Podcast
Questions and Answers
Welche Aussage beschreibt am besten die Sicherheitsmerkmale von WEP im Vergleich zu neueren WLAN-Sicherheitsprotokollen?
Welche Aussage beschreibt am besten die Sicherheitsmerkmale von WEP im Vergleich zu neueren WLAN-Sicherheitsprotokollen?
- WEP verwendet einen dynamischen Schlüssel, der es sicherer als WPA macht.
- WEP bietet ein hohes Maß an Sicherheit durch die Verwendung des Advanced Encryption Standard (AES).
- WEP ist der derzeit sicherste Standard für WLANs.
- WEP ist unsicher und für moderne Netzwerke ungeeignet, da es leicht zu knacken ist. (correct)
Was ist ein wesentlicher Vorteil von WPA2 gegenüber WPA hinsichtlich der WLAN-Sicherheit?
Was ist ein wesentlicher Vorteil von WPA2 gegenüber WPA hinsichtlich der WLAN-Sicherheit?
- WPA2 ist anfälliger für Brute-Force-Angriffe als WPA.
- WPA2 unterstützt ausschließlich die Kompatibilität mit älteren Geräten.
- WPA2 verwendet den Temporal Key Integrity Protocol (TKIP).
- WPA2 bietet ein hohes Maß an Sicherheit durch die Verwendung des Advanced Encryption Standard (AES). (correct)
Welche Funktion erfüllt WPS (Wi-Fi Protected Setup) und welches Risiko birgt es?
Welche Funktion erfüllt WPS (Wi-Fi Protected Setup) und welches Risiko birgt es?
- WPS ermöglicht die automatische Verbindung von Geräten mit dem Netzwerk durch Drücken einer Taste oder Eingabe einer PIN, birgt aber Sicherheitsrisiken, besonders bei der PIN-Option. (correct)
- WPS ist sicherer gegen Brute-Force-Angriffe.
- WPS ermöglicht eine manuelle Konfiguration des Netzwerks und erhöht dadurch die Sicherheit.
- WPS dient der kontinuierlichen Erneuerung des Schlüssels und bietet somit verbesserten Schutz vor Angriffen.
Welche Schutzmaßnahme wird empfohlen, um das Risiko von Angriffen auf WLAN-Netzwerke zu minimieren?
Welche Schutzmaßnahme wird empfohlen, um das Risiko von Angriffen auf WLAN-Netzwerke zu minimieren?
Was ist das Hauptziel eines ARP-Spoofing-Angriffs?
Was ist das Hauptziel eines ARP-Spoofing-Angriffs?
Wie funktioniert ein DNS-Spoofing-Angriff?
Wie funktioniert ein DNS-Spoofing-Angriff?
Welche Funktion hat eine Firewall in Bezug auf den Netzwerkverkehr?
Welche Funktion hat eine Firewall in Bezug auf den Netzwerkverkehr?
Was ist der Unterschied zwischen einem Intrusion Detection System (IDS) und einem Intrusion Prevention System (IPS)?
Was ist der Unterschied zwischen einem Intrusion Detection System (IDS) und einem Intrusion Prevention System (IPS)?
Warum ist ein gültiges Zertifikat für eine HTTPS-Seite wichtig?
Warum ist ein gültiges Zertifikat für eine HTTPS-Seite wichtig?
Was bedeutet der Begriff "Living off the Land" im Kontext von Cyberangriffen?
Was bedeutet der Begriff "Living off the Land" im Kontext von Cyberangriffen?
Welchen Vorteil bietet IPv6 im Vergleich zu IPv4 hinsichtlich der Erreichbarkeit von Geräten aus dem Internet?
Welchen Vorteil bietet IPv6 im Vergleich zu IPv4 hinsichtlich der Erreichbarkeit von Geräten aus dem Internet?
Was ist das grundlegende Prinzip von Zero Trust?
Was ist das grundlegende Prinzip von Zero Trust?
Welche der folgenden Optionen bietet die sicherste Möglichkeit, im Internet anonym zu bleiben?
Welche der folgenden Optionen bietet die sicherste Möglichkeit, im Internet anonym zu bleiben?
Was ist das Ziel von Asymmetrischer Verschlüsselung?
Was ist das Ziel von Asymmetrischer Verschlüsselung?
Wie funktioniert der Diffie-Hellman-Schlüsselaustausch?
