Misc Personal Notes Flashcards
Terms
BIA
MTD
BCP
DRP
Business Impact Analysis (includes MTD)
ID systems and processes critical for business operations
Maximum Tolerable Downtime
Way to prioritize the recovery of assets
Business Continuity Plan (includes DRP)
plans and procedures to get business back up and running
Disaster Recovery Plan
plan for recovering lost data or services
what does this nmap line indicate?
nmap –script http-methods –script-args some system.com
it’s looking to find out what HTTP Methods the target website support. So you can see if you can POST, PUT or GET
SOAP is used to package and exchange information for web services. What does SOAP use to format this information?
XML
What is CSRF, besides a form of session riding?
Cross Site Forgery Request
Forces logged on victim’s browser to send a forged HTTP request to a vulnerable web application, allowing attacker to force the victim’s browser to generate requests
What is CSPP
lookup paper from Blackhat 2010, Alonso Chema
connection string parameter pollution
injection attack, using semicolons to separate parameters in database communication
are SOAP messages usually one-way?
yes
An attacker inputs the following into the Search text box on an entry form:
alert("It Worked");
The attacker then clicks the Search button and a pop-up appears stating, “It Worked.”
What can you infer from this?
This indicates a cross-site scripting vulnerability
A security administrator monitoring logs comes across a user login attempt that
reads UserJoe)(&)
What can you infer from this username login attempt?
)(&)
Indicates an LDAP injection attempt
Why would an administrator set the HttpOnly flag in cookies?
This setting prevents cookies from being accessible by a client-side script.
Who maintains WebGoat?
What platforms can you install it on?
What does it do?
OWASP
almost any, including windows and linux
has lessons showing how vulnerabilities work on a system. For black box testing practice
know dig command line arguments
what does axfr do in a dig command?
performs a zone transfer
What do these commands do?
netsh
netstat -s
sc query
wmic bios get services
netsh
modifies network configuration locally or remotely
netstat -s
shows NIC statistics
sc query
sc communicates with service control manager. query command gets status for a service(s)
wmic
manages WMI
which tool allows pen testers to analyze links between personnel and/or hardware using graphs and link analysis?
metasploit
maltego
maltego shows complexity and severity of single points of failure and trust relationships in your infrastructure
Are these OSSTMM process controls?
nonrepudiation confidentiality privacy integrity alarm
Yes
What does ICMP Type 3, Code 13 indicate?
administratively prohibited (firewall or ACL)