day 9 Flashcards

1
Q

router threats

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

masquerading (spoofing)

A

occurs when an attacker manipulates and falsifies information and is used to hide an attacker’s identity or fool devices into thinking the traffic legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

session hijacking

A

the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

rerouting

A

includes manipulating router updates to cause traffic flow to unauthorized destinations, sometimes called route injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

denial of service (DoS)

A

cause disruptions by overwhelming the targeted system with improperly formatted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

eavesdropping and information theft

A

the unauthorized viewing and collection of network traffic, usually accomplished with a packet-sniffing program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router configuration hardening

A

all unnecessary services should be disabled in a router configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP and UDP small servers

A

routers contain services that are not necessary and should be disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

small server services to disable

A

Port service description
7 echo this command echos what is typed
9 discard this service was designed to aid in troubleshooting links along a comm path..once it reaches its intended destination, it is discarded
13 daytime this command returns system date and time
19 chargen this command generates a 72-character string of ASCII characters from remote host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

finger service

A

used for querying a host about its logged in users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Time Protocol (NTP)

A

used to keep their time-of-day clocks accurate and in sync.

uses port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

boot network

A

allows cisco devices to load their configuration files from over the network, and is sometimes referred to as a configuration auto-loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Control Message Protocol (ICMP)

A

supports IP traffic by relaying information about paths, routes, and network conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

destination unreachable

A

a router can report that a network, system, or port on a distant system is unreachable,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

redirect

A

informs a host that a packet was sent to the wrong destination, and tells the sending machine the correct destination…arises when there is more than one router on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

address mask reply

A

provide a method to determine their network mask information. to a hacker, this information may be used to identify routers and to collect subnet information, useful in mapping out networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS lookups

A

by default, IOS sends DNS name queries to the broadcast address 255.255.255.255. This makes it very susceptible to DNS poisoning.
Either name a specific server or turn off the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HTTP and HTTPS servers

A

enables web based administration. HTTPS is secure, but takes little knowledge to use.
ports 80 and 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP source routing

A

IP packets are 20-60 bytes long. hackers can place IP’s in the extra 40 bytes to direct traffic to those addresses, bypassing the routing tables.

20
Q

strict source routing

A

hops specified in the IP header must be followed exactly

21
Q

loose source routing

A

some hops are specified and routers will determine how to route to those specified hops

22
Q

SNMP services

A

SNMP is vulnerable because of the amount of info it contains.
SNMP V1 and V2 send info in the clear, v3 sends it encrypted.
uses ports 161 and 162

23
Q

proxy ARP

A

routers respond to ARP queries, enabling them to use MAC addresses to talk to other networks rather than using IP addresses

24
Q

IP directed broadcasts

A

permit a host on one LAN segment to send broadcast messages on a different LAN.
allows smurf and fraggle attacks to occur

25
Q

unicast reverse-path forwarding (uRPF) verification

A

helps mitigate problems caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by discarding packets lacking a verifiable IP source address

must first enable CEF

26
Q

uRPF syntax

A
Router#config t
router(config)#ip cef
router(config)#interface eth 0/0
router(config)#ip verify unicast reverse-path
router(config-if)#exit
27
Q

local access

A

usually involves a direct connection to the console port of a device

28
Q

Console (CON)

A

configure the console line to time out exec sessions so if an administrator forgets to log out, the device will log him or her out automatically

29
Q

CON syntax

A

Router#config t
router(config)#line con 0
router(config)#exec-timeout 5 0
router(config-if)#exit

30
Q

Auxiliary (AUX)

A

some administrators connect a modem to the auxiliary port to facilitate remote administration via dial-up

31
Q

AUX syntax

A

Router#config t
router(config)#no exec
router(config)#transport input none
router(config-if)#exit

32
Q

Remote access

A

typically involves TELNET, SSH, HTTPS, or SNMP connections to the router from a computer on the same or a different subnet.

not recommended

33
Q

Virtual Terminal (VTY) lines

A

VTY login should be disabled if remote admin is not necessary.
VTY lines are disabled by default
if there is no password set, they are disabled

34
Q

SSH

A

there are two versions of SSH, V 1 and V 2, but neither are compatible with each other.

35
Q

accounts

A

for internal logging, an account should be created for each user.

36
Q

user accounts become vulnerable when:

A

they are created without passwords
they are assigned to privilege levels higher than level 1
account names can be determined if the finger service is running on the router

37
Q

login local

A

admins must change the interface login because login local prompts user for username and password

38
Q

passwords

A

service password-encryption only enables type 7 password

enable secret uses an MD5 hash to secure passwords

39
Q

privilege levels

A

0 user restricted to 5 commands
1-14 user restricted to basic level operations
15 global administration capabilities

40
Q

logging

A

logs errors to a syslog host. uses UDP port 514

41
Q

logging syntax

A

Router#logging buffered
router(config)#logging trap info
router(config)#logging facility local
router(config)#logging 14.2.9.6

42
Q

ACL’s

A

used to permit or deny packets using permit or deny statements based on addresses, ports or protocols.

are used on IP and IP extended

43
Q

ACL types

A

IP standard access list 1-99 or 1300-1999

IP extended access list 100-199 or 2000-2699

44
Q

ACL’s

A

must be created in the routers global config mode

access lists are read from top to bottom and end with an implicit deny statement

45
Q

more on ACL’s

A
  • ACL’s are applied to each interface
  • standard access lists should be applied to the router nearest the destination
  • extended access lists should be applied nearest the source of the traffic
  • access lists should be applied to the interface inbound
  • access lists are called groups when applied to an interface in config-if mode and are applied to either the incoming or outgoing side of an interface.

ip access-group 100 in