added 1 Flashcards

1
Q

What did the attacker attech in SingHealth’s IT network, and through what method

A

It attacked front end workstations, most likely through phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How did the attacker move about in the SingHealth Network after the initial attack

A

After laying formant for 4 months, he commenced lateral movement for 6 mnths in the network, compromising many endpoints and servers, including the Citrix servers located in Dad’s old hospital, WHICH WERE CONNECTED TO THE SCM database.
Along the was, he also compromised a large number of user and admin accounts, including domain admin accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How did the attacker gain access to the Citrix Servers

A

He used compromised user workstations in the SingHealth IT network and virtual machines to remotely connect to the SGH Citrix servers, and while he wasn’t successful at first, eventually he obtained credentials because the security admin team didn’t notice lol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of C language type fuck ups lead to the StageFright Bug

A

Integer Underflow and Overflow, Buffer Overread, Heap Overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the StageFright Bug

A

It was used to pre process certain media files before playing in the media library in android. However, it allowed an attacker to send specially crafted media file (via MMS) and execute arbitrary code remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is Quadrooter called “Quad”

A

It refers to 4 vulnerabilities (Quad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is Quadrooter called “Rooter”

A

Cos of bugs in qualcomm drivers for the chipsets (affecting 900mil android devices), and I say root because ANY ONE of the vulnerabilities can be exploited to gain root privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A small computer that’s covered with an eyeball, shiva deep in thought and meditating, and a piece of corn on the floor that looks sensational. Visualise it an explain pls

A

The quadrooter affected bugs in the qualcomm drivers.
IPC router that provides inter process communication between Qualcomm components
Ashmem: andoird kernel anonymous shared memory feature (shiva: we are all shared memory and are no one)
Kernel: graphics support layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

C you piece of shit. What C features were taken advantage of in QuadRooter

A

Race condition, Use After Free Bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I see, down the 100 meter, two large beetles with broken handcuffs still attached to their legs running. I see a broken quadcopter in the distance. Kindly say what the fuck Im looking at

A

Race condition, Use After Free Bugs. These were used in quadrooter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At android, say we’ve taken some lift or antman thing or whatever, now we’re at the application level. I’m trying to use a drink machine here but they keep saying I can’t. What do. And, hm, can it fuck me

A

Switch on the permission for it. At the application level, access control is defined by permissions. Don’t use the drink machine because vulnerabilities exist even assuming the layer below the cloud im on (LINUX) is secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At the kernel layer, as we birth a piece of new corn, what does the corn inherit (what does the kernel layer in android inherit)

A

the Linux security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is one thing (hint, bars dude, bars) that can take full control of an iOS based device

A

JailBreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Usually, to enter Big Apple Heaven with Steve Jobs, you’d need what

A

To download an app, you’d need code signature validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one thing (bars) that gets rid of code signature validation

A

JailBreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Charlie Miller, why do they call him the zero day man

A

he made instastock that used logic designed to exploit a 0 day vulnerability in iOS that allowed the app to load and execute unsigned code.

17
Q

Why was the zero day man the zero day man

A

After iOS 4.3, Apple introduced the abilkity for unsigned code to be executed under a very limited set of circumstances

18
Q

Hm, say Im feeling peckish and want to grab some Skype Data to eat. What do I do (sip coffee)

A

Embed Javascript code into the “Full Name” field of messages sent to users in Skype, therefore upon receipt of message, the JS was executed, attacker was then allowed to grab files like my contact database with like 5 people.
• This vulnerability is of particular interest because it is one of the first
examples of a third-party app vulnerability that could be exploited remotely, without requiring local network or physical access to a device.

19
Q

Six minutes, six minutes im on. What do the eminems on computer security say about physical access

A

Their Staff published paper in Feb2011 outlining the steps required to gain access to sensitive passwords stored on an iPhone.
• The process from end-to-end takes about six minutes! and involves using a boot-based jailbreak to take control of a device in order to gain access to the file system, followed by installation of an SSH server.
• Once access is gained via SSH, a script is uploaded that, using only values obtained from the device, can be executed in order to dump passwords
stored in the device’s keychain

20
Q

What happens when you stick a keychain in an apple

A

keychain is used to store passwrods for many important apps, such as the inbuilt email client.

21
Q

What happens when androids sleep (dont take this literally)

A

DroidDream family of malware was primarily
distributed by the Google Play store.
• Various legitimate applications from the Play store were repackaged
to include DroidDream and then put back in the Play store.
• Users downloaded this software believing it to be safe since it came
from a trusted source.
• An app repackaged to include DroidDream requires a large number of
dangerous permissions!

22
Q

I am the star in any room that i stand in

A

packaged in poppin apps, you barely noticin
once the victim installs the app im broadcasting
my intent to win i’ll activate on rebootin
and then i’ll send a message SMS to a hardcoded C&C number
With your IMEI number
It’s nicki.B i’ll gather everything you see

23
Q

It’s june 2009, you just saw iPhone firmware 1.1.3 prep

A

stop. you want doom adnd erica’s utilities on your phone.

24
Q

Dude it’s so annoying get Android updates

A

Critical security updates must pass through the entire

supply chain before they can be made available to end users.

25
Q

Okay okay okay, so the quadcopter (sorry, rooter), right, how does it affect

A

an attacker can exploit the vulnerabilities using a malicious app. Such an app would require no special persmissions to take advantage of these vulnerabilities

26
Q

If you got a drone and root privilege

A

You got screwed privilege

27
Q

I have a drone. What else do I have

A

complete control of devices and
• unrestricted access to sensitive personal and enterprise data on them.
• Attacker with capabilities such as keylogging, GPS tracking, and recording
video and audio.

28
Q

How to not get struck by a drone

A

Download and install the latest Android updates asap. and don’t fuckin root your device.

29
Q

What is the difference between a sidereal year and side loading android apps

A

the latter is downloading APK files, erm, not so great idea

30
Q

At the base of the myVillage escalator, somebody farts and I BYOC> what the fuck is happening

A

Don’t bring your own cloud at the expense of corporate control, it does present potential security risks

31
Q

When poor scared crying vulnerable drivers are pre installed at the point of manufacture (thanks, roomie), how can they be fixed (quadrooter)

A

Only by installing a patch from the distributor or carrier (QC, not really hmmm). As in Qualcomm doesn’t quality control smh.