Wie funktioniert der Diffie-Hellman-Schlüsselaustausch?
Was ist der Zweck von RSA in Bezug auf die Serverauthentifizierung?
Was ist der Zweck von RSA in Bezug auf die Serverauthentifizierung?
Was ist der Unterschied zwischen symmetrischen und asymmetrischen Schlüsseln im Bezug auf Signaturen und MAC?
Was ist der Unterschied zwischen symmetrischen und asymmetrischen Schlüsseln im Bezug auf Signaturen und MAC?
Was ist das Hauptziel bei der Nutzung eines VPN in einem Unternehmen?
Was ist das Hauptziel bei der Nutzung eines VPN in einem Unternehmen?
Welche Funktion hat ein Domänencontroller in einem Netzwerk?
Welche Funktion hat ein Domänencontroller in einem Netzwerk?
Was ist User-Agent-Spoofing und zu welchem Zweck wird es eingesetzt?
Was ist User-Agent-Spoofing und zu welchem Zweck wird es eingesetzt?
Welchen Zweck hat der Befehl netdiscover -r 10.0.2.1/24
?
Welchen Zweck hat der Befehl netdiscover -r 10.0.2.1/24
?
Was ermöglicht der Befehl echo 1 > /proc/sys/net/ipv4/ip_forward
im Kontext der Netzwerkkonfiguration?
Was ermöglicht der Befehl echo 1 > /proc/sys/net/ipv4/ip_forward
im Kontext der Netzwerkkonfiguration?
Welche grundlegende Funktion bietet das Tool Bettercap im Bereich der Netzwerkanalyse und -manipulation?
Welche grundlegende Funktion bietet das Tool Bettercap im Bereich der Netzwerkanalyse und -manipulation?
Was ist das Hauptziel eines ARP-Spoofing-Angriffs in Verbindung mit Bettercap?
Was ist das Hauptziel eines ARP-Spoofing-Angriffs in Verbindung mit Bettercap?
Was bewirkt ein DNS-Spoofing-Angriff?
Was bewirkt ein DNS-Spoofing-Angriff?
Was ist ein Fake Access Point?
Was ist ein Fake Access Point?
Was ermöglicht das Tool Msfvenom?
Was ermöglicht das Tool Msfvenom?
Was ist das Hauptziel von Metasploit?
Was ist das Hauptziel von Metasploit?
Was ermöglicht der Befehl Set PAYLOAD windows/meterpreter/reverse_https
in Metasploit?
Was ermöglicht der Befehl Set PAYLOAD windows/meterpreter/reverse_https
in Metasploit?
Was ist Autoit und wozu dient es typischerweise im Kontext von Cyberangriffen?
Was ist Autoit und wozu dient es typischerweise im Kontext von Cyberangriffen?
Was ist Beef (Browser Exploitation Framework)?
Was ist Beef (Browser Exploitation Framework)?
Was ist das Ziel eines XSS-Angriffs (Cross-Site Scripting)?
Was ist das Ziel eines XSS-Angriffs (Cross-Site Scripting)?
Was ermöglicht das Tool Weevly?
Was ermöglicht das Tool Weevly?
Was erlauben CVE-Nummern im Bereich der Cybersicherheit?
Was erlauben CVE-Nummern im Bereich der Cybersicherheit?
Welche Funktion hat das OCSP (Online Certificate Status Protocol)?
Welche Funktion hat das OCSP (Online Certificate Status Protocol)?
Was ist das Ziel eines Prompt-Injection-Angriffs?
Was ist das Ziel eines Prompt-Injection-Angriffs?
Welche Aufgabe hat ein Sicherheitsdienst wie CrowdStrike?
Welche Aufgabe hat ein Sicherheitsdienst wie CrowdStrike?
Was ist die Hauptfunktion von BIOS?
Was ist die Hauptfunktion von BIOS?
Was ist Tailscale?
Was ist Tailscale?
Was ist der Zweck eines DNS-over-HTTPS (DoH) Servers?
Was ist der Zweck eines DNS-over-HTTPS (DoH) Servers?
Was ist der Unterschied zwischen SmartDNS und VPN?
Was ist der Unterschied zwischen SmartDNS und VPN?
Flashcards
WEP (Wired Equivalent Privacy)
WEP (Wired Equivalent Privacy)
The original security standard for WLANs, insecure and easy to crack, using a weak 40-bit key, outdated and unsuitable for modern networks.
