Impt chap 1,2,4,5 except DNS Flashcards

1
Q

What is enterprise security assessment (why and goal)

A

Why?
To assess the security policies, procedures and guidelines in the organization
To discover vulnerabilities and risks that exist within the organization
Goal
Ensure that effective security controls are integrated into the systems of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 parts of enterprise security assessment and describe them

A

Vulnerability testing
Focus on finding vulnerabilities and flaws in the target system
No exploitation of flaws in the system
Usually includes policy and procedure reviews
Pen testing
Focus on gaining access and obtaining info in the system
Security audit
Assess security risks in organization
Countermeasures to those risks compared to a set of standards
CIS benchmarks
Reveals weaknesses in systems, practices and other key areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe ___ triangle

A

Security, functionality and ease of use triangle
Need find balance the 3 factors as change in one factor can impact the other 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purpose of penetration testing

A

See from a hacker’s pov
Use pen testing tools for defensive purposes
Test systems for vulnerabilities and openings in the system that can be exploited
Help find mistakes that other approaches miss
Fewer in depth interviews and more scope checks and debriefs
Propose countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration testing types

A

White box
Jump right into attack phase
All information about system and network architecture given
Save expense and time compared to black box testing
Gray box
Test internally and conduct security eval internally to determine the extent of access from users
Simulate an attack from the inside
Test level of access by employees, contractors
Black box
No information about system or infrastructure
Simulate a real attack from the outside
Tester has to determine system configurations and location
More time spent on info gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pen testing steps

A

Preparation
Formal agreement about the full scope of the test
Type of test and type of attacks done on target
Conducting evaluation
Conduct the actual security evaluation on the target
Prepare findings
Conclusion
Present findings and propose countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Performing pen testing

A

Pen testing does not fix vulnerabilities and implement countermeasures
Deliverables of pen testing are
Findings of test
Analysis of associated risks
Logs, screenshots and hacking tool outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe each phase of penetration testing and what tools do they use

A

Recon
Scanning
Gain access
Maintain access
Covering tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe passive info gathering

A

Gain information about the target by using mainly publicly available information
Focus on collecting information on system that is not on target network
Information can be gained from examples are company website, company literature and partner sites
very difficult to defend against
Types of information gained eg. are staff names, location of offices and system architecture eg. firewall and ids used
could be used for social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is footprinting

A

Process in creating a map of the target’s system and network
Determine the target system, applications and physical location
Look for information related to network architecture, applications and servers
Part of the preparatory attack phase where info is gathered such as
Remote access
Ports and services
Security mechanisms
Tools include sam spade, domain lookups, nslookup, search engines and whois database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is whois lookup and reverse lookup

A

Gain information such as technical, administrative and billing contacts, telephone numbers and email addresses, and domain name servers and other juicy information
Identifies who registered for the domain name used for websites or emails
Kali linux has whois built into it
Reverse lookup is entering whois command but using the ip address as input instead of the domain name and it will return the IP address range that belongs to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is whois

A

ICANN requires that every domain name is to be registered
Ensure that a single organization only has one domain name
Domain registrar submits the contact information of the individual or organization that holds the domain registry
Each registrar maintains its own whois database
Central whois database is managed by InterNIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Google hacking

A

Google will violently crawl websites for information
Misconfigurations in the web server will result in exposure of sensitive information such as directory indexing, etc.
Can be used in creative ways to gather info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Google hacking search operators

A

Operators include (sicilf)
Site: searches for only specified site
Inurl: searches for urls that contain specific words
Intitle: searches for words contained in specified titles
Filetype: searches for specific file types
Cache: identifies the version of the web page
Link: searches within hyperlinks for a specific term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe active info gathering

A

Gain information about the target through the use of more intrusive methods such as social engineering, onsite visits, interviews
Actively interacting with the target
Might show up on the intrusion logs
Example: pose as a user on a website
Does not involve hacking the system and may involve social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enumeration

A

Gain information about the target using specific services by querying and connecting to the target

17
Q

Social engineering attacks

A

Social engineering is a nontechnical method of
breaking into a system or network.
– Deceive users of a system.
– Convince them to perform acts that is useful to an
attacker.
* e.g. Giving information that can defeat or bypass security
mechanism.
* Hackers can use social engineering to attack the
human element of a system and circumvent
technical security measure.
– Used to gather information before or during an attack.
Telephone or Internet are common tools for
social engineering.
Exploit human trust rather than system
vulnerabilities.
– Users is the weak link in security.

18
Q

Human and computer based social engineering

A

Person to person interaction to
retrieve desired information.
* Example: Calling helpdesk to find
out a password

Use software that attempts to
retrieve the desired information.
* Example: phishing
URL Obfuscation may be employed to hide fake URL in what
appears to be a legitimate website.
– Makes phishing attacks and some online scams to look more
convincing.
Address can be obfuscated in malicious links by using hex encoding or
decimal or hexadecimal notation

19
Q

Social Engineering Countermeasures

A

Good policies & security awareness programmes
– Good policies alone are not effective unless they are
taught and reinforced to employees.
– Employee education is important.
* Employees should be trained on how to keep confidential
data safe.
* One advantage of a strong security policy is that
it helps employees decide how to response to
hacker’s request.
– If requested action is denied in policy, the employee
follows the guidelines and deny it.