Labs Flashcards
- According to the Critical Security Controls, which of the Critical Security Controls is considered the most important to reducing risk in an enterprise environment?
CIS Control 1: Inventory and Control of Hardware Assets
- According to the Critical Security Controls, which of the Critical Security Controls is considered the least important to reducing risk in an enterprise environment?
CIS Control 20: Penetration Tests and Red Team Exercises
- Which of the Critical Security Controls specifies conducting security awareness training for a company’s employees
CIS Control 17: Implement a Security Awareness and Training Program
- Which of the Critical Security Controls is used when a potential security incident occurs within a
Company?
CIS Control 19: Incident Response and Management
- Which of the Critical Security Controls would application developers be most interested in?
CIS Control 18: Application Software Security
- The NSA ANT Catalog is a list of technological solutions available to NSA team members. What does ANT stand for?
Advanced Network Technology
- What is the name of the NSA “elite hacking force”?
Tailored Access Operations / Computer Network Operations
What is the name given to the NSA hacking group by outside malware companies?
The Equation Group
- Who does Jack Rhysider interview for the podcast? What is the name of the interviewee’s company?
Jake Williams, Rendition InfoSec
- What is the Twitter handle of the person interviewed during the podcast?
MalwareJake
- Once the Shadow Brokers group stole NSA hacking tools, what did they attempt to do with the stolen tools?
Sell the information to the highest bidder
- Who did the Shadow Brokers refer to as “Dirty Grandpa”?
Joe Biden
- The Shadow Brokers stated that they had supported which President of the United States?
Donald Trump
- What was special about the interviewee that the Shadow Brokers revealed to the world?
He was a former member of TAO / The Equation Group
- What is the name of the institute that the interviewee teaches for?
SANS Institute
- What is the name of the exploit created by TAO which can be used to take full control of a Microsoft Windows system over SMB?
Eternal Blue
- How would an organization protect its Windows systems from the eternal blue exploit
Update Windows, an update came out that fixed the vulnerability a month earlier.
- The Shadow Brokers are believed to be aligned with which country?
Russia
- Why did the interviewee cancel travel to Singapore after the Shadow Brokers revelation that he was a member of TAO?
He may have played a part in TAO’s targeting of China. He could have been arrested.
- What is a “Zero Day” exploit?
An exploit that takes advantages of a vulnerability that is not yet known by security professionals. They have had “zero days” to prepare for the exploit.
- Chris mentions ‘d0x’ attacks or ‘d0xing’ a target. What is he describing?
Gathering personal information on his target
- What is Chris’ mantra for professional social engineering engagements?
“Leave them feeling better having met you.”
- What type of background noise does Chris use during his pretext phone call? (14:00)
Crying “sick” child
- In this same phone call from Question #4, Chris pretends to be his target’s what?
Personal assistant
- What is the domain name of Chris Hadnagy’s main site which teaches people about the risks associated with social engineering?
www.social-engineer.com
- What is the command line (non-GUI) version of Wireshark?
Tshark
- How long is an MD5 hash in bits?
128 bits
- How many bytes are displayed in an MD5 hash?
16 bytes
- How long is a SHA256 file hash in bits?
256 bits
- How many bytes are displayed in a SHA256 hash?
32 bytes
- Why would a member of law enforcement need to calculate the file hash for a file? (Minimum 25 words)
To make sure that they are downloading the file they intend to. If the file has been tampered with by a man in the middle.
- Why would someone else want to calculate a file hash after downloading a file? (Minimum 25 words)
Similar reasons as above. To make sure the file has not been tampered with. They can also be used to make sure the file did not get corrupted during the download.
- What is the first phase of Penetration Testing? Provide a brief overview of this phase (Minimum 25 words).
Pre-engagement: Where you discuss your plan with the organization. What is the scope of your test? What are the rules you need to follow? Once you have obtained authorization from the organization, you can begin phase 2.
- What is the second phase of Penetration Testing? Provide a brief overview of this phase (Minimum 25 words).
Engagement: This is where you actually begin investigating and “attacking” the organization. You will search for vulnerabilities in devices, networks, or employees. Once you have sufficient information you attempt to gain access to the organization through exploiting those vulnerabilities.
- What is the third phase of Penetration Testing? Provide a brief overview of this phase (Minimum 25 words).
Post-engagement: Creating a “findings report” consisting of the findings from penetration testing. Explain the vulnerabilities you found and suggest steps to fix them. Once those fixes have been implemented, you may want to validate that those fixes have stopped the vulnerabilities. Finally, hold a meeting with members of the organization and discuss your findings and actions taken to remedy them.
