Network Analysis Tools Flashcards

(60 cards)

1
Q

purpose is to track usage, identify unusual traffic, and view the traffic in detail;
analyzes network traffic to understand a normal network baseline
decode streams of bits flowing across a network & shows them in a structured format

A

Protocol analysis / protocol analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Analyzes streams of protocol data and displays bits in a structured format

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

**5 distinct functions of a protocol analyzer/protocol analysis;
5 STEPS

A

1) Data capture - locally (requires an interface & NIC) or remotely(remote analyzers, capture agents, remote control)
2) Network Monitoring
3) Data display
4) Notification Logging
5) Packet Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a mechanism that collects information about a network;
network info that gets monitored and comes from various sensors;
where you’re collecting from, such as a NIC card or ethernet

A

sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

network traffic must pass thru this sensor, enabling it to have the ability to stop attacks by blocking network traffic

A

in-line sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

monitors a copy of the actual traffic;
deployed to monitor the DMZ

A

passive sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a device that monitors and collects data about network activity, which can then be used for analysis and decision-making;
Sensors should be placed at the right place within the network

A

sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After your network is installed, you should turn on _________, so that your NIC can also learn about packets that are not destined/routed to your machine;
___________ operate in promiscuous mode, which means they are able to view all traffic on the local media. This characteristic allows them to provide a wide range of statistics about what is happening at each layer of the OSI model

A

promiscuous mode;
analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is used to capture data outside of your network?

A

analyzers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

capture traffic on segments that you cannot physically access

A

remote analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

software drivers running on a computer that allow you to capture packets to and from the LAN interfaces

A

capture agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

analyzers running on a machine being controlled by software that allow you to remote into a computer

A

Remote Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

**what the normal performance standards are for a network so you know what it is capable of;
help you determine when something on the network is abnormal & if it can handle policies;
should be captured at normal peak running hours

A

network baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What mode do analyzers operate in to view all traffic on the local media?

A

Promiscuous mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

two methods of capturing data

A

locally and remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

**Approach that focuses on the needs and goals of the org;
starts at the top, and works its way in design down;
1. analyze requirements
2. design topology from a logical standpoint
3. Physical design from a physical standpoint
4. test designs, run baselines, and determine improvements

A

top-to-bottom monitoring (starts with the Application layer flowing down to the Physical Layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

building a network and determining if the network infrastructure is there;
making sure you have enough servers, computers, etc.

A

top-to-bottom networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

gathering log data to track resource use, bugs, availability, load balancing issues, monitoring, and more;
provide alerts to live anomaly events;
Through _________, it provides a way of seeing which events form a casual chain that led to alerts across multiple services;
helps network run smoothly

A

app monitoring;
distributed tracing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

All of the following are parts of Application monitoring:
1) ______: evaluates the users experience; are tasks running as expected?
2) ______: traffic rates; how much info is being requested/sent?
3) ______: storage issues, excessive loads, hardware issues, etc
4) ______: is one resource being used too much that can lead to bottleneck issues?
5) ______: memory & storage capabilities
6) ______: is data being stored properly so that it is accessible?
7) ______: distributing data evenly across resources

A

*1) User experience
*2) App Traffic
*3) Physical & Virtual servers
4) App dependencies
5) Storage & resource capacity
6) Caching Layer Metrics
7) Load Balancing metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the process of analyzing a packet;
it is done to gain insight on the devices and users sending data across a network;
3 tools used are Wireshark, OS Fingerprinting, & tcpdump(BPF filters);
1) plan 2) deploy 3) capture 4) analyze 5) refine
how is packet analysis conducted?

A

packet analysis;
packet capture (packet capture programs ‘capture’ the packets that go across a network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wireshark is the most popular packet analysis tool that allows you to monitor your network in real time, at a small level. it’s 3 useful functions are:

A

1) Protocol Hierarchy
2) Conversations
3) Endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

organizes protocols into layers based on the rules of communication

A

protocol hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

**two people involved in the conversation;
how many packets did i send to you, how many packets did i receive from you;
who was the most talkative?