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access)
An advancement over WEP, uses Temporal Key Integrity Protocol (TKIP), dynamic keys, more secure than WEP but outdated with some security gaps.
WPA2 (Wi-Fi Protected Access 2)
WPA2 (Wi-Fi Protected Access 2)
Further development of WPA, uses Advanced Encryption Standard (AES), offers a high degree of security, widely used standard for WLANs.
WPA3 (Wi-Fi Protected Access 3)
WPA3 (Wi-Fi Protected Access 3)
Signup and view all the flashcards
WPS (Wi-Fi Protected Setup)
WPS (Wi-Fi Protected Setup)
Signup and view all the flashcards
WEP Hacking
WEP Hacking
Signup and view all the flashcards
WPA/WPA2 Hacking (with WPS)
WPA/WPA2 Hacking (with WPS)
Signup and view all the flashcards
WPA/WPA2 Hacking (without WPS)
WPA/WPA2 Hacking (without WPS)
Signup and view all the flashcards
ARP-Spoofing
ARP-Spoofing
Signup and view all the flashcards
DNS-Spoofing
DNS-Spoofing
Signup and view all the flashcards
Firewall vs IDS vs IPS
Firewall vs IDS vs IPS
Signup and view all the flashcards
Certificates
Certificates
Signup and view all the flashcards
LOLBins
LOLBins
Signup and view all the flashcards
IPv6
IPv6
Signup and view all the flashcards
Zero Trust
Zero Trust
Signup and view all the flashcards
ElGamal
ElGamal
Signup and view all the flashcards
Diffie-Hellman
Diffie-Hellman
Signup and view all the flashcards
RSA
RSA
Signup and view all the flashcards
DHE/ECDHE
DHE/ECDHE
Signup and view all the flashcards
Employee on Site
Employee on Site
Signup and view all the flashcards
Remote work staff
Remote work staff
Signup and view all the flashcards
Proxies secure clients
Proxies secure clients
Signup and view all the flashcards
Reverser proxy secures servers
Reverser proxy secures servers
Signup and view all the flashcards
Domain controller
Domain controller
Signup and view all the flashcards
User Agent spoofing
User Agent spoofing
Signup and view all the flashcards
netdiscover -r 10.0.2.1/24
netdiscover -r 10.0.2.1/24
Signup and view all the flashcards
nmap -T4 -A -v 10.10.10.29
nmap -T4 -A -v 10.10.10.29
Signup and view all the flashcards
Arpspoof
Arpspoof
Signup and view all the flashcards
Bettercap
Bettercap
Signup and view all the flashcards
hstshijack
hstshijack
Signup and view all the flashcards
Windows Recall
Windows Recall
Signup and view all the flashcards
DDoS
DDoS
Signup and view all the flashcards
Amplification-Angriffe
Amplification-Angriffe
Signup and view all the flashcards
BigPhish
BigPhish
Signup and view all the flashcards
BIOS
BIOS
Signup and view all the flashcards
WannaCry
WannaCry
Signup and view all the flashcards
Cryptomixer
Cryptomixer
Signup and view all the flashcards
Zero Trust
Zero Trust
Signup and view all the flashcards
Phrack
Phrack
Signup and view all the flashcards
Intel ME
Intel ME
Signup and view all the flashcards
MagicDNS
MagicDNS
Signup and view all the flashcards
Study Notes
WEP (Wired Equivalent Privacy)
- An original security standard WLANs used
- It has weak encryption that can easily be cracked
- It uses a weak 40-bit key
- It is outdated and unsuitable for modern networks
WPA (Wi-Fi Protected Access)
- An advancement over WEP
- It uses Temporal Key Integrity Protocol (TKIP)
- Dynamic keys are used, making it more secure than WEP
- It is outdated and has some security vulnerabilities
WPA2 (Wi-Fi Protected Access 2)
- Built as an evolution of WPA
- Advanced Encryption Standard (AES) is employed
- Security is enhanced significantly
- It is a widely used standard for WLANs
WPA and WPA2 Features
- Supports compatibility with older devices
- Existing security vulnerabilities stem from WPA
WPA3 (Wi-Fi Protected Access 3)
- The newest security standard for devices
- Uses Simultaneous Authentication of Equals (SAE)
- It enhances security against brute-force attacks
- Currently the most secure standard for WLANs
WPS (Wi-Fi Protected Setup)
- Enables automatic device connections to a network
- Connection occurs by pushing a button or entering a PIN
- It is practical but poses security risks, especially with the PIN option
WEP Hacking
- WEP is vulnerable to brute-force attacks
- The entire network traffic can get intercepted during an attack
- The encrypted key can be cracked through brute-force
- WEP is easily cracked, because it uses weak 40-bit keys
WPA and WPA2 Hacking (with WPS)
- With WPS enabled and set to PIN-based config, an 8-digit PIN can be easily hacked
- The attack is relatively fast because the PIN comprises only 4+4 digits
WPA and WPA2 Hacking (without WPS)
- Deauthenticate the target to force re-authentication
- Four-way handshake of the victim gets recorded
- Use a dictionary attack on the hash to crack the password
Protecting Against Attacks
- Do not use WEP for security
- Opt for WPA2 or WPA3
- Disable WPS
- Set a very difficult password
ARP-Spoofing
- A “Man-in-the-Middle” is positioned during an attack by sending fake ARP messages to both the router and the victim
- The attacker tells the router that their MAC address is that of the victim, and vice versa; all data packets are routed through the attacker
- The ARP protocol doesn’t verify the IP and MAC address pairings, enabling the attacker to pose as either the router or victim
DNS-Spoofing
- The attacker manipulates the victim’s DNS queries by directing them to a fake website
- The attacker sends false DNS responses with a fake IP address, redirecting the victim
Summary of Spoofing Attacks
- During ARP-Spoofing the attacker intercepts data by spreading false MAC addresses, positioning themselves between the router and victim
- DNS queries are manipulated during DNS-Spoofing to redirect the victim, leading to phishing
Proxies Explained
- Proxys secure clients by regulating outgoing traffic and hiding the client's IP address Reverse proxys secure servers by regulating ingoing traffic, and they hide the server IP for load balance
Firewalls vs IDS vs IPS
- A Firewall either blocks or allows traffic based on set rules
- An IDS actively detects and reports suspicious activity but does not intervene
- An IPS actively detects and blocks suspicious activity
Certificates
- Certificates determine if a server is trustworthy
- The server must renew the certificate every 3 months
- An HTTPS site always needs a present and current certificate
- Without a valid certificate, the connection is marked as unsafe, and modern browsers may block access
Trust Chain
- The CA signature involves combining the server's public key with the CA's private key to form an encrypted server public key
- Trust is established if the encrypted server public key, combined with the CA public key, matches the server's public key
LOLBins
- In "Living off the Land" attacks, the attacker uses existing programs and scripts of the system to avoid detection
IPv6 Addresses
- IPv6 can theoretically assign every device a unique, public IP, making NAT unnecessary
Zero Trust Explained
- With zero trust, no one is automatically trusted within or outside the network
- System, data, and application access is granted based on verification, regardless of network location
Browsing Anonymity
- Browsing Chrome over Tor anonymizes traffic but lacks the privacy features of Tor Browser
- Using Chrome within Tor Browser is theoretically the best solution, but is rarely practical, given that there are many anonymity layers
- Tor Browser alone provides the most security, while Chrome with Tor offers basic anonymity only
Anonymity Networks
- Kali anonsurf routes traffic completely over the Tor network
- Starlink IPs cannot provide the geolocation data that traditional ISPs can
Asymmetric Encryption : ElGamal
- A public/private key pair is created, and the public key is shared to allow others to send encrypted messages that only you can read
Diffie-Hellman Key Exchange
- A symmetrical key is created without transmitting it over the internet
- Parties exchange public data to reconstruct the same shared key
Key Elements for Encryption
- Asymmetric Keys are used for signatures
- Symmetric keys are used for MAC
Encryption Key Points
- Used for authenticating a server’s realness
- Ephemeral session keys are securely negotiated using DHE/ECDHE
- Agreed-upon session key encrypts subsequent communications
- The use of Diffie-Hellman is continuously renewed
VPN Usage In Business
- The company either manages its own VPN server or hires a VPN provider to have a public IP address that is solely theirs; this is a "company VPN server"
- VPN usage allows employees to have a secure and adaptable way to be productive, irrelevant to location
User Connection
