• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/101

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

101 Cards in this Set

  • Front
  • Back

The most critical component in network baselining is/are _________.

historical baselines

Baseline

- statistical profile of a certain performance metric - network device or application utilization response time or volume.

Particularly helpful in alerting you to the type of cyber atacks that cause significant changes in normal network and application traffic behavior

Baselines

multi-tiered baselining

where the low, average, and high metric lvls are recorded hour-by-hour and day-by-day

6 baselining methods and techniques

- Top-to-bottom network monitoring
- Application monitoring
- Detailed packet analysis
- Continuous traffic capture
- Threshold alarms
- Packet analysis methodology

A solution providing the capability to see the network from a high-lvl, holistic (summary) perspective

Top-to-bottom network monitoring

What are the five types of application monitoring?

Well-known


Web-based


Complex


Custom


Unknown

Identifying those applications consuming network resources

Application monitoring

Application monitoring:



Well-known

recognition of well-known apps like HTTP, SMTP/POP, or multimedia, like RTP or SIP

Application monitoring:
web-based

some client/svr apps like FTP & mail are headed to web-based, using HTTP/HTTPS
needs to be able to distinguish between normal web traffic and these types of apps

Application monitoring:



Complex

some apps use a range of TCP ports for comms or they encapsulate higher-lvl apps
needs to be able to to ID/aggregate

Application monitoring:



Custom

recognize, Id and and report any custom app used on the network

application monitoring:



Unknown

must ID/track extraneous apps, like Microsoft Svr Msg Blk (SMB)for example.

Allows the security specialist to identify the specific code being used in the attack and develop a security response to prevent future occurences

Detailed Packet-Level Analysis

storing complete packet-by-packet net traffic audit trail for several days

Continuous traffic capture

alerts security specialist to specific metrics like utilization, abnormal app usage or exceeded response times

Threshold alarms

What 5 components comprise the Packet Analysis Methodology

Plan


Deploy


Capture


Analyze


Refine

packet analysis methodology:



Plan

what are you trying to ID or prove w/ packet analysis?
what type of traffic to capture to help analysis?
what length of time to give the data points for analysis?
what capture tool is best for this analysis?

packet analysis methodology:



Deploy

where do you need to place to app/device for optimum capture?

packet analysis methodology:



Capture

process raw data into useable format
decide how to filter/display for analysis

packet analysis methodology:



Analyze

determine if captured traffic IDs or proves original hypothesis

packet analysis methodology:



Refine

adjust capture parameters/deployed location to provide better fidelity

2 basic categories of protocols

Binary & Textual

binary protocol

transmits cmds/data as binary info

What are the 5 Textual transmit commands?

HTTP


HTTPS


SMTP


POP


IMAP

textual protocol

transmits cmds/data as an easily readable format

DHCP

transmission protocol is UDP

Ethernet Header

1st 14 bytes of an Ethernet frame
TMAC, SMAC, and next protocol type (or if less than 1500/0x5DC, it's frame length field in bytes)

Ethernet Header:


First 6 Bytes: 01:00:0C:CC:CC:CC

A value of 01:00:0C:CC:CC:CC in the Target MAC Address indicates a multicast address for Cisco Devices

ARP Header

15th-42nd/78th Bytes in Ethernet frame
hardware type - (2B) in ethernet, set to 0x0001
protocol type - (2B) 0x0800 is IP,
hardware size - (1B)
protocol size - (1B)
opcode - (2B) 1-rqst, 2-rply, 3-RARP
SMAC - (6B)
SIP - (4B) originator IP
TMAC (6B) 00:00:00:00:00:00 -Request


Set to originator's MAC address-Reply


TIP - (4B) IP of MAC requested for -Request


IP of the request originator- Reply



Filtering the ARP header to show all ARP requests

arp.opcode == 3

IPv4 Header

makes up 15 -34B/up to 74 B (20-60B)
IPv-(4b) v4 or v6
IHL-(4b) min 5, max 15
ToS-(1B) default 0x00
TIPL-(2B) min 20, max 65535
ID-(2B) aids in assy of frags
IP flag-(3b) 2, 4, or 8
frag offset-(13b)
TTL-(1B)
next protocol-(1B)
checksum-(2B) checksum on IP header only
SIP-(4B)
TIP-(4B)
options-may or may not appear
padding- pads to next 32-bit boundary

10th Byte of IP header common values

1 (0x01) - ICMP (L3)
2 (0x02) - IGMP
6 (0x06) - TCP
8 (0x08) - EGP
17 (0x11) - UDP
88 (0x58) - IGRP
89 (0x59) - OSPF

IPv6 Header

makes up the 15 -54B fixed 40B


IPv-(4b)
traffic class-(8b)
flow label-(20b)
payload length-(2B)
next header-(1B)0x06-TCP, 0x11-UDP,0x3A-ICMPv6
hop limit-(1B)
src addy-(16B)
dest addy-(16B)

min MTU for IPv6

1280, uses PATH MTU DISCOVERY to ensure route can handle

ipv6.nxt == 06
shows all IPv6 packets that contain TCP headers in wireshark

What 2 things are critical to ensure the Ip packet's integrity is intact upon reassembly?

Proper sequencing and
placement of fragments

Every fragment must be the same size except _________.

the last one

ICMP

provides error reporting, flow ctrl and 1st-hop gateway direction

ICMPv4 Header

Type (1B)
Code (1B)
Checksum (2B)
Type 3 and 11 - (4B) unidentified
Type 5 - (4B) redirect addr
Type 0 and 8- ID (2B) Seq # (2B)

where is the ICMP Header?

fits in packet directly following the IP header

two types of ICMP msgs

informational and error
0x00 - echo reply; info
0x03 - Destination unreachable; error
0x05 - redirect; error
0x08 - echo request; info
0x0B - TTL exceeded; error

Data area of an ICMP error msg must contain__________.
original (offending) IP header, including all options and at least 8B of additional data

Type 3 error msg codes

0 - Network unreachable
1 - Host unreachable
2 - Protocol unreachable
3 - Port unreachable
13 - Communication administratively prohibited
ICMP filtering in wireshark

icmp.type==3 and icmp.code==3
would show all dest unreachable/port unreachable error

TCP header uses ________ and _________ to maintain order and assure reciept.
Seq #
Acknowledgement #

TCP header contains 11 fields:

Src port (2B)
Dest port (2B)
Seq # (4B)
Acknowledgement #(4B)
Data offset (4b)
Reserved (4b)
Ctrl flag (1B)
window size (2B) {max size of window size:FFFF before more data can be sent to host)
TCP checksum (2B)
Urgent pntr (2B) points to last byte of URG data under ctrl flag

Ctrl flags

2-URG; moves to top of stack to be pushed up
1-ACK; ID's ack field as significant, may or may not contain data, if so, stored in receiver's buffer


--------------------------------------------------------------------
8-PSH; push up the stack as soon as possible
4-RST; the port is closed, reset connex
2-SYN; synchronize Seq #s
1-FIN; sender has no more data to send

4-way graceful teardown

either side can start this:
Client - FIN/ACK
Svr - ACK
Svr - FIN/ACK
Client - ACK

phantom bit

(1B) (0x0001) used to update SEQ# and ACK# exchange when no data is sent



SYNs and FINs

TCP Header exploits

OS enumeration by ISN
service enumeration through TCP ports
TCP session hijacking
customizing flag settings to bypass ACL, aid in enumeration through filtering devices,and DoS exploitation

UDP

connectionless, unreliable transport mechanism
does not mean UDP comms are unreliable, upper layer protocols assume these responsibilities

UDP header

Src Port (2B)
Dest Port (2B)
UDP msg length (2B)
UDP checksum (2B) optional, 0 if not used

UDP filtering in wireshark

udp.port == 53; shows all DNS queries
udp.srcport == 53; shows all DNS responses
DHCP

based on Bootstrap protocol
filter in wireshark using bootp, not DHCP
2 types: dynamic and manual

dynamic DHCP
svr assigns IP to client for limited time (lease)

manual DHCP

client's IP assigned by admin, DHCP just conveys the addr to client

DORA

DHCP assignment process
1. client broadcasts DISCOVER msg
2. all DHCP svrs hearing, send OFFER
3. client REQUESTS from one svr, denying any others
4. DHCP svr broadcasts ACKNOWLEDGEMENT msg

