Network Forensics Flashcards

1
Q

SPAN

A

Allows for the copying of ingress and/or egress communications from one or more switch ports to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packet Sniffer

A

A piece of hardware or software that records data from frames as they pass over network media using methods such as a mirrored port or tap device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

tcpdump

A

A data-network packet analyzer computer program that runs under a
command line interface
▪ It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Flow Collector

A

means of recording metadata and statistics about network traffic rather than recording each frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zeek (Bro)

A

a hybrid tool that passively monitors a network like a sniffer and
only logs data of potential interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MRTG

A

is a tool used to create graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DGA

A

a method used by malware to evade block lists by dynamically generating domain names for C2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fast Flux Network

A

malware to hide the presence of C&C networks by continually changing the host IP addresses in domain records using domain generation algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Recursive DNS Resolver

A

occurs when one trusted DNS server communicates with several other trusted DNS servers to hunt down an IP address and returns it to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unsafe Character in URL

A

Null string termination, carriage return, line feed, end of file, tab,
space, and \ < > { } PERCENT ENCODING - different percentage means a certain character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drop Versus Reject

A

A deny rule can either drop a packet or explicitly reject it by sending a TCP RST or an ICMP port/protocol unreachable to the requester. Dropping harder to ID port states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black hole vs Dark Net vs Sinkhole

A

Drops packet into void, port not used, and sends to different network for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transparent vs non transparent proxy

A

server directs request/ response without configuration. Has to be configured with proxy address and port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Common IPSs

A

Snort, Zeek, Security Onion - all open-source DPS/IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snort Rule Format

A

Action Protocol SourceIP SourcePort Direction - alert tcp $EXTERNAL_NET any -> $HOME_NET 143. IPS rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAC w/ 802.1x

A

Provides the means to authenticate users and evaluate device integrity
before a network connection is permitted, usually authentication inside switch or router. Standard for EAP communication over LAN, port based authentication. USAF Network