06a - Transport Layer Security - TCP and UDP attacks Flashcards

1
Q

Why do amplification DoS attacks prefer UDP services?

A

Because UDP is “connectionless”, there is no need for authentication. This allows for faster transmission of packets to and from hosts, which means that packets can be sent very rapidly.
Without authentication, packets can be spoofed easily, so reflection attacks are very easy to perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Five components needed to spoof an RST Packet?

A
  1. Source IP address
  2. Source Port
  3. Destination IP Address
  4. Destination Port
  5. Sequence Number (within the receiver’s window)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is the most important part of mounting TCP reset and TCP session hijacking attacks?

A

Getting the Sequence number correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enumerate some general mitigations against TCP attacks.

A
  • Avoid endpoint identification, like source IP, source port.
  • Use NAT via a firewall or router
  • Prevent unauthorized Internet access, via routers and ACL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain what a SYN cookie is and how it protects against SYN flooding attacks.

A

After the server receives the initial SYN packet, A keyed hash(H) is calculated from the information in the packet using a secret key that is only known to the server.
The hash(H) is sent to the client as the initial sequence number from the server.
H is called the SYN cookie.
The server does not store half-open connections.
The server only stores a connection once the hash(H+1) is returned from the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define TCP

A
Transmission Control Protocol.
- Connection Oriented
- Considered reliable
- Consists of a Three-Way Handshake to establish a communication connection.
Client --SYN--> Server
Client  Server
- Three way handshake to close, (FIN/FIN-ACK/ACK).
- Runs on top of IP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define UDP

A

User Datagram Protocol

  • “Connectionless” Protocol, meaning that no connection needs to be established in order for communication to occur
  • Considered unreliable
  • Low overhead means faster transmission / Low latency.
  • Runs on top of IP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List 4 TCP attacks

A
  1. SYN Flooding Attack
  2. Shrew TCP Attack
  3. TCP Session Hijacking Attack
  4. TCP Reset Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List and describe some UDP attacks

A
  1. UDP Flood
    Targets UDP ports, spoofed IP source. Sends packets to random ports. Packet gets processed if open, replies are sent if closed.
  2. UDP Amplification Attack
    Spoofed UDP packet sent to “reflective” host, who then sends large packet to victim.
    Rate is the ratio of [answer sent to victim] to [request sent by attacker]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the mitigations involving NAT

A
  • use Firewall or Router to filter out malicious packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the mitigations involving ACL

A
  • ACL is Access Control List
  • With Routers and ACL you can mitigate the attacks.
  • Prevents unauthorized internet access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SYN Flooding?

A
  • TCP Attack.
  • Continuously send SYN packets to the server, fills the TCP connection queue with half-open connections. Do not finish the last ACK response to server. TCP services get DoS’d.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Shrew Attack?

A
  • TCP Attack.
  • Low rate DoS attack, send a burst of TCP packets equal to link capacity at short intervals, every second or so. Creates congestion, reduces TCP flow. Average rate of attack flow is small thus hard to detect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TCP Session Hijacking?

A
  • Inject data in an established connection so that the connection gets redirected to your machine.
  • Use Spoofed TCP packet.
  • Requires:
  • Source IP, Source Port
  • Destination IP, Destination Port
  • Sequence Number (hard to get, it’s the previous sequence+1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a TCP Reset Attack?

A

Break up a TCP connection between A and B.

- Accomplished using Spoofed TCP RESET packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly