Module 12 - Evading IDS, Firewalls, and Honeypots Flashcards

1
Q

IDS, Firewall, and Honeypot Concepts:

Is a security software or hardware device which inspects all inbound and outbound network traffic for suspicious patterns that may indicate a network or system security breach.

a. HIDS (Hardware Intrusion Detection System)
b. SIDS (Software Intrusiton Detection System)
c. IDS (Intrustion Detection System)
d. TIDS (Timed Intrustion Detection System)

A

c. IDS (Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDS, Firewall, and Honeypot Concepts:

  • It detects the intrusion based on the fixed behavioral characteristics of the users and componenets in a comuter system.
  • Never seen before.
    a. Protocol Anomaly Detection
    b. Anomaly Detection
    c. Signature Recognition
A

b. Anomaly Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS, Firewall, and Honeypot Concepts:

  • Also known as misuse detection, tries to identify events that indicate an abuse of a system or network resources.
  • Known attack
    a. Protocol Anomaly Detection
    b. Anomaly Detection
    c. Signature Recognition
A

c. Signature Recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS, Firewall, and Honeypot Concepts:

These mechanisms typically consist of a black box that is placed on the network in a promiscuous mode, listening for patterns indicative of an intrusion.

a. Network-Based IDS
b. Host-Based IDS
c. Time-Based IDS
d. User-Based IDS

A

a. Network-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS, Firewall, and Honeypot Concepts:

These mechanisms usually include auditing for events that occur on a specific host.

a. Network-Based IDS
b. Host-Based IDS
c. Time-Based IDS
d. User-Based IDS

A

b. Host-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS, Firewall, and Honeypot Concepts:

  • Are hardware and/or software designed to prevent unauthorized access to or from a private network.
  • They are placed at the junction or gateway between the two networks, which is usually a private network and a public network such as the internet.
  • They are the 1st line of defense on a network.
A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDS, Firewall, and Honeypot Concepts:

_____ host is a computer system designed and configured to protect network resources from attack.

  • Anything in a DMZ is considered a _____ host.
    a. Multi-homed
    b. Screened
    c. Bastion
    d. Protected
A

c. Bastion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDS, Firewall and Honeypot Concepts:

  • Is a network that serves as a buffer between the internal secure network and insecure internet.
  • It can be created using firewall with three or more network interfaces, assigned with specific roles such as internal trusted network, DMZ network, and external un-trusted network.
A

DMZ (DeMilitarized Zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reviwed

IDS, Firewall, and Honeypot Concepts:

  • Is either a dedicated stand-alone hardware device or it comes as part of a router.
  • The network traffic is filtered using the packet filtering technique.
    a. Packet Filter Firewall
    b. Software Firewall
    c. Hardware Firewall
    d. Circuit Firewall
A

c. Hardware Firewall

Comments:

-Packet filtering can be done by software (Ex:iptables)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDS, Firewall, and Honeypot Concepts:

  • Is a software program installed on a computer, just like normal software.
  • It is generally used to filter traffic for individual home users.
  • Host-Based
    a. Packet Filter Firewall
    b. Software Firewall
    c. Hardware Firewall
    d. Circuit Firewall
A

b. Software Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS, Firewall, Honeypot Concepts:

  • Work at the network layer of the OSI model (or the IP later of TCP/IP). They are usually a part of a router.
    a. Packet Filter Firewall
    b. Software Firewall
    c. Hardware Firewall
    d. Circuit Firewall
A

a. Packet Filter Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDS, Firewall, and Honeypot Concepts:

  • Is a private network constructed using public networks, such as the internet.
  • It is used for the secure transmission of sensitive information over an untrusted network, using encapsulation and encryption.
  • IPSec
A

VPN (Virtual Private Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evading IDS:

Obfuscating means to:

A

Hide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Evading IDS:

What must you do to a packet so the IDS can’t see inside the packet?

A

Encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Evading IDS:

If you want to get a packet through an IDS you need to?

A

Fragment it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evading Firewalls:

An attacker has completed the Reconnaissance/Footprinting phase, but did get the information they were looking for. The attacker will then conduct what in order to try and obtain the required information?

A

Banner Grabbing

Coments:

To identify a Firewall, the atacker can do:

PortScaning -> Some paterns could help to identify the manufacturer.

Firewalking -> Sets TTL to one to identify one holp after firewall and locate it.

Banner Grabbing - > Service banners coul help to identify vendors.

17
Q

Evading Firewalls:

Is used to identify open ports and services running on these ports.

a. Firewalking
b. Port Scanning
c. Banner Grabbing

A

b. Port Scanning.

Comments:

Firewalking is a technique developed by Mike Schiffman and David Goldsmith that utilizes traceroute techniques and TTL values to analyze IP packet responses in order to determine gateway ACL (Access Control List) filters and map networks. It is an active reconnaissance network security analysis technique that attempts to determine which layer 4 protocols a specific firewall will allow.

Firewalk is a software tool that performs Firewalking.