CSEC 701 Proxy

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

proxy server

an intermediary for connecting with other computers

2
New cards

proxy server uses

proxy firewall, filtering out unsuitable traffic, remotely access intranets, NAT, hide source IP

3
New cards

proxy server malicious uses

impersonating a fake source 

4
New cards

anonymizers 

private web surfing- eliminates all identifying information 

5
New cards

anonymizer types

network(eavesdropping) and single point(traffic analysis)

6
New cards

proxy chaining

attacker can increase his anonymity, traffic can be encrypted end-to-end, slow

7
New cards

proxy switcher 

multiple internal proxy servers that can switch among them periodically 

8
New cards

ToR

onion router that encapsulates messages in layers of encryption

9
New cards

ToR network

6000+ relay nodes, accessible with Tor browser

10
New cards

ToR operation

relays: entry, middle, exit

hidden service: use rendezvous points to run web server anonymously

creates darknet, darkweb, and deep web

11
New cards

ToR anonymity

supposedly broken in 2024 by german authorities, states to still be safe however

12
New cards

setting up proxy on windows

  1. go to internet options

  2. click connections tab

  3. click LAN settings

  4. type proxy address

13
New cards

web manipulation proxy

intercepts the HTTP/HTTPS traffic, let the user verify the content or change them (cookies, form fields), and submit the page. Similar to MITM but on attackers own machine 

14
New cards

how web manipulation proxies do SSL

two SSL connections; one between web browser and web app manip proxy, one between internet and web server

15
New cards

vulnerability scanning

identifies vulnerabilities and weaknesses of a system and network in order to determine how a system can be exploited

16
New cards

vulnerability scanning discovers 

network vulnerabilities, open ports & running services, application & services vulnerabilities, application & services configuration errors, tools 

17
New cards

Nessus

most popular vulnerability scanner

18
New cards

buffer overflow attack

stuffing too much data into a data container (if you dont validate input, data will keep writing beyond its container), most common type of remote and local vulnerability, many subtypes of overflows

19
New cards

buffer overflow example 

gets(name)

strcpy(temp_name, name)

20
New cards

how programs run (stack overflow)

fetch and execute instructions sequentially one by one, instruction pointer is incremented, at jump 3 the instruction pointer is altered to begin fetching instructions in a different location

21
New cards

the exploit

an arbitrary command (usually shell program) to be executed in the context and with the permissions of the vulnerable program, is specific to the target machine type and OS

22
New cards

normal stack

buffer 2, buffer 1, return pointer, function call arguments 

23
New cards

smashed stack

buffer 2, machine code, new pointer to exec code, function call arguments

24
New cards

stack

a dynamic structure, location of stack frames varies,

25
New cards

NOP sled

include NOPs before the executable code so that execution will continue down until it gets to your exploit 

26
New cards

payload

piece of software that lets you control a computer system after its been exploited (=shellcode)

27
New cards

exploit

a small and highly specialized computer program whose only reason of being is to take advantage of a specific vulnerability and to provide access to a computer system (=delivery script)

28
New cards

metasploit

allows developing new attacks from existing tools, and test the attack

29
New cards

active exploit

actively exploit a host

30
New cards

passive exploits

waits for incoming hosts, then exploits them

31
New cards

payload inline

contains the exploit and shellcode, stable, large size 

32
New cards

payload staged

exploits victim, establishes connection w attacker, pulls down the payload

33
New cards

payload meterpreter

advanced dynamic payload, extended pver the network, extensible through modules and plugins

34
New cards

metasploit payload

establishes a communication channel between the MSF and the victim host

35
New cards

bind connection

local server gets started on victim machine, attacker connects to victim, /bind_tcp

36
New cards

reverse connection

local server gets started on attacker machine, victim connects to attacker, /reverse_tcp

37
New cards

NOP

no operation in the x86 architecture

38
New cards

metasploit NOP

generates a no-operation instructions used for blocking out buffers, using generate commans

