Communication & Network Security Flashcards
Decimal
10
Binary
2
Hex
16
Protocol
Agreed upon set of rules
Defines the format and order of messages and actions taken upon receipt of the message
Encapsulation
Layered model (OSI)
OSI Layer
Please Do No Throw Sausage Pizza Away (Bottom to Top) Application Presentation Session Transport Network Data link Physical
Application Layer
interacts with applications to determine which network service will be required.
Layer 5-7 - considered Data Layers
Presentation Layer
data sent from one side of the connection is received Presenting data to application (Characters set/ graphics) in a way that makes sense
Layer 5-7 - considered Data Layers
Session Layer
establish and maintains connection between systems
Layer 5-7 - considered Data Layers
Transport Layer
ensure transmission end to end
handles sequencing of packets in transmission
Port/TCP & UDP headers
Network Layer
interaction network address schemes
How different network segment interact with each
other
IP Address/Routing
Data Link Layer
connects physical layer to network Ethernet address (MAC)/switches
Physical Layer
transmission across physical media
Bits 0/1
TCP/IP Model
Layer 5-7 (Application)
Layer 4 - Host to Host transport
Layer 3 - Internet
Layer 1-2 Network Access
TCP/IP Protocol Stack
Developed 1970, Darpa, DOD
OSI still referenced when talking about layers
IP4 Packets Diagram
32 bits across. Every 32 bit is 4 bytes. 5 rows so total of 20 bytes Starts at 0 Bits 0-31 Bytes 0-19
IP4 Class Address
Classless Inter-Domain Router (CIDR) (/8 notation)
Class A: /8 - 1.0.0.0 to 127.255.255.255
Class B: /16 - 128.0.0.0 to 191.255.255.255
Class C: /24 - 192.0.0.0 to 223.255.255.255
Class D: Multicast
Class E: Reserved
IP Broadcast
Limited broadcast (no router will block ) 255.255.255.255 Direct broadcast - 192.168.1.255 - Broadcast from 192.1.168.0 network
RFC-1918 (think of NAT)
Private addresses
- 0.0.0/8
- 16.0.0/16 - 172.31.0.0/16
- 168.0.0/16
Network Address Translation (NAT)
one to one -
Pool NAT - maps to a set of public addresses
Many to one - multiple mapped to one
NAT limitation 64k
gethostbyname
have fully qualified domain name (eric.sans.org) and need the address
gethostbyaddr
when you have address and the need the fully qualified domain name
DNS request & response
UDP if under 512 bytes
DNS Security issues
Not reliable
DNS Poisoning Attack
DNSSEC
does not provide confidentiality
digital signature for packet
Authenticated Denial of Existence (DNS)
Proving DNS record does not exist
IPv6
IPv4 - 32 bit 4.2 billion unique addresses
IPv6 - 128bit 340 undecillion addresses
Faster, no checksum like IPv4
IPv6 Features
route aggregation - method used to minimize the number of routing tables required in an IP network.
Support IPv6 tunneling over IPv4
Fixed header bytes - next header
Auto-configuration - don’t need to assign IP address
User Datagram Protocol (UDP)
Layer 4 connection less communication don't care if the packet gets there less overhead Good if small amount of packet loss is acceptable
UDP Ports
DNS 53
NTP - 123
BootP - 67 & 68
SNMP - 161
Transmission Control Protocol
3 way handshake
SYN
SYN-ACK
ACK
TCP Header (Key fields)
Source Port Destination Port Sequence number Acknowledgement number SYN bit ACK bit
TCP Ports
20 - FTP Data (receive) 21 - FTP - (send) 22 - SSH 23 - Telnet 25 - SNMP 53- DNS 79- Finger 80 - http 443 - https source port >= 1024 (ephemeral)
TCP Code Bit (Flags)
Urg (Urgent) Ack (Acknowledgement) PSH (Push) - think of data stream RST (Reset) - terminate connection SYN(Synchronize) FIN(Finish)
TCP Port Scanning (response types)
SYN/ACK - port is open and unfiltered
RST/ACT - port is closed and unfiltered
No response: Unknown
Socket Pair
Source IP Address
Source Port number
Destination IP Address
Destination Port Number
Internet Control Message Protocol (ICMP)
report error (troubleshoot) rather than transfer info Ping & Traceroute are ICMP
TraceRoute
Set TTL to 1 and when router receives it, it will drop it.
