Operations and Incident Response Flashcards
Exact Data Match (EDM)
a pattern matching technique that uses a structured database of string values to detect matches
Cain and Abel
a popular password cracking tool
it can recover many password types using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute-force and cyrptanalysis attacks
Diamond Model of Intrusion Analysis
is constructed around a graphical representation of an attacker’s behavior
an excellent methodology for communicating cyber events and allowing analysts to derive mitigation strategies implicitly
SHA-256
one of the most common hash algorithms in use and is employed in many applications and protocols
has a 256-bit length output
Port Scanning
technique used to identify open porrts and services available on a network host
Order of Volatility
digital evidence
Processor Cache
Random Access Memory
Swap File
Hard Drive or USB Drive
FTK Imager
can create perfect copies or forensic images of computer data without making changes to the original evidence
Chain of Custody
list of every person who has worked with or who has touched the evidence that is a part of an investigation
tracert
trace route
disgnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo packets to the destination
netstat
used to display active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols) on a Windows machine
Netflow
flow analysis tool
does NOT capture the full packet capture of data as it crosses the network sensor but instead captures metadata and statsitics about the network traffic
Hping
a TCP/IP packet assembler and analyzer
handy little utility that assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies
particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities
What tool can be used as an exploitation framework during your penetration tests?
Metasploit
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development
Protocol Analyzers
Sniffers
used for packet capture
What is MD-5 most susceptible to?
Message Digest 5
Collisions
MD-5 is also vulnerable to rainbow table attacks and pre-image attacks