Midterm 426 Flashcards

1
Q

_____ defines list of reserved ports.

A

Internet Assigned Numbers Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Briefly explain TCP’s three-way handshake. (2 points)

A
  • Each party selects Initial Sequence Number
  • shows both parties are capable of receiving data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Briefly explain SYN flooding. (3 points)

A
  • attacker sends many TCP SYN packets without responding to the SYN-ACK
  • victim allocates resources
  • once resources exhausted, requests from legitimate clients are denied
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Briefly explain TCP Reset (RST) attack. (3 points)

A
  • If RST header is set, the TCP connection is dropped
  • Attackers can forge TCP packets from sender with RST header set
  • Must set source IP, port IP, dest IP and port sequence number correct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the RST attack used for?

A

To stop traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Briefly explain what is port scanning. (2 points)

A

To determine: 1) hosts on a network and 2) services they run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Briefly explain what is SYN scanning. (3 points)

A
  • generates raw IP packets with SYN flag
  • monitor responses
  • but does not open full TCP connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Briefly explain what is UDP scanning.

A

When UDP port is not open, system responds with ICMP port unreachable message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Briefly explain ACK scanning.

A

Determines if port is filtered or unfiltered by a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Briefly explain FIN scanning.

A

Closed ports reply to a FIN packet with the appropriate RST header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Briefly explain X-MAS scan.

A

Similar to FIN scan, but sends packets with FIN, URG, and PUSH flags turned on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the easiest way to create custom packets?

A

Using hping3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is device fingerprinting?

A

Information collected about the software and hardware of a remote computing device for the purpose of identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Internet Protocol allows network and applications to do? (2 points)

A

Allows network to interoperate.
Allows applications to function on all networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Briefly explain what is IP - Spoofing (Blind)? (2 points)

A

Occurs when the attacker is not on the same subnet as the destination. Sends an IP packet with a source route specified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Briefly explain what is IP-Spoofing (non-blind) ? (3 points)

A
  • Attacker needs to know the TCP sequence numbers used in the TCP segments to hijack a session
  • Successful guesses of TCP sequence numbers, the attacker can send a properly constructed ACK segment to the destination
  • If the attacker’s ACK segment reaches the destination before the originator’s, the attacker becomes trusted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is IP fragmentation perfect for resource exhaustion attacks? (3 points)

A
  • Difficult reassembly (must keep track of all fragments until packet is reassembled)
  • Resource allocation is necessary
  • Lots of fragments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mention some important fields of IP fragmentation. (3 points)

A
  • Total length
  • Fragment offset
  • Fragment ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does ARP do?

A

Locates a host’s link-layer (MAC) address.

20
Q

Briefly explain ARP spoofing. (3 points)

A
  • Each ARP response overwrites the previous entry in ARP table
  • Forge ARP response
  • Attacker impersonates the switch (Middle-person attacks)
21
Q

Briefly mention the ARP spoofing defenses. (2 points)

A
  • Smart switches that remember MAC addresses
  • Switches that assign hosts to specific ports
22
Q

What does DHCP do?

A

Dynamically assigning IP addresses to hosts in a network.

23
Q

Which 4 types of messages does DHCP use?

A

Discover, Request (Client)
Offer, ACK (Server)

24
Q

Briefly explain DHCP server spoofing. (3 points)

A
  • Attacker operates a rogue DHCP server
  • User can blindly start a DHCP communication with the attacker instead of the legitimate DHCP server on the network
  • Host now has an IP address assigned not by the DHCP server, but by the attacker
25
Briefly explain DHCP starvation. (3 points)
Goal: exhaust the address space available to the DHCP server. - Attacker sends a flood of fake DHCP Discover messages with spoofed MAC addresses - All available IP addresses are then reserved
26
How does DHCP snooping protect the network from the man-in-middle attack? (4 points)
- DHCP server is connected to the port Fa0/11 - Configure DHCP snooping to allow Offer/ACK messages only on this port - The switch will accept Offer/ACK messages only on the ports that are configured as the allowed ports - If it receives Offer/ACK messages that are not configured as the allowed ports, messages are discarded
27
How does DHCP snooping prevent DoS attack? (3 points)
- Maintain a record of all offered/leased IP addresses in the DHCP binding table - When it receives a Discovery/Request message on an untrusted port, it reads the MAC address of the message - If it finds an entry in the DHCP binding table, it discards the message
28
What is a DNS zone?
A distinct part of the domain namespace which is delegated to a legal entity -- a person, organization or company responsible for maintaining the DNS zone
29
What are some DNS record types? (6 points)
A: IPv4 AAAA: IPv6 CNAME: alias MX: MTA SOA: Authoritative info TXT: notes + machine-readable data
30
What are the bailiwick rules? (3 points)
- Root servers can return any record - TLD servers can return anything within that TLD - Ns.bank.com can return anything for bank.com
31
Briefly explain key exchange/management.
Allows A and B to agree on a shared (session) key, which is then used for communication during that session in the authenticated manner.
32
What are some attacks against RSA? (2 points)
- Probably message attack (encrypt all possible plaintext messages). Solution: pad the plaintext messages with random message - Timing attacks. Recover the private key from the runtime of the decryption algorithm.
33
Digital signatures: expected to be ____ under ____.
existentially unforgeable; adaptive chosen-message attack
34
What attack can be used against DH?
Middle-person attack.
35
3 ways of distributing public keys?
- Public announcement or public directory - Public-key certificate - Certificate Authority (CA)
36
X.509 certificates are used in ___ and ___.
IPsec; SSL/TLS
37
What is X.509 for? (2 points)
- specifies certificate directory service - specifies a set of authentication protocols
38
What are some characteristics of certificate logs? (4 points)
- public auditable, append-only records of certificate - anyone (including CA) can submit certificates to a log - anyone can query a log for a cryptographic proof - the number of log servers is small
39
What does monitors do (CA)? (2 points)
- Periodically contact all of the log servers - watch for suspicious certificates
40
What does auditors do (CA)? (2 points)
- Verify that the log is behaving properly - verify that a particular certificate has been logged
41
What are some weaknesses of shared secret authentication? (2 points)
- Authentication is not mutual - off-line password guessing attack (if shared key from password)
42
What are some weaknesses of public key authentication? (2 points)
- the adversary can trick A into signing - A must use a different key for authentication
43
How to avoid reflection attacks (web authentication)? (2 points)
- A and B must do different things - the initiator should be the first to prove its identity
44
What are some limitation for KDC issuing ticket E to B relayed through A? (2 points)
- the adversary can replay E - must still be followed by mutual authentication using Kab
45
Briefly smurf attack. (5 points)
- generate fake Echo request containing a spoof source IP - the request is sent to an intermediate IP broadcast network - the request is transmitted to all of network hosts in the network - each host sends an ICMP response to the spoofed source address - with enough ICMP responses forwarded, the target server is brought down