Network Security Flashcards

(33 cards)

1
Q

Network attacks covered

A

Routing (BGP), Naming (DNS Reflection) [ddos, phishing]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is internet vulenarable

A

Designed for simplicy, on by default, Host are insecure, Attacks can look like normal traffic, federated design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of attacks are packet switch networks vulnerable to?

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of security?

A

Availability, confidentiality, Authenticity, Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of confidentiality attack

A

Man-in-the-middle or Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can eavesdropping be cared out in practice?

A

Someone on the same LAN could put their NIC into promiscuous mode and run a packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can eavesdropping be used to execute an Authenticity attack?

A

Then man in the middle can modify some of the content that was sniffed and then reinject that into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the negative impacts of attacks against the components of security

A

Theft of confidential info, Unauthorized Use, False Info, Disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three types of control plane authentication

A

Session (point-to-point b/w routers), Path (protects AS path), Origin ensures that as advertising prefix is the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A route hijack is an attack on which type of authentecation

A

Origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do routing attacks happen?

A

Config Error, Routers compromised, unscrupulous ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most common routing attack?

A

Hijack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of routing attacks

A

Config / Management s/w, Tamper w/software, Tamper w/routing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does DNS masquerading work?

A

An AS advertises the ip to a known DNS server using BGP. This diverts traffic from the real nameserver. The attackers can then send different destination during name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITM

A

Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AS poisoning

A

Allows an AS to become MITM. To get a route back to the origin, the ASs along the path back to the origin are prepended.

17
Q

How does prepending the addresses cause the AS along the path to keep the original path?

A

They sec (think) they already have the route and do not want to cause a loop

18
Q

How can MITM AS “hide”

A

Traceroute shows messages from hops when the TTL reaches zero. The routers in the AS never decrement the TTL

19
Q

Two types of session authentication

A
  1. Using TCP’s md5 token m = message; MD5(m, k) shared secret. 2. TTL hack; the two ASs agree to use a TTL of 256. Aythign < 256 is dropped
20
Q

BGPSEC

A

Secure border gateway protocol

21
Q

Parts of BGPSEC

A

Origin Attestation: Certification binding prefix to owner signed by trusted party. Path attestation: signatures along the path

22
Q

How does Path attestation avoid replay attacks

A

They include the origin AS id before encrypting

23
Q

types of attacks path attestation can protect agains

A

hijacks, shortening, modification

24
Q

Attacks path attestations cannot protect against.

A

Suppression, Replay (some types), Cannot guarantee the traffic moves along the dedicated path.

25
Why is dns vulnerable
Resolvers trust response, Responses can contain info unrelated to the query. No authentication
26
SOA
Start of Authority
27
How does DNS cache poisoning work
Attacker can send multiple A records with different IDs to the recursive resolver.
28
What is the issue with IDs?
2^16 or 16 bit can easily match due to the birthday paradox
29
Kaminsky Attack
Generate query for 1.google.com, 2.google.com, etc. While sending A records and stuffing in a bogus NS record
30
Defenses to DNS cache poisoning
1. ID randomization, 2. Source port randomization, 3 "0x20 enconding
31
What is 0x20 encoding?
The resolver and server agree on which characters in the domain will be upper or lower case
32
DNS amplification attack?
attackers sends a request to the dns resolver and sets the victim as the source
33
Why are they called amplification attacks?
The response from the dns resolver can be many times larger than the request