Lesson 5: Analyzing Vulnerability Scans Flashcards
dpkg -l | grep chkrootkit is used to
find if the chkrootkit file is installed on the system.
locate chkrootkit is used to
find the chkrootkit file.
echo $PATH is used to check if the /usr/sbin:
path is known to the command interpreter.
chkrootkit is used to
detect rootkits.
The Common Vulnerability Scoring System (CVSS) is an industry-standard for
assessing the severity of security vulnerabilities. It provides a technique for scoring each vulnerability on a variety of measures.
The attack vector metric describes how an attacker would exploit the vulnerability there are 4 of them?
Physical (P)
Local (L)
Adjacent Network (A)
Network (N)
The attack complexity metric describes
the difficulty of exploiting the vulnerability
The privileges required metric describes the type of
account access that an attacker would need to exploit a vulnerability
The user interaction metric describes whether the attacker needs to
involve another human in the attack
The confidentiality metric describes the type of
information disclosure that might occur if an attacker successfully exploits the vulnerability
The integrity metric describes the type of
information alteration that might occur if an attacker successfully exploits the vulnerability.
When a scanner reports a vulnerability that does not exist, this is known as a
false positive error.
When a vulnerability scanner reports a vulnerability, this is known as a positive report. This report may either be an accurate
(true positive report) or inaccurate (a false positive report).
When a scanner reports that a vulnerability is not present, this is know as a
negative report.
Buffer overflow: when an attacker manipulates a program into placing
more data into an area of memory than is allocated for that program’s use.