CompTIA Security+ Flashcards

1
Q

Each piece of Malware has 2 steps

A

Propagation and Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the propagation method of a Virus?

A

Spreads by human action. User education can prevent this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the propagation method of a worm?

A

Spread by themselves. Best way to defend is to update and patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the propagation method of a Trojan horse?

A

Disguise themselves as good programs. Act as advertised when run. Deliver a payload behind the scenes. App control provides a good defence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a RAT?

A

A remote access trojan. It allows attackers to control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the kinds of payloads that can be delivered?

A

Adware, Spyware, Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the characteristics and mechanisms of Adware?

A

Malware that displays advertisements.

  • Changing the default search engine
  • Displays pop up advertisements
  • Replacing legitimate ads with other ads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the characteristics and mechanisms of Spyware?

A

Gathers information without the user knowing.

  • Logging keystrokes
  • Monitoring Web Browsing
  • Searches hard drives and cloud storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristics and ways to prevent Ransomware?

A

Blocks access until the ransom is paid

  • Anti Malware Software
  • Security patches
  • User Education
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of malicious code are there?

A

Backdoors, Logic bomb, Advanced Malware, Rootkits (User Mode and Kernal mode), Polymorphic viruses, Armoured Viruses, Botnets, Advanced persistent threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are advanced persistent threats?

A

Well funded, highly skilled groups that are typically government sponsored. They have access to zero days and sophisticated weapons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ethical disclosure

A

Disclosing to the vendor when you have discovered a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How would you differentiate between adversaries?

A

Internal and External attackers, Level of sophistication, access to resources, motivation, intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of hackers are there?

A

Script Kiddies, Hactivists, organised crime, competitors, Nation states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to you prevent against insider threats?

A

Implement HR practices: Background checks, principal of least privilege, Separation of duties, Mandatory holidays.
Behavioural indicatiors: Taking work materials home, interest in issues outside of responsibility, duplication of materials, strange network access patterns, using personal hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a denial of service attack?

A

Making a resource unavailable for long periods of time, sends huge numbers of requests to a server, hard to distinguish between legit requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the limitations of DOS attacks?

A

Require a substantial amount of bandwidth, easy to block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a DDOS attack?

A

Distribution denial of service (DDOS) is a DOS attack that leverages a botnet to overwhelm a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a smurf attack?

A

Where the attacker sends echo requests to the broadcast address of a 3rd party server using a fake source address. The fake address is actually the real IP of the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is am amplified DDOS attack?

A

The attacker choses requests that have very large responses so they can send in lots of very small requests and generate a lot of noise on the other side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the amplification factor?

A

The degree to which the attack increases in size - Reply/Request=Amplification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an eavesdropping attack?

A

There is where the attacker relies on a compromised communications path (which is done with Network device tapping, ARP poisoning or DNS poisoning) to listen in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a man in the middle attack?

A

The attacker tricks the system during the initial communication using DNS or ARP poisoning to force the user to connect directly with the attacker, then the legitimate server. The user however connects with a fake server and the attacker acts as the relay. MITM browser attacks exploit flaws in browsers and plugins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a replay attack?

