3.1 Secure Protocols Flashcards

1
Q

List all of the secure protocols

A
SRTP
NTPsec 
S/MIME 
HTTPS 
IPSec
FTPS
SFTP
LDAPS
SSH
SST/TLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SRTP

A

Secure Real Time Transport Protocol

Port: 3389 UDP

Encryption: AES
Hash: HMAC-SHA1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NTPsec

A

Just know it may be on the test as a secure protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

S/MIME

A

Secure Multipurpose Internet Mail Extensions

Uses encryption and digital signatures.

Can be used in Outlook, GMail, AppleMail etc.

Provides authentication, integrity, non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure POP

A

Port: 994 TCP

Uses a STARTTLS extension to encrypt with SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure IMAP

A

Port: 993 TCP

You can opt-in for SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Browser based Mail (Gmail, Hotmail, Yahoo)

A

Your browser will always use SSL for these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTPS

A

Port: 443 TCP

Uses public key cryptography to transfer symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec

A

OSI Layer 3 - Used in VPN’s

Uses Internet Key Exchange (IKE)

Provides:

Confidentiality (encryption)
Integrity (hashing)
Authentication (key exchange)

By using:

Uses Authentication Header (AH) (Integrity, Authentication)

and

Encapsulation Security Payload (ESP) (Integrity, Authenticity, Confidentiality)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet Key Exhange

A

Uses X.509 certificates

Used by IPsec to create a secure tunnel by encrypting the connection between authenticated peers.

3 Modes - Main, Aggressive, Quick

Phase 1 (Main or Aggressive only) 
- Connection by Diffie Hellman and shared secret key for more encryption.  Authentication then by pre shared key (shared secret),  signature or public key encryption.  Tunnel inside tunnel is established.

Phase 2 (Quick Mode) - Security Association established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Security Association

A

The establishment of a secure connection and shared security information using X.509 certificates or cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAPS

A

Port: 636 TCP/UDP

Uses SSL, SASL, X.509 certificates

The protocol for using a directory service

Used in Windows, Apple, OpenLDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SASL

A

Simple Authentication and Security Layer

Provides authentication using many different methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH

A

Port: 22 TCP

Used for remote controlling of other devices.

SSH requires a server (daemon) and an SSH (client)

The client connects to the server to control it.

SSH 2.0 uses Diffie Hellman and Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNSsec

A

Port: 53 UDP

DNS Security Extensions

Validates where info came from and insures integrity using digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SNMPv3

A

Port: 161 UDP
Port: 162 TCP/UDP (SNMP Trap)

Uses 3DES or AES

Provides confidentiality (encryption)
Integrity (hashing)
Authentication

17
Q

DHCP

A

In active directory, DHCP servers must be authorized since DHCP has no secure version.

Some switches will have “trusted” configurations. If the switch sees DHCP from an untrusted interface, the switch will block it. On CISCO switches, this is called “DHCP Snooping”

18
Q

What is a DHCP Attack?

A

Attackers can use DHCP starvation attacks.

The attacker creates many spoofed MAC addresses to exhaust the DHCP pool

It creates a DOS attack.

Switches can be configured to limit the number of MAC address that come from a specific interface.

19
Q

SSL/TLS

A

Fun fact, it was developed for e-commerce.

Uses X.509 digital certificates then symmetric cryptography.

Can be attacked using a downgrade attack. Configure your webserver to not support downgrades.

20
Q

PPTP

A

Port: 1723 TCP/UDP

Protocol that encapsulates PPP (point to point protocol)

Uses CHAP authentication which is bad.

21
Q

L2TP

A

Port: 1701 UDP

No inherent security. Mostly uses IPSec for encryption

22
Q

FTPS
and
SFTP

A

FTP with SSL - Port 989/990 TCP

FTP with SSH - Port: 22 TCP/UDP

These are not the same