Next iteration - TTL decreases for the one below it
Incrementing TTL for each hop
Secure Shell (SSH)
Port 22
Supports Authentication, compression, confidentiality, and integrity
Supports wide range of ciphers, 3DES, AES, Blowfish
SSH1 - Man In the middle attack
Secure Multipurpose Internet Mail Extension (S/MIME)
Secure MIME
Simple Network Management Protocol (SNMP)
Monitoring of network devices SNMPv1 and SNMPv2 - clear text community string (NO CONFIDENTIALITY) Public - read Private - read & write Should use SNMPv3 - port 161
Multilayer Protocols
TCP/IP - span multiple layers (OSI)
DNP3 (Distributed Network Protocol)
DNP3 (Distributed Network Protocol)
Open protocol smarts Smart Grid SCADA IEEE 1815- 2010 allowed pre-share key only IEEE 1815 - 2012 current standard Supports PK
Network Attached Storage (NAS)
Read/Write entire files
Storage Area Network (SAN)
block/clusters to files (not entire files like NAS)
Internet Small Computer System Interface (ISCSI)
network cables/routed via IP (NAS)
think of SCSI drives that are connected to network
Lun - logical grouping of drives
Fibre Channel
Sans Protocol
Does not use Ethernet/does not easily scale across WAN
Fibre Channel (FCoE)
Local subnet only
TCP/IP is not used - layer 2
Fibre Channel over IP (FCIP)
can route (layer 3)
Voice of IP (VOIP)
Digitized before sending across wire Combining data Cost-effective Redundancy Security issue (PBX) Expsoures
PSTN PBX/VOIP
Common and phased approach
PBX and VOIP network
UP PBX/PSTN
must use VOIP phones
IP PBX - soft switch route calls
VOIP Components
Media Gateways Registration & Location servers Proxy Servers Messaging Servers End-User devices (VOIP Phones)
VOIP Protocols
Signaling (H.323 SIP) - setup and tear down call, locate users, negotiate protocols
Media (RTP) - transport of package
Supporting (IP, TCP, UDP, etc..)
SIP (H.323)
Setup and tear down of calls
SIP
Plaintext
TCP/UPD
Looks like HTTP
RTP
Transmit voice content between VOIP devices
Over plaintext
Commonly over UDP, can use TCP
Virtual Network Computing (VNC)
TCP Port 5900
Remote Desktop Sharing (RDP)
TCP Port 3389
802.11 Standard
**Fundamental risk - no physical control of network
Supports two physical layers
Infrared
Radio Frequency
802.11 Types
- 11b - 11 Mbps at 2.4 ghz
- 11a - 54 Mbps at 5 ghz
- 11g - 54 Mbps at 5 ghz
- 11n - 300 Mbps using both 2.4 & 5 ghz
- 11ac - 1.3 Gbps at 5 ghz
802.11 Network modes
Managed - client connect to WAP
Master - Wireless Access point
Ad-hoc - peer to peer
Monitor Mode - ready only/sniffing
Wire Equivalent Privacy (WEP)
Inability to rotate WEP keys
Permit recovery of WEP keys in minutes
Types of Network
PAN - Personal area network (bluetooth) LAN - Local Area Netwrk CAN - Campus Area Network MAN - Metropolitan Area nework WAN- Wide Area Network GAN - Global Area Network
LAN transmission method
unicast - from source to single network destination
multicast - from source to multiple network destination
Broadcast - source to all network address
Physical Topology
How systems are connected - bus, ring, star
Logical Topology
rules of communication
Ethernet/ATM
Persistent Carrier Sense
No ack from destination, assumes collision and re-sends immediately
Non-Persistent Carrier Sense
no ack from destination, assume collision, waits a random amount of time before resending
Carrier Sense Multiple Access with Collision Dectection (CSMA/CD)
Ethernet
Send/transmit simultaneously
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Wireless
Polling
Only allowed to send when given permission
T1
DS1 - 1.544 mbps
T3
DS3 - 44.376 mbps
E1
Wide Area Digital Transmission- 2.048 mbps (Europe)
E3
Wire Are Digital Transmission - 34.368 mbps
SDLC
Normal Response Mode - polling speak when given to speak
Asynchronous Response mode (ARM) - cannot transmit without permission from primary *Error recovery
Asynchronous Balance Mode (ABM)- equally responsibility
ISDN
reuse analog line infrastructure for data
High cost/Low speed
2 64K channel - 128k
Digital Subscriber Line (DSL)
Point to point use existing phone lines
Symmetrical & Asymmetrical (download faster than upload)
Symmetric Digital Subscriber Line (SDSL)
Symmetrical up/download
1.544 (T1 equal)
High bit rate Digital Subscriber Line (HDSL)
Symmetrical up/download
1.544 (T1 equal)
Single Pair High Speed Digital Subscriber Line (SHDSL)
standardized version of symmetric DSL
replace SDSL & HDSL
Up to 5.696 Mbit/s
Asymmetric Digital Digital Subscriber Line (ADSL)
ADSL 2 - 12 mbps/3.5
ADSL 2+ - 24 mbps/3.5
Very High Speed Digital Subscriber Line (VDSL)
VSDL 3 - 52 mbps/16 mbps
VDSL 4+ - interoperable with ADSL 2+
1600ft max
Cable Modem
date rate - number of concurrent uesrs
1,000-4,500 ft
X.25
built in error correction
Precursor to frame relay
Asynchronous Transfer Mode (ATM)
Fixed cell size 48 bytes
Fixed header size 5 bytes
Total 53 bytes regardless of the size of the information each time.
