CySec Foundations Teil 2
CySec Foundations Teil 2
CySec Foundations Teil 2
Set of flashcards Details
Flashcards | 210 |
---|---|
Language | Deutsch |
Category | Computer Science |
Level | University |
Created / Updated | 31.07.2020 / 10.08.2020 |
Weblink |
https://card2brain.ch/box/20200731_cysec_foundations_teil_2
|
Embed |
<iframe src="https://card2brain.ch/box/20200731_cysec_foundations_teil_2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
What is special about Stuxnet?
It was the first time that malicious code caused physical damage and it was the first time code was used in warfare between nations
What does Spyware do?
monitors actions and transmits important details to a remote system
What is Adware?
displays ads on infected computers
may monitor shopping patterns and redirect to competitors
Give a definition of an antivirus
program used to prevent, detect and remove malware
What does an AV do if it detects an infection?
if possible, eradicate the virus, disinfect affected files, restore machine to safe condition
if the software doesn't know how to remove, quaranties virus
if it cannot be quarantied, the files are deleted
How does signature based AV work?
AV maintains a large DB of signatures which it looks for
What is heuristic based AV?
analyse the behaviour of software
What is data integrity AV?
designed to alert sysadmins of unauthorized file modifications
e.g. sudden changes in executable files
How does a buffer overflow attack work?
give an input that is too large for a datastructure -> memory of other structures is overwritten
What does TOCTTOU or TOC/TOU stand for?
Time of Check to Time of Use
How does a TOCTTOU attack work?
e.g. file permissions that are loaded upon logon, after which alterations in permissions don't have any effect
What is a Back Door attack?
backdoors are undocumented command sequences that allow attackers to bypass normal access restrictions
- may be created by malicious code
- may be created by devs in order to debugg and then not removed in production
What is Escalation of privilege and what are rootkits?
EoP -> attacker expands from normal user account to admin
rootkit exploit known vulnerabilities in OS an increase access to root
What is XSS?
Cross site scripting
may have effect upon reflection of user generatec content in webpages
What is XSRF or CSRF?
Cross-Site Request Forgery
- attacker embeds code in website that sends commands to a seconds website
- if users logged on second website, command may succedd
In which network zone are webservers often located?
The DMZ = demilitarized zone
What is a SQL Injection attack?
SQL is entered in an input field -> SQL statement may be created dynamically -> SQL entered by attacker is executed by server
How does one protect against SQL Injection?
- use of prepared statements
- limit account privileges
- perform input validation
How does SYN flooding work?
- send TCP SYN segments to open ports with spoofed IP
- server replies with SYN/ACK
-> results in 'half-open connections' until the server cannot accept new connections
What does a botnet consist of?
bots / zombies
botmaster
What is a man-in-the-middle attack?
attacker inserts himself between client an server
-> traffic is forced through the attacker machine
- attacker can view and control all network traffic
What is a man-in-the-browser attack?
- trojan horse installed as plugin
-> capture formdata
-> inject JS into websites
-> hijack authentication sessions
What are replay attacks?
an attempt to reestablish a communication session by replaying captures traffic
What is a modification attack?
packages are captured, altered and then replayed against a system
List the steps of the TLS 1.2 Handshake
C -> S
1. ClientHello
C <- S
2. ServerHello
3. [Certificate]
4. [ServerKeyExchange]
5. ServerHelloDone
C -> S
6. [Certificate]
7. ClientKeyExchange
8. [CertificateVerify]
9. ChangeCipherSpec
10. Finished
C <- S
11. ChangeCipherSpec
12. Finished
What is sent in the ClientHello message during the TLS Handshake?
- supported TLS version
- random number
- supported Ciphers by the client
- [Extensions]
- [Session ID] (optional)
What is sent in the ServerHello?
- TLS version
- random number
- CipherSuite
- [Session ID]
Which is the first encrypted message during the TSL 1.2 Handshake?
The Finished message; it's sent after the ChangeCipherSpec message
What are some differences between the TLS 1.2 and TLS 1.3 handshake?
- ECDH keys are sent in ClientHello / ServerHello
- no ChangeCipherSpec message
Which is the first encrypted message in the TSL 1.3 handshake?
The second message
What is the 0-RTT Resumption in TLS 1.3?
During application data, server can send a pre-shared key for use next time
- allows to resume sessions very quickly
A CA hands out signatures. What is signed by the CA and what does this signature imply?
The CA signs the public key of a server / user to verify the confidence of authenticity of a server / user.
What parts of a certificate are confidential and should be encrypted?
The private key with which encryption happens
What is an issuer and what is a subject in X.509 certs? How are they called?
Issuer: the CA releasing the cert. CA is part of the trust chain
Subject: cert holder.
What happens if the client receives a CertificateRequest during a TLS handshake and doesn't send a Certificate and CertificateVerify?
The server blocks the rest of the communication and sends a fatal error
Why should a digital certificate be signed by a third party?
because any server can create a pirvate and public key and pretend to be a certain server
Where does the chain of trust always end?
On a root cert that is located on the clients machine
How is a root cert signed and why is it trustworthy?
it is self-signed
its trustworthy because it is pre-installed on the clients machine
What is the problem with ciphertexts that haven't been secured with a MAC?
The integrity cannot be guaranteed
In the TLS 1.2 handshake, which information will the Finished mesage sent by the client contain?
hash or MAC of the entire handshake so far