exercize: Try to write the firewall rules for a DMZ multizone architecture
A VPN can act in two modes:
The full tunnelling wastes more bandwidth but instead the split tunnelling creates a bridge between an unprotected network and a protected one.
Ex. 1 True or False statements
RSA 2048 is more robust to bruteforcing than 256 AES False, we can not compare directly an asymmetric RSA and symmetric AES
No encryption algorithm is perfect, as they are all vulnerable to bruteforcing False, because OneTimePad is invulnerable to bruteforcing because every cyphertext decrypts to every possible plaintext
An encryption algorithm is broken if there is a way to get the secret by using the cyphertext False, an algorithm is broken if there is an attack significantly faster than bruteforcing.
Ex. 2 To avoid Buffer overflow we can
gets()
like read()
specifying number of bytes to readfor
cycle to read char by charscanf()
specifying %15cEx.3 Assuning IA-32, why must we split the content to be written in the target cell in 2, 2-bytes chunks? Because %c allows to print up to 64K chars (16bits)
The printf is vulnerable only in the case that the format string is variable and can be used to write an exploit, if it is fixed in the source code, it cannot be exploited.
Ex.4 on SQL injections
Ex.5 ICMP Smurf attack