day 9 Flashcards
router threats
.
masquerading (spoofing)
occurs when an attacker manipulates and falsifies information and is used to hide an attacker’s identity or fool devices into thinking the traffic legitimate.
session hijacking
the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system
rerouting
includes manipulating router updates to cause traffic flow to unauthorized destinations, sometimes called route injection attacks
denial of service (DoS)
cause disruptions by overwhelming the targeted system with improperly formatted traffic
eavesdropping and information theft
the unauthorized viewing and collection of network traffic, usually accomplished with a packet-sniffing program
Router configuration hardening
all unnecessary services should be disabled in a router configuration
TCP and UDP small servers
routers contain services that are not necessary and should be disabled
small server services to disable
Port service description
7 echo this command echos what is typed
9 discard this service was designed to aid in troubleshooting links along a comm path..once it reaches its intended destination, it is discarded
13 daytime this command returns system date and time
19 chargen this command generates a 72-character string of ASCII characters from remote host
finger service
used for querying a host about its logged in users
Network Time Protocol (NTP)
used to keep their time-of-day clocks accurate and in sync.
uses port 123
boot network
allows cisco devices to load their configuration files from over the network, and is sometimes referred to as a configuration auto-loading
Internet Control Message Protocol (ICMP)
supports IP traffic by relaying information about paths, routes, and network conditions
destination unreachable
a router can report that a network, system, or port on a distant system is unreachable,
redirect
informs a host that a packet was sent to the wrong destination, and tells the sending machine the correct destination…arises when there is more than one router on a LAN
address mask reply
provide a method to determine their network mask information. to a hacker, this information may be used to identify routers and to collect subnet information, useful in mapping out networks
DNS lookups
by default, IOS sends DNS name queries to the broadcast address 255.255.255.255. This makes it very susceptible to DNS poisoning.
Either name a specific server or turn off the service
HTTP and HTTPS servers
enables web based administration. HTTPS is secure, but takes little knowledge to use.
ports 80 and 443