2.0 Vulnerability Management Flashcards
Map scans
Device fingerprinting
Scheduling
Operations
Performance
Sensitivity levels
Segmentation
Regulatory requirements
Internal vs. external scanning
Agent vs. agentless
Credentialed vs. non-credentialed
Passive vs. active
Static vs. dymanic
Reverse engineering
Fuzzing
Operational technology (OT)
Industrial control systems (ICS)
Supervisory control and data acquisition (SCADA)
Security baseline scanning
Payment Card Industry Data Security Standard (PCI DSS)
Center for Internet Security (CIS) benchmarks
Open Web Application Security Project (OWASP)
International Organization for Standardization (ISO) 27000 series
Angry IP Scanner
Maltego
Burp Suite
Zed Attack Proxy (ZAP)
Arachni
Nikto
Nessus
OpenVAS
Immunity debugger
GNU debugger (GDB)
Nmap
Metasploit framework (MSF)
Recon-ng
Scout Suite
Prowler
Pacu
Common Vulnerability Scoring System (CVSS) Interpretation
Attack vectors
Attack complexity
Privileges required
User interaction
Scope
Impact
Confidentiality
Integrity
Availability
True/false positives
True/false negatives
Internal
External
Isolated
Exploitability/weaponization
Asset value
Zero-day
Cross-site scripting
Reflected
Persistent
Buffer overflow
Integer overflow
Heap overflow
Stack overflow
Data poisoning
Broken access control
Cryptographic failures
Injection flaws
Cross-site request forgery
Directory traversal
Insecure design
Security misconfiguration
End-of-life or outdated components
Identification and authentication failures
Server-side request forgery
Remote code execution
Privilege escalation
Local file inclusion (LFI)/remote file inclusion (RFI)
Compensating control
Managerial
Operational
Technical
Preventative
Detective
Responsive
Corrective
Testing
Implementation
Rollback
Validation
Maintenance windows
Exceptions
Accept
Transfer
Avoid
Mitigate
Policies, governance, and service level objectives (SLO)
Prioritization and escalation
Edge discovery
Passive discovery
Security controls testing
Penetration testing and adversary emulation
Bug bounty
Attack surface reduction
Input validation
Output encoding
Session management
Authentication
Data protection
Parameterized queries
Secure software development life cycle (SDLC)
Threat modeling