Security Operations: Examining Secure network protection Flashcards

1
Q

How does the TCP 3 - way handshake process work?

A

1.SYN
2SYNACK
3.ACK
4.Communication made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the TLS handshake work?

A

The TLS (Transport Layer Security) handshake is a process that establishes a secure connection between a client (e.g., a web browser) and a server (e.g., a web server). During this process, both parties authenticate each other, negotiate encryption algorithms, and exchange cryptographic keys. Here’s a step-by-step explanation of how the TLS handshake works:

Step-by-Step TLS Handshake Process
1. ClientHello
The client initiates the handshake by sending a ClientHello message to the server.
This message includes:
The TLS version supported by the client.
A randomly generated number (client random).
A list of supported cipher suites (encryption algorithms).
A list of supported compression methods.
Any additional extensions (e.g., Server Name Indication (SNI)).

  1. ServerHello
    The server responds with a ServerHello message.
    This message includes:
    The TLS version chosen by the server.
    A randomly generated number (server random).
    The chosen cipher suite.
    The chosen compression method.
    Any additional extensions.
  2. Server Certificate
    The server sends its Certificate message, which contains the server’s digital certificate.
    The certificate is used to authenticate the server and includes the server’s public key.
  3. Server Certificate
    The server sends its Certificate message, which contains the server’s digital certificate.
    The certificate is used to authenticate the server and includes the server’s public key.
  4. Server Key Exchange (optional)
    If the chosen cipher suite requires it, the server sends a Server Key Exchange message.
    This message contains additional key exchange parameters.
  5. Certificate Request (optional)
    The server may request a certificate from the client by sending a Certificate Request message.
    This is used for mutual authentication if required.
  6. ServerHello Done
    The server sends a ServerHello Done message to indicate that it has finished its part of the handshake.
  7. Client Certificate (optional)
    If the server requested a certificate, the client sends its Certificate message.
    This message contains the client’s digital certificate.
  8. Client Key Exchange
    The client sends a Client Key Exchange message.
    This message contains the pre-master secret, encrypted with the server’s public key.
    The pre-master secret is used to generate the session keys.
  9. Certificate Verify (optional)
    If the client sent a certificate, it sends a Certificate Verify message.
    This message is used to prove that the client owns the private key corresponding to the certificate.
  10. Change Cipher Spec (Client)
    The client sends a Change Cipher Spec message to indicate that it will start using the negotiated encryption and MAC algorithms.
    This message is always encrypted using the session keys.
  11. Finished (Client)
    The client sends a Finished message, which is the first encrypted message sent using the session keys.
    This message contains a hash of all previous handshake messages.
  12. Change Cipher Spec (Server)
    The server sends a Change Cipher Spec message to indicate that it will start using the negotiated encryption and MAC algorithms.
  13. Finished (Server)
    The server sends a Finished message, encrypted using the session keys.
    This message contains a hash of all previous handshake messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure File Server Protocols?

A

LDAPS 636
SFTP,SCP/TCP 22
SMBv3 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure Email Server?

A

SMPTPS 587 (sending)
IMAPS - 993
POP3S - 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly