The flashcards below were created by user
motonlava
on FreezingBlue Flashcards.
-
FTP (file Transfer protocol - data
Port 20, 21
-
-
SMTP (Simple mail Transfer Protocol)
Port 25
-
TACACS+
- Terminal Access Controller Access Control System
- Port 49
- Alternate to RADIUS
- AAA performed separately
- Supports PAP, CHAP and EAP
- Allows use of multi-factor auth
- Allows a RAS to forward user credentials to an auth server
- Uses TCP Port 49
- Encypts entire body of message
-
DNS (Domain Name Service)
Port 53
-
DHCP (Dynamic Host Control Protocol)
Ports 67, 68
-
TFTP (trivial File Transfer Protocol)
Port 69
-
HTTP (Hypertext transfer Protocol)
Port 80
-
POP3 (Post Office Protocol, v3)
Port 110
-
NNTP (Network News transfer protocol)
Port 119
-
NTP (Network Time Protocol)
Port 123
-
-
-
-
-
LDAP
- Lightweight Directory Access Protocol
- Port 389
-
-
-
-
-
-
-
Layer 2 Forwarding (L2F) Cisco
L2F TCP 1701
-
Point to Point Tunneling Protocol (PPTP) Microsoft
TCP 1713
-
Layer 2 Tunneling Protocol (L2TP) (RFC standard)
UDP port 1701
-
Virtual private Network
VPN
-
Internet Protocol Security (IPSec)
Layer 3
-
Internet Security Association and Key Management Protocol (ISAKMP)
UDP 500
-
Internet Key Exchange (IKE)
UDP port 500
-
UTP
Unshielded Twisted pair
-
STP
Shielded Twisted pair
-
EMI
Electromagnetic Interference
-
NIC
Network Interface Card
-
Router
- o Povides connectivity between two or more networks
- o Routes packets based upon IP addressing
- o Standard Protocols
- o RIP (Routing Information protocol)
- o BGP (Border Gateway Protocol)
- o OSPF (Open Shortest path First)
-
ACL
Access Control List
- o Rule based access control set on network devices that regulate traffic
- o Can be applied ro inbound/outbound traffic
- o Usually simple packet filtering that blocks traffic by:
- o Source and Destination IP address
- o Port
- o Protocol
-
STP
Spanning Tree Protocol
-
3DES
Triple Digital Encryption Standard (DES) a block cipher algorithm used for encrytion
-
802.11a
- The Standard that provides for bandwidths of up to 54Mbps in 5GHz Frequency spectrum
- Bit Rate 5 GHz 50-100 feet
-
802.11b
- The Standard that provides for bandwidths of up to 11Mbs in the 2.4GHz Frequency
- 150-300 feet
-
802.11g
- The Standard that provides for bandwidths of up to 20Mbs in in the 2.4GHz Frequency
- 150-300 feet
-
802.11n
- Aproposed amensment to the 802.11 standard that provides for bandwidthd of 74Mbs in the 2.4GHz and 5GHz frequency.
- 300-600 feet
-
ARP
Protocol used to map known IP addresses to unknown physical addresses.
-
Algorithm
The series of steps/formilas/poscesses that followed ro arrive at a result
-
level 7 Applications
- FTP 20,21
- Telnet 23
- SMTP 25
- HTTP 80
- Simple Mail Transfer Management Potocol (SNMP)
-
FTP - File Transfer Protocol - control
Port 21
-
SSH (Secure Shell)
Port 22
-
NAT (Network Address Translation)
(Network Address Translation)
-
PAT
Port Address translation
-
NAC
Network Access Control
-
Dynamic NAT
A pool of public IP address is shared by an entire private IP subnet. Connections initiated by private hosts are assigned a public address from a pool
-
Static NAT
Accomplished by a straightforward, ststless implementaion that transforms only the network part of the address, leaving the host part intact. The payload of the packet must also be considered during the translation process.
