System Analysis and Design
System Analysis and Design
For local users share permissions are irrelevant. When share and NTFS
permissions are used simultaneously, i.e. remote users, the most restrictive
permission always wins. For example, when the share permission is set to
read and the file permissions to full control, the user only has read access.
The same happens when the share permissions are set to full control and the
file permissions to read access.
8. Assume that p and q are two large primes and n=pq. Based on RSA key
generation algorithm, the encryption key e of RSA must meet _______.
gcd(e, (p-1)(q-1))=1
9. Assume that (p, q, n, e, d) are generated according to RSA key
generation algorithm, the public key of RSA is _______.
e and n
10. Assume that (p, q, n, e, d) are generated according to RSA key
generation algorithm. The RSA decryption of a ciphertext c (where
0<c<n) is _______.
c^d (mod n)
11. A) Explain the main functionality of certificates. Your answer must
include the THREE important fields of certificates required for this
functionality.
A certificate binds a subject's identity (name, address etc.) to the public key of
the subject, and is authenticated by a digital signature from a Certificate
Authority (CA). The public key in the certificate can then be used by other
subjects to authenticate the subject in the certificate or encrypt data for the
subject in the certificate.
B) Explain how certificates are created and used for EFS file recovery.
You should explain the general technique without making any reference
to how this is done with Windows (i.e. GUI). Your answer must be no
longer than FIVE sentences. Longer answers will receive mark
reductions.
A recovery certificate including a key pair is created and signed by a CA
(which in the labs is the local domain controller). By registering the recovery
certificate, the certificate's subject is registered as recovery agent on
machines on which we may want to recover files in the future. Each machine
verifies the authenticity of the certificate before registering the key pair as
recovery key (in the labs with the domain controller's public key). Then any
files on a machine that are encrypted with EFS, are encrypted with the user's
public key as well as the recovery agent's public key. The password-protected
private key from the recovery agent can later be used by the admin to recover
the content of an encrypted file.
Note that for performance reasons the file is not actually encrypted multiple
times with different public keys. Instead, a (random) key is generated and
used for encrypting/decrypting the file with a symmetric encryption scheme
and that symmetric key is encrypted with the user's and recovery agent's
public keys (and later decrypted during recovery). Details:
https://en.wikipedia.org/wiki/Encrypting_File_System This information is here
for context and was not required for full marks.
12. What is forward secrecy? Why do we need it? Do not write more than 2
sentences each.
Forward secrecy means that past sessions keys are not compromised even if
long term key material on which these sessions keys were based is
compromised. This means if the attacker compromises Alice key, the attacker
still can't decrypt previous communications of Alice.
We need forward secrecy since there is always a chance that long term keys
will get compromised, but with forward secrecy information leakage is minimal
if the compromised key can be revoked quickly.
13. In the SSL/TLS handshake protocol, server authentication is ______ and
client authentication is ______.
Mandatory; Optional
14. IPSec defines two protocols: _______ and ________.
AH; ESP
15. IPSec provides security at _____.
Network layer
16. Explain the key differences between SSL/TLS and IPSec with regards to
the order of authentication and encryption, the type of authentication,
access control and where its implemented.
SSL/TLS authenticates, then encrypts; IPSec encrypts, then authenticates.
SSL/TLS does not include access control, IPSEC includes some access control
for example packet filtering.
SSL/TLS is entirely implemented at (or just above) the transport layer in user
space (application and libraries), where IPSEC is implemented at the network
layer which means in partially in OS/kernel and partially in the application (user
space).
17. Describe the man-in-the-middle attack against the Diffie-Hellman
Exchange protocol, which is used by SSL/TLS, based on the two parties
(A)lice and (B)ob. Next, explain how this attack can be prevented.
Adversary M intercepts the message from A to B (g^a), and sends another
message (g^a') to B.
Honeypots (and honeynets) are also used to lure attackers to these systems,
so we can collect information about attackers activities, behaviours and
techniques which useful for understanding attacks and refining defences
accordingly.
20. You have to configure a firewall to block incoming traffic into your
network (192.168.10.0/24). It must have the following properties:
Your rules must be written in the below table format and no more than 4
rules must be specified to fulfil the above requirements.
There is no possibility of specifying a default policy for your firewall
(bad product). Direction is In or Out. An IP address or network can be
defined for Source IP/Net and Destination IP/Net. Single ports or comma-
separated lists of ports can be specified for source and destination
ports. Protocol is UDP or TCP. Your firewall has two actions (Accept and
Reject). Wildcards are specified with an asterisk (*) and can be used in
any fields except Rule#, Direction and Action.
