CST3607 Class Notes 2018-09-04

New & Tools

ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem (https://atcommands.org/)

  • AT commands, originally designed in the early 80s for controlling modems, are still in use in most modern smartphones to support telephony functions.
  • The role of AT commands in these devices has vastly expanded through vendor-specific customizations, yet the extent of their functionality is unclear and poorly documented.
  • Functionality exposed, including the ability to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, perform screen unlocks, and inject touch events solely through the use of AT commands.

Enable Microsoft Office Protected View

  • Applies To: Excel 2016 Word 2016 PowerPoint 2016 Excel 2013 Word 2013 More… Files from the Internet and from other potentially unsafe locations can contain viruses, worms, or other kinds of malware that can harm your computer. To help protect your computer, files from these potentially unsafe locations are opened as read only or in Protected View. By using Protected View, you can read a file and see its contents and enable editing while reducing the risks.

Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records

mSpy, the makers of a software-as-a-service product that claims to help more than a million paying customers spy on the mobile devices of their kids and partners, has leaked millions of sensitive records online, including passwords, call logs, text messages (WhatsApp, Facebook Messenger), contacts, notes and location data secretly collected from phones running the stealthy spyware.

QuickTime should be uninstalled from all Microsoft Windows systems

2 Factor Authentication

Panopticlick

The Electronic Frontier Foundation (EFF) has online tracker-testing in its Panopticlick, helping you analyze the privacy protections in your Web browser.

Web Browser Plugins

  • uBlock Origin
  • NoScript
    • Since so many sites depend on JavaScript, you may want to disable NoScript, but when prompted, leave the other NoScript protections enabled.

Wireless Network Security

PMKID Vulnerability that bypasses WPA/WPA2 4-way Handshake

WPA3

Virtual Private Network (VPN)

virtual private network (VPN) enables users to send and receive data while remaining anonymous and secure online.

In the simplest terms, a VPN is used to create a secure, encrypted connection between your computer and a server operated by the VPN service.

Types of Ethernet cabling

  • Straight-through cables are used to connect unlike devices.
    • e.g. Host to Switch, Router to Switch
    • On a host: Pins 1 & 2 are transmit, and 3 & 6 are receive.
  • Crossover cables are used to connect like devices.
    • e.g. Switch to switch, Router to host, Router to Router
    • It is possible to connect switches using a straight-through cable because many switchs have auto configuring ports.  Usually referred to as Auto-MDIX. a.k.a. Auto Uplink.
  • Roll-over cables are used to connect a hosts’ RS-232 / EIA-TIA-232 serial interface to a routers console port.
    • The default COM port settings for Cisco routers & switches are:
      • Bits per Second: 9600, Data bits: 8, Parity: None, Stop Bits: 1, Flow Control: None

Autonomous System (AS)

  • A group of networks and routers under a common administrative control.
    • Routing inside and autonomous system is referred to as intradomain routing.
    • Routing between autonomous systems is referred to as interdomain routing.

RFC (Request for Comments)

IEEE (Institute of Electrical and Electronics Engineers): The world’s largest technical professional organization for the advancement of technology

Deprecated / Deprecation

Cisco’s Three-Layer Hierarchical Model

  • Core layer or Backbone
  • Distribution layer
  • Access layer

Read

  • CCNA R&S Study Guide 2nd Edition: Chapter 3: Introduction to TCP/IP

Do

  • CCNA R&S Study Guide 2nd Edition: Chapter 3: Written Labs & Review Questions

Leave a Comment