3.1 Security Assessment Flashcards
(Methods)
Malware Sandboxing
practice of isolating real or potential malicious code into a safe and restricted environment
(Methods)
Memory Dumping
helps organization proactively discover and mitigate memory and application vulnerabilities by dumping software to the hard drive for offline analysis
(Methods)
Runtime Debugging
allows analysis of code while it is actively running in memory
(Methods)
Reconniasance
methodological process of determining specific details about a target as possible before attempting to hack it
(Methods)
Fingerprinting
process of determining specific details about a system, including port numbers, services, operating systems, vulnerabilities and accounts
(Methods)
Code Review
Proofreading of source code to discover and mitigate software vulnerabilities before they make it into the finished product
(Methods)
Social Engineering
manipulating or compromising people into revealing confidential information
- impersonation
- phishing
- spear phishing
- whaling
- reverse social engineering
- spam
(Methods)
Pivoting
process of compromising a host in order to use that host to compromise other hosts on a network
(Methods)
OSINT
- Open Source Intelligence
- the collection of valuable information from public sources
- Social Media
- Whois
(Methods)
Routing tables
record on a router that contain route and network destination information
(Methods)
DNS records
Provide important system identifiers to help clients translate system hostnames to IP addresses as well as reverse IP addresses to hostnames, and to help clients locate servers that provide services
(Methods)
Search Engines
provide easy access to information about a target
(Types)
Penetration Testing
simulating attacks on organizational targets in order to prepare organisations for malicious hackers
(Types)
Black Box Pen Testing
simulates black hat hackers by starting off pen testing without prior knowledge of the organizational network
(Types)
White box pen testing
simulates a malicious administrator who has complete knowledge of the network
(Types)
Grey box pen testing
simulates a malicious non-administrator who has partial knowledge of the network
(Types)
Vulnerability Assessment
employ various techniques to discover vulnerabilities but not exploit them
(Types)
Self-assessment
in-house vulnerability assessments done by local staff
(Types)
Tabletop exercises
brainstorming sessions conducted by security professionals and other stakeholders to discuss an upcoming security assessment
(Types)
Internal and External audits
- Internal audits local security staff audit the strengths and weaknesses of security controls
- External audits employ a third party to audit the strengths and weaknesses of security controls
(Types)
Color team exercises
pit offensive and defensive teams penetration testers to ensure complete security posture is assessed
(Types)
Red/blue/white teams
- Red teams simulate malicious attacks
- Blue teams respond to the res team attacks with analysis techniques
- White team referee the red and blue teams