Evading IDS, Firewalls, and Honeypots Flashcards

1
Q

What is Signature Recognition?

A

Signature recognition, also known as misuse detection, tries to identify events that indicate an abuse of a system or network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Protocol Anomaly Detection?

A

In this type of detection, models are built to explore anomalies in the way in which vendors deploy the TCP/IP specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Anomaly Detection?

A

Anomaly detection detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Bastion Host?

A

The bastion host is designed for defending the network against attacks. It acts as a mediator between inside and outside networks. A bastion host is a computer system designed and configured to protect network resources from attacks. Traffic entering or leaving the network passes through the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a malware honeypot?

A

Malware honeypots are used to trap malware campaigns or malware attempts over the network infrastructure. These honeypots are simulated with known vulnerabilities such as outdated APIs, vulnerable SMBv1 protocols, etc., and they also emulate different Trojans, viruses, and backdoors that encourage adversaries to perform exploitation activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a honeynet?

A

Honeynets are networks of honeypots. They are very effective in determining the entire capabilities of the adversaries. Honeynets are mostly deployed in an isolated virtual environment along with a combination of vulnerable servers. The various TTPs employed by different attackers to enumerate and exploit networks will be recorded, and this information can be very effective in determining the complete capabilities of the adversary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a spider honeypot?

A

Spider honeypots are also called spider traps. These honeypots are specifically designed to trap web crawlers and spiders. Many threat actors perform web crawling and spidering to extract important information from web applications. Such crucial information includes URLs, contact details, directory details, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a spam honeypot?

A

Spam honeypots specifically target spammers who abuse vulnerable resources such as open mail relays and open proxies. Basically, spam honeypots consist of mail servers that deliberately accept emails from any random source from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a packet-filter (stateless) firewall?

A

A packet filtering firewall investigates each individual packet passing through it and makes a decision whether to pass the packet or drop it. It works at the Internet protocol (IP) layer of the TCP/IP model (network layer of the OSI model). Packet filter–based firewalls concentrate on individual packets, analyze their header information, and determine which way they need to be directed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a packet-filter (stateless) firewall?

A

A packet filtering firewall investigates each individual packet passing through it and makes a decision whether to pass the packet or drop it. It works at the Internet protocol (IP) layer of the TCP/IP model (network layer of OSI). Packet filter–based firewalls concentrate on individual packets, analyze their header information, and determine which way they need to be directed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following descriptions is true about a static NAT?

A static NAT uses a one-to-one mapping.
A static NAT uses a many-to-one mapping.
A static NAT uses a one-to-many mapping.
A static NAT uses a many-to-many mapping.

A

A static NAT uses a one-to-one mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following descriptions is true about a static NAT?

A static NAT uses a one-to-one mapping.
A static NAT uses a many-to-one mapping.
A static NAT uses a one-to-many mapping.
A static NAT uses a many-to-many mapping.

A

A static NAT uses a one-to-one mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At which two traffic layers do most commercial IDSes generate signatures? (Select Two)

Session layer
Application layer
Network layer
Transport layer

A

Network and Transport layers (easiest layers to filter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone?

TCP flag bits
Interface
Direction
Source IP address

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A circuit-level gateway works at which of the following layers of the OSI model?

Layer 5 – Session
Layer 4 – Transport
Layer 2 – Data Link
Layer 3 – Network

A

Layer 5 - Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is discretionary access control?

A

In discretionary access control (DAC), the owner of the object specifies which subjects can access the object. This model is called discretionary because the control of access is based on the discretion of the owner.

Most operating systems such as all Windows, Linux, and Macintosh and most flavors of Unix are based on DAC models.

In these operating systems, when you create a file, you decide what access privileges you want to give to other users; when they access your file, the operating system will make the access control decision based on the access privileges you created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is mandatory access control?

A

In mandatory access control (MAC), the system (and not the users) specifies which subjects can access specific data objects.

The MAC model is based on security labels. Subjects are given a security clearance (secret, top secret, confidential, etc.), and data objects are given a security classification (secret, top secret, confidential, etc.). The clearance and classification data are stored in the security labels, which are bound to the specific subjects and objects.

When the system is making an access control decision, it tries to match the clearance of the subject with the classification of the object. For example, if a user has a security clearance of secret, and he requests a data object with a security classification of top secret, then the user will be denied access because his clearance is lower than the classification of the object.

The MAC model is usually used in environments where confidentiality is of utmost importance, such as a military institution.

Examples of the MAC-based commercial systems are SE Linux and Trusted Solaris

18
Q

What is Snort (software)?

A

Snort is an open-source network intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis and content searching/matching, and it is used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and OS fingerprinting attempts

19
Q

What is Suricata (software)?

A

Suricata is a robust network threat detection engine capable of real-time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM), and offline pcap processing

20
Q

What is KFSensor (software)?

A

KFSensor is a host-based IDS that acts as a honeypot to attract and detect hackers and worms by simulating vulnerable system services and Trojans. By acting as a decoy server, it can divert attacks from critical systems and provide a higher level of information than that achieved using firewalls and NIDS alone

21
Q

What is zIPS (software)?

A

Zimperium’s zIPS™ is a mobile intrusion prevention system app that provides comprehensive protection for iOS and Android devices against mobile network, device, and application cyber-attacks

22
Q

When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following:

Stops checking rules, sends an alert, and lets the packet continue
Continues to evaluate the packet until all rules are checked
Drops the packet and moves on to the next one
Blocks the connection with the source IP address in the packet

A

Continues to evaluate the packet until all rules are checked

23
Q

Which of the following is not an action present in Snort IDS?