- Employees can connect to the company’s network through Ethernet or WLAN in their office space (internal IP Address will be assigned to device) while remote workers connect through a company VPN client (VPN server then assigns an IP address to device)
- Both locations grant the same amount of user resource access
Spoofing User Agent
- User agent spoofing involves changing the user agent string sent to impersonate another device, browser, or OS
Gathering Information Commands
- Shows all IP addresses in a give range netdiscover -r 10.0.2.1/24
- Zenman provides a GUI
ARP Spoofing Commands
- arpspoof -i [interface] -t [clientIP] [gatewayIP]
- arpspoof -i [interface] -t [gatewayIP] [clientIP]
- arpspoof -i eth0 -t 10.0.2.7 10.0.2.1
- arpspoof -i eth0 -t 10.0.2.1 10.0.2.7
Web Interface Usage
- bettercap -> provides a web interface (http-ui) user/pass -Commands
- bettercap -iface eth0
- help -> help [module] -> [module] on
- Set [parameter]
- Caplets.show
Arp Spoofing
- Net.probe on
- Set arp.spoof.fullduplex true
- Set arp.spoof.targets [ip]
- Arp.spoof on
- Set net.sniff.local true
- Net.sniff on
HSTS-Hijacking
- downgraded through “ssl strip”
- In Chrome the HTST secure DNS must be “off” to work normally
Commands and Protocols
- Set dns.spoof.address to redirect traffic -Set Dns.spoof.all true
- Set the "dns.spoof.domains" parameter to reroute from a certain site. -dns.spoof on
Backdoor Protocol
- Command Structure
- Msfvenom -help and *Msfvenom --list payload give possible options
- Msfvenom -payload [payload] [options] = [parameter] [out] is the construction for backdoor commands
Metasploit Usage
- Steps for use
- Msf console
- Use exploit/multi/handler for show options
- Set PAYLOAD windows/meterpreter/reverse_https
- Show Options for further instrcutions
Exploits
- Autoit can be used for non-friendly hacks
- port forwarding is not for local IP addresses
###Beef Explained
- If a Javascript script is preformed correctly it will connect the browser to beef
Meterpreter
- Command structure
- Msfconsole and Help
Website Upload
- Generates shellcode for uploaded and execution when launched
- help
- Weevly generate -[password]-[path/filename] creates a shellcode, then to execute command
- Weevly [url to file] -[password] connects to the URL for usage to initiate
Command Injection
- Allows you to run multiple commands in a row (ping command example)
XSS
- Client sided web application to store data with client
- <script>alert(“XSS”)</script>
- URL writing as GET and passing out
SQL Injection
- Various attacks for data integrity (Command examples below)
- Something' and 1=1-
- Something' and 1=0 --
- ‘,
- Something' or 1=1 -- -ZAP is an auto-scanner for target website vulnerabilities
Background Exploits
- Used with metasploit and veil-evaision (Background (current session))
Smuggling HTML
- Inserts short code into the HTML for downloads
Authentication Parameters
- Set EXE_Name (name/appearancesolexe
- Session
- Set session
- Set exelcustim/uar-www-html/backdoor.Exe Exploit
###Obfuscating
- Resorce Hacker and Confuser ex2 can preform functions
Password podcast
- Lockbit is a well renown ransomware group
WiFi Connections
- SSID-Irritum can incorrectly use wifi connections for other purposes
PFS
- Perfect forward secrecy with keys
###Computer Usage
- Quantencomputer problem with decryption,
- Requires the doubling of keys
Monitoring
- monitoring can only be viewed if an end-to-end is preformed
Key Windows Functions
- Windows recall to scan information, but be mindful of Ddos attacks
Exploits
- Cve nummern are indices dor exloits when a security breach is found
Protocols
- Ocsp protocol can do real time validity checks
Scams
- Like Linux, can be used to farm reputation or other activity
Injection
- Ki model input to trigger manipulation and commands
Protection Script
- Used for the client to send data to be checked externally ( Crowstrike example)
Malware
- Created an attack/damage with several malicious functions
Exploiting Devices
- Allows an exploit to connect on devices with several functions and ports
Security
Zero trust is where ever function is secured by encryption -open ssl is where tls is connected when safe -tablets with tls allow secure connection -safe boots do not require pc booting as often - telegram is not fully end-to-end -intel engine has independent funnctions
Security Exploits
- Can cause adds to drop on browsers or devices
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.