Podcast
Questions and Answers
What is a sniffer?
What is a sniffer?
An application or device designed to capture network traffic as it moves across the network.
Which protocols are vulnerable to sniffing attacks?
Which protocols are vulnerable to sniffing attacks?
Session hijacking relies on sniffing network traffic
Session hijacking relies on sniffing network traffic
True
___ is the process of giving DNS servers false records to get them cached.
___ is the process of giving DNS servers false records to get them cached.
Signup and view all the answers
What is the main goal of a Man-in-the-Middle attack?
What is the main goal of a Man-in-the-Middle attack?
Signup and view all the answers
What type of attack is carried out when a large amount of traffic is directed to the broadcast address of a network instead of to a specific system?
What type of attack is carried out when a large amount of traffic is directed to the broadcast address of a network instead of to a specific system?
Signup and view all the answers
What does DDoS stand for?
What does DDoS stand for?
Signup and view all the answers
The __________ Layer is responsible for breaking data into packets and transmitting it over the network.
The __________ Layer is responsible for breaking data into packets and transmitting it over the network.
Signup and view all the answers
Encryption primarily takes place at the Session Layer.
Encryption primarily takes place at the Session Layer.
Signup and view all the answers
What is port knocking?
What is port knocking?
Signup and view all the answers
Port knocking is susceptible to replay attacks.
Port knocking is susceptible to replay attacks.
Signup and view all the answers
What is one good way of protecting against replay attacks in port knocking?
What is one good way of protecting against replay attacks in port knocking?
Signup and view all the answers
What is IP Spoofing?
What is IP Spoofing?
Signup and view all the answers
Which of the following is a form of IP Spoofing?
Which of the following is a form of IP Spoofing?
Signup and view all the answers
MAC flooding aims to flood the switch with fake __________ addresses to all ports.
MAC flooding aims to flood the switch with fake __________ addresses to all ports.
Signup and view all the answers
Match the following with their definitions:
Match the following with their definitions:
Signup and view all the answers
What are some examples of what organizations are trying to protect in terms of cyber security? (Select all that apply)
What are some examples of what organizations are trying to protect in terms of cyber security? (Select all that apply)
Signup and view all the answers
The CIA Triad stands for Confdentiality, Integrity, and Accountability. Is this statement true or false?
The CIA Triad stands for Confdentiality, Integrity, and Accountability. Is this statement true or false?
Signup and view all the answers
Define Cyber Security based on the NIST Computer Security Handbook definition.
Define Cyber Security based on the NIST Computer Security Handbook definition.
Signup and view all the answers
___ is the concept that verifies users are who they say they are and that each input arriving at the system came from a trusted source.
___ is the concept that verifies users are who they say they are and that each input arriving at the system came from a trusted source.
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
What is the role of a protocol in computer communication?
What is the role of a protocol in computer communication?
Signup and view all the answers
Which protocol sends data out as soon as there is enough data to be transmitted?
Which protocol sends data out as soon as there is enough data to be transmitted?
Signup and view all the answers
DNS provides a distributed database over the internet that stores various resource records.
DNS provides a distributed database over the internet that stores various resource records.
Signup and view all the answers
DHCP is used within a network to simplify the configuration of each user’s ____________.
DHCP is used within a network to simplify the configuration of each user’s ____________.
Signup and view all the answers
Match the following TCP flags with their meanings:
Match the following TCP flags with their meanings:
Signup and view all the answers
Which of the following categories does human attack surface refer to?
Which of the following categories does human attack surface refer to?
Signup and view all the answers
Economy of mechanism states that security design should be as complex and large as possible.
Economy of mechanism states that security design should be as complex and large as possible.
Signup and view all the answers
What principle dictates that every access must be checked against the access control mechanism?
What principle dictates that every access must be checked against the access control mechanism?
Signup and view all the answers
Ethical hackers require permission to engage in __________ testing.
Ethical hackers require permission to engage in __________ testing.
Signup and view all the answers
Match the hacking methodology stage with its description:
Match the hacking methodology stage with its description:
Signup and view all the answers
Why is the reconnaissance stage crucial in security testing?
Why is the reconnaissance stage crucial in security testing?
Signup and view all the answers
Enumeration is used to collect usernames, hostnames, IP addresses, passwords, configurations, etc.
