(7) Vulnerabilities, Overflows, Escalation Flashcards

1
Q

Describe security patches, what should security analysts be aware of?

A

Security patches need to be a very high priority in any security program. Be sure to install security patches as soon as you can verify that it won’t disrupt operations on other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a buffer overflow attack?

A

A buffer overflow attack happens when an attacker manipulates a program into putting more data into memory than that program should reasonably use. The goal is to overwrite information in memory with instructions that may be acted on by a different process running on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an integer overflow?

A

An integer overflow is a type of buffer overflow where the result of a mathematic operation tries to put an integer in place that is too big to fit in the specified buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of memory do buffer overflows target?

A

Buffer overflows could target two types of memory.

Stack overflows go after the stack, which stores variable values and is managed by the OS

Heap overflows target the heap, which puts objects created by code and must be handled by application developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a rootkit?

A

A rootkit is a hacking tool that is used to automate privilege escalation attacks. A rootkit is normally used to exploit a vulnerability and perform a privilege escalation attack, trying to gain admin rights on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a code execution vulnerability?

A

Code execution vulnerabilities allow an attacker to run software of their choice on the target computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is remote code execution?

A

Remote code execution is a very dangerous vulnerability where the attacker can take advantage of a vulnerability over a network connection without physical or logical access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should system admins do about debug mode?

A

System admins should make sure that debug mode is turned off or severely limited on all systems to avoid giving out information to hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do security admins need to remember about SSL/TLS

A

SSL is outdated and should not be used as it is not secure, TLS Should be used instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do the SSL and TLS protocols describe?

A

SSL And TLS protocols describe how cryptographic ciphers can be used in secure network communications.

They allow admins to designate the cryptographic ciphers that can be put in place with those protocols on a system by system basis.

They exchange a list of ciphers that each system supports and agree on the best one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do SSL And TLS rely on?

A

SSL and TLS rely on the use of digital certificates to check the identity of servers and provide cryptographic keys between each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What certificate errors can vulnerability scanners find?

A

Common certificate errors might include:

Mismatch between the Name on the certificate and the name of the server (serious error because it could involve the use of a certificate taken from a different site. Sort of a “fake ID” exploit.)

Expiration of the digital certificate

Unknown certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe what happens with Internal IP Disclosure

A

Internal IP disclosure happens when a server is not properly configured to conceal its internal IP address. If Network Address Translation is being used, then server will indeed have its own public IP to use to connect to the greater Internet, but the internal IP needs to be kept a secret by not allowing the server to include its private IP address in an HTTP request header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly