Securing Networks Flashcards
Privilege Escalation
§ Occurs when a user is able to gain the rights of another user or administrator
§ Vertical Privilege Escalation
§ Horizontal Privilege Escalation
Backdoor
A way of bypassing normal authentication in a system
keys to having network security
An IPS, proper firewall configs, network segmentation, and firmware updates are the keys to having network security
Electromagnetic Interference (EMI)
§ A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic conduction
§ EMI can be caused by TVs, microwaves, cordless phones, motors, and other devices
§ Shielding the cables (STP) or the source can minimize EMI
Radio Frequency Interference (RFI)
§ A disturbance that can affect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers
§ RFI causes more problems for wireless networks
Crosstalk
§ Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire
§ UTP is commonly used more often than STP
Data Emanation
§ The electromagnetic field generated by a network cable or device when transmitting
§ A Faraday cage can be installed to prevent a room from emanating
§ Split the wires of a twisted-pair connection
Protected Distribution System (PDS)
Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats
Service Set Identifier (SSID)
§ Uniquely identifies the network and is the name of the WAP used by the
clients
§ Disable the SSID broadcast in the exam
Rogue Access Point
An unauthorized WAP or Wireless Router that allows access to the secure
network
Evil Twin
A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one
Wireless Encryption Types
Pre-Shared Key (PSK)
Wired Equivalent Privacy (WEP)
WiFi Protected Access (WPA)
WiFi Protected Access version 2 (WPA2)
Pre-Shared Key
Same encryption key is used by the access point and the client
Wired Equivalent Privacy (WEP)
§ Original 802.11 wireless security standard that claims to be as secure as a wired network
§ WEP’s weakness is its 24-bit IV (Initialization Vector)
IV (Initialization Vector)
WiFi Protected Access (WPA)
Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption
TKIP, RC4
WiFi Protected Access version 2 (WPA2)
§ 802.11i standard to provide better wireless security featuring AES with a
128-bit key, CCMP, and integrity checking
§ WPA2 is considered the best wireless encryption available
CCMP and AES
2.4 GHz signal
Wireless B, G, and N use a 2.4 GHz signal
5.0 GHz signal
Wireless A, N, and AC use a 5.0 GHz signal
Jamming
§ Intentional radio frequency interference targeting your wireless network to cause a denial of service condition
§ Wireless site survey software and spectrum analyzers can help identify jamming and interference
AP Isolation
Creates network segment for each client when it connects to prevent them from communicating with other clients on the network
Wireless Attacks
War Driving War Chalking IV Attack WiFi Disassociation Attack Brute Force Attack
IV Attack
Occurs when an attacker observes the operation of a cipher being used with several different keys and finds a mathematical relationship between those keys to determine the clear text data
This happened with WEP and makes it easy to crack
WiFi Disassociation Attack
§ Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects
§ Used as part of an attack on WPA/WPA2
Brute Force Attack
Occurs when an attacker continually guesses a password until the correct
one is found
WPA3 - Enterprise Mode
Uses AES-256 encryption with a SHA-384 hash for integrity checking
WPA3 - Personal Mode
Uses CCMP-128 as the minimum encryption required for secure connectivity
Simultaneous Authentication of Equals (SAE)
§ A secure password-based authentication and password-authenticated key agreement method
§ Simultaneous Authentication of Equals (SAE) provides forward secrecy
Perfect Forward Secrecy or Forward Secrecy
A feature of key agreement protocols (like SAE) that provides assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised
Bluejacking
Sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and tablets
Bluesnarfing
Unauthorized access of information from a wireless device through a Bluetooth connection
Radio Frequency Identification (RFID)
§ Devices that use a radio frequency signal to transmit identifying information about the device or token holder
§ RFID can operate from 10 cm to 200 meters depending on the device
Near Field Communication (NFC)
§ Allows two devices to transmit information when they are within close range through automated pairing and transmission
§ NFC devices are operated within 4 cm from each other