Multiprotocol Label Switching (MPLS)
First router - apply label
later router - only inspect label
Modem
modulate binary data to be sent over analog network
demodulate analog data to digital binary
CSU/DSU
converts LAN protocol to transfer over WAN Circuit Closet (DMARC)
DTE/DCE
Data Terminal Equipment (DTE) customer end of WAN - your router before ISP
Data Communications Equipment (DCE) ISP Network - ISP Router
Repeaters
Layer 1
Signal deteriorate with distance
recreate signal before retransmitting
Hubs
Layer 1
Operate as multiport repeater
No Security
Bridges
Layer 2
Multiple devices to connect to one bridge port
Learn MAC of each systems
Does not forward traffic unless necessary
Switch
Layer 2
Learns MAC address
Provides physical and logical separation
VLANS
different VLAN will not see each other broadcast
Routers
Routing Tables - routing information that points to all reachable network
Firewall Types
Packet Filtering
Stateful - remember state information - matching request allowed in
Proxy -
Next Generation Firewalls (NGFW) - payload
Coaxial
50 ohm - digital signaling
75 ohm cable for high speed data & analog signal
Baseband - Single channel
Broadband - multiple channel
Fiber Optic Cable
resistance to electromagnetic interference
Crossover Cable
+Tx to + Rx
-Tx to -Rx
Category for twisted Pair
Cat 1 - telephone Cat 2 - < 4 mbps Cat 3 - 10 mbps Cat 4 - 16 mbps Cat 5 - 100 mbps Cat 6 - 1000 mbps
Analog Signal
continuous signal
Digital Signal
pulses signal
Asynchronous Communications
Not tied to a clock
Send start bit
Send stop bit
Synchronous Communications
Tied to clock
Don’t need to send start & stop bit
MAC address
48 bit, 12 hexadecimal
First 24 bit are organizationally unique identifier
Routing Information Protocol (RIP)
Legacy
Based on hop count - shortest
Maximum 15 hops
Routing updates every 30 seconds
Distance Vector
identify neighbors and figures out distances metrics to each.
Open Shortest Path First
routers knows all the paths
factoring in # of hops and bandwidth
Border Gateway Protocol (BGP)
Used by the Internet
Interautonomous system routing
two or more BGP in different systems
Intra-autonomous system routing
two or more BGP in same systems
Pass-Through autonomous system routing
two or more BGP across autonomous systems without question
Extranet routing
Autonomous System
route to the organization, not network.
Multiple routes - send to the closest/fastest one
Software Defined Network (SDN)
Takes routing decision and gives it to server
Router just route, no decision to be made
VPN Security Issue
Bypass firewall, IDES’s, virus scanner, web filter
Trusting the “other end “
IPSEC
IETF - RFC 2401
IPSEC Modes
Tunnel - sender to receiver (1 set of system) - don’t know the sender or receiver
Transport - sender encrypt, received decrypts
TACAS Authentication
Start - continue - reply
Single Factor Authentication
Extensible Authentication Protocol (EAP)
RFC-2284
AuthN Mechanism
EAP-MD5
Client to Server
Weakest
Only one way authentication
EAP-TLS
PKI (Client cert) on both server and client
Secure TSL tunnel for authN
EAP-TTLS
Can pre-shared key or password
PEAP
Cisco, Microsoft, RSA
Similar to EAP-TTLS
Not requiring 3rd party cert
802.1X
No IP until you authenticate
Supplicant
Software to authenticate 802.1x via Layer 2
Authenticator
WAP - open/close port based on authentication
Authentication Server
Diameter or Radius to user DB
NAC
Health Check
Patches/AntiVirus up to date
Client pass - access is granted
Client failed - place in isolated vlan