Spoofing/ Non-compliant Systems (Comptia Objective 2.5) Flashcards
1
Q
What does the term “Spoofing” mean? How does it work when it comes to security attacks?
A
- You pretend to be something you aren’t. E.G. Fake web server, fake DNS server etc.
- Email address spoofing( The sending address of an email isn’t really the sender)
- Caller ID spoofing. The incoming call information is completely fake.
- Spoofing is commonly used in Man-in-the-middle attacks. The person in the middle of a conversation pretends to be both endpoints.
2
Q
What is MAC spoofing how does it work?
A
- Your Ethernet device has a MAC address
A unique burned in address. Most drivers allow you to change this so the bad guys can spoof a MAC address to appear as a legitimate device on the network - Changing a MAC address however can be legitimate such as ISP’s expecting a certain MAC address, also certain applications require a particular MAC address.
- Often however it might not be legitimate. Can be used to Circumvent MAC based ACL’s( Access Control Lists). Also can be used to fake out a wireless address filter.
- Can be very difficult to detect. How do you know of if the device detected is the original device or a device that is spoofing the MAC address?
3
Q
What is IP address spoofing? How does it work?
A
- Take someone else’s IP address( Pretend to be someone you’re not)
- Can be legitimate( Used for things such as load balancing, load testing)
- May not be legitimate such as when it’s used for ARP poisoning or for DNS amplification causing a Distributed Denial Of Service( DDoS). Using spoofed IP addresses to hide the original source of this traffic.
- Easier to identify than MAC address spoofing as we can apply rules to prevent invalid traffic and enable switch security.
4
Q
What are Non-compliant systems? How are they regulated?
A
- This is a constant challenge as there are always changes and updates
- If a Third party system just connects to a internal private network before it has been approved and has all of the security patches and updates installed then it would be deemed to be non-compliant
- Compliant Systems are commonly referred to as Standard Operating Environments(SOE) a set of tested and approved hardware/software systems. Often a standard operating system imag
- Compliant systems must have Operating system and application updates. Must have patches to be in compliance, OS updates, anti-virus signatures etc. Can be checked and verified before access is given.
5
Q
How can you go about protecting your network and making sure all devices remain in compliance?
A
- Can control the Operating System itself. Apply policies that will prevent non-compliance software
- Monitor the network for application traffic. Next generation firewalls with application visibility
- Can perform periodic scans. Login systems can scan for non-compliance and require correction before the system is given access. To make sure all of the software on a system is up to date and all of the security updates and patches have been installed.