MAIN Flashcards
SOP
Same-origin policy: A webbrowser security mechanism that prevents javascripts from accessing data from a different origin. An origin consists of URI scheme, domain and port.
CORS
Cross-origin resource sharing: Is a browser mechanism that allows exceptions to SOP to access resources across origins. Implemented using response headers. Browser only allows access to response content if headers are set correctly. (Access-Control-Allow-Origin, Access-Control-Allow-Credentials)
LDAP
LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data about organizations, individuals and other resources such as files and devices in a network – whether on the public Internet or on a corporate Intranet. The common use is to provide a central place for authentication – meaning it stores usernames and passwords.
PKI
Public key infrastructure is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. In cryptography, a PKI is an arrangement that binds public keys with respective identities of entities (like people and organizations). The binding is established through a process of registration and issuance of certificates at and by a certificate authority (CA).
XSS
Cross site scripting: XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. Cross-site scripting vulnerabilities normally allow an attacker to masquerade as a victim user, to carry out any actions that the user is able to perform, and to access any of the user’s data. If the victim user has privileged access within the application, then the attacker might be able to gain full control over all of the application’s functionality and data. It allows an attacker to circumvent the same origin policy.
Types
- Reflected XSS: malicious script comes from the current request
- Stored XSS: malicious script comes from the applications database
- DOM-based XSS: vulnerability in client side code instead of server
SSRF
Server-side request forgery: Server-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker’s choosing.
In a typical SSRF attack, the attacker might cause the server to make a connection to internal-only services within the organization’s infrastructure. In other cases, they may be able to force the server to connect to arbitrary external systems, potentially leaking sensitive data such as authorization credentials.
OSI Modelle
OSI model
Layer Protocol data unit (PDU) Function[21]
Host layers
7 Application Data High-level APIs, including resource sharing, remote file access
6 Presentation Translation of data between a networking service and an application; including character encoding, data compression and encryption/decryption
5 Session Managing communication sessions, i.e., continuous exchange of information in the form of multiple back-and-forth transmissions between two nodes
4 Transport Segment, Datagram Reliable transmission of data segments between points on a network, including segmentation, acknowledgement and multiplexing
Media layers
3 Network Packet Structuring and managing a multi-node network, including addressing, routing and traffic control
2 Data link Frame Reliable transmission of data frames between two nodes connected by a physical layer
1 Physical Bit, Symbol Transmission and reception of raw bit streams over a physical medium
OTP
A password only valid for a single session or transaction. Often combined with 2FA, where the required extra device shows/generates the otp.
OTP generation algorithms typically make use of pseudorandomness or randomness to generate a shared key or seed, and cryptographic hash functions, which can be used to derive a value but are hard to reverse and therefore difficult for an attacker to obtain the data that was used for the hash.
TCP/IP
Also known as the internet protocol suite.
- Link Layer
- Arp, MAC, Tunnels…
- Internet layer
- IP, IPsec, ICMP…
- Transport layer
- TCP, UDP…
- Application layer
- FTP, DNS, HTTP, HTTPS, IMAP, LDAP, SMTP, SSH , SSL, TLS, Telnet …
TCP Handshake
Syn -> Syn/Ack -> Ack : To establish a tcp connection. Both client and server set an initial sequence nubmer and send it over with the first request. The other party then increments it when necessarry, this allows to detect missing packages.
IPSEC
A secure network protocol suite that authenticates and encrypts packages. Includes protocols to establish mutual authentication and negotiate crypto keys.
Can protect data between a pair of hosts, a pair of gateways or a gateway and a host. Operates on OSI layer 3 or the internet layer in the TCP/IP Modell. (pretty low)
Modes of operation
1. Transport mode: (host to host) only the payload of the ip packet is usually encrypted
2. Tunnel mode: (to gateway) entire ip packet is encrypted and authenticated and encapsulated into new ip packet with new ip header [used f.e. for vpns]
VPN
Extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Benefits: 1) increases in functionality 2) security 3) management of private network
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols(f.e. through ipsec) over existing networks.
IDS
Intrusion detection system. Software application that monitors a network or system for malicious activity or policy violations. Findings are either reported directly to an admin or gathered in a security information and event management (SIEM) system.
Types
- host based (HIDS) : Monitors f.e. important files related to the operating system
- network (NIDS): Monitors incoming network traffic
Detection methods
- signature-based
- anomaly-based (recognizes deviations from “good”/”normal” traffic, often based on machine learning)
- (reputation-based? : based on score)
IDS which include capabilities to respond the alerts are referred to as IPS. Systems combining both are also sometimes called IDPS - Intrusion detection and prevention system.
IAM
Identity and access management. Framework of policies and technologies to ensure that the correct users have the appropriate access to technology resources. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilising IT resources but also the hardware and applications employees need to access.
SMB
Server message blocks. A communication protocol for file sharing, network browsing, printing, and inter-process communication (IPC) between nodes on a network. Mostly used with Windows named “Microsoft Windows Network”.
Implementations : Samba, Netsmb ….