2.0 Threats, Vulnerabilities, and mitigations Flashcards

1
Q

What is phishing?

A

A: Social engineering attack using spoofed links/emails to steal data or deliver malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What is smishing and vishing?

A

A: Smishing = phishing via SMS; vishing = phishing via voice call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What are removable device vectors?

A

A: Malware delivered via USB drives; may emulate a keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is agentless malware?

A

A: Malware exploiting vulnerable software without installing itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some vectors of attack a hacker could enter through?

A

Bluetooth, wifi, file based or image based vectors, voice fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Agentless?

A

No installed executable, compromised software on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some unsecure wireless network protocols?

A

WEP, WPA, WPA2, 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is smishing?

A

Phishing over text message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an SQL injection?

A

inject malicious SQL code into a database query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an LDAP injection?

A

Targets LDAP queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to keep OS’s safe?

A

Patch and up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cross-site scripting (XSS)?

A

When information from one site goes onto another

Hackers hijacks a victim who goes to a legitimate site and thus the javascript code will execute.

Steal info, hijack sessions, or redirect users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is non-persistent XSS attack?

A

Script is included in the URL or input and reflected back immediately in the response

Only works if the user clicks on a suspicious link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a persistent XSS attack?

A

The malicious script is stored on the server like in a comment, profile bio or post

Runs everytime a person visits the affected page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is End of Life?

A

When a manufactuer will stop selling a product, usually a warning out first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is end of service?

A

Complete end of support unless maybe you pay a lot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is directory traversal?

A

When you move to a part of the project/folder that you shouldn’t have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name insecure protocols

A

Telnet, FTP, SMTP, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name some secure protocols

A

SSH, SFTP, IMAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port is FTP on?

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What port is Telnet on?

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is port http on?

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is port SMTP on?

A

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port is IMAP on?

25
Q

What port is POP3 on?

26
Q

What does Telnet do?

A

Remote command line login

27
Q

What does FTP do?

A

Transfers files without encryption
File transfer protocol

28
Q

What doe SMTP do?

A

Sends emails without encryption
Simple mail transfer protocol

29
Q

What does IMAP do?

A

Retrieves email (plaintext login)
Internet message access protocol

30
Q

What does POP3 do?

A

Downloads email messages to local device (no encryption)

31
Q

What is the secure version of Telnet? and what port does it run on?

A

SSH port 22

32
Q

What is the secure version of FTP? and what port does it run on?

A

SFTP port 22

33
Q

What is the secure version of IMAP? and what port does it run on?

A

IMAPS and port 993

33
Q

What is the secure version FTP?

34
Q

What is the secure version of POP3? and what port does it run on?

A

POP3S and port 995

35
Q

What is the secure version of HTTP? and what port does it run on?

A

HTTPS and port 443

36
Q

Whats the difference between SFTP and FTPS?

A

SFTP is a new protocol using SSH, more modern
FTPS is an older FTP that uses TLS encryption

37
Q

What is the difference between hashing and encryption?

A

Hashing, you hash a password and check the hash with the hash you have saved in your system

Encryption - you encrypt a message and send it, decrypt with the correct key

38
Q

Difference between jailbreaking and rooting?

A

Jailbreaking is for iPhones
Rooting is for Androids

39
Q

Difference between a Virus and a Worm?

A

Viruses need something to latch onto for it to spread whether that be a packet or file

Worms can spread by themselves

40
Q

What is RFID cloning?

A

Where you clone someone’s badge ID

41
Q

Fileless virus

A

Stays in memory

42
Q

What is a Fox Hunt?

A

Where you hunt for the radio frequency that is jamming your signals

43
Q

How does ARP Poisoning work?

A

We have an ARP server and a victim laptop. The attacker will send a message to ARP saying “hey, we are that victim” then the server will send the info to the attacker and the attacker then feeds the info to the victim

44
Q

How do replay attacks work?

A

Hijacks a session or save the credentials for reuse

45
Q

What is a birthday attack?

A

Looking for a hash collision

46
Q

What are some indicators of compromise?

A
  1. Unusually amount of traffic
  2. Change to file hash values
  3. International traffic increase
  4. Changes to DNS data
  5. Uncommon patterns like reading a file more than usual
47
Q

Why is segmentation good for cybersecurity?

A

Keeps things seperate

48
Q

What does SIEM do and mean?

A

Security Information and Event Management

Monitor, log, event correlation, alerting, dashboards and reporting

49
Q

What are some mitigation techniques?

A
  1. Patching vulnerabilities - auto updates - third party updates
  2. Encryption - prevent access to application data files or full disk encryption
  3. Monitoring - network, servers, etc…
    SIEM - Security event manager
  4. Least privilege - role based access, best solution is to have no administrative privileges
  5. Configuration enforcement
  6. Decommissioning - once someone is out, or if a technology is faulty and must be decommission DESTROY
50
Q

What does Nmap tool do?

A

Scans all the ports to see the ones that are open

51
Q

Difference between Firewall, IDS and IPS

A

Firewalls manage the traffic and blocks
IDS tries to detect and notify
IPS tries to detect and block

52
Q

What does Wireshark do?

A

Packet capture and network analysis

53
Q

What does metasploit do?

A

Exploitation framework for penetration testing

54
Q

What does burp suite do?

A

Web app vulnerability testing tool

55
Q

What does tcpdump do?

A

Command line packet analyzer

56
Q

Main difference between TCP and UDP?

A

TCP is reliable and establishes a connection
UDP is fast and is connectionless

57
Q

Difference between VPN and a proxy?

A

VPN is meant to encrypt all data transferring between the two poitns
Proxy is meant to establish an alternate communication