4 Network Security Flashcards
2 basic network connection options
1 Wired
2 Wireless
Ethernet cable =
RJ-45 connector (8 pin connector - 8 wires)
Telephone connectors =
RJ-11(6 pins)
Wi-Fi networks create -
wireless LANs
Internet Protocol main responsibilities (2)
1 providing an addressing scheme (IP addresses) that uniquely identify computers on a network
2 delivering information in chunks known as packets
3 TCP flags
1 SYN
2 ACK
3 FIN
The order of TCP flags
1 SYN
2 SYN/ACK
3 ACK
OSI Layer 7
7 Application
- determines how users interact with data
- web browsers, other client applications
OSI Layer 6
6 Presentation
- translates characters/bits
- encryption/decryption
OSI Layer 5
5 Session
- opening/maintaining/closing sessions between devices
OSI Layer 4
4 Transport
- (TCP/UDP)
- creates connections between systems and transports data in a reliable manner
OSI Layer 3
3 Network
- IP
- expands networks to many different nodes
OSI Layer 2
2 Data Link
- (MACs)
- transfers data between 2 nodes connected to the same physical network
OSI Layer 1
1 Physical
- responsible for sending bits over the network using cables, radio waves, fiber optics, etc
7 OSI layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
4 TCP layers
4 Application Layer (session, presentation, and application)
3 Transport Layer (same)
2 Internet layer (network)
1 Network interface (physical and data link)
IPv4 —- bit
32 bit, dotted quad, each number represented using 8 binary bits
NAT
(router/firewall) translates private IP addresses to public before sending packets
2 parts of an IP address
1 Network Portion (identifies the network that the device is connected to)
2 Host Portion (uniquely identifies the device on that network)
Subnetting is
The process of dividing a network into smaller networks
- network interfaces on devices within a subnet can communicate directly
- routers facilitate communication between different subnets
IPv6 —- bit
128 bit
- consist of eight groups of 4 hexadecimal numbers
- each number has 16 possible symbols (0-F)
Network ports are represented using a ____ with _____ possible values
16 bit binary number, 65,536 (0 - 65,535)
Well known ports (range)
0 -1023,
- ensures everyone on the internet will know how to find common services on a system
Registered ports (range)
1024 - 49151
- application vendors may register their applications to use these ports
Dynamic ports (range)
49152 - 65535
- applications may use these on a temporary basis
21
FTP control (the FTP uses port 21 to transfer data between systems)
22
SSH (the secure shell protocol uses port 22 for encrypted administrative connections)
25
SMTP (exchange email between servers)
53
used by DNS
Domain Name Server - translates human-readable domain names into machine-readable IP address equivalents.
443
HTTPS
110
POP (allows clients to retrieve email on port 110)
Network communications using the NetBIOS protocol for Windows (ports)
137, 138, 139
IMAP (port)
143
RDP (Remote Desktop Protocol) (port)
3389 - similar purpose to SSH
3 types of networks that use some form of authentication to limit access:
1 Pre-shared keys (encryption)
2 Enterprise Authentication (uses individual usernames and passwords)
3 Captive Portals (provide authentication on unencrypted wireless networks)
Encryption function
- takes radio waves (an insecure communications technology) and makes it secure
WEP -
Encryption protocol
(Wired Equivalent Privacy)
- insecure (don’t use)
WPA -
(WiFi Protected Access)
- 1st version (2003)
- used TKIP (Temporal Key Integrity Protocol)
- no longer secure
WPA 2
(2004) (WiFi Protected Access v2)
- uses CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol)
- an encryption protocol based on the AES (Advanced Encryption Standard)
- some potential issues, but is widely used and still considered secure
WPA 3
(2020)
- supports CCMP but adds SAE (new)
- SAE (Simultaneous Authentication of Equals)
- SAE = a secure key exchange protocol based on the Diffie-Hellman technique
Ping uses
ICMP (Internet Control Message Protocol)
- sends an ICMP echo request packet “hello, are you there?”
- remote system sends back ICMP echo reply “yes, I’m here”
Ping troubleshooting steps (4)
1 Ping the remote system
2 Ping another system on the internet
3 Ping a system on your local network
3 Try the same process from a different computer
creates customized ping requests (customized packets)
HPing
Traceroute
- determines the network path (how packets travel) between two systems (hosts)
- each line shows 1 hop on the network path
- lines with * show hops (systems) that are not answering ICMP echo requests
- Windows command combining ping and tracert (traceroute) functionality
Pathping
3 types of malware
(Viruses, worms, trojans)
- malicious software
2 components of malware
1 propagation mechanism
2 payload
Virus spreads
based on some type of user action
Worm spreads
on its own by exploiting system vulnerabilities, without user interaction
- then uses the infected system as a base to infect other systems on the LAN or internet
Trojan
- pretend to be legitimate software
- program runs as expected
- but also carries malicious hidden payload
Botnet =
- a network of infected computers used for malicious purposes
- attackers steal computing power, storage, or network connectivity
All eavesdropping attacks require
some compromise of the communication path between a client and server (after the attacker gains either physical or logical access to a network)
Man-in-the-middle attack
- tricks the sending system during the initial communication
- attacker may reconfigure a network device
- or use DNS or ARP poisoning
Eavesdropping methods:
- Network device or cable tapping
- DNS or ARP poisoning
Replay attack
- captures encrypted authentication token/info and creates a separate authenticated connection