3B. Analyse Appliance Monitoring Output Flashcards

1
Q

Be able to interpret System event logs, Firewall logs, WAF Logs, Proxy Server Logs, Intrusion Detection and Prevention logs

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What information do syslogs provide?

A

information about the state of the network, servers, hardware, and applications, including details such as errors, security events, and authentication events sent over port 514 TCP/IP. No encryption or authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How has syslog been improved in its latest implementation?

A
  • Now uses port 1468 for delivery confirmation, so if a syslog is not delivered, it will be sent again
  • Uses TLS to encrypt msgs sent to servers
  • Uses MD5/SHA1 for authentication and integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an implicit deny firewall rule?

A

Traffic that does not match a specified rule is dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some key principles of firewall rulesets?

A

1) Block incoming requests from internal or private, loopback, and multicast IP address ranges as these have obviously been spoofed
2) Block incoming requests from protocols that should only be functioning at a local network level (e.g., ICMP, DHCP)
3) Configure IPv6 rules. Some hosts run dual-stack TCP/IP implementations with IPv6 on by default. Misconfiguration of a router could allow adversaries unfiltered access to the network over IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dropping vs Rejecting

A

Dropping involves not informing the client that a packet has been blocked, making it harder for adversaries to determine port states, while Rejecting will send a response to the client, which is useful for troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security intelligence do firewall logs provide?

A

1) Connections permitted or denied
2) Port and protocol usage
3) Bandwidth usage
4) Address translation audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some guidelines for Egress filtering?

A
  • Allow only whitelisted application ports, restrict destination addresses to authorised internet hosts (or use URL/content filtering to detect malicious traffic)
  • Restrict DNS lookups to your own DNS services
  • Block known bad IP addresses
  • Block IP address spaces that are not authorised on local network
  • Block internet access from host subnets that do not need it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalking

A

Recon technique that involves enumerating firewall configurations. Attacker identifies open ports on the perimeter firewall, crafts packet for open port with TTL of one past the firewall. If the packet is received, it will respond with “TTL Exceeded”. Can be mitigated with NAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Black holes

A

A type of defensive packet filtering whereby traffic is silently dropped before reaching its destination e.g. to mitigate a DoS, DoS traffic is sent to an IP address that is mapped to a non-existent host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sinkholes

A

Similar to black holes, except that traffic is redirected to another network for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Forward Proxy

A

A server that forwards internal host HTTP requests to the intended destination
- Useful if outbound traffic must comply with policies
- Improves performance as it uses caching services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Non-transparent Proxy

A

client must be configured with the server address to have HTTP requests forwarded by proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

transparent proxy

A

proxy intercepts traffic even if client isn’t configured to the server address. This is implemented at Network Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do Forward Proxy logs show?

A
  • User ID
  • Request method used by client
  • HTTP status code
  • Size of MIME type of the resource returned to the client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reverse proxy

A

A server that protects clients from direct contact with client requests.

17
Q

What do Reverse Proxy logs show?

A
  • Indicators of attack or compromise e.g., malicious code in HTTP request headers and URLS
  • Statistical analysis of response codes can identify anomalous deviation from baseline traffic
18
Q

What is an IDS?

A

A packet sniffer (i.e., sensor) placed inside a firewall, attached to a SPAN or TAP port, that uses a ruleset to match suspicious traffic and generate event logs

19
Q

What is IEEE 802.1X?

A

A standard for encapsulating EAP communications that provide port-based authentication

20
Q

Port-based NAC (PNAC)

A

Network access device (e.g., switch, router) requests authentication of the connecting host (i.e., supplicant) before activating the port. Does this by activating the EAPoL protocol and waits for the supplicant to provide authentication data

21
Q

Health Policy

A

set of rules and guidelines that define the minimum security configuration that a device must meet to be granted network access (e.g., firmware version, IDS status)