39
New cards

metasploit auxiliary 

can be used to perform arbitrary, one-off actions such as port scanning, denial of service, and even fuzzing, run or exploit command

40
New cards

encoders

scrambles the NOPs and payloads making it looks like normal traffic or garbage to IDS

41
New cards

DoS attack

attack on a computer or network that reduces, restricts, or prevents accessibility of system resources to its legitimate users, attack on availability (malformed packet & packet flooding)

42
New cards

malformed packet attack

sending a very large ping packet to a victim can crash some operating systems

43
New cards

land attack

send a TCP SYN packet with the source address spoofed to victims address, causing it to continuously crash

44
New cards

teardrop attack

sending IP fragments with overlapping oversized payloads

45
New cards

Winnuke attack

sending data to TCP port 139 crashes the victim

46
New cards

phlashing

permanent DoS, attacks that cause irreversible damage to system hardware (sabatoge)

47
New cards

bricking a system

attackers send fraudulent hardware updates to the victims, when installed the attacker gets complete control

48
New cards

DDoS

a multitude of compromised systems attacking a single target, attacker uses botnets and attacks a single system

49
New cards

bots

software applications that run automated tasks over the internet and perform simple repititive tasks, such as web spidering and search engine indexing

50
New cards

botnet

a huge network of the compromised systems and can be used by an attacker to launch denial of service attacks 

51
New cards

volumetric attacks

consumes the bandwidth of target network or service using botnets, measured in bps, (flood attack, amplification attack), UDP & ICMP flood, ping of death, smurf

52
New cards

protocol attack

consumes computing resources such as connection state table in load balancers, FW, servers, measured in pps, (SYN & ACK flood, TCP exhaustion, fragmentation attack)

53
New cards

application layer attacks

consumes the application resources or services thereby making it unavailable to legitimate users, measured in rps, (HTTP GET/POST attack, slowloris attack)

54
New cards

application layer attacks

peer to peer attacks, application level flooding, reflection attack (DNS)

55
New cards

transport layer attacks

SYN flooding, UDP flooding

56
New cards

network layer attack

ICMP flooding

57
New cards

link layer attacks

permanent DoS

58
New cards

smurf attack

ICMP flood attack, smurf sends ICMP echo request (ping) to a networks broadcast address with spoofed IP address as the victims address, easy prevention 

59
New cards

distributed reflection denial of service DRDoS

spoofed attack, uses multiple intermediary (compromised) and secondary (uncompromised) machines, larger attack bandwidth and impossible to trace attack

60
New cards

DNS amplification attack

attacks using thousands of name servers can direct gigibits of data per second against the target

61
New cards

service request flooding

a group of zombies attempts to exhaust server resources by setting up and tearing down connections, targets memory of server, 

62
New cards

SYN flooding

attacker sends many SYN packets to a victim with a spoofed source IP address

63
New cards

SYn flooding effects

takes advanatge of a flaw in TCP 3 way handshake, victim cant open a new connection because listen queue is filled up

64
New cards

SYN flood mitigation

increase connection queue size and reduce timeout

65
New cards

SYN cookies

the sequence number in the SYN-ACK is a set as a function of the clients IP address, need to know sequence number**, echo 1 > /proc/sys/net/ipv4/tcp_syncookies, no memory allocated

66
New cards

SYN cookies t

a 32 bit counter which increments every 64 seconds

67
New cards

SYN cookies K 

a secret key selected by server for uptime of server

68
New cards

application layer DoS attacks

attackers exploit weaknesses in programming source code to prevent the application from processing legitimate requests, result in loss of service

69
New cards

application level flood attacks

flood servers with high rate of connections form valid source, HTTP GET/POST attacks, slowloris attacks

70
New cards

sockstress

affects window size and memory available 

71
New cards

multi vector attack

combination of volumetric, protocol, and application attacks to confuse the victims IT department