11 - TLS & Cyber-Security Flashcards

1
Q

SSL implements 3 cryptographic assurances

A
  • authentication
  • confidentiality
  • message integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used in https?

A

SSL uses TLS (transport layer security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does TLS do?

A
  • Secure the session layer on top of TCP
  • Provides stream abstraction like TCP
  • Adds confidentiality, integrity, authenticity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What four ciphers does a TLS session have?

A
  • Auth of server and (opt. client)
  • key exchange (RSA, DHE)
  • symmetric confidentiality (RC4, AES, DES)
  • integrity (HMAC-MD5, HMAC -SHA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does MAC stand for?

A

Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLS Message Format

A

TLS breaks down stream of data from apps into records
- 1-2^14 bytes length
- records are compressed
Appl -> record -> segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Session key Generation

A
C->S write (encryption)
C->S MAC
S->C with (encrypt)
S->C MAC
Client/Server Init Vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL attack procedure

A
  • SSL can be SUBVERTED by a hacker getting a client to connect its site first
  • Hacker then creates separate SSL connection to the real site and relays messages
  • Client only knows that it has connected to a different has name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of MitM attack

A

Man in the Middle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prevention of SSL Stripping?

A

Servers can uses HSTS (HTTP Strict Transport Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Attacks (3)

A
  • Listening in: Sniff and record network data
  • Modify, delete, insert and actively tamper with data
  • Prevent comms (DoS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Desirability of Network (4)

A
  • Secrecy/confidentiality (encrypt)
  • Integrity (MACs)
  • Authentication
  • Uninterrupted Comm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2 Attack (3)

A
  • Listening in, promiscuous mode (esp wireless)
  • Force packets to broadcast then use passive listening
  • Masquerade as DHCP/ARP server, then redirect packets to end host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 2 Attacks in Practice (3)

A
  • MAC Overflow attack; attacks sent packets with new etc addr to flood forwarding tables
  • Rogue DHCP server responds faster than real DHCP server
  • Rogue ARP server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 3 Attacks (2)

A
  • ICMP to tell source end-hosts to redirect traffic

- IP Hacking, where ISP advertises prefixes belonging to someone else to capture traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS Attack Method

A

Flood server with too many packets, such as ICMP ping requests

17
Q

Distributed DoS

A
  • penetrate many machines in semi-automatic fashion
  • Make hosts into zombies that attack on command
  • later start simultaneous attack on a victim
18
Q

Motivation for DoS (5)

A
  • Extortion
  • Revenge
  • Hacktivism
  • Bragging Rights
  • Lulz
19
Q

Simple DoS Attacks (4)

A
  • Wireless Jamming
  • Exploit Net Allocation Vector (NAT) at 802.11 link Layer
  • Flood attack (ping)
  • Amplification attacks, EDNS (Ext for DNS), request is for 60 bytes but response is 3000 bytes
20
Q

SMURF Attack

A

Floods server with ICMP each (pings)

21
Q

SYN-bomb attack

A

Sends SYN (synchronise) packets from bogus address, filling up tables and stop accepting connections/disable server