L8: Threat Analysis Flashcards
Name the three phases of intelligence gathering used by attackers:
Footprinting (FP)
Scanning (S)
Enumeration (E)
Gathering information on OS, services, and architecture of the target system is called ______.
Scanning
Gathering information on DNS, email servers, and IP Address range is called _______.
Footprinting
Gathering information on network user and group names, routing tables, and network management protocols is called ________.
Enumeration
Which protocol is used to break data into packets?
TCP
Which protocol is used to move packets from router to router?
IP
Which protocol reassembles the data packets?
TCP
With regards to computing, what is entropy?
Randomness for use in crypto or other applications that require random data.
What are two sources of entropy?
Hardware sources and randomness generators
Short lived domains are generally used by
Botnets (B)
Disposable domains are generally used by
Adware (A)
Anonymously registered domains are generally used by
Spyware (S)
Kopis and Notos are domain reputation systems. Which one has the global internet view?
Kopis
The number of distinct malware samples connected to IPs is an example of ________ features.
Evidence-based
The average length of domain names and the occurrence freuency of different characters are examples of _________ features.
Zone-based