Certified Ethical Hacker (CEHv13) Module 12 Evading IDS, Firewalls, and Honeypots

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

87 Terms

1
New cards

Intrusion Detection System (IDS)

A security software or hardware device used to monitor, detect, and protect networks or systems from malicious activities; it alerts the concerned security personnel immediately upon detecting intrusions.

2
New cards

Intrusion Prevention System (IPS)

Not only detects intrusions in the network but also prevents them

3
New cards

IPS Classifications

- Host Based

- Network Based

4
New cards

Methods and IDS Uses to Identify an Intrusion

- Signature Recognition

- Anomaly Detection

- Protocol Anomaly Detection

5
New cards

Signature Recognition

Involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision

6
New cards

Anomaly

An anomaly is detected when an event occurs outside the tolerance threshold of normal traffic

7
New cards

Anomaly Detection

Detects intrusions based on the fixed behavioral characteristics of the users and components in a computer system

8
New cards

Protocol Anomaly Detection

Involves analyzing the network traffic to detect deviations from established protocol standards or expected behavior patterns

9
New cards

Protocol Anomaly Detection Components

- Baseline Behavior

- Anomaly Identification

- Detection Rules

10
New cards

Protocol Anomaly Detection Components Baseline Behavior

This involves learning the expected structure, sequence, timing, and content of network traffic

11
New cards

Protocol Anomaly Detection Components Detection Rules

These rules guide the IDS in detecting the deviations

12
New cards

General Indicators of Intrusions

- File Intrusions

- Network Intrusions

- System Intrusions

13
New cards

General Indicators of File Intrusions

- New/unknown files

- Changes to file permissions

- Unexplained changes in file size, ownership, and access permissions

- The presence of rogue suid and sgid files on your Linux system that do not match your master list of suid and sgid file

- Unfamiliar file names in directories, including executable files with strange extensions and double extensions

- Unexplained disk space usage or sudden depletion of available storage

- Missing Files

- Abnormal system behavior, such as slow performance or frequent file crashes

- If an attacker gains access to a file system, it may result in a reduction in the available bandwidth owing to resource consumption

14
New cards

General Indicators of Network Intrusions

A sudden increase in bandwidth consumption

- Repeated probes of the available services on your machines

- Connection requests from IPs other than those in the network range, which imply that an unauthenticated user (intruder) is attempting to connect to the network

- Repeated login attempts from remote hosts

- A sudden influx of log data, which could indicate attempts at DoS attacks, bandwidth consumption, and DDoS attacks

- Unexpected changes in network configurations or firewall rules

- Unexpected system crashes or performance degradation due to increased network load

- Unusual outbound connections or traffic to malicious domains

15
New cards

General Indicators of System Intrusions

- Sudden changes in logs such as short or incomplete logs

- Unusually slow system performance

- Missing logs or logs with incorrect permissions or ownership

- Modifications to system software and configuration files

- Unusual graphic displays or text messages

- Gaps in system accounting

- System crashes or reboots

- Unfamiliar processes

- Alerts from intrusion detection or antivirus software

- Installation of unauthorized software or applications on the system

- Presence of artifacts such as shell history files, temporary files, or remnants of attacker tools

16
New cards

Network-based intrusion detection systems (NIDS)

Check every packet entering the network for the presence of anomalies and incorrect data

17
New cards

Host-based intrusion detection systems (HIDS)

Can be installed on any system ranging from a desktop PC to a server to analyze each system's behavior.

18
New cards

True Positive

Occurs when an event triggers an alarm and causes the IDS to react as if a real attack is in progress

19
New cards

False Positive

Occurs if an event triggers an alarm when no actual attack is in progress

20
New cards

False Negative

Occurs when an IDS fails to react to an actual attack event.

21
New cards

True Negative

Occurs when an IDS identifies an activity as acceptable behavior and the activity is acceptable

22
New cards

Firewall

A software-or hardware-based system located at the network gateway that protects the resources of a private network from unauthorized access by users on other networks

23
New cards

Firewall Architecture Elements

- Bastion Host

- Screened Subnet

- Multi-Homed Firewall

24
New cards

Bastion Host

Designed for defending the network against attacks. It acts as a mediator between inside and outside networks.

