Miscellaneous Flashcards
PEAP
Protected Extensible Authentication Protocol (PEAP) is used to encapsulate EAP messages over a secure tunnel that uses Transport Layer Security (TLS).
phishing in order to trick someone important in the organization?
Whaling refers to targeting a specific individual, usually someone important in the organization
mtd
maximum tolerable downtime
ldap injection
LDAP injection is an attack that can send malicious data to a web form that in turn makes calls or queries to a directory database
CASB
cloud access security broker, define security policies for network traffic flowing outside your on-premises environment to the cloud.
documentary evidence
evidence that is printed
memory usage
It is dynamic and can vary from system to system can’t be configured
tcpdump
tcpdump is a common Linux tool used to capture traffic and store the packets in a file.
most volatile source of evidence
RAM is the most volatile source of information and is easily lost. It must be collected first during a computer forensics investigation
netcat
used to open port or connet to open port
metasploit
exploitation framework comes with diff exploits for diff types of attacks on diff systems
sn1per
automates vulnerability scan
M of N control
The concept of M of N control requires a minimum number of personnel to participate in a key recovery.
Recovery agent
used in Windows EFS implementations, is used to recover a key if an individual leaves an organization.
cross certificate
trust between two ca’s