Chapter 4: Communication and Network Security Flashcards

(132 cards)

1
Q

-mulithomed firewall

A

Multi-homed firewalls may be used to setup a DMZ with a single firewall. (see next slide)

On any multi-homed machine, IP forwarding should be disabled.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11 wireless protocols

A

802.11a 54Mbps5Ghz8 channels802.11b11Mbs2.4Ghz (same as other home devices)802.11g54Mbs2.4Ghz802.11i : Wireless with security. First standard to require WPAII802.11n100Mbs2.4Ghz or 5Ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.15

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.1x and eap

A

802.1x is a port based network access control and includes

EAP.

  • EAP is an auth frameworks that describes many specific auth protocols PORT Based Auth. at Layer 2 for both wired and wireless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ad-hoc and infrastructure wireless

A

ah-hoc wirles cards to wireless cares infrastrcute is through access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Proxies - Firewallpros & cons?

A

Like circuit layer proxies, but actually understand the application/protocol they are proxying.This allows for additional security as they can inspect the data for protocol violations or content.AdvantagesApplication proxies understand the protocol, so they can add extra securityCan have advanced logging/auditing and access control featuresEx. Restrict users to only allowed websitesEx. Inspect data for protocol violationsEx. Inspect data for malware (viri etc)DisadvantagesExtra processing requires extra CPU (slower)Proxies ONLY understand the protocols they were written to understand. So you generally have a separate application proxy for EACH protocol you want to proxyexamples: smtp proxies, ftp proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

I’m looking for 192.168.1.2’s MAC addressanswer: that’s me at 00:af:14:b3:bc:12

Layer 2 take ip from L3 for the test say layer 2

Map IP address to Mac address via broadcast

it it then added to the ARP cache

arp poisoning: change mac address to bad server…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

asymmetric dsl

A

fast download less upload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

autonomous network how many entitites

A

one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blue Bugging

A

More serious

Allows full use of phone

Allows one to make calls

Can eavesdrop on calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blue Jacking

A

sending spam to bluetooth devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blue Snarfing

A

Copies info off remote devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bonk

A

similar to Teardrop manipulates how a pc reassembles a packet and allows of too large a packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Buffer Overflow

A

Attacks a specific type of memeory on a system …the buffers best avoided with input validation. too much to handle…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CHAP

A

does not expose the cleartext password and is not susceptible to replay attacks. CHAP relies on a shared secret: the password. The password is securely created (such as during account enrollment) and stored on the CHAP server. Since both the user and the CHAP server share a secret (the plaintext password), they can use that secret to securely authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

circuit Switching

A

all data follows same pathPSTNISDNDSLT-carriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Diddling

A

Altering/Manipulating data, usually before entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DCE

A

similar to kerberos developed by Open Group The Distributed Computing Environment (DCE) is a software system developed in the early 1990s by a consortium that included Apollo Computer (later part of Hewlett-Packard), IBM, Digital Equipment Corporation, and others. The DCE supplies a framework and toolkit for developing client/server applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DDos

A

use of Control Machines (Handlers) and Zombies (Bots) many machines making the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dial up protocol

A

PPP Point to Point Protocol: Provides Layer 2 framing for dial-up. Needs other protocols for securityEncryption: MPPEAuthentication:PAP (Password Authentication Protocol): Clear TextCHAP (Challenge Handshake Authentication Protocol) Client responds to a challenge from the server. The only way the client can answer correctly is if the correct password had been entered.EAP (Extensible Authentication Protocol) Extends capabilities beyond passwords (smart cards, biometrics, token devices, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DMZ

A

A buffer zone between an unprotected network and a protected network that allows for the monitoring and regulation of traffic between the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS port

A

UDP port 53 tcp port 53 large answers ie zone xfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dos

A

Denial of Service - overwhelm a system and disrupt its availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DSL

