Security Threat Landscape Flashcards
Evolution of a Targeted Attack
External reconnaissance
Initial compromise
Escalation of privileges
Internal reconnaissance
Further compromise
Further escalation of privileges
End goal
Reflection & Amplification
A reflection attack is a DoS attack where the attacker spoofs the victim’s source address
The attacker sends traffic supposedly from the victim which elicits a response from “reflectors”
Amplification causes a large amount of response traffic to the victim
Stateful Firewalls
Maintain a connection table which tracks the two-way “state” of traffic passing through the firewall
Return traffic is permitted by default
NGFW
Deep packet inspection up to layer 7
Different permissions can be applied to different users
Packet Filters
An ACL policy is a packet filter
Packet filters do not maintain a connection table
Affect traffic in one direction only
If you have an ACL applied on the way out only, the return traffic is not blocked
If you have ACLs applied in both directions, you will need explicit entries to allow both outbound/inbound traffic
ACL Keyword: Established
Checks for the “ack” flag in return traffic
This does not make the router a stateful firewall
IOS Firewall
You can configure a router as a stateful firewall with the IOS Firewall feature set
Uses different commands than ACLs
Internal & External Threats
Standard practice is to use firewalls on major security boundaries
–And augment with internal ACLs
Sensitive hosts should also have firewall/IPS protection from internal hosts
Cryptography Services
Authenticity
Confidentiality
Integrity
Non-repudiation
HMAC
Hash-Based Message Authentication Codes:
Provides data integrity
Sender creates a hash value from the data to be sent using a symmetric key
Hash value is appended to data
Receiver hashes the data with the same shared key
If hash values match, data hasn’t been altered in transit
Used for large transmissions (email, secure web traffic, IPsec)
Algorithms: MD5, SHA, & More
PKI
Public Key Infrastructure:
Key Distribution Problem
–Each site needs to know the shared key
–But one party can’t send shared key over internet connection
—–Because an attacker could sniff it
PKI solves the secure key distribution problem
Uses a trusted introducer (CA) for the two parties who need secure communication
Both parties need to trust the CA
TLS
Transport Layer Security:
TLS is the successor to SSL (Secure Sockets Layer: Deprecated)
Can be used to provide secure web browsing
Uses symmetric cryptography
–Symmetric keys generated uniquely for each connection
Authentication is provided by public key cryptography
Message Authentication Code provides integrity
Site-to-Site VPNs
Use symmetric encryption algorithms
Traffic inside an office is often unencrypted as it is seen as a trusted network
VPN tunnels can also be deployed internally
Cisco TrustSec is another solution for internal authentication/encryption
Typically terminate on a firewall or router on both sides
A pre-shared key can be configured on both sides of the tunnel or certificates can be used
–Certificates offer a more scalable solution
IPsec
Framework of open standards that provide secure encrypted communication on IP network
IPsec: IKE
Internet Key Exchange:
Handles negotiation of protocols & algorithms, & generates the encryption & authentication keys