General Flashcards

1
Q

TLS Transport Layer Security

A

TLS can wrap regular HTTP traffic within TLS, which means that we can encrypt our entire conversation, not just the data sent or requested. Before the TLS mechanism was in place, we were vulnerable to Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive Analysis Dependencies

A

passive, we are just copying data that we can see without directly interacting with the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Passive Dependencies

A

Active capture requires us to take a more hands-on approach. This process can also be referred to as in-line traffic captures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tcpdump

A

command-line packet sniffer that can directly capture and interpret data frames from a file or network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST SP 800-61 framework

A

preperation
detection & analysis
containment, eradication, and recovery
post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 types of NIDS

A

network-based intrusion detection system

inline, network tap, passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Model

A

PDNTSPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Layer protocols

A

HTTP, FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Presentation Layer protocols

A

JPG,TLS,SSL,PNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session Layer protocols

A

NetBIOS
Responsible for the communication of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Important IP addresses

A

Loopback: 127.0.0.1
Link local: 169.254.x.x
Prívate: 10.0.0.0- 10.255.255.255
172.16.0.0, 192.168.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Different Layers of Firewalls

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Kill Chain

A

The model identifies what the adversaries must complete in order to achieve their objective.

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control (C2)
  7. Actions on objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kerberos

A

a ticket-granting system

Uses username and password to AS (Authentication server) > AS sends ticket (encrypted secret key derived from users password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL Injection

A

a web application directly includes unsanitized data provided by the user in SQL queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent SQL Injection

A
17
Q

SQL Injection Payload

A

https://github.com/payloadbox/sql-injection-payload-list

18
Q

XSS

A

Cross Site Scripting

Type of injection using malicious scripts into trusted websites

19
Q

WAF

A

Web Application Firewall
-Layer 7 Firewall
-protects against XSS, SQL Injection

20
Q

Encoding

A

Converts the data in the desired format required for exchange between different systems.

21
Q

Hash vs Encryption

A

Encryption is a two-way function that includes encryption and decryption whilst hashing is a one-way function that changes a plain text to a unique digest that is irreversible.