Misc Flashcards

1
Q

Nmap TCP SYN scan is also known as?

A

Stealth scan or half open scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nmap -sI (capital i)

A

Zombie scan/decoy also known as Idle scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST 800-53

A

Information security standard that provides a category of privacy and security controls for information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CVSS Base Metrics
AV
AC
PR
UI
S
C
I
A

A

AV (Attack Vector) N=Network, A=Adjacent, L=Local, P=Physical

AC (Attack Complexity) L=low, H=High

PR (Privileges Required) N=None, L=Low, H=High

UI (User Interaction) N=None, R=Required

S (Scope) U=Unchanged, C=Changed

Confidentiality, Integrity, Availability
H=High, L=Low, N=None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

High Risk Ports

A

SSH 22, Telnet 23, FTP 20 & 21, NetBIOS 137-139, SMB 445, DNS 53, POP3 110, RDP 3389, SMTP 24, SQL 3306

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SLA

A

Service Level Agreement
Contract with performance metrics, how they are measured, penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MOU

A

Memorandum of Understanding
Not binding, outlines plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IoC

A

Indicator of Compromise
Behavioral- change login patterns, excessive file access or sharing, access unauthorized resources

Network- abnormal traffic patterns, access from malicious IP, multiple failed logins, malware

Host-Based- Process ID, registry keys, network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Infrastructure Assessment Tools

A

Pacu
Prowler
Scout Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Open Source Security Testing Methodology Manual (OSS TMM)

A

Developed by ISECOM and used for security testing and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Beaconing Traffic IoCs

A

Regular
Small footprint (might be just SYN)
Changing IPs and domains
Protocols: IRC, DNS, HTTP(S), social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Peer-to-Peer (P2P) Communication IoCs

A

Hidden in SMB or IPP
ARP/man in the middle using ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rouge Devices IoCs

A

Rouge devices can be unaccounted for and/or unwanted
Detection: human eye, network mapping, NAC and intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nonstandard Port Usage IoCs

A

Well know ports: 0-1023 TCP/UDP
Registered ports: 1024-49151 TCP/UDP
Dynamic and private: 49152-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Exfiltration IoCs

A

Stealing data
HTTP(S) channel with public storage services
Web app attacks (SQLi)
DNS as a channel
E-mail, P2P, IM
Encrypted tunnels (IPsec, SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Convert Channel IoCs

A

Outbound traffic is seldom filtered
Encoding data in protocol headers
Fragmentation
Encryption
Steganography

17
Q

Host-Based IOCs

A

Malicious Processes
Registry Changes
Network Traffic
High Resource Usage

18
Q

UEBA

A

User and Entity Behavior Analysis

UEBA is a cybersecurity solution that uses algorithms and machine learning to detect anomalies in the behavior of both users and devices.