Final Baby Flashcards
Which of the Critical Security Controls specifies conducting security awareness training for a
company’s employees?
CIS Control 17 Incident Response
Which of these sub-controls do you think would be the “easiest” for an IT organization to
implement? Why?
CIS Control 4 would be the easiest to implement. Controlled Use of
Administrative Privileges comes down to changing passwords when inserting something new and making
sure that only people with administrative accounts use certain workstations and have enhanced privileges.
Multifactor Authentication and logging Administrative activity are also a factor.
Which of the Critical Security Controls is used when a potential security incident occurs within a
company? Why?
CIS Control 19 is used when a security incident occurs.
Incident Response ensures that an incident response team is prepared to handle an incident and detail it to the proper authorities.
Which of the Critical Security Controls would application developers be most interested in? Why?
CIS Control 18 would be the most interesting to application developers.
Application Software Security details how to make an application secure using firewalls, analysis tools, and algorithms.
The NSA ANT Catalog is a list of technological solutions available to NSA team members.
What does ANT stand for?
Advanced Network Technology
What is the name of the NSA “elite hacking force”?
TAO
What is the name given to the NSA hacking group by outside malware companies
Equation Group
What is the name of the exploit created by TAO which can be used to take full control of a
Microsoft Windows system over SMB?
EternalBlue
Who does Jack Rhysider interview for the podcast? What is the name of the interviewee’s
company?
Jake Williams
Rendition InfoSec
What is doxing?
Posting someone’s private information on the internet, usually with malicious intent
What is name of the Foundation established by Chris as part of his work against child predators
Innocent Lives Foundation
What is the name of the Project that law enforcement asks for the public’s help in cataloging the
appearance of different hotel rooms in helping to identify the location in which child pornography
images might have been taken?
The Polaris Project
What is the world’s most popular network packet sniffer?
Wireshark
What is a packet sniffer?
A computer program that can intercept and log traffic that passes over a computer network or part of a network.
What is the command line version of Wireshark?
Wireshark -h
TCP and FTP are unencrypted protocols? T or F
T
ARP is an unencrypted protocol? T or F
F
What is penetration testing?
A cyber security professional is authorized to emulate a malicious attacker by
attempting to hack into the company and its systems.
What is the first phase of Penetration Testing?
Pre-engagement, working with the client to understand how big the job is gonna
be, understanding why they want to do this job. Give the client the best value for their money.
What is the second phase of Penetration Testing?
Engagement, performing reconnaissance and scanning the system for any vulnerabilities,
accessing the system, and figuring out what you have access to once you break in.
What is the third phase of Penetration Testing?
Post-Engagement, taking all the information from the testing and creating a finance report.
Telling the client what you did and telling them evidence of issues that were found and telling them how
to fix those issues.
The difference between an attacker and a penetration tester is that a professional penetration tester
will always have what?
A penetration tester has permission
How long is a MD5 hash in bits? Bytes?
128 bits
16 bytes
How long is a SHA256 file hash in bits? Bytes?
256 bits
32 bytes
Why would a member of law enforcement need to calculate the file hash for a file?
Law enforcement can calculate a hash file and then compare it to already discovered malicious
content that is in their database. If anything is similar than it is illegal.
Why would someone else want to calculate a file hash after downloading a file?
Someone would calculate the hash of a recently downloaded file and look up what the correct
hash is supposed to be. If they are different than the file is fraudulent/malicious.
What is OSINT?
Open-source intelligence
Gathering techniques can be used by cyber security
professionals and malicious parties alike to a wide variety of information about a target, whether
that target is an individual or an organization.
What is some information dnslytics.com shows?
The domain name, administrative contact,
technical contact, when the domain was activated and will expire.
What is the main security concern with companies running IIS 7.5 after January 14th, 2020
It will not be supported by Microsoft.
Shodan can do what?
Show how many hosts are on a target network.
What is Nmap?
It is the most popular security tool in use today.
Used to scan a network and view ports, device names, and operating systems
Why would an attacker want to clear out an event log?
To remove evidence of any wrongdoing
What is a command used by a “normal” user to elevate
their privileges to administrator-level access. What is the name of this command?
Windows: User Account Control
Linux: Sudo
If a user is a system administrator for an organization, how many different user accounts (at a
minimum) would they have?
An admin account and a regular account for regular work
In Cuckoo’s Egg which software had vulnerability in it that allowed the attacker to overwrite another file on the affected system?
The Gnu program
What is the meaning of the title of Cliff Stoll’s book - “The Cuckoo’s Egg
A cuckoo lays its eggs in another bird’s nest like a parasite. This thing is entirely reliant on other birds being tricked.
Cliff calls the hacker a Cuckoo because they laid their “egg” in the gnu and was given administrator
access.
As explained by Chris, what is the common thread between all attackers
All attackers want to steal something, money, intellectual property, personal info, time, or reputation. Reputation can be someone’s website or social media being hacked and changed.
How long did the “Shellshock” vulnerability exist before it was discovered and disclosed to the general public? What system did it affect? What access did it give?
It lasted 30 years before it was discovered.
Unix-based systems.
Unrestricted Access
A cyber attack must only be as “
______________
” as it has to be?
Sophisticated
Where are the three places discussed that clear text passwords can exist?
In the user’s head
In transit on the network
In limited places in the operating system
What is the name of the tool Chris uses to dump clear text passwords from the operating system’s
running memory?
Mimikatz.exe
What tool does Chris use to decrypt password hashes?
John the Ripper
How is the UEFI rootkit installed?
You get it by installing Absolute Software’s
LoJack.
How does the UEFI rootkit work?
Instead of communicating with Absolute’s server it
communicates with Fancy Bear’s. It then adds a malicious UEFI module to the firmware image, this
effectively installs the rootkit to the system.
How can the UEFI rootkit be removed?
The only way to remove it is to flash the
firmware. This basically means the user has to overwrite existing data or firmware, that is currently used
on an electronic device, with different, new data