chapter 13 network forensics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

issa digital forensics

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

IPv4

Internet protocol version 4 - 32 bit address as sets of octets between 0 and 255. Three network classes (A,B,C) subnetting CIDR

2
New cards

IPv6

Internet Protocol version 6 128 bit address with hex numbering

3
New cards

OSI Model

Open Systems Interconnection model:

  • application

  • presentation

  • session

  • transport

  • network

  • data link

  • physical

4
New cards

HTTP messages

hypertext transfer protocol messages:

  • GET - request to read

  • HEAD - request to read the head section

  • PUT - request to write

  • POST - request to append

  • DELETE - remove

  • LINK - connect two existing resources

  • UNLINK - opposite of link

5
New cards

network packet

data sent across the network divided into header, payload, and footer

6
New cards

packet headers

headers put on by every layer of OSI model

7
New cards

packet payload

body or information content of a packet - may be padded with zeros if fixed length is needed

8
New cards

packet trailer/footer

contains error checking data - part of the ethernet, Point to point protocol(PPP), or other layer 2 protocol

9
New cards

ports

channel in which connunication can occur - 65635 possible ports

10
New cards

DOS

Denial of service - attacker floods network with malicious packets to prevent legitimate network traffic

11
New cards

ping of death

Attacker sends an Internet Control Message Protocol (ICMP) echo packet of a larger size than the target machine can accept

12
New cards

ping flood

send a lot of ICMP packets to the target to overwhelm

13
New cards

teardrop attack

attacker sends fragments of packets with bad values

14
New cards

SYN Flood

send unlimited SYN requests and never responds

15
New cards

land attack

sends a fake TCP SYN packet with the same source as the destination

16
New cards

smurf attack

large number of ICMP echo requests from a single request as an amplifier to cause a traffic jam (similar to fraggle)

17
New cards

DHCP starvation

DOS attack to exhaust the DHCP servers to not have any address space left

18
New cards

HTTP Post attack

attacker sends POST request with the content-length and then sends the actual message at a slow rate cause a hung server

19
New cards

PDOS

permanent denial of service also called phlashing

20
New cards

login DOS

overload login process by coninuously sending requests

21
New cards

packet mistreating

compromised router mishandling packets

22
New cards

Sniffer

intercept and log network traffic ex WinDump and TcpDump

23
New cards

wireshark

sniffer and protocol analyzer

24
New cards

Nmap

map what ports are open and running (CLI) GUI interface is Zenmap

25
New cards

types of logs

autherntication, application, operating system event, network device, secutity event

26
New cards

WEP

wired equivalent privacy stream cipher to secure data with RC4 - no longer recommended

27
New cards

WPA

Wi-Fi Protected Access uses Temporal Key Integrity Protocol (TKIP), 128 bit packet key. WPA 2 and WPA3. WPA3 open networks are encrypted

28
New cards

network card

enables computer to connect to a network

29
New cards

Hub

connects computers on LAN and sends any packet to all out ports

30
New cards

Switch

uses MAC addresses to direct traffic

31
New cards

Router

connect different logical networks and enable traffic for other sides of the network to pass through

32
New cards

packet filter

permits/denies packets based on rules “screened firewall”

33
New cards

stateful packet inspection

examines all packets and considers previous packets for permitting

34
New cards

well known ports

0 to 1023

35
New cards

registered ports

1024 to 49151

36
New cards

dynamic ports

49152 to 65535