Misc Personal Notes Flashcards

1
Q

Terms

BIA
MTD
BCP
DRP

A

Business Impact Analysis (includes MTD)
ID systems and processes critical for business operations

Maximum Tolerable Downtime
Way to prioritize the recovery of assets

Business Continuity Plan (includes DRP)
plans and procedures to get business back up and running

Disaster Recovery Plan
plan for recovering lost data or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does this nmap line indicate?

nmap –script http-methods –script-args some system.com

A

it’s looking to find out what HTTP Methods the target website support. So you can see if you can POST, PUT or GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SOAP is used to package and exchange information for web services. What does SOAP use to format this information?

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CSRF, besides a form of session riding?

A

Cross Site Forgery Request

Forces logged on victim’s browser to send a forged HTTP request to a vulnerable web application, allowing attacker to force the victim’s browser to generate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CSPP

lookup paper from Blackhat 2010, Alonso Chema

A

connection string parameter pollution

injection attack, using semicolons to separate parameters in database communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are SOAP messages usually one-way?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attacker inputs the following into the Search text box on an entry form:

   alert("It Worked");

The attacker then clicks the Search button and a pop-up appears stating, “It Worked.”

What can you infer from this?

A

This indicates a cross-site scripting vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security administrator monitoring logs comes across a user login attempt that
reads UserJoe)(&)

What can you infer from this username login attempt?

A

)(&)

Indicates an LDAP injection attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would an administrator set the HttpOnly flag in cookies?

A

This setting prevents cookies from being accessible by a client-side script.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who maintains WebGoat?

What platforms can you install it on?

What does it do?

A

OWASP

almost any, including windows and linux

has lessons showing how vulnerabilities work on a system. For black box testing practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

know dig command line arguments

what does axfr do in a dig command?

A

performs a zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do these commands do?

netsh

netstat -s

sc query

wmic bios get services

A

netsh
modifies network configuration locally or remotely

netstat -s
shows NIC statistics

sc query
sc communicates with service control manager. query command gets status for a service(s)

wmic
manages WMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which tool allows pen testers to analyze links between personnel and/or hardware using graphs and link analysis?

metasploit
maltego

A

maltego shows complexity and severity of single points of failure and trust relationships in your infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Are these OSSTMM process controls?

nonrepudiation
confidentiality
privacy
integrity
alarm
A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does ICMP Type 3, Code 13 indicate?

A

administratively prohibited (firewall or ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a smurf attack a DoS attack using target’s spoofed IP address as a ping?

A

yes

17
Q

Is bloover a blue bugging tool?

A

yes

18
Q

is btCrawler a discovery tool?

A

yes

19
Q

are bbproxy and phonesnoop blackberry tools?

A

yes

20
Q

practice / learn nmap flags. -sV and -O

A
  • O can provide more detail than a simple banner grab

- sV does standard service detection

21
Q

if a hacker has both plain text and cipher text, what is the name of the attack he can do?

A

known plaintext attack

attacker compares plain and cipher texts to each other to find useful patterns

22
Q

In NIST cloud architecture, what does the Cloud Broker do?

NIST-SP 500-292

A

acts to manage the use, performance, delivery of cloud services and relationships between providers and subscribers

It’s the intermediary between consumer and provider, helps consumer through complexity of cloud offerings and may create value added cloud services

23
Q

Are these components of Kerberos?

KDC
AS
TGS
TGT

A

Yes

Key distribution center
authentication service
ticket granting service
ticket granting ticket

24
Q

Does heartbleed take advantage of data echoing acks in SSL, where attacker sends a single byte while telling server it sent 64KB. and sender returns 64KB of random stuff from memory?

A

yes

25
Q

Does Key Escrow allow a 3rd party to access sensitive data if the need arises?

A

yes

26
Q

learn ping flags for windows

  • l
  • a
  • s
A
  • l changes default packet size
  • a resolves hostnames
  • s provides timestamp
27
Q

is tcp port 515 frequently used for printing?

A

yes

28
Q

Do you set HttpOnly flag in cookies to mitigate XSS attacks?

A

yes

29
Q

Does POODLE act as a MITM exploring TLS fallback?

A

yes

30
Q

Is heart bleed an OpenSSL vulnerability

A

yes

31
Q

Is FREAK used as a MITM to downgrade RSA

A

yes

32
Q

Does DROWN allow attackers to break SSLv2

A

yes

33
Q

Does a CNAME record let you alias multiple services to the same IP address?

A

yes

34
Q

nmap flags

-sn

A

ping scan disable port scan

35
Q

nmap flags

-sS/sT/sA/sW/sM:

A

TCP SYN/Connect()/ACK/Window/Maimon scans

36
Q

What component of IPSEC performs protocol level functions to encrypt and decrypt packets?

A

IPSEC Driver

37
Q

What component of IPSEC performs protocol level functions to encrypt and decrypt packets?

A

IPSEC Driver

38
Q

Is the TCP Connect / Full Open Scan

considered one of the most reliable forms of TCP Scanning?

A

yes