SECFND 11: Network Security Technologies Flashcards
3 Phases of Attack Continuum
Before, During, After
3 attributes of “Before” attack continuum
Control, Enforce, Harden
3 attributes of “During” attack continuum
Detect, Block, Defend
3 attributes of “After” attack continuum
Scope, Contain, Remediate
“Before” characteristics
Identify what’s on the extended network to implement policies and controls to defend it
“During” characteristics
Detect and block malware continuously
“After” characteristics
Reduce the impact of an attack by identifying point of entry, determining the scope, containing the threat, eliminating the risk of reinfection, and remediating
AAA protocols
RADIUS & TACACS+
RADIUS port
UDP 1812 for auth, 1813, Accounting (or 1645 & 1646)
RADIUS encrypts…
Only the password in an access request packet
TACACS+ port
TCP 49
TACACS encrypts…
body of the packet (not the header)
IAM
Control users and devices connecting to the network. (NAC Like).
Contextual network attributes
NAD
network access device
IAM benefit
Different levels of access and service based on the device.
Firewall “routed mode”
Interfaces on multiple networks. Makes routing decision
Firewall “transparent mode”
L2 “bump in the wire”. All interfaces on same network
Network taps monitor which pins
Tx. Requires two NICS. One for inbound, one for outbound
Other span port names
Port mirroring, port monitoring
Steps to define SPAN port
- Define source port or VLAN. 2. Define destination
RSPAN
Remote span
RSPAN traffic
Flooded to dedicated VLAN
IPS Anomaly detection
IPS learns and alerts on deviations from baseline
Rule-based Detection
aka Signatures
IPS Reputation-based detection
Informed decisions based on reputation of sources. Drop traffic before more significant inspection
IPS installation methods
Appliance. Module installed in another device.
IPS evasion techniques
Traffic Fragmentation, traffic substitution and insertion, Encryption and tunneling
Traffic fragmentation techniques
Attacker fragments all IP traffic if IPS doesn’t perform reassembly. If it does, attacker fragments oddly to trick IPS.
Modify how TCP frame is segmented so IPS ignores. Can cause overwrite of segment.
Traffic substitution
Substitute payload data with other data in a different format. Unicode for letters, spaces with tabs, case sensitivity
Traffic insertion
Adding extra bytes to data
Parts of:
alert tcp $EXTERNAL_NET ANY -> $HTTP_SERVERS $HTTP_PORTS
Action (alert, drop, pass, etc.) Protocol (TCP, UDP, ICMP, IP) Source IP, Port Direction <> or -> only Destination IP, Port
What does IPS rule body do?
Keyword, colon, argument. Can have multiple arguments
Snort rule “Content” option
Set rules for specific content (sequence of characters or hex values).
Snort rule “msg” and “sid”
Message to print and Snort ID
WCCP
Web Cache Communication Protocol. WCCP is a protocol for communication between routers and Web caches.
transparent proxy vs. explicit proxy
Transparent proxy doesn’t require client settings. Explicit proxy requires client config.
Next Gen Firewall features
Application visibility and control, malware protection, URL filtering, SSL decryption, and next-generation IPS
Threat Intelligence
Evidence based knowledge about existing or emerging threat to assets that informs response to the threat
bogon
Bogus IP addresses
Bro
Network analysis framework like IDS
ELSA
Syslog framework
OSSEC
Open Source IDS/HIDS
Sguil
Network security monitoring. Event analysis
Squert
Web app for Sguil
Snort
IPS