PM - Section 1.3 Threat Actors Flashcards

1
Q

What is a Threat Actor?

A

Someone with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are script kiddies?

A
  • Someone who runs pre-made scripts without any knowledge if whats really happening.
  • Typically external.
  • Found scripts.
  • Hunting for vulnerability for bragging rights.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Hackivist?

A

Looking for specific data.

Funding is possible from crowd source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is organized crime a threat actor?

A

Moitivated by money and it’s very organized

  • someone to hack
  • someone to manage the exploits
  • someone to sell the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an APT?

A

Advanced Persistent Threat - Nation States - Governments.

Very sophisticated, massive resources and can perform constant attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are insiders a threat actor?

A

They have access to everything and know what to hit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to competitors work as threat actors?

A

Might try

  • DoS
  • espionage
  • harm reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PEN Testing?

A

A way to simulate an attack, where you actually to exploit the vulnerabilities, rather than just looking for them.

Often a compliance mandate by 3rd party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where do you get a list of all current threats?

A

National Institute of Standards and Technology (NIST)

National Vulnerability Database (NVD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is passive reconnaissance?

A

A way to gain information via open sources

  • social media
  • corporate website
  • reddit
  • social engineering
  • dumpster diving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is active reconnaissance?

A

Try the doors and see if it locked.

  • Ping scans, port scans
  • DNS queries
  • OS scans, OS fingerprinting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you exploit vulnerabilities with PEN testing?

A

Gain privilege escalation

  • be careful not to cause a DoS
  • try brute force
  • database injections
  • social engineering (test colleagues)
  • buffer overflows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a white box testing?

A

Where the pen tester knows everything - OS, systems, network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is grey box testing?

A

A mix of black and white, the pen tester may get a subset of the different systems, but they still need to figure out what to focus on,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Metasploit?

A

A PEN testing software to exploit software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Metasploit?

A

A PEN testing software to exploit software.

17
Q

What is a vulnerability scan?

A

Usually minimally invasive unlike a PEN test.

Can scan both inside and outside the network.