2. Network security: ARP, TCP/IP and its vulnerabilities Flashcards

1
Q

What does ARP stand for?

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ARP do?

A

Maps IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does ARP work?

A

ARP broadcasts ‘who has IP C’. Machine C responds ‘IP C is at MAC C’. Machine A caches response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What layer does ARP operate at?

A

Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does an ARP cache poisoning work?

A

Eve sends ARP response to Alice and Bob (gateway) with Eve’s MAC, thus all traffic between Alice and Bob routes through Eve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are static ARP tables?

A

Network admin sets up ARP cache manually, inconvenient when new device joins but mitigates ARP cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many bits are ports?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which ports are reserved?

A

0-1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which ports are user ports?

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which port does HTTPS use?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which port does SSH use?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which port does SMTP use?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which port does FTP use?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which port does HTTP use?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a TCP connection established?

A

Three-way handshake

  • Client sends SYN packet
  • Server responds with SYN/ACK packet
  • Client responds with ACK packet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a TCP connection terminated

A

4-way handshake

  • Client sends FIN
  • Other client responds ACK
  • Other client sends FIN
  • Client sends ACK
17
Q

How is the order of packets in TCP insured?

A

Each packet has a sequence number

18
Q

How is deliver of packets in TCP insured?

A

Client sends an ACK for each each packet (absent -> resend)

19
Q

How is the contents of a TCP packet insured?

A

Data is compared to checksum encoded in packet

20
Q

What is SYN flooding?

A

Eve sends SYN packet to Alice without acknowledging response, Alice can’t handle all the SYN packets

21
Q

What are the problems with SYN flooding?

A

Attribution - Attackers IP can be traced

Bandwidth - Limited by attackers bandwidth

22
Q

How does a smurfing attack work?

A

Send a ping with a forged source to a smurf amplifier who swamps the target with replies