Securing & Supporting the Network Flashcards
Firewall
Filters (permits or denies) traffic based on a set of criteria
Rules created for inbound and outbound connections
Network Based or Host-Based
Network Based Firewall
Physical hardware on the edge of the network
Usually also a router or just in line filter
Usually capable of NAT (Network Address Translation) because they’re internet facing devices
Host-Based Firewall
Software on a computer like Windows Firewall
Controls which applications and ports are allowed to talk inbound and outbound on an individual workstation or host computer
Dedicated Network Firewalls
Can provide multiple security services
Firewalling, VPN services, Anti-Malware, Content Filtering
Usually for corporate environments
This is called UTM (Unified Threat Management)
UTM
Unified Threat Management
A device that provides multiple security services like Firewalling, VPN services, Anti-Malware, Content Filtering
ACL
Access Control List
Used on routers and firewalls to create a list of rules for permitting and denying traffic. Can define the protocol such as IP, Source network, destination network, and the TCP/UDP port # for matching traffic
Stateless Firewall
Employs only Access Control Lists to control inbound and outbound traffic
Modern Firewalls are both stateful and stateless because they use ACLs and also keep track of connections
Stateful Firewall
Keeps track of connections and can allow return traffic as long as it was first generated from inside the network
Modern Firewalls are both stateful and stateless because they use ACLs and also keep track of connections
Deep Packet Inspection
Advanced Firewalls are capable of inspecting the contents of packets
Allows a firewall to determine the context of the connection (what it’s really doing) “What is the purpose of this traffic?”
Application Aware Firewall
AKA Context Aware Firewall
Can understand what devices, and what services and applications, the packets are for
Makes Network Based anti-malware possible
Decisions can be made on what is deep inside the packets rather than just where its coming from and where it’s going
Context Aware Firewall
AKA Application Aware Firewall
Can understand what devices, and what services and applications, the packets are for
Makes Network Based anti-malware possible
Decisions can be made on what is deep inside the packets rather than just where its coming from and where it’s going
VPN
Virtual Private Network
Establishes a private network connection over public networks and incorporates encryption to protect the tunnels between two end points
Normally incorporates encryption to protect the VPN tunnel
Host to Host VPN
Site to Site VPN
VPN Concentrator
Virtual Private Network Concentrator
A vpn concentrator is a device that is dedicated to handling large amounts of VPN connections. Most of the time the firewall also acts as a VPN Concentrator, but it could be a separate device
VPN Protocols
PPTP (Point-to-Point Tunneling Protocol)
GRE Tunnel (Generic Routing Encapsulation Tunnel)
IPSec (Internet Protocol Security)
SSL VPN (Secure Sockets Layer VPN)
PPTP
Point-to-Point Tunneling Protocol)
VPN Protocol
Uses PPP for authentication and modified GRE (Generic Routing Encapsulation) for the tunnel. No inherent encryption, unsecure, mostly obsolete
GRE Tunnel
Generic Routing Encapsulation Tunnel
VPN Protocol
Used with routers to create a generic tunnel. In combination with IPSec (Internet Protocol Security) to create an encrypted VPN Tunnel
IPSec
Internet Protocol Security
VPN Protocol
Provides a method for authentication and negotiation of crypto keys. Uses IKE (Internet Key Exchange) to negotiate the key and ISAKMP (Internet Security Association and Key Management Protocol) for key exchange
Authentication Algorithms: HMAC-MD5, HMAC-SHA-1
Encrypted Algorithms: DES, 2DES, Blowfish, AES
SSL VPN
Secure Socket Layer Virtual Private Network
Uses SSL to establish VPN connectivity. For host to site VPN. A web browser can be used to connect the VPN which is easier for VPN users.
NOT for site to site
Network Segmentation
An architecture that divides a network into smaller sections or subnets
DMZ
Demilitarized Zone
Private network that sits between a private LAN and the public internet
Used to expose webservers and other servers to the public internet without exposing the private LAN to the internet
If a machine on the DMZ becomes compromised the attacker will not have access to the LAN
Web servers place on the DMZ server with port 80 open from the outside to the DMZ only
Honey Pot
a host that is exposed or partially exposed to invite attacks while monitoring and collecting information
Honey Net
an entire network that is made to seem like a live production environment with weak security that invites attacks for monitoring purposes
Testing Lab
Separated from the production network
Useful for :
Testing patches and updates before deploying to the production network
Test new/different hardware/software set ups
Test fixes to complex problems
Train others on lab equipment without interfering with the production network
VLANs
Virtual Local Area Networks
Used for applying segmentation across the entire network and implement security in different ways for each VLAN
Can set up ACL that apply to each VLAN Gateway
Malware
Software written specifically to harm and infect a host system.
Includes viruses, worms, trojan horses, spyware, adware, ransomware, etc.
Compromised System
A host, server, network node, or other computer system that has been infected with malware or otherwise successfully attacked and exploited.
