Privleged Network Insider Attacks Flashcards
What is the most common hacker tool used after gaining inital network access?
sniffers
Privileged network position
an attacker on the same LAN in an organization
How are many attacks discovered
only when a sniffer log consumes all available file space
what is promiscuous mode
when an Ethernet interface is gathering all traffic regardless of its destination hardware addresss.
What is a hardware address
MAC Address
What is a MAC Address
each Ethernet card is programmed with a unique Mac Address?
Traditional Ethernet
Implemented in a hub, is a broadcast medium, which broadcasts ALL data to ALL systems connected to the LAN segment.
Is Traditional Ethernet sniffable?
Yes.
Switched Ethernet
Does not broadcast all information to links of the LAN segment. It is more intelligent than the hub(traditional ethernet) by looking at the destination MAC address, only sending the data to the required port on the switch.
Traditional Ethernet VS Switched Ethernet
Tradtional is a hub, Switched is a switch. Traditional broadcasts to all systems connected on LAN. Switched looks at the destination MAC address and only sending data required for that address.
How does switch operate in Switched Ethernet?
observes the source MAC address of frames going from each physical port to learn which MAC addresses are connected on that port. The switch rememberes this mapping of MAC address(layer 2) to physical address (layer1) in memory on the switch.
Does the switch remember the mapping of MAC address (layer 2) to physical address (layer 1) in memory on the switch?
yes.
Content Table Addressable Memory (CAM) table
Used in Switch Ethernet when the switch remembers the mapping of MAC address(layer 2) to physical address (layer 1) in memory on the switch. When new frames arrive at the switch, the device can consult its CAM table to determine which physical interface to send this packet to so it arrives at its destination.
https://www.youtube.com/watch?v=TIHvWb-gruc
Ethernet frame?
is primarily responsible for the correct rule making & successful tranmission of Data Packets when transmitting data over the ethernet.
Ethernet?
Ethernet is a family of wired computer networking technologies commonly used in local area networks,
Using the CAM table the switch switches?
True.
two ways to sniff a switched environment?
redirect the flow of traffic on the LAN by 1. attacking th e switch directly 2. going after the machine sending the traffic
Sniffers?
Gather all information transmitted accross a line
Broadcast media
(non switched ethernet or Wi-Fi networks) allow an attacker to gather passwords and more
Wi-Fi networks are akin to hubs?
True. (Pre switch days.)
Wireshark
Sniffing tool.
Wireshark abilities?
- parse traffic from network or read, parse, display packet capture
- read files in TCPDumps/Libpcap native format
- convert dozens other popular sniffer file formats
- Parse over 500 different protocols
Should you install wireshark on a compromised system?
NO. use built in tools to take a packet capture.
Scenario. Need to take a packet capture of a compromised windows system. How do I do it?
Use built in tool netsh to take the packet capture, it will be propietary so transfer the .etl file to analysis workstation and use et12pcapng.exe to convert the .etl capture to a .pcapng to be compatible with Wireshark.
netsh
Built in tool on windows can create packet capture.
netsh trace start capture=yes maxsize=1000 tracefile-pcap.etl
netsh trace stop
.etl and .etl12pcapng.exe
.etl : is microsoft windows propitary packet capture format
.etl12pcapng.exe : is used to convert the etl file to a compatile packet capture type for wireshark such as .pcapng