Technical Flashcards
What are the common types of attacks and signatures
“There are three types of attacks:
Reconnaissance These include ping sweeps, DNS zone transfers, e-mail recons, TCP or UDP port scans, and possibly indexing of public web servers to find cgi holes.
Exploits Intruders will take advantage of hidden features or bugs to gain access to the system.
Denial-of-service (DoS) attacks Where the intruder attempts to crash a service (or the machine), overload network links, overloaded the CPU, or fill up the disk. The intruder is not trying to gain information, but to simply act as a vandal to prevent you from making use of your machine.
What is a network based IDS system
“An IDS is a system designed to detect and report unauthorized attempts to access or utilize computer and/or network resources. A network-based IDS collects,
filters, and analyzes traffic that passes through a specific network location. “
A digital certificate
“is a credential required by PKI systems that can securely identify an individual, as well as create an association between the individual?s authenticated identity and public keys.
A trusted third party, called a certificate authority (CA), is used to sign and issue certificates.
The CA is responsible for verifying the identity of a key owner and binding the owner to a public key.
This enables users who have never met to exchange encrypted communications, because the authentication is performed by the third-party CA.
Each certificate contains a unique serial number, identity, and public key information of the user, and the validity dates for the life of the certificate.”
A digital signature
is a hash value that has been encrypted with the sender?s private key.
Accountability
Holding individuals responsible for their actions. In a system, the ability to trace actions to an individual (auditing) so they can be held accountable.
Authorization
After I&A, the granting to a user, program, or process the right of access to data.
countermeasure, or safeguard -
a software configuration, a hardware device, or a procedure that eliminates a vulnerability or that reduces the likelihood a threat agent will be able to exploit a vulnerability
Exposure -
is an instance of being exposed to losses from a threat.
HASH
is an instance of being exposed to losses from a threat.
How would you define Buffer Overflow
it’s a programming flaw that can be exploited to improperly processes input and run code.
How would you harden a Windows Server What about a Linux Server
”? Enforce a password policy. Time of expiration. Length of passwords with character sets. Add thresholds for bad passwords and length of lock out.
? Disable guest accounts
? Patch the hell out of the servers and applications
? Remove default password
? Check for null sessions
? Enable FW feature set on the NIC.
? Audit admin rights for all accounts.
? Backup on regular basis.
? Mandate SMB signing
”
Identification and Authentication
Recognition of a subject by a computer system and verification by the computer system that the subject is indeed who the identification process says he is.
Please detail 802.1x security vs. 802.11 security (dont confuse the protocols).
802.1x port-based Network Access Control (PNAC) - provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
IEEE 802.11 is a set of standards carrying out wireless local area network
“
Process of PGP:
The users private key is generated and encrypted when the application asks the user to randomly type on her keyboard for a specific amount of time.
Instead of using passwords, PGP uses passphrases.
The passphrase is used to encrypt the user?s private key that is stored on her hard drive.
PGP does not use a hierarchy of CAs, or any type of formal trust certificates, but instead relies on a ?web of trust? in its key management approach.
Each user generates and distributes his or her public key, and users sign each other?s public keys, which creates a community of users who trust each other.
”
Risk
is the likelihood of a threat agent taking advantage of a vulnerability and the corresponding business impact.
SYN Flood Mitigation
“By implementing a SYN proxy on the firewall, now the firewall can manage the
connections to the server. If a predefined threshold of SYN requests (let?s say 500 in a second) occurs, the firewall is on guard. If requests continue to come in, the firewall has the option of dropping the oldest requests that haven?t resulted in an established connection, thereby allowing legitimate connections to make their way to be processed by the server.”
Threat
“is any potential danger to information or systems.
The threat is that someone, or something, will identify a specific vulnerability and use it against the company or individual.”
Threat agent
The entity that takes advantage of a vulnerability is referred to as a
Vulnerability
is a software, hardware, procedural, or human weakness that may provide an attacker the open door he is looking for to enter a computer or network and have unauthorized access to resources within the environment.
What anonymous account allows access to resources through IIS
IUSR
What are the latest threats you foresee for the near future
Wireless is becoming the norm for connecting to the internet, so Wireless threats are going to be the majority of hacks out there.