Chapter 13 Cybersecurity Toolkit Flashcards
- Set of security mitigation capabilities bundled together to help prevent malware from exploiting vulnerabilities and other attacks
- Includes: Data execution prevention (DEP) and Address space layout randomization (ASLR)
Enhanced Mitigation Experience Toolkit (EMET)
Feature to prevent the execution of malware loaded into data space in memory
Data execution prevention (DEP)
Helps prevent buffer overflows attacks and others that rely on specific acknowledge of memory locations
Address Space Layout Randomization (ASLR)
Name the tools in the Windows Sysinternals Suite
- AccessEnum
- AutoRuns
- Process Explorer
- PsTools
- SDelete
- ShareEnum
- Sysmon
- ProcDump
- TCPView
- Enumerates the access on a system
- Provides a good view of who has permissions to files, directories, and other objects
- Part of Windows Sysinternals Suite
AccessEnum
- A utility that shows what programs start at login or system boot
- Part of Windows Sysinternals Suite
AutoRuns
- Tool that shows the files, DLLs, registry keys and other objects in use by each process
- Part of Windows Sysinternals Suite
Process Explorer
- Set of command line utilities with a broad range of functions, including process information and start/stop capabilities, event log dumping, password changes, and many others
- Part of Windows Sysinternals Suite
PsTools
- Secure file deletion utility
- Part of Windows Sysinternals Suite
SDelete
- Tool that analyzes shares and their permissions
- Part of Windows Sysinternals Suite
ShareEnum
- Often used for intrusion detection and forensic analysis for its ability to monitor processes and their activity in a searchable and easily viewable manner
- Part of Windows Sysinternals Suite
Sysmon
- Provides process dumping for memory and error analysis
- Part of Windows Sysinternals Suite
ProcDump
- Tool for stock at level visibility for analyzing network connected services
- Part of Windows Sysinternals Suite
TCPView
Standard for logging and is designed to allow logs to be created for an endpoint server, system, or device, and then be stored locally or sent to essential server or storage system
Syslog
SIEM tool designed to provide large-scale data collection and analysis capabilities for broad range of data types
Splunk
Provides SIEM functionality as well as asset discovery, vulnerability scanning and assessment, behavior (heuristic) analysis capabilities, and IDS capabilities
AlienVault’s Universal Security Manager (USM)
An open source SIEM that integrates a number of Open Source tools to provide security information and event capabilities
AlienVault offers OSSIM
A network graphing tool that runs on top of RRDtool (a data logging and graphing system) to allow recurring, time-based data collection and analysis
Cacti
A network monitoring tool that leverages SNMP to monitor traffic on network connections
Multi Router Traffic Grapher (MRTG)
Well-known and widely respected network vulnerability scanning product
Tenable Nessus
A vulnerability scanner that uses Software-as-a-Service (SaaS) management console to run scans using appliances located both in on premise datacenters and in the cloud
Qualys’s QualysGuard
Another commercial vulnerability scanner that offers similar capabilities to Nessus and QualysGuard
Rapid7’s Nexpose
An open source vulnerability scanner
open source OpenVAS
- Test for web specific vulnerabilities, such as SQL injections, cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities
- i.e. Nikto
Web application scanners
Tools designed to help with acquisition of passwords
- fgdump
- pwdump
- SAMdump2
Open source tool designed to crack passwords and hashes, including Linux, Windows, Kerberos and other frequently use password hashing methods
John the Ripper
Open source password cracking tool that relies on rainbow tables to quickly look up hashes to return their original value
Ophcrack
- Perform similar actions to their Network counterparts, seeking to identify and block potentially malicious network traffic
- Not used a lot in production
Host intrusion prevention systems (HIPS)
- Build a table of hash values for all files resident on a protected computer system and then monitors files for unexpected changes in those hash values
- ie Tripwire
- Mandated by PCI DSS
File Integrity Monitoring software
- Has replaced nslookup for Mac OS and Linux
- Provides a little more detail than nslookup
Dig
- Acts as a middleman between end-user systems and web servers
- All web requests are sent to the server rather than direct connection between web server and end user clients
Proxy servers
What are the benefits of using a proxy server over direct connections?
- Proxy servers provide an opportunity to perform content filtering
- Proxy servers may perform caching of frequently requested content - improve response time for users and decreases bandwidth consumption
The majority of servers implementing TLS and SSL do so by using what open source library?
OpenSSL
- Provide content and protocol-aware firewall and technical protections for web applications
- Can be used to provide protection against zero-day attacks that are not patched but have known attack profiles by building custom rules that address the exploit
Web application firewall
Name a couple of interception proxies
Burp Suite proxy
Zed attack proxy (ZAP)
Name some popular Fuzzer tools
- Peach fuzzer
- Untidy fuzzer
- Microsoft security development lifecycle (SDL) includes: MiniFuzz file fuzzer and the SDL Regex Fuzzer
The three major forensic image formats or what?
- RAW
- AFF
- E01
- Forensic image format
- Bit by bit copies of the original format. Metadata is sometimes acquired along with this image and stored separately
RAW
- Forensic image format
- An open extensible forensic format for disk images and metadata
AFF Advanced Forensic Format
- Forensic image format
- Commonly used for law enforcement investigations
ENCase file format
E01
What are some stand-alone imaging utilities available?
- dd
- OSFColone
- FTK Image
Guidance Software commercial forensic suite, provides a GUI driven full forensics week
EnCase
Complete commercial forensic suite provided by access data
FTK, the Forensic Toolkit
- Toolkit built using open-source tools and it’s based on Ubuntu Linux
- Popular forensic suite
SANS SIFT
- Command line based toolkit for image analysis and file recovery
- Popular forensic Suite
Sleuth Kit
GUI-based program that provides forensic image analysis capabilities
Autopsy
Pair of commercial forensic tools
Helix 3 Enterprise and Pro
Provides dedicated mobile forensic features designed to capture, analyze, and report on data from phones and other mobile devices
Cellebrite’s UFED