Info gathering and Vulnerability Identification Flashcards

1
Q

Recon-ng Modules

A

Recon modules - for reconnaissance activities;
Reporting modules - for reporting results on a file;
Import modules - for importing values from a file into a database table;
Exploitation modules - for exploitation activities;
Discovery modules - for discovery activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open-source web reconnaissance framework written in Python

A

Recon-NG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CWE basic identifiers

A

Weakness ID (i.e., “CWE-941”)
• Description of the weakness
• Extended description of the weakness
• Relationships to other views (i.e., research, development, architectural, etc.)
• Modes of introduction (when the weakness is introduced)
• Applicable platforms (software languages, operating systems, etc.)
• Common consequences (i.e., scope, impact, and likelihood)
• Likelihood of exploit
• Potential mitigations
• Memberships (shows additional categories or views that reference this weakness)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

capec domains

A

Social engineering Exploitation and manipulation of people

  • Supply chain Manipulating computer hardware/software within the supply chain lifecycle
  • Communications Communication and protocol exploitation
  • Software Exploitation of software applications
  • Physical security Exploitation of physical security weaknesses (bypass, theft, or destruction)
  • Hardware Exploitation of physical hardware used in computer systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RTOS common weaknesses

A

Denial of service (DoS)

  • Code execution
  • Overflow
  • Memory corruption
  • Gain information (information disclosure)
  • Gain privileges (privilege escalation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly