Domain 6 - Security Assessment and Testing Flashcards
Security Review
Conducted by system maintenance or security personnel
Goal is determine vulnerabilities within a system. Also known as a vulnerability assessment
Security Audit
Conducted by 3rd party
Determines the degree to which required controls are implemented
Penetration Testing
Ethical hacking to validate discovered weaknesses Red Teams (Attack)/Blue Teams (Defend)
NIST SP 800-42
National Institute of Standards and Technology
Guideline on Security Testing
Zero Knowledge
Team has no knowledge of the target and must start with only information that is publically available. This simulates an external attack
Partial Knowledge
The team has limited knowledge of the organization
Full Knowledge
This simulates an internal attack. The team has full knowledge of network operations
Blind
The assessors have only publicly available knowledge. The network teams knows that testing is taking place
Double Blind
The assessors have only publicly available knowledge, but in this instance the network teams do NOT know the test is taking place. This will allow evaluation of incident response
Targeted Testing
External consultants work with internal staff to focus on specific systems or applications
OSI Model
Layer 1 Physical Layer 2 Data Link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application
HTTP
HHTPS
80
443
FTP
20/21
File Transfer Protocol
RDP
3389
Remote Desktop Protocol
DNS
53
Domain Name System
FTPS
989/990
Secure File Transfer Protocol
TFTP
69
Trivial File Transfer Protocol
DHCP
67/68
Dynamic Host Configuration Protocol
ARP
RARP
Address Resolution Protocol
Reverse Address Resolution Protocol
Ethernet standard
802.3
CSMA/CD Carrier Sense Multiple Access w/ Collison Detection
Wireless Standard
802.11
CSMA/CA Carrier Sense Multiple Access w/ Collison Avoidance
Vlan Standard
802.1q
WEP
Auth, Encrypt, Integrity
PSK Pre Shared Key
Wired Equivalent Protocol encrypted with RC4(Stream Cipher)
integrity check by CRC Cyclic redundancy check
64, 128,256 bit key, but -24 for IV(Initialization Vector) so actual 40,104,232 bit key
WPA Personal
Auth, Encrypt, Integrity
PSK
encrypted by TKIP(Temporary Key Internet Protocol) with RC4
Integrity by MIC Message Integrity Check
128 bit key + 48 bit IV
WPA Enterprise
Auth, Encrypt, Integrity
802.1x with RADIUS Server
encrypted with TKIP and RC4
integrity by MIC
128 bit key + 48 bit IV
WPA2 Personal
Auth, Encrypt, Integrity
PSK
encrypted CCMP(block-chain) with AES(block Cipher)
integrity CBC-MAC Chain Block Cipher MAC
256 bit key
WPA2 Enterprise
Auth, Encrypt, Integrity
802.1x with RADIUS Server
encrypted CCMP with AES
integrity CBC-MAC
256 bit key
RIPv1
Interior/exterior, type,class
IGP, Distance Vector, classful
IGRP
Interior/exterior, type,class
IGP, Distance Vector, classful
Cisco proprietary
RIPv2
Interior/exterior, type,class
IGP, Distance Vector,classless
EIGRP
Interior/exterior, type,class
IGP, Distance Vector, classless
Cisco proprietary
OSPF
Interior/exterior, type,class
IGP, Link-state, Classless
IS-IS
Interior/exterior, type,class
IGP, Link-state, Classless
BGP
Interior/exterior, type,class
EGP, Path-vector, Classless
IAAA
Identification: Make a claim (userid etc) Authentication: Provide support (proof) for your claim Authorization: What rights and permissions you have Auditing: Accountability—matching actions to subjects
Access Control Types
Logical
Physical
Administrative
Authentication Type I
Something you know
Authentication Type II
Something you Have
Authentication Type III
Something you are
Type I Error
False Rejection(FRR)–A legitimate user is barred from access. Is caused when a system identifies too much information. This causes excessive overhead.
Type II Error
False Acceptance(FAR)—An impostor is allowed access. This is a security threat and comes when a system doesn’t evaluate enough information
CER
(Crossover Error Rate) The level at which the FAR and FRR meet. The lower the number, the more accurate the system.
Race Condition
try to cause authorization to happen before authentication
Single Sign On
Ease of use for end users Centralized Control Ease of administration Kerberos LDAP Sesame KryptoKnight
Kerberos
A network authentication protocol designed from MITs project Athena. Kerberos tries to ensure authentication security in an insecure environment
Port 88
Allows for single sign on
Never transfers passwords
Uses Symmetric encryption to verify Identifications
Avoids replay attacks
Kerberos Components
Essential Components:
AS (Authentication Server): Allows authentication of the user and issues a TGT
TGS: After receiving the TGT from the user, the TGS issues a ticket for a particular user to access a particular service
KDC (Key Distribution Center) a system which runs the TGS (Ticket Granting Service) and the AS (Authentication Service)
Ticket: Means of distributing Session Key
Principles (users, applications, services)
Kerberos Software (integrated into most Operating Systems. MS Windows 2000 and up support Kerberos)
Main Goal: User needs to authenticate himself/herself without sending passwords across the network—needs to prove he/she knows the password without actually sending it across the wire.
SESAME
European technology, developed to extend Kerberos and improve on it’s weaknesses
Sesame uses both symmetric and asymmetric cryptography.
Uses “Privileged Attribute Certificates” rather than tickets, PACS are digitally signed and contain the subjects identity, access capabilities for the object, access time period and lifetime of the PAC.
PACS come from the Privileged Attribute Server.
DAC
Discretionary Access Control
Security of an object is at the owner’s discretion
Access is granted through anACL (Access Control List)
Commonly implemented in commercial products and all client based systems
Identity Based
MAC
Mandatory Access Control
Data owners cannot grant access!
OS makes the decision based on a security label system
Subject’s label must dominate the object’s label
Users and Data are given a clearance level (confidential, secret, top secret etc)*
Rules for access are configured by the security officer and enforced by the OS.
RBAC
Role Based Access Control
Uses a set of controls to determine how subjects and objects interact.
Don’t give rights to users directly. Instead create “roles” which are given rights. Assign users to roles rather than providing users directly with privileges.
AAA
Authentication
Authorization
Auditing
RADIUS
Port 1812, 1813 UDP 3 separate processes for AAA only encrypts user/pass uses Industry Standard
TACACS+
Port 49 TCP one process for AAA encrypts everything Cisco Devices
Guideline on Security Testing
National Institute of Standards & Tech SP 800-42