Securing Networks Flashcards
Privilege Escalation
§ Occurs when a user is able to gain the rights of another user or administrator
§ Vertical Privilege Escalation
§ Horizontal Privilege Escalation
Backdoor
A way of bypassing normal authentication in a system
keys to having network security
An IPS, proper firewall configs, network segmentation, and firmware updates are the keys to having network security
Electromagnetic Interference (EMI)
§ A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic conduction
§ EMI can be caused by TVs, microwaves, cordless phones, motors, and other devices
§ Shielding the cables (STP) or the source can minimize EMI
Radio Frequency Interference (RFI)
§ A disturbance that can affect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers
§ RFI causes more problems for wireless networks
Crosstalk
§ Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire
§ UTP is commonly used more often than STP
Data Emanation
§ The electromagnetic field generated by a network cable or device when transmitting
§ A Faraday cage can be installed to prevent a room from emanating
§ Split the wires of a twisted-pair connection
Protected Distribution System (PDS)
Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats
Service Set Identifier (SSID)
§ Uniquely identifies the network and is the name of the WAP used by the
clients
§ Disable the SSID broadcast in the exam
Rogue Access Point
An unauthorized WAP or Wireless Router that allows access to the secure
network
Evil Twin
A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one
Wireless Encryption Types
Pre-Shared Key (PSK)
Wired Equivalent Privacy (WEP)
WiFi Protected Access (WPA)
WiFi Protected Access version 2 (WPA2)
Pre-Shared Key
Same encryption key is used by the access point and the client
Wired Equivalent Privacy (WEP)
§ Original 802.11 wireless security standard that claims to be as secure as a wired network
§ WEP’s weakness is its 24-bit IV (Initialization Vector)
IV (Initialization Vector)
WiFi Protected Access (WPA)
Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption
TKIP, RC4
WiFi Protected Access version 2 (WPA2)
§ 802.11i standard to provide better wireless security featuring AES with a
128-bit key, CCMP, and integrity checking
§ WPA2 is considered the best wireless encryption available
CCMP and AES
2.4 GHz signal
Wireless B, G, and N use a 2.4 GHz signal
5.0 GHz signal
Wireless A, N, and AC use a 5.0 GHz signal
Jamming
§ Intentional radio frequency interference targeting your wireless network to cause a denial of service condition
§ Wireless site survey software and spectrum analyzers can help identify jamming and interference
AP Isolation
Creates network segment for each client when it connects to prevent them from communicating with other clients on the network
Wireless Attacks
War Driving War Chalking IV Attack WiFi Disassociation Attack Brute Force Attack
IV Attack
Occurs when an attacker observes the operation of a cipher being used with several different keys and finds a mathematical relationship between those keys to determine the clear text data
This happened with WEP and makes it easy to crack
WiFi Disassociation Attack
§ Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects
§ Used as part of an attack on WPA/WPA2
Brute Force Attack
Occurs when an attacker continually guesses a password until the correct
one is found