A

Uses previously captured data such as encrypted authentication tokens to create a separate connection to the server which is authenticated but doesn’t involve the end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How do you prevent eavesdropping attacks?
Use tokens and timestamps
26
What is a Christmas tree attack?
Where all the flags in a network packets headers are set to 1111111- some systems crash and cant handle the fact that all flags have been set
27
Domain name service (DNS)
A service that translates common domain name into an IP Address for the purpose of network routing
28
What is DNS poisoning?
Disrupting normal DNS operations by providing false results. Attacker inserts incorrect DNS records at any point along the hierarchy. They can then redirect traffic to the attackers system. The attackers system includes a web server designed to closely resemble the legit server.
29
Address resolution protocol (ARP)
A protocol that translates logical IP addresses into the hardware MAC address on LANs
30
What is ARP poisoning?
Disrupting normal ARP operations by providing false results. Attacker inserts false ARP records so they can redirect traffic back to their server. Only works on LANs
31
What is TypoSquatting (URL Hijacking)?
An attack that relies on people making simple typing mistakes. Consists of registering similar domain names in hopes that the user will make a typo.
32
What is a MAC spoofing attack?
It alters hardware addresses. Anyone with Admin access to a system can change its MAC address
33
What is an IP spoofing attack?
Alters the IP address. Anyone with system admin privileges can alter an IP address.
34
Ingress filtering
Blocks incoming traffic from external networks bearing an internal source IP address.
35
Egress filtering
Blocks outbound traffic from internal network bearing a source IP address you don't control.
36
/etc/password: Removed passwords
Can remove publicly accessible EXE > Passwords are stored in shadow files. They can be locked down and are highly restricted.
37
Hash function
- Must produce a completely different output for each input - Must be computationally difficult to retrieve the input from the output - Must be computationally difficult to find 2 different inputs that generate the same output.
38
The Birthday problem
An occurrence where the collisions become rather common with large samples.
39
Brute force attacks
Attacker guesses all possibilities for the password and keeps battering the system.
40
Dictionary attacks
Try all English words first
41
Hybrid password attacks
Adds variations to the tries EG: Year, Day, Season etc
42
Rainbow table attacks
Precomputes hashes to try and crack the password
43
Brute force cryptographic attacks
Attacker separately guesses the keys that are being used. Also known as Ciphertext attacks.
44
Simple shift cipher
With a shift of 1, A's become B's, B's become C's etc.
45
What is a keyspace?
The set of all possible encryption keys usable with an algorithm. EG: 56 bit DES = 72 quadrillion keys Flawed algorithms may still be susceptible to brute force attacks.
46
Frequency analysis
Detects patterns in Cypher text - studies the patterns of letters in cypher text.
47
Known Plaintext attack
Attacker has access to an unencrypted message
48
Chosen Plaintext attack
Attacker can create an encrypted message of his/her choice.
49
Downgrade attack
Attacker forces 2 systems to use weak cryptographic implementations.
50
Watering hole attacks
Websites spread malware effectively. - Users trust websites they frequently visit - Browsers and addons have vulnerabilities - Users are conditioned to just click "OK" Limits: - Attackers can't just build their own websites - Why would users visit the attackers sites - Content filtering can block known malware sites How a watering hole attack works: 1) Identify and compromise a highly used site 2) Chose a client exploit and bundle in a botnet 3) Place the malware on the compromised site 4) Sit back and wait for infected systems to phone home.
51
Wireless networking
Governed by IEEE 802.11 standard. Uses plaintext service set identifies (SSID) Uses beaconing to advertise to other devices.
52
Security concerns over wireless networking
Wireless networking uses radio signals that anyone can pluck out of the air
53
Wireless encryption
Protects confidentiality of communication. Prevents eavesdropping. Allows use of insecure transmission methods.
54
Wi-Fi encryption options
1) Use no Encryption 2) Wired equivalent privacy (WEP) - uses a static key 3) Wi-Fi protected access (WPA) - Uses temportal jet integrity protocol (TKIP) 4) WPA2 uses advanced encryption standard (AES) via CCMP WEP attacks depend on capturing initialisation vectors (IVs)
55
Is WPA Secure?
- Known attacks allow injection of packets and some limited decryption - These attacks work against TKIP principals - Play it safe and use WPA2
56
Wi-Fi protected Setup (WPS)
- WPS allows quick set up of devices - 2 methods for establishing connections: - Pressing the button on devices - Use 8 WPS pin
57
WPS attacks
Flaws in WPS make it trivial to guess the pin. Though there are 10,000,000 possibilities, a flaw requires only 11000 guesses. Got the pin? You can now get WEP/WPA/WPA2 key Pin can't be changed.
58
Jamming and interface attacks
- Denial of service attacks are easy on wireless - The radio spectrum is open, but in a limited account - The loudest signal always wins, so it doesn't take much to interfere with signals.
59
War driving attacks
Attackers cruise neighbourhoods and commercial areas, using tools that capture Wi-Fi networks.
60
Rogue access points
Can bypass other wireless authentication methods.
61
Rogue access points detection
Enterprise grade wireless has built in intrusion detection capabilities. Unknown radios on the network can be identified. Handheld tools can pinpoint these.
62
Evil twins
Easy victims: Linksys, Homes
63
Karma Toolkit
- Automates the evil twin process - Searches for adjacent networks - Creates a matching fake network - Redirects traffic to phony sites and captures credentials
64
DE Authentication frame
Immediately disconnects clients Source: Wireless AP Destination: Laptop Process Deauthenticate
65
Dissassociation attack goals
- Gather authentication information for cryptographic attacks - Conduct denial of service attacks on wireless networks
66
Near field communications (NFC) attacks
It is used for very short range links between devices (30-50 feet). Most common attack is on bluetooth
67
What is Bluejacking?
- An attacker sends bluetooth spam to users devices - The attacker tries to entice the user into taking some action - This is essentially Bluetooth spam and phishing
