Cybersec Flashcards

1
Q

Info gathering; OSINT

A

OSINT: Open Source Intelligence

Gather information from open sources (Google, job adverts, social media etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumeration

A

Scanning a target to know more about technical properties (Scanning IP range for responding hosts, Look for open ports etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploitation

A

-Try to get access to systems
-Often involves using or building exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Priv Esc - Horizontal - Vertical

A

Privilege Escalation - expanding system access

Horizontal - you gain access to another account with similar permissions

Vertical - gain access to accounts with different permissions (often higher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Post-explotation

A

When a true attacker realise their attack objective

Evaluate if you can use your access to target other hosts (pivoting)
Any additional information we can gather
Cover tracks
Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black-box

A

Pentester have no knowledge about the attack target

Similar to real attack
Able to capture “reconnaissance” aspects of an attack
Time-consuming and expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grey-box

A

Pentester have some knowledge about the attack target

Performed as an attack from the outside, but some knowledge given to the Pentester

Speeds up the test, cheaper

Can target certain aspects of the test target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

White-box

A

Pentester have access to full knowledge such as internal documentation

Used for detailed testing

Allows for the entire attack surface to be evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the 3 Hacker hats

A
  • A white-hat is someone who use their skills for good and stay within the law
  • A gray-hat typically use their skill for their perception of good. They do not follow laws or ethical standards if that conflicts with their objectives
  • A black-hat is a criminal who seek some kind of gain, typically at the expense of others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pentest - ROE

A

Rules of engagement

  • Permission to perform the test
  • Scope of the test (machine, system)
  • Rules (permitted or forbidden techniques or what the Pentester should do upon certain discoveries)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack tree

A

You model all possible ways to compromise a target

Allows you to create a map to try all possible attacks one by one

Neat way to report your pentest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyber kill chain

A

A model which outlines the phases of an attack

Developed by company Lockheed Martin

7 steps involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber kill chain step 1

A

Reconnaissance: Identify and select target, often includes OSINT and network scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber kill chain step 2

A

Weaponization: Preparation of attack payload

Get or create weapons for the attack, such as downloading or develop a tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyber kill chain step 3

A

Delivery: Find a way to deliver payload to target

Can be phishing, drive by download or direct network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyber kill chain step 4

A

Exploitation: Trigger payload

Have it run somehow, can be dependent on a user action (phishing) or using vulnerability in target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cyber kill chain step 5

A

Installation: Installation of a backdoor or Remote Access Trojan to maintain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cyber kill chain step 6

A

Command and control(C2) : Establish infrastructure to enable C2 access to the compromised host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber kill chain step 7

A

Actions on objectives: With access to target device the attacker can fulfil their original objectives

Ransom, data exfiltration etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MITRE ATT&CK

A

Described as a knowledge base and model for cyber adversary behaviour

Aims to reflect the phases and actions an attack may include

3 technology domains: Enterprise, Mobile, Industrial Control System (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pentesting - Infection vectors

A

Paths taken to infect victims

The approach used to expose victims, or victim machines, to malicious content or actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Malicious attachment

A

Deliver your payload as a message attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Black hat Search Engine Optimization (SEO)

A

You create malicious websites and make them appear high in search lists for tending keywords

24
Q

Drive-By download

A

Exploit users web browsers to make them automatically download malicious content when visiting a web site

25
Shodan
Online tool for searching for devices connected to the internet Collects information from devices connected to the internet by asking them
26
NMAP/ZENMAP
Network scanning tool: Scanning for active hosts Open ports And sometimes identify OS and service software
27
Active Reconnaissance
Interacting directly with the target system NMAP
28
Passive Reconnaissance
Not directly interacting with the target system Shodan and other OSINT
29
Scanning intensity
Even with active scanning you decide upon the level of intensity/aggression Typically, a more intense scan will yield more data and be quicker, but is also easier to detect One typically starts carefully and then intensify as needed to yield results
30
Metasploit
Penetration testing framework Can do some searching, but is primarily a tool for exploiting vulnerable systems
31
Exploit
A code which uses a system vulnerabililty
32
Vulnerability
A flaw in code, design, or logic which can be exploited
33
Payload
Code which will run on the targeted system (the actions carried out after using the exploit)
34
Hydra
Online password-cracking tool Allows you to automate password guessing attacks on websites
35
Password Guessing
Password guessing is all about trying to guess account passwords to get account access Brute Force Dictionary Mask
36
Password Guessing - Offline Attack
Means that a password hash is extracted and the attack is carried out offline
37
Password Guessing - Online Attack
Means that the password guessing is launched at a running system
38
Security Operations and Incident Response (SOIM)
Assumes that we can't, or won't fully protect our cyber environment. We acknowledge that there will be incidents. SOIM can be described as the process and capability for handling that reality.
39
SOIM - MAPE-K
SOIM can be seen as an application of the MAPE-K model for cybersecurity * Monitor, Analyze, Plan, Execute - Knowledge
40
MAPE-K Model
MAPE-K is an architecture for adaptive systems *An event-driven loop *Events, or the result of events, provide feedback to the system *Feedback is used to change the system behavior
41
SOIM Workflows
* Intrusion Detection and Prevention Systems (IDPS) * Security Information and Event Management (SIEM) * Security Orchestration, Automation, and Response (SOAR)
42
MAPE-K Components
* Monitor (IDPS) * Analyze (IDPS and SIEM) * Plan (SIEM and SOAR) * Execute (SOAR)
43
CTI - Cyber Threat Intelligence
Detailed knowledge of threats against an organization
44
ISAC- Information Sharing and Analysis Centers
Organization that gather data on cyber threats
45
Honeypot
A system or set of systems offered as bait to attackers
46
Security Operations - Incident Handling
* Avoid bad events as far as possible * Detect bad events when they occur * Handle them when they occur
47
Incident Response
When an incident occurs, we need to minimize its impact by following an incident response plan Incident response is basically about managing incidents and includes the practices of responding to identified incidents
48
Incident Response - How?
Roughly divided into two tasks: * Establishing capabilities * Incident handling
49
Establishing Capabilities
The task of getting ready, knowing how to act and what to do. Content to include: * What an incident is: Incident classification and how various incidents should be handled * CSIRT contact list: Members and their contact info * Contingency plan: Prioritization * Communication plan: Who to talk to and when * Resources that the CSIRT can use and allocate
50
Incident Response - Handling
* Analysis * Mitigation * Communication
51
Incident Response - Handling - Analysis
Investigate the incident * Type * Scope This a difficult task that aims to understand the nature of the incident and the (potential) damage caused
52
Incident Response – Handling - Mitigation
Focus on containing the incident * Isolate infected hosts * Isolate hosts critical to the organization
53
Incident Response – Handling - Communication
Communication is important for several reasons * Legal and compliance * Warn others * Maintain trust, both internally and externally
54
Incident Response – Post
Return to normal operation * Purge the incident from the system
55
56