Term
| What are the common types of malware? |
|
Definition
Virus - hidden code carrying out destructive task
Worm - replicates itself using host resources
Trojan horse - disguised as normal file to be installed
Spyware - gathers info from system
Hoax - social engineering |
|
|
Term
| What are the characteristics of a DHCP starvation attack? |
|
Definition
Broadcast of DHCP requests with spoofed MAC.
Goal is to exhaust addresses on DHCP server and set up rogue DHCP server to provide network info to clients and result in man-in-the-middle attack. |
|
|
Term
What are the two categories of network access attacks?
(Give examples) |
|
Definition
Data access - unauthorized data retrieval of info
Eg. privilege escalation
System Access - unauthorized access to system resources & devices (programs, cameras, etc)
Eg. malware, password attacks. |
|
|
Term
What are the characteristics of a simple DoS aiming at resource exhaustion?
Give most common examples. |
|
Definition
Single attacker sending large number of packets for victim to process.
Spoofing, SYN flood |
|
|
Term
| Describe the ping of death attack. |
|
Definition
Last fragment of ICMP packet contains offset such that reconstructed packet is larger than 65535 byte limit of IP packet size.
Causes buffer overruns. |
|
|
Term
| Describe the Land (Land.c) attack. |
|
Definition
Attacker sends TCP SYN where
srcIP=dstIP=victim's host IP
and srcPort=dstPort
Victim tries to open TCP connection to itself and goes into infinite loop |
|
|
Term
Describe the Smurf attack.
(How can it be avoided?) |
|
Definition
Spoofed broadcast ICMP to flood victim with requests where
dstIP=broadcast & srcIP=victim's spoofed IP
(no ip directed-broadcast) |
|
|
Term
| Describe the Fraggle attack. |
|
Definition
| Large amount of UDP echo traffic sent to IP broadcast address with spoofed source address. |
|
|
Term
| Describe the Teardrop attack |
|
Definition
Sending IP fragments with overlapping oversized payloads.
Captializes on bugs in TCP/IP fragementation & reassembly code to crash or compromise OS. |
|
|
Term
| Describe the Banana attack. |
|
Definition
| Redirecting outgoing messages from client back to itself, thus preventing access and flooding client. |
|
|
Term
| Describe the Pulsing zombie attack. |
|
Definition
| Pinging host/network from many attackers over time, degrading network quality and consuming CPU/bandwidth resources. |
|
|
Term
| What are the common characteristics of DDoS attacks? |
|
Definition
Distributed Denial of Service - launched from large number of attackers
attacker ->{ masters ->{ slaves/zombies -> victim
|
|
|
Term
| Describe the BOINK attack. |
|
Definition
| CPU-intensive attack that sends a file with 1 data byte per packet out of sequence, forcing host to spend cycles on reassembly |
|
|
Term
| Describe the Chargen attack and how to mitgate it. |
|
Definition
Attempts to connect to host via TCP or UDP ports to attempt to generate a data stream.
Command used is: telnet <ip> chargen
Mitigation:
no service udp-small-servers
no service tcp-small-servers |
|
|
Term
| Describe the Birthday Attack |
|
Definition
Attacker presents digital signature form that looks trusted (via hash collision). After host signs it, it is used in a fraudulent contract.
Based on probability of generating a valid hash using invalid/fraudulent information. |
|
|
Term
| What are the characteristics of the slammer worm? |
|
Definition
Exploited buffer overflow bug in MS SQL Server Desktop Engine (MSDE) and caused DoS on hosts.
Attacks UDP port 1434 (MSDE)
Entire worm fit in 1 UDP packet. |
|
|
Term
| What are the characteristics of the Code Red worm? |
|
Definition
Attacked computers running MS IIS web server via buffer overflow vulnerability
Attacks used TCP port 80 (HTTP GET) |
|
|
Term
| Describe the TTL Expiry Attack |
|
Definition
Attack using a flood of icmp type 3 (destination unreachable) packets with TTL <= 1.
This creates a DoS attack against network equipment, as it takes more CPU for IOS to process the response ICMP than to forward the packet. |
|
|
Term
| What is the purpose of ingress(/egress) filtering? What standards does it come from? |
|
Definition
RFC 2827
BCP 38
Technique to filter incoming (outgoing) packets to prevent IP Spoofing (and resulting DDoS) attacks. |
|
|
Term
What is the purpose and characteristics of
SYN Cookies? |
|
Definition
Technique against SYN flood attacks
Particular choice in initial TCP sequence numbers.
Allows server to avoid dropping connections when SYN queue fills up: Server sends SYN_ACK to client but discards SYN queue entry. If receives subsequent ACK from client, server reconstructs the entry. |
|
|
Term
| What solutions does Anti-X refer to? |
|
Definition
| Refers to, as a whole, the various anti-virus, anti-spyware, anti-spam and anti-phishing solutions |
|
|
Term
What is the purpose of :
1. dynamic access lists (aka lock-and-key)
2. time-based access lists
3. reflexive access lists |
|
Definition
1. Create specific, temporary openings in response to user authentication.
2. Create specific, temporary openings for a certain amount of time.
3. Temporary entries/filters for network traffic based on IP upper-layer protocol session information; nested in extended named ACL on interface |
|
|
Term
What does the "established" option signify at the end of an access list?
eg. access-list xxx permit ... tcp established |
|
Definition
A match occurs if the TCP datagram has the ACK or RST control bits set.
Blocks the initial TCP datagram used to form a connection (SYN). |
|
|
Term
What is the purpose of pvlans?
What problems does it resolve? |
|
Definition
Private vlans - allows restrictions on L2 traffic for vlan
Resolves ARP spoofing attack (attacker uses gratuitous ARP to fake addresses to see traffic or cause DoS) |
|
|
Term
| What is directed broadcast and how should it be secured? |
|
Definition
Allows packets to be broacast to all devices on attached subnet.
Feature should be disabled to prefent smurf attacks and packet floods.
no ip directed-broadcast |
|
|
Term
| What is the purpose of dynamic arp inspection and how does it work? |
|
Definition
Protects against arp cache poisoning.
Intercepts and validates ARP packets received before updating ARP cache and forwarding packet. Checks against MAC to IP bindings stored in trusted database (built w/ DHCP snooping) and user configured ACLs. Invalid ARPs are dropped. |
|
|
Term
What is the purpose of DNSSec?
How does it work? |
|
Definition
DNS Security Extension
Detect spoof attacks to DNS & cache-poisoning on DNS servers
Adds data origin authentication (via PKI and trusted/anchor keys) and integrity protection |
|
|
Term
| What are the characteristics of TCP intercept? |
|
Definition
Used to intercept all requests to a server with ACL of any source and list of destinations to protect.
Watch mode - connection requests allowed to pass but are reset if does not go EST in 30 seconds
Prevents SYN floods/attacks |
|
|