Chapter 4 - Sniffing and Evasion (Sniffing) Flashcards
IP Packet header data and uses
source, destination addresses
QoS (Type of Service) field
Fragmentation data (Identification and Fragment Offset fields)
source/destination addresses - obvious
QoS and Fragmentation can be useful for crafting your own fragmented packets
Name for the first half of a MAC address
Organizational Unique Identifier
ARP Commands
arp -a
arp -d *
netsh interface ip delete arpcache
arp -a shows arp cache
arp -d * and netsh command delete the arp cache
Exam tip
IPv6 Loopback address
0000:0000:0000:0000:0000:0000:0000:0001
abbreviate as ::1
Exam tips for IPv6
Loopback address
link-local addressing
0000:0000:0000:0000:0000:0000:0000:0001
abbreviate as ::1
Link Local reserved address block: fe80::/10
unique local address (equivalent of IPv5 private addressing) is in the fc00::/7 block
prefixes for site local addresses always FEC0:/10
IPv6 address types
unicast - works like IPv4
multicast - works like IPv4
anycast - works like multicast but designed to be received and opened by only the closest member of a group, identified in terms of routing distance (hops)
broadcast address in ipv4 no longer used. multicast performs that role
IPv6 scopes for unicast and multicast
scopes define how far the address can go
link local - only hosts on same subnet. defines boundary at local segment. For private addressing only, similar to old 169.254.1-254.0 range
site local - only hosts in same organization (private site addressing). same rules as link-local (not forwarded by a router). Similar to the private Class 10 172 and 192 ranges of IPv4
global - everyone
Lawful Interception
process of legally intercepting communications between 2 or more parties for surveillance on telecommunication, VOIP, data and multi service networks
Active and Passive wiretapping
active interjects something into the communication
passive only monitors and records
Active and Passive sniffing
Active usually means the collision domain you’re on is segmented from those you want to look at. ie you’re on a switch
Passive works only if you’re on the same collision domain as your targets
Span port / port mirroring
switch port that can be configured to send traffic from other ports to it.
Most modern switches don’t allow those ports to transmit, only receive
Content Addressable Memory Table
CAM Table
table in the switch that contains a list of which MAC addresses are on which ports
MAC Flooding
send so many MAC addresses to the CAM table that it can’t keep up and turns into a hub.
Most modern switches are impervious to this
ECC Term “Switch Port Stealing”
a type of MAC Flood but instead of filling the CAM table, you only update information about a specific port, causing a race condition where switch flips back and forth between bad MAC and real MAC
ARP Poisoning aka ARP Spoofing aka gratuitous ARP
maliciously changing ARP cache on a machine to inject faulty entries
not that difficult since ARP works by listening for changes