Chapter 5 Security Assessment and Testing Flashcards

1
Q

What factors determine scan frequency

A
organizations risk appetite (willingness to tolerate risk)
regulatory requirements (InfoSec is FIMSA, payment card is PCI DSS)
Tech constraints
Business constraints such as periods of high activity
Licensing constraints may curtail bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scan sensitivity

A

improve efficiency by disabling unnecessary plugins,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is credentialed scanning

A

credentialed scanning is a scan in which the scan computer has an account on the computer being scanned.

  • allows for more thorough check looking for problems that can’t be seen from the network
  • use principle of least privilege by providing scanner a read only account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is agent-based scanning

A

A scan in which admins install small software agents on target server to scan server configuration, providing an inside out vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Scan perspective

A

External scan run from network shows what an attacker would see
Internal scan run. from general corporate network provides view of what malicious insiders see

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scanner Maintenance

A

Scanners are vulnerable just like any other program, so ensure they are regularly updated and patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCAP (Security Content Automation Protocol)

A

Includes CVE and CVSS

others are CCE, CPE, XCCDF and OVAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Infrastructure Vulnerability Scanning

A

Tenable’s Nessus
Qualys’ (SaaS)
Rapid7 Nexpose
OpenVAS (open source)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Scanning - what is static testing vs dynamic testing vs interactive testing?

A

static testing analyzes code without executing it
dynamic testing executes code as part of the test
interactive testing combines the two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web app scanning

A

Tools like Nikto and Arachni test for web specific vulnerabilities like SQL injection, XSS, and XSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CVSS

A
AV - Attack Vector
AC - Attack Complexity
P - Privileges, scope calculation is included here
UI - User Interaction
C - Confidentiality
I - Integrity 
A - Availability
S - Scope (scored in Privilege)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patch Management

A

Patch management is a CORE PRACTICE of any InfoSec program
it is often neglected due to lack of resources for preventative maintenance. It is common to see out of date product versions of OS or apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Legacy Platforms

A

Software vendors eventually discontinue support of products. Continuing to run end of life systems is a significant security risk
Upgrade to a currently supported version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Weak Configurations

A

Weak Configuration includes:

  • Use of default settings and passwords
  • presence of unsecured accounts
  • open ports and services not necessary for operation
  • open permissions violating the principle of least privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Error Messages/Debug mode

A

Many apps support debug mode
can be useful to developers but can assist attackers in gaining info about the system

Developers should test only on dedicated systems and can use debug mode, but public facing systems do NOT need this capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insecure Protocols

A
Replace Telnet with SSH
Replace FTP with FTPS or SFTP
Replace HTTP with HTTPS
IMAP to IMAPS
LDAP TO LDAPS
POP to POPS
17
Q

When implementing encryption, you must choose:

A

the algorithm to use to encrypt and decrypt

the encryption key that will be used with the algorithm

18
Q

Penetration Testing - why do it?

A

Pen testing provides visibility into the organizations security posture that is not available through other means.

  • knowledge not otherwise abtainable
  • blueprint for remediation
  • essential information on specific attack targets
19
Q

What is the difference between pen testing and threat hunting?

A

Pen testing tells you how an attacker could potentially get into your environment, threat hunting tells you who is already in your environment and what they are doing

20
Q

Pen test types
what is white box vs black box?
what is gray box?

A

White box pen testing is performed with full knowledge of technology configuration and settings, it is more complete but may not provide accurate view of what attacker sees
black box test replicate what an attacker encounters
gray box tests are a blend that help focus time and resources while still being accurate

21
Q

Bug bounty

A

financial incentives for testers who report discovered vulnerabilities

22
Q

Rules of Engagement

A

ROEs set the parameters of the penetration test

  • Timeline of engagement
  • locations, systems, applications, etc.
  • data handling requirements
  • expected target behaviors
  • Resources committed to the test
  • Legan concerns
  • when or how communications will occur
  • permission (get out of jail free card) is essential in case pen testing goes bad
23
Q

Reconnaissance

A
Passive recon (OSINT)
Active recon (footprinting)

war driving/flying uses cars or drones with big antennas attempting to collect wireless communications

24
Q

Pen test key phases

A

Initial access
privilege escalation
pivoting or lateral movement
persistence (backdoors)

clean up close out all activities after test

25
Q

What is privilege escalation

A

shift from initial access to advanced privileges

26
Q

training exercises

A

Red team attacks
blue team defends/responds
white team observes and judges

purple teaming is the process of red and blue working together after exercise to learn from it