MODULE 10 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards

1
Q

DHCP Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters.

This is referred to as dynamic addressing. The alternative to dynamic addressing is static addressing.

When using static addressing, the network administrator manually enters IP address information on hosts.

A

When a host connects to the network, the DHCP server is contacted, and an address is requested.

The DHCP server chooses an address from a configured range of addresses called a pool and assigns (leases) it to the host.

On larger networks, or where the user population changes frequently, DHCP is preferred for address assignment.

New users may arrive and need connections; others may have new computers that must be connected.

Rather than use static addressing for each connection, it is more efficient to have IPv4 addresses assigned automatically using DHCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP can allocate IP addresses for a configurable period of time, called a lease period.

The lease period is an important DHCP setting, When the lease period expires or the DHCP server gets a DHCPRELEASE message the address is returned to the DHCP pool for reuse.

Users can freely move from location to location and easily re-establish network connections through DHCP.

A

As the figure shows, various types of devices can be DHCP servers.

The DHCP server in most medium-to-large networks is usually a local, dedicated PC-based server.

With home networks, the DHCP server is usually located on the local router that connects the home network to the ISP.

https://snipboard.io/0Z2oJD.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many networks use both DHCP and static addressing. DHCP is used for general purpose hosts, such as end user devices.

Static addressing is used for network devices, such as gateway routers, switches, servers, and printers.

A

DHCP for IPv6 (DHCPv6) provides similar services for IPv6 clients.

One important difference is that DHCPv6 does not provide a default gateway address.

This can only be obtained dynamically from the Router Advertisement message of the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP Operation As shown in the figure, when an IPv4, DHCP-configured device boots up or connects to the network, the client broadcasts a DHCP discover (DHCPDISCOVER) message to identify any available DHCP servers on the network.

A DHCP server replies with a DHCP offer (DHCPOFFER) message, which offers a lease to the client.

The offer message contains the IPv4 address and subnet mask to be assigned, the IPv4 address of the DNS server, and the IPv4 address of the default gateway. The lease offer also includes the duration of the lease.

https://snipboard.io/3EBk29.jpg

A

The client may receive multiple DHCPOFFER messages if there is more than one DHCP server on the local network. Therefore, it must choose between them, and sends a DHCP request (DHCPREQUEST) message that identifies the explicit server and lease offer that the client is accepting. A client may also choose to request an address that it had previously been allocated by the server.

Assuming that the IPv4 address requested by the client, or offered by the server, is still available, the server returns a DHCP acknowledgment (DHCPACK) message that acknowledges to the client that the lease has been finalized.

If the offer is no longer valid, then the selected server responds with a DHCP negative acknowledgment (DHCPNAK) message.

If a DHCPNAK message is returned, then the selection process must begin again with a new DHCPDISCOVER message being transmitted.

After the client has the lease, it must be renewed prior to the lease expiration through another DHCPREQUEST message. The DHCP server ensures that all IP addresses are unique (the same IP address cannot be assigned to two different network devices simultaneously).

Most ISPs use DHCP to allocate addresses to their customers. DHCPv6 has a set of messages that is similar to those for DHCPv4. The DHCPv6 messages are SOLICIT, ADVERTISE, INFORMATION REQUEST, and REPLY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHCP Message Format The DHCPv4 message format is used for all DHCPv4 transactions. DHCPv4 messages are encapsulated within the UDP transport protocol.

DHCPv4 messages that are sent from the client use UDP source port 68 and destination port 67.

DHCPv4 messages sent from the server to the client use UDP source port 67 and destination port 68. The structure of the DHCPv4 message is shown below.

https://snipboard.io/1mnH9v.jpg

A

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Operation (OP) Code :

Specifies the general type of message. A value of 1 indicates a request message; a value of 2 is a reply message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Hardware Type :

Identifies the type of hardware used in the network. For example, 1 is Ethernet, 15 is Frame Relay, and 20 is a serial line. These are the same codes used in ARP messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Hardware Address Length :

Specifies the length of the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Hops :

Controls the forwarding of messages. Set to 0 by a client before transmitting a request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Transaction Identifier :

Used by the client to match the request with replies received from DHCPv4 servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Seconds :

Identifies the number of seconds elapsed since a client began attempting to acquire or renew a lease. Used by DHCPv4 servers to prioritize replies when multiple client requests are outstanding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Flags :

Used by a client that does not know its IPv4 address when it sends a request. Only one of the 16 bits is used, which is the broadcast flag. A value of 1 in this field tells the DHCPv4 server or relay agent receiving the request that the reply should be sent as a broadcast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Client IP Address :

Used by a client during lease renewal when the address of the client is valid and usable, not during the process of acquiring an address. The client puts its own IPv4 address in this field if and only if it has a valid IPv4 address while in the bound state; otherwise, it sets the field to 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Your IP Address :

Used by the server to assign an IPv4 address to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Server IP Address :

Used by the server to identify the address of the server that the client should use for the next step in the bootstrap process, which may or may not be the server sending this reply. The sending server always includes its own IPv4 address in a special field called the Server Identifier DHCPv4 option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Gateway IP Address :

Routes DHCPv4 messages when DHCPv4 relay agents are involved. The gateway address facilitates communications of DHCPv4 requests and replies between the client and a server that are on different subnets or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Client Hardware Address :

Specifies the physical layer of the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Server Name :