A

layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Dynamic Packet Filtering Firewalls
Like a state full firewall but more advanced. Can actually rewrite rules dynamically.Some protocols such as FTP have complex communications that require multiple ports and protocols for a specific application, packet and statefull filter cannot handle these easily, however dynamic packet filter can as they can create rules on the fly as needed.
26
Ethernet
Layer 2 transports data via frames
27
Ethernet
Most common form of LAN networking, has the following characteristicsShares mediaBroadcast and collision domains (see next slides)CSMA/CDSupports full duplex with a switchDefined by IEEE 802.3
28
Fraggle
Similar to smurf but uses UDP vs IMCP layer 4 attack. you can block distrubed attacks on router to mitigate.
29
frame relay
Frame Relay is a packet-switched Layer 2 WAN protocol that provides no error recovery and focuses on speed. Higher-layer protocols carried by Frame Relay, such as TCP/ IP, can be used to provide reliability. Frame Relay multiplexes multiple logical connections over a single physical connection to create Virtual Circuits; this shared bandwidth model is an alternative to dedicated circuits such as T1s. A PVC (Permanent Virtual Circuit) is always connected, analogous to a real dedicated circuit like a T1. A Switched Virtual Circuit (SVC)
30
FTP
uses tcp to guarantee delivery vs tftp uses udp faster doesn't guanatee delivery.
31
http
port 80
32
https port
443
33
imap port
internet massage access protocol port 143
34
imcp
L3 used to troubleshoot and report error conditions ICMP – “IP helper”Protocol behind echoing utilities like PING and Traceroute Frequently exploited * LOKI :sending data in ICMP messages header (not supposed to be there) —covert Channel * Ping of Death:violates the MTU (maximum transmission unit) size * Ping Floods: Lots of ping traffic * SMURF: Uses spoofed source address (Target) and directed broadcasts to launch a DDos
35
infrastructure as a service
storing things in the cloud. services provided by the cloud vs local...
36
IPsec
IPv4 has no built-in confidentiality; higher-layer protocols such as TLS are used to provide security. To address this lack of security at Layer 3, IPsec (Internet Protocol Security) was designed to provide confidentiality, integrity, and authentication via encryption for both IPv4 and IPv6. IPsec is a suite of protocols; the major two are Encapsulating Security Protocol (ESP) and auth header AH
37
IPv4
32 bit source and destination address
38
IPv6
64 bit destination address
39
ISDN
PRI and BRI
40
L2TP
Layer 2 Tunneling ProtocolCisco designed L2F to break free of dependence on IP networks, but kept it proprietary.L2TP was a combination of L2F and PPTPDesigned to be implemented in software solutionsTHERE IS NO SECURITY with L2TP. It MUST use IPSec to secure
41
L3 Firewall
Static Packet Filters: Base decisions on Source/Destination IP address and port
42
L5 Firewall
Stateful Inspection Knowledge of who initiated the session. Can block unsolicited replies. Protocol Anomaly firewalls.
43
L7 Firewall
Application Proxies/Kernel Proxies: Make decisions on Content, Active Directory Integration, Certs, time...etc
44
Land Attack
Creates a "circular reference" on a machine. Sends a packet where source and destination are the same.
45
Layer 1 Threats
Physical - TheftUnauthorized AccessVandalismSniffingInterferenceData Emanation
46
Layer 2 two sub layers
Data Layer ----- sublayers are: MAC Media Access Control xfters data down to phys layer & Logical Link Control up to L3. -Error Dectectiondevices: switches and bridgesEthernet card and its mac addresss
47
Layer 3
network layer describes routing moving data from a system on one lan to a system on another. IP address and routers ICMPOther protocols that “work” on this layer are: ICMP – IP “helpers” (like ping) IGMP – Internet Group Message Protocol IPRouters All protocols that start with “I” (except IMAP) Ping Floods, Pings of Death, Loki, Smurf
48
Layer 4
OSI Layer 4 Transport – Provides end-to-end data transport services and establishes a logical connection between 2 computers systems ”The “pony express” Protocols used at layer 4: * SSL/TLS (Discussed in Cryptography Chapter) * TCP UDPTCP & * UDP and L4 protocols SSL/TLS
49
Layer 5
OSI Layer 5 (Session) – responsible for establishing a connection between two APPLICATIONS! (either on the same computer or two different computers) * Create connection * Transfer data * Release connection TCP - Does session oriented services .Session layer manages sessions which provide maintenance on connections. connections between applications RPC's , simplex 1/2 duplex, full duplex ***setup, maintainance and teardown of session***
50
Layer 6
