SecPlusP4 Flashcards
How does a DNS amplification attack exploit the DNS resolution process?
By sending spoofed DNS queries to open DNS servers
What is one way to mitigate the impact of DNS responses?
Limit the size of DNS responses
How can DNS tunneling be used to bypass firewall rules?
Encapsulates non-DNS traffic over port 53
What is one way to mitigate domain hijacking?
Monitor and analyze DNS logs for unusual patterns
What is a DNS Zone Transfer Attack?
Attempts to obtain an entire DNS zone data copy
What can a DNS Zone Transfer Attack expose?
Sensitive information about a domain’s network infrastructure
What can a Directory Traversal Attack allow access to?
Commands, files, and directories that may or may not be connected to the web document root directory
What character do Windows systems use as the default directory separator?
\
What character do Unix-like systems use as the directory separator?
/
What can directory traversals be used to do?
Access any file on a system with the right permissions
How can attackers hide directory traversal attempts?
Using encoding (%2e%2e%2f represents ../)
What is file inclusion vulnerability?
A web application vulnerability that allows an attacker to download or upload files
What is remote file inclusion?
Injecting a remote file into a web app or website
What is an example of remote file inclusion?
Attacker executing a script with a remote file URL
What is local file inclusion?
Adding a file to a web app or website that already exists on the server
What is an example of local file inclusion?
Attacker adding a file to the web app with server file URL
What do ../ in logs pertain to?
Directory traversals
What is a directory traversal attack?
Attacker tries to access files outside the target directory
How can input validation help prevent directory traversals and file inclusion attacks?
Verify and sanitize user input to ensure it conforms to expected formats
What is arbitrary code execution?
Running an attacker’s code without restrictions
What is remote code execution?
Executing code remotely, often over the internet
What is privilege escalation?
Gaining higher-level permissions than originally assigned
Why is privilege escalation dangerous?
Allows attackers to operate with elevated privileges, such as administrator or root access
What is vertical privilege escalation?
Going from normal user to higher privilege (e.g., admin or root)
What is horizontal privilege escalation?
Accessing or modifying resources at the same level as the attacker
Why is understanding privileges crucial for system security?
Applications inherit the permissions of the user running them
What is a rootkit?
Malware that conceals its presence by modifying system files
What is Ring Zero?
Highest privilege level for the kernel
What are Kernel mode rootkits?
More dangerous due to extensive control
What are Rings 1 to 3?
User-level components with decreasing privileges
Why are Ring Zero rootkits more dangerous?
Extensive control over the kernel
What is a kernel mode rootkit?
Rootkit embedded in the kernel with maximum control
What is a user mode rootkit?
Rootkit attached to user-level components with administrator-level privileges
What is a replay attack?
Malicious re-broadcasting or delaying of valid data transmissions
How is a replay attack different from a session hijack?
In a session hijack, the attacker alters real-time data transmission while in a replay attack, the attacker can decide later whether to retransmit the data
Where can replay attacks occur?
Banking, email, online shopