ITIS 6167/8167 Final Review A. ARP protocol and Security a. What is the purpose of ARP protocol? Why do we need it? b. What is the purpose of ARP Cache? c. Why does the ARP cache have a lifetime? Why do not we keep them forever? d. What is a gratuitous ARP message? How does it work? What are the purposes of the message? e. Difference between ARP poisoning and promiscuous mode of Ethernet f. Man-in-the-middle attack using ARP poisoning (why do we need to disable the ICMP redirect function in the attacker?) g. How to use ARP poisoning to escape IP address based authentication? Under this condition, how can you maintain the normal responses of the real web server? B. IP protocol and security a. The basics of the IP header b. What is trace-route and how to use TTL to implement it c. Why do we need IP fragmentation d. The procedure to fragment and to set the corresponding fields e. Fragment of fragment f. Where and how to reassemble the packets? How to handle a lost fragment? g. Attacks on IP fragmentation: buffer overflow, DoS, how to use fragmentation to penetrate firewall C. ICMP and its security a. Why will not we send ICMP for errors caused by ICMP error messages? Why will ICMP packets be sent only to the original source? b. When host A pings host B, it usually sends out a series of packets. Use what information can a computer match the ICMP echo reply to a specific ICMP echo request so that it can measure the network delay? c. How can we detect the MTU along a transmission path between two hosts? d. How to use ICMP source quench to conduct attacks to reduce the quality of connection? e. What is a smurf attack using ICMP f. How to use ICMP redirect message to conduct winfreeze attack D. UDP and its security a. If the IP protocol already provides host to host connection, why do we need the protocols at the higher layers? b. How can we distinguish a UDP header without a checksum from a checksum equal to “0” c. What is UDP ping-pong attack and how to conduct it d. What is DoS attack on UDP and how to conduct it 1 E. TCP a. Does the TCP protocol assume the data to be structured or structure-free? b. What is the difference between the URGENT and PUSH data in TCP? Describe an example for each kind of situations. c. The receiver can send back a receiver’s window size of “0”. What mechanism has TCP adopted to avoid dead lock under this condition? d. Understand the three-way hand shake procedure of the TCP protocol e. The slow start procedure of TCP to handle congestion f. Silly window and the countermeasures from the sender and receiver’s view g. Why in TCP do we want the sender and receiver to choose random numbers as the sequence number? Use an example to show how difficult or easy an attacker can guess the sequence number. h. The receiver’s window size is too small when we have a very high speed communication channel between two nodes. Please explain why this is bad for the network bandwidth usage efficiency. And also describe the mechanism that has been adopted to mitigate this situation. i. Please explain the basic idea of SYN cache and SYN cookie to mitigate the SYN flood attack over TCP. j. Why is it essential for TCP to use random port number? k. Attacks on TCP: blind connection reset, blind throughput reduction, and blind performance degrading attack. F. DNS and NMAP a. How can you use the TCP ACK scan to identify whether or not a port is filtered? b. What is the IDLE scanning technique used in NMAP? How can it figure out the status of a port on a target machine? c. What is the FTP bounce scan? How can it be used to bypass dynamic packet filtering? d. Is a domain in DNS a geometric concept? e. What are circular dependencies and glue records in DNS? f. Recursive queries and iterative queries in DNS g. The different between a domain and a zone in DNS h. DNS ID hacking procedure i. DNS related and unrelated data attack j. Understand how virtualization and memory sharing among virtual machines allow attackers to conduct side channel attacks on other VM. G. Email safety a. Traditionally, emails are delivered through multiple intermediate servers instead of end-to-end (from sender to receiver directly). Please shortly discuss the advantages of this approach. Why this kind of “open relay” is no longer supported by most servers? b. Please describe the major components in the format of an email message and the functionality of each component. What is the difference between the header in a mail message and the SMTP encapsulation? 2 c. In the email distribution list, what are the two methods to map a single list name to a group of email addresses? How to prevent the formation of email forwarding loops? What are the advantages of the local exploder and remote exploder? d. Please shortly describe the coding procedures of base64 and how it enables various file formats to be sent through the email system. Understand how the MIME standard allows an email to contain multiple multimedia components. How does base64 handle the files whose length is not multiple of three byte? e. The difference between the POP3 and IMAP protocols. f. Key establishment to enforce the confidentiality and integrity of the contents of emails. g. How to use onion routing to achieve email anonymity? h. How to use a proxy to achieve email anonymity? i. What are the major factors that restrict the wide adoption of the PEM protocol? H. Fighting the spam emails a. Please use an example to illustrate how the attacker can use the comment lines in HTML to help spam emails avoid detection. b. Please describe the trick of invisible ink to help the spam email avoid detection. c. Please describe the tricks of “catch a wave” and “the rake” to help the spam email avoid detection. d. Please explain the basic idea of the CRM 114 spam detector. If the sliding window contains 6 words, how many order-preserving sub-phases will be generated? For what reasons the authors use hash tables to label the features of the phrases? I. Anti Phishing a. Based on the “PhoolProof Phish prevention” paper, please explain why compromising either the machine or the user’s mobile device alone will not impact the safety of the approach. J. Web security a. Please fully understand the three examples that we explain in the class for “how to shop for free on the Internet”. If we describe a similar situation, you should be able to identify the vulnerability. K. Remote software attestation a. In the SWATT approach, the verification program will use randomly generated contents to overwrite all unused data memory. What is the purpose of this operation? b. Traditionally, people think that if all contents in the program memory of a computer is free of malicious programs, then you are safe. Please explain how “return oriented attacks” compromise such assumption. L. Risk analysis and security standards a. What are the three essential components of “risk analysis”? 3 b. During the risk analysis procedure, in addition to the security experts and domain experts, why should we get the administrative personnel (managers) involved? c. Shortly describe the advantages and disadvantages of quantitative and qualitative risk analysis. 4