chapter 4 Flashcards

1
Q

SCP?

A

SCP= Secure Copy: securely transferring files between hosts uses SSH technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP?

A

FTP= File Transfer Protocol: transfer a file between hosts over a network but all text is shown in plain text over network and is not secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a Network drive?

A

a HDD/ storage on another computer. depends on permissions but some can only ready, write ,etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

command used to map a remote systems drive is?

A

net use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the command to display a list of the system’s network shares?

A

Net view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA?

A

Confidentiality, Authenticity and Integrety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the 4 goals to secure a network design?

A
  1. Availability: DOS attacks used, 2. Confidentiality: protecting network design, 3. Functionality: altering how packets are sent/ processed by network devices, 4. Access Control: control of access to systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fingerprinting a network?

A

identify devices within a network based on network traffic information such as port numbers, TTL values, etc. can be passively monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the 4 goals to secure a network design?

A

availability, confidentiality, functionality, Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

death of the perimeter?

A

the idea that creating a 100 percent secure network is impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

flooding?

A

DOS attack where tons o website connection requests are made with the intent of using up the servers ram/ cpu till it crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

spoofing?

A

attacker hides own ip address by using a fake one but as a result can not receive replies and must monitor progress of attack by sending separate connection requests from a legitimate ip address and seeing if they are able to still connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backscatter?

A

when a victim sends a series of replies to the spoofed IP address and the spoofed address happens to be an unintended user/device. the unintended device then is overwhelmed and losses service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP?

A

transmission control protocol: guarantees delivery of IP packets over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SYN?

A

Synchronization: 1st part of a 3 way TCP handshake for a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SYN-ACK:

A

Synchronization- Acknowledgement: second part of a 3 way network connection TCP handshake

17
Q

ICMP?

A

Internet Control Message Protocol: supervisor. protocol mesage to send error messages between computers

18
Q

HTTP?

A

Hyper text transfer protocol: sending data over the web protocol.

19
Q

Intermediary/ Intermediaries?

A

Bots: compromised devices running malware are remotely controlled by a bot-master (hacker) to do a DDOS attack.

20
Q

Handler?

A

a compromised device that is used to remotely control bots (botmaster) while also hiding the identity of the attacker because the hacker is indirectly controlling the bots.

21
Q

peer to peer redirect:

A

redirects legitamite p2p traffic to a specific host as if its the P2P server. **no bots needed.

22
Q

Reflected attack?

A

spoofed IP that is the IP of the victim, packets sent to high volume server that is legitimate company that then responds to the spoofed IP causing a DOS.

23
Q

DRDOS?

A

Distributed Reflected Denial Of Service: uses a botnet and a reflected attack.

24
Q

Smurf Flood:

A

incorrectly configured router used to flood devices, uses broadcasts from inside the network.

25
Q

what are some methods to stop a DOS attack?

A

black holing, Validating the handshake, Rate limiting

26
Q

how does the (Validating a Handshake) method work to mitigate DOS attacks on host servers/ devices? (False OPENS)

A

the border router/ firewall accepts the SYN message only once it has sent out a SYN/ACK back to the sender and has gotten a ACK packet, this legitimizes the sender before… sending the connection onto the internal server. this also stops any spoofed IP SYN messages from going to the internal server b/c a spoofed IP can not reply to a SYN/ACK message.

27
Q

rate limiting?

A

when a limit is set on a certain type of ip packet from entering a network such as ICMP. This allows other traffic to continue on the network even if all the ICMP slots are taken over by a DOS attack. This can cause a bottleneck at the external network/internet router and cause issues on the internal network.

28
Q

what is the only true way to stop a DDOS attack?

A

using the ISP and the owners of computers that have been compromised and turned into bots, to fix their devices and stop the attack.

29
Q

ARP poisoning?

A

attack changes host ARP (MAC) Tables. attacker must have a pc on the LAN and can do a man in the middle attack or DOS. the ARP: Address Resolution Protocol tables on each device on the LAN are altered so that they have incorrect ip and MAC addresses configured. this allows the attacker to send all traffic to themselves as if they are the default gateway (router) stopping all legitimate traffic or they can forward the information to the correct router after intercepting and reading packet streams. **attacker must send a contentious stream of ARP replies otherwise the devices will correct their ARP tales.

30
Q

RA?

A

Router Advertisements: an IPv6 router when added to the network, tells all hosts its presence and each host uses the SLACC: Stateless Address Auto configuration to derive their addresses.

31
Q

Dual stacked?

A

when a network device or host has both ipv4 and ipv6 addresses

32
Q

SLAAC?

A

Stateless Address Auto Configuration: used by ipv6 hosts to make their ip address for the ipv6 router/gateway.

33
Q

SLAAC ATTACK?

A

a ipv4 network has an ipv6 router installed by attacker. the hosts automatically make their own IPv6 addresses and become dual stacked. The attacker can do a man in the middle attack b/c the ipv6 router becomes the default gateway or they can send all traffic to a false DNS server and to false websites for fraud.