Review Questions Flashcards
What is/are the countermeasure(s) against MAC Flood and MAC Spoofing attacks?
1) port security
2) binding
3) ip source guard
4) dynamic ARP inspection (DAI)
5) ARP watch
6) ARP wall
Describe DHCP starvation attack and the countermeasures.
1) Exhausting the pool of IPs on a DHCP server
2) Port security
Describe Rouge DHCP attack and the countermeasures.
1) An unauthorized DHCP server on the network.
2) DHCP snooping
How do you evade IDS Signature detection and IDS anomaly detection?
Encryption and IP Fragmentation (also called Fragment scanning) evades Signature detection. Session splicing evades anomaly detection. Ex 1. timing channel. Ex 2 Timing template- setting in nmap
Anonymizers and proxies protect-privacy (security through obscurity) and__________________
Content filtering (data commands)
ARPWALL, ARPWatch, Private VLANs, Using Static ARP entries for servers, routers etc…helps you defend against______________
MAC spoofing
Explain full open scan (connect scan).
Syn, syn-ack, ack, rst
Explain half open scan
SYN, SYN-ACK, RST
Explain XMAS Scans
All flags (or PUF)
NMAP Syntex Review
- TCP Connect/Full open scan
- Stealth Scan/half open
- Xmas
- FIN
- Null
- TCP Connect/Full open scan: completes 3-way handshake: -sT
- Stealth Scan/half open: can spoof IP, bypasses firewall rules (Anti-spoof): -sS
- Xmas: FIN, URG, PSH: -sX
- FIN: FIN: -sF
- Null: No flags: -sN
NMAP Syntex review
-Idle
Idle: You need a Zombie, to help you determine if a port is open/closed: -sI
Write the NMAP syntax for:
Network scan of the entire subnet of 192.168.10.0.
-nmap -sn 192.168.10.0 0/24
or
-nmap -p 192.168.10.0 0/24
Write the NMAP syntax for:
Network scan all hosts from 192.168.10.200 to 192.168.10.250.
-nmap -sn 192.168.10.200-250
List the ICMP message types.
8-Echo request
0-Echo reply
3-Destination unreachable
11-TTL expired in transit
Describe multi-factor authentication -types and examples
Something you -know -have -are (2 or more)
Explain the differences between polymorphic (XOR’d) shellcode and Metamorphic virus.
Poly-algorithm doesn’t change, only the signature.
Met-both algorithm and signature change
Describe vulnerability scanning and what are the limitations.
Identifies vulnerabilities in a system
Detects only known vulnerabilities
What is the difference between auditing, vulnerability scanning and penetration testing?
Auditing-testing for compliance
Vulnerability testing-passive testing for vulnerability
Penetration testing-active testing for vulnerabilities
Describe the following SQL Injection commands
1) ‘
2) –
3) +
4) ||
5) UNION
1) used to test if a DB is susceptible to SQL injection
2) end of line or single line comments
3) concatenation operators
4) concatenation operators
5) joining multiple queries
Describe the following SQL Injection commands
1) UPDATE
2) DROPTABLE
3) Xp_cmdshell
4) OPENROWSET
1) update a table
2) delete a table
3) spawns a command shell
4) makes offline copy of a database
Write a typical SQL Injection syntax.
blah’ or 1=1 –
If you know the admin
Admin’ –
Difference between session hijacking and spoofing
Session hijacking-taking over a active session
Spoofing-attacker doesn’t see results (goes to spoofed address)
Difference between image steganography and SNOW.
Steganography-hides info in images
SNOW-hides info in white space
Difference between sparse infector, stealth and Macro viruses
Sparse infector-time trigger activated (Friday the 13th)
Stealth-hides between kernels and apps and intercepts system calls
Micro virus-targets office apps