Used by the server sending a DHCPOFFER or DHCPACK message. The server may optionally put its name in this field. This can be a simple text nickname or a DNS domain name, such as dhcpserver.netacad.net.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

Boot Filename :

Optionally used by a client to request a particular type of boot file in a DHCPDISCOVER message. Used by a server in a DHCPOFFER to fully specify a boot file directory and filename.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

https://snipboard.io/1mnH9v.jpg

The fields are explained here: :

– Operation (OP) Code

– Hardware Type

– Hardware Address Length

– Hops

– Transaction Identifier

– Seconds

– Flags

– Client IP Address

– Your IP Address

– Server IP Address

– Gateway IP Address

– Client Hardware Address

– Server Name

– Boot Filename

– DHCP Options

A

DHCP Options :

Holds DHCP options, including several parameters required for basic DHCP operation. This field is variable in length. Both client and server may use this field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DNS Overview :

The webservers that we so often connect to using names like www⋅cisco⋅com, are actually reached by assigning IP addresses to packets.

On the internet, these domain names are much easier for people to remember than an IP address such as 74.163.4.161. If Cisco decides to change the numeric address of www⋅cisco⋅com, it is transparent to the user because the domain name remains the same.

The new address is simply linked to the existing domain name and connectivity is maintained.

A

The Domain Name System (DNS) was developed to provide a reliable means of managing and providing domain names and their associated IP addresses.

The DNS system consists of a global hierarchy of distributed servers that contain databases of name to IP address mappings.

The client computer in the figure will send a request to the DNS server to get the IP address for www⋅cisco⋅com so that it can address packets to that server.

A recent analysis of network security threats discovered that over 90% of malicious software exploits use the DNS system to carry out network attack campaigns.

A cybersecurity analyst should have a thorough understanding of the DNS system and the ways in which malicious DNS traffic can be detected through protocol analysis and the inspection of DNS monitoring information. In addition, malware frequently contacts command-and-control servers by using DNS.

This makes the server URLs indicators of compromise for specific exploits. DNS Resolves Names to IP Addresses:

https://snipboard.io/50MOic.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The DNS Domain Hierarchy The DNS consists of a hierarchy of generic top-level domains (gTLD) which consist of .com, .net, .org, .gov, .edu, and numerous country-level domains, such as .br (Brazil), .es (Spain), .uk (United Kingdom), etc.

At the next level of the DNS hierarchy are second-level domains.

These are represented by a domain name that is followed by a top-level domain. Subdomains are found at the next level of the DNS hierarchy and represent some division of the second-level domain.

A

Finally, a fourth level can represent a host in a subdomain. Each element of a domain specification is sometimes called a label.

The labels move from the top of the hierarchy downward from right to left. A dot (“.“) at the end of a domain name represents the root server at the top of the hierarchy.

The figure illustrates this DNS domain hierarchy. The different top-level domains represent either the type of organization or the country of origin.

Examples of top-level domains are the following: .com - a business or industry .org - a non-profit organization .au - Australia .co - Colombia

https://snipboard.io/CBFD2L.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

Resolver :

A DNS client that sends DNS messages to obtain information about the requested domain name space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

Recursion :

The action taken when a DNS server is asked to query on behalf of a DNS resolver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

Authoritative Server :

A DNS server that responds to query messages with information stored in Resource Records (RRs) for a domain name space stored on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

Recursive Resolver :

A DNS server that recursively queries for the information asked in the DNS query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

FQDN :

A Fully Qualified Domain Name is the absolute name of a device within the distributed DNS database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

RR :

A Resource Record is a format used in DNS messages that is composed of the following fields: NAME, TYPE, CLASS, TTL, RDLENGTH, and RDATA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The DNS Lookup Process To understand DNS, cybersecurity analysts should be familiar with the following terms:

– Resolver

– Recursion

– Authoritative Server

– Recursive Resolver

– FQDN

– RR

– Zone

A

Zone :

A database that contains information about the domain name space stored on an authoritative server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When attempting to resolve a name to an IP address, a user host, known in the system as a resolver, will first check its local DNS cache.

If the mapping is not found there, a query will be issued to the DNS server or servers that are configured in the network addressing properties for the resolver.

These servers may be present at an enterprise or ISP. If the mapping is not found there, the DNS server will query other higher-level DNS servers that are authoritative for the top-level domain in order to find the mapping. These are known as recursive queries.

A

Because of the potential burden on authoritative top-level domain servers, some DNS servers in the hierarchy maintain caches of all DNS records that they have resolved for a period of time.

These caching DNS servers can resolve recursive queries without forwarding the queries to higher level servers. If a server requires data for a zone, it will request a transfer of that data from an authoritative server for that zone.

The process of transferring blocks of DNS data between servers is known as a zone transfer.

https://snipboard.io/QzTSqO.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Click each button to review the steps are involved in DNS resolution. :

– Step 1

– Step 2

– Step 3

– Step 4

– Step 5

A

Step 1

The user types an FQDN into a browser application Address field.

https://snipboard.io/tveIVC.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Click each button to review the steps are involved in DNS resolution. :

– Step 1

– Step 2

– Step 3

– Step 4

– Step 5

A

Step 2 :

A DNS query is sent to the designated DNS server for the client computer. https://snipboard.io/RL2AqD.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Click each button to review the steps are involved in DNS resolution. :

– Step 1

– Step 2

– Step 3

– Step 4

– Step 5

A

Step 3 :

The DNS server matches the FQDN with its IP address. https://snipboard.io/Y1QRdX.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Click each button to review the steps are involved in DNS resolution. :

– Step 1

– Step 2

– Step 3

– Step 4

– Step 5

A

Step 4 :

The DNS query response is sent back to the client with the IP address for the FQDN.

https://snipboard.io/Y1QRdX.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Click each button to review the steps are involved in DNS resolution. :

– Step 1

– Step 2

– Step 3

– Step 4

– Step 5

A

Step 5 :

The client computer uses the IP address to make requests of the server.

https://snipboard.io/duIQWf.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

DNS Message Format DNS uses UDP port 53 for DNS queries and responses. DNS queries originate at a client and responses are issued from DNS servers.

If a DNS response exceeds 512 bytes, such as when Dynamic DNS (DDNS) is used, TCP port 53 is used to handle the message. It includes the format for queries, responses, and data. The DNS protocol communications use a single format called a message.

This message format shown in the figure is used for all types of client queries and server responses, error messages, and the transfer of resource record information between servers.

A

The DNS server stores different types of RRs used to resolve names.

These records contain the name, address, and type of record. Here is a list of some of these record types:

– A

– NS

– AAAA

– MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The DNS server stores different types of RRs used to resolve names.

These records contain the name, address, and type of record. Here is a list of some of these record types:

– A

– NS

– AAAA

– MX

A

A :

An end device IPv4 address

38
Q

The DNS server stores different types of RRs used to resolve names.

These records contain the name, address, and type of record. Here is a list of some of these record types:

– A

– NS

– AAAA

– MX

A

NS :

An authoritative name server

39
Q

The DNS server stores different types of RRs used to resolve names.

These records contain the name, address, and type of record. Here is a list of some of these record types:

– A

– NS

– AAAA

– MX

A

AAAA :

An end device IPv6 address (pronounced quad-A)

40
Q

The DNS server stores different types of RRs used to resolve names.

These records contain the name, address, and type of record. Here is a list of some of these record types:

– A

– NS

– AAAA

– MX

A

MX :

A mail exchange record

41
Q

When a client makes a query, the server’s DNS process first looks at its own records to resolve the name.

If it is unable to resolve the name using its stored records, it contacts other servers to resolve the name.

After a match is found and returned to the original requesting server, the server temporarily stores the numbered address in the event that the same name is requested again.

A

The DNS Client service on Windows PCs also stores previously resolved names in memory.

The ipconfig /displaydns command displays all of the cached DNS entries.

https://snipboard.io/LMxNgY.jpg

As shown in the figure, DNS uses the same message format between servers, consisting of a question, answer, authority, and additional information for all types of client queries and server responses, error messages, and transfer of resource record information.

The table describes each section. DNS message section:

– Question

– Answer

– Authority

– Additional

42
Q

The DNS Client service on Windows PCs also stores previously resolved names in memory.

The ipconfig /displaydns command displays all of the cached DNS entries.

https://snipboard.io/LMxNgY.jpg

As shown in the figure, DNS uses the same message format between servers, consisting of a question, answer, authority, and additional information for all types of client queries and server responses, error messages, and transfer of resource record information.

The table describes each section. DNS message section:

– Question

– Answer

– Authority

– Additional

A

Question :

The question for the server. It contains the domain name to be resolved, the class of domain, and the query type.

43
Q

The DNS Client service on Windows PCs also stores previously resolved names in memory.

The ipconfig /displaydns command displays all of the cached DNS entries.

https://snipboard.io/LMxNgY.jpg

As shown in the figure, DNS uses the same message format between servers, consisting of a question, answer, authority, and additional information for all types of client queries and server responses, error messages, and transfer of resource record information.

The table describes each section. DNS message section:

– Question

– Answer

– Authority

– Additional

A

Answer :

The DNS resource record, or RR, for the query including the resolved IP address depending on the RR type.

44
Q

The DNS Client service on Windows PCs also stores previously resolved names in memory.

The ipconfig /displaydns command displays all of the cached DNS entries.

https://snipboard.io/LMxNgY.jpg

As shown in the figure, DNS uses the same message format between servers, consisting of a question, answer, authority, and additional information for all types of client queries and server responses, error messages, and transfer of resource record information.

The table describes each section. DNS message section:

– Question

– Answer

– Authority

– Additional

A

Authority :

Contains the RRs for the domain authority.

45
Q

The DNS Client service on Windows PCs also stores previously resolved names in memory.

The ipconfig /displaydns command displays all of the cached DNS entries.

https://snipboard.io/LMxNgY.jpg

As shown in the figure, DNS uses the same message format between servers, consisting of a question, answer, authority, and additional information for all types of client queries and server responses, error messages, and transfer of resource record information.

The table describes each section. DNS message section:

– Question

– Answer

– Authority

– Additional

A

Additional :

Relevant to query responses only. Consists of RRs that hold additional information that will make query resolution more efficient

46
Q

Dynamic DNS DNS requires registrars to accept and distribute DNS mappings from organizations that wish to register domain name and IP address mappings. After the initial mapping has been created, a process which can take 24 hours or more, changes to the IP address that is mapped to the domain name can be made by contacting the registrar or using an online form to the make the change.

However, because of the time it takes for this process to occur and the new mapping to be distributed in domain name system, the change can take hours before the new mapping is available to resolvers.

In situations in which an ISP is using DHCP to provide addresses to a domain, it is possible that the address that is mapped to the domain could expire and a new address be granted by the ISP.