A

conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

**machine with a MAC address that is the source of something

A

endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
a file that contains packet captures
PCAP
26
Header: info about the packet such as, source & destination IP addresses & protocol type Payload: actual data being transmitted Trailer: checksums for data integrity
packet
27
search for specific patterns or keywords within packet; filters by either 1, 2, or 4 bytes
BPF
28
filters packets from kernel to userspace; 5 headers you can filter with
Berkeley Packet Filters (BPF’s); 1) Ether 2) IP, IP6 3) ICMP 4) TCP 5) UDP
29
What protocols can be used with BPF filters?
all but Application layer 7
30
BPF's are only in ___, not Wireshark
tcpdump
31
An Ethernet frame of Layer 2 is made of 3 sections
1) MAC Header - Destination MAC Add, Source MAC Add, Ether Type; 14 bytes 2) Data - Payload; 46 bytes 3) CRC Checksum; 4 bytes
32
analyzes data packets that originate from a network to later be used in attacks; Determines the OS of devices; by knowing what OS devices are using, hackers can better determine known vulnerabilities to a system; NMAP is most popular tool for this
OS Fingerprinting
33
attackers will send the victim a packet and wait for them to analyze the contents of a TCP packet
Active OS Fingerprinting
34
attackers acts more as a sniffer/sensor that makes no actions against the network; better, but takes longer
Passive OS fingerprinting
35
**command that writes to a file called capture_file using -w switch
tcpdump port 80 -w capture_file
36
**command to read files using a switch
tcpdump -r capture_file
37
sudo p0f -r ip_packet.pcap 'host 192.168.75.138' Program -read “filename” ‘what ip we’re looking at to fingerprint’
OS Fingerprinting example
38
To best perform OS Fingerprinting, look at _____ & _____ in the IP header of the first packet in a TCP session
TCP window size & Time to Live (TTL)
39
What is the TCPDump syntax to filter by source IP 10.10.10.10?
tcpdump src 10.10.10.10
40
window into network history over a period, and can retrieve, examine, archive, and analyze packets user is not at all involved with the debug of a network issue; used to debug incidents even further
Continuous packet capture
41
Tells you what the next layer is
ethertype
42
A way to continuously monitor a network other than Wireshark?
dumpcap
43
Where in Wireshark would you set up a continuous traffic?
Capture>Options>Output
44
protocol analyzer that analyzes data from the wire or a packet capture and allows you to view application layer headers
Wireshark
45
command necessary to run to get results for new pcap file
md5sum
46
command that determines to OS of a device
sudo p0f -r ip_packet.pcap 'host 192.168.75.138'
47
command to write BPF filters with tcpdump
tcpdump -r ip_packets.pcap 'ip[8]>64' |wc -l (TTL of 64) tcpdump -r ip_packets.pcap 'ip[8]>=64' |wc -l (TTL of 64 or greater)
48
arp.opcode==1
request
49
arp.opcode==2
reply
50
Capture everything on interface eth0
tcpdump -i eth0
51
Capture all icmp traffic Capture all udp traffic Capture all ip traffic
tcpdump icmp tcpdump udp tcpdump ip
52
Capture everything from a specific host
tcpdump host 1.1.1.1
53
Capture traffic from a specific host Capture traffic going to a specific host
tcpdump src 1.1.1.1 tcpdump dst 1.1.1.1
54
Capture everything to a specific port Capture everything from a specific port
tcpdump port 3829 tcpdump src port 3829
55
what command do we use with tcpdump to determine how many packets are in a pcap file?
tcpdump -r ip_packet.pcap | wc -l
56
tcpdump command to write to, or capture a file tcpdump command to write to, or capture a file that has a port number of 80
tcpdump -w ip_packet.pcap tcpdump port 80 -w ip_packet.pcap
57
tcpdump command to read a file
tcpdump -r ip_packet.pcap
58
OS Fingerprinting command (analyzes data packets originating from a network
sudo p0f -r ip_packet.pcap 'host 192.168.17.7'
59
tcpdump for continuous capture of traffic
tcpdump -s0 -W 20 -C 10 -w /tmp/capfile
60
dumpcap command that outputs the interfaces on your system
dumpcap -D