OSI Layer 6 Presentation Layer – presents the data in a format that all computers can understand **Think 3 things: Formating, Compression and Encryption** ***testable - This is the only layer of OSI that does NOT have any protocol.*** * Concerned with encryption, compression and formatting Making sure data is presented in a universal format File level encryption Removing redundancy from files (compression) Presentation Layer - presents data to the application concepts include data conversion, ASCII and image formats gif, jpeg, tiff
51
Layer 7
APPLICATION Layer This defines a protocol (way of sending data) that two different programs or applications understand. * HTTP, HTTPS, FTP, TFTP, SMTP, SNMP, etc. * Application Proxies * Non-Repudiation * Certificates * Integration with Directory SErvices * Time awareness. * Application- web brower, word processor etc.Procy Firewalls * Content Inspection **if you don't know what application try layer 7 cause there's a bunch!**
52
LEAP
lightweight extensible auth protocol cisco proprietary has security flaws
53
Least Secure Type of Cable
Twisted - Pair
54
Logic Bomb
malicious code that lays dormant until a logical even occurs.
55
Logical Link Layer
L2 - Error Detection
56
Loki Attack
Information is stored in IMCP header (covert channel)
57
MAC - Physical 1st Part
L2 - DataMedia Access control Addressing/Resolution and Media Access Determination-ARP (Address Resolution Protocal)-RARP (Reverse Address Resolution Protocol)
58
MAC - Physical 2nd Part
L2 - Data MAC Media access control\*\*CSMD/CD Carrier Sense Mutl. Access w/collision Detection 802.3 Ethernet - waits for clear then starts talking\*\*CSMA/CA Carrier Sense Mutl. Access w/collision Avoidance 802.11 Wireless - Signals intent to talkToken Passing: 24 bit control frame passed around the network environment..determine who can transmit.
59
MAN
Metropolitan area network
60
MPLS
Mulit Protocol Labeled Switching * MPLS is used to create cost effective, private Wide Area Networks (WANs) faster and more secure than regular routed “public” IP networks like the internet. * More secure than the public internet, because a “virtual” private network (end-to-end circuit)can be built just for your organization * Since it's a private network, we don't have to configure and maintain tradition encryption based VPN equipment anymore, and can also avoid the latency and delay inherent in the tech. * Provides QoS for VOIP * Purely Layer 3 technology.
61
NAT
one to one mapping private to public 3 ranges of internal 192.168 10. 172.16.x.x-172.31.x.x PAT-is port translation allows you to map many internal to one external...
62
Network Perimeter concept
choke points
63
NIS
a distributed database system that lets computers share sets of files...does not support md5
64
OSPF
because RIP could not scale well in large networks. Open Shortest Path First Protocal was created. It support hierarchies and the simultaneouse use of multiple paths.
65
packet Filter
Uses Access control lists (ACLs), which are rules that a firewall applies to each packet it receives.Not state full, just looks at the network and transport layer packets (IP addresses, ports, and “flags”)\*\*Does not look into the application, cannot block viri etc.\*\*Generally do not support anything advanced or customPacket filters keep no state
66
Packet Switching
* X.25 * Frame Relay * ATM * VOIP * MPLS * Cable Modems
67
PAP
PAP (Password Authentication Protocol) is a very weak authentication protocol. It sends the username and password in cleartext. An attacker who is able to sniff the authentication process can launch a simple replay attack, by replaying the username and password, using them to log in. PAP is insecure and should not be used.
68
PAT
mult. private address to share one public address.PAT looks at the IP and transport layer port number and rewrites both\*
69
Ping Flooding
overwhelm system with multitude of pings. via imcp
70
Ping of Death
sending a ping packet that violates the Max Trans Unit. a huge packet IMCP
71
Platform as a service
is all about application hosting
72
pop3 port
110
73
PPP
L2 that adds CIA via point to point links
74
PPTP
Point to Point Tunneling ProtocolBased on PPP (uses MPPE for encryption and PAP, CHAP or EAP for authentication)Lead by Microsoft protocol for a tunneling VPNOnly works across IP networksRemote user connects to ISP, gets an Internet AddressEstablishes VPN connection to work VPN server, get’s Internal IP address.Sends private IP packets encrypted within other IP packets.
75
Proxy Firewalls - Circuit Level pros & cons?
