Network Security Flashcards

1
Q

Firewalls

A
  • protect inside from outside

- have certain rules to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stateful Firewalls

A
  • directory of UDP TCP connection
  • connection states:
  • > NEW: packet starts new connection/stream
  • > ESTABLISHED: packet is associated to existing connection
  • > RELATED: packet starts new connection associated to existing one

action src sport dst dport state
allow $INSIDE * * 80443 NEW -> allows new connections
allow * * * * ESTABLISHED -> allow established going out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DMZ Networks

A
  • separate internal from external network
  • DMZ (Demilitarized Zone) accessible from outside
    internet

    external firewall

    lan switch -> web server, mail, dns

    internal firewall

    lan switch -> database, workstation etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial-of-Service targets

A

CPU -> overload target with complex calculations
RAM -> consume all of memory for processing requests
Bandwidth -> exhaust network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distributed Denial-of-Service (DDoS)

A
  • with a botnet

- multiple attacks traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP/UDP Floods

A
  • target bandwidth
  • send a lot of repeated requests
  • only works when BW_att&raquo_space; BW_target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SYN Floods: attack and defence

A
  • tries to attack TCP stack
  • SYN opens TCP connection half way
  • > exhaust memory by 1000s open time

solve: SYN cookies -> cookie has an ACK so needs to wait for attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reflection Attacks

A
  • set source IP to items ip address

- reflectors will then send to target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Amplification Attacks

A
  • use reflector idea

- then use some protocol that needs a bigger response from server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP Flood

A
  • flood server with fetching data

- very low effort for attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Slowloris

A
  • HTTP attack
  • send an incomplete request
  • send time after time more information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

R.U.D.Y.

A
  • HTTP attack
  • send POST ans specify large content
  • slowly send parameters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compression bombs as HTTP

A
  • HTTP support compression

- when arrives zip bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Water Torture Attack

A
  • DNS based attack

- overload authoritie name server with queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Upstream filters

A
  • DoS defence

- high ISPs blacklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anti-Spoofing

A
  • DoS defence

- block spoofed traffic

17
Q

Detect & Block - DoS

A
  • Detect and block DoS attacks
  • Firewalls
  • traffic analysis
  • etc.
18
Q

Traffic Shaping

A
  • Rate limiting; just allow maximum
  • CAPTCHAs
  • Reputation-based blocking
19
Q

DNS: Name Resolution

A

me -> . (root): IP of syssec.mmci.uni-saarland.de
. (root) -> me: NS .de is at 194.0.0.53

me -> de.: IP of syssec.mmci.uni-saarland.de
de. -> me: NS uni-saarland.de is at 134.96.7.7

me ->:IP of syssec.mmci.uni-saarland.de?
uni-saarland.de. -> me:NS mmci.uni-saarland.de is at 139.19.1.1

me ->:IP of syssec.mmci.uni-saarland.de?
mmci.uni-saarland.de. -> me:IP of syssec.mmci.uni-saarland.de is 139.19.86.150

20
Q

DNS Recursive Resolvers vs. Authoritative NS

A

RR A NS
serve DNS clients Server recursive resolver
Resolve any domain only replies domains that are in its zone
iterate query denies recursive domains

21
Q

DNS Cache Poisoning

A
  • Inject attacker-specified RRs(Recursive resolver) to cache

- can redirect, disable

22
Q

DNS Cache Snooping

A
  • Did a client recently visit domain X
  • Attacker probes resolver for cached entries
  • can find website out
23
Q

DNSSEC

A
  • DNSSEC signs resource record
  • DNSSEC RRSIG contains signature for set of RRs
  • Resolver verifies signature (RRSIG RR)
  • Resolver verifies public key (DNSKEY RR)
24
Q

DNSSEC criticism

A
  • give to governing country power
  • DNS size bigger -> DDoS
  • not end to end security
25
Q

DANE

A
  • DNS-based Authentication of Named Entities

- support TLS in validating certificates