Chapter 14 Flashcards

(12 cards)

1
Q

Kerberos

A

KDC (Key Distribution Center) -
Kerberos Authentication Server
- hosts KDC functions
- Ticket granting service
- authentication service
Ticket-granting Ticket for requesting Service Ticket
Tickets can expire
Kerberos principal - user or ticket requester
Uses AES
Uses and used by MS Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RADIUS

A

RADIUS:
- Encrypts password only
- UDP 1812/1813
RADIUS/TLS:
- for encrypting entire session
- TCP 2083

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TACACS+

A

Open standard
Created by Cisco
TCP 49
Separates AAA into their own services
Encrypts all auth info, not just password
Better than RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal SSO protocols
(AAA)

A

Kerberos (most common)
RADIUS
TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet/Web SSO protocols

A
  1. SAML - authentication and authorization assertions (exchanged info)
    - Principal, Service Provider, Identity Provider
    - Authen, attribute, authorization statements
  2. OAuth - authorization only; uses tokens
  3. OpenID - authentication; ID provider
  4. OpenID Connect (OIDC) - incorporates OAuth for authorization; JWT for tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permission - usually access to info object e.g. file
Right - action
Privilege - permission + right

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access control matrix (ACL) - focus on objects
Capability table - focus on user/subject

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Content-dependent access controls - restrict access to data based on the content within an object.
  2. Context-dependent access controls - require specific
    activity before granting users access.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Control Types

A
  1. Discretionary access control - managed by owner via ACL’s
  2. Non-discretionary access control - centrally managed by admin
  3. Role-based
  4. Rule-based - used in firewalls
  5. Attribute-based - more advanced implementation of rule-based; used by SDN
  6. Mandatory access control - uses labels; lattice; Hierarchical, Compartmentalized, Hybrid
  7. Risk-based - considers environment, situation, security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Control attacks

A
  • Password attack
  • Dictionary attack
  • Brute-force attack
  • Spraying attack - circumvent lockouts by rotating across diff accounts
  • Credential stuffing - try compromised user credentials on other sites
  • Birthday attack - take adv of collisions
  • Rainbow table attack - circumvent by salting pwds
  • Mimikatz - reads credentials from memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-trust access policy

A
  • Subjects
  • Policy engines - decide based on external systems, e.g. threat intel, SIEM devices
  • Policy administrators - components that act on decision, to create or remove connections between subject & resource
    Policy Decision Point = Policy engine + policy admin
  • Policy enforcement point - work with policy admin to allow / deny access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos attacks

A
  • Overpass the hash (or pass the key) - Mimikatz reads hash and uses it to get TGT
  • Pass the ticket - compromised ticket
  • Silver ticket - use captured hash to get TGST (for service accounts)
  • Golden ticket - access to Kerberos ticket granting account
  • Kerberos brute force
  • ASPREPRoast - trick Kerberos to send TGT with client credentials, then decrypt client pwd
  • Kerberoasting - capture TGST and then decrypt them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly