Security Refresh Flashcards
What is ARP poisoning?
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets
amplification attack
sending small queries that result in large responses, E.x. DNS amplification
pass the hash
using a stolen hash and then using it to authenticate instead of authenticating with the original password
IV attack
associated with WEP
race condition
a programming flaw that occurs when two sets of code attempt to access the same resource.This becomes a bug when events don’t happen in the order the programmer planned.
RADIUS
Remote Authentication Dial-In User service. An authentication service that provides central authentication for remote access clients. Alternatives are TACACS+ and Diameter.
Diameter vs Radius
Diameter is an extension of RADIUS and many organizations have switched to it due to its extra capabilities. Diameter adds several other commands beyond the capabilities of RADIUS, along with adding new commands that can be used with EAP.
Edition.
TACACS+ vs RADIUS
Terminal Access Controller Access-Control System Plus (TACACS+) is an alternative to RADIUS. It provides two important security benefits over RADIUS. First, it encrypts the entire authentication process, whereas RADIUS encrypts only the password. Second, TACACS+ uses multiple challenges and responses between the client and the server.
What does Windows use for authentication?
As a reminder, Microsoft Active Directory uses Kerberos for authentication.
802.1X
port-based authentication protocol. It requires users or devices to authenticate when they connect to a specific wireless access point, or a specific physical port, and it can be implemented in both wireless and wired networks. It secures the authentication process prior to a client gaining access to a network and blocks network access if the client cannot authenticate.
RADIUS can be used as 802.1x
pass the hash
A password attack that captures and uses the hash of a password. It attempts to log on as the user with the hash and is commonly associated with the Microsoft NTLM protocol.
NTLM
NTLM—New Technology LAN Manager. A suite of protocols that provide confidentiality, integrity, and authentication within Windows systems. Versions include NTLM, NTLMv2, and NTLM2 Session.
.
Golden Ticket Attack
gives an attacker total and complete access to your entire domain. Golden Tickets are forged Ticket-Granting Tickets (TGTs), also called authentication tickets.
What ports does DNS use and for what?
DNS uses TCP port 53 for zone transfers and UDP port 53 for DNS client queries.
BIND (what is it used for?)
Most DNS servers on the Internet run Berkeley Internet Name Domain (BIND) software and run on Unix or Linux servers.
SMB
The Server Message Block (SMB) protocol is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network.
DSA
DSA—Digital signature algorithm. An encrypted hash of a message used for authentication, non- repudiation, and integrity. The sender’s private key encrypts the hash of the message.
RSA
• RSA is a popular asymmetric algorithm. Many cryptographic protocols use RSA to secure data such as email and data transmitted over the Internet. RSA uses prime numbers to generate public and private keys.
S/MIME
Secure/Multipurpose Internet Mail Extensions(S/MIME) is one of the most popular standards used to digitally sign and encrypt email. Most email applications that support encryption and digital signatures use S/MIME standards. S/MIME uses RSA for asymmetric encryption and AES for symmetric encryption.
DEP
Data execution prevention (DEP) is a security feature that prevents code from executing in memory regions marked as non-executable. It helps prevent an application or service from executing code from a non-executable memory region. The primary purpose of DEP is to protect a system from malware.