General Flashcards
TLS Transport Layer Security
TLS can wrap regular HTTP traffic within TLS, which means that we can encrypt our entire conversation, not just the data sent or requested. Before the TLS mechanism was in place, we were vulnerable to Man-in-the-middle
Passive Analysis Dependencies
passive, we are just copying data that we can see without directly interacting with the packets.
Active Passive Dependencies
Active capture requires us to take a more hands-on approach. This process can also be referred to as in-line traffic captures.
Tcpdump
command-line packet sniffer that can directly capture and interpret data frames from a file or network interface
NIST SP 800-61 framework
preperation
detection & analysis
containment, eradication, and recovery
post incident activity
3 types of NIDS
network-based intrusion detection system
inline, network tap, passive
OSI Model
PDNTSPA
Application Layer protocols
HTTP, FTP
Presentation Layer protocols
JPG,TLS,SSL,PNG
Session Layer protocols
NetBIOS
Responsible for the communication of devices
Important IP addresses
Loopback: 127.0.0.1
Link local: 169.254.x.x
Prívate: 10.0.0.0- 10.255.255.255
172.16.0.0, 192.168.0.0
Different Layers of Firewalls
Cyber Kill Chain
The model identifies what the adversaries must complete in order to achieve their objective.
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control (C2)
- Actions on objectives
Kerberos
a ticket-granting system
Uses username and password to AS (Authentication server) > AS sends ticket (encrypted secret key derived from users password)
SQL Injection
a web application directly includes unsanitized data provided by the user in SQL queries.