Ch 2,3 - Assessment Workflow... & Vulnerabilities... Flashcards
4 steps for Network Security Assessment Methodology
Reconnaissance to identify networks, hosts, and users of interest
Vulnerability scanning to identify potentially exploitable conditions
Investigation of vulnerabilities and further probing by hand
The exploitation of vulnerabilities and circumvention of security mechanisms
ZDI
Zero Day Initiative
SCADA
Supervisory Control And Data Acquisition
Attack Surfaces
This surface often encompasses
server applications, client endpoints, users, communication channels, and infrastructure.
Taxonomy of Software Security Errors
- Input Validation
- API abuse
- Security features (low level)
- Time & State
- Errors
- Code quality
- Encapsulation
- Environment
Adversarial Goals
- Data extraction/manipulation
- Elevation of privilliges
- Arbitrary code execution
- Denial of Service
Level of System Access
- Remote
- Close proximity
- Direct
Secrets stored in volatile memory
Private keys, credentials, session tokens, other cryptographic materials
DEP
Data Execution Prevention
ROP
Return Oriented Programming
ASLR
Address Space Layout Randomization
Logic Flaws
- Inference of login info
- Session management issues
- Command Injection
- Encapsulation bugs
Common cryptographic functions
- Pseudorandom number generators (PRNGs)
- Protocols providing transport layer security (such as TLS and IPsec)
- Encryption of data-at-rest
- Signing of data to provide integrity checking (e.g., HMAC calculation)
Attacks against Cryptosystems
- Collisions
- Modification of ciphertext
- Replay of ciphertext
- Side channel attack