CSEC 701 Final Study Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/255

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:47 AM on 12/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

256 Terms

1
New cards

data link layer

node-to-node delivery

2
New cards

network layer

host-to-host delivery

3
New cards

transport layer

process-to-process delivery

4
New cards

transport layer address=

port numbers

5
New cards

16 bit port space

allows for multiple connections on a single host

6
New cards

network address and port translator NAPT

  1. hosts sends datagram to destination IP

  2. NAT router changes datagram source address from LAN to WAN and updates table

  3. reply arrives to destination

  4. NAT router changes datagram destination address

7
New cards

user data protocol UDP

unreliable, unlimited transmission, but very fast and low overhead for small messages

8
New cards

transmission control protocol

reliable byte stream, flow control, congestion control, connection oriented → heavyweight

9
New cards

TCP connection

two way connection established with 3 way handshaking, four way termination

10
New cards

TCP 3 way handshaking

SYN → SYN ACK → ACK

11
New cards

TCP four way termination

1.FIN → 2.ACK & 3.FIN → 4.ACK

12
New cards

DNS application layer

a giant step toward human-friendly internet

13
New cards

database translation

manual translation put them in a host file in each computer, store the entire DB in a single machine, store a section of DB hierarchically

14
New cards

DNS=

application layer and uses either UDP or TCP, the well known port=53, UDP if the size of the response msg<512 bytes, otherwise it is TCP

15
New cards

authoritative DNS servers

organizations DNS servers, providing authoritative hostname to IP mappings for organizations servers

16
New cards

caching

non-authoritative answer, once name server learned mapping it caches mapping, the answer is non-authoritative, TLD server typically cached in local name servers

17
New cards

HTTP/1.0

non-persistent, downloading multiple objects require multiple connections

  1. TCP connection opened

  2. at most one object sent over TCP connection

  3. TCP connection closed

18
New cards

HTTP/1.1

persistent

  1. TCP connection opened to a server

  2. multiple objects can be sent over SINGLE TCP connection between client and server

  3. TCP connection closed

19
New cards

limitations of HTTP 1.1

introduced multiple pipelined GETs over single TCP connection, servers responds in order(FCFS) to GET requests, small objects may have to wait for transmission(HOL blocking) behind large objects, loss recovery stalls object transmissions

20
New cards

HTTP/2 mitigating HOL blocking

objects divided into frames, frame transmission interleaved

21
New cards

limitations of HTTP/2

recovery from packet loss stalls all object transmissions, vast majority of internet traffic is HTTP+TLS+TCP+IP, improve by combining some protocols

22
New cards

HTTP/3

HTTP over QUIC, replaces TLS and TCP, implements reliable transport in an application library, rather than letting the OS’s TCP library handle it

23
New cards

protocols vulnerable to sniffing

HTTP, telnet and Rlogin, POP, IMAP, SMTP, FTP

24
New cards

hub

broadcast, traffic is sent to all ports

25
New cards

switch

unicast, SPAN port

26
New cards

SPAN port

a port which is configured to receive a copy of every packet that passes through a switch

27
New cards

sniffing in data link layer

networking layers in the OSI model are designed to work independently of each other, if sniff in data link layer, the upper OSI layer will not be aware

28
New cards

MAC flooding attack

the switch may crash, stop accepting more mapping information, or simply broadcast trafic when CAM table is full, switch then acts as a hub

29
New cards

Macof

MAC overflow, manipulates MAC-to-port mapping, generates bogus mapping information and fills up the switch CAM table

30
New cards

switch port stealing - redirecting traffic

host A sends an ARP request to host C, attacker B intercepts it, and sends a fake ARP reply faster than host C, switch changes MAC address binding to attackers machine, attacker then able to redirect the packets intended for the target host toward his switch port

31
New cards

gratuitous ARP

a reply to which no request is made, any host can send ARP responses even though no one sends an ARP request, attacker floods switch with forged gratuitous ARP packets w his own MAC address as destination, race condition of attackers flooded packets and target host packets

32
New cards

ARP spoofing

ARP packets can be forged to redirect data to the attackers machine, switch becomes a hub after ARP table is flooded with spoofed ARP replies letting attacker sniff all network packets

33
New cards

ARP cache poisoning

attacker floods a target computers ARP cache with forged entries

34
New cards

defense against ARP poisoning

implement dynamic ARP inspection using DHCP snooping binding table, if the source MAC address does not match MAC address in the DHCP binding table entry, the packet is discarded

35
New cards

DHCP snooping

trusted ports: DHCP server or other SW
untrusted ports: other clients

36
New cards

MAC duplication

by changing the MAC address, attacker can receive traffic destined to other machines, attacker can sniff network for MAC addresses of clients are actively associated with a switch port and reusing one of those addresses

37
New cards

defense against MAC spoofing

use DHCP snooping bidning table, synamic ARP inspection, and IP source guard, encryption, retrieval of MAC address

