Cybersec Flashcards

1
Q

Info gathering; OSINT

A

OSINT: Open Source Intelligence

Gather information from open sources (Google, job adverts, social media etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumeration

A

Scanning a target to know more about technical properties (Scanning IP range for responding hosts, Look for open ports etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploitation

A

-Try to get access to systems
-Often involves using or building exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Priv Esc - Horizontal - Vertical

A

Privilege Escalation - expanding system access

Horizontal - you gain access to another account with similar permissions

Vertical - gain access to accounts with different permissions (often higher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Post-explotation

A

When a true attacker realise their attack objective

Evaluate if you can use your access to target other hosts (pivoting)
Any additional information we can gather
Cover tracks
Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black-box

A

Pentester have no knowledge about the attack target

Similar to real attack
Able to capture “reconnaissance” aspects of an attack
Time-consuming and expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grey-box

A

Pentester have some knowledge about the attack target

Performed as an attack from the outside, but some knowledge given to the Pentester

Speeds up the test, cheaper

Can target certain aspects of the test target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

White-box

A

Pentester have access to full knowledge such as internal documentation

Used for detailed testing

Allows for the entire attack surface to be evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the 3 Hacker hats

A
  • A white-hat is someone who use their skills for good and stay within the law
  • A gray-hat typically use their skill for their perception of good. They do not follow laws or ethical standards if that conflicts with their objectives
  • A black-hat is a criminal who seek some kind of gain, typically at the expense of others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pentest - ROE

A

Rules of engagement

  • Permission to perform the test
  • Scope of the test (machine, system)
  • Rules (permitted or forbidden techniques or what the Pentester should do upon certain discoveries)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack tree

A

You model all possible ways to compromise a target

Allows you to create a map to try all possible attacks one by one

Neat way to report your pentest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyber kill chain

A

A model which outlines the phases of an attack

Developed by company Lockheed Martin

7 steps involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber kill chain step 1

A

Reconnaissance: Identify and select target, often includes OSINT and network scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber kill chain step 2

A

Weaponization: Preparation of attack payload

Get or create weapons for the attack, such as downloading or develop a tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cyber kill chain step 3

A

Delivery: Find a way to deliver payload to target

Can be phishing, drive by download or direct network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyber kill chain step 4

A

Exploitation: Trigger payload

Have it run somehow, can be dependent on a user action (phishing) or using vulnerability in target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cyber kill chain step 5

A

Installation: Installation of a backdoor or Remote Access Trojan to maintain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cyber kill chain step 6

A

Command and control(C2) : Establish infrastructure to enable C2 access to the compromised host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber kill chain step 7

A

Actions on objectives: With access to target device the attacker can fulfil their original objectives

Ransom, data exfiltration etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MITRE ATT&CK

A

Described as a knowledge base and model for cyber adversary behaviour

Aims to reflect the phases and actions an attack may include

3 technology domains: Enterprise, Mobile, Industrial Control System (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pentesting - Infection vectors

A

Paths taken to infect victims

The approach used to expose victims, or victim machines, to malicious content or actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Malicious attachment

A

Deliver your payload as a message attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Black hat Search Engine Optimization (SEO)

A

You create malicious websites and make them appear high in search lists for tending keywords

24
Q

Drive-By download

A

Exploit users web browsers to make them automatically download malicious content when visiting a web site

25
Q

Shodan

A

Online tool for searching for devices connected to the internet

Collects information from devices connected to the internet by asking them

26
Q

NMAP/ZENMAP

A

Network scanning tool:
Scanning for active hosts
Open ports
And sometimes identify OS and service software

27
Q

Active Reconnaissance

A

Interacting directly with the target system

NMAP

28
Q

Passive Reconnaissance

A

Not directly interacting with the target system

Shodan and other OSINT

29
Q

Scanning intensity

A

Even with active scanning you decide upon the level of intensity/aggression

Typically, a more intense scan will yield more data and be quicker, but is also easier to detect

One typically starts carefully and then intensify as needed to yield results

30
Q

Metasploit

A

Penetration testing framework

Can do some searching, but is primarily a tool for exploiting vulnerable systems

31
Q

Exploit

A

A code which uses a system vulnerabililty

32
Q

Vulnerability

A

A flaw in code, design, or logic which can be exploited

33
Q

Payload

A

Code which will run on the targeted system (the actions carried out after using the exploit)

34
Q

Hydra

A

Online password-cracking tool

Allows you to automate password guessing attacks on websites

35
Q

Password Guessing

A

Password guessing is all about trying to guess account passwords to get account access

Brute Force
Dictionary
Mask

36
Q

Password Guessing - Offline Attack

A

Means that a password hash is extracted and the attack is carried out offline

37
Q

Password Guessing - Online Attack

A

Means that the password guessing is launched at a running system

38
Q

Security Operations and Incident Response (SOIM)

A

Assumes that we can’t, or won’t fully protect our cyber environment. We acknowledge that there will be incidents.

SOIM can be described as the process and capability for handling that reality.

39
Q

SOIM - MAPE-K

A

SOIM can be seen as an application of the MAPE-K model for cybersecurity
* Monitor, Analyze, Plan, Execute - Knowledge

40
Q

MAPE-K Model

A

MAPE-K is an architecture for adaptive systems

*An event-driven loop
*Events, or the result of events, provide feedback to the system
*Feedback is used to change the system behavior

41
Q

SOIM Workflows

A
  • Intrusion Detection and Prevention Systems (IDPS)
  • Security Information and Event Management (SIEM)
  • Security Orchestration, Automation, and Response (SOAR)
42
Q

MAPE-K Components

A
  • Monitor (IDPS)
  • Analyze (IDPS and SIEM)
  • Plan (SIEM and SOAR)
  • Execute (SOAR)
43
Q

CTI - Cyber Threat Intelligence

A

Detailed knowledge of threats against an organization

44
Q

ISAC- Information Sharing and Analysis Centers

A

Organization that gather data on cyber threats

45
Q

Honeypot

A

A system or set of systems offered as bait to attackers

46
Q

Security Operations - Incident Handling

A
  • Avoid bad events as far as possible
  • Detect bad events when they occur
  • Handle them when they occur
47
Q

Incident Response

A

When an incident occurs, we need to minimize its impact by following an incident response plan

Incident response is basically about managing incidents and includes the practices of responding to identified incidents

48
Q

Incident Response - How?

A

Roughly divided into two tasks:
* Establishing capabilities
* Incident handling

49
Q

Establishing Capabilities

A

The task of getting ready, knowing how to act and what to do.

Content to include:
* What an incident is: Incident classification and how various incidents should be handled
* CSIRT contact list: Members and their contact info
* Contingency plan: Prioritization
* Communication plan: Who to talk to and when
* Resources that the CSIRT can use and allocate

50
Q

Incident Response - Handling

A
  • Analysis
  • Mitigation
  • Communication
51
Q

Incident Response - Handling - Analysis

A

Investigate the incident
* Type
* Scope

This a difficult task that aims to understand the nature of the incident and the (potential) damage caused

52
Q

Incident Response – Handling - Mitigation

A

Focus on containing the incident
* Isolate infected hosts
* Isolate hosts critical to the organization

53
Q

Incident Response – Handling - Communication

A

Communication is important for several reasons
* Legal and compliance
* Warn others
* Maintain trust, both internally and externally

54
Q

Incident Response – Post

A

Return to normal operation
* Purge the incident from the system

55
Q
A
56
Q
A