ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 289 - CAS-004 discussion

Report
Export

An investigator is attempting to determine if recent data breaches may be due to issues with a company's web server that offers news subscription services. The investigator has gathered the following

data:

* Clients successfully establish TLS connections to web services provided by the server.

* After establishing the connections, most client connections are renegotiated

* The renegotiated sessions use cipher suite SHR.

Which of the following is the MOST likely root cause?

A.
The clients disallow the use of modern cipher suites
Answers
A.
The clients disallow the use of modern cipher suites
B.
The web server is misconfigured to support HTTP/1.1.
Answers
B.
The web server is misconfigured to support HTTP/1.1.
C.
A ransomware payload dropper has been installed
Answers
C.
A ransomware payload dropper has been installed
D.
An entity is performing downgrade attacks on path
Answers
D.
An entity is performing downgrade attacks on path
Suggested answer: D

Explanation:

A downgrade attack is a type of man-in-the-middle attack that forces two hosts to use an older or weaker version of the TLS protocol or its parameters. The attacker does this by replacing or deleting the STARTTLS command or exploiting the compatibility features of the protocol. The purpose of the attack is to create a pathway for enabling a cryptographic attack that would not be possible in case of a connection that is encrypted over the latest version of TLS protocol. The IOC shows that most client connections are renegotiated after establishing the connections, which could indicate that an entity is performing downgrade attacks on path by interfering with the initial handshake and making the client and server agree on a lower version of TLS or a weaker cipher suite. Verified

Reference:

https://en.wikipedia.org/wiki/Downgrade_attack

https://crypto.stackexchange.com/questions/10493/why-is-tls-susceptible-to-protocol-downgrade-attacks

https://venafi.com/blog/preventing-downgrade-attacks/

asked 02/10/2024
Jonno Sweeney
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first