3.1 Security Assessment Flashcards
(Methods)
Malware Sandboxing
practice of isolating real or potential malicious code into a safe and restricted environment
(Methods)
Memory Dumping
helps organization proactively discover and mitigate memory and application vulnerabilities by dumping software to the hard drive for offline analysis
(Methods)
Runtime Debugging
allows analysis of code while it is actively running in memory
(Methods)
Reconniasance
methodological process of determining specific details about a target as possible before attempting to hack it
(Methods)
Fingerprinting
process of determining specific details about a system, including port numbers, services, operating systems, vulnerabilities and accounts
(Methods)
Code Review
Proofreading of source code to discover and mitigate software vulnerabilities before they make it into the finished product
(Methods)
Social Engineering
manipulating or compromising people into revealing confidential information
- impersonation
- phishing
- spear phishing
- whaling
- reverse social engineering
- spam
(Methods)
Pivoting
process of compromising a host in order to use that host to compromise other hosts on a network
(Methods)
OSINT
- Open Source Intelligence
- the collection of valuable information from public sources
- Social Media
- Whois
(Methods)
Routing tables
record on a router that contain route and network destination information
(Methods)
DNS records
Provide important system identifiers to help clients translate system hostnames to IP addresses as well as reverse IP addresses to hostnames, and to help clients locate servers that provide services
(Methods)
Search Engines
provide easy access to information about a target
(Types)
Penetration Testing
simulating attacks on organizational targets in order to prepare organisations for malicious hackers
(Types)
Black Box Pen Testing
simulates black hat hackers by starting off pen testing without prior knowledge of the organizational network
(Types)
White box pen testing
simulates a malicious administrator who has complete knowledge of the network