-
RPC
- Remote Procedure call (Microsoft)
- port 135
-
IMAP (Internet Message Access Protocol)
Port 143
-
LDAP (lightweigtht Directory Access Protocol)
Port 389
-
-
DES
Symmetic Block cipher 64 bits
-
3DES
Symmetic Block cipher (used in PGP/GPG)
-
AES
Rijndael Block cipher (used in PGP/GPG)
-
Blowfish
Symmetic Block cipher
-
Twofish
Symmetic Block cipher (used in PGP/GPG)
-
CAST-128
Symmetic Block cipher (used in PGP/GPG)
-
All in One Appliance
- ASA Combines
- PIX firewall (Routing, ACL, NAT)
- Also known as Unifed Threat Management (UTM)
-
Flood Guards
- A network device, firewall/router, that has the ability to prevent some flooding DoS attacks
- DoS attacks prevent could be
- Fraggle
- Smurf
- Syn
- Authentication DoS attacks
-
RSA
Asymmetic - Key Exchange, Encryption, Digital Signatures, used in PGP/GPG
-
Diffe-Hellman
Asymmetic - Key Exchange (used in PGP/GPG)
-
El Gamal
Asymmetic - Key Exchange, Encryption, Digital Signatures
-
ECC
Asymmetic - Key Exchange, Encryption, Digital Signatures (used in cell phones and wireless devices)
-
-
-
-
-
-
AD-IDS
Anomaly-detection intustion detection system. An AD-IDS works by looking for deviations from a pattern of normal network traffic
-
Adware
Software that gathers info to pass on to markers or intercepts personal data such as credit card numbers and makes them available to third parties
-
Analyer
The componet or process that analyzes the data collected by the sensor
-
SaaS - Software as a Service
- Software as a service over the Internet
- Eliminates the need to install/run applications on customer's computers
- No local software applications needed (just web site connectivity)
-
PaaS - Platform as a Service
- Facilitates deployment of applications reducing cost and complexity
- Vendors allow apps to be created and run on site connectivity
-
IaaS - Infrastructure as a service
- Typically a Platform virtualization enviroment
- Clients purchase resources/services (servers, software, certain networks devices, data center space
-
VoIP
- Voice over IP
- VoIP serveices convert your voice into digital signal that travels over the Internet
- Establish a IP Phone VLAN
- Use Voice Firewalls
-
SIP
Session Initial Protocol - used to manage multimedia communication sessions, such as VoIP utilizing ports 5060 and 5061
-
RTP
Realtime Transport Protocol - used to transfer steaming media over networks
-
IDS
Network detection Systems : Network monitoring - The process of using data-capturing device or other method to intercept information from a network
-
NIDS
Network IDS (NIDS) Can Not analyze encrypted traffic
-
Host IDS (HIDS)
- Host IDS
- Installed on a Host
- Detects attacks against the host and the level of their success
- Relies on the auditing and loggong capabilities of the operating system
- Can view encrypted data in transit
- Is detectable and can be a target of attack
-
Passive IDS
- Looks for secuity breaches, but effectively takes no action
- Logs suspicious activity
- Generates alerts if the attack is deemed to be severe
- the Network analyst interprets the degree of the threat and responds accordingly
-
Active IDS
- Active IDS - Can be configured to take specific actions
- Can automate responses including dynamic policy adjustment and reconfiguartion of supporting network devices
-
False Positives
- IDS reports legitimate activity as an intrusion
- caused by
- Poorly tuned
- bad/outdated baseline
-
False Negatives
- IDS Fails to detect malicous intrusion
- caused by
- New attacks not yet identified by vendor
- poorly wriiten signatures
- Outdtaed signature files
- Patient, stealthy attacks
-
IPS
Intrusion Prevention System
-
NAC
- Network Access Control
- Evaluates system security status before connecting to the network
- Ani-virus stats
- System update level
-
802.15
Wieless Personal Area Network (WPAN) Bluetooth is an implemenation of WPAN
-
WEP
- Wired Equivalent Privacy
- Intended to provide the equivalent security of a wired network protocol
- Encyrpts data using RC4 algorithm
- No Authentication
- Open System Auth
- Shared Key Auth
-
WPA
- WiFi Protected Access
- WPA implements most of IEEE 802.11i
-
WPA2
- Mandatory to be Wi-Fi certified
- NIST FIPS 140-2 compliant
-
RC4
Symmetic Key Alogrithms Steam: Variable key length
-
-
Bluejacking
Sending of unsolicited messages over bluetooth
-
Bluebugging
Taking control of a bluetooth device for personal gain (phone calls,etc.)
-
Bluesnarfing
Theft of information from a wireless device through a Bluetooth connection
-
Packet Sniffing
- Captures all the data that pass through a given network interface
- promiscous Mode: sniffer is capable of capturing All packets traversing the network
- Possible to capture both wireless and wired packets
- Can capture and read plaintext
-
War Chalking
War Charking is the drawing of symbols in public places to advertise an open WiFi wireless network.
-
Types of Hypervisor
- Type 1 or native, bare-metal
- Type 2 or hosted
-
Vulnerabilities of Virtualization
Host OS must be secured
-
SSH (Secure Shell)
Port 22
-
ICMP
Internet Control Mesage Protocol
-
NAT
- Network Address Translation
- Translates a private address into a public address
- Hides devices in a private network
- Allows sharing of a single public IP address or a pool of public IP addresses
-
Types of NATs:
Dynamic NAT - A pool of public IP addresses is hared by an entire private IP address and use public addreeese only for the NAT to translate to and communicate with the outside
- Static NAT - Accomplished by a straightforward, stateless implementation that transforms only the network part of the address, leaving the host paart intact. The payload of the packet must also be considered during the translation process.
- Port Address NAT
-
Port Address translation (PAT)
- Allows many hosts to share a single IP address by multiplexing strams differentiated by TCP/UDP port numbers
- Poets are selected at random for each insidfe address which generates a request
-
Security Zones
- DMZ: contains public facing servers
- Bastion hosts: any hardened system located in the DMZ (File server, Web Server)
- Internal: Internet network ti include systems and work stations you do not want anyone outside of your network to directly connect to.
- External: Segment of tyour network set aside for trusted partners, organizations
- Internet: Unsecure secity zone
-
VPN Concentrator
- A Single devi ce that handles large number of VPN tunnels
- Primarily used for remote sccess VPN's
- Usually two flavors; SSL or IPSec (some can do both, ie. CISCO)
- Examples: Cisco
- Netgear
- Juniper
-
AAA
- Authentication
- Authorization
- Accounting
-
Idenification
- Process of identifying an entity for authentication
- User Identification Guidelines
- Uniqueness - User ID must be unique identifier to provide positive id
- Non-descriptive - Usre Id should not expose the associated role or job function
- Issuance - The process od issuing id's must be secure and documented.
- Most common forms:
- User Name
- User ID
- Account Number
-
Authentication Types Access Control and Identity Management
- Something you know - Password or PIN
- Something you have - Smart Card, Token, or Device
- Something you are - Fingerprints or retinal Patten
- Something you do - Keystroke Auth
- Somewhere you are - Location
-
Biometic Examples
- Fingerprints Easy to use Assoiciated with criminlals
- Iris High Accuracy & non-intrusive Expensive
- Retina High Accuracy Intrusive and Expensive
- Face Easy to use Accuracy issues
- Hand Easy to use Accuracy issues Accuracy issues
- Voice Inexpensive and non-intrusive
- Signature Inexpensive and non-intrusive
-
Biometric Error Rates
- Type 1 Error : False Reject Rate (FRR)
- Type 2 Error : False Accept Rate (FAR)
- Crossover Error rate (CER)
-
Federation
A collection of computer networks that agree on standards of operation such a security standards
-
Federated Identity
Means of liknking a user's identiy with their privileges
-
PAP
Password Authentication Protocol - sends the username and password to all appliications and systems they need when they log on
-
SPAP
- (Shiva Password Authentication Protocol)
- Encrypts the username and password
-
CHAP
- Challenge Handshake Authentication protocol
- Encrypts passwords during logon
- Challenges/response method of authenitication
- Re-authentication to protect against man-in-the middle attacks
- Credentials are hashed using MD5
-
TOTP
- Time-Based One-Time Password
- Algorithm uses a time-based fact to create unique passwords
-
HMAC
- HMAC-Based One-Time Password
- Algorithm is based on using HMAC algorithm
-
SSO
- Single Sign-On -
- Provides access to all authorized resources with single instance of authentication (authenticates only once)
- Uses centralized authentication servers: Once authenticated, subjects can use the network/resources without being challenged again.
- If account is compromised, malicious subject has unrestricted access
-
NTLM
- New Technology LANMAN
- Challenge-Response Auth replacement for older LANMAM protocol used to auth when Kerberos is not applicable/available Both versions lack mutual auth
-
NTLM v1
- First available to NT OS before NT4 service pack 4
- Uses DES for enciphering
-
NTLM v2
- First available to NT OS before NT4 service pack 4
- Uses MD5 for enciphering
-
LDAP
- Lightweight Directory Access protocol
- Folloes X.500 standard
- Directory uses a hierachical design with a root object at the top followed by organization and OU containers for logical organization
- Port 389 (standard)
- Port 636 LDAP over TLS/SSL (secure)
-
SASL
- Simple Authentication and Sercurity Layer
- Can use Kerberos, MD5, S/Key, IPSec, TLS
-
RADIUS
- Remote Authentication Dail-In User Service
- Centralized system for auth, auth and accounting (AAA)
- Supports PAP, CHAP and EAP
- Authentication and Authorization (Only Password is encypted
- Uses UDP port 1812 for auth
- Uses UDP port 1813 for accounting
-
RADIUS Client
tpically a network access server such as Dial-up Server, VPN srever, or Wireless AP
-
RADIUS Server
- Stores all user auth and network service access information
- Ability to implement auditng and accounting
-
SAML
- Security Assertion Markup Language (SAML)
- An openstandard based on XML that is used for auth and auth data
- Service providers often use SAML to prove the ID od someone connecting to the service
-
Transitive Trusts
The trusts between (A) and (C) the relationship flows
-
Access Control Best Practice
- Explicit Deny - You specifically deny a subject (person, IP address, etc.)
