day 9 Flashcards

1
Q

router threats

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

masquerading (spoofing)

A

occurs when an attacker manipulates and falsifies information and is used to hide an attacker’s identity or fool devices into thinking the traffic legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

session hijacking

A

the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

rerouting

A

includes manipulating router updates to cause traffic flow to unauthorized destinations, sometimes called route injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

denial of service (DoS)

A

cause disruptions by overwhelming the targeted system with improperly formatted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

eavesdropping and information theft

A

the unauthorized viewing and collection of network traffic, usually accomplished with a packet-sniffing program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router configuration hardening

A

all unnecessary services should be disabled in a router configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP and UDP small servers

A

routers contain services that are not necessary and should be disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

small server services to disable

A

Port service description
7 echo this command echos what is typed
9 discard this service was designed to aid in troubleshooting links along a comm path..once it reaches its intended destination, it is discarded
13 daytime this command returns system date and time
19 chargen this command generates a 72-character string of ASCII characters from remote host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

finger service

A

used for querying a host about its logged in users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Time Protocol (NTP)

A

used to keep their time-of-day clocks accurate and in sync.

uses port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

boot network

A

allows cisco devices to load their configuration files from over the network, and is sometimes referred to as a configuration auto-loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Control Message Protocol (ICMP)

A

supports IP traffic by relaying information about paths, routes, and network conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

destination unreachable

A

a router can report that a network, system, or port on a distant system is unreachable,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

redirect

A

informs a host that a packet was sent to the wrong destination, and tells the sending machine the correct destination…arises when there is more than one router on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

address mask reply

A

provide a method to determine their network mask information. to a hacker, this information may be used to identify routers and to collect subnet information, useful in mapping out networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS lookups

A

by default, IOS sends DNS name queries to the broadcast address 255.255.255.255. This makes it very susceptible to DNS poisoning.
Either name a specific server or turn off the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HTTP and HTTPS servers

A

enables web based administration. HTTPS is secure, but takes little knowledge to use.
ports 80 and 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP source routing

A

IP packets are 20-60 bytes long. hackers can place IP’s in the extra 40 bytes to direct traffic to those addresses, bypassing the routing tables.

20
Q

strict source routing

A

hops specified in the IP header must be followed exactly

21
Q

loose source routing

A

some hops are specified and routers will determine how to route to those specified hops

22
Q

SNMP services

A

SNMP is vulnerable because of the amount of info it contains.
SNMP V1 and V2 send info in the clear, v3 sends it encrypted.
uses ports 161 and 162

23
Q

proxy ARP

A

routers respond to ARP queries, enabling them to use MAC addresses to talk to other networks rather than using IP addresses

24
Q

IP directed broadcasts

A

permit a host on one LAN segment to send broadcast messages on a different LAN.
allows smurf and fraggle attacks to occur

25
unicast reverse-path forwarding (uRPF) verification
helps mitigate problems caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by discarding packets lacking a verifiable IP source address must first enable CEF
26
uRPF syntax
``` Router#config t router(config)#ip cef router(config)#interface eth 0/0 router(config)#ip verify unicast reverse-path router(config-if)#exit ```
27
local access
usually involves a direct connection to the console port of a device
28
Console (CON)
configure the console line to time out exec sessions so if an administrator forgets to log out, the device will log him or her out automatically
29
CON syntax
Router#config t router(config)#line con 0 router(config)#exec-timeout 5 0 router(config-if)#exit
30
Auxiliary (AUX)
some administrators connect a modem to the auxiliary port to facilitate remote administration via dial-up
31
AUX syntax
Router#config t router(config)#no exec router(config)#transport input none router(config-if)#exit
32
Remote access
typically involves TELNET, SSH, HTTPS, or SNMP connections to the router from a computer on the same or a different subnet. not recommended
33
Virtual Terminal (VTY) lines
VTY login should be disabled if remote admin is not necessary. VTY lines are disabled by default if there is no password set, they are disabled
34
SSH
there are two versions of SSH, V 1 and V 2, but neither are compatible with each other.
35
accounts
for internal logging, an account should be created for each user.
36
user accounts become vulnerable when:
they are created without passwords they are assigned to privilege levels higher than level 1 account names can be determined if the finger service is running on the router
37
login local
admins must change the interface login because login local prompts user for username and password
38
passwords
service password-encryption only enables type 7 password | enable secret uses an MD5 hash to secure passwords
39
privilege levels
0 user restricted to 5 commands 1-14 user restricted to basic level operations 15 global administration capabilities
40
logging
logs errors to a syslog host. uses UDP port 514
41
logging syntax
Router#logging buffered router(config)#logging trap info router(config)#logging facility local router(config)#logging 14.2.9.6
42
ACL's
used to permit or deny packets using permit or deny statements based on addresses, ports or protocols. are used on IP and IP extended
43
ACL types
IP standard access list 1-99 or 1300-1999 | IP extended access list 100-199 or 2000-2699
44
ACL's
must be created in the routers global config mode | access lists are read from top to bottom and end with an implicit deny statement
45
more on ACL's
- ACL's are applied to each interface - standard access lists should be applied to the router nearest the destination - extended access lists should be applied nearest the source of the traffic - access lists should be applied to the interface inbound - access lists are called groups when applied to an interface in config-if mode and are applied to either the incoming or outgoing side of an interface. ip access-group 100 in