* A circuit-level gateway is a type of firewall. Circuit level gateways work at the session layer of the OSI model, or as a "shim-layer" between the application layer and the transport layer of the TCP/IP stack. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Application Proxies advantages * understand the protocol, so they can add extra security * can have advanced logging/auditing and acess control features * ex. restrict users to only allowed website * inspect data for protocol violations * inspect data for malware Disadvantages * extra processing * proxies only understand the protocols the were written to understand. do you generally have a seperate application proxy for each protocol. Examples: * internet security and acceleration server... ms web proxy * smtp proxies * ftp proxies
76
RDP
remote desk protocol tcp port 3389
77
RFC 1918
10.x.x.x172.16.x.x-172.31.x.x192.168.x.x
78
SAAS
Office 365 online for example. word on the cloud.
79
Salami
many small attacks add up to equal a large attack office space type of account
80
screened subnet
In a screen subnet, there is a separate firewall on both sides of the DMZ.When using this model it is recommended that each firewall be a different vendor/product.Diversity of defense\*
81
Security Zones - Firewall
DMZ bastion hosts - a hardened server vender divesity is good..
82
SIP
Consists of the User agent client an the user agent server user for voip
83
smtp
simple mail transport protocol port 25
84
Smurf
uses IMCP directed broadcasts. L3 attack. Block distributed broadcasts on routers to stop it.
85
Sniffing
Capturing and Viewing packet through the use of a Protocol analyzer best defense encrypt.
86
Socket
When a tcp or udp message is formed, a sourceand a destination port are contained in the header info along with source and IP addresses...this makes a socket.
87
ssh
port 22
88
Stateful Firewall
Layer 5 -router keeps track of a connections in a table. It knows which conversations are active, who is involved etc.- It allows return traffic to come back where a packet filter would have to have a specific rule to define returned traffic- More complex, and can launch DoS against by trying to fill up all the entries in the state tables/use up memory.- If rebooted can disrupt conversation that had been occurring. Context dependant access control\*
89
stateful firewall
Layer 5 Stateful firewalls have a state table that allows the firewall to compare current packets to previous ones. Stateful firewalls are slower than packet filters, but are far more secure. Computer 1 sends an ICMP Echo Request to
90
stateless firewall layer
3
91
Switch
A network Switch is just a multi-port bridge. Switches will often have 24 or more ports, and learns which MAC addresses are on which ports. Works at layer 2 (data link) On a switch a computer can send data AND receive data at the same time (full duplex… increasing performance by up to 2x) On a switch each port is it’s own collision domain, and will not have a collision, therefore allowing line speed communication on each port A switch does not alter broadcast domains A switch only sends traffic from the sending computer to the receiving computer, therefore stops sniffing (watch for MAC flooding attacks though) Since switches inspect the MAC address on all traffic, a switch can be programmed to only allow certain MAC addresses to communicate, and ignore other MAC addresses.
92
Syn Flood
exploits 3 way handshake TCP layer 4 attack. need stateful firewall to prevent
93
Syn Flood
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYNrequests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. Layer 4 attack
94
TCP
Transmission control Protocol:Connection oriented “guaranteed” delivery. \*\*\*Advantages * Easier to program with * Truly implements a session * Adds security \*\*\*Disadvantages * More overhead / slower * SYN Floods KNOW OSI and mapping...
95
TCP - Handshake
Reliable connection-oriented protocolHas a guaranteed delivery based on the handshake process SYN ---------\> hey open an area in memory SYN/ACK------------\> ACK
96
TCP Sequence Number
a way of ensuring that the message is delivered to teh appropriate destination and from its appropriate sender.
97
TCP/IP Protocols
UDP - user data protocal IMCP internet control message protocal etc.
98
Tear Drop
sending malformed packets which the OS doesn't know how to re-assemble L2 Attack
99
telnet
tcp port 23
100
Trojan Horse
One program (usually type of Malicious code) masquerades as another. common means of distributing back-door programs
101
types of EAP
leap, eap-tls, eap-ttls and peap
102
udp
user datagram protocol lossy apps
103
UDP
User Datagram Protocol: * Connectionless * Unreliable * No handshaking * Desirable when “real time” transfer is essential 1. Media Streaming, Gaming, live time chat, etc 2. FTP uses TCP 3. TFTP uses UDP
104
unsolictated Reply
sending a reply to a question that was never asked.
105
Virus
A piece of malicious code that can take many forms. Needs a host, and action by user to spread.
106
VNC port #
Virtual Network computing port 5900
107
VOIP Security Issues
