Networking Equipment Flashcards

1
Q

7 commonly used protocols for remote management of devices?

A
  • Telnet
  • Web based protocols (HTTP, HTTPS)
  • SSH
  • SNMP
  • TFTP
  • Cisco Reverse Telnet
  • NTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Management Protocols - Telnet?

A
  • Not encrypted, all plain text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Management Protocols - Web Based Protocols

A

HTTP (HyperText Transfer Protocol)
- Not encrypted, all plain text

HTTPS
- Secure, TLS 1.3 is latest version - 1.2 vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management Protocols - Secure Shell

A
  • Secure, depends on encryption
  • can log in with uname and password or without if have the private key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Management Protocols - SNMP (Simple Network Management Protocol)

A
  • Used by Network Management Systems (NMS) to monitor network infrastructure
  • SNMPv1 is unencrypted
    SNMPv3 (latest) is encrypted

SNMP could leak credentials and other data.
If there is write access - remote code execution is possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Management Protocols - TFTP (Trivial File Transfer Protocol)

A
  • Simple to implement
  • No authentication or access control mechanisms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Management Protocols - Cisco Reverse Telnet

A
  • Allows the Telnet server to write to a computer terminal or device

Telnet - Network to network
Reverse telnet - network to serial (hardware communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Management Protocols - NTP (Network Time Protocol)

A
  • Used to synchronise clock between computer systems in a network (UDP port 123)
  • Could leak system info, host names of network, etc.

nmap -sU -sV –script “ntp* and (discovery or vuln) and not (dos or brute)” -p 123 <target_ip></target_ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What would you use for local network traffic analysis?

A

Wireshark

Raw data can be seen at each different layer:
Frame -> Ethernet -> IPv4 -> Http

This shows hexdumps of data.
Files can be extracted from PCAP files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to extract HTTP files?

A
  1. Open the .pcap file
  2. File -> Export Objects -> HTTP…
  3. Choose what you want to save
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to extract FTP files?

A
  1. Filter for FTP-DATA packets
  2. Right-click -> Follow -> TCP Stream
  3. Select RAW as the output type
  4. Save the file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ARP?
Description and Security issues?

A

Address resolution Protocol (ARP)

Discovers MAC addresses in the network.
No authentication

ARP Spoofing - pretends to be another computer for man in the middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DHCP?
Description and Security issues?

A

Dynamic Host Configuration Protocol (DHCP)

Automatically assigns IP addresses to new devices in the network.
Commonly found in routers.

No Authentication required, can be used for man-in-the-middle attacks or unauthorised access to resources or DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is CDP?
Description and Security issues?

A

Cisco Discovery Protocol (CDP)

Used to share info about other directly connected Cisco equipment, such as OS version and IP address.

Information leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is HSRP?
Description and Security issues?

A

Hot Standby Router Protocol (HSRP)

Provides redundancy for routers through virtual MAC addresses etc.

DoS, take over active router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is VRRP?
Description and Security issues?

A

Virtual Router Redundancy Protocol (RVVP)

Provides redundancy for routers through virtual MAC addresses, but incomplete.

DoS, take over active router

17
Q

What is VTP?
Description and Security issues?

A

VLAN Trunking Protocol (VTP)

Cisco Protocol
Sends VLAN info to whole of LAN.

VTP-bomb
Network uses config with highest config revision number.
If a new switch is added to a network with correct VTP domain name and password, but the switch has a higher revision number, the whole network will use the VTP info from the new switch, which will overwrite the current config.

18
Q

What is STP?
Description and Security issues?

A

Spanning Tree Protocol (STP)

Helps network traffic flow with less congestion, saving resources

No security issues

19
Q

What is TACACS+ ?
Description and security issues?

A

Terminal Access Controller Access Control System Plus

Provides authentication, authorisation and accounting (AAA) services to the network.

No security issues.

20
Q

Enumeration and fingerprinting of
IPSec 500/UDP

A

nmap -sU -p 500 <target_ip>
ike-scan -M <target_ip></target_ip></target_ip>

21
Q

Enumeration and fingerprinting of
VoIP (Voice over IP)

A

5060 UDP/TCP unencrypted
5061 UDP/TCP encrypted

Similar to HTTP, request-response model, with use-agent and URIs

22
Q

7 Common request types within SIP

A
  • INVITE - invites an account to join the call
  • ACK - confirmation regarding the invite of joining the call
  • CANCEL - cancelling a queued call
  • REGISTER - registering the user against the SIP server
  • OPTIONS - shows the options the caller has
  • BYE - ends the call between both sides
  • REFER - shows that the receiver needs to communicate through a 3rd party by the info attached to the request
23
Q

6 SIP requests/responses

A

1xx - informational
2xx - success
3xx - redirection
4xx - failed requests
5xx - web server cannot complete request
6xx - global errors

24
Q

SIP interaction structure (6 steps)

A
  1. Sender initiates an INVITE request
  2. Receiver sends back a 100 (trying) response
  3. Sender starts ringing by sending a 180 (ringing) response
  4. Receiver picks up the phone and a 200 success response is sent (OK)
  5. ACK is sent by the initiator
  6. Call started using RTP
  7. BYE request sent to end the call
25
Q

Wired Equivalent Privacy (WEP)

A

Deprecated and easily cracked and passwords can be extracted once initialisation vector (IV) are captured.

Standard 64-bit WEP uses a 40 bit key (also known as WEP-40) which is concatenated with a 24-bit IV to form the RC4 key.

26
Q

Temporal Key Integrity Protocol (TKIP)

A

Replacement for WEP
Early versions not recommended for use
Was rebranded as WPA

TKIP implements a key mixing function that combines the secret root key with the initialisation vector before passing it to the RC4 cipher initialisation

27
Q

Wi-Fi Protected Access WPA/WPA2

A

If wi-fi password is weak - it’s easy to crack and find the passwords

WPA - 2003 - interim measure for WEP
WPA2 - 2004 - more secure version
WPA3 - 2018 - after security issues raised

Keys are pre-shared

28
Q

Extensible Authentication Protocols (EAP/LEAP/PEAP)
What is EAP?

A

EAP is an authentication framework used in LANs and dial-up connections.
Used mainly in wireless communication for authentication among clients and wireless LAN.

As a P2P (point-to-point) LAN data communication framework - EAP provides range of authentication mechanisms, such as supporting one-time passwords (OTPs), smart cards, public key encryption authentication and digital certificateds

29
Q

EAP Flow

A
  • Using a transceiver, the client requests a wireless connection
  • The transceiver gets client requests a wireless connection
  • The authenticator then requests client ID from the transceiver and when it’s received then sends a message to the client requesting client ID
  • When verified, the client ID is sent to the server
30
Q

LEAP (Lightweight Extensible Authentication Protocol)

A

Authentication framework used by WPA, WPA2 and WPA3.
Built by Cisco - but no longer recommended for use by Cisco

31
Q

PEAP (Protected Extensible Authentication Protocol)

A

Authentication framework used by WPA, WPA2 and WPA3
Similar to EAP-TLS, which is EAP over TLS config for security.
Recommended for use.
Jointly developed by Cisco, Microsoft and RSA Security