DHCP NAK

Svr to client
network addr is incorrect (new subnet,lease expired)

DHCP Decline
client to svr
network addr already in use
DHCP Release

client to svr
client gives up addr, cancelling remaining lease

DHCP Inform

client to svr
asks for only local config items
client has externally config'd addr

DHCP filtering in wireshark
bootp; shows all DHCP traffic
udp.port == 67 or udp.port == 68; shows all DHCP traffic

Active FTP

UDP ports 20 (data) 21 (cmds)
user initiates ctrl connex, svr does the rest (svr pushes data)

Passive FTP

UDP ports 21 (cmds)
user initiates ctrl connex, opens data channel (goes and gets) on svr's advertised port
more secure, good for firewalls/ACLs (SYN/ACK traffic)

FTP:
Bye
ASCII:
QUIT
terminates session
FTP:
dir
ASCII:
LIST
detailed version of ls cmd (ls -al)
FTP:
get
ASCII:
RETR
svr transfers copy of file to requester
FTP:
ls
ASCII:
NLST
list contents of specified dir, files only
FTP:
mkdir
ASCII:
MKD
creates dir on FTP svr
FTP:
put
ASCII:
STOR (not STORE)
svr stores data sent to it as a file, over writes if already there
HTTP
application-lvl protocol over TCP port 80
generic, stateless; used for distributing HTML docs
HTTP communication

1. Client establishes TCP connex using given URL (3-way handshake)
2. Client sends HTTP request
3. Svr provides document
4. TCP connex closed

HTTP cmd:
GET

a rqst to retrieve whatever info is ID'd by recipient

HTTP cmd:
HEAD

Same as GET, except svr must not returna msg-body, only meta-info

HTTP cmd:
POST (think msgs)

used to request the server to accept enclosed data as a new subordinate of the svr resource ID'd in rqst
- post a msg to BBS, newsgrp, mx list
- submitting a form to a data handling process

HTTP cmd:
PUT (think files)

rqsts enclosed item to be stored under ID'd svr resource

GET data field:
Request start line

contains rqst method, desired URL and HTTP version

GET data field:
ACCEPT

specifies certain media types that are acceptable for response

GET data field:
ACCEPT CHARSET

ID's which character sets are acceptable
if * is here, all are accepted

GET data field:
ACCEPT ENCODING

ID's encoding method client will accept

GET data field:
ACCEPT-LANGUAGE

ID's language client will accept

GET data field:
COOKIE

used to ID user to a svr

GET data field:
USER-AGENT
ID's browser app used by client
GET data field:
HOST
ID's URL client is rqsting
Wireshark filter:
Show all HTTP error msgs

http.response.code>399
others:
1XX-info
2XX-success
3XX-redirect
4XX-client error
5XX-svr error

HTTPS

uses port 443
same comm rules and syntax as HTTP
usually uses HTTPSURL prefix
ID's a secure connex w/padlock symbol

SSL

client can verify ID of svr
provides authentication, integrity, and confidentiality
x.509

DNS

client rqsts IP addr for a known FQDN
or
FQDN for a known IP addr

DNS header

Transaction ID (2B) matches rqsts/response packets
Flags (2B) type (0000-7FFF=query, 8000-FFFF=response)
Questions (2B) # of question records in rqst
Answer Records (2B) # of answer records in response

DNS query:
Iterative

svr to svr query when 1st svr does not know answer

DNS query:
Recursive

client to DNS and back to client query
DNS reply

responds to query
all smae fields as query, also includesanswer field at end of packet

DNS record type:
A
Mapping
DNS record type:
CNAME
canonical name (mapping) alias
DNS record type:
MX
mail records
DNS record type:
AXFR

zone tranfer

DNS record type:
PTR
pointer record
reverse lookup
DNS zone transfer

used between DNS svrs to keep DNS tables up to date
- when starting DNS service on secondary
- when refresh time expires
- when changes are saved to primary zone file
secondary svrs initiate zone transfers, primaries answer

If in-addr.arpa is in ASCII portion of Wireshark, then...

DNS is active in that packet

LDAP

port 389
x.500