Random Flashcards
Windows file servers commonly hold sensitive files, databases, passwords and more. What common vulnerability is usually used against a windows file server to expose sensitive files, databases, and passwords?
These are commonly missing patches, enabling hackers to take advantage of the vulnerabilities
Which ports are commonly found for printers?
For this type of device, the following ports are often found:
- 515
- 631
- 9100
What term describes the amount of risk an organization is willing to accept?
This is called Risk Appetite
Your organization’s networks contain 4 subnets: 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0. Using NMAP, how can you scan all 4 subnets using a single command?
nmap -P 10.0.0-3.0
What is SOA used for? What is a common vulnerability?
SOA is used by enterprises to efficiently and cost-effectively integrate heterogeneous systems.SOA is most commonly vulnerable to a XML denial of service.
What is the first character that you should use to attempt breaking a valid SQL request?
Single Quote ( ‘ ) is what you should use when doing this.
What NMAP switch would a hacker use to attempt to see which ports are open on a targeted network?
-sO is the option used within Nmap to do this.
What technique does a vulnerability scanner use in order to detect a vulnerability on a specific service?
Analyzing the response received from the service when Probed.
What command could be used to list the running services from the Windows command prompt?
“sc query” is the command that does this
When are LM hashes not generated?
These are not generated when the password length exceeds 15 characters.
What type of malicious application does not require user intervention or another application to act as a host in order for it to replicate?
A Worm does not require this
What is not a step in the NIST SP 800-115 Methodology?
Reporting
Scoping is not a step in this methodology.
What must be developed in order to show security improvements over time?
Metrics must be developed to show these over time
What type of programming language is C# and ASP.NET?
These two languages are compiled languages, not scripting languages.
What tool can be used to scan a network to perform vulnerability checks and compliance auditing?
Nessus is the tool that can scan a network to perform these actions.
What should NOT be included in your final report for the assessment and provided to the organization?
Detailed list of incurred costs should not be a part of this, but rather a part of your invoicing.
What is a formal document that states what will and will not be performed during a penetration test?
Scope of work (SOW) is the document that states this.
What programming language is most vulnerable to buffer overflow attacks? Why?
C++ is most vulnerable to these type of attacks. Many memory manipulation functions in C and C++ do not perform bounds checking and can easily overwrite the allocated bounds of the buffers they operate upon.
A pentester is trying to map the organization’s internal network. The analyst enters the following command (nmap -n -sS -T4 -p 80 10.0.3.0/24). What type of scan is this?
This type of scan is called a Stealth Scan
What is a pentest? What does it check for?
This is an authorized simulated cyber attack against a network or computer system. It checks for vulnerabilities.
Name 4 benefits of a pentest.
- Revealing vulns
- Ensuring Regulatory Compliance
- Maintaining Trust
- Identifying ROI
- Enhancing QA
- Supporting Risk management
- Protecting Organizational Reputation
- Plugging Security Holes before they can be exploited
- Testing Cyber-Defense Capabilities
What are the pentest steps?
- Planning
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Analysis
- Reporting
What is the difference between an exploit and a payload?
These get you into a host/network while the other is the malicious code that you run on the host/network.
Think of the first as kicking a door open and the latter is throwing in a grenade.
What is the CHECK framework?
This was developed in the UK. Ensures that government agencies and public entities can contract with government-approved pen testers.