Threat, Vulnerabilities and Mitigations: Cryptographic Vulnerabilities Flashcards

1
Q

What are the three cryptographic Vulnerabilities?

A

Downgrade
Collision
Birthday Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a downgrade Attack?

A

Downgrade: Forces a connection, protocol, or cryptographic algorithm to downgrade to an older and less secure version so it can be compromised.

We’ll demonstrate:

Catch ssh connection with Wireshark.

See the key exchange: nmap –script=ssl-poodle 192.168.202.133

The attacker will request to use a downgrades encryption version and the server will follow suit in which encryption or version to use.\

Very Dangerous with no patch or on Zero Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Collision?

A

Collision: Different inputs result in the same output. Check out:

https://www.mscs.dal.ca/~selinger/md5collision/hello

https://www.mscs.dal.ca/~selinger/md5collision/erase

md5sum hello

md5sum erase

Same output

This is used in hashing algorithm – you can’t undo it one way function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Birthday?

A

Birthday attack: a room with 23 people will have a 50% chance of two people with a matching birthday and with 75 people, the odds increase to 99.9%.

If you can find same hash values that are collision and exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly