Midterm Flashcards
Hacking
producing an outcome that the system’s designers never intended or anticipated
Penetration Tester
Simulates cyber attacks for the purpose of improving organizational security. Focus on comprehensiveness.
Red/Purple Team
Simulates cyber attacks like a pen tester,
however, the focus is more on emulating an adversary and testing an organization’s response.
Cyber Operator
Works with or for the military to hunt threats,
protect assets, and provide access to sensitive and secure
environments
Vulnerability Researcher
Searches for yet unknown vulnerabilities
in software or hardware products
Vulnerability Analyst
Analyzes computer networks and/or systems
for the presence of known vulnerabilities
CSIRT (Computer Security Incident Response Team) Analyst or Responder
Respond to and eradicate active threats within an
organization’s computer systems or networks. “Blue” team
Cyber Crime Investigator or Forensic Analyst
Collect and analyze data from computer systems and networks to uncover certain actions or behaviors
Intelligence Analyst
Mitigate risk by collecting and disseminating
information about threats
Software Engineer
Develop and maintain software systems to be resistent to misuse
Ethical Hacking
Combining technical skills and understanding of an
attacker’s mindset to simulate a hostile attacker
IT security audit
Determine whether an organization’s deployed
controls align with the security policy. Focused more on compliance with policy and best practice than assessment
Vulnerability assessment
Survey of a system to identify as many
vulnerabilities as possible. Focused on identifying the vulnerabilities, not necessarily proving that they can be exploited
Penetration test
Assess the security posture of a scoped network
or resource by actively trying to exploit it
Red team
Assess an organization’s response to an emulated adversary
Cyber Operation
Military operation that is an ethical cyber attack or defense
What is the difference between an ethical test and an unethical cyber attack?
Consent
CIA Triad
Confidentiality
Integrity
Availability
Why would a penetration test start from “assumed breach”?
- To provide a test to the customer in the most cost-effective manner
- To accurately simulate insider threats
What are the steps of the Cyber Kill Chain?
Reconnaissance
Scanning
Infiltration and Escalation
Exfiltration
Access Extension
Assault
Obfuscation
CVE
Common Vulnerabilities and Exposures
They represent specific vulnerabilities and exposures.
CWE
Common Weakness Enumeration
They are not specific vulnerabilities, but weaknesses that can lead to vulnerabilities.
Ex. CWE-242: Use of Inherently Dangerous Function
CAPEC
Common Attack Pattern Enumeration and Classification
It is a catalog of types of attacks
Ex. CAPEC-148: Content Spoofing
NVD
National Vulnerability Database
Takes CVEs and pairs them with CVSS severity scores
Open Source Intelligence (OSINT)
derived from data and information that is available to the general public
Footprinting
An adversary engages in probing and exploration activities to
identify constituents and properties of the target
Fingerprinting
An adversary compares output from a target system to
known indicators that uniquely identify specific details about the target
What is the order of Recon?
OSINT
Footprinting
Fingerprinting
Pagodo
A python module which automates performing Google dorks.
WHOIS
allows us to figure out information about a domain and provides
contact information for that domain
RIR
Regional Internet Registry
Nslookup and Dig
query nameservers for DNS records from a particular domain
Hunter.io
used to find emails and contact info from
people at a company
DNSDumpster
Online tool that compiles information from multiple sources to get a better picture of domain information leakage. Uses multiple sources to find subdomains that you
might not know about
Attack Surface
number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data
Vulnerability
A weakness that can be exploited to gain unauthorized access to a computer system