Network Hardening Techniques Flashcards
Footprinting
- Enumeration or information gathering attack
- Allows threat actor to discover topology and configuration of network and security.
- Can be done through social engineering or port scanning, eg.
Fingerprinting
- Identifies OS types and versions
- uses port scans or responded from application servers
On-Path attack
- Kind of spoofing attack
- Compromises connection between two hosts
- intercepts and relays communication between them
- Could modify information as well
- Man in the Middle attack
MAC or IP Spoofing
- Host can arbitrarily select address and attempt to use it on network
- Used to get around control lists or impersonate a host
- Usually legit host must be disabled
- Also used in DoS attacks
ARP Spoofing
- Broadcasting unsolicited ARP reply packets with source address that spoofs legit host or router
- All devices trust it because ARP has no security
- Usual target is subnets default gateway
- If successfully all traffic will be sent to attacker instead
- They could then read, manipulate or not forward packets for DoS attack.
Rogue DHCP
- On-path attack run by launching rogue DHCP server
- Those communications are not authenticated so host will trust first it receives.
- Can then change DCHP options
DNS Poisoning
- Compromises name resolution process
- Replace valid IP for trusted website with attacker IP
- They can then redirect traffic or steal information
- Can also be done by changing servers that resolving queries
VLAN Hopping
- Designed to send traffic to wrong VLAN
- Can double tag frames to go to wrong VLAN
- This can be mitigated by ensuring native VLAN uses different ID to any other user accessible VLAN
- Can also be done by attaching device to network that spoofs operation of switch and creating trunk port.
- Can be mitigated by preventing auto-configuration of trunk ports
Deauthentication attack
- Sends stream of spoofed management frames to disconnect from AP
- This may allow attacker to interpose evil twin AP or perform DoS attack
- Can be mitigated with MFP (802.11w)
DDoS
- DoS attack launched by many hosts at once
- Can consume network bandwidth or resource exhaustion
DRDoS
Distributed Reflection DoS/Amplification Attack
- Powerful type of TCP SYN flood attacks
- Spoofs Ip address and attempts to open connections with many servers
- Servers direct SYN/ACK to victim server
- Same thing can be done with responses to DNS requests
Hardening
- Deploying devices in secure configuration
- Changing default passwords/enfrocing password requirements
- Role based acess
- Disable uneeded network services and protocols
Endpoint security
- Security procedures at a device level
- Contrasts with perimeter security, but supplements it
Disabling Switch Ports
- turning off uneeded switch ports or sending them to black hole VLAN
- Not the best method as it can introduce other errors
- Attacker can also potentially unplug device from active port
MAC Filterintg and Dynamic ARP Inspection
- Defining MAC addresses that are permitted on particular port
- Attackers can use spoofed MACs
- ARP inspection prevents host attached to untrusted port from flooding with ARP replies
DHCP Snooping
- Causes swithc to inspect DHCP traffic arriving on acces ports to ensure its MAC is not beeing spoofed
- Can also be used to stop rogue DHCP servers
ND Inspection and RA Guard
- Perform similar fucntions to DAI and DHCP Snooping on IPV6
Port Security
- Refers to PNAC ( Port based Network Access)
- Switch performs authentication before activiating port
- Device requesting acces is supplicant
- Authenticator (switch) enabled EAP over LAN and waits for authentication data
- Data is verified by authentication server like RADIUS
PVLAN
Private VLAN
- Restrcits ability of hosts within VLAN from communicating with each other
- Used by hosting companies to stop servers owned by differnet companies from communicating
Default VLAN
- VLAN with ID1
- All switch ports default to this
- Should be left unused and all unused ports should not be assigned to VLAN 1
Native VLAN
- Where any untagged traffic is put when receiving frames over a trunk port
- Initally set with same VID as default VLAN
- This should be changed.
Implicit Deny
- Default Rule on firewall
- Blocks all traffic not matched by a rule
Tuple
- Parameter by which traffic is blocked or allowed on firewall
Control Plan Policing
- Policy designed to mitigate risk from route processor vulnerabilities
- Malicious worms or tools may appear to be high priority traffic on the control plane
- This can place high demands on routers and switches managing control plane traffic
- ACLs and rate limiting can be used to address these issues
PSKs
Preshared Keys
- Group authenticationi allwows stations to connect to network using passphrase
EAP
Extensible Authetication Protocol
- Allows users to authenticate against a RADIUS server using regular network credentials