Book 1 Flashcards

1
Q

6 Steps, Incident Handling

A

Preparation (in steady-state bounce between this and identification), Identification (in steady-state bounce between this and preparation, Declare Incident (move to containment)), Containment (Start cleanup (move to eradication)), Eradication (Finish cleanup (move to recovery)), Recovery (Back in production (move to lessons learned)), Lessons Learned (Done (jump back to another step if necessary))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unusual Log Entries

A

System Admins should periodically review their system logs, looking for signs of unusual behavior.

Look for:

  • That an interface has entered promiscuous mode.
  • That someone has repeatedly tried unsuccessfully to log into the machine via telnet or sshd.
  • Remote Procedure Calls (RPC programs) being accessed with strange sequences of characters, which are possibly buffer overflows or format string attacks.
  • Large number of Apache error messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remote Procedure Call

A

Remote Procedure Calls (RPC programs) being accessed with strange sequences of characters, which are possibly buffer overflows or format string attacks.

(-^PM-^PM-^PM-^PM-^PM-^PM-^PM-^PM-^PM-^PM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

7 Deadly Sins

A
  • Failure to report or ask or help
  • Incomplete/non-existing notes
  • Mishandling/destroying evidence
  • Failure to create working images
  • Failure to contain or eradicate
  • Failure to prevent follow-on compromise months later
  • Failure to apply lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Absolute and Relative Referencing

A

$ cd /etc/sysconfig/network-scripts (is an absolute reference);

$ cd sysconfig/network-scripts (is relative, and only works from the /etc folder)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Account Management

A

look for new unexpected accounts:

GUI “C:> lusermgr.msc”,

Command line “C:> net user” search groups

command line “C:> net localgroup administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adding Directories to PATH

A

To add directories to your path.
Temporarily PATH:
$ PATH=$PATH: [another_dir]

To change your path permanently for this account, you must edit the .bash_profile file:
$ PATH=$PATH:[new_directory];

$ PATH=$PATH:/home/tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Analysis of Perimeter and Host Perimeter Detects

A

When you determine a listening port, you should look up the port to see its official assignment, as well as potential malicious use of that port.

How can you find out if the service is running?

Try “lsof -i” on unix and also “netstat -a” on unix or windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application-Level Detection (Incident Identification)

A

Application logs can be reviewed by incident handlers at this level (web app, appserver, cloud service, etc..)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Perimeter Detection

A
  • Identification occurs on network

- Firewall, routers, external-facing network-based IDS, IPS, DMZ systems etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host Perimeter Detection

A
  • Identification occurs when data enters or leaves a host

- Personal firewall/IPS, local firewalls, port sentry tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System-level (i.e., host) detection

A
  • Identification occurs based on activity on the host itself

- Anti-virus tools, endpoint security suites, file integrity tools, user noticing “strange” behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application-level detection

A
  • Application logs (web app, app server, cloud services, etc. Checking logs important.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Applying Cheat Sheets

A

Need a communications plan, print one out for each sys admin, distribute to ops management, weekly/monthly sys admin meeting, periodic conference calls, serperate calls for windows and linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applying Network Config Changes

A
To make your changes happen, you have to restart the interface. 
# service network restart
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Arrest/False Arrest

A

Legal process to deprive an individual of his/her freedom

17
Q

Artifact Discovery with Open Indicators of Compromise (IOC)

A

Mandiant provides a series of IOC files, each one defining the artifacts associated with items a particular attack or threat would leave behind on a computer

18
Q

Assessment Questions (Part 1)

A

how skilled is the attacker, what skill level is need to explit vuln, how large is the affect across the org, what is the value of the vuln sys, can vuln be exploited remotely, zero day easy to get exploit, is fix available, is there any other factors that reduce on increase potential impact? Lenny Zeltser’s Incident Questionnaire

19
Q

Assessment Questions (Part 2)

A

When looking at the situation, you need to determine how much damage could be caused: - How widely deployed is the affected platform or application? - Effect of the vulnerability exploitation? - Value of impacted systems, value of data on those systems? - Can the vulnerability be exploited remotely? Is a public exploit available, was one recently released?
Also ask yourself: What level of skill and prerequisites are required by an attacker to exploit vulnerability? - Is vulnerability present in a default configuration? - Is a fix available for the vulnerability? Do other factors exist which reduce or increase the vulnerability’s risk or potential impact such as the possibility it is a worm?