Network and System Security Flashcards
2 sections of memory for hacking
Heap section
o Stores dynamic variables (malloc)
o Grows from lower memory to higher memory
Stack section o Track function calls o Local variables o Grows from higher memory to lower memory o For static memory allocation
Both stored in the computer’s RAM
Application-level gateway (FW)
aka Application Proxy
- Acts as a relay of application-level traffic
- If the gateway does not implement the proxy code for a specific application, the service is not supported and cannot be forwarded across the firewall
- High level of granular configuration options
- Tend to be more secure than packet filters
Disadvantage
o The additional processing overhead on each connection
Circuit-level gateway (type of FW)
aka Circuit-level Proxy
A firewall that provides UDP and TCP connection security, and works between an OSI network model’s transport and application layers such as the session layer.
- Can be a stand-alone system or a specialized function performed by an application-level gateway for certain applications
- Does not permit an end-to-end TCP connection
- The security function consists of determining which connections will be allowed
- Typical use is a situation in which a system administrator trusts the internal users
- Can be configured to support application-level or proxy service on inbound connections and circuit-level functions for outbound connections
- Example of implementation is the SOCKS package
- Work at the session layer of the OSI model, or as a “shim-layer” between the application layer and the transport layer of the TCP/IP stack
7 layers of OSI model – from highest to lowest
Open Systems Interconnection (OSI) Model
- Application
- Presentation
- Session
- Transport layer
- Network layer
- Data link layer
- Physical layer
2 types of Enumeration
Passive
o Search of interwebs with minimal traces in targets log files
o Using public sources to gather intelligence
o Correlating separate sources to draw meaning
Active
o Goal: identify as many systems, services, and potential vulnerabilities as possible
o Used on external or internal to a target
o Ping sweeps and port scans
Scanners examples
Masscan
o Scan entire internet in 6 minutes
Netdiscover
o LAN sniffing tool
o Good to discover MAC addresses
o Can now identify the types of devices on the network
Sparta
o GUI to run nmap, Nikto and more
Nikto
o Web server scanner
o Scans for known vulnerable files
o Output from nmap can be fed into Nikto
WAF
Web application firewalls are special FWs that protect a service
Broadcast address
The last address of the network
A broadcast address is an IP address that is used to target all systems on a specific subnet network instead of single hosts. In other words broadcast address allows information to be sent to all machines on a given subnet rather than to a specific machine
Fuzzing
Process where an attacker sends malformed packets to a service or application listening on the network
The goal is to force the application to fail or produce errors
Symmetric key
More commonly used since faster and easier – better performance
Same key used to encrypt and decrypt
Faster compared to public key encryption
Problem
o Key needs to be stored securely – hackable
o Both need the key
o Better to combine with assymetric
Hash
Examples?
A string or number generated from a string of text
The resulting string or number is a fixed length
The best hashing algorithms are designed so that it’s impossible to turn a hash back into its original string
o MD5
o SHA
o SHA-2
Used when storing passwords
Encryption
- Turns data into a series of unreadable characters that aren’t a fixed length
- CAN be reversed back into their originally decrypted form if you have the right key
Two primary types of Encryption
Symmetric key
The key to both encrypt and decrypt is exactly the same
Public key
Has two different keys
• One used to encrypt the string (the public key)
• One used to decrypt it (the private key)
3 classes of intruders
Masquerader
o An individual who is not authorized to user the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
Misfeasor
o A legitimate user who access data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
Clandestine user
o An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection
Examples of intrusion (10)
- Performing a remote root compromise of an email server
- Defacing a web server
- Guessing and cracking passwords
- Copying a database containing credit card numbers
- Viewing sensitive data, including payroll records and medical information without authorization
- Running a packet sniffer on a workstation to capture usernames and passwords
- Using a permission error on an anonymous FTP server to distribute pirated software and music files
- Dialing into an unsecured modem and gaining internal network access
- Posing as an executive, calling the help desk, resetting the executive’s email passwords, and learning the new password
- Using an unattended, logged-in workstation without permission
Hackers
Prevention?
Traditionally for the thrill of it or for status
- Intrusion detection systems (IDSs)
- Intrusion prevention systems (IPSs) are designed to counter hacker threads
- Consider restricting remote logons to specific IP addresses and/or use virtual private network technology
CERTS
Computer Emergency Response Teams
- They collect information about system vulnerabilities and disseminate it to the systems managers
- Hackers also routinely read CERT reports
- It is important for system administrators to quickly insert all software patches to discovered vulnerabilities
Criminal Hackers
- Organized groups of hackers
- Usually have specific targets, or at least classes of targets in mind
- Once a site is penetrated, the attacker acts quickly, scooping up as much valuable information as possible and exiting
- IDSs and IPSs can be used for these types of attackers, but may be less effective because of the quick in-and-out nature of the attack