What is a proxy server?
acts as a middle person between users and the internet. handles requests on users’ behalves. user requests go to proxy first, then proxy forwards it to site.
useful for:
content filtering (block sites)
caching (store copies of pages to load faster)
anonymity (hide your internal IP)
access control (only allow certain users/traffic out)
The reason it’s called a Proxy Firewall is that it completely breaks the connection between your computer and the target.
Connection A: Your computer connects to the Proxy.
The Inspection: The Proxy looks at your request at Layer 7.
Connection B: If the request is safe, the Proxy starts a brand new connection to the website.
Direct communication between your PC and the outside world never actually happens.
The Trade-off
Since the firewall has to “unwrap” and “re-wrap” every single request at the highest level of the OSI model, it is slower than a Layer 3 or 4 firewall. This is likely why your Nmap scans or Hashcat downloads might feel sluggish if a proxy is involved—every packet is being scrutinized.
Load Balancing algorithms: what is the advantage of sticky sessions and how are they managed?
advantage: keeps user data on one server (eg cart items, login info) on one server to avoid losing context
managed by caching IP addresses, using cookies, or tracking a session ID
Load Balancing algorithms: load balancing with sticky sessions
all requests from a user are sent to the same server (not randomly distributed).
Load Balancing algorithms: fastest response time
chooses the server that replies to the quickest to requests
Load Balancing algorithms: weighted round robin
stronger servers get more requests, based on assigned ‘weight’
Load Balancing algorithms: least connections
sends new requests to the server with the fewest active connections
Load Balancing algorithms: round robin
assigns traffic to servers in order, one by one, in a loop; doesn’t account for server load
Load Balancing: clustering
running redundant systems together to provie continuous service in case one fails (i.e. high availability)
What’s the difference between IDS & IPS?
IDS monitors and alerts (passive), IPS actively blocks (inline [in the path of network traffic]/active)
Wireless Security: Cryptographic Protocols: WEP
Wired Equivalent Privacy
- cryptographically insecure
- NOTE: name gives the impression of wired network-level safety, but this is NOT true. Wired networks are very hard to listen in on
Wireless Security: Cryptographic Protocols: WPA3 (5)
Wifi Protocol Access 3
- patches weaknesses in WPA 2
- easy connection: join network w. QR code
- AES + GCMP (Galois/Counter Mode Protocol)
- SAE replaces pre-shared key exchange protocol from WPA2
- encrypts traffic between endpoints without a password
Wireless Security: Cryptographic Protocols: WPA2
Wifi Protocol Access 2
- used now instead of WPA
- uses AES and CCMP
Wireless Security: Cryptographic Protocols: WPA (2)
Wifi Protocol Access
- crated to replace WEP when it was found insecure
- uses RC4 with TKIP which uses an encrypted has w. a sequence counter and a 48-bit IV to avoid problems WEP had
Email Security: Mail Gateway
a server that allows a network to send/receive email communications from other networks. generally used to receive mail from OUTSIDE the org
checkpoint for inspection of emails/attachments (malicious links, content, and ensureing confidential info isn’t being mailed out) — ALL email is passed thru this point
Email Security: Steps (in my notes but idk what the steps are for)
Email Security: SPF
Sender Policy Framework
- 3 responses: instructions on how server will handle messages NOT specified in DNS SPF record
+ all = accept
- all = reject
~ all = flag
Email Security: DKIM
Domain Keys Identified Mail
- digital signature added to outgoing mail, allowing recipient to confirm msg origin
Email Security: DMARC Framework
Domain-Based MessageAuthentication, Reporting & Conformance Framework
- used to identify suspicioius mail that originates from unauthorized mail servers
- uses DKIM + SPF
VPNs: tunneling (TLS & IPSEC)
VPNs: tunneling: TLS
-Transpoet layer security
- cryptographic protocol that gives privacy + integrity over VPN
- designed to encapsulate other protocols like HTTP
- replaced SSL
VPNs: tunneling: IPSEC (4)
VPNs: site-to-site
VPN gateways that tunnel traffic for entire networks. Hardware installed on network, transparent to users. many computers
VPNs: remote access
clients use their local network to connect to the VPN, usually by authenticating at a VPN gateway, software installed on end user’s comp. user authenticates when connecting (work from home model)
Wireless Security: Authentication Protocols
Personal: WPa@