This would result in a disruption of connectivity to the domain through DNS. A new approach was necessary to allow organizations to make fast changes to the IP address that is mapped to a domain.

A

Dynamic DNS (DDNS) allows a user or organization to register an IP address with a domain name as in DNS. However, when the IP address of the mapping changes, the new mapping can be propagated through the DNS almost instantaneously.

For this to occur, a user obtains a subdomain from a DDNS provider. That subdomain is mapped to the IP address of the user’s server, or home router connection to the internet. Client software runs on either the router or a host PC that detects a change in the internet IP address of the user. When a change is detected, the DDNS provider is immediately informed of the change and the mapping between the user’s subdomain and the internet IP address is immediately updated, as shown in the figure.

DDNS does not use a true DNS entry for a user’s IP address. Instead, it acts as an intermediary. The DDNS provider’s domain is registered with the DNS, but the subdomain is mapped to a totally different IP address.

The DDNS provider service supplies that IP address to the resolver’s second level DNS server. That DNS server, either at the organization or ISP, provides the DDNS IP address to the resolver.

47
Q

Dynamic DNS (DDNS) allows a user or organization to register an IP address with a domain name as in DNS. However, when the IP address of the mapping changes, the new mapping can be propagated through the DNS almost instantaneously.

For this to occur, a user obtains a subdomain from a DDNS provider. That subdomain is mapped to the IP address of the user’s server, or home router connection to the internet. Client software runs on either the router or a host PC that detects a change in the internet IP address of the user. When a change is detected, the DDNS provider is immediately informed of the change and the mapping between the user’s subdomain and the internet IP address is immediately updated, as shown in the figure.

DDNS does not use a true DNS entry for a user’s IP address. Instead, it acts as an intermediary. The DDNS provider’s domain is registered with the DNS, but the subdomain is mapped to a totally different IP address.

The DDNS provider service supplies that IP address to the resolver’s second level DNS server. That DNS server, either at the organization or ISP, provides the DDNS IP address to the resolver.

A

Dynamic DNS can be abused by threat actors in various ways. Free DDNS services are especially useful to threat actors. DDNS can be used to facilitate the rapid change of IP address for malware command-and-control servers after the current IP address has become widely blocked.

In this way, the malware can be coded with a URL rather than a static IP address. DDNS can also be used as a way to exfiltrate data from inside a network because DNS traffic is very common and is frequently considered to be benign.

DDNS itself is not malignant, however monitoring DNS traffic that is going to known DDNS services, especially free ones, is very useful for the detection of exploits.

https://snipboard.io/pn3Hza.jpg

48
Q

The WHOIS Protocol WHOIS is a TCP-based protocol that is used to identify the owners of internet domains through the DNS system.

When an internet domain is registered and mapped to an IP address for the DNS system, the registrant must supply information regarding who is registering the domain.

The WHOIS application uses a query, in the form of a FQDN. The query is issued through a WHOIS service or application. The official ownership registration record is returned to the user by the WHOIS service.

A

This can be useful for identifying the destinations that have been accessed by hosts on a network. WHOIS has limitations, and hackers have ways of hiding their identities.

However, WHOIS is a starting point for identifying potentially dangerous internet locations that may have been reached through the network.

An internet-based WHOIS service is called ICANN Lookup can be used to obtain the registration record a URL. Other WHOIS services are maintained by regional internet registries such as RIPE and APNIC.

https://snipboard.io/RQoiBs.jpg

49
Q

NAT IPv4 Private Address Space As you know, there are not enough public IPv4 addresses to assign a unique address to each device connected to the internet.

Networks are commonly implemented using private IPv4 addresses, as defined in RFC 1918. The range of addresses included in RFC 1918 are included in the following table.

It is very likely that the computer that you use to view this course is assigned a private address.

https://snipboard.io/enpZM8.jpg

A

These private addresses are used within an organization or site to allow devices to communicate locally.

However, because these addresses do not identify any single company or organization, private IPv4 addresses cannot be routed over the internet.

To allow a device with a private IPv4 address to access devices and resources outside of the local network, the private address must first be translated to a public address.

50
Q

These private addresses are used within an organization or site to allow devices to communicate locally.

However, because these addresses do not identify any single company or organization, private IPv4 addresses cannot be routed over the internet.

To allow a device with a private IPv4 address to access devices and resources outside of the local network, the private address must first be translated to a public address.

A

NAT provides the translation of private addresses to public addresses, as shown in the figure. This allows a device with a private IPv4 address to access resources outside of their private network, such as those found on the internet.

NAT, combined with private IPv4 addresses, has been the primary method of preserving public IPv4 addresses. A single, public IPv4 address can be shared by hundreds, even thousands of devices, each configured with a unique private IPv4 address.

https://snipboard.io/9mzE8N.jpg

Without NAT, the exhaustion of the IPv4 address space would have occurred well before the year 2000. However, NAT has limitations and disadvantages, which will be explored later in this module.

The solution to the exhaustion of IPv4 address space and the limitations of NAT is the eventual transition to IPv6.

51
Q

What is NAT? NAT has many uses, but its primary use is to conserve public IPv4 addresses.

It does this by allowing networks to use private IPv4 addresses internally and providing translation to a public address only when needed.

NAT has a perceived benefit of adding a degree of privacy and security to a network, because it hides internal IPv4 addresses from outside networks.