- The difference between an attacker and a penetration tester is that a professional penetration tester will always have what?
Authorization from the organization being “attacked”
- Using an automated scan to find security vulnerabilities is referred to as a what? How does this differ from a penetration test? (Minimum 25 words)
Vulnerability scan. A vulnerability scan usually comes before a penetration test and is, as the name suggests, a scan that detects potential vulnerabilities. A penetration test is where an ethical hacker attempts to attack and gain access to the organization’s systems.
- What is the name of the penetration testing framework established by a number of thought leaders in the penetration testing community?
Penetration Testing Execution Standard (PTES)
- What are the three different types of penetration tests? Describe each in enough detail for someone who is not familiar with the concept could understand. (Minimum 25 words).
The first type is Black Box, where no information about the organization is given to the tester beforehand. In the second type, White Box, any information the tester requests is given from the organization (such as IP addresses). Finally, Grey Box is a middle ground. Some information is provided to the tester, but it is limited.
- What is a type of attack that is usually not conducted during a penetration test? Why? (Minimum 25 words).
Denial of Service (DoS) attacks. These are not usually performed because it can affect the availability of the organizations systems. This can prevent the organization from functioning properly during the test.
- What is the final deliverable a penetration tester would provide to a client once the penetration test is complete? What are three things that this final deliverable should include? (Minimum 25 words)
Penetration Test Report. This should contain information on vulnerabilities that were found, how serious they are. and what actions can be taken to mitigate them. The report should be written so that people without technical knowledge can understand it.
- Access the dnslytics.com site and run a search for the gvltec.edu domain. What type of information is displayed under “WHOIS Information”?
Information about the domains in the registry database, The registrant of the domain, administrative and technical contact information, name servers, and domain registration, updated, and expiration dates.
- What version of Microsoft Windows server supports IIS 7.5?
Windows Server 2008 R2
- What is the main security concern with companies running IIS 7.5 after January 14th, 2020?
Software has reached EoL (End of Life) and will no longer be supported
- Before you can conduct a web app assessment against any of the web applications associated with the gvltec.edu domain, what do you need to do before conducting any active scans?
Gain authorization from the owner of the web site (Greenville Tech in this case)
d. Why would a port show as being filtered?
A firewall is being used to filter network traffic
- Where did Cliff Stoll work when he was asked to investigate an accounting anomaly?
Computer center of Laurence Berkeley lab
- What is the name of the original account that Cliff Stoll identifies initially as having some initial configuration issues related to the accounting anomaly?
Hunter
- In the network attack scenario discussed with regards to “Locard’s Exchange Principle”, what were three different locations described where digital evidence could be left by a cyber attacker?
Sensor connected to a tap, Firewall, Database Activity Monitor
- Cliff Stoll is contacted by an outside entity that someone at LBL attempted to hack them. What was the name of the outside entity and the name of the system that was being targeted?
DockMaster
- As Cliff investigates, he tracks down a user account associated with the attack traffic described in Question #5 above. What is the name of this account?
Sventek
- What protocol is used to synchronize the system clocks on computer systems?
Network Time Protocol
- What was an interesting fact about the legitimate owner of the user account Sventek which makes Cliff Stoll believe there could be a cyber intruder on the network?
Sventek was in Cambridge, England at the time.
What are the names of the three main Windows event logs?
Application, Security, System.
- Under ‘Windows Logs’, click on the ‘System’ event log. Run a search for Event ID 6013 using the ‘Find’ option. What type of information does the event display?
Total system uptime
Why might a security analyst want to perform a backup of an event log?
In order to record a suspicious event or series of events in order to view them later or on another system.
- Search the Security event log for Event ID 4624. What is the purpose of this Event?
Logging a successful login attempt.
- If you see Event ID 4740 in the Security event log, what type of attack could be happening? If the event was not generated by malicious activity from an attacker but a normal user, what could be happening?
An attacker could be trying to crack a user’s password.
A user could have forgotten their own password.
- If a user is a system administrator for an organization, how many different user accounts (at a minimum) would they have? Why? (25 – 50 words)
Admins should have two accounts. The admin account should only be uses when required. The system administrator should also have a regular user account for more mundane usage.
- When investigating suspicious activity today, what is one location a system administrator or security analyst might review for a record of activity on the system?
logs
- Which software had vulnerability in it that allowed the attacker to overwrite another file on the affected system?
gnu emacs