Network Security exam2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Flowbits in a Suricata rule

Definition: Flowbits is a Suricata keyword that stores or checks state information about a network flow.

Explanation: Flowbits lets one rule “tag” a connection with a flag (e.g., set), and another rule later check that flag (isset, noalert, unset). This enables multi-stage/multi-packet detection.

2
New cards

Distance and Within keywords on Suricata

Distance: number of bytes after the previous match where the next pattern starts.

Within: maximum number of bytes allowed from previous match to the next match.Used to ensure patterns appear in the correct order and proximity.

3
New cards

Proxy & Networking

An intermediary server that handles requests on behalf of a client. It provides caching, filtering, privacy, access control, content inspection, and hides internal clients from outside networks.

4
New cards

Forward Proxy

Sits between internal clients and the internet, sending requests on their behalf to provide filtering, caching, or anonymity.

5
New cards

Reverse Proxy

Sits in front of servers and handles client requests for them, adding load balancing, caching, and security.

6
New cards

Anonymous Proxy

Hides the client's IP address from the destination server but still identifies itself as a proxy.

7
New cards

Transparent Proxy

Intercepts and processes client traffic without requiring any client configuration and without hiding that it's a proxy.

8
New cards

High-Anonymity Proxy

Hides both the client's IP address and the fact that a proxy is being used.

9
New cards

CGI Proxy (Common Gateway Interface)

A web-based proxy accessed through a webpage where the user enters a URL, and the server fetches and displays the content on their behalf. It hides the user's IP and requires no browser configuration but is slower because all content is rewritten by the proxy.

10
New cards

ARP

Maps an IPv4 address to a MAC address on a LAN. Hosts broadcast "Who has IP X?" and the owner replies with its MAC.

11
New cards

ARP Spoofing/Poisoning

Attacker sends forged ARP replies to bind their MAC to a victim's IP → MITM.

12
New cards

Gratuitous ARP Abuse

Fake unsolicited ARP updates to overwrite tables.

13
New cards

DoS via ARP Flooding

occurs when an attacker sends massive numbers of forged ARP requests or replies, overwhelming a switch or host's ARP table until it becomes full or unstable. This forces the device into fail-open behavior—often reverting the switch to broadcast mode—causing severe network slowdown, packet loss, or complete outage.

14
New cards

IP Fragmentation Attack

Attackers manipulate fragment sizes or create overlapping/tiny fragments to confuse the reassembly process, bypass firewalls, or crash systems that mishandle malformed fragments.

15
New cards

Teardrop Attack

Uses overlapping IP fragments that cause the target's reassembly logic to fail, often crashing older operating systems.

16
New cards

Ping of Death

Sends oversized ICMP packets split into fragments that exceed 65,535 bytes when reassembled, causing buffer overflows.

17
New cards

Tiny Fragment Attack

Splits key header fields across extremely small fragments to evade security devices that can't properly inspect multi-fragment headers

18
New cards

IP Spoofing

Forges the source IP address in packets to hide the attacker's identity or to trick systems into sending responses to a victim.

19
New cards

UDP Flood

Bombards a target with high-volume UDP packets, forcing it to repeatedly check nonexistent ports and exhausting resources

20
New cards

Fraggle Attack

A DDoS attack using UDP packets sent to broadcast addresses with a spoofed victim IP, causing all hosts to flood the victim with replies.

21
New cards

UDP Scanning

Uses stateless UDP probes to determine open ports by analyzing whether ICMP "port unreachable" messages are returned.

22
New cards

SYN Flood

Sends many SYN packets without completing the handshake, filling the server's half-open connection table and preventing legitimate connections.

23
New cards

RST Injection

Sends forged TCP RST packets to abruptly terminate an active connection by guessing valid sequence numbers.

24
New cards

TCP Session Hijacking

Predicts or manipulates TCP sequence numbers to insert malicious data into an existing session.

25
New cards

FIN/NULL/Xmas Scans

Use abnormal TCP flag combinations to probe systems and reveal firewall or port behavior based on how they respond.

26
New cards

ICMP Flood

Overwhelms a target with ICMP echo requests or replies, consuming bandwidth and CPU resources.

27
New cards

Smurf Attack

Uses spoofed ICMP echo requests sent to broadcast addresses so that all hosts collectively overwhelm the victim with replies.

28
New cards

ICMP Redirect Attack

Sends forged ICMP redirect messages to trick a host into sending traffic through a malicious router.

29
New cards

ICMP Fragment Attack

Uses fragmented ICMP packets to bypass filters that only inspect the first fragment.

30
New cards

Public Key Cryptography

Uses mathematically linked public and private key pairs so that the public key handles encryption or verification while the private key handles decryption or signing, enabling secure communication without pre-shared secrets.

31
New cards

Diffie-Hellman

A secure key-exchange method where two parties exchange computed public values and independently generate the same shared secret using their private exponents, even over an insecure channel.

32
New cards

Digital Signature Integrity

The sender signs the hash of a message with their private key, and the receiver verifies the signature by decrypting it with the sender's public key and comparing it to their own computed hash.

33
New cards

IPSec AH

Provides authentication and integrity for IP packets but does not encrypt the payload; useful when encryption is not required.

34
New cards

IPSec ESP

Provides confidentiality, integrity, and authentication by encrypting the payload and optionally authenticating the entire packet

35
New cards

Transport Mode

Protects only the payload of the IP packet, keeping the original header intact for end-to-end host communication.

36
New cards

Tunnel Mode

Encapsulates the entire original IP packet into a new one, enabling secure gateway-to-gateway or site-to-site VPNs.

37
New cards

PPTP

A legacy VPN protocol using GRE and MS-CHAPv2 that offers simple setup but is considered insecure due to weak authentication and outdated encryption.

38
New cards

L2TP

A tunneling protocol that provides no encryption on its own but is typically paired with IPSec to form the secure L2TP/IPSec VPN.

39
New cards

IPSec VPN

A secure VPN solution using AH/ESP with strong cryptography and IKE key management, suitable for site-to-site and remote-access connections.

40
New cards

SSL/TLS VPN

A VPN that uses HTTPS (port 443) to tunnel traffic through encrypted sessions, often requiring no dedicated client and easily traversing firewalls.