EthicalHacking Flashcards

1
Q

What are the components of IoT?

A

Devices
Infrastructure
Processes
People
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is OODA loop?

A

Observe
Orient
Decide
Act

REPEAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some protocols to move data in IoT?

A

MQTT
HTTP
ZIGBEE
6LoWPAN
XMPP
DDS
CoAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is MQTT?

A

Message Queuing Telemetry Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is XMPP?

A

Extensible Messaging and Presence Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DDS?

A

Data Distribution Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CoAP

A

Constrained Application Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is 6LoWPAN

A

Ipv6 over low power wireless personal area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is 802.15.4 IEEE standard?

A

Used by ZigBee as protocol standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is NFC?

A

Near Field Communication
Protocol used in IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Enemybot?

A

malicious botnet that targets Internet of Things (IoT) devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does Enemybot work?

A
  1. Exploits vulnerabilities in IoT devices to gain access and install the botnet malware
  2. The infected device establishes a connection with a command-and-control (C&C) server
  3. The C&C server sends commands to the infected devices, instructing them to perform malicious actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to protect against Enemybot?

A

Keep software and firmware updated
Change default password
Strong passwords
Enable network security features
Disable unnecessary services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is OWASP

A

Open Worldwide Application Security Project
Researches application vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Telematics

A

combination of telecommunications and computer information systems to collect, transmit, and analyze data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are OWASP top ten

A

Broken Access Control
Cryptographic failures - weak cyphers
Injection
Insecure Design
Security Misconfiguration
Outdated components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are best practices with IoT security

A

Mitigate threats at device level
apply latest patches
strong authorization and authentication
disable unneeded network services
physical protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Types of IoT attacks

A

Physical Tampering
Firmware updates run malicious code
Fault injection to introduce errors
Backdoor access
Wireless signal jamming
Supply chain - during manufacture or shipping of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Zero Trust Policies

A

assumes that all devices, whether inside or outside the network, are potentially hostile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the Ethical hacking stages

A

Reconnaissance
Scanning
Gaining access
Maintaining Access
Covering Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe Reconnaissance stage ethical hacking

A

get device make, model and search documentation, firmware updates online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe Scanning stage ethical hacking

A

Scan for open ports, services
Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe gaining access stage ethical hacking

A

launch exploits on vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Describe maintain access stage ethical hacking
escalate privledges upload a backdoor
26
Describe cover tracks stage ethical hacking
delete logs or other evidence reset passwords close ports
27
What are some info gathering tools
Multi-ping nMAP
28
What is FCC ID search ffcid.io
allows search and ID of device using the FCC ID code and will give you info on the device
29
What are some security issues around IoT devices
no physical security hard-coded back door access outdated firmware poorly designed code
30
What are 5 scanning apps for IoT devices
nMAP OpenVAS Nessus Foren6 Fing
31
What is IoT Inspector?
scanner tool specifically for IoT devices
32
What is a side channel attack?
targets physical vul, power consumption or emissions.
33
What is Chip whisperer?
tool runs bluetooth attack called BlueBorn attack. used with HACKRF-One to intercept or disrupt BT signal.
34
What is an SDR device?
Software Defined Radio Device
35
What is RE-play attack
replaying a captured signal to a target device to gain access
36
What is jamming attack
disrupts wireless communication via EMI in same band
37
What is RollJam attack
used in car key-fob attack. Rolljam device captures rolling code while also jamming. attacker uses code to unlock car b/c the code was never used.
38
What is NAND Glitching
Hardware attack technique that manipulates NAND flash cards Applies voltage to disrupt normal operation. Device becomes unstable
39
What are the vulnerable components of OT systems?
outdated or flawed software week access controls lack of patching insecure network configurations
40
Define MITRE
US based non-profit providing research, publications or tools to Inform on Tactics Techniques and Procedures in hacking.
41
What are Fieldbus protocols?
facilitate communication and data exchange between devices in industrial setting
42
List Fieldbus protocols
Modbus
43
What are sub-protocols of Modbus
Modbus RTU (remote terminal unit) Modbus ASCII (xmit ASCII characters) Modbus TCP (ethernet communication)
44
What is Profibus?
Process Field Bus Communication protocol for real-time control and monitoring of industrial systems
45
What is HART?
Highway Addressable Remote Transducer Hybrid protocol used for communication with field sensors.
46
What is HMI?
Human-Machine Interface
47
What is PLC?
Programable Logic Controls
48
What is IIoT?
Industrial Internet of Things - Merges control functionality of ICS with data collecting of IoT devices
49
What is another name for IIoT?
Industry 4.0
50
What does Pen Testing OT systems require?
Specialized Knowledge of PLCs, SCATA and protocols. Sometimes vendor collaboration -some systems are air-gaped.
51
What is SCADA?
Supervisory Control and Data Acquisition
52
What is Network Miner?
Open-Source network forensics tool to capture network traffic and extract images, files, passwords and email and put into PCAP files.
53
What is IoT Seeker?
Tool used to find devices using default access credentials
54
What is Fuzz Testing?
Sending to a device random or unusual input to ID vulnerabilities.
55
What are two online sites to help with IoT security?
Tenable.com Skyboxsecurity.com
56
What is Skybox Vulnerability Control Product?
Tools that offers: Scanning Risk Assessment Remediation Guidance
57
What are two most commonly used protocols and SCADA systems?
Modbus DNP3 (Distributed Network Protocol)
58
What IoT manufacturers best practices with regard to IoT security?
Design for security Embedded Firewalls Provide Encryption Tamper Proof capabilities.
59
What is the Purdue model?
Structure for organizing ICS ecosystem
60
What are levels 4 and 5 of Purdue model
Top layers including Corporate network -routers, email services, intranet, file servers
61
What is perimeter Network in Purdue model?
Layer between 4-5 levels layer 3. AKA - Screened subnet Acts as intermediary between trusted internal network and untrusted corporate network (layer 4-5) Contains application servers, AV servers, Management servers. Firewalls on each side.
62
What is contained in level 3 of Purdue Model?
Site Manufacturing Operations and Control- Contains -Domain controller -Quality control -Tracking orders.
63
What is contained level 2 of Purdue model?
SCADA Systems Engineering Desktops
64
What is contained level 1 of Purdue model?
Process Control - Batch processes and PLC's deployed here
65
What is contained level 0 of Purdue model?
Field Devices
66
What are the 3 pillars of Zero Trust concept?
Workplace - Secure access to devices connecting to networks. Workloads - applications that needs to communicate Workforce - users who access resources.