DOS-Cybercrimes-PenTesting Flashcards
What are the top 5 most common security attacks?
- Injection, 2 XSS 3 Broken Auth Sessions 4 Insecure Direct Object References 5 Sensitive Data Exposure
Sites on the internent as of 2015
How many sites google quarentines everyday
Malicious sites identified
1000000000
100000
30,000
Name the characteristics of a Sandbox
Lightweight and easy to set up; data is not saved when application closes; anything changed or created is not visible beyond its boundaries
Name the characteristics of a Virtual Machine
Anything changed or created is not visible beyond its borders; machine within a machine; lightweight and easy to set up; disk space must be allocated to the application
Which of the following are true?
- CORS allows cross-domain communication from the browser
- CORS requires coordination between the server and the client
- CORS is not widely supported by browsers
- CORS header can be used to secure resources on a website
- CORS allows cross-domain communication from the browser
- CORS requires coordination between the server and the client
What is a definition of an origin?
A combination of URI scheme, hostname, and port number
Which of the following have the same origin to http://www.example.com/dir/page.html ?
http: //www.example.com/dir2/page.html
http: //www.example.com/dir2/page.html
http: //username:password@www.example.com/dir2
Type of cookie: Super
Cookie within an origin of a top level domain
Type of cookie: Zombie
Cookie that regenerates after its deleted
Type of cookie: Samesite
Cookie that can only be sent in requests originating from the same origin as the target domain
Type of cookie: HttpOnly
Cookie that can not be accessed via client side apis
Type of cookie: Thirdparty
Cookie that belongs to a domain different from the one in the address bar
Type of cookie: session
In-memory cookie; it doesn’t have an expiration date and is deleted when the browser closes
Type of cookie: persistent
Cookie that has expiration date and time; also called tracking cookies
Type of cookie: secure
A cookie that can only be transmitted over an encrypted connection
Which of the following are true?
- Cryptographic hash functions that are not one-way are vulnerable to preimage attacks
- difficult hash function is one that takes a long time to calculate
- A good cryptographic hash function should employ an avalanche effect
- Cryptographic hash functions that are not one-way are vulnerable to preimage attacks
- A good cryptographic hash function should employ an avalanche effect
Which events trigger penetration testing?
- infra is added or modified
- applications are added or modified
- end-user policies change
- security patches are installed
All the above
Steps of RSA attack
- Identify 2. Email 3. Executable
Match the social engineering training tool with execution:
- used to determine which users click on links in emails
- signed Java applet is sent to user; a shell is sent back to the exploit server
- flash program is created that exploits the server
- email with attachment is downloaded and makes connection to exploit the server
Download connection - email with attachment is downloaded and makes connection to exploit the server
Click logger - used to determine which users click on links in emails
Reverse Shell Applet - signed Java applet is sent to user; a shell is sent back to the exploit server
Flash or CD autoplay - flash program is created that exploits the server
Random Scanning
each compromised computer probes random addresses
Permutation Scanning
All compromised computers share a common-pseudo random permutation of the IP address space
Signpost scanning
Uses the communication patterns of a compromised computer to find new targets
Hitlist scanning
a portion of the list of targets is supplied to the compromised computer