Network security: Introduction to network security Flashcards
How does TCP/IP work
How does routers work?
How does ARP work?
How is risk managed?
- Accepting the risk: watch for it (monitoring), not mitigating
- Transfer the risk (insurance, taking the risk and transfering the impact somewhere else)
- Remove the risk
- Mitigate the risk: Reduce impact, reduce the risk itself
- Policies and mechanisms implementation
What is risk assessment?
Calculating impact of risk
Quantitative risk assessment: Monetary value for impact
Qualitative risk assessment: Categorize the levels of risk (Low, medium, high)
What are threat trees?
Root node is the threat
The child-nodes are sub-threats
Relationships between sibling nodes can be AND or OR
What is a threat matrix?
Tool that model and categorizes potential threats by applying a structured ranking process (low-severe)
Categories:
- Existence
- Capability
- History
- Intentions
- Targeting
How does boolean values move in an attack tree
Parent node inherit value of children
AND children: I + P -> I
OR children: I + P -> P
How does continuous values move in an attack tree
Most likely attack is the cheapest one that requires no special equipment
Values propagate upwards
OR: Parent get the cheapest child value
AND: Parent get sum
Define Exposure Factor (EF)
Percentage of asset loss caused by identified threat
What is Single Loss Expectancy (SLE)
Asset value times EF
What is Annual Rate Occurrence (ARO)
Estimated frequency of a threat during a year
What is Annual Loss Expectancy (ALE)
SLE * ARO
What are the steps in theNetwork attack methodology?
Initial recon
Initial compromise
Establish foothold
[ -> loops
Escalate privileges
Internal recon
Move laterally
Maintain presence ->
] -> complete mission
What is reconnaissance?
Attackers are likely to spend a lot of time on this step
Non technical: Dumpster diving, going through someone’s personal belongings, social media
Technical: Trying to identify the target’s OS, technical training, etc.
What happens during the vulnerability identification phase of a network attack?
Identifying resources that are being exposed (IP address, software, OS, exposed ports)
Can there be any vulnerabilities in software, design mistake, misconfiguration
What happens during the exploitation phase of an network attack
The attacker is gaining access, preferably root level- or admin access.
Getting control of a user - elevating that user’s privileges
Denial of service (DoS)
What happens during post exploitation of an network attack?
This is the goal of the attack
Accessing and retrieving data.
Maintain long term access
Removing forensic information on the systems
What is reconnaissance?
First step in a system attack.
Gathering information about the target before doing the attack itself.
Want to spend quite a bit of time in this step gathering information
What information can be gathered during the reconnaissance step of a network attack?
- IP Addresses: Range of IP addresses used by the target
- Network topology information: Gathered through experimentation or probing the network.
- Domain names
- Account logins : What format of account login is used. Is account names inferred by email addresses, are they first + surname
- Operating systems and software: Look at job listings to see if they mention software
- Security policies: Password complexity policies, reset password procedures, can a user call up and have their password reset later in the attack
- Physical security systems: Can a goal be accomplished by visiting the target in person?
- Employee hangouts: Overhear conversation, look at mobile phones and laptops, ID badges
Low tech (dumpster diving - look for documents, physical break in, social engineering - take advantage of people’s emotions to get them to reveal information)
What is the Google Hacking Database?
Indexes advanced searches that target information people have left online. Can be used to find specific information about your target. This, in addition to using Google advanced search correctly
What is Cree.py?
Open source intelligence gathering application that can gather pictures from social network platforms and sort geolocation data from the pictures.
What can an attacker use DNS for?
Domain registrants need to provide name, address and phone number for the admin and technical contact of their domain.
If an attacker has the IP Address of the DNS server, they can gather more information about the target
What are the different types of DNS records? (10)
A, MX, NS, CNAME, SOA
SRV, RP, PTR, TXT, HINFO
What is an A record (DNS)?
Address record describing the IP address of a node
What is an MX record (DNS)?
Mail exchange
IP address of the server which handles mail for the domain
What is a NS record (DNS)?
Name server.
The domain name server that serve this domain name
What is a CNAME record (DNS)?
Canonical name
Aliases for host names
What is a SOA record (DNS)?
First line of DNS file.
Indicates that this server is the best source of information for this domain
What is a SRV record (DNS)?
Service record.
Information about available service in the domain
SIP ans XMPP use this
What is a RP record (DNS)?
Responsible person.
Assign an email address to a specific host
What is a PTR record (DNS)?
Pointer record.
Allows for reverse DNS lookup.
Typically required for MX hosts
What is a TXT record (DNS)?
Originally for human readable information, but now used for things such as domain keys
What is a HINFO record (DNS)?
Host info.
Supplies OS and other info about a host.
Generally not a good idea to have this record
What can WHOIS be used for?
To lookup who owns a website or domain name