Endpoint Monitoring Flashcards

1
Q

HIPS/HIDS

A

Host based IDS/IPS, monitors the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EDR

A

software collects system data and logs for analysis for early detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UEBA

A

A system that can provide automated identification of suspicious activity
by user accounts and computer hosts. AI or machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disassembler

A

a computer program that translates machine language into assembly
language.
Machine code (binary)
File Signature (file type)
Assembly code (instruction to implement program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

De compiler

A

a software that translate a binary or low-level machine language code
into higher level code.
High-lvl code (human readable)
strings (signature detection, sequence of encoded characters, malware usually has InternetOpenUrl in URL its an attempt to download from web address)
Program Packer (compressed executable, avoids scanners sometimes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dropper vs downloader

A

Malware to install or run payload vs code that retrieve additional tools after infection by dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shellcode

A

Any lightweight code designed to run an exploit on the target, which may
include any type of code format from scripting languages to binary code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Behavioral Analysis

A

Threat hunting and security monitoring must use behavioral-based techniques to
identify infections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sysinternals

A

A suite of tools designed to assist with troubleshooting issues with
Windows, and many of the tools are suited to investigating security issues. Filters good from abnormal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System Idle (PID 0) and System (PID 4)

A

kernel-level binaries that is the parent of the first user-mode
process (Session Manager SubSystem – smss.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

csrss.exe

A

Manages low-level Windows functions and it is normal to see
several of these running (as long as they are launched from
%SystemRoot%\System32 and have no parent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

wininit.exe

A

Manages drivers and services and should only have a single
instance running as a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Services.exe

A

Hosts nonboot drivers and background services, this process
should only have one instance of services.exe running as a child of
wininit.exe, with other service processes showing a child of
services.exe or svchost.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

lsass.exe

A

authentication of services for system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

winlogon.exe

A

Manages access to the user desktop and should have only one
instance for each user session with the Desktop Window Manager
(dwm.exe) as a child process in modern versions of Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

userinit.exe

A

Sets up the shell (typically explorer.exe) and then quits, so you
should only see this process briefly after log-on

17
Q

explorer.exe

A

This is the typical user shell, launched with the user’s account
privileges rather than SYSTEM’s, and is likely to be the parent for
all processes started by the logged-on user

18
Q

EDR

A

Endpoint detection and response (EDR) requires tuning to reduce false positives
VirusTotal (inspects items over all data sources)
MAEC (signature detection same as STIX and TAXII sharing)
Yara (matches strings to data sources)

19
Q

Execution Control

A

The process of determining what additional software may be installed on
a client or server beyond its baseline
SRP (creates allow list file for different system locations)
AppLocker (improve config options of SRP)
WDAC (create a code integrity policy and can be used with AppLocker)