Chapter 4 - Sniffing and Evasion (Sniffing) Flashcards

1
Q

IP Packet header data and uses

source, destination addresses

QoS (Type of Service) field

Fragmentation data (Identification and Fragment Offset fields)

A

source/destination addresses - obvious

QoS and Fragmentation can be useful for crafting your own fragmented packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name for the first half of a MAC address

A

Organizational Unique Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP Commands

arp -a

arp -d *

netsh interface ip delete arpcache

A

arp -a shows arp cache

arp -d * and netsh command delete the arp cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exam tip

IPv6 Loopback address

A

0000:0000:0000:0000:0000:0000:0000:0001

abbreviate as ::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exam tips for IPv6

Loopback address

link-local addressing

A

0000:0000:0000:0000:0000:0000:0000:0001
abbreviate as ::1

Link Local reserved address block: fe80::/10

unique local address (equivalent of IPv5 private addressing) is in the fc00::/7 block

prefixes for site local addresses always FEC0:/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPv6 address types

A

unicast - works like IPv4

multicast - works like IPv4

anycast - works like multicast but designed to be received and opened by only the closest member of a group, identified in terms of routing distance (hops)

broadcast address in ipv4 no longer used. multicast performs that role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPv6 scopes for unicast and multicast

scopes define how far the address can go

A

link local - only hosts on same subnet. defines boundary at local segment. For private addressing only, similar to old 169.254.1-254.0 range

site local - only hosts in same organization (private site addressing). same rules as link-local (not forwarded by a router). Similar to the private Class 10 172 and 192 ranges of IPv4

global - everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lawful Interception

A

process of legally intercepting communications between 2 or more parties for surveillance on telecommunication, VOIP, data and multi service networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active and Passive wiretapping

A

active interjects something into the communication

passive only monitors and records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active and Passive sniffing

A

Active usually means the collision domain you’re on is segmented from those you want to look at. ie you’re on a switch

Passive works only if you’re on the same collision domain as your targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Span port / port mirroring

A

switch port that can be configured to send traffic from other ports to it.

Most modern switches don’t allow those ports to transmit, only receive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Content Addressable Memory Table

CAM Table

A

table in the switch that contains a list of which MAC addresses are on which ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC Flooding

A

send so many MAC addresses to the CAM table that it can’t keep up and turns into a hub.

Most modern switches are impervious to this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ECC Term “Switch Port Stealing”

A

a type of MAC Flood but instead of filling the CAM table, you only update information about a specific port, causing a race condition where switch flips back and forth between bad MAC and real MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP Poisoning aka ARP Spoofing aka gratuitous ARP

A

maliciously changing ARP cache on a machine to inject faulty entries

not that difficult since ARP works by listening for changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP Poisoning caveats

A

ARP entries need frequent updating. To maintain control you need to have your entry update before a real one occurs

ARP poisoning attempts can trigger alerts, since it’s a broadcast

speed always win, if a machine arp and attacker gets their first

17
Q

DHCP Starvation

A

attacker tries to exhaust all available addresses from the server

more of a DoS type attack

18
Q

DHCP Starvation

A

attacker tries to exhaust all available addresses from the server

more of a DoS type attack. Attacker sends unending forged DCHP requests

Tools: Yersinia, DHCPStarv

Mitigation - configure DHCP snooping

19
Q

DCHP 4 step process

DORA

A

Discover - client broadcasts for DHCP server
Offer - DHCP relay agent replies with offer
Request - client sends request for IP
Acknowledge - server responds with acknowledge and IP info

20
Q

Exam Tip

Rogue DHCP Server usefulness for attacks

A

Could allow attacker to redirect communications, either in conjunction with a DHCP starvation attack or not

21
Q

MAC Spoofing

A

Attacker on port 3 sends forged packets with victim’s MAC address.

Switch sees victim “moved” to port 3 and sends traffic for victim computer to port 3 attacker

22
Q

IRDP Spoofing

ICMP Router Discovery Protocol Spoofing

A

attacker sends spoofed IRDP messages through the network, advertising whatever gateway he wants systems to start routing messages to

23
Q

Exam Tip

know wireshark filters (www.wireshark.org/docs) for how to guides, practice caps, videos.

!(arp or icmp or dns)

http.request

tcp contains string

ip. addr==172.17.15.12&&tcp.port=23
ip. addr==172.17.15.12 or ip.addr==172.17.15.160

A

!(arp or icmp or dns)
filters out those 3 types of packets

http.request
displays all the HTTP GET requests

tcp contains string
displays all tcp segments that contain the word “string”

ip.addr==172.17.15.12&&tcp.port=23
displays all telnet packets with that IP address

ip.addr==172.17.15.12 or ip.addr==172.17.15.160
shows packets with either IP address

24
Q

Wireshark operators (conjunctions)

equal to

and

or

A

equal to

and
&& means packet will only display if BOTH arguments appear

or
(or) means packet will display if either argument appears