Enumeration is used to collect usernames, hostnames, IP addresses, passwords, configurations, etc.
Signup and view all the answers
Attackers break into the network, delivering targeted malware to vulnerable systems and people, often without the user being aware they are a target. They then map the organization's defenses from the inside and create a battle plan for information they intend to target, this process is known as ________.
Attackers break into the network, delivering targeted malware to vulnerable systems and people, often without the user being aware they are a target. They then map the organization's defenses from the inside and create a battle plan for information they intend to target, this process is known as ________.
Signup and view all the answers
What is the purpose of gaining elevated privileges in a cyber attack?
What is the purpose of gaining elevated privileges in a cyber attack?
Signup and view all the answers
Match the following social engineering example with its description:
Match the following social engineering example with its description:
Signup and view all the answers
Study Notes
Network Threats
- Malicious activities on the rise: Examples of malicious attacks are everywhere, and data breaches occur in both public and private sectors.
- Top countries of origin for cyberattacks: In 2020, China was the top country of origin for cyberattacks (41%), followed by the United States (10%).
Sniffers
- Definition: A technology used to steal or observe information, allowing the viewing of email passwords, web passwords, FTP credentials, email contents, and transferred files.
- How it works: When a network adapter is in promiscuous mode, a sniffer can capture all traffic, regardless of the destination address.
- Threats to protocols: Sniffers can target Telnet, HTTP, SMTP, POP, and FTP protocols, which are sent in the clear without protection.
Application Layer Attacks
- HTTP Basic Authentication: Insecure, as full credentials pass over the wire and are sent in the clear.
- DNS Attacks: DNS poisoning occurs when an attacker attempts to change the IP associated with a server maliciously, and DNS cache poisoning occurs when false records are cached.
- Session Hijacking: Occurs when an attacker takes over a session that has authenticated access to a resource, and can be categorized into three types: man-in-the-middle, blind hijack, and session theft attacks.
- Identifying an Active Session: An attacker must locate and identify a suitable session for hijacking, and determine or guess the sequence numbers.
Network Layer Attacks
- IP Vulnerabilities: Unencrypted transmission, no source authentication, no integrity checking, and no bandwidth constraints make IP vulnerable to attacks.
- IP Spoofing Attacks: An attacker sends packets from one IP address that appear to originate from another, and can be categorized into two types: blind and non-blind spoofing.
Data Link Layer Attacks
- MAC Flooding: The goal is to flood the switch with fake MAC addresses to all ports, causing the switch to fail.
- MAC Filtering and Spoofing: MAC filtering is a security control, but it is easy to spoof the MAC address, making it ineffective.
- ARP Spoofing and Poisoning: A rogue machine can spoof other machines by updating the ARP table, and ARP poisoning is a method of bypassing a switch where sniffing is performed on an IPv4 network.
Denial of Service Attacks
- Definition: A type of attack that prevents legitimate users from accessing the system, intended to prevent services from being delivered.
- Goal: To consume resources, disrupt a service or server, or prevent services from being delivered.### Networking Fundamentals and Security
Physical Limitations of Computers
- Number of users
- Size of files
- Speed of transmission
- Amount of data stored
Denial of Service (DoS) Attacks
- Aims to prevent valid users from accessing network resources
- Types of DoS attacks:
- Exploiting programming defects to cause a crash
- Consuming resources (e.g. SYN flood, ICMP flood)
Distributed Denial of Service (DDoS) Attacks
- Uses multiple hosts to amplify the attack
- Difficult to detect and defend against
- Has primary and secondary victims
- Attack can be difficult or impossible to track back to the source
DoS/DDoS Attacks: Exploitation of Programming Defects
- Examples of attacks:
- Ping of Death (PoD)
- Teardrop Attack
- Land DoS
DoS/DDoS Attacks: Consumption of Resources
- Examples of attacks:
- SYN flood
- ICMP flood
- HTTP flood
- Slowloris (a more potent variant of HTTP flood)
Botnets and the Internet of Things (IoT)
- Botnets consist of computers and devices (mainly IoT devices) infected with software for DDoS attacks
- Botnets can stretch across the globe
- Examples of botnets attacks:
- DDoS attacks
- Click fraud
- Stealing information
Mapping the OSI Model to Cyber Threats
- The OSI model is used to understand and teach distributed communication