- Implicit - By not specifically allowing access
- Least privilege - Give users omly the permissions they need to do their work
-
MAC
- Mandatory Access Control
- Most secure
-
RBAC
Role-Based Access Contol
Problem - Privilege creep
-
Rule-Based Access Control
- Limits the user to settings in preconfigured policies
- Normally found in firewalls and routers (ACLs)
-
DAC
- Discretionary Access Control
- Allows usres to share info dynamically with others
- Ower establishes privileges
-
Privileges
Given to an individual because of where they work or the group they belong to
-
Rights
Assigned to an individual based upon their need-to-know
-
Permissions
- Based upon users need-to-know
- File Controls
-
Privilege Escalation
The act of exploiting a bug or design flaw in a software application to gain access
-
Vertical Privilege Escalation
Lower privilege user accesses functions or content reserved for higher privilege users
-
Horizonal Privilege Escalation
Normal user accesses functions or content reserved for other uses
-
Virus
- Spam - Malwrae
- Replicates inself on a system
- Goals:
- Renders your system inoperable
- Spreads to thers systems
- Symptoms:
- Programs on your system start to load more slowly
- Unusal files appear or disappear
- program sizes change from the installed versions
-
Worm
- Adware - Computer program that propagates on it's own
- Does not need a host application to be transported
- Self containied
-
Trojan Horse
- Ransonware - A program that is disguised as another program
- May be included as an attachment or as part of an mail, website, DL's
-
Logic Bomb
Spyware - Malware inserted into a system which sets off an action when specific conditions are met
-
Rootkits
- Zombies - Malware that has the ability to hide spyware blockers, anti-virus program, and system utilities
- Runs at the root level or admin access
-
Polymorphic Malware
Botnets
-
Virus Types
- Armored - Makes itself difficult to detect or analyze
- Retrovirus -Designed to avoid discovery by actively attacking the anti-virus programs attempting to detect it.
- Stealth - Hides itself by intercepting disk access requests
- When an anti-virus prg tries to read files or boot sectors to find the virus, the stealth virus feeds the anti-virus prg a clean image of the file or boot sector
- Boot Sector - Speads by infecting boot sector
- File infector Virus (Parasitic Virus) - Copies themselves into other programs
- When an infected file is executed, the virus is loaded into memory and tries to infect other executables
- Macro Virus - Malware that is encoded as a macro embedded in a document
- Programs such as word and Excell allow programmers to expand the capability of the application.
- Multipartite - Propagates by using both sector and file infector methods
-
Backdoors
- Allows access to a computer (i.e server, workstation, network device)
- Full access to every aspect of the device
- Can be spread via malware
- Example : Back Orfice or NetBus
-
Mitigation
- Up-to-date Anti-virus
- IDS/IPS
-
Adware
- Frequently refers to any software which displays advertisements
- Some are spyware or malware
-
Denial of Service (DoS)
- Denial of Service -
- Prevents access to resources for authorized users
- Common DoS attacks: - prevent access to resources bt users authorized to use those resources. Most simple DoS attack oocur from a single, and a specific server or organization is the target
- Ping-of-Death
- Land Attack
- teardrop
- SYN Flood
-
TCP SYN or TCP ACK Attack
- Attacker sends a succession of SYN requests to a target
- Can be Mitigated on most modern networks
-
DDoS
- Amplifies a DoS by using multiple computers to conduct an attack against a single entity (Smurf Attack)
- Compromised systems are referred to as Bots or Zombies
-
MitM
- Man-in-Middle Attacks
- Occurs when someone/-thing intercepts data and retransmits to another entity
-
Session Hijacking
Information (credentials) captured over a network and replayed later
-
Spoofing
Spoofing is a situation in which one person or program successfully masquerades as another by falsifying data
-
IP Address spoofing
Is creation of TCP/IP packets using someones else IP Address
-
MAC spoofing
is a technique for changing a factory-assigned media Access Contol (MAC) address of a network interface on a networked device.
-
ARP Poisoning
An attacker (on the same switched network) forges ARP replies to a vitim system and device like the default gateway.
-
Xmas Attack
- Scans/attack conducted with Xmas packets
- Packet with every single option set for whatever protocol is in use
- By oberving how a host responds to the packet, assumptions can be made regarding the host's operating system
-
Transitive Access
- A service that involvs another service to satisfy an initial request
- Problem arises from a poor choice of access control mechanism, one that uses auth to make access secisions
-
SPIM
SPAM over Instant Messaging
-
SPIT
SPAM ocer Internet telephony
-
Phishing Attacks
Uses social engineering (Emails) to steal personal identity data and financial account credentials
-
Spear Phishing
Email/IM scam to a particular target, some inside information about the organization or individual is needed
-
SHE
Structured Exception Handler
-
Cross-Site Scripting (XSS)
- Vulnerability where an attacker can add comments/code to web pages which allows code injection
- Code could redirect valid data to the attacker
- Typically found in web pages
- Safeguards- Input validation
- Disable the running of scripts
- Keep browser and apps updated
- Keep web server app updated
-
XSRF
- Cross-site Request Forgery - Session Riding
- One-Click attack
-
SQL Injection
Code injected into a database via a web form
-
LDAP Injection
Can occur anywhere that underlying code use some type of input for LDAP searches, queries or any other LDAP function
-
XML Injection
- Attack technique used to manipulate or compromise the logic of an XML app or service
- Injection can cause the insertion of malicious content into the resulting messgae/document
-
Cookies
- Text file associated with your current web session and/or user information for a site
- Save your internet activity locally (not data)
- Browsers offer setting to help control vulnerabilities from cookies
- Transient vs Persistant cookies
-
Authenticode
Code signing mechanism, identifying the publisher
-
Zero Day Attacks
- Thrat that exploits vulnerabilities thst are unknown to others or the software developer
- Occur during the vulnerabilities window
Defense - Firewall (Comptia) No defense, until sig comes out
-
-
Port 115
SFTP - Simple File Transfer Potocol
-
Port 119
NNTP - Network News Transfer Potocol
-
Phyiscal Security
Which shields the organizaton from attackes attempting to gain access to it's premises; examples includes sensors, alarms, cameras, and motion detectors.
-
-
SLE
Single Loss Expectancy
-
ARO
Annualized Rate of Occurrence
-
ALE
Annualized Loss Expectancy
-
RAID Level 0
- Striping
- Highest Performance
- No Redundancy 1 fall = all fail
- Minimal of 2 Disks
-
RAID Level 1
- Mirroring
- Duplicates data on the disks
- Expensive; double cost of storage
-
RAID Level 0+1
- Striping with dedicated parity
- Excellent Performance; fault tolerance
- Write requests suffer from same single parity-drive
-
RAID Level 3/4
- Striped with dedicated parity
- Excellellent performance; fault
- Writes request suffer from same single parity-drive
-
RAID Level 5
- Clock-level striping with distributed parity
- Best cost/performance for networks; high performance; high data protection
- Write performance is slower than RAID 0 or RAID 1
- RAID 5 uses Databases, Min 3 Disks
- RAID 6 needs 4 or more disks
-
ISA
Interconnection Security Agreement
-
MOU
Memorandum of Understanding
-
SLA
Service Level Agreement
- MTBF - Mean Time Between Failures
- MTTR - Mean Time to Repair
- MTD - Maximum Tolerable Downtime
-
Fuzzing
- Used to test for security problems in software or computer systems
- Used in large software development projects that employ black-box testing
- An assurance of overall quality rather than a bug-finding tool
- Often finds odd oversights and defects which human tersters would fail to find
-
CB
- Configuration Baseline -
- Establishes the mandatory settings that systems must have in place to be accepted for use in the network
-
Application Hardening
Aplication headening is the process to address aplication security weakness by implementing ther latest software patches. The three main areas requiring hardening are operating system, network and applications
-
WSUS
- Windows Server Update Services
- Keep application patches current
- Vendors post patches on regular basis
- Large numbers of attacks today targets client systems
-
Data in Transit
Data moving between devices across an internal or external network
-
TPM
- Trusted Plaform Module - Bitlocker
- A microcontoller that stores keys, passwords, and digital certificates
- Typically affixed to the motherboard of a PC
- More secure from extermal software attack and phyical theft
|
|