISSP exam usually looks for controller related answer ive come to notice. compromising the controller gives you access to the fabric.