A

NAT-enabled routers can be configured with one or more valid public IPv4 addresses. These public addresses are known as the NAT pool.

When an internal device sends traffic out of the network, the NAT-enabled router translates the internal IPv4 address of the device to a public address from the NAT pool.

To outside devices, all traffic entering and exiting the network appears to have a public IPv4 address from the provided pool of addresses.

52
Q

NAT-enabled routers can be configured with one or more valid public IPv4 addresses. These public addresses are known as the NAT pool.

When an internal device sends traffic out of the network, the NAT-enabled router translates the internal IPv4 address of the device to a public address from the NAT pool.

To outside devices, all traffic entering and exiting the network appears to have a public IPv4 address from the provided pool of addresses.

A

A NAT router typically operates at the border of a stub network.

A stub network is one or more networks with a single connection to its neighboring network, one way in and one way out of the network.

In the example in the figure, R2 is a border router. As seen from the ISP, R2 forms a stub network.

https://snipboard.io/L67M2J.jpg

53
Q

When a device inside the stub network wants to communicate with a device outside of its network, the packet is forwarded to the border router.

The border router performs the NAT process, translating the internal private address of the device to a public, outside, routable address.

A

Note: The connection to the ISP may use a private address or a public address that is shared among customers.

For the purposes of this module, a public address is shown.

54
Q

How NAT Works NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.

In this example, PC1 with private address 192.168.10.10 wants to communicate with an outside web server with public address 209.165.201.1.

A

How NAT Works NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.

In this example, PC1 with private address 192.168.10.10 wants to communicate with an outside web server with public address 209.165.201.1.

55
Q

Port Address Translation Port Address Translation (PAT), also known as NAT overload, maps multiple private IPv4 addresses to a single public IPv4 address or a few addresses.

This is what most home routers do.

The ISP assigns one address to the router, yet several members of the household can simultaneously access the internet. This is the most common form of NAT for both the home and the enterprise.

A

With PAT, multiple addresses can be mapped to one or to a few addresses, because each private address is also tracked by a port number.

When a device initiates a TCP/IP session, it generates a TCP or UDP source port value, or a specially assigned query ID for ICMP, to uniquely identify the session.

When the NAT router receives a packet from the client, it uses its source port number to uniquely identify the specific NAT translation.

56
Q

With PAT, multiple addresses can be mapped to one or to a few addresses, because each private address is also tracked by a port number.

When a device initiates a TCP/IP session, it generates a TCP or UDP source port value, or a specially assigned query ID for ICMP, to uniquely identify the session.

When the NAT router receives a packet from the client, it uses its source port number to uniquely identify the specific NAT translation.

A

PAT ensures that devices use a different TCP port number for each session with a server on the internet.

When a response comes back from the server, the source port number, which becomes the destination port number on the return trip, determines to which device the router forwards the packets.

The PAT process also validates that the incoming packets were requested, thus adding a degree of security to the session.

57
Q

PAT ensures that devices use a different TCP port number for each session with a server on the internet.

When a response comes back from the server, the source port number, which becomes the destination port number on the return trip, determines to which device the router forwards the packets.

The PAT process also validates that the incoming packets were requested, thus adding a degree of security to the session.

A

As R2 processes each packet, it uses a port number (1331 and 1555, in this example) to identify the device from which the packet originated.

The source address (SA) is the inside local address with the TCP/UDP assigned port number added.

The destination address (DA) is the outside global address with the service port number added. In this example, the service port is 80, which is HTTP.

58
Q

As R2 processes each packet, it uses a port number (1331 and 1555, in this example) to identify the device from which the packet originated.

The source address (SA) is the inside local address with the TCP/UDP assigned port number added.

The destination address (DA) is the outside global address with the service port number added. In this example, the service port is 80, which is HTTP.

A

For the source address, R2 translates the inside local address to an inside global address with the port number added.

The destination address is not changed but is now referred to as the outside global IPv4 address.

When the web server replies, the path is reversed.

59
Q

File Transfer and Sharing Services FTP and TFTP

– File Transfer Protocol (FTP)

– Trivial File Transfer Protocol (TFTP)

A

File Transfer Protocol (FTP) :

FTP is another commonly used application layer protocol. FTP was developed to allow for data transfers between a client and a server. An FTP client is an application that runs on a computer that is used to push and pull data from an FTP server.

As the figure illustrates, to successfully transfer data, FTP requires two connections between the client and the server, one for commands and replies, the other for the actual file transfer: 1. The client establishes the first connection to the server for control traffic using TCP port 21, consisting of client commands and server replies. 2.

The client establishes the second connection to the server for the actual data transfer using TCP port 20. This connection is created every time there is data to be transferred. The data transfer can happen in either direction.

The client can download (pull) data from the server, or the client can upload (push) data to the server. FTP was not designed to be a secure application layer protocol. For this reason, SSH File Transfer Protocol, which is a secure form of FTP that uses Secure Shell protocol to provide a secure channel, is the preferred file transfer implementation.

https://snipboard.io/rSBiG3.jpg

60
Q

File Transfer and Sharing Services FTP and TFTP

– File Transfer Protocol (FTP)

– Trivial File Transfer Protocol (TFTP)

A

Trivial File Transfer Protocol (TFTP) :

TFTP is a simplified file transfer protocol that uses well-known UDP port number 69. It lacks many of the features of FTP, such as the file management operations of listing, deleting, or renaming files.

