Study Deck Flashcards
Human Rights 1998
Act to give effect to the rights and freedom guaranteed under the European Convention of Human Rights
Data Protection 1998
Act to provide the regulations of the processing of information related to individuals.
Police and Justice Act 2006
Act to establish a national policing improvement agency
Computer Misuse Act 1990
Act to secure computer material against unauthorised material. Criminalises the act of accessing or modifying data stored on a computer system without permision
Well-known ports
0-1023
Registered ports
1024-49,151
Dynamic and private ports
49,152-65,535
ICMP
Internet Control Message Protocol
ICMP type 0
Echo Reply
ICMP type 3 (code 0-3)
Destination Unreachable Code 0 - Network Unreachable Code 1 - Host Unreachable Code 2 - Protocol Unreachable Code 3 - Port Unreachable
ICMP type 5
Redirect
ICMP type 8
Echo Request
ICMP type 11
Time Exceeded
ICMP type 12
Parameter Problem
Traceroute
Tracks utility tracks the route that packets have taken from a network on their way to a host
OSI
Open System Interconnection
OSI Layer 7
Application - Human computer interactions - HTTP, FTP, SMTP, IMAP
OSI Layer 6
Presentation - ensures data is in a usable format and is where data encryptions occurs - Proxies, Firewalls, encryption compressions and character sets.
OSI Layer 5
Session - Maintains connections and is responsible for controlling ports and sessions - Firewalls
OSI Layer 4
Transport - transmits data using transmission protocols such as TCP and UDP
OSI Layer 3
Network - decides which physical path the data will take
OSI Layer 2
Data Link - defines the format of data on the network - WAN, LAN protocols
OSI Layer 1
Physical - transmits raw bit stream over physical medium
Ingress Filtering
Concept of fire-walling traffic that enter the network from external sources such as the internet
Encryption
Process whereby data is transformed in a way to guarantee confidentiality - requires secret to be used (key)
MD5
Message Digest Algorithm - Ron Rivest and uses 128-bit key - Vulnerable to rainbow tables
SHA
Secure Hash Algorithm
Hash function designed by NSA
SHA-1 160-bits
SHA-2 256/512 bits block sizes
HMAC
Hash-based Message Authentication Code - MAC is used to authenticate a message and provide integrity and authenticity assurance on messages
Works with other hash such as HMAC-SHA1
RSA
Rivest Shamir Adleman - Public key cryptography algorithm.
Slower than symmetric key algorithm but suitable for encryption (keys are much longer)
Uses two distinct prime numbers that can’t be factored
DES
Data Encryption Standard - old type of block cipher used in 1970s as an encryption standard - 64 bit block cipher using 54 bit key (Replace by AES)
Triple DES (3DES)
Triple Data Encryption Standard - applies cipher algorithm three times on each cipher block Block size is 64 bits but key can be up to 168 bits (Replaced by AES)
AES
Advanced Encryption Standard - Symmetric key encryption standard with three standards - AES 128, AES 192, AES 256. Cipher block is 128 bits but keys are 128,192,256 bits respectively
Used in WPA2, remote control applications and windows encrypting file system like bit locker
RC4
Stream Cipher used in protocols such as SSL, WEP, RDP
PGP
Pretty Good Privacy - Used for signing, encrypting and decrypting emails in order to increase the security communication - PGP uses symmetric key sessions (pre-shared keys)
IPSEC
Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
AH
Authentication Header - Provides a mechanism for authentication only - (Integrity) -
ESP
Encapsulating Security Payload - Provides data confidentiality (encryption) and authentication (data integrity, data origin auth and replay protection).
SA
Security Association - The IPsec protocols use a security association, where the communicating parties establish shared security attributes such as algorithms and keys. As such IPsec provides a range of options once it has been determined whether AH or ESP is used.
ISAKMP
Internet Security Association and key management protocol
SSL
Secure Sockets Layer - Protocol used to secure websites
TLS
Transport Layer Security - Protocol used to secure websites- TLS 1.3 latest version
WEP
Wireless Equivalent Privacy - 802.11 defined as method to make wireless link equivalent to wire connection - uses RC4 (on data frames) - Shared key security method
TKIP
Temporary Key integrity protocol - used to make WEP more secure - 802.11I - Per packet mixing function - Message intergrity Code (MIC function) - enhanced IV
WPA
WPA improves on WEP in that it provides the TKIP encryption scheme to scramble the encryption key and verify that it hasn’t been altered during the data transfer.
PSK
Pre shared key - used in WPA and users enter shared secret in AP or client
SUID
u+s - File executes as owner o the file
SGID
g+s - File executes as the group owner
Sticky Bit
Sets a special restriction on deleting files. Only owner of file and root can delete files within directory
Umask
a command that determines the settings of a mask that controls how file permissions are set for newly created files.
netstat -noa
List processes and associated network socket in Windows
netstat -lptu
List processes and associated network socket in Linux
lsof -i
List processes that own a file or directory (linux)
‘wmic qfe list’ or ‘wmic qfe list full’
(Quick Fix Engineering) Windows command that lists all patches
uname -a
Check which kernel version linux os is running
WHOIS
Queries Top Level Domain (TLD) port 43
RIR
Regional Internet Registry
ARIN - American Registry of Internet Numbers
APNIC - Asian Pacific Network Information Centre
LACNIC - Latin America and Caribbean Network Information Centre
AfriNIC - African Network Information Centre
RIPE NCC - Europe, West Asia and former USSR
DNS
Domain Name Server - Port 53 TCP and UDP
A Record
Maps host name to IPv4 Address
CNAME
Maps multiple names (alias) to A record
Canonical Name
MX
Mail Exchange - Maps a domain to a mail server
NS
Name Server - Assigns a DNS zone to access the give authoritative name servers
PTR
Pointer - Maps IP addresses to the host names for reverse look ups
SOA
Start of Authority - Specifies authoritative info for a DNS zone.
HINFO
Host Information Resource Record - Provide OS and platform info
SRV
Service Locator - Specifies a generic service location record for newer protocols
AAAA
Maps host name to IPv6 Address
Dig
Can be used to preform DNS Zone Transfer - dD
Telnet
Port 23 - Provides remote access to servers and network equipment - Can be used to get banner from hosts to
SSH
Secure Shell Protocol - Port 22 - Replaced Telnet (Ssh more secure)
TFTP
Trivial File Transfer Protocol - UDP port 69 - Used for unauthenticated file transfers - Need file name and exact location
SNMP
Simple Network Management Protocol - UDP port 161 - Designed to provide information about network devices, software and systems
SNMP MIB
Simple Network Management Protocol Management information base which is implemented by some vendors and contain vendor specific information
NTP
Network Time Protocol - UDP port 123 - Can be queried for host name OS and ntp version
PCAP
Packet Capture - API that captures live network packet data.
Type of Files: .PCAP,Libpcap,WinPcap,PCAPng,Npcap
ARP
Address Resolution Protocol - Used by the internet protocol (IPv4) to map IP network addresses to hardware addresses (MAC Addresses) used by the data link protocol.
ARP Request,reply
RARP Request,reply