Networking Equipment Flashcards
7 commonly used protocols for remote management of devices?
- Telnet
- Web based protocols (HTTP, HTTPS)
- SSH
- SNMP
- TFTP
- Cisco Reverse Telnet
- NTP
Management Protocols - Telnet?
- Not encrypted, all plain text
Management Protocols - Web Based Protocols
HTTP (HyperText Transfer Protocol)
- Not encrypted, all plain text
HTTPS
- Secure, TLS 1.3 is latest version - 1.2 vulnerable
Management Protocols - Secure Shell
- Secure, depends on encryption
- can log in with uname and password or without if have the private key
Management Protocols - SNMP (Simple Network Management Protocol)
- Used by Network Management Systems (NMS) to monitor network infrastructure
- SNMPv1 is unencrypted
SNMPv3 (latest) is encrypted
SNMP could leak credentials and other data.
If there is write access - remote code execution is possible
Management Protocols - TFTP (Trivial File Transfer Protocol)
- Simple to implement
- No authentication or access control mechanisms
Management Protocols - Cisco Reverse Telnet
- Allows the Telnet server to write to a computer terminal or device
Telnet - Network to network
Reverse telnet - network to serial (hardware communication)
Management Protocols - NTP (Network Time Protocol)
- Used to synchronise clock between computer systems in a network (UDP port 123)
- Could leak system info, host names of network, etc.
nmap -sU -sV –script “ntp* and (discovery or vuln) and not (dos or brute)” -p 123 <target_ip></target_ip>
What would you use for local network traffic analysis?
Wireshark
Raw data can be seen at each different layer:
Frame -> Ethernet -> IPv4 -> Http
This shows hexdumps of data.
Files can be extracted from PCAP files.
How to extract HTTP files?
- Open the .pcap file
- File -> Export Objects -> HTTP…
- Choose what you want to save
How to extract FTP files?
- Filter for FTP-DATA packets
- Right-click -> Follow -> TCP Stream
- Select RAW as the output type
- Save the file
What is ARP?
Description and Security issues?
Address resolution Protocol (ARP)
Discovers MAC addresses in the network.
No authentication
ARP Spoofing - pretends to be another computer for man in the middle attacks.
What is DHCP?
Description and Security issues?
Dynamic Host Configuration Protocol (DHCP)
Automatically assigns IP addresses to new devices in the network.
Commonly found in routers.
No Authentication required, can be used for man-in-the-middle attacks or unauthorised access to resources or DoS
What is CDP?
Description and Security issues?
Cisco Discovery Protocol (CDP)
Used to share info about other directly connected Cisco equipment, such as OS version and IP address.
Information leakage
What is HSRP?
Description and Security issues?
Hot Standby Router Protocol (HSRP)
Provides redundancy for routers through virtual MAC addresses etc.
DoS, take over active router.