38
New cards

DHCP process

DHCP servers maintain TCP/IP configuration information in a database

  1. DHCPDISCOVER/SOLICIT

  2. DHCPOFFER/ADVERTISE

  3. DHCPREQUEST/REQUEST

  4. DHCPACK/REPLY

39
New cards

DHCP starvation attack

a denial of service attack on the DHCP servers, attacker broadcasts forged DHCP requests and tries to lease all of the DHCP addresses available in the DHCP, in result user is unable to obtain or renew an IP address

40
New cards

rogue DHCP server attack

Attacker sets a rogue DHCP server in the network and responds to DHCP requests with bogus IP addresses

victim gets

  1. wrong IP address

  2. wrong gateway IP address

  3. wrong DNS server address

41
New cards

defense against DHCP attacks

enable port security (configuring MAC limit on switch), enable DHCP snooping that allows switch to accept DHCP transaction coming only from a trusted port

42
New cards

ICMP router discovery

For a host to participate on an internetwork, it needs connectivity to at
least one router on the local network.
Method 1: Manually configure each host with the address of a local router as its
default router (also called a gateway).
• time-consuming to set up, difficult to maintain, and inflexible.
Method 2: Get the info via DHCP. DHCP uses a method called router discovery to automatically discover local routers.

Enables hosts to locate routers on the local subnet and use them to gateway to reach other networks

43
New cards

IRDP spoofing

attacker sends spoofed IRDP router advertisement message to the host on the subnet, causing it to change its default router to whatever the attacker chooses

  • used to launch MITM, denial of service, and passive sniffing attacks

44
New cards

intranet DNS spoofing

connected to local network to sniff packets, Attacker runs a fake DNS server, sniffs DNS requests, and responds to it with a fake reply

45
New cards

internet DNS spoofing

Attacker infects victim machine with a Trojan and changes her DNS IP
address to that of the attacker's.

46
New cards

proxy server DNS poisoning

Attacker sends a Trojan to victim machine that changes her
proxy server settings in Internet Explorer to that of the
attacker's and redirects to fake website

47
New cards

DNS cache poisoning

Altering or adding forged DNS records into the DNS resolver cache à
redirected to a malicious site

  • cache incorrect entries locally and serve them ot users if cant verify authoritative source

48
New cards

defense against DNS spoofing

  1. do not accept query response form outside

  2. use split DNS

  3. use a random query ID

  4. configure DNS resolver to use a new random source port for each outgoing query

  5. implement IDS/firewall and deploy them correctly

  6. implement DNSSEC

49
New cards

split DNS

internal & external

  • Insiders query internal server for inside names

  • Insiders query internal server which forwards queries to external server for outside names

  • Outsiders query external server

  • Internal DNS server will stay clean

50
New cards

kaminsky vulnerability

DNS vulnerability from query ID having only 65536 values, temporary fix by randomizing source port 65536 to 135 million, ultimate solution DNSSec

51
New cards

ping sweep

sending ICMP echo request to a wide range of IP addresses, if the target replies a system is on the network, if it doesn’t the system is not on, or blocking iCMP, can be easily detected by properly configured IDS

52
New cards

TCP/UDP port scanning

used to idenitfy the open and closed ports, allows an attacker to locate potential entry points and idenitfy the types of a system

53
New cards

port scanning with nmap

popular tool that sends probe packets with various TCP flags set to discover open ports, detected by advanced firewalls

54
New cards

XMAS scan

(URG, PSH, FIN)

if port is closed RST is returned

if port is open there is no return

55
New cards

TCP full open scan

connect scan, 3 way handshake, slow and easily detected by IDS

56
New cards

half open scan

SYN scan, incomplete 3 way handshake by not sending last ACK, by tear down by sending RST; quicker than connect scan and harder to detect

57
New cards

basic packet filtering firewall

screening router, allows/denies packets based on port number or IP addresses, decision is per packet

58
New cards

stateful packet filtering firewall

keeps track of the state of network connections, only packets which match a known connection state will be allowed by the firewall, others rejected

59
New cards

firewall

usually block incoming SYN packets, allow only outgoing SYN, may allow incoming ACK, FIN, URG, PSH, responds w RST to unexpected

60
New cards

SYN

open: SYN/ACK

closed: RST

61
New cards

ACK

open: RST

closed: RST

62
New cards

RST

open: no response

closed: no response

63
New cards

FIN/URG/PSH

open: no response

closed: RST/ACK

64
New cards

inverse TCP flag scanning

Send TCP packets with a TCP flag (Known as FIN, URG, PSH scanning) or with no flag(null scanning)

  • if open, no repsonse

  • if closed, RST comes back

only closed ports can send RST back, inverse scanning looks for closed ports

65
New cards

inverse TCP flag scan advantages

  • SYN packet is carefully monitored by firewalls/IDS (including half-open connect
    attempts)

  • FIN, URG, PSH packets may pass through without detection

  • Stealthy

66
New cards

inverse TCP flag scan disadvantages

  • Microsoft ignores the RFC 793 à No RST/ACK response

  • Only effective on Unix-based OS

67
New cards

ACK flag probe scanning 1

use TTL value (IP header) and window size (TCP header)

  • exploits the vulnerabilities in BSD derived TCP/IP stack

  • send ACK packets to different ports

68
New cards

ACK flag probe scanning 2

send ACK packets to different ports, if the window value in a particular port is non-zero then the port is open

69
New cards

X+2

intermediary sent RST so the port is open

70
New cards

is X+1

intermediary didnt send RST so the port is closed

71
New cards

idle scan

The IP value of the intermediary must be predictable. That is, it should not be busy (a zombie machine), otherwise the ID value will increase unpredictably.

72
New cards

IDS evasion techniques

use fragmented IP packets, spoof your IP address, use source routing, connect to proxy servers or comprised trojaned machine to launch attacks

73
New cards

loose source and route record

LSRR, allows the packet to use any number of intermediate gateways to reach the next address in the route

74
New cards

strict source and route record

SSRR, the next address in the source route to be on a directly connected network, if not the delivery packet of the packet cant be completed

75
New cards

SYN/FIN scanning using IP fragments

bypass IDS, many IDS are signature based, effect of fragmented

76
New cards

bypass IDS

The TCP header is split into several packets so that the packet filters are not able to detect what the packets intend to do

77
New cards

tiny fragment attack

break a string into smaller pieces

  • cat /etc/p + asswd

78
New cards

fragment overlap attack

break into pieces and make them overlap to hide original content

  • cat /etc/paqxyhs + sswd

79
New cards

IDS evasion

Many IDS consider a certain number of port service requests in a defined
number of seconds an attack, solution: slow scan to below the threshold

80
New cards

banner grabbing

OS fingerprinting, active or passive, If the OS is known, attacker can find an OS-specific vulnerability and have a greater chance of success

81
New cards

active banner grabbing

send a specially crafted packets and observe response, RFCs define how stack responds but not how to respond to illegal combinations

82
New cards

passive banner grabbing

Services will sometimes advertise what they are via a “banner

  • for Smtp, ftp, telnet, http, etc

  • sniff packets from the target host to study the signs of the OS (TTL, DF, ToS, TCP)

  • observe the page extension

83
New cards

advanced HTTP banner grabbing

HTTP different methods chnage, have different names as new versions of the HTTP server become available

84
New cards

proxy servers

an intermediary for connecting with other computers

85
New cards

proxy server uses

proxy firewall, filtering out unsuitable traffic, remotely access intranets, NAT, hide source IP for anonymous web browsing

86
New cards

proxy server malicious use

impersonating a fake source

87
New cards

proxy chaining

attacker can increase his anonymity, traffic can be encrypted end-to-end, slow

88
New cards

ToR

onion routing messages are encapsulated in layers of encryption, three types of relays: entry, middle, exit; creates darknet, darkweb, deep web

89
New cards

web manipulation proxy

intercepts the HTTP/HTTPS traffic, let the user verify the content or change them and submit the page, like MITM attack but on the attackers own machine

90
New cards

how web app manipulation proxies do SSL

two SSL connections: broswer shows a warning message that someone is trying to attack

91
New cards

vulnerability scanning

identifies vulnerabilities and weaknesses of a system and network in order to determine how a system can be exploited.

discovers:

  • network vulnerabilities

  • open ports and running services

  • application and services vulnerabilities

  • application and services configuration errors

  • tools

92
New cards

nessus

most popular vulnerability scanner

93
New cards

the exploit

An arbitrary command (usually shell program) to be executed in the context and with the permissions of the vulnerable program, specific to the target machine and OS

94
New cards

normal stack

buffer 2 → buffer 1 → return pointer → function call arguments

95
New cards

smashed stack

buffer 2 → machine code → new pointer to exec code → function call arguments

96
New cards

stack

a dynamic structure, location of stack frame varies, attacker doesnt know exactly which location the executable code is pushed into

97
New cards

NOP sled

include NOPs before the executable code so if pointer goes to the NOPs then execution will continue down until it gets to your exploit

98
New cards

payload

=shellcode, piece of software that lets you control a computer system after it’s been exploited

99
New cards

exploit

A small and highly specialized computer program whose only reason of being is to take advantage of a specific vulnerability and to provide access to a computer system.

  • deliver a payload to the target system to grant the attacker access to the system.

100
New cards

metapsloit

Allows developing new attacks from existing tools, and test the attack
- Extensible model through which payloads, encoders, no-op generators, and exploits can be integrated

Modular interface for exploit, payload and target