Deck F Prt. 2 Flashcards
SQLMap
The Command “sqlmap.py - u http://10.10.1.20/? p=1&forumaction=search;dbs” used for Enumerating the databases in the DBMS for the URL. SQLMap is an Open Source Penetration Test Tool that Automates the Process of Detecting and exploiting Weaknesses in SQL Injectoin and taking over the server Database. So SQLmap is a tool that can Automatically Detect and exploit SQL Injection Bugs.
Serpent
Is a 128 Bit Symmetric Block Cipher (Encryption Algorithm) With key sizes of 128,192 or 256 Bits, which involves 32 rounds of computational Operations that include substitution and permutation operations on four 32 bit word blocks using 8 variable s-boxes with 4 bit entry and 4 bit exit.
SSI Attack (Server Side Includes)
SSI (Server Side Inclusion) Attack Refers to the Exploitation of a WEB Application by injecting Scripts in HTML Pages or Executing Arbitrary Code Remotely. The .html File type on the web server, is a strong indication that the server is vulnerable to this kind of attack.
Side Channel Attack
SCAs (Side Channel Attacks) aim to Extracting Secrets from a Chip or a System, though measurements and analysis of physical parameters. Examples of such Parameters include Supply Current Execution time and electromagnetic emission. The Attacker uses a loop strategy to recover the passwords. He uses one character at at time to check whether the first character entered is correct; if so he continues the loops for consecutive characters. If not he Terminates the loop. Then the Attacker Checks how much time the device takes to finish one complete Password Authentication Process, through which he can compute how many characters entered are correct.
Stateful Firewall
Stateful Firewall Does NOT Respond with a RST Packet when you send a TCP ACK Segment to a known Closed port on a Firewall.
TTL Value of IOS
TTL (The Time To Live) Value of IOS 12.4 (Cisco Routers) is 255 and Window size is 4128
TTL Value of Linux OS
TTL (The Time To Live) Value of Linux OS is 64 and window size is 5849
TTL Value of Windows 7 OS
TTL (The Time To Live) Value of Windows 7 or Windows Server 2008 is 128 and the window size is 8192
Technical Threat Intelligence
Consists of Feeding Threat Intelligence into the Security Devices in a Digital Format to block and Identify inbound and outbound Malicious Traffic Entering the Organization’s Network.
Union SQL Injection
Union SQL Injection Attack that Extends the results returned by the Original Query, Enabling Attackers to run two or more statements if they have the same structure as the Original One.
Verbose Failure Messages
Providing Verbose Failure Messages is a design flaw that Enumerates usernames from the login form of the Web Application, Which Requests users to feed Data and Specifies the Incorrect Field in case of Invalid Credentials. This helps the Attacker carry out social Engineering. Any applications that have Verbose Error Messages inform the Site users as to the validity of Entered Usernames. this Information will be helpful when testing for default or guessable User Accounts
Vulnerability Management
The Correct Sequence of Steps in Vulnerability Management is 1: Identify Assets and Create a Baseline, 2: Vulnerability Scan, 3: Risk Assessment, 4: Remediation, 5: Verification, 6: Monitor.
Vulnerability Scanning
The First Step in Vulnerability Scanning is to Check if the Remote Host is Alive Followed by Vulnerability Scanners that go ahead and Scan the Network.
WPA3
Is the New Wireless Standard that Uses SAE (Simultaneous Authentication of Equals), Also known as Dragonfly Key Exchange which REPLACES the PSK (Pre Shared Key) Concept.
WS Security
Is a Component of the Web Service Architecture, Which is an Extension of SOAP (Simple Object Access Protocol), and it can Maintain the Integrity and Confidentiality of SOAP Messages. Web Services Security (WS-Security, WSS) is an Extension to SOAP to apply Security to Web Services. its main Focus is the Use of XML Signature and XML Encryption to provide end to end Security.