4.5 Secure Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Unencrypted Network Data

Many common protocols like Telnet, FTP, SMTP, and IMAP transmit data in plaintext, making it vulnerable.

  • Network traffic—whether wired or wireless—should be encrypted to protect sensitive data.

  • Capturing packets on a network can reveal which protocols are unencrypted.

  • Unencrypted traffic will display readable data inside the packet.

2
New cards

Wall Of Sheep

If you use one of these insecure protocols and you happen to attend the DEFCON conference…

  • List of everyone at the conference who is using insecure protocols.

  • You could see that people were running IMAP, HTTP, POP3, and other insecure protocols.

3
New cards

Protocol Selection

Your goal should always be to use a secure protocol that uses encryption to protect all of this data sent across the network.

  • And if you’re not able to use one of these secure protocols, you would be better off not using that application at all.

Application

Insecure Protocol

Secure Protocol

Remote Console

Telnet

SSH

Web Browsing 

HTTP

HTTPS

Email Client Access

IMAP

IMAPS

File Transfer

FTP

SFTP

4
New cards

Port Selection

Some protocols use different port numbers to distinguish between secure and insecure versions.

  • For instance, HTTP typically uses port 80 (unencrypted), while HTTPS uses port 443 (encrypted).

  • However, port numbers alone don't guarantee encryption:

  • Verify the server’s settings and perform a packet capture to confirm whether the traffic is actually encrypted.

5
New cards

Packet Capture Example

In this example, the destination port for this website traffic is port 80, which by default would be HTTP.

  • And if we look at the packet capture itself, we can see that the hypertext transfer protocol itself is all in the clear and easily readable in the packet capture.

6
New cards

Transport Method

Ensure traffic is encrypted regardless of the application, you can use methods like WPA3 on wireless networks or VPNs.

  • WPA3 encrypts all wireless data at the access point level.

  • A VPN creates an encrypted tunnel between your device and a VPN concentrator, protecting all data in transit until it’s decrypted at the endpoint.

7
New cards

VPN Tunnel

Although this does provide an encrypted tunnel where all traffic sent over this link will be encrypted, it may require the installation of additional software on your device.

  • And you may need to install your own VPN concentrator or purchase access to a third-party VPN service.