Evading IDS, Firewalls, and Honeypots Flashcards
What is Signature Recognition?
Signature recognition, also known as misuse detection, tries to identify events that indicate an abuse of a system or network resource
What is Protocol Anomaly Detection?
In this type of detection, models are built to explore anomalies in the way in which vendors deploy the TCP/IP specification
What is Anomaly Detection?
Anomaly detection detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system
What is a Bastion Host?
The bastion host is designed for defending the network against attacks. It acts as a mediator between inside and outside networks. A bastion host is a computer system designed and configured to protect network resources from attacks. Traffic entering or leaving the network passes through the firewall
What is a malware honeypot?
Malware honeypots are used to trap malware campaigns or malware attempts over the network infrastructure. These honeypots are simulated with known vulnerabilities such as outdated APIs, vulnerable SMBv1 protocols, etc., and they also emulate different Trojans, viruses, and backdoors that encourage adversaries to perform exploitation activities
What is a honeynet?
Honeynets are networks of honeypots. They are very effective in determining the entire capabilities of the adversaries. Honeynets are mostly deployed in an isolated virtual environment along with a combination of vulnerable servers. The various TTPs employed by different attackers to enumerate and exploit networks will be recorded, and this information can be very effective in determining the complete capabilities of the adversary
What is a spider honeypot?
Spider honeypots are also called spider traps. These honeypots are specifically designed to trap web crawlers and spiders. Many threat actors perform web crawling and spidering to extract important information from web applications. Such crucial information includes URLs, contact details, directory details, etc
What is a spam honeypot?
Spam honeypots specifically target spammers who abuse vulnerable resources such as open mail relays and open proxies. Basically, spam honeypots consist of mail servers that deliberately accept emails from any random source from the Internet
What is a packet-filter (stateless) firewall?
A packet filtering firewall investigates each individual packet passing through it and makes a decision whether to pass the packet or drop it. It works at the Internet protocol (IP) layer of the TCP/IP model (network layer of the OSI model). Packet filter–based firewalls concentrate on individual packets, analyze their header information, and determine which way they need to be directed
What is a packet-filter (stateless) firewall?
A packet filtering firewall investigates each individual packet passing through it and makes a decision whether to pass the packet or drop it. It works at the Internet protocol (IP) layer of the TCP/IP model (network layer of OSI). Packet filter–based firewalls concentrate on individual packets, analyze their header information, and determine which way they need to be directed
Which of the following descriptions is true about a static NAT?
A static NAT uses a one-to-one mapping.
A static NAT uses a many-to-one mapping.
A static NAT uses a one-to-many mapping.
A static NAT uses a many-to-many mapping.
A static NAT uses a one-to-one mapping
Which of the following descriptions is true about a static NAT?
A static NAT uses a one-to-one mapping.
A static NAT uses a many-to-one mapping.
A static NAT uses a one-to-many mapping.
A static NAT uses a many-to-many mapping.
A static NAT uses a one-to-one mapping
At which two traffic layers do most commercial IDSes generate signatures? (Select Two)
Session layer
Application layer
Network layer
Transport layer
Network and Transport layers (easiest layers to filter)
Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone?
TCP flag bits
Interface
Direction
Source IP address
Interface
A circuit-level gateway works at which of the following layers of the OSI model?
Layer 5 – Session
Layer 4 – Transport
Layer 2 – Data Link
Layer 3 – Network
Layer 5 - Session
What is discretionary access control?
In discretionary access control (DAC), the owner of the object specifies which subjects can access the object. This model is called discretionary because the control of access is based on the discretion of the owner.
Most operating systems such as all Windows, Linux, and Macintosh and most flavors of Unix are based on DAC models.
In these operating systems, when you create a file, you decide what access privileges you want to give to other users; when they access your file, the operating system will make the access control decision based on the access privileges you created