General Review Flashcards
Cyber Kill Chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command/control
Actions on objectives
Diamond Model of Intrusion Analysis
Adversary - threat actor group
Capabilities - adversary exploit to carry out attack
Victim
Infrastructure - how attacker gets to victim
Applies scientific principles to provide post-event analysis of intrusion
Symmetric Algorithms
RC4
AES (strongest)
DES
3DES
QUAD
Asymmetric Algorithms
RSA
Diffie-Hellman
ECC
El Gamal
DSA
Linux permissions
Read - 4
Write - 2
Execute - 1
Owner | Group | Other
Strongest digital certificate type
EV
Extended validation
Quickest digital certificate type to obtain
DV
Domain Validation
Function call closely associated with Linux injection attacks
system( )
Attack that depends on users being logged into multiple sites in same browser
XSRF
Certificate Stapling vs Pinning
Stapling - web server downloading OSCP response from certificate vendor before providing to browsers
Pinning - public key/certificate has been seen for specific host/pinned to host
Quick formatting leaves _____ ?
Files remain
File indexes are removed
Bluesnarfing vs bluejacking
Bluejacking - pushing unsolicited messages (annoyance)
Bluesnarfing - data theft
Vertical scaling vs Horizontal scaling
Vertical - add resources to existing machine
Horizontal - add additional machines
OAuth vs OpenID
OAuth (authorization) - open standard for authorization - allow using third party accounts without exposing password
OpenID (authentication) - open standard providing decentralized authentication - log in to multiple websites with one set of credentials
Security concerns of IPv6
Scanning sequential IP addresses no longer viable on many networks
Blocking ICMP can cause significant problems
Devices may have more than one IP stack
Security concern of SSH keys
Inadvertent exposure of private key
Weak passwords/passphrase
SSH key sprawl
NIST SP 500-292
Cloud reference architecture
Understand interactions between different services/organizations in cloud deployment
Account permissions for credentialed scan
Read-only
Follow principle of least privilege
Component of cryptographic system responsible for secrecy
Key
Method to identify rootkit
Mount drive on another system in read-only mode
Boot from USB drive/scan using known good OS
Most likely path for macro virus infection
User intentionally enabled macros for file
Method to prevent application DoS attacks
Use CAPTCHA to confirm user is human
Common measures to assess threat intelligence
Timeliness
Accuracy
Relevance
NIST Framework core security functions
Identify
Protect
Detect
Respond
Recover
Best CASB solution for interacting directly with CSP
API-based CASB