Eavesdropping (greatest threat) Enable s/rtp secure real time protocal Toll Fraud Vishing - fishing using phon SPIT - spam of telephone Performance issues - Jitter, Latency
108
VPN - tunneling
A function of VPNs - Tunnel encapsulates one protocol within another protocol to create a virtual network.Can encrypts original IP headersCan encrypts dataAllows for routing non routable protocols and IP addressesCan provide remote/internal IP addressesDifferent protocolsPPTPL2TPIPSEC
109
WAN - Circuit Switching
Anything that has to do the the telephone system All data follow the same path PSTN ISDN DSL T-Carriers
110
WAP
Wireless Application Protocola protocol developed mainly to allow wireless devices (cell phones) access to the Internet.Requires a Gateway to translate WAP HTML (see visual)Uses WTLS to encrypt data (modified version of TLS)Uses HMAC for message authenticationWAP GAP\* problem (see visual and explain)A lot of wireless devices don’t need WAP anymore.
111
Wardialing
RAS attack find phone number that has a modem
112
WEP
WEP Wired Equivalent Privacy Shared authentication passwords Weak IV (24 bits) (initalization Vector) IV transmitted in clear text RC-4 (stream cipher)Easily crackable Only option for 802.11b
113
Wireless Security Problems
Unauthorized accesssniffingWar drivingUnauthorized access points (Man in the middle)
114
Worm
Similar to a Virus, but does not need a host and is self - replicating
115
WPA
Wi-Fi Protected AccessStronger IV Introduced TKIP Still used RC-4 it needed to maintain backwards compatibility.
116
WPA2
Wi-Fi Protected Access WPA2 * AES * CCMP * NOT backwards compatible WPA and WPA2 Enterprise * Uses 802.1X authentication to have individual passwords for individual users * RADIUS
117
Firewall Static Packet Filter
layer 3 static packet filtering - screen router with access control lists all or nothing devices. layer 5 stateful firewalls-
118
Session Hijack
Where an attacker steps in between two host and either monitors the exchange, or often disconnects one. Session hijacks are types of Man in the Middle attacks. Encryption prevents sniffing and mutual authentication would prevent session hijack. cross-site request forgery...a type of hijack...
119
Firewall Best Practices
120
media gateway
is the translation betewwn diparate telecommunications networks. VOIP Media gateways perform the conversion between time dividsion multiplexing voice to VOIP. as a secruity measure the numver of calls via media gateways should be limited to avoid DOS, hijacking, etc...
121
Persistant XSS vulnerability
is targeted at bew sites that allow user to input data that is stored in a database for similar location. the coded can be automatic withour luring an unsuspecting user. AKA - second- order vulnerability
122
non persistant vulnerabilty
enable an attacker to inject malicious code into vulnerable web pages. Unsuspecting user visits infected page with a rouge script to steal the victims sensitive information such as cookies or session IDs.
123
DOM Attack
XSS cross site scripting uses the Document Object Model to modify client side java script causes the victimes browers to execute the malicious java code.
124
IGP
Internet gateway protocal handles routing task between heach AS atonomous systems
125
IGRP
interisor gateway routing protocol is a distance -vector routing protocal that was developed by cisco. RIP - routing information protocal is a standard that outines how routers exchange routing table data as is considered a distance vector protocal which means it calulates the shorted length from source to destination. IGRP is better but is it propiatary to cisco---RIP is free
126
type of routing protocols
indicate how routers talk to eachother 2 types distance vector and link state routing distance vector just looks at hops link state builds a topology database of the network. looks at more variable than the number of hops.
127
EAP
Extensible Auth Protocol Provides a framework to enable many type of authentifiation techniques.
128
IEEE standards
802. 1AR - a unique id for a device 802. 1AE - data encrption and integrity 802. 1AF- key agreements session keys
129
hypervisor
the sofware component that carries out virtual machine management and oversees guest system software execution.
130
Common ports ftp, telnet, smtp, dns
FTP - Port 21 Telnet - Port 23 SMTP - Port 25 DNS - Port 53
131
ip header protcol number udp, igmp, tcp, imcp
ServiceProtocol Number Internet Control Message Protocol **(ICMP) 1** Transmission Control Protocol **(TCP) 6** User Datagram Protocol **(UDP) 17** General Routing Encapsulation **(PPTP data over GRE) 47**
132
ecure HTTP (S-HTTP).
An early standard for encrypting HTTP documents, Secure HTTP (S-HTTP) is designed to send individual messages securely. SSL is designed to establish a secure connection between two computers.