Post Class Review Flashcards
(218 cards)
What are the countermeasures against MAC Flood and MAC Spoofing attacks?
Port Security Binding IP Source Guard DAI (Dynamic Arp Inspection) ARP Watch ARP Wall
Describe DHCP Starvation attack
Exhausting the pool of IP addresses on a DHCP server
DHCP Starvation attack countermeasure
Port Security
Describe Rogue DHCP Attack
Unauthorized DHCP server
Rogue DHCP Attack countermeasure
DHCP snooping
How do you evade IDS Signature Detection
Encryption IP Fragmentation (IP Fragment Scanning)
How do you evade IDS Anomaly Detection?
Session splicing
Nmap setting for session splicing
Timing template / timing channel
T0-slowest
T5-fastest
Application proxies provide privacy (security through obscurity) and:
content filtering (data+commands)
How to defend against Spoofing, ARP poisoining?
ARPWALL
ARPWatch
Private VLANS
Using Static ARP entries for servers&routers
Full Open Scan
–>
–>
nmap -sT
TCP Connect scan completes the 3 way handshake
Half open scan
–>
nmap -sS
Stealth scan, syn scan
Scan spoof IP, bypass firewall rules (anti spoof)
XMas scan
nmap -sX
FIN, URG, PSH
Shared traits of XMAS, Null, FIN scans
No response = port open
RST = port closed
always RST = Windows
nmap switch:
TCP Connect/Full Open Scan
nmap -sT
Completes 3 way handshake
nmap switch:
Stealth Scan/Half Open Scan/Syn scan
nmap -sS
Can spoof IP, bypasses firewall rules (anti spoof)
nmap switch:
XMas scan
nmap -sX
FIN, URG, PSH
nmap switch:
FIN scan
-sF
nmap switch:
Null scan
no flags -sN
nmap switch:
Idle scan
nmap -sI
You need a zombie to determine if port is open/closed
Idle scan
IPID + 2 = port open
IPID + 1 = port closed
zombie must be idle
Nmap switch:
OS
nmap -O
Nmap switch:
output
nmap -o
Nmap syntax:
Network scan of the entire subnet 192.168.10.0
nmap -sn 192.168.10.0/24