Threat, Vulnerabilities and Mitigations: Indicators of Cryptographic Attacks Flashcards

1
Q

What are the signs of a downgrade attack?

A

Downgrade attacks

A downgrade attack attempts to cause a connection, protocol, or cryptographic algorithm to revert to an older version:

Catch ssh connection with Wireshark

Refer to the key exchange:

nmap –script=ssl-poodle 192.168.202.133

Indicators of compromise (IoCs):

Logs

Network traffic

Note: Both logs and network traffic might reveal multiple attempts to downgrade a protocol.

URL doesn’t have https

Warnings or errors connecting to secure sites and/or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the signs of Collision and Birthday Attacks?

A

Collision and birthday attacks

A collision attack exploits values that repeat among elements. Different inputs can result in the same output:

Different inputs that results in the same output

https://www.mscs.dal.ca/~selinger/md5collision/hello

https://www.mscs.dal.ca/~selinger/md5collision/erase

md5sum hello

md5sum erase

A birthday attack is a collision attack that is based on the birthday problem as follows:

A room with 23 people will have a 50% chance of two people with a matching birthday.

With 75 people, the odds increase to 99.9%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Indicators of Compromise attack?

A

Indicators of compromise attacks:

Referred to as IoCs, they provide evidence of attacks:

Unintended duplication or substitution of data:

Hash collision attacks can lead to unintended duplication or substitution of data without detection.

Malicious activity around systems that rely on hash functions, such as those that use:

Digital certificates.

Certificate authorities.

Password hashes.

Secure communication protocols.

Note: If these systems show indications of malicious activity, they might have been compromised via a hash collision attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly