Network + Part 9

  1. Wireless deauthentication
    A type of wireless denial of service attack where the attacker sends crafted frames to make others disconnect. 802.11 management frames are necessary to make or break wireless connections. Deauthentication frames can be sent to the access point to force a device with a certain MAC address to disconnect.
  2. Phishing
    Attacker spoofs a website or email to attempt to get information from users.
  3. Tailgating
    An authorized person allows an unauthorized person gain access to an area. This can be non-consensual such as an attacker entering through a door before it closes.
  4. Shoulder Surfing
    The person behind the user looking at their screen.
  5. Secure SNMP
    Secure Simple Network Management Protocol. Only v3 and above have encrypted communication.
  6. RA Guard
    Router Advertisement Guard. IPv6 uses periodic router announcements. A rouge device could pretend to be a router. Switches can validate the RA messages.
  7. Port Security
    Prevents unauthorized access to a switch interface. You can also set a maximum number of MAC addresses and how many different MAC addresses are used.
  8. DAI
    Dynamic ARP inspection. Monitors the network to prevent on path attacks. Relies on DHCP snooping to know every device’s IP address.
  9. Data plane
    The plane that handles the forwarding of traffic.
  10. Control plane
    Manages the device.
  11. Control plane policing
    Prioritizes management traffic. Block unnecessary control plane traffic types such as SSH. Rate limit the traffic flows.
  12. Private VLANs
    Port isolation. Restrict access between interfaces even if they are in the same VLAN. For example, you can connect to an access point but not the other devices on that access point.
  13. Disabling unused interfaces
    Prevents someone from plugging a device into the network from any other device.
  14. NAC
    Network access control. 802.1X controls that say you can’t communicate unless you are authenticated.
  15. Default credentials
    Most devices have default usernames and passwords. These MUST be changed immediately.
  16. DHCP snooping
    IP tracking on a layer 2 device such as a switch. The switch acts as a DHCP firewall. Trusted routers, switches, and DHCP servers are allowed in. Untrusted devices are filtered out.
  17. Default VLAN
    All non trunk access ports are assigned to a VLAN without any additional security. Anyone connecting will be part of the default VLAN. Example all the ports/interfaces on a switch are assigned to the default VLAN. They need to be changed since we don’t have separate administrative controls.
  18. ACL
    Access Control Lists. Allow or disallow traffic based on IP.
  19. Firewall Rules
    Set up rules with a number, IP, Remote Port, Local Port, Protocol (TCP/UDP), Action(Allow/Disallow).
  20. MAC filtering
    Media Access Control or hardware address being filtered. A flaw is that someone can scan for MAC addresses through and Access Point and when one leaves, then spoof that address.
  21. Antenna placement
    Try to limit the signal outside of necessary work areas.
  22. Wireless isolation
    Wireless devices on an access point can’t communicate with each other.
  23. Geofencing
    MDM (Mobile Device Manager) allows for the device or application to restrict or allow features when the device is in a particular area. Device can also only authenticate when in a certain area.
  24. Captive Portal
    Authentication popup or website that allows you to enter a username and password when trying to authenticate / access a wireless network.
  25. IoT security
    Internet of Things devices are a huge security issue. They need to be segmented from the private network.
  26. Client to site VPN
    On demand access from a remote device. Example: Laptop turns on VPN connects through the public internet, goes through a VPN concentrator to a private network. The laptop can turn their VPN on or off as needed.
  27. Site to Site VPN
    Usually always on. 2 networks, each having a VPN concentrator connect to each other. Firewalls can act as a VPN concentrator.
  28. Clientless VPN
    Hypertext Markup Language version 5. HTML 5. Uses API support to encrypt messages.
  29. Full Tunnel
    All of the traffic sent to a network would go through the VPN concentrator. Even when accessing a third-party it would still need to go through the VPN concentrator.
  30. Split Tunnel
    Traffic to a private network will go through the VPN concentrator from the user. Traffic that is unrelated to the private network would be directed to a third party.
  31. Remote desktop connection
    Share a desktop from a remote location. Windows uses RDP Microsoft Remote Desktop Protocol. VNC Virtual Network Computing allows for full control of another computer. This is also a security risk.
  32. Remote Desktop Gateway
    Combine a VPN with Microsoft Remote Desktop.
  33. SSH
    Secure shell. Encrypted communications through tcp port 22.
  34. VDI
    Virtual desktop infrastructure. Users connect remotely to a pre-built desktop.
  35. Out of band management
    When a device is unable to connect and you need to use a physical interface such as a serial cable/console router.
  36. CCTV
    Closed circuit television. Video surveillance.
  37. Asset tracking tag
    A record of every asset. A sticker with a scannable code that will tell you where and when that device has been.
  38. Tamper detection
    Sensors or even stickers that detect if a device has been touched.
  39. Employee Training
    Train employees how to look for security issues.
  40. Access control hardware
    Security hardware such as a gate that needs to be unlocked with a keycard.
  41. Badge readers
    Keyed or wireless
  42. Biometrics
    Use fingerprint, retina, voiceprint to access a room.
  43. Access control vestibule
    2 doors, when one is opened the other locks.
  44. Sanitizing Media
    Factory reset or wiping data.
  45. Network Troubleshooting Methodology
    • 1. Identify the Problem
    • 2. Establish a Theory
    • 3. Test the Theory
    • 4. Evaluate the Results. Go back to step 2 if needed.
    • 5. Establish a Plan of Action
    • 6. Implement the Plan
    • 7. Verify Full System Functionality
    • 8. Document Findings
  46. The properties of Category 5-8 cables
    Image Upload 2
  47. Bandwidth
    Theoretical maximum data rate in bits per second. The size of the pipe.
  48. Throughput
    Amount of data transferred in a given timeframe. How much water is flowing through the pipe.
  49. Cable abbreviations U S F
    • U Unshielded
    • S Braided shielding
    • F Foil Shielding
    • (Overall Cable) / (Individual pairs)TP
    • Example: Braided shielding around the entire cable and foil around the pairs is S/FTP
  50. Plenum area
    There is open air circulation instead of ducts. A concern for smoke and toxic fumes.
  51. Plenum Rated Cables
    • PVC (polyvinyl chloride) is the traditional cable jacket.
    • Fire rated jackets is FEP (fluorinated ethylene polymer) or PVC
    • These are not as flexible.
  52. Serial console cables
    DB-9 and DB-25 The number represents the pins. Also called RS-232.
  53. Rollover cable
    Standard RJ-45 to serial console connection.
Author
dsagent
ID
363254
Card Set
Network + Part 9
Description
Deauthentication Social Engineering Network Hardening Wireless Security Remote Access Physical Security Cable connectivity
Updated