Rule 1: In: : 192.168.10.112: : 80, 443: TCP: Accept.
AA is a two character upper case airline code where each character can
be from the whole alphabet (we won't need stricter checking here as in
actually checking for valid 2-character airline codes)
NN[N][N] is a flight number which is either 2, 3 or 4 digits long
YYYY is the year, assume we accept all values between 2000 and 2099
MM is the month, this is always specified as two digits (with leading 0 if
necessary)
DD is the day of the month specified as two digits (with leading 0 if
necessary)
CCCCCC is a 6 digit number
Note that we're deliberately not using shortcuts here, e.g. \d instead of the
longer [0-9] (also keep in mind that \d may not be equivalent to [0-9]).
However, these shortcuts are fine in your solution.
25. List the three different authentication factors and then explain why
multi-factor authentication makes it more difficult for an unauthorized
person to access a target.
Something you know (the knowledge factor), e.g. password, PIN
Something you have (the possession factor), e.g. smart card, key fob
Something you are (the inherence factor), e.g. fingerprint, voice, face
Need 21 character password to get equal or larger key space than 128-bit
random keys. Can find with search or use math:
User Configuration -> Policies -> Administrative Templates -> Desktop ->
Remove recycle bin from desktop
Subtract:
3=-15*k1 (mod 26)
k1=5
k2=11
C=5P+11
29. For a symmetric block cipher, what is the problem of simply encrypting
each block of data with the given key? What is the solution (it is
sufficient to simply name a mode)?
If each block of plaintext is simply encrypted with the given key (ECB mode),
then for a given block of plaintext and given key, we will always get the same
ciphertext. This can easily reveal structures/patterns in the plaintext. For
example, if we encrypt an image in ECB mode, we can still recognise the
image from the ciphertext as demonstrated with the famous Tux example. To
prevent this, other modes need to be used, such as CBC or CTR modes.
30. Explain what the below PAM authentication configuration does. The
explanation should cover what the modules do and the flow of
authentication processing. You can check the functionality of modules
with the man command (e.g. man pam_unix).
To differentiate from the default log format, the modified format should
be given the name: custom_combined
The default Apache log is /var/log/apache2/access.log which logs information
for each request. This is typically specified with LogFormat and CustomLog
directives in the Apache config file under /etc/apache2.
We can change the logging format by adding the additional fields (at the end)
and giving the format the required name:
In order for this custom logging to take effect, the Apache web server must be
restarted, e.g. with systemctl apache2 restart
32. Explain the concept of interposable libraries: what are they for, in which
case can they applied, how do they work?
Interposable libraries can be used for application-level logging and more
specifically for logging external functions, e.g. system calls, called by the
application.
To mitigate the issue customers should review the Cloud architecture and
interfaces, understand the dependency chains behind the API, ensure strong
authentication and access control are implemented, perform security testing
and make sure software is updated regularly.
34. Explain the TWO main issues with IoT security.
Manufacturers of IoT devices have a strong incentive to produce these
devices (firmware, software) as quickly and cheaply as possible. They often
focus on functionality and security is a distant afterthought. This results in
devices with no security or poor security.
Furthermore, often vendors do not offer patches for IoT devices or it is very
difficult difficult to apply the provided patches for IoT devices, especially for
end users. This means often weaknesses/vulnerabilities identified for IoT
devices can't be fixed.
a) Identify the URI (without parameters) that generated the most 404
errors and the productId that is related to all these errors. (2 marks)
Query:
sourcetype=www1/secure "Failed password| top user
Regex:
^[^\]\n]*\]:\s+\w+\s+\w+\s+\w+\s+(?P<user>[a-z]+) from
Answer: The most common user is root and 2nd most common mail
We can also capture failures for both valid and invalid users with one regex:
^\w+\s+\w+\s+\d+\s+\d+\s+\d+:\d+:\d+\s+\w+\d+\s+\w+:\s+\w+\s+\w+\s+\w+(?:
(\s+)|(\s+invalid\s+user\s+))(?P<user>[^ ]+) from
With FHE Alice can encrypt and store data in the Cloud and the Cloud can
process the data in encrypted form and the generated result is also in
encrypted form and can later be decrypted by Alice. This is much more secure
as the Cloud does not need to have the private key and the data is never
decrypted in the Cloud.
37. This question is related to Splunk and the dataset used in the labs:
What is the name of the program listening on a "leet" port?
You must provide the answer and a brief description how you found the
answer (Splunk query and 1-2 sentences).
index=botsv3 earliest=0 sourcetype=osquery* 1337
There are two related events of which one shows the full command line of the
process started.
Answer: netcat