Because of its simplicity, TFTP has a very low network overhead and is popular for non-critical file transfer applications. It is fundamentally insecure however, because it has no login or access control features.

For this reason, TFTP needs to be implemented carefully, and only when absolutely necessary.

61
Q

SMB The Server Message Block (SMB) is a client/server file sharing protocol that describes the structure of shared network resources such as directories, files, printers, and serial ports, as shown in the figure. It is a request-response protocol.

All SMB messages share a common format. This format uses a fixed-sized header, followed by a variable-sized parameter and data component.

https://snipboard.io/1S75yJ.jpg

A

SMB messages can start, authenticate, and terminate sessions, control file and printer access, and allow an application to send or receive messages to or from another device.

SMB file sharing and print services have become the mainstay of Microsoft networking, as shown below.

https://snipboard.io/lBvPwo.jpg

62
Q

Email Protocols One of the primary services offered by an ISP is email hosting.

To run on a computer or other end device, email requires several applications and services, as shown in the figure.

Email is a store-and-forward method of sending, storing, and retrieving electronic messages across a network.

Email messages are stored in databases on mail servers.

https://snipboard.io/gO1TcZ.jpg

A

Email clients communicate with mail servers to send and receive email.

Mail servers communicate with other mail servers to transport messages from one domain to another.

An email client does not communicate directly with another email client when sending email.

Instead, both clients rely on the mail server to transport messages.

63
Q

Email clients communicate with mail servers to send and receive email.

Mail servers communicate with other mail servers to transport messages from one domain to another.

An email client does not communicate directly with another email client when sending email.

Instead, both clients rely on the mail server to transport messages.

A

Email supports three separate protocols for operation:

Simple Mail Transfer Protocol (SMTP),

Post Office Protocol (POP), and IMAP.

The application layer process that sends mail uses SMTP.

A client retrieves email using one of the two application layer protocols: POP or IMAP.

64
Q

SMTP SMTP message formats require a message header and a message body.

While the message body can contain any amount of text, the message header must have a properly formatted recipient email address and a sender address.

A

When a client sends email, the client SMTP process connects with a server SMTP process on well-known port 25.

After the connection is made, the client attempts to send the email to the server across the connection.

When the server receives the message, it either places the message in a local account, if the recipient is local, or forwards the message to another mail server for delivery, as shown in the figure.

65
Q

When a client sends email, the client SMTP process connects with a server SMTP process on well-known port 25.

After the connection is made, the client attempts to send the email to the server across the connection.

When the server receives the message, it either places the message in a local account, if the recipient is local, or forwards the message to another mail server for delivery, as shown in the figure.

A

The destination email server may not be online or may be busy when email messages are sent.

Therefore, SMTP spools messages to be sent at a later time. Periodically, the server checks the queue for messages and attempts to send them again.

If the message is still not delivered after a predetermined expiration time, it is returned to the sender as undeliverable. :

https://snipboard.io/gO1TcZ.jpg

66
Q

POP3 :

POP3 is used by an application to retrieve mail from a mail server. With POP3, mail is downloaded from the server to the client and then deleted on the server, as shown in the figure.

A

The server starts the POP3 service by passively listening on TCP port 110 for client connection requests.

When a client wants to make use of the service, it sends a request to establish a TCP connection with the server.

When the connection is established, the POP3 server sends a greeting.

The client and POP3 server then exchange commands and responses until the connection is closed or aborted.

67
Q

The server starts the POP3 service by passively listening on TCP port 110 for client connection requests.

When a client wants to make use of the service, it sends a request to establish a TCP connection with the server.

When the connection is established, the POP3 server sends a greeting.

The client and POP3 server then exchange commands and responses until the connection is closed or aborted.

A

With POP3, email messages are downloaded to the client and removed from the server, so there is no centralized location where email messages are kept.

Because POP3 does not store messages, it is undesirable for a small business that needs a centralized backup solution.

https://snipboard.io/UL3iMx.jpg

68
Q

IMAP : IMAP is another protocol that describes a method to retrieve email messages, as shown in the figure.

Unlike POP3, when the user connects to an IMAP-capable server, copies of the messages are downloaded to the client application.

The original messages are kept on the server until manually deleted. Users view copies of the messages in their email client software.

A

Users can create a file hierarchy on the server to organize and store mail.

That file structure is duplicated on the email client as well. When a user decides to delete a message, the server synchronizes that action and deletes the message from the server.

https://snipboard.io/OHDBAE.jpg

69
Q

HTTP Hypertext Transfer Protocol and Hypertext Markup Language There are application layer-specific protocols that are designed for common uses such as web browsing and email.

The first topic gave you an overview of these protocols.

This topic goes into more detail.

A

When a web address or Uniform Resource Locator (URL) is typed into a web browser, the web browser establishes a connection to the web service.

The web service is running on the server that is using the HTTP protocol.

URLs and Uniform Resource Identifiers (URIs) are the names most people associate with web addresses.

70
Q

When a web address or Uniform Resource Locator (URL) is typed into a web browser, the web browser establishes a connection to the web service.

The web service is running on the server that is using the HTTP protocol.

URLs and Uniform Resource Identifiers (URIs) are the names most people associate with web addresses.

A

To better understand how the web browser and web server interact, examine how a web page is opened in a browser.

For this example, use the http://www.cisco.com/index.html

URL. :

– Step 1

– Step 2

– Step 3

– Step 4

71
Q

To better understand how the web browser and web server interact, examine how a web page is opened in a browser.

