Cybersäkerhet Flashcards

1
Q

What are the seven phases in the cyber kill chain?

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control
  7. Action on Objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reconnaissance

A

Identify and select a target. Often includes both OSINT and network
scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weaponization

A

Preparation of the attack payload. Create or get a tool for the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delivery

A

Find a way to deliver the payload to the target. This can be done through phishing and drive-by download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploitation

A

Trigger the payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Installation

A

Installation of a backdoor or Remote access trojan to maintain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command and Control

A

Establish infrastructure to enable C2 access to the compromised host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Actions on objectives

A

You have access to your target device and can now fulfill your goal. Ransom and data exfiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information gathering

A

Gather information from open sources (OSINT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enumeration

A

Scan the target to get more information about its technical properties:
* Look for open ports.
* Trying to figure out what software targets are running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploitation

A

About finding and using vulnerabilities. You try to access the systems, which often involves using or building exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privilege Escalation

A

Expanding your access to the system.

  • Horizontal: You gain access to another account with similar permissions.
  • Vertical: You gain access to accounts with other different permissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Post-exploitation

A

When an attacker would realize their attack objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Black-box pentest

A

When the pentester have no knowledge about the attack target.

  • Most similar to a real attack
  • Able to capture ” reconnaissance” aspects of an attack
  • Often time-consuming, and expensive
  • Since the pentester is unaware of how the target works, attack
    surfaces may be missed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Grey-box pentest

A

Pentester has some knowledge about the attack target.

  • Can speed up the test and therefore limit costs
  • Can target certain aspects of the test target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

White-box pentest

A

Pentester has access to full knowledge about the target’s inner workings.

  • Typically used for detailed testing of the functionality of the target
    and expected behavior
  • Allows for the entire attack surface to be evaluated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disclosure ethics

A

To maximize both interest, it is typical to work under a responsible
disclosure policy comprising the following steps

  • Discovery of a vulnerability
  • Report the vulnerability to the concerned vendor or organization
  • Verification of the vulnerability by the recipient
  • Remediation of the vulnerability by the vendor
  • Disclosure of the vulnerability once the fix is ready
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Shodan?

A

Online tool for searching for devices connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MAPE-K

A
  • Monitor
  • Analyze
  • Plan
  • Execute
20
Q

What are the two broad methods for data analysis?

A
  • Misuse detection
  • Anomaly detection
21
Q

Misuse Detection

A

Will match signature of bad, and report when a hit is found.

  • It’s cheap and easy to implement.
  • Has a hard time identifying new events.
22
Q

Anomaly detection

A

About finding deviations from normal system operations.

  • Anomaly detection relies on models (often statistical) that define
    normal and anomalous behavior
  • Events will be given a score that reflect how normal they are
23
Q

False positive

A

Alert is raised for benign event

24
Q

False negative

A

Alert is not raised for malicious event

25
Q

True positive

A

Alert is raised for malicious event

26
Q

True negative

A

Alert is not raised for benign event

27
Q

What are the incident response phases?

A
  • Establishing capabilities
  • Handling
  • Post-incident activities
28
Q

Establishing capabilities

A

How to act when an incident happens. Develop a policy that outlines the rules for incident response work. And have resources available when something happens.

  • What an incident is.
  • CSIRST contact list
  • Contingency plan
  • Communication plan
  • Resources that the CSIRT can use and allocate
29
Q

Handling

A
  • Analysis: Investigate the incident
  • Mitigation: Containing the incident
  • Communication: Legal and compliance, warn others, and maintain trust.
30
Q

Post-incident activities

A

Return to normal operation

  • Measure the performance of the incident handling and learn from that
  • Legal aftermath
  • Communication
  • Possible long-term business impacts
31
Q

What is a honeypot?

A

A system or set of systems offered as bait to attackers

32
Q

Playbook

A

A document which outlines the steps for handling a specific type of incident

33
Q

Contingency plan

A

A document that outlines the what’s, how’s, and who’s of an incident response in general.

34
Q

Someone working in a SOC with analysis of threats and incidents is called a?

A

Security analyst

35
Q

What is Snort?

A

An IDPS

36
Q

What is a technique used by malware to avoid detection?

A
  • Encryption
  • Polymorphism or Metamorphism
  • Memory-resident (file-less)
37
Q

What is a reason why memory analysis can be powerful?

A

The data is in its true and recent form of data.

38
Q

What is in metadata?

A

Time stamps and permissions

39
Q

Dictionary Attack

A

A password-cracking attack where you collect a list of words and try them one by one

40
Q

What is cyber-dependent crime?

A

A crime that depends on cyber for its execution

41
Q

What is cyber-enabled crime?

A

A traditional crime that utilizes cyber

42
Q

What tool is used to prohibit a computer from writing anything to a disk?

A

Write blocker

43
Q

What is SPLUNK?

A

A SIEM

44
Q

What is a tool for exploiting vulnerable systems?

A

Metasploit

45
Q

Rules of Engagement

A
  • Explicit permission to perform the test
  • The scope of the test (machines and systems)
  • Rules, such as permitted or forbidden techniques or what the pentester
    should do upon upon certain discoveries