Notes From Lynda Course Flashcards
Port 21
FTP
Port 22
SSH
Port 389
RDP
Ports 137-139
NetBIOS
Port 25
SMTP
Port 110
POP
Port 143
IMAP
Port 80
HTTP
Port 443
HTTPS
Symmetric Algorithms
Encryption and decryption operations use the same key
Asymmetric Algorithms
Encryption and decryption operations use different keys
Salting
Adds a value to the encryption key to make it more complex
Hashing
Adds time to the verification process by requiring more math
WPA
WiFi Protected Access - Uses the Temporal Key Integrity Protocol (TKIP) to implement strong encryption
WPA2
Wifi Protected Access v2 - Adds time to the verification process by requiring more math
LEAP
Lightweight EAP - Insecure protocol that relies upon MS-CHAP
EAP
Broad framework with many variants, some are secure, some are not
PEAP
Protected EAP - Tunnels EAP inside an encrypted TLS session
Spyware
Gathers information
Adware
Displays advertisements
Ransomware
Blocks access
Christmas Tree Attack
Uses packet flags to exploit a system
DNS/ARP Poisoning
Redirects or intercepts traffic
Typosquatting
Exploits typos to get web traffic
Two components of every malware
- Propagation Mechanism
2. Payload
Propagation Mechanism
The way a malware object spreads
Payload
The malicious action that the malware performs
Virus
Type of malware that is spread by user interaction (User education is the best preventative measure)
Worm
Type of malware that spreads by itself - require vulnerable systems to spread (Keeping systems updated is the best preventive measure)
Trojan Horse
Type of malware that disguise themselves as a beneficial program with a malicious payload (Application control is the best protection from this)
Remote Access Trojans (RAT)
Provides backdoors to hacked systems
Three types of malware payloads
Adware, Spyware, Ransomware
Three types of propagation techniques
Virus, Worm, Trojan Horse
Backdoor
Provides unregulated workaround access to a system using modified code
Backdoor mechanisms
Hardcoded accounts, default passwords, and unknown access channels can provide access
Logic Bomb
Uses modified code to deliver a triggered payload
Three advanced malware concepts
Rootkits, Polymorphism, and armored viruses
Rootkits
Software techniques used to hide other software on a system
Polymorphism
Changes signature to avoid detection, they use a different encryption key with each system they infect
Armored Viruses
Prevents reverse engineering, sandboxing, and blocks system debuggers to prevent detection
Root Account
A special superuser account that provides unrestricted access to system resources
Rootkit Payloads
Backdoors, Botnet agents, Adware/spyware, Antitheft mechanisms
User Mode Rootkits
Run with normal user privileges, easy to write and difficult to detect
Kernel Mode Rootkits
Run with system privileges, difficult to write, and easy to detect
Signature detection
Identifying viruses by detecting known code patterns from a database
Christmas Tree Attack
All of the flags are set to 1 in the header packet which can crash a system or can be used to do OS fingerprinting
DNS
Domain Name Service - A service that translates common domain names into IP addresses for the purpose of network routing
ARP
Address Resolution Protocol - Protocol that translates logical IP addresses into the hardware (MAC) addresses on the LAN
Typosquatting
AKA URL Hijacking - an attack that consists of registered domain names similar to official sites, hoping that users will make a typo and visit their site
Domain Hijacking
Steals a domain registration or alter DNS records
MAC Spoofing Attack
Alters hardware addresses
IP Spoofing Attack
Alters IP Addresses - often used in DoS attacks - not useful in attacks that require return data because receiving data on a spoofed IT is not easy
Ingress Filtering
Blocks incoming traffic from external networks bearing an internal source IP address - useful for blocking spoofing attacks
Egress Filtering
Blocks outbound traffic from internal networks bearing a source IP address that you don’t control
Four Common types of password attacks
- Brute Force,
- Dictionary Attack,
- Hybrid Attack
- Rainbow Table Attack
Brute Force Attack
Attempts all combinations for a password - only works for short non-complex passwords. AKA Known Ciphertext Attacks
Dictionary Attack
All English language words are attempted
Hybrid Attacks
Adds common variations to the Dictionary Attack
Rainbow Table Attack
Pre-computed hashes are used
Keyspace
The set of all possible encryption keys usable with an algorithm