NETWORK SECURITY EXAM 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Proxy

a server that acts as an intermediary between a user and the internet, routing traffic on the users behalf

2
New cards

transparent proxy

intermediates between a user & a web service without requiring client-side configuration

3
New cards

reverse proxy

acts as a single point of enry to a private network, incepting client request and forwarding them to appropriate server

4
New cards

forward proxy

acts as a single point of access for a client network to external; hides clients IP address

5
New cards

CGI proxy

built into a web page & allows users to access content through a search utility within the site

6
New cards

Anonymous Proxy

hides the client’s real IP address through proxy server; the website only sees the proxy IP address

7
New cards

high anonymous proxy

hides the client’s real IP address AND hides the fact that they’re using a proxy

8
New cards

ARP

maps a device’s IP address to its MAC address on the LAN

9
New cards

ARP poisoning

attacker sends forged ARP msgs over a LAN, linking attacker’s MAC address to the IP in the ARP request

10
New cards

Gratuitous message

an ARP broadcast packet where both the source and destination addresses are the same; used to detect IP conflict

11
New cards

How to defend against ARP poisoning

  • Network IDS

  • Host-based IDS

  • DO NOT use IP address based auth.

12
New cards

IP protocol

a set of rules and params for routing data packets across a network

13
New cards

Teardrop Attack

  • First packet is sent with a more fragmented bit with payload size N

  • Second packet is sent WITHOUT the fragmented bit

  • Upon reassembly, OFFSET + PAYLOAD is less than N, leading to overlapping packet fragments

14
New cards

Tiny fragment attack

  • Unusually small packet fragments are used to breach a firewall’s security filters

15
New cards

Purpose of ICMP

allows for hosts to send error reports or control msgs

16
New cards

Smurf attack

a type of DoS where an attacker sends an abundance of ICMP request packets with a spoofed address, casusing devices on the network to flood victim with ICMP echo replies

17
New cards

Ping-to-Death

  • attacker pings victim with a large ICMP packet such that it has to be fragments, however the packets are malformed.

  • When the victim recieves the packet fragments, it cannot reassemble them, causing a buffer overflow of DoS

18
New cards

Fraggle Attack

attacker sends spoofed UDP echo packets, sent to the braodcast address to overwhelm the victim with response packets

19
New cards

UDP ping-pong (UDP flood attack)

  • attacker sends a large number of UDP packets to a targeted server on random ports

  • victim responds sends numerous response packets

  • victim is overwhelmed, using excessive resources and causing DoS

20
New cards

TCP SYN attack

  • attacker sends an abundance of SYN packets

  • victim sends an equal abundance of SYN-ACK packets that do not get replies

  • this leaves an abundance of “half-connections” open, consuming resources

21
New cards

SYN Cookie

  • defends against SYN attack by attaching encoded sequence numbers with SYN-ACK packets, then terminates connection

  • When legitimate ACK packets are sent with the “cookie”, the server decodes it & reconstructs the connection state information to establish the server-client connection

22
New cards

TCP RST attack

attacker disrupts an established TCP connection by sending forged TCP RST packets to one or both connection parties

23
New cards

hash

one-way mathematical function that defines how data is structured in a file, creating a unique digital fingerprint

24
New cards

Digital signature

unique cryptographic signature used to verify the authenticity & integrity of a message

25
New cards

IPSec

provides security to the IP and upper layer protocols of an IP packet

26
New cards

Transport Mode (IPSec)

  • Does not protect the IP header

  • ONLY protects payload information coming from the transport layer

27
New cards

Tunnel Mode (IPSec)

  • Applies IPSec security methods to entire packet, including the header, and adds a new IP header

  • Typically used in router-router, router-host, host-router

28
New cards

AH protocol (Authentication Header protocol)

designed to authenticate the source host & ensure the integrity of the payload carried in IP packets; DOES NOT PROVIDE ENCRYPTION

29
New cards

ESP (Encapsulation Security Payload)

  • Adds ESP trailer to payload, and encrypts both the trailer and payload

  • ESP header is added but not encrypted

  • Authentication data is added to the end of the ESP trailer

30
New cards

VPN

type of private network that provides a private connnection via public telecommunications, such as the Internet

31
New cards

Remote-access VPN

used for clients to access central LAN from a remote location using VPN client software and VPN gateway on LAN

32
New cards

Site-to-site VPN

connects 2 or more LANs over secured public telecommunications

33
New cards

PPTP

  • fastest VPN protocol

  • uses Generic Routing encapsulation

  • Not secure due to weak encryptioln

  • easy to set up

  • available for most OS

  • performance issues on unsteady connections

34
New cards

L2TP

provides stronger encryption and authentication by utilizes IPSec protocol, paired with the VPN client software

  • easy to config

  • strong encryption and auth.

  • slow performance due to double auth.

  • incompatible with NAT routers

35
New cards

IPSec VPN protocol

  • Utilizes the IPSec protocol to create secure, encrypted connections

  • Compatible with NAT routers due to IPSec’s innate NAT traversal feature

36
New cards

SSL VPN

leverages secure protocols like HTTPS and TLS to create a secure, encrypted connection between the VPN client and the private network

37
New cards

Pros of VPN

  • Reduces overall telecomm infrastucture (bulk is provided by ISP)

  • Reduces tech maintencae cost

  • simplifies network topology

38
New cards

Cons of VPN

  • If ISP or internet is down, so is the VPN

  • Central LAN must have permanent intertnet connection so that remote clients can connet at anytime

  • VPN may provides users with less bandwidth

  • Existing network devices may not support VPN transmissions 

39
New cards

public key cryptography

uses a pair of keys, public key to encrypt data, and private key to decrypt data

40
New cards

Diffie Hellman algorithm

method for two parties to securely exchange a shared secret key over unsecured channel, by parties agreeing on a pubic base and moduleis to generate private and public keys 

41
New cards

How does flowbits work in suricata rule?

  • Flowbits allows on rule to set a flag during packet inspection and another rule to check for that flag later.

  • Used in cases where one packet contains something suspicous and a later packet is carrying a malicous payload