SSL, TLS, HTTPS and E2EE Flashcards

1
Q

What are SSLs and TLSs

A

Encryption protocols designed to give communication security over a network or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does SSL stand for?

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does TLS stand for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What security parameters does TLS provide?

A

Confidentiality
Integrity
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is special about the Diffie-Hellman Key exchange protocol

A

Forward Secrecy - A unique session key is generated with every session a user initiates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of Forward Secrecy?

A
  • Gives assurance that session keys aren’t compromised even if the public/private key is
  • Only info in that one session will be compromised and not other sessions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Forward Secrecy achieve in terms of messaging

A

if the private keys for a serve rare compromised, all previously sent messages cant be decrypted due to using different DH session keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Ciphersuite

A

A combination of encryption algorithms used to secure a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SSL stripping?

A

A proxy looking for HTTPS redirects
Will intercept redirect and direct to http version of site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some mitigations against SSL stripping?

A

Arpwatch
Tunneling
Browser settings for HTTPS
VLANs
Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is HTTPS in terms of HTTP

A

HTTPS is HTTP run over SSL or TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a digital signature?

A

A value hash that has been encrypted with the issuers private key (e.g. DigiCert)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you validate a digital signature

A

The SHA fingerprint (Hash) must be decrypted using the issuers public key and the decryption must match what’s on the issuers certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can HTTPS be exploited?

A

The issuance of fake certificates
Over 1400 CA’s trusted by Microsoft etc.
One will make a mistake (Symantic)
Nation states all have influence over CA’s and can issue trusted certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Null byte poisoning? (Cetrificates)

A

When certificates are obtained by someone for a domain not actually owned by them
- Nation state surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Pinning used for?

A

A mitigation to certificate changes
- can tie a host with their expected x.509 cert or key so the host will only accept that one key
- no data exchanged if key differs
- used by banking apps to “lock out” unnecessary connections

17
Q

What is End-to-End Encryption (E2EE)

A

Where data encrypted by the sender can only be decrypted by the intended receiver

18
Q

What are some E2EE technologies?

A

PGP
SSL/TLS
OTR
SMIME

19
Q

What is the main goal of E2EE

A

Zero knowledge system ensuring that data cannot be revealed even if coerced or you wanted to

20
Q

True or False:
E2EE protects data that has been received

A

False:
Only protects data in transit
Other methods are needed to store and protect data after

21
Q

What is Steganography

A

The art of hiding data in another set of data
- Message hidden in the binary of a picture file when decoded

22
Q

Benefit of Steganography over Encryption

A

Encryption isn’t hidden at all, However steganography is covert

23
Q

What is the name for the file being used to hold Steganography data

A

A Carrier

24
Q

What method in Steganography allows for plausible deniability?

A

A Decoy Carrier
- Creating a decoy carrier with a fake message incase compromised or coerced

25
Q

What is important when choosing a file as a Carrier for Steganography?

A

Use a file that cannot be compared to its ‘original’
- Resize, crop and compress any downloaded photo first
- Use original photo

26
Q

What are the two easiest and most paramount security controls to implement first before anything?

A

1) Up-to-Date Patches
2) Strong Password