Additional topics Flashcards
Encryption formula
C = E(p) = (p+k) mod (26)
p is plaintext and k is the key
Decryption Formula
P = D ( C ) = (C - k) mod (26)
C is ciphertext and k is the key
prevents unauthorized access to systems by monitoring network traffic, controls incoming and outgoing network traffic based on security rules
Firewalls
create encrypted connections over the internet, ensuring secure remote access and protecting data from interception.
VPNs
monitors network traffic for suspicious activity and alerts administrators but does not take action.
Intrusion Detection Systems (IDS)
actively analyzes traffic and takes automatic action (like blocking or rejecting traffic) to prevent attacks in real-time
Intrusion Prevention Systems (IPS)
is when a hacker attempts to crack a password by comparing it to a wordlist or “dictionary” of common words.
Dictionary attack
hackers will use multiple different combinations of letters, symbols and numbers repeatedly until it matches an existing password.
Brute force attack
is similar to the dictionary attack except it uses a precomputed table of common passwords and their corresponding hashes.
Rainbow attack
is a penetration testing tool used to assess web application security. Its key features include proxy web-crawling, HTTP request capture/interception, and HTTP request logging. It can also generate reports that indicate weaknesses.
BurpSuite
is a network protocol analyzer. It is widely used to capture and display packets from a network connection in real-time. It can be used for network troubleshooting and analysis.
WireShark
A network attack where the attacker sends fake ARP messages to link their MAC address with another device’s IP, enabling them to intercept or alter traffic.
ARP poisoning
maps IP addresses to MAC addresses, allowing devices on a local network to find each other.
ARP (Address Resolution Protocol)
is a secure version of HTTP that uses encryption (like SSL/TLS) to protect data between a web browser and a server
HTTPS (HyperText Transfer Protocol Secure)
is an attack that downgrades HTTPS connections to HTTP, letting attackers intercept and read sensitive data in plain text
SSLstrip