Fast Track Flashcards
Reconnaissance
Cyber Kill Chain stage that precedes the Weaponization stage.
Weaponization
Stage of the Cyber kill chain where you select or create a client side back door to send to users’ collected email addresses
Delivery
Third step of the Cyber Kill Chain stage where attacker sends weaponized bundle to the victim using email, USB, etc.
Actions on objectives
Cyber kill chain stage where data exfiltration occurs
Unspecified proxy activities
Multiple domains pointing to the same host to switch quickly between the domains and avoid detection
White hat
Would notify the system owner and the software vendor if they found a zero-day vulnerability.
Gray Hats
Gray hats are the individuals who work both offensively and defensively at various times.
Reconnaissance
Reconnaissance refers to the preparatory phase in which an attacker gathers as much information as possible about the target prior to launching the attack. In this phase, the attacker draws on competitive intelligence to learn more about the target. It could be the future point of return, noted for ease of entry foran attack when more about the target is known on a broad scale. The reconnaissance target range may include the target organization’s clients, employees, operations, network, and systems.
Clearing Tracks
The attacker overwrites the server, system, and application logs to avoid suspicion
Determine the impact of the change
The first consideration when implementing a change is to determine the impact of the change
Operational Threat Intelligence
Operational threat intelligence provides information about specific threats against the organization. It provides contextual information about security events and incidents that help defenders disclose potential risks, provide greater insight into attacker methodologies, identify past malicious activities, and perform investigations on malicious activity in a more efficient way.
Technical Threat Intelligence
This intelligence is directly fed into the security devices in digital format to block and identify inbound and outbound malicious traffic entering the organization’s network.
Incident triage
Phase where type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited are analyzed
PCI-DSS
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for major debit, credit, prepaid, e-purse, ATM, and POS cards
HIPAA
Regulations that protect personal medical records (PHI)
PHI
Personal Health Information (personal medical records)
SOX
Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate accounting disclosures
[site:]
site: This operator restricts search results to the specified site or domain.
[related:]
related: This operator displays websites that are similar or related to the URL specified.
[Filetype:]
Filetype: This operator allows you to search for results based on a file extension.
Reverse Image Search
Reverse image search helps an attacker in tracking the original source and details of images, such as photographs, profile pictures, and memes
Censys
Attackers use loT search engines, such as Censys, to gather information about the target loT devices, such as manufacturer details, geographical location, IP address, hostname, and open ports. Censys continually monitors every reachable server and device on the Internet, so one can search for and analyze them in real time.
Dark web footprinting
Uses specialized tools or search engines to encrypt browsing activity and navigate anonymously
Hootsuite
an automated geolocation tool