Network Security Flashcards

1
Q

Network attacks covered

A

Routing (BGP), Naming (DNS Reflection) [ddos, phishing]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is internet vulenarable

A

Designed for simplicy, on by default, Host are insecure, Attacks can look like normal traffic, federated design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of attacks are packet switch networks vulnerable to?

A

resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of security?

A

Availability, confidentiality, Authenticity, Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of confidentiality attack

A

Man-in-the-middle or Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can eavesdropping be cared out in practice?

A

Someone on the same LAN could put their NIC into promiscuous mode and run a packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can eavesdropping be used to execute an Authenticity attack?

A

Then man in the middle can modify some of the content that was sniffed and then reinject that into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the negative impacts of attacks against the components of security

A

Theft of confidential info, Unauthorized Use, False Info, Disruption of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three types of control plane authentication

A

Session (point-to-point b/w routers), Path (protects AS path), Origin ensures that as advertising prefix is the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A route hijack is an attack on which type of authentecation

A

Origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do routing attacks happen?

A

Config Error, Routers compromised, unscrupulous ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most common routing attack?

A

Hijack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of routing attacks

A

Config / Management s/w, Tamper w/software, Tamper w/routing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does DNS masquerading work?

A

An AS advertises the ip to a known DNS server using BGP. This diverts traffic from the real nameserver. The attackers can then send different destination during name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MITM

A

Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AS poisoning

A

Allows an AS to become MITM. To get a route back to the origin, the ASs along the path back to the origin are prepended.

17
Q

How does prepending the addresses cause the AS along the path to keep the original path?

A

They sec (think) they already have the route and do not want to cause a loop

18
Q

How can MITM AS “hide”

A

Traceroute shows messages from hops when the TTL reaches zero. The routers in the AS never decrement the TTL

19
Q

Two types of session authentication

A
  1. Using TCP’s md5 token m = message; MD5(m, k) shared secret. 2. TTL hack; the two ASs agree to use a TTL of 256. Aythign < 256 is dropped
20
Q

BGPSEC

A

Secure border gateway protocol

21
Q

Parts of BGPSEC

A

Origin Attestation: Certification binding prefix to owner signed by trusted party. Path attestation: signatures along the path

22
Q

How does Path attestation avoid replay attacks

A

They include the origin AS id before encrypting

23
Q

types of attacks path attestation can protect agains

A

hijacks, shortening, modification

24
Q

Attacks path attestations cannot protect against.

A

Suppression, Replay (some types), Cannot guarantee the traffic moves along the dedicated path.

25
Q

Why is dns vulnerable

A

Resolvers trust response, Responses can contain info unrelated to the query. No authentication

26
Q

SOA

A

Start of Authority

27
Q

How does DNS cache poisoning work

A

Attacker can send multiple A records with different IDs to the recursive resolver.

28
Q

What is the issue with IDs?

A

2^16 or 16 bit can easily match due to the birthday paradox

29
Q

Kaminsky Attack

A

Generate query for 1.google.com, 2.google.com, etc. While sending A records and stuffing in a bogus NS record

30
Q

Defenses to DNS cache poisoning

A
  1. ID randomization, 2. Source port randomization, 3 “0x20 enconding
31
Q

What is 0x20 encoding?

A

The resolver and server agree on which characters in the domain will be upper or lower case

32
Q

DNS amplification attack?

A

attackers sends a request to the dns resolver and sets the victim as the source

33
Q

Why are they called amplification attacks?

A

The response from the dns resolver can be many times larger than the request