For this example, use the http://www.cisco.com/index.html

URL. :

– Step 1

– Step 2

– Step 3

– Step 4

A

Step 1 :

The browser interprets the three parts of the URL: http (the protocol or scheme) www.cisco.com (the server name) index.html (the specific filename requested)

https://snipboard.io/4N0wUz.jpg

72
Q

To better understand how the web browser and web server interact, examine how a web page is opened in a browser.

For this example, use the http://www.cisco.com/index.html

URL. :

– Step 1

– Step 2

– Step 3

– Step 4

A

Step 2 :

The browser then checks with a name server to convert www.cisco.com into a numeric IP address, which it uses to connect to the server.

The client initiates an HTTP request to a server by sending a GET request to the server and asks for the index.html file.

https://snipboard.io/FLZI9q.jpg

73
Q

To better understand how the web browser and web server interact, examine how a web page is opened in a browser.

For this example, use the http://www.cisco.com/index.html

URL. :

– Step 1

– Step 2

– Step 3

– Step 4

A

Step 3 :

In response to the request, the server sends the HTML code for this web page to the browser.

https://snipboard.io/MD2xyZ.jpg

74
Q

To better understand how the web browser and web server interact, examine how a web page is opened in a browser.

For this example, use the http://www.cisco.com/index.html

URL. :

– Step 1

– Step 2

– Step 3

– Step 4

A

Step 4 :

The browser deciphers the HTML code and formats the page for the browser window.

https://snipboard.io/tVXIr1.jpg

75
Q

The HTTP URL HTTP URLs can also specify the port on the server that should handle the HTTP methods.

In addition, it can specify a query string and fragment. The query string typically contains information that is not handled by the HTTP server process itself, but is instead handled by another process that is running on the server. Query strings are preceded by a “?” character and typically consist of a series of name and value pairs.

A fragment is preceded by a “#” character. It refers to a subordinate part of the resource that is requested in the URL..

A

For example, a fragment could refer to a named anchor in an HTML document.

The URL will access the document and then move to the part of the document specified by the fragment if a matching named anchor link exists in the document.

An HTTP URL that includes these parts is shown in the figure.

: https://snipboard.io/byJ3qP.jpg https://snipboard.io/FzrCg4.jpg

76
Q

HTTP Operation HTTP is a request/response protocol that uses TCP port 80, although other ports can be used.

When a client, typically a web browser, sends a request to a web server, it will use one of six methods that are specified by the HTTP protocol.

https://snipboard.io/Y5bCN7.jpg

– GET

– POST

– PUT

– DELETE

– OPTIONS

– CONNECT

A

GET :

A client request for data. A client (web browser) sends the GET message to the web server to request HTML pages, as shown in the figure.

77
Q

HTTP Operation HTTP is a request/response protocol that uses TCP port 80, although other ports can be used.

When a client, typically a web browser, sends a request to a web server, it will use one of six methods that are specified by the HTTP protocol.

https://snipboard.io/Y5bCN7.jpg

– GET

– POST

– PUT

– DELETE

– OPTIONS

– CONNECT

A

POST :

Submits data to be processed by a resource.

78
Q

HTTP Operation HTTP is a request/response protocol that uses TCP port 80, although other ports can be used.

When a client, typically a web browser, sends a request to a web server, it will use one of six methods that are specified by the HTTP protocol.

https://snipboard.io/Y5bCN7.jpg

– GET

– POST

– PUT

– DELETE

– OPTIONS

– CONNECT

A

PUT :

Uploads resources or content to the web server such as an image.

79
Q

HTTP Operation HTTP is a request/response protocol that uses TCP port 80, although other ports can be used.

When a client, typically a web browser, sends a request to a web server, it will use one of six methods that are specified by the HTTP protocol.

https://snipboard.io/Y5bCN7.jpg

– GET

– POST

– PUT

– DELETE

– OPTIONS

– CONNECT

A

DELETE :

Deletes the resource specified.

80
Q

HTTP Operation HTTP is a request/response protocol that uses TCP port 80, although other ports can be used.

When a client, typically a web browser, sends a request to a web server, it will use one of six methods that are specified by the HTTP protocol.

https://snipboard.io/Y5bCN7.jpg

– GET

– POST

– PUT

– DELETE

– OPTIONS

– CONNECT

A

OPTIONS :

Returns the HTTP methods that the server supports.

81
Q

HTTP Operation HTTP is a request/response protocol that uses TCP port 80, although other ports can be used.

When a client, typically a web browser, sends a request to a web server, it will use one of six methods that are specified by the HTTP protocol.

https://snipboard.io/Y5bCN7.jpg

– GET

– POST

– PUT

– DELETE

– OPTIONS

– CONNECT

A

CONNECT :

Requests that an HTTP proxy server forwards the HTTP TCP session to the desired destination. Although HTTP is remarkably flexible, it is not a secure protocol. The request messages send information to the server in plaintext that can be intercepted and read. The server responses, typically HTML pages, are also unencrypted.

82
Q

HTTP Status Codes The HTTP server responses are identified with various status codes that inform the host application of the outcome of client requests to the server.

The codes are organized into five groups.

The codes are numeric, with the first number in the code indicating the type of message.

The five status code groups are:

– 1xx

– 2xx

– 3xx

– 4xx

– 5xx

A

1xx :

Informational

83
Q

HTTP Status Codes The HTTP server responses are identified with various status codes that inform the host application of the outcome of client requests to the server.

