Network Forensics Flashcards

(49 cards)

1
Q

What is a Switched Port Analyzer (SPAN) ?

A

Allows for the copying of ingress and/or egress communications from one or more switch ports to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Packet Sniffer ?

A

A piece of hardware or software that records data from frames as they pass over network media using methods such as a mirrored port or tap device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Complete the sentence:

A network sniffer should be placed inside / outside a firewall or close to an important server

A

inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is tcpdump ?

A

A data-network packet analyzer computer program that runs under a command line interface.
It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Wireshark?

A

A free and open-source GUI-based packet analyzer that is used for network troubleshooting, analysis, software and communications protocol development, and education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Full Packet Capture (FPC) ?

A

Captures the entire packet including the header and the payload for all traffic entering and leaving a network- entering and leaving - a lot of data!

Flow analysis tools provides network traffic statistics sampled by a collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Flow Collector ?

A

A means of recording metadata and statistics about network traffic rather than recording each frame

Flow analysis tools provides network traffic statistics sampled by a collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NetFlow ?

A

A Cisco-developed means of reporting network flow information to structured database
Gathers:
● Network protocol interface
● Version and type of IP
● Source and destination IP
● Source and destination port
● IPs type of service
● NetFlow provides metadata while packet captures provide a complete record of what occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Zeek (Bro) ?

A

a hybrid tool that passively monitors a network like a sniffer and only logs data of potential interest.
Zeek performs normalization on the data.
stores data as tab-delimited or Java Script Object. Notation (JSON) formatted text files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Multi Router Traffic Grapher (MRTG) ?

A

Is a tool used to create graphs showing traffic flows through the network interfaces of routers and
switches by polling the appliances using the Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Known-bad IP Addresses ?

A

An IP address or range of addresses that appears on one or more blacklists.
Reputation-based risk intelligence is used to create IP/URL block lists
Attackers now use domain generation algorithms to overcome block lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Domain Generation Algorithm (DGA) ?

A

A method used by malware to evade block lists by dynamically generating domain names for C2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Domain Generation Algorithm (DGA) - 5 steps:

A
  1. Attacker sets up one or more dynamic DNS (DDNS) services
  2. Malware code implements a DGA to create a list of new domain
    names
  3. A parallel DGA is used to create name records on the DDNS
    service
  4. The malware tries a selection of the domains it has created to
    connect to C2
  5. C&C server communicates with a new seed for the DGA to prevent
    being blocked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Fast Flux Network?

A

A method used by malware to hide the presence of C&C networks by continually changing the host IP addresses in domain records using domain generation algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you get a high rate of NXDOMAIN errors when resolving the DNS, it
could be an indicator of a

A

DGA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Recursive DNS Resolver
occurs when one trusted DNS server communicates with

A

several other trusted DNS servers to hunt down an IP address and returns it to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a URL Analysis?

A

an activity that is performed to identify whether a link is already flagged on an existing reputation list, and if not, to identify what malicious script or activity might be coded within it

Usetoolsfor
● Resolving percent encoding
● Assessing redirection of the URL
● Showing source code for scripts in URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a HTTP request contains?

A

a method, a resource, a version number, the header
and the body of the request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A HTTP method of GET is:

A

The principal method used with HTTP and is used to retrieve a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A HTTP method of POST is:

A

Used to send data to the server for processing by the requested resource

21
Q

A HTTP method of PUT is:

A

Creates or replaces the requested resource

22
Q

A HTTP method of DELETE is:

A

Used to remove the requested resource

23
Q

A HTTP method of HEAD is:

A

Retrieves the headers for a resource only and ignores the body

24
Q

Datasubmitted via a URL is delimited by the___character

25
Query parameters are usually formatted as one or more name=value pairs with ampersands ___ delimiting each pair
(&)
26
A ___ is used to indicate a fragment or anchor ID and it not processed by the webserver
‘#’
27
HTTP Response Codes shows on the
The header value returned by a server when a client requests a URL
28
HTTP Response Code - 200 says what?
Indicates a successful GET or POST request (OK)
29
HTTP Response Code - 201 says what?
Indicates where a PUT request has succeeded in creating a resource
30
HTTP Response Code - 3XX says what?
Any code in this range indicates that a redirect has occurred by the server
31
HTTP Response Code - 4XX says what?
Any code in this range indicates an error in the client request
32
HTTP Response Code - 400 says what?
Indicates that a request could not be parsed by the server
33
HTTP Response Code - 401 says what?
Indicates that a request did not supply authentication credentials
34
HTTP Response Code - 403 says what?
Indicates that a request did not have sufficient permissions
35
HTTP Response Code - 404 says what?
Indicates that a client is requested a non-existent resource
36
HTTP Response Code - 5XX says what?
Any code in this range indicates a server-side issue
37
HTTP Response Code - 500 says what?
Indicates a general error on the server-side of the application
38
HTTP Response Code - 502 says what?
Indicates a bad gateway has occurred when the server is acting as a proxy
39
HTTP Response Code - 503 says what?
Indicates an overloading of the server is causing service unavailability
40
HTTP Response Code - 504 says what?
Indicates a gateway timeout means an issue with the upstream server
41
What is a Percent Encoding?
A mechanism to encode 8-bit characters that have specific meaning in the context of URLs, also known as URL encoding
42
A URL can contain only ______ and _________ characters from the ASCII set
unreserved and reserved
43
What is a Unreserved Characters?
letters, numbers and - . _ ~
44
What is a reserved Characters?
:/?#[]@!$&'()*+,;=
45
A URL can not contain unsafe characters like:
Null string termination, carriage return, line feed, end of file, tab, space, and \ < > { }
46
can u represent reserved Characters inside the URL? if yes then how?
yes using binary, for example: null is translated to %00
47
Which tool allows for the creation of graphs to visualize network traffic flows through router and switch interfaces by utilizing SNMP?
MRTG
48
You are a cybersecurity analyst investigating a potential network issue at your company. You suspect there is unusual traffic on your company's network. Which of the following would be most effective command-line for capturing and analyzing network packets in real-time to investigate this issue?
TCPDUMP
49
You are a cybersecurity analyst at Dion Training Solutions and have been observing an unusual pattern in the company’s DNS logs. Over the past week, there has been a significant increase in NXDOMAIN responses, which indicates that numerous domain lookups are failing because the domains do not exist. Upon closer inspection, you notice repeated attempts to resolve domain names that follow no logical naming pattern and appear to be randomly generated. There are no signs of unusually high network traffic, and the domains being queried are not matching any known malware signatures in your database. Based on this scenario, which of the following is the MOST likely cause of the increase in NXDOMAIN responses in the organization's DNS logs?
The network is likely infected with malware using a Domain Generation Algorithm (DGA).