Linkedin Notes Flashcards
What are the 7 stages of cyber Kill chain
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions
What are the four tenants of zero trust?
1) Just in time access (jita)
2) Just enough access (jea)
3) Tokenisation or encryption
4) Adaptive policies
At which country was Stuxnet targeted?
Iran. USA wanted to hinder their nuclear programme
An exploit is called zero day until what occurs?
A patch is realised
What is a PUP?
Potentially Unwanted Program
What is the software that is used to store a payload onto a target computer?
dropper
What is the main assumption in a zero trust approach?
The network perimeter has been breached.
Mark Abene was, at different times, in both LOD and MOD. What was his internet nickname?
Phiber Optik
Tasks can be run using mpcmdrun at the command line.
True
Which variant of Linux had a keylogger maliciously installed?
Mint
Does Windows Defender offers cloud protection.
True
What is the EICAR string used for?
testing anti-virus software
What are the three Windows Firewall network types?
domain, private, public
Windows Firewall can mandate secure connections. What protocol does it enforce?
IPSec
NATing is used to filter malware.
False
Zedlan can read normal windows logs.
True
Which iptables parameter do you use to instruct the firewall to block packets?
Drop
What is the normal last command on a set of firewall rules?
Drop all packets
What switch setting can you use to do both TCP and UDP scans?
sSU
What switch setting do you use to do a network scan for active hosts?
sn
Running netcat with only the IP address and port will put it into which mode?
Sender
Which switch can you configure on a sender to set a timeout when doing a file transfer?
w
Session connection can be automated.
True
Netcat can detect the IP address of an incoming connection.
True
Nessus can only scan a single system in a scan run.
False
A web scanner cannot be used to proxy web traffic.
False
Who or what is the victim of a cross-site scripting attack?
a visitor to the target website
Scans can be run with or without credentials.
True
Which company produces the annual Top Ten Web Threats?
OWASP
The Open Worldwide Application Security Project
What logic clause can be injected to achieve an SQL injection attack?
True, 1=1, 0=0
UDP traffic requires a three-way handshake.
False
What kind of traffic does Wireshark capture?
UDP, TCP, Web
HTTP traffic packets are obfuscated.
False