Bridging course Flashcards
exploit
takes advantage of a vulnerability
origin authentication
message is not a forgery and comes from who it is stated to come from, HMAC (hash message authentication code) is used for this
CSMA/CD
- device listens to ensure channel is idle
- device sends RTS message to AP
3a. receives CTS message from AP
3b. if no CTS received, waits random amt of time and sends again, repeats as necessary - device transmits data
- each transmission acknowledged, if not ack receiveed transmission restarts
Frequency channel saturation techniques
Direct-sequence spread spectrum (DSSS)- modulation technique to spread signal over a larger frequency band - used by 802.11b devices
Frequency hopping spread spectrum: rapidly transmites between various channels, devices must be synced in order to work. 802.11 used this, so do walkie talkies and bluetooth
orthogonal Frequency Division multiplexing this is a subset of frequency division multiplexing in which a single channel uses multiple channels on adjacent frequencies
data-integrity
guaruntees the message was not altered, MD5 is SHA hashing algorithms are used for this
name and describe the three categories of APIs
open API or public API: publicly available, some API providers require the client to get a free key. this is to help control the API request received and processed
internal or private APIs: used by and organization organizations organization
partner APIs: between a company and its business partners
wireless standards
- 11 2.4 ghz speed 2 mbs
- 11a 5 ghz speed 54 mbs
- 11b 2.4 ghz speed 11 mbs
- 11g 2.4 ghz 54mbs
- 11n 2.4/5 ghz 150-600 mbs
- 11 ac 6 ghz 1.3 gbps
- 11 ax 2.4/5 ghz knows as high efficency wireless, capable of 1/7 GHZ as well, newest standard
JSON
popular format used by web services to provide public data. can be used with most modern programming languages including python
syntax rules:
hierarchical structure
braces to hold objects and brackets for arrays
data is written as key/value pairs
keys are marked by double quotation marks, multiple key and value pairs are separated by commas
dynamic ARP inspection
requires DHCP snooping binding table to operate
can inpect source mac, dest mac, and IP address
to enable all must be entered on same command line
URI
Uniform resource identifier
makes up the entire https/https request to include the protocol, hostname, path and file name, and the fragment
wireless security methods
WEP: no longer secure
WPA: uses TKIP, more secure than WEP
WPA2: uses AES for encryption, standard for security
WPA3: introduced in 2018, mitigation against dictionary attacks, individualized encryption
client/server client operations
post - create
get -read
put/patch-update
delete - delete
name common data formats
JSON
XML
YAML
JSON-RPC
javascript object notation -remote procedure call
rpc is when one system requests and another system executes code and returns information
strengths: simplicity
assets
anything of value to the organization
intent based networking
translation: what does the business want, and how do those translate into actual polices
Activation: this is the installation of the policies created in translation onto the physical devices.
assurance: this is a constant process to ensure the intent is being met through verification and validation loop
CAPWAP
IEEE standard protocol that enables WLC to manage mult WLCs, encapsulates and fowards traffic bt ap and WLC
can use IPV4 or IPV6 but uses IPV4 by default
can use UDP port 5246 and 5347
CAPWAP tunnles use different ip protocols IPv4 uses protocol 17 and ipv6 uses protocol 136
vulnerabiltiy
weakness in a system, that could be exploited by a threat
DHCP snooping
deliniates between trusted and untrusted sources on ports, if untrusted DHCP traffic is limited
mitigation
counter-measure to reduce potential threat or risk