4.3 Flashcards
Vulnerability scanning, threat intelligence, penetration testing, analyzing vulnerabilities, vulnerability remediation
Dynamic analysis is AKA
Fuzzing
Fuzzing is AKA (4)
Fault-injecting
Robustness testing
Syntax testing
Negative testing
True/False
Utilizing fuzzers is very time and resource intensive
True
OSINT stands for
Open-Source Intelligence
Publicly available sources of threat intelligence
(ex. discussion groups, social media, security researcher websites, govt data, commercial data like maps, financial reports, and databases about projects and risks)
OSINT
4 sources of threat intelligence
OSINT
Proprietary/third-party intelligence
Information-sharing organization
Dark web intelligence
Organizations that compile threat information and allow you to purchase it.
Will include threat analytics across many different organizations, viewing the patterns of attacks.
Proprietary/third-party intelligence
Threat intelligence that comes from multiple organizations communicating with each other about their experiences, research, and developments. Members of this group can access the information.
Real-time, high-quality cyber threat information sharing.
Includes classified information and extensive resources.
Information-sharing organization
A threat intelligence source that is only available through specialized software. It comes from an overlay network that uses the Internet for transport, though it’s not accessible openly from the internet.
This includes groups of hackers discussing their tools and techniques, as well as online stores where hackers sell their stolen information.
It is good to monitor this in case your organization’s name pops up as a potential target.
Dark web intelligence
A form of vulnerability testing where an authorized individual simulates an attack against a network or device.
Pentesting
A pentesting document that defines:
The scope and purpose of the test
The schedule (what time, whether it’s onsite or online, internal/external)
Any rules (IP address ranges, emergency contacts, how to handle sensitive information, in-scope and out-of-scope devices/applications)
Rules of engagement
Techniques and strategies that enable continued access to a system after initial compromise
Ex. Backdoor, user account, change/verify default passwords
Persistence
The technique used by attackers to access other parts of the network that are not directly reachable from the attacker’s position via a compromised system (ex. Firewall).
This compromised system is used as a proxy or relay, used to be able to jump to other systems in the same segment.
Pivoting
A process that allows hackers to safely report found vulnerabilities to your team.
Responsible disclosure program
A reward offered for the discovery of vulnerabilities in a system
Bug bounty
A vulnerability defined by an automated vulnerability scanner that doesn’t really exist.
False positive