ITIS 6167/8167 Final Exam Review
- Basics of Computer Security
- For example, what are symmetric and asymmetric encryptions? What is one time pad? What is brute force attack?
- The basics of hash function, key establishment, man-in-the-middle attack.
- ARP protocol and Security
- What is the purpose of ARP protocol? Why do we need it?
- What is the purpose of ARP Cache?
- Why does the ARP cache have a lifetime? Why do not we keep there forever?
- What is gratuitous ARP message and what are the purposes of the message?
- Difference between ARP poisoning and promiscuous mode of Ethernet
- Man-in-the-middle attack using ARP poisoning (why do we need to disable the ICMP redirect function in the attacker?)
- How to use ARP poisoning to escape IP address based authentication
- IP protocol and security
- The basics of the IP header
- What is trace-route and how to use TTL to implement it
- Why do we need IP fragmentation
- The procedure to fragment and to set the corresponding fields
- Fragment of fragment
- Where and how to reassemble the packets
- Attacks on IP fragmentation: buffer overflow, DoS, how to use fragmentation to penetrate firewall
- ICMP and its security
- Why we will not send ICMP for errors caused by ICMP? Why ICMP packets will be sent only to the original source?
- Us what information can a computer match the ICMP echo request and ICMP echo reply
- How to use ICMP source quench to conduct attacks to reduce the quality of connection?
- What is a smurf attack using ICMP
- How to use ICMP redirect message to conduct winfreeze attack
- UDP and its security
- How can we distinguish a UDP header without a checksum from a checksum equal to “0”
- What is UDP ping-pong attack and how to conduct it
- What is DoS attack on UDP and how to conduct it
- TCP
- Does the TCP protocol assume the data to be structured or structure-free
- What is the difference between the URGENT and PUSH data in TCP
- Understand the three-way hand shake procedure of the TCP protocol
- The slow start procedure of TCP to handle congestion
- Silly window and the countermeasures from the sender and receiver’s view
- Why in TCP we want the sender and receiver to choose random numbers as the sequence number? Use example to show how difficult or easy to guess the sequence number.
- Attacks on TCP: blind connection reset, blind throughput reduction, and blind performance degrading attack.
- DNS and NMAP
- What is the IDLE scanning technique used in NMAP
- Is a domain in DNS a geometric concept?
- Recursive queries and iterative queries in DNS
- The different between a domain and a zone in DNS
- DNS ID hacking procedure
- DNS related and unrelated data attack
- Email safety
- The advantages that the emails are delivered through specific servers instead of end-to-end (from sender to receiver directly)
- Please describe the major components inthe format of a mail message and the functionality of each component. What is the difference between the header in a mail message and the SMTP encapsulation?
- In the email distribution list, what are the two methods to map a single list name to a group of email addresses? How to prevent the formation of email forwarding loops? What are the advantages of the local exploder and remote exploder?
- Please shortly describe the coding procedures of base64 and how it enables various file formats to be sent through the email system.Understand how the MIME standard allows an email to contain multiple multimedia components.
- The difference between the POP3 and IMAP protocols.
- When a sender needs to send an email to multiple receivers and needs to enforce the confidentiality of the contents, what will be an efficient approach?
- How to use onion routing to achieve email anonymity?
- How to use a proxy to achieve email anonymity?
- What are the major factors that restrict the wide adoption of the PEM protocol?
- Fighting the spam emails
- Please use an example to illustrate how the attacker can use the comment lines in HTML to help spam emails avoid detection.
- Please describe the trick of invisible ink to help the spam email avoid detection.
- Please describe the tricks of “catch a wave” and “the rake”to help the spam email avoid detection.
- Please explain the basic idea of the CRM 114 spam detector. If the sliding window contains 6 words, how many order-preserving sub-phases will be generated? For what reasons the authors use hash tables to label the features of the phrases?
- Safety of the android system
- Please shortly describe the four types of components in an android application and their functionalities; (Section 2 in “Analyzing Inter Application Communication in Android”)
- Please shortly describe the difference between explicit and implicit intents. If explicit intents are safer, why do we need the implicit intents? (Section 2 in “Analyzing Inter Application Communication in Android”)
- Please use an example to illustrate why using a unique action string to identify the receiver of an implicit intent is not safe. (Section 3.1 in “Analyzing Inter Application Communication in Android”)
- Please explain the basic concept of “Lightweight Mobile PhoneApplication Certification”. If you were an attacker, how can you design a mechanism to by-pass the checking procedure? (Hint: the original approach looks at only a single application.)
- Please explain the basic idea of TaintDroid. You should be able to calculate the taintvector of some basic operations such as add, times, etc.
- Anti Phishing
- For the “Dynamic security skin” paper, understand the approaches of “browser generated images” and “server generated images”.
- Based on the “PhoolProof Phish prevention” paper, please explain why compromising either the machine or the user’s mobile device alone will not impact the safety of the approach.
- Web security
- Please fully understand the three examples that we explain in the class for “how to shop for free on the Internet”. If we describe a similar situation, you should be able to identify the vulnerability.
1