Interview Questions Flashcards
Name the protocols that run on these ports: 88 143 137-139 161-162 110 389 445
88 - Kerberos 143 - IMAP 137-139 - NetBIOS 161-162 - SNMP 110 - POP3 389 - LDAP 445 - SMB
How can Malware maintain persistence?
Auto-run key/Start Up, scheduled tasks,
What family of malware often targets Volume Shadow Copies?
Ransomware
Why would you see DNS going over TCP?
DNS Zone transfers
What do you know about Alternate Data Streams?
A half-assed implemented feature. ADS is a second stream of data stored in a file. This information isn’t natively seen by the OS, so adversaries can use it to hide information.
Explain a Web shell.
Script that can be uploaded to a web server to enable remote administration. Can be used to pivot further internally.
Name some Windows Event ID's: 4608 4609 4624 4625
4608 - Windows is starting up
4609 - Windows is shutting down
4624 - Account Successfully logged on
4625 - Account failed to log on.
What is a .DLL file?
Dynamic Link Library file. Holds a repository of code other applications can reference
What is DLL search order hijacking?
Windows has a specified order in which it searches for DLL files. Attackers can put a DLL file by the same name in a directory Windows will search first before it finds the legitimate file.
Name the 4 Windows NTFS Timestamps
File last accessed, file last modified, file created, and metadata last modified.