(3) Not allowed access, privileges and changes and data theft Flashcards

1
Q

In terms of most threats to systems, what is one of the key indicators of bad activity on a system or network?

A

In terms of most threats to systems, one of the key indicators of bad activity on a system or network is Data exfiltration, which is the unallowed removal of data from datastores or computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the tug of war between security practitioners and bad actors in the battle over data

A

In the battle over data, security practitioners need to use tools and techniques to find and stop the data from being stolen and bad actors normally try to hide data theft activities through:

encryption, commonly used channels like HTTPS, or using covert channels like tunneling DNS requests and other services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of tools should be involved in the battle to keep data from being stolen?

A

Data Loss Prevention (DLP), EDR and IPS play a role in preventing data from being stolen.

In addition, data tagging and other protection measures are useful too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of analysis tools can be used to detect, prevent, and mitigate unauthorized access, changes, and privilege use?

A

Tools such as Central management suite, SIM/SIEM, File Integrity checking tools, and log analysis tools are useful to detect unauthorized access, changes or privilege use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unauthorized privileges can be tough to track, especially if central management isn’t in place, but what can be used to help avoid this?

A

Sysinternals AccessChk can validate that users and groups have proper access to files, registry keys, etc.

Within Linux, as an aside, a script may be needed to accomplish this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a key target that attackers like to exploit to get and maintain access to a Windows system?

A

The Windows registry is a key location for attackers to get and maintain access to a Windows system, they especially like “run” keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the important “run” keys that attackers like to take advantage of?

A

The important “run” keys that attackers like to take advantage of include:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When it comes to protecting the Registry in Windows, what should be done to protect systems that have infrequent changes (such as servers)?

A

For systems that have infrequent changes like servers, protecting the registry is relatively easy through app allow lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to protecting the Registry in Windows, what should be done to protect systems when registry monitoring tools cannot be implemented?

A

When registry monitoring tools cannot be implemented, a lockdown tool can be used to stop all registry changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When it comes to protecting the Registry in Windows, what should be done to protect systems when registry changes are allowed?

A

When registry changes are allowed, registry monitoring tools should be shut off or set to a mode that allows changes when patching Windows and then they should be turned back on for daily operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When it comes to protecting the Registry in Windows, what should be done to protect systems when changes can be made more frequently?

A

When changes may be made more frequently, in depth control choices should be put in place such as an agent based tool to prevent false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do we need to be aware of when it comes to scheduled tasks?

A

When it comes to scheduled tasks, attackers love to use those to get persistent access to systems. Checking for scheduled tasks is a normal part of incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can one check for scheduled tasks in Windows 10?

A

In Windows 10, one can check for scheduled tasks by going to Start, Windows Administrative Tools, Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can one check for scheduled tasks in Windows 11?

A

In Windows 11, one can check for scheduled tasks by going to Start, Windows Tools, Task Scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does one check for scheduled tasks in Linux?

A

In Linux, one can check for scheduled tasks by checking chron

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can one check the chrontab itself within Linux?

A

One can check the chrontab itself in Linux by using cat /etc/crontab but you can also check /etc/cron for anything stashed there

17
Q

How does one list crontabs in Linux?

A

One lists crontabs in Linux by inputting crontab -l in a terminal

also, using the -u root flag in crontab list command will show you the jobs running as root or equivalent users