Alert
Pass
Log
Audit

A

Audit

24
Q

What is NetPatch Firewall (software)?

A

NetPatch firewall is a full-featured advanced android noroot firewall. It can be used to fully control over mobile device network. With NetPatch firewall, you can create network rules based on APP, IP address, domain name, and so on. This firewall is designed to save mobile device’s network traffic and battery consumption, and improve network security and protect privacy.

25
Q

What is Specter (software)?

A

SPECTER is a honeypot. It automatically investigates attackers while they are still trying to break in. It provides massive amounts of decoy content, and it generates decoy programs that cannot leave hidden marks on the attacker’s computer. Automated weekly online updates of the honeypot’s content and vulnerability databases allow the honeypot to change regularly without user interaction

26
Q

In Evading IDS, what are Invalid RST Packets used for?

A

TCP uses 16-bit checksums for error checking of the header and data and to ensure that communication is reliable. It adds a checksum to every transmitted segment that is checked at the receiving end. When a checksum differs from the checksum expected by the receiving host, the TCP drops the packet at the receiver’s end. The TCP also uses an RST packet to end two-way communications. Attackers can use this feature to elude detection by sending RST packets with an invalid checksum.

27
Q

In Evading IDS, what is a fragmentation attack?

A

Fragmentation can be used as an attack vector when fragmentation timeouts vary between the IDS and the host. Through the process of fragmenting and reassembling, attackers can send malicious packets over the network to exploit and attack systems

28
Q

In Evading IDS, what is obfuscation?

A

It is an IDS evasion technique used by attackers to encode the attack packet payload in such a way that the destination host can only decode the packet but not the IDS. An attacker manipulates the path referenced in the signature to fool the IDS. Using Unicode characters, an attacker can encode attack packets that the IDS would not recognize but which an IIS web server can decode

29
Q

In Evading IDS, what is an insertion attack?

A

Insertion is the process by which the attacker confuses the IDS by forcing it to read invalid packets (i.e., the system may not accept the packet addressed to it). An IDS blindly trusts and accepts a packet that an end system rejects. If a packet is malformed or if it does not reach its actual destination, the packet is invalid. If the IDS reads an invalid packet, it gets confused. An attacker exploits this condition and inserts data into the IDS

30
Q

In Evading IDS, what is Overlapping Fragments?

A

Attackers use overlapping fragments to evade IDS. In this technique, attackers generate a series of tiny fragments with overlapping TCP sequence numbers

31
Q

In Evading IDS, what is Polymorphic Shellcode?

A

Polymorphic shellcode attacks include multiple signatures, making it difficult to detect the signature. Attackers encode the payload using some technique and then place a decoder before the payload. As a result, the shellcode is completely rewritten each time it is sent, thereby evading detection. With polymorphic shellcodes, attackers hide their shellcode (attack code) by encrypting it with an unknown encryption algorithm and including the decryption code as part of the attack packet. To carry out polymorphic shellcode attacks, they use an existing buffer-overflow exploit and set the “return” memory address on the overflowed stack to the entrance point of the decryption code

32
Q

In Evading IDS, what is Evasion?

A

An “evasion” attack occurs when the IDS discards packets while the host that intended to receive the packets accepts them. Using this technique, an attacker exploits the host computer. Evasion attacks have an adverse effect on the accuracy of the IDS

33
Q

In Evading IDS, what is session splicing?

A

Session splicing is an IDS evasion technique that exploits how some IDS do not reconstruct sessions before pattern-matching the data. It is a network-level evasion method used to bypass IDS where an attacker splits the attack traffic into an excessive number of packets such that no single packet triggers the IDS. The attacker divides the data in the packets into small portions of a few bytes and evades the string match while delivering the data. The IDS cannot handle an excessive number of small-sized packets and fails to detect the attack signatures. If attackers know what IDS is in use, they could add delays between packets to bypass reassembly checking

34
Q

Eric, a professional hacker, is trying to perform a SQL injection attack on the back-end database system of the InfomationSEC, Inc. During the information gathering process, he identifies that MySQL server is the back-end database engine used. Eric has tried various SQL injection attack attempts based on the information gathered but all of his attempts failed. Later, he discovered that IPS system is blocking all the SQL injection attack attempts. Eric decided to bypass the IPS using string concatenation IPS evasion technique where he needs to break the SQL query into a number of small pieces and concatenates the SQL query end-to-end.

Which of the following string concatenation operator Eric need to use in the SQL query to concatenate the SQL query end-to-end?

A. “+” operator
B. “||” operator
C. “concat(,)” operator
D. “&” operator

A

concat(,) operator

35
Q

Check Point’s FireWall-1 listens on which TCP port?

A

259

36
Q

What is Loki?

A

Loki uses ICMP tunneling to execute commands of choice by tunneling them inside the payload of ICMP echo packets.

37
Q

Which feature of the Secure Pipes tool open application communication ports to remote servers without opening those ports to public networks?

Remote forwards
SOCKS proxies
Local forwards
Remote backwards

A

Local forwards open application communication ports to remote servers without opening those ports to public networks. It brings the security of VPN communication to clients and servers on an ad hoc basis without the configuration and management hassle.

38
Q

What is Secure Pipes?

A

Secure Pipes is an SSH tunnel and SOCKS proxy manager for macOS

39
Q

What is Bitvise?

A

Bitvise is SSH tunnel, SFTP, SCP, and SSH client and server software for Microsoft Windows

40
Q

What is super network tunnel?

A

Super Network Tunnel is professional http tunneling software, which includes both http tunnel client and server software