Exam 2 Flashcards
What are the 5 functional categories of the NIST Cybersecurity Framework?
- Identify – critical processes and assets; document flow; software/hardware inventory;roles and responsibilities; threats and vulnerabilities
- Protect – establish safeguards and practices
- Detect – establish and implement activities to detect breaches
- Respond – establish detailed guidelines of actions to take when a breach is detected
- Recover – establish plans for recovering and restoring operations back to normal
National Institute of Standards and Technology (NIST)
What’s the difference between threats, vulnerabilities, and exploits?
Threat – any potential danger to an asset. (Latent vs realized; latent threat has not been exploited, and may not be publicly known. A realized threat is when attackers actively exploit vulnerabilities.)
Vulnerability – a weakness in design, implementation, code. Can include lack of mechanisms (for example, not having a firewall).
Exploits – a piece of software, tool, or technique that takes advantage of a vulnerability. (Zero-day exploit, Exploit-DB & Metasploit)
What is a CVE & what organization catalogs them?
CVE (Common Vulnerabilities and Exposure) identifier & MITRE is the agency responsible for cataloging CVEs.
What a zero-day exploit is?
Zero-day exploit – vulnerability that is not publicly known, but is actively
being exploited
What are the 3 elements used to determine risk?
Risk – probability of the occurrence of a threat.
Risk is based upon 3 elements:
1. Assets
2. Threats
3. Vulnerabilities
What are some of the most common forms of authentication-based vulnerabilities?
Authentication-based – vulnerability that is exploited by manipulating, bypassing, or stealing authentication credentials.
Common forms:
1. Session hijacking
2. Brute force
3. Default credentials
4. Redirecting
5. Unpatched Kerberos vulnerabilities
What are the two types of firewalls?
Hardware-based, stand-alone appliance
Software-based installed on host devices
What’s the differences between the 3 profiles for Windows firewalls?
3 Profiles: Domain, Private,
Public.
- Domain Profile is applied
when joined to domain; This
allows firewall settings
through Group Policy. - Private Profile – home use or
non-domain office use. - Public Profile – when
connected to public
networks, such as public
library, etc.
What is Netfilter & the difference between it and iptables/nftables?
Netfilter is a component of the Linux kernel. It interacts with the network stack to intercept and examine traffic.
iptables and firewalld were the defacto tools until 2015-ish.
nftables was introduced in 2014 and has slowly become the defacto tool.
What is a chain?
iptables chains; organizes traffic into categories called “chains.”
There are 5 chains:
1. INPUT –packets coming into the host.
2. OUTPUT –packets going out of the host.
3. FORWARD –packets coming into the host that are to be routed to another destination.
4. PREROUTING –used for NAT when the packet arrives at the host.
5. POSTROUTING –used by NAT before the packet exits the host.
The INPUT, OUTPUT, and FORWARD chains are the most common
In iptables, what are the 3 targets?
“Target” refers to the action applied to traffic.
There are 3 targets:
1. ACCEPT –packet is accepted and passed through the firewall.
2. REJECT –packet is dropped and not allowed to pass through the firewall. A rejection
message is sent to the sending device.
3. DROP –packet is dropped and no rejection message is sent
What’s nft?
nft is the CLI command keyword to interact with the nftables tool
How do you display the current nftables rules?
nft list ruleset
Where is the nftables config file located?
located in /etc/nftables.conf
type in command line, nano /etc/nftables.conf
How do you restart nftables from the command line?
systemct1 restart nftables