Random Flashcards

1
Q

Windows file servers commonly hold sensitive files, databases, passwords and more. What common vulnerability is usually used against a windows file server to expose sensitive files, databases, and passwords?

A

These are commonly missing patches, enabling hackers to take advantage of the vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which ports are commonly found for printers?

A

For this type of device, the following ports are often found:

  • 515
  • 631
  • 9100
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What term describes the amount of risk an organization is willing to accept?

A

This is called Risk Appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your organization’s networks contain 4 subnets: 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0. Using NMAP, how can you scan all 4 subnets using a single command?

A

nmap -P 10.0.0-3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SOA used for? What is a common vulnerability?

A

SOA is used by enterprises to efficiently and cost-effectively integrate heterogeneous systems.SOA is most commonly vulnerable to a XML denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first character that you should use to attempt breaking a valid SQL request?

A

Single Quote ( ‘ ) is what you should use when doing this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What NMAP switch would a hacker use to attempt to see which ports are open on a targeted network?

A

-sO is the option used within Nmap to do this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What technique does a vulnerability scanner use in order to detect a vulnerability on a specific service?

A

Analyzing the response received from the service when Probed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command could be used to list the running services from the Windows command prompt?

A

“sc query” is the command that does this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When are LM hashes not generated?

A

These are not generated when the password length exceeds 15 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malicious application does not require user intervention or another application to act as a host in order for it to replicate?

A

A Worm does not require this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is not a step in the NIST SP 800-115 Methodology?

Reporting

A

Scoping is not a step in this methodology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What must be developed in order to show security improvements over time?

A

Metrics must be developed to show these over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of programming language is C# and ASP.NET?

A

These two languages are compiled languages, not scripting languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tool can be used to scan a network to perform vulnerability checks and compliance auditing?

A

Nessus is the tool that can scan a network to perform these actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should NOT be included in your final report for the assessment and provided to the organization?

A

Detailed list of incurred costs should not be a part of this, but rather a part of your invoicing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a formal document that states what will and will not be performed during a penetration test?

A

Scope of work (SOW) is the document that states this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What programming language is most vulnerable to buffer overflow attacks? Why?

A

C++ is most vulnerable to these type of attacks. Many memory manipulation functions in C and C++ do not perform bounds checking and can easily overwrite the allocated bounds of the buffers they operate upon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A pentester is trying to map the organization’s internal network. The analyst enters the following command (nmap -n -sS -T4 -p 80 10.0.3.0/24). What type of scan is this?

A

This type of scan is called a Stealth Scan

20
Q

What is a pentest? What does it check for?

A

This is an authorized simulated cyber attack against a network or computer system. It checks for vulnerabilities.

21
Q

Name 4 benefits of a pentest.

A
  • Revealing vulns
  • Ensuring Regulatory Compliance
  • Maintaining Trust
  • Identifying ROI
  • Enhancing QA
  • Supporting Risk management
  • Protecting Organizational Reputation
  • Plugging Security Holes before they can be exploited
  • Testing Cyber-Defense Capabilities
22
Q

What are the pentest steps?

A
  1. Planning
  2. Reconnaissance
  3. Scanning
  4. Gaining Access
  5. Maintaining Access
  6. Covering Tracks
  7. Analysis
  8. Reporting
23
Q

What is the difference between an exploit and a payload?

A

These get you into a host/network while the other is the malicious code that you run on the host/network.

Think of the first as kicking a door open and the latter is throwing in a grenade.

24
Q

What is the CHECK framework?

A

This was developed in the UK. Ensures that government agencies and public entities can contract with government-approved pen testers.

25
Q

What is OSSTMM?

A

This Open Source Security Testing Methodology Manual. Framework for Security testing and analysis for operational security.

26
Q

What is PTES?

A

This is the Penetration Testing Execution Standard. Basic Lexicon and guidelines for Pentests. The PTES Technical Guide provides specifics.

27
Q

What is NIST-SP 800-115?

A

Technical guide to Information security Testing and Assessment. Developed by NIST. Practical Recommendations for designing, implementing, and maintaining pen test processes and procedures.

28
Q

What is NAC?

A

This is a collection of protocols, policies, and hardware governing device connection.

29
Q

What forms the basis of the SOW?

A

The scope forms the basis of this document.

30
Q

What are the two type of assessments?

A

Objective based (what needs protection?) and Compliance Based (Industry or Government Mandate).

31
Q

How is a compliance-based assessment usually assessed?

A

These are usually assessed using audits of Administrative, Technical, or physical controls.

32
Q

What is the focus of Compliance-based assessments?

A

This type of assessment focuses on:

  • Password Policies
  • Data Isolation
  • Key Management
33
Q

What are some limitations of Client-based assessments?

A

Limitations of this type of assessment are:

  • Network Access
  • Storage Access
34
Q

What is another name for Passive Reconnaissance?

A

Another name for this is OSINT Gathering, Open Source Intelligence Gathering

35
Q

What is information gathering?

A

This is the process of identifying, discovering, and obtaining information that may have relevance to the penetration test.

36
Q

What is OSINT?

A

This is information that is not private. Anyone can obtain without breaking the law.

37
Q

What are some sources for OSINT?

A

Sources for this are:

  • Whois
  • Public Website
  • Public Job Postings
  • Google Search Results
  • Online Blogs
  • News Articles
  • Social Media
  • Info Gathered from DNS, Mail Records, & SSL/TLS Certs
38
Q

What is Whois?

A

This is a protocol that supports querying of data related to entities who register public domains and other internet resources.

39
Q

What do child domains imply?

A

These imply there could be less secure sub-domains or organizations.

40
Q

What are two very popular querying tools?

A

nslookup and dig are tools that perform this function.

41
Q

How would you query for MX records using dig?

A

dig comptia.org -q mx

42
Q

Using Nslookup, what command would we use to obtain additional servers & information?

A

nslookup -type=all example.com

43
Q

How do we view all of the options for Nslookup?

A

Type ‘nslookup’ to be taken the nslookup prompt and then type a question mark ‘?’ in the prompt field.

44
Q

What do MX records do? What would it mean to compromise this?

A

These identify which server handles incoming mail. Compromising this would mean to compromise the lines of communication.

45
Q

What do SPF records do?

A

This validates incoming mail from originating domain. Mitigates email spoofing in spam/phishing.

46
Q

What is shodan?

A

This is a search engine that enables anyone to connect to public or improperly secured devices that allow remote access through the internet.

47
Q

What does FOCA stand for? What does it do?

A

Fingerprinting Organizations with Collected Archives. This tool scans websites for security leaks. Discovers metadata hidden within website documents. Windows Based tool.