25
New cards

Screened Subnet

A protected network created with a two-or three-homed firewall behind a screening firewall

26
New cards

Multi Homed Firewall

A node with multiple NICs that connects to two or more networks. It connects each interface to separate network segments logically and physically.

27
New cards

Demilitarized Zone (DMZ)

An area that hosts computer(s) or a small sub-network placed as a neutral zone between a particular company's internal network and an untrusted external network to prevent outsider access to a company's private data

28
New cards

Network Based Firewall

A dedicated firewall device placed on the perimeter of the network

29
New cards

Host Based Firewall

Sits between a regular application and the networking components of the OS

30
New cards

Types of Firewalls

- By Configuration: Host Based, Network Based

- By Working Mechanism: Packet filtering, circuit level gateways, application level firewall, stateful multilayer inspection, application proxies, network address translation, virtual private network

31
New cards

Packet Filtering Firewall

Each packet is compared with a set of criteria before it is forwarded

32
New cards

Circuit Level Gateway Firewall

Works at the session layer of the OSI model or transport layer of TCP/IP. It forwards data between networks without verification and blocks incoming packets from the host but allows the traffic to pass through itself.

33
New cards

Application Level Firewall

Application-level gateways (proxies) can filter packets at the application layer of the OSI model (or the application layer of TCP/IP)

34
New cards

Active Application Level Firewall

Examine all incoming requests against known vulnerabilities and the requests that are deemed genuine are allowed to pass through them

35
New cards

Application Level Firewall Modes

- Active

- Passive

36
New cards

Passive Application Level Firewall

Check all incoming requests against known vulnerabilities, but they do not actively reject or deny those requests if a potential attack is discovered

37
New cards

Stateful Multilayer Inspection Firewall

Combine the aspects of the three packet filtering, circuit-level gateways, and application-level firewalls. They filter packets at the network layer of the OSI model (or the internet layer of the TCP/IP model) to determine whether session packets are legitimate, and they evaluate the contents of the packets at the application layer.

38
New cards

Application Proxy

Works as a proxy server and filters connections for specific services

39
New cards

Network Address Translation (NAT)

Separates IP addresses into two sets and enables the LAN to use these addresses for internal and external traffic

40
New cards

Virtual Private Network (VPN) Firewall

A network that provides secure access to the private network through the Internet

41
New cards

Next Generation Firewall (NGFW)

Incorporate advanced features such as deep packet inspection, application awareness, control, integrated intrusion prevention systems (IPS), and cloud-based threat intelligence by examining the network traffic at various layers of the OSI model

42
New cards

Firewalking

A method of collecting information about remote networks behind firewalls.

43
New cards

Banners

Service announcements provided by services in response to connection requests, and they often carry vendor version information

44
New cards

Banner Grabbing

A method of fingerprinting that helps in detecting the vendor of a firewall and the firmware version

45
New cards

IP Address Spoofing

A technique used by attackers to evade firewalls and IDS by masquerading as trusted sources. This method involves altering the source IP address in the packet headers to conceal the attacker's true identity and bypass security measures.

46
New cards

Source Routing

The sender of the packet designates the route via less-secured, less-monitored, or alternative segments of the network where IDS/firewall solutions are partially or not entirely installed

47
New cards

HTML Smuggling

HTML smuggling is a type of web attack in which an attacker injects malicious code into a HTML script to compromise a web page

48
New cards

Background Intelligent Transfer Service (BITS)

A service used to distribute automatic Windows updates to its global users

49
New cards

Unicode

A character coding system that supports encoding, processing, and displaying of written texts for universal languages to maintain consistency in a computer representation

50
New cards

Time to Live (TTL)

Each IP packet has a field called Time to Live (TTL), which indicates how many hops the packet can take before a network node discards it

51
New cards

Polymorphic Shellcode

Polymorphic shellcode attacks include multiple signatures, making it difficult to detect the signature. Attackers encode the payload using some technique and then place a decoder before the payload. As a result, the shellcode is completely rewritten each time it is sent, thereby evading detection.

