Module 24 Technologies and Protocols Flashcards

1
Q

What port does Syslog servers utilize?

A

UDP 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are NTP and Syslog important?

A

Syslog is the standard for logging user event messages. Time is just fucking important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is attacking a syslog server important, from the perspective of an attacker?

A

Some exploits involve data exfiltration, which takes time. Hackers may attempt to block or destroy log data - in order for Hackers to hide the fact, that exfiltrating is occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port does NTP use?

A

UDP 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How about DNS?

A

DNS is now used by malware, some varieties of malware use DNS to communicate with command-and-control (CnC) servers and to exfiltrate data in traffic disguised as DNS queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is HTTP a risk?

A

All the information carried in HTTP is transmitted in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an iFrame (inline injection) attack

A

Threat actor compromises a web server and plants malicious code which creates an iFrame on a visited webpage. When the iFrame loads, malware is downloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What prevents an iFrame?

A

Cisco Web Reputation filtering can detect when a website attempts to send content from an untrusted website to the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does HTTPS use that is helpful?

A

After application layer (SSL/TLS) before transport, as the header trailer for the PDU is built

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What problems does HTTPS present?

A

Because it is encrypted with SSL - not all devices included decryption and inspection. Privacy issues in opening the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the HTTPS transaction

A

Client request secure page. Web server sends its public key with its certificate. Client ensures the certificate is up to date, issues by a trusted party and creates a symmetric key which goes to the server. Server decrypts the symmetric key with its private key. Web server THEN uses the symmetric key to encrypt the page and sends it to the client. BOOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Are email protocols dangerous?

A

SMTP, POP3 and IMAP can be used to spread malware, exfiltrate data or provide channels to CnC servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does IMAP and POP3 spread malware?

A

They are used to download email messages from a mail server to a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can ACL’s prevent?

A

ICMP Abuse, this is interesting, you allow responses (ICMP unreachable, ICMP replies but deny other responses from ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the downside with ACLs?

A

Attackers can determine which IP addresses, protocols and ports are allowed by the ACLs, and spoof a source IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does NAT and PAT complicate matters?

A

If PAT is in effect, it may be difficult to log the specific inside device that is requesting or receiving traffic.

17
Q

What is inside local, inside global, outside local and outside global

A

Inside local (client) mapped to inside global.

18
Q

What is Peer-to-Peer networking?

A

hosts can operate in both client and server roles

19
Q

What are the three types of P2P applications

A

file sharing, processor sharing and instant messaging

20
Q

Load balancing can be an issue

A

I guess