What are the monitoring tools that forward captured network traffic to network monitoring devices?
A network tap is used to capture traffic for monitoring the network. The tap is typically a passive splitting device implemented inline on the network and forwards all traffic including physical layer errors to an analysis device.
SPAN is a port mirroring technology supported on Cisco switches that enables the switch to copy frames and forward them to an analysis device.
What is FTP?
What is SFTP?
FTP is an unsecure network protocol. Anyone capturing packets can obtain the username and password from the capture.
A more secure protocol such as SFTP should be used.
How does IPv6 carry optional network layer info?
IPv6 uses extension headers to carry optional network layer information. Extension headers are not part of the main IPv6 header but are separate headers placed between the IPv6 header and the payload.
What is shadowing?
Two threats to DNS are DNS shadowing and DNS tunneling attacks. DNS shadowing attacks compromise a parent domain and then the cybercriminal creates subdomains to be used in attacks.
What is SQL injection?
A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly.
What is Port Mirroring?
When enabled on a switch, port mirroring copies frames sent and received by the switch and forwards them to another port, which has a analysis device attached.
What is SNMP?
What does is do?
The Simple Network Management Protocol is used by network devices to send and log messages to a syslog server in order to monitor traffic and network device events.
What is a DDos attack?
DDoS is a distributed denial-of-services attack. A DDoS attack is launched from multiple coordinated sources. The sources of the attack are zombie hosts that the cybercriminal has built into a botnet. When ready, the cybercriminal instructs the botnet of zombies to attack the chosen target.
What is a Tunneling attack?
DNS tunneling attacks build botnets to bypass traditional security solutions. Three threats to DNS open resolvers are cache poisoning, amplification and reflection, and resource utilization attacks.
What is a resource utilization attack?
When the attacker sends multiple packets that consume server resources.
What does SPAN do?
When enabled on a switch, SPAN or port mirroring, copies frames that are sent and received by the switch and forwards them to another port, known as a Switch Port Analyzer port, which has a analysis device attached.
How does Wireshark save it's files?
Wireshark captures are saved as PCAP files, which contain frame, interface, and packet information, and also time stamps.
What is a SYN flood attack?
In a TCP SYN flood attack, the attacker sends to the target host a continuous flood of TCP SYN session requests with a spoofed source IP address. The target host responds with a TCP-SYN-ACK to each of the SYN session requests and waits for a TCP ACK that will never arrive. Eventually the target is overwhelmed with half-open TCP connections.
How does a man-in-the-middle attack work?
A cybercriminal could set up a rogue DHCP server that provides one or more of the following:
Wrong default gateway that is used to create a man-in-the-middle attack and allow the attacker to intercept data
Wrong DNS server that results in the user being sent to a malicious website
Invalid default gateway IP address that results in a denial of service attack on the DHCP client
What is a amplification and reflection attack?
When the attacker uses open resolvers to increase the volume of attacks and mask the true source of the attack
What is SIEM?
Name a paid for and opensource SIEM tool.
Security Information Event Management (SIEM) is a technology used in enterprise organizations to provide real time reporting and long-term analysis of security events.
SIEM includes the following essential functions:
Forensic analysis, Correlation, Aggregation, Reporting
SIEM Tools:
Splunk - Paid
ELK - OPen Source
What is Gobbler?
Gobbler: A tool to audit DHCP networks
Includes DHCP rogue server detection, DHCP DoS, distributed spoofed port scanner using DHCP to obtain many source IP addresses, mulitple arp scans, filtered port detection, spoofed OS detection (nmap + port 0)
How do you mask a DNS attack?
Fast flux, double IP flux, and domain generation algorithms are used by cybercrimals to attack DNS servers and affect DNS services. Fast flux is a technique used to hide phishing and malware delivery sites behind a quickly-changing network of compromised DNS hosts (bots within botnets). The double IP flux technique rapidly changes the hostname to IP address mappings and the authoritative name server. Domain generation algorithms randomly generate domain names to be used as rendezvous points.
What does a passive and active ARP poisoning attack do?
ARP poisoning attacks can be passive or active. The result of a passive attack is that cybercriminals steal confidential information. With an active attack, cybercriminals modify data in transit or they inject malicious data.
How is a iFrame used in an attack?
An HTML element known as an inline frame or iFrame allows the browser to load a different web page from another source.
Hackers can use this to make a site load a bad site or page that is full of malicious code.
What is Netflow?
NetFlow is a Cisco technology that provides statistics on packets flowing through a Cisco router or multilayer switch.
What is StealthWatch?
Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you’ll always know who is on your network and what they are doing.
What is DHCP starvation?
DCHP starvation attacks are launched by an attacker with the intent to create a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends many DHCPDISCOVER messages in order to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.
How does a DNS cache poisoning attack work?
In a DNS cache poisoning attack, falsified information is used to redirect users from legitimate to malicious internet sites.
What is a cushioning attack?
The HTTP 302 cushioning attack is used by cybercriminals to take advantage of the 302 Found HTTP response status code to redirect the browser of the user to a new location, usually a malicious site.