Blueprint Flashcards
CVSS Attack Vector
Attacker proximity.
Local, Adjacent, Network, Physical
CVSS Attack Complexity
Special skill needed or not
CVSS Privileges required
Permissions attacker needs (None, Low, High)
CVSS User Interaction
Whether user must participate for attack to succeed
CVSS Scope
Ability to go beyond authorization of vulnerability to other parts.
CVSS Rating Scale
0.0 None .1-3.9 Low 4-6.0 Medium 7-8.9 High 9-10 Critical
CVSS Temporal Score
Time based - Vulnerability
CVSS Enviro score
Environmental specifics
FAT32 Max Size
2TB
NTFS supports
Disk Quota
Security & Encryption
Permissions
ADS
Alternative Data Streams
Files stored as attributes. $DATA.
Can hide malicious code
MACE
Modify, Access, Create, Entry modified attributes of NTFS
Entry modified in MFT
EFI (Extensible Firmware Interface)
When computer boots, EFI loads files store on the ESP to start OS and utilities.
ESP (part of EFI)
Needs to be formatted with a FAT file system. (Maintained by UEFI)
Timestamps on a filesystem
Time event is recorded on a computer (not the time of the event itself).
EXT4
Journaling file system for Linux
Journaling
Changes to file system recorded in a log
MBR
Partition list and boot loader
MAC (Message authentication code)
Confirms authenticity of a message (Integrity and authenticity)
(Could be talking about Mandatory access control. not clear)
Best evidence
Best available evidence
Corroborative evidence
Evidence that supports an assertion
Indirect evidence (Circumstantial)
Inference required to support conclusion
Altered disk image
Image with compromised integrity
Unaltered disk image
Image not tampered with and will provide same hash