52
New cards

Domain generation algorithm (DGA)

A software program that attackers can employ to generate numerous new domain names and execute malware code

53
New cards

VLAN Hopping

Used to gain access to a network through Dynamic Trunking Protocol (DTP). To set up a trunk with the switch, the DTP packets are forwarded by attackers by setting the switch mode to "dynamic auto" or "dynamic desirable." The established trunk creates a way for attackers to access all VLANs

54
New cards

Trunking

A networking technique used to allow multiple VLANs (Virtual Local Area Networks) to share a single physical network link between switches or between a switch and a router

55
New cards

Ghostwriting

Involves modifying the structure of the malware code without effecting its functionality to evade signature-based detection

56
New cards

Whitelist

Contains the list of signed applications that are allowed to run in the system

57
New cards

Microsoft Office Macros

Used to automate various processes and user tasks

58
New cards

Dechaning Macros

Attackers create VBA-based malicious codes to modify memory, registry, and other Windows files

59
New cards

Memory Hooking

An approach used by EDR tools to monitor and change the behavior of an application's execution process

60
New cards

Process Injection

Injecting malware code into the memory of the running processes

61
New cards

Living off the Land Binaries (LoLBins)

Legitimate system tools that are preinstalled on the operating system or downloaded from trusted sources such as Microsoft

62
New cards

Control Panel (CPL) Files

Developed for Windows control panels to organize and provide quick access to different tools in the Control Panel, making it easier to manage these tools

63
New cards

Windows Antimalware Scan Interface (AMSI)

A Windows API that enhances malware protection in Windows applications. It can be integrated with compatible antimalware software in the system to enhance detection capabilities, including signature-and reputation-based detection.

64
New cards

Fast Flux Method

Allows attackers to change both the IP addresses and DNS names rapidly

65
New cards

Event Tracing for Windows (ETW)

Facilitates extensive instrumentation and tracking of the functionality of processes and WINAPI calls.

66
New cards

Honeypot

A computer system on the Internet intended to attract and trap those who attempt unauthorized or illicit utilization of the host system to penetrate an organization's network

67
New cards

Low Interaction Honeypot

Emulate only a limited number of services and applications of a target system or network

68
New cards

Medium Interaction Honeypot

Simulate a real OS as well as applications and services of a target network

69
New cards

High Interaction Honeypot

Do not emulate anything; they run actual vulnerable services or software on production systems with real OS and applications

70
New cards

Honeynet

A high-interaction honeypot that is an architecture—an entire network of computers designed to attack

71
New cards

Pure Honeypots

Emulate the real production network of a target organization

72
New cards

Honeypots Level of Interaction

- Low Interaction

- Medium Interaction

- High Interaction

- Pure

73
New cards

Honeypot Deployment Strategy

- Research

- Production

74
New cards

Production Honeypot

Deployed inside the production network of the organization along with other production servers

75
New cards

Research Honeypots

High-interaction honeypots primarily deployed by research institutes, governments, or military organizations to gain detailed knowledge about the actions of intruders

76
New cards

Honeypots Deception Technqiues

- Malware Honeypots

- Database Honeypots

- Spam Honeypots

- Email Honeypots

- Spider Honeypots

- Honeynets

77
New cards

Malware Honeypots

Used to trap malware campaigns or malware attempts over the network infrastructure

78
New cards

Database Honeypots

Employ fake databases that are vulnerable to perform database-related attacks such as SQL injection and database enumeration.

79
New cards

Spam Honeypots

Target spammers who abuse vulnerable resources such as open mail relays and open proxies

80
New cards

Email Honeypots

Fake email addresses that are specifically used to attract fake and malicious emails from adversaries

81
New cards

Spider Honeypots

Designed to trap web crawlers and spiders

82
New cards

Methods of Detecting Honeypots

- Fingerprinting the Running Service

- Analyzing Response Time

- Analyzing MAC Address

- Enumerating Unexpected Open Ports

- Analyzing System Configuration and Metadata

83
New cards

Tar pits

Security entities that are similar to honeypots, which are designed to respond slowly to incoming requests

84
New cards

Layer 7 tar pit

React slowly to incoming SMTP commands by attackers/spammers

85
New cards

Layer 4 tar pits

Manipulate the TCP/IP stack and are effectively employed to slow down the spreading of malware

86
New cards

Layer 2 tar pits

Used to block the network penetration of the attacker who gains access to the network as well as to prevent internal threats

87
New cards

Bait and switch honeypots

Redirect all malicious network traffic to a honeypot after any intrusion attempt is detected