OasisInterview Flashcards
What is CSRF?
Cross site request forgery is a web application vulnerability where the server does not check whether the request comes from a trusted client or not. The request is processed directly.
What is security misconfiguration?
Security misconfiguration is a vulnerability when a device/application/network is configured in a way which can be exploited by an attacker to take advantage of it. This can be leaving the default username/password unchanged or too simple for device accounts etc.
Definitions of black hat, white hat and grey hat hacker
Black hat: hack without authority.
White hat: authorized to perform hacking
Grey hats: white hat who sometimes perform unauthorized activities
What is a firewall?
Device that blocks/allows traffic as per defined by a set of rules. Placed as boundaries of trusted and untrusted networks
How do you keep yourself updated with information security news?
I follow threatpost and occasionally listen to podcasts like Cybersecurity weekly.
CIA triangle
Confidentiality
Integrity and availability
Explain risk, vulnerability and threat
Risk: measure of potential loss when the vulnerability is exploited by threat
Vulnerability: weakness in a system
Threat: when an attacker exploits a vulnerability
Difference between asymmetric and symmetric encryption and which is better
Symmetric encryption: is the same key for both encryption and decryption. Faster but is transferred over an unencrypted channel
Asymmetric: uses different keys. More secure but slow
Hybrid approach is best. Setting up a channel using asymmetric encryption and sending data over symmetric process
What is an IPS and how does it differ from IDS
IPS (intrusion prevention system): will detect and also take action to prevent intrusion (more noisy)
IDS (intrusion detection system): detect the intrusion and administrator decides what to do next
What is XSS and how will you mitigate it?
Cross site scripting is JavaScript vulnerability in the web applications. User enters script in client side input fields and that input gets processed without validation. Leading to untrusted data getting saved and executed on client side
Example: hacking of MySpace
Countermeasure: input validation, implementing CSP (content security policy)
What is difference between encryption and hashing?
Encryption: reversible. Ensures confidentiality
Hashing: can be cracked but is not reversible. Ensures integrity
HIDS vs NIDS and which one is better and why?
HIDS (host intrusion detection system):
Placed on the host
NIDS (network intrusion detection system): placed on the network
Placement is different
What is port scanning?
Process of sending messages to gather information about network, system, etc. analyzing responses received
Nmap command
Also netstat
Difference between VA and PT
VA: vulnerability assessment: finds flaws in application/network
PT (penetration testing): of finding exploitable vulnerabilities
VA is on the surface and PT is more in depth
What is WAF and it’s types?
WAF: web application firewall. Used to protect the application by filtering legitimate traffic from malicious traffic. Can be box or cloud based