Chapter 6 - Network Security Flashcards
What is the tcp/ip model
Predecessor to the OSI model, had 4 layers instead of 7 application is one instead of 3 layers
What ISO is the OSI model
ISO 7498
What are the OSI layers?
Physical Data link Network Transport Session Presentation Application
Open network architecture
A non proprietary architecture no one owns
Encapsulation
Appending data to a packet one OSI layer at a time in a wrapper
Application Layer 7
Application protocol layer, software accesses API to common protocols like HTTP SMTP FTP each of which starts the OSI process and hands off to the presentation layer
Presentation layer 6
Data is converted to a standard and may be encrypted and/or compressed.
Ex word 2010 document is made in application layer, at presentation layer this becomes ASCII and at another workstation this ASCII is opened in open office to view the file
Session Layer 5
This is where the data is sent from application to application.. This is where the server/client pieces have relevant association. The session is controlled by the software still at this point, authentication requirements live here
Transport layer 4
TCP/UDP type network sessions are handled and maintained at this layer
SSL resides here due to network level encryption
Network layer 3
IP and routing protocols live here
Data link layer 2
Logical link control - LLC
Media access control - MAC
Logical link control
Interprets network data and converts it to a MAC addressing aware format
Media access control MAC
This is what specifies the appropriate voltage output. MAC addressing is also encapsulated in the packet. Different media requires different voltages, these decisions occur here
Physical layer 1
Transmits the voltage specified by the MAC into or from the wire
What are the port ranges?
Well known 0-1024
Registered 1024-49151
Dynamic 49152-65535
SYN proxy
Software that will hold onto the connection until the tcp handshake is complete
TCP session hijacking
This is done by predicting the sequence number and inserting packets into the stream
Protocol data units
Data - application layer Transport - segments Network - packets Data link - frames Physical - bits
CIDR
Classless inter domain routing / supernetting
Type of service
QoS?
IPng
IPv6
Jumbo grams
Massive oversize packets, aka jumbo packets
Automatic tunneling
A technique used to autonegotiate and build tunnels
6to4
Embeds ipv4 in ipv6 remotely
Teredo
Remote UDP tunneling
ISA-TAP
Ip4 to ip6 virtual map used for local association
Security issues with ipv6
Biggest is having tunneling on and accessible and not knowing it
802.1AE
MACSec - switch to switch encryption
802.1AR
Provides unique iD that can be used for authentication 802.1AE
802.1X
EAP-TLS
Bandwidth vs throughput
Bandwidth is the maximum amount of throughput possible
Multistation access unit
Used in token ring as a central switch
Carrier sense multiple access / collision detection
CSMA/CD
Used to sense if a line is free and if collisions are occurring on the wire
Back off algorithm
When a collision is sensed all systems wait a random amount of time before sending a new frame
CSMA/CA
CSMA with collision avoidance.. It waits till it’s clear then tells everyone to shut up and it transmits
Used by 802.11
Collision Domain
A set of systems contending for the same piece of physical media
What protocol assigns the group in multicast?
IGMP
DORA
Discover
Offer
Request
Ack
RARP
A MAC is sent out and a server sends an IP to the requester
Reverse arp
This evolved into bootp then dhcp
Arp poisoning
Modifying he arp table to send data to an attacker
Ping of death
When oversized sized packets are sent to ddos a system
Smurf attack
A spoofed icmp echo is sent to a broadcast address and all machines on a network will reply to the spoofed address, ie the ddos machine
Fragile attack
Same as smurf, over udp
Managed information base MIB
A logical group of managed objects that contain management task data
Communities
Establish a trust between MIB agents/server
Community string
A community password
DNSSEC
Secure DNS that requires a digital signature before responding and caching
Split DNS
External queries are handled by wan side servers only, internal queries are only handled by internal servers are are not accessible externally, these should forward recursion to the external servers
URL Hiding
Hiding a URL in an HTML link
SASL
Framework for protocol independent authentication for SMTP
Email spoofing
Using an email address that looks like it is legitimate but is not
SMTP-AUTH
Used to verify the sender of a message
Sender Policy Framework SPF
A DNS entry that is generated to associate a specific server to the email server
Whaling attack
Targeting largely important people in a company and very specifically engineer an email to trick then
Autonomous System (AS)
An internal network isolated by BGP
Distance Vector Routing Protocol
Uses # hops and distance as a decision maker for the route
Link state routing protocols
Chooses routes based on link speed, packet size, delay, load and reliability
VRRP
A virtual interface that is mapped to two different actual routers
Exterior Gateway Protocols
eBGP
Routing policy
An administrative weight override
Bridge
Used to extend a LAN segment
Source routing
Routing information is put into the packet at creation, this is dangerous