Sniffing and Evasion Flashcards

1
Q

At what layer does Sniffing occur

A

Layer 2- Data link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WinPcap

A

Driver for windows machines that allows OS to extend to access low-level network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision domain

A

Composed of all machines sharing the same transport medium. Hubs share the same domain switches split domains so that each system is in it’s own domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

upper layer protocols suscepible to sniffing

A

SMTP (not so much v3), FTP(user name and passwd), TFTP (Everything in clear text), Telnet (keystokes, User name paswd), SNMPv1 (Passwd and data), NNTP (Passwd and data), IMAP, POP3, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP

A

Address resolution Protocol. Layer 2 - Data Link Layer. Resolves ip to mac address. ARP_request asks what ip can process message? arp_reply states thats me my mac is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

gratuitous arp

A

Packet that updates the arp cache of other machimes before they ask for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPv6

A

Uses 128 bit address instead of 32 bit (IPv4). Eight group of 4 hexadecimal digits separated by colons. Loop back is truncated to ::1. fe80::/10 link-local addressing. unique local fc00::/7. site local FEC0::/10 Contains Unicast, Multicast and Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PRISM

A

Planning Tool for Resource Integration Synchronization and Management used by US intelligence to collect foreign intelligence passing through us networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Span Port

A

Switch configuration where one port has been altered to send a copy of all frames from one port to another or a succession of ports to another. also called port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mac Flooding

A

Flood switch with so many mac address that CAM table can’t keep up and becomes a Hub. Etherflood and Macof are flood tools. Sometimes called “switch port stealing” creates race contition and switch alters between bad and good mac address. None of this really works on most modern switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Content addressable memory (CAM Table)

A

memory referenced by switch that connects mac to port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP Poisoning

A

Arp Spoofing gratuitous arp. This poisons the arp cache on a machine. Switches will forward ARP because they “broadcast”. Tools: Cain and Abel, WinArpAttacker, Ufasoft, dsnif (ARPspoof tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP poisoning mitigation

A

Dynamic ARP inspection using DHCP snooping, Xarp, can add default gateway mac manually using (arp -s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DHCP

A

Dynamic Host Configuration Protocol. server Dynamically assigns IP address from a configured pool within a network. DORA Discover, offer, request, accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DHCP starvation

A

continually send requests until IP address pool is exhausted. Tools: Yersinia, DHCP Starve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DHCP starvation Mitigation

A

Configure DHCP snooping

17
Q

Mac spoofing Mitigation

A

Utilize port security on switches. Assign mac addresses to specific ports.

18
Q

IRDP Spoofing

A

ICMP Router Discovery Protocol Spoof. Sends spoofed IRDP message though out the network advertising the gateway to start routing all messages though.

19
Q

WireShark DISPLAY FILTER syntax

A

uses “==” “&&” “or” “.” i.e. ip.addr==192.168.0.0&&tcp.port==23

20
Q

tcptrace

A

analyzes files produced by packet capture programs. can read from tcpdump, windDump, Wireshark and Etherpeek

21
Q

IDS evasion tools

A

Nessus, ADMmutate (can create scripts that are not easily recognizable by signature files), NIDSbench (older used for fragmentation), and Inundator (flooding tool). IDS Informer, Packet Generator and Packeth capture network traffic craft start to finish a test file to see what will get through

22
Q

Honey Pot

A

Catch and gain information on intruder. High And Low interaction: Former full of services and later only some services and can’t be totally compromised.
Former Honeynets and decoy server, later Specter, honeyd, KFSensor.
Place inside the DMZ make it look tasty.

Nessus and send-safe Honeypot Hunter good at locating them.

23
Q

circuit-layer firewall

A

layer 5 session layer firewall allows or prevent data streams

24
Q

Application Layer firewall

A

Layer 7 application layer allows or prevents services