Compromised system sometimes give themselves
Attacks and Threats
Most attacks are performed by compromising computers with Malware that is designed to perform a specific type of attack
DoS (denial of Service)
DDos (Distributed Denial of Service)
DoS
Denial of Service
Floods the target with traffic
DDoS
Distributed Denial of Service
Bonet, zombie computers, coordinated attack, target cannot handle all the traffic and it goes offline
Smurf Attack
DDoS attack
Floods the target with spoofed ICMP (Internet Control Message Protocol) which spoofs the source IP on ICMP or on the ping
Attacker sends an IP directed broadcast ping to large networks with a spoofed IP source of the target victim and the ICMP replies to the target causing a DDoS attack
Most modern routers have directed broadcast turned off by default
VLAN Hopping
Virtual Local Area Network Hopping
A malicious user on one VLAN gains access to traffic on another VLAN that it shouldn’t have access to
Either acts as trunking switch (switch spoofing) or double tags its Frames with two VLANS
Can also exploit VoIP (Voice over IP) ports as they use data VLAN and voice VLAN
MITM
Main in the Middel attack
An attacker causes traffic between two endpoints to be sent through the attacker
Attacker can then intercept and manipulate the data
Could be on a local LAN with a malicious user or via the public internet
Many kinds of MITM attacks:
ARP Poisoning
Session Hijacking
ARP Poisoning
MITM attack
Malicious user poisons the ARP cache of devices communicating with each other so that their layer 2 frames will be redirected to a machine used to intercept the communication
Session Hijacking
MITM Attack
Malicious user intercepts the authentication cookies for an unsecure (HTTP port 80) web session and gains access to the web session
Various methods, may require the attacker to be in the same broadcast domain as the target or includes cross-site scripting and browser jacking malware that allows attackers to hijack session remotely
Brute Force Attack
Attack uses cracking softrware, disctionary lists, and other username and password lists with the hope of eventually getting the correct combination
Zero-Day Attachs
Attackers using new exploits that are not made public, leaving organizations unprotected from the exploit until it’s exposed and patched / mitigated
Social Engineering
Attackers trick people and use their trust to gain access to systems and critical or private information such as usernames, passwords, accounts numbers, ip addresses, etc.
Phishing, spear phishing, baiting, tailgating, dumpster diving
Use a shredder
Security policies, procedures and end user awareness training are the best ways to stop most social engineering attempts
Spear Phishing
Specific email, like your boss’s emailB
Baiting
Trojan horse malware on flash drive hoping someone will plug it in
Vulnerabilities
Unnecessary programs and services running on a machine (Bit Torrent Emule)
Open TCP/UDP ports
Old or unpatched systems
Clear text credentials and unencrypted channels
Unsecure protocols: Telnet, http, slip, ftp, tftp, snmpv1, smnpv2
RF Emanating / Emanations / EMR
Sensitive systems should be protected from potential snooping/eavesdropping on RF emanations and the TEMPEST standards can be followed to ensure the proper RF shielding is in place
Ransomeware
Attackers use a form of Malware that encrypts all files on the device, holding them hostage for ransom
If ransom is not paid the files will never be decrypted
Phising
Attacker uses electronic communication (like email) to obtain information such as usernames and passwords, bank information, etc.
Phishing emails are disguised as official email from a trusted source and usually attempt to make you click on a link
Deauthentication
Attacker deauthenticates (logs out) a user
Wifi deauthentication attack
Attacker sends deactivation frame AP
Users gets kicked off and attacker can have user reconnect to evil twin access point
Sniff the WPAv 4 way handshake upon user reconnecting
Hijack the wifi connection
Mount a MITM attack
Insider Threat
Malicious employee
Trusted person on the inside who takes advantage of their network access to cause harm or steal data
To identify, check weird login times, downloading large amounts of data, etc.
Logic Bomb
Malicious code that sets off a mlicious function or activity when certain conditions are met
Called a bomb because it is set off or triggered by some condition or certain time
Code, inserted bye an employee, that deletes certain files if they are terminated from the company
NAC
Network Access Control
Define authorized nodes and MAC addresses
Performs posture assessment on connecting hosts for things like antivirus and places them in quarantine if they fail the posture assessment
Persistent agent – reoccuring scanning
Non-persistent – one time scan
Anti-malware Software
Host based:
Cloud server based:
Network based
No single type of anti-malware protection is the best option, it’s best to use multiple forms of anti-malware implementations to provide a wider coverage
Host based Anti-malware
Installed directly on the host computer
All the devices need to signatures updated constantly which is hard to mange
Large organization requires an anti-malware server to track, push and manage updates
Cloud server based Anti-Malware
Centralized anti-malware service that runs in the cloud or on a local server
inbound outbound communication requests are examined
Easy to Manage
Network based Anti-Malware
runs on firewalls or other nodes that process internet traffic like proxy servers
All traffic that passes through it is examined and uses signatures to identify malware
Doesn’t require any software on the host - the entire network is protected
Arp Inspection
Switch Security
With dynamic ARP Inspection (DAI) switches can intercept all ARP requests and replies and determine the validity of the IP to MAC binding
Drops invalid and spoofed ARP packets
Prevents ARP poisioning / spoofing and some MITM attack
DHCP Snooping
Switch Security
Identifies trusted DHCP servers
Acts like DHCP firewall between the servers and hosts
Filters all abnormal/ invalid DHCP traffic
MAC Filtering
Switch Security
Switches can keep a list of MAC addresses to permit or deny access
Port Security
Switch Security
Allows only specified MAC addresses to use the switch port
IF an invalid MAC address is connected the switch port will shut down
VLANS
Virtual Local Area Connections
Switch Security
VLANS allow us to segment the network into smaller parts and apply security to each VLAN seperately
Can restrict which VLANS can talk to each other and restrict other network access with VLAN ACL (Access Control List)