CramX Logo
CIS3360: Security in Computing - Document preview page 1

CIS3360: Security in Computing - Page 1

Document preview content for CIS3360: Security in Computing

CIS3360: Security in Computing

A course focusing on security principles, methodologies, and technologies used to protect computer systems and networks.

Olivia Smith
Contributor
4.5
0
12 months ago
Preview (3 of 7 Pages)
100%
Log in to unlock
Page 1 of 3
CIS3360: Security in Computing - Page 1 preview imageCIS3360: Security in ComputingHomework 21.(35 points) Knowledge-based Questions:a.Although the majority of current botnets use the centralized C&C communicationarchitecture, why they are very hard to shut down even if defenders know all of the botmachines in a botnet?b.Give the name of a real rootkit that utilizes Direct Kernel Object Manipulation (DKOM)technique?c.What is Trojan malware? What is a backdoor?d.What is ARP? In what network layer is ARP being used?e.What is a Smurf attack? What is a SYN flooding attack?f.What are the two major DNS query modes? How many types of resource records aresaved on a DNS server?g.Why it is easy for attacker to send out spoofed packets in the“thin pipe/thick pipe”method while it is very hard for an attacker to inject spoofed packets in a normal TCPcommunication session?a.Even if defenders know all the infected bot machines in a botnet, shutting it down is difficultbecause of several reasons:1.Bot machines can be distributed across many countries, making legal actions ortakedowns complicated and time-consuming.2.Botnets can use decentralized C&C (command-and-control) structures or peer-to-peer(P2P) networks, where nodes can act both as bots and controllers. This makes it harderto shut down the entirebotnet by targeting a single C&C server.3.Fast-flux techniquesallow attackers to quickly change their C&C server’s IP address,making it harder for defenders to block the botnet effectively.4.Infected machines are often spread across different ISPs andnetworks, making theidentification and removal of infected hosts more challenging.b.A well-known example of a rootkit that uses theDirect Kernel Object Manipulation (DKOM)technique is theZeus rootkit. It manipulates the Windows kernel to hide its presence andprevent detection by antivirus software.oc.Trojan malware:A Trojan is a type of malicious software that pretends to be alegitimate program but actually contains harmful code designed to compromise thesecurity of the victim’s system. It does not self-replicate like viruses but relies on thevictim's actions to execute.oBackdoor:A backdoor is a method of bypassing normal authentication and securitymechanisms in a system to gain unauthorized access. It allows an attacker to remotelycontrol the system or inject further malicious actions without detection.d.ARP (Address Resolution Protocol)is a protocol used to map a known IPaddress to its corresponding MAC (Media Access Control) address in a localnetwork. ARP operates in theData Link layer (Layer 2)of the OSI model,
Page 2 of 3
CIS3360: Security in Computing - Page 2 preview image
Page 3 of 3
CIS3360: Security in Computing - Page 3 preview imageallowing devices to locate each other on a local network by resolving IPaddresses to MAC addresses.oe.Smurf attack:A Smurf attack is a type of DDoS (Distributed Denial of Service) attackwhere an attacker sends a large volume of ICMP Echo (ping) requests with a spoofedsource IP address (the victim’s IP address) to a network's broadcast address. This causesall devices on the network to reply to the victim, overwhelming it.oSYN flooding attack:A SYN flood is a type of DoS attack in which an attacker sends aflood of TCP/SYN packets, usually with a spoofed sender address. This causes the targetsystem to allocate resources waiting for a connection that never completes, leading toresource exhaustion and denial of service.of.DNS Query Modes:1.Iterative Query:The DNS resolver queries a DNS server for the requesteddomain name. If that server doesn't have the information, it will return areferral to another DNS server that may have the information.2.Recursive Query:The DNS resolver asks a DNS server to fully resolve the query,meaning that the server takes responsibility for resolving the query, eitherreturning the result or an error if it cannot find the information.oResource Record Types:There are several types of DNS resource records, including:1.A (Address record)Maps a domain name to an IP address.2.MX (Mail Exchange record)Defines mail server for a domain.3.CNAME (Canonical Name record)Alias for a domain name.4.NS (Name Server record)Specifies authoritative DNS servers.5.PTR (Pointer record)Used for reverse DNS lookups.6.SOA (Start of Authority record)Indicates the authoritative information for aDNS zone.7.TXT (Text record)Holds arbitrary text information, such as SPF data.8.AAAA (IPv6 address record)Maps a domain name to an IPv6 address.g.The "thin pipe/thick pipe" method involves an attacker sending packets using a simple UDP-based attack or ICMP flood where no session or connection needs to be established. Sincethere’s no TCP handshake, it is easy for an attacker to send spoofed packets to a target withouthaving to maintain any session state. In contrast, in a normalTCP communication session, thereis athree-way handshake(SYN, SYN-ACK, ACK), which makes it very hard for attackers to injectspoofed packets without proper sequence numbers or control over the session state. Spoofedpackets in a TCP session will be rejected by the target since the sequence numbers andacknowledgment will not align, preventing successful injection of malicious packets.2.(20 points) DNS Query:The following shows the result when I use “dig mx knights.ucf.edu” (unrelated text has been cut).Please answer the following questions:1). What is the email server name that in charge of UCF student email account ofusername@knights.ucf.edu?2). What are the IP addresses used for this email server?3). What are the IP addresses of UCF authoritative DNS servers?jlazar@eustis:~$ dig mx knights.ucf.edu
Preview Mode

This document has 7 pages. Sign in to access the full document!