Exam (by Lersch) Flashcards
Define passive and active attacks.
Passive attacks
- Eavesdropping: secretly listening to a conversation
- Traffic Analysis: the inference of information from observation of traffic flows
Active attacks
- Spoofing (Masquerading): the pretence by an entity to be a different entity
- Denial of Service (DoS): prevention or inhibition of the normal use or management of communication facilities
Which are the six Security Services?
- Authentication
- Access Control
- Confidentiality
- Integrity
- Non-repudiation
- Availability
How to attack each security services?
Authentication
- IP spoofing, cracking passwords
Access Control
- wire-tapping, breaking authentication
Confidentiality
- eavesdropping, traffic analysis
Integrity
- man-in-the-middle attack, replay attack
Non-repudiation
- deletion of log files, masquerading
Availability
- denial of service attacks
What is jamming?
Disrupting the communication by interference on
the same frequency/band. DoS attack.
What is an ideal jammer?
- Energy efficient
- low probability of detection
- High level of DoS
- Resistance to anti-jamming techniques
How to measure an ideal jammer?
PSR = packets set / packets intended to be sent PDR = packets successfully received / packets sent JSR = (Pj.Bt.Gjr.Grj.Dtr².Ltr) / (Pt.Bj.Gtr.Grt.Djr².Ljr) CI = |E'| / |V| . (|V|-1)
Which are the four jamming strategies?
- Constant jammer: continually emits radio signal
- Deceptive jammer: continually emits regular packets
- Random jammer
- Reactive jammer
How to detect a jammer?
Using statistics of Statefullnetwork activity.
How to mitigate a jammer?
- Channel surfing
- Spatial retreat
- JSR manipulation
Three broken security mechanisms of IEEE 802.11.
- Hidden SSID (sniff from header of management frames)
- MAC filtering (sniff allowed MACs and spoof them)
- WEP
WEP encryption and decryption.
M’ = IV || ((M || CRC(M)) XOR (RC4(IV || key)))
M = RC4(IV || key) XOR ((M || CRC(M)) XOR (RC4(IV || key)))
OBS: demux ICV and M from previous result. Calculate ICV from M and compare for integrity.
Two types of WEP authentication.
- Open System Architecture: AP associates all STA, authentication provided by ability to encrypt messages correctly after association.
- Shared Key Authentication: challenge-response algorithm.
WEP weaknesses.
- keys (no key management, length is only 40 bits)
- encryption (reuse of IV, affects confidentiality & integrity)
- shared key authentication:
ciphertext = RC4 XOR (challenge || CRC(challenge)) - key scheduling (recover secret key, needs IVs and first two octets of encrypted messages)
Which are the three categories of GSM channels?
- Traffic Channels (point-to-point between antenna & MS)
- Common Control Channels (signaling between previous)
- Dedicated Control Channels ( signaling related to services such and handover procedures or connection establishment)
Which are the three attacks on GSM networks?
- IMSI-Catcher (MitM, rogue antenna, turn off encryption)
- DoS (answer paging req. with channel req. before)
- Hijacking Services (GSM networks don’t authenticate all services, attacker can redirect to itself, use IMSI-Catcher to turn off encryption).
Which are the 4 ways to open your car and start the engine?
- Old-school metallic keys
- Immobilizers (chips in the key, close proximity, auth.)
- Active keyless entry (button on key, up to 100m)
- Passive keyless entry & start (detection of proximity)
How does the PKES security works?
- Authentication: challenge-response protocol
- Proximity inferred from the ability to receive messages
What are relay attacks on PKES?
Messages are relayed from one location to another in order to make one entity appear closer to the other. Does not require breaking cryptography.
Countermeasure for relay attacks on PKES?
Distance bounding by measuring propagation delay.
Which are the six attacks on WSN?
- Tampering (physical access of nodes, cold boot)
- Exhaustion & Interrogation (superfluous & expens. op.)
- Tampered forwarding (modify dev behaviour or rout. tab.)
- Wormholes (side-channel that provides advantage)
- Sybil attack (node with multiple ids and arbitrary location)
- HELLO flooding (broadcast of false neighbor status)
Which are the countermeasure for each of the WSN attacks?
- Tampering: camouflage, sensors to detect, use CPU registers or CPU cache, encrypt data in RAM)
- E&I: auth. requests, rate-limited responses (bases on recent history of request traffic), client puzzles
- Tampered fwd: disjoint routing paths, node listen channel to make sure neighbor transmited same message, auth. routing updates, periodic end-to-end probing, geo-location for routing, diversity coding)
- Wormholes: geographic fwd, auth. routing messages
- Sybil attack: auth. nodes and identities, loc. verification
- HELLO flooding: bi-directional verification of local links, auth. nodes
What is diversity coding?
Transmit data over multiple independent paths with redundancy. Split messages in N >= 2 chunks. Compute parity XORing all chunks. M-for-N diversity codes, recover M link failures when M+N links.
How to scan a network?
- ping
- nmap
How to mitigate scan?
- turn off response to echo protocols
- port knocking (sequence, packet payload, inter-arrival time of packets)
Which are the six DoS attacks?
- Ping of Death (old systems, send malformed packet)
- Teardrop (negative offset of fragmented packets, uint)
- Ping flood: send many pings to victim
- Smurf attack: broadcast ping using victim address
- SYN flood: TCP buffer for half-open connection is limited
- LAND: send SYN with victim as source and destination
Which are the two firewall strategies?
- Blacklisting
- Whitelisting
What is Ingress Filtering?
Routers know IP ranges of networks connected to each port. Avoid IP spoofing and related attacks.