- Each layer interacts with the layer above and below it
- The OSI model is implemented in both hardware and software
OSI Layers
- Application Layer: interacts with end-user applications, formats data for transmission
- Presentation Layer: responsible for coding and decoding data, encryption takes place here
- Session Layer: maintains communication sessions between computers
- Transport Layer: breaks data into packets, ensures proper transmission and error checking
- Network Layer: responsible for logical implementation of the network, includes IP addresses
- Data Link Layer: prepares data for transmission over the Physical Layer, includes physical addressing
- Physical Layer: responsible for the physical operation of the network
TCP/IP Model
- Similar to the OSI model, but with fewer layers
- The four layers are:
- Application Layer
- Transport Layer
- Internet Layer
- Link Layer
Internet Packet Encapsulation
- The process of adding headers and footers to packets as they travel through the network
- Each layer adds its own header and footer
Protocols
- A set of rules and formats that govern communication between computers
- Examples of protocols:
- TCP (Transmission Control Protocol)
- UDP (User Datagram Protocol)
- DNS (Domain Name System)
- HTTP (Hypertext Transfer Protocol)
Domain Name System (DNS)
- An application-layer protocol for mapping domain names to IP addresses
- Provides a distributed database over the internet
- Resource records include:
- Address (A) record
- Mail exchange (MX) record
- Name server (NS) record
DNS Caching
- DNS servers cache results for a specified amount of time
- Caching reduces network traffic and improves performance
- Associated privacy issues
Transport Layer: UDP (User Datagram Protocol)
- Lightweight and connectionless
- Small packet sizes
- No connection to create and maintain
- More control over when data is sent
- Does not compensate for loss of packet
- Does not deliver or guarantee packet delivery in order
Transport Layer: TCP (Transmission Control Protocol)
- Reliable and connection-based
- Uses sequence numbers, timeouts, and retransmissions to protect against loss and reordering
- TCP packets have a header section with a flags field
- Four possible flags:
- SYN (Synchronise)
- ACK (Acknowledge)
- FIN (Finished)
- RST (Reset)### Networking Layering Models and Protocols
- IPv4 addresses:
- Four-byte (32-bit) addresses that uniquely identify every device on the network
- Still the most common
- IPv6 addresses:
- 128 bits long
- Provide more unique device addresses
- More secure
IP Addressing
- IPv4 addressing:
- 32-bit binary address
- Divided into four parts, separated by dots, with each part consisting of 8 binary digits
- Each 8 binary digits are converted to decimal, hence called Dotted Decimal
- Each IP address represents both the network address and the host address
- Example: 192.168.10.0 is the network address, 192.168.10.255 is the broadcast address, and hosts can have any IP between 192.168.10.1 and 192.168.10.254
- Class C IP address: the network part is the first three dots, and the host part is only the last decimal number of the IP
IP Addressing - Dynamic
- Dynamic Host Configuration Protocol (DHCP):
- Used within a network to simplify the configuration of each user's computer
- To obtain, renew, or refresh a DHCP IP address dynamically, you can use:
- In Windows: ipconfig /registerdns
- In Linux: sudo dhclient
MAC Address
- Most network interfaces come with a pre-defined MAC address
- A MAC address is a 48-bit number usually represented in hex (e.g., 00-1A-92-D4-BF-86)
- On Windows, you can use getmac to obtain the MAC address of your machine, which is also listed when you type ipconfig
- On Linux, you can see your MAC address when you type ip addr, which is labeled as "link/ether"
Address Resolution Protocol (ARP)
- Connects the network layer to the data layer by converting IP addresses to MAC addresses
- ARP works by broadcasting requests and caching responses for future use
- The protocol begins with a computer broadcasting a message of the form "who has tell "
- When the machine with the IP address receives this message, it broadcasts the response " belongs to "
- The Linux and Windows command arp -a displays the ARP table
Network Interface
- A network interface is a physical device that connects a computer to a network
- It determines which network interface card the system will use
- Network interfaces are considered both Physical layer and Data link layer interfaces
- A computer may have multiple network interfaces
- Packets are transmitted between network interfaces
- Most local area networks (including Ethernet and WiFi) broadcast frames
- Each network interface gets the frames intended for it
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers various types of network threats and attacks, including sniffers, application layer attacks, network layer attacks, data link layer attacks, and denial of service attacks.