The codes are organized into five groups.

The codes are numeric, with the first number in the code indicating the type of message.

The five status code groups are:

– 1xx

– 2xx

– 3xx

– 4xx

– 5xx

A

2xx :

Success

84
Q

HTTP Status Codes The HTTP server responses are identified with various status codes that inform the host application of the outcome of client requests to the server.

The codes are organized into five groups.

The codes are numeric, with the first number in the code indicating the type of message.

The five status code groups are:

– 1xx

– 2xx

– 3xx

– 4xx

– 5xx

A

3xx :

Redirection

85
Q

HTTP Status Codes The HTTP server responses are identified with various status codes that inform the host application of the outcome of client requests to the server.

The codes are organized into five groups.

The codes are numeric, with the first number in the code indicating the type of message.

The five status code groups are:

– 1xx

– 2xx

– 3xx

– 4xx

– 5xx

A

4xx : Client Error

5xx : Server Error

86
Q

An explanation of some common status codes is shown in the figure.

An excellent resource for details about specific status codes can be found by searching for “rest api tutorial” and “HTTP status codes.” HTTP status codes are shown in HTTP client/server traffic and are useful for cybersecurity investigations.

https://snipboard.io/cOyJp3.jpg

A

An explanation of some common status codes is shown in the figure.

An excellent resource for details about specific status codes can be found by searching for “rest api tutorial” and “HTTP status codes.” HTTP status codes are shown in HTTP client/server traffic and are useful for cybersecurity investigations.

https://snipboard.io/cOyJp3.jpg

87
Q

HTTP/2 HTTP/2 is a major revision to the HTTP protocol specification.

The purpose of HTTP/2 is to improve HTTP performance by addressing latency issues that existed in the HTTP 1.1 version of the protocol. HTTP/2 uses the same header format as HTTP 1.1 and uses the same status codes.

However, there are many important features to HTTP/2 that a cybersecurity analyst must be aware of.

https://snipboard.io/w2Sj0C.jpg

– Multiplexing

– Server PUSH

– A binary protocol

– Header compression

A

Multiplexing :

HTTP servers and clients carry on conversations called streams for each transaction. For example, a client will connect to an HTTP server, request resources from that server, and receive the resources it requested.

With HTTP 1.1, only one stream was supported at time.

With HTTP/2 a client and server can have multiple streams running between them at the same time over the same TCP connection, as shown in the figure. This provides greatly enhanced efficiency to the protocol.

88
Q

HTTP/2 HTTP/2 is a major revision to the HTTP protocol specification.

The purpose of HTTP/2 is to improve HTTP performance by addressing latency issues that existed in the HTTP 1.1 version of the protocol. HTTP/2 uses the same header format as HTTP 1.1 and uses the same status codes.

However, there are many important features to HTTP/2 that a cybersecurity analyst must be aware of.

https://snipboard.io/w2Sj0C.jpg

– Multiplexing

– Server PUSH

– A binary protocol

– Header compression

A

Server PUSH :

HTTP servers are able to push content that has not yet been requested to the client.

The server anticipates the content that the client is likely to request. The client caches this content for future use.

89
Q

HTTP/2 HTTP/2 is a major revision to the HTTP protocol specification.

The purpose of HTTP/2 is to improve HTTP performance by addressing latency issues that existed in the HTTP 1.1 version of the protocol. HTTP/2 uses the same header format as HTTP 1.1 and uses the same status codes.

However, there are many important features to HTTP/2 that a cybersecurity analyst must be aware of.

https://snipboard.io/w2Sj0C.jpg

– Multiplexing

– Server PUSH

– A binary protocol

– Header compression

A

A binary protocol :

In HTTP 1.1, commands, such as requests from client to server, are made in text format.

HTTP/2 has shifted to using binary commands.

This overcomes some cumbersome issues with the former version, lowers request and response overhead, and reduces latency and improves throughput.

90
Q

HTTP/2 HTTP/2 is a major revision to the HTTP protocol specification.

The purpose of HTTP/2 is to improve HTTP performance by addressing latency issues that existed in the HTTP 1.1 version of the protocol. HTTP/2 uses the same header format as HTTP 1.1 and uses the same status codes.

However, there are many important features to HTTP/2 that a cybersecurity analyst must be aware of.

https://snipboard.io/w2Sj0C.jpg

– Multiplexing

– Server PUSH

– A binary protocol

– Header compression

A

Header compression :

The HTTP request and response headers are compressed to further reduce the amount of bandwidth required by HTTP/2 streams.

91
Q

Securing HTTP – HTTPS For secure communication across the internet, the HTTP Secure (HTTPS) protocol is used. HTTPS uses TCP port 443.

HTTPS uses authentication and encryption to secure data as it travels between the client and server. HTTPS uses the same client request-server response process as HTTP, but the data stream is encrypted with Secure Socket Layer (SSL), or Transport Layer Security (TLS), before being transported across the network.

Although SSL is the predecessor to TLS, both protocols are often referred to as SSL.

A

HTTPS/2 is specified to use HTTPS over TLS with the Application-Layer Protocol Negotiation (ALPN) extension for TLS 1.2 or newer.

The HTTP/2 standard does not specify encryption, however all major client software applications require it.

Therefore, it can be assumed that HTTP/2 is in fact encrypted. A great deal of confidential information, such as passwords, credit card information, and medical information are transmitted over the internet using HTTPS.