68
What is Bluesnarfing?
Attacker exploits firmware flaw in older bluetooth devices. Attacker forces pairing between devices. The connection grants access to the device.
69
NFC Security
Turn off discoverable mode when not in use. Apply firmware updates Watch out for suspicious activity
70
Security concerns
Business wants strong authentication and encryption to protect to protect the integrity of the RFID system. Consumers want privacy safeguards to protect their personal info.
71
Application Security hardening
Use proper authentication Encrypt sensitive data Validate user input Avoid and remediate known issues
72
Application configuration
- Type and scope of encryption - Users with access to the application - Access granted to authorised users - Security of underlying infrastructure Configurnig baselines allows quick identification and remediation of security gaps
73
How to prevent against SQL injection attacks?
Validate all user input
74
Other injection attacks
LDAP injection XML injection Command injection (Arbitrary code execution)
75
Cross site scripting (XSS)
This attack occurs when an attacker embeds malicious scripts into 3rd party websites that are later run by visitors to that site.
76
Imbedding scripts into a website
the tag allows devs to embed code into a page EG: Alert (“This site is under construction”) ;
77
Cross site request forgery (CSRF, XSRF and "Sea Surf")
XSRF attacks leverage the fact that users are often logged into multiple sites at the same time and use one site to trick the browser into sending malicious requests to another site without the user knowing.
78
Defending against XSRF
Re-architect web applications Prevent the use of HTTP GET requests Advise users to log out of sites Automatically log out users after an idle period
79
What is clickjacking?
An attack where the attacker hides elements of a web page behind other elements so that a user cannot see what he or she is actually clicking.
80
What is cursorjacking?
A specialised form of clickjacking that tricks the user about the cursors location on the screen
81
Defending against Directory Traversal attacks
- Use input validation to prevent the inclusion of periods in user requests - Implement strict file access controls to limit the web servers ability to read files
82
Buffer overflow attacks
Occurs when develops dont put limits of what can be selected in a field within a web application. An attacker could enter a number with 10000000 digits in which is far beyond the limits of a web server and could cause it to show sensitive information.
83
What are cookies?
Small pieces of content that can track users between sites. They are essentially data stored by websites in browsers. They are useful to recognise users. They are used to remember information.
84
Privacy risks with using cookies
Cookies can be used across different websites. Can track user activity If you log into a site, everything is de-anonymised.
85
Session hijacking
Cookie values are weak if guessable. We can figure out users authentication cookies by looking at trends and similarities between cookies. Once you have worked out the authentication cookie, you can login to the account using header manipulation - You can change the JSESSIONID to include the authentication cookie at the end.
86
What are add-ons?
Also known as extensions Add new functionality to browsers and other software Are written and developed by 3rd parties
87
Security risks with Add ons
You may not know who wrote the code Trojans may perform malicious secondary activity Permissions may be overly broad
88
What are code execution attacks?
They occur when an attacker exploits a vulnerability in a system that allows the attacker to run commands on that system EG: A public facing web server must open port 80 and 443 to work, which could open the opportunity for attackers to exploit vulnerabilities in unpatched servers
89
Arbitrary code execution
Code execution attacks where the attacker runs commands of his/her choice.
90
Remote code execution
Code execution attacks that take place over a network connection
91
Code execution objectives
- Install malicious code - Join a system to a botnet - Steal sensitive information - Create accounts for later access
92
Defending against code execution attacks
Limit admin access | Patch systems and applications
93
What is a device driver
Serves as the software interface between hardware devices and the operating system Device drivers require low level access to the operating system
94
What is refactoring a device driver?
Modifying a driver to carry out malicious activities | This requires access to the drivers source code
95
What is shimming a Device driver?
Wrapping a legitimate driver with a malicious shim | Does not require access to the source code of the driver.
96
How to protect against malicious drivers?
Code signing protects against malicious drivers
97
What is error handling in code?
Avoids unpredictable states by providing the computer with explicit instructions if something unpredictable were to happen
98
Social engineering
Use psychological tricks to manipulate people into divulging information or performing an action that undermines security
99
Main reasons social engineering attacks are successful
1) Authority - People defer to authority 2) Intimidation - Scaring people into doing what you want 3) Consensus - The herd mentality 4) Scarcity - Getting the last one 5) Urgency - Time is running out 6) Familiarity - We say yes to people we like
100
What is Spam?
Unsolicited commercial Emails
101
What is phishing?
Targeting users to steal credentials
102
What is Spear phishing?
a Very targeted Phish
103
What is Whaling?
Targeting executives with phishing emails
104
What is Pharming?
Using Fake websites and going to great lengths to make it look legitimate
105
Which is Vishing?
Voice Phishing
106
What is Spim?
Instant Messaging spam
107
What is spoofing?
Faking an identity
108
Shoulder surfing
Attacker simply looks over the shoulder of the victim
109
Trash
Social engineers love going through peoples trash to see what they can find
110
Tailgating
This can be as simple as holding doors open to let attackers gain access to areas
111
Vulnerability assessment tools
- Passive tools - Obscure activity - Active tools - Interact with machines
112
Honeypots
Attractive decoy machines put in by administrators
113
Honeynets
Decoy networks, similar to honeypots
114
Protocol analysers
Peek into network traffic (EG: wireshark)
115
Scanning for vulnerabilities
1. Port Scanners 2. Vulnerability scanners 3. Application scanners