Term
|
Definition
| It's a bunch of layers of security that needs to be achieved before a connection can be formed. |
|
|
Term
| How does TCP work (basically) |
|
Definition
| The TCP is a finite state machine that has a bunch of different parameters that must be met in a certain order for the connection to be formed. |
|
|
Term
| Describe the 3-way handshake of TCP conneciton |
|
Definition
1)Client sends SYN packet 2)The server either accepts (sends ACK packet) or declines (sends RST packet) |
|
|
Term
| Describe the 4-way handshake disconnection of TCP |
|
Definition
1)FIN flag initialized (client -> host) (no more data) 2)Host enters CLOSE-WAIT state 3)Client sends FIN packet 4)Host sends FIN packet |
|
|
Term
| Describe the alternate way to disconnect TCP |
|
Definition
| RST packet is sent from the client |
|
|
Term
|
Definition
| When the sender's IP address is replaced with a different address |
|
|
Term
| Describe the steps for killing a TCP connection with RST |
|
Definition
| Essentially an outside computer spoofs its IP address so that it can communicate with the host in the manner it needs to. When the time is right (in the sequence of events), the RST packet (with the correct sequence number) is sent from the sniper program to create a disconnection between the client and the host. |
|
|
Term
| Describe the steps for killing a TCP connection with a FIN signal |
|
Definition
| The attacker constructs a FIN package with the correct sequence number. If the host believes this signal it then sends a CLOSE-WAIT signal. Then the client repeats this signal, which is then mirrored by the host. |
|
|
Term
| How does TCP hijacking work? |
|
Definition
1) ZZ sends a correct signal impersonating XX at the correct time 2) XX keeps sending incorrect signals 3) YY corrects XX's incorrect signalsand sends them to ZZ (because they're connected to YY output) 4) ZZ continues sending the correct signals 5) Eventually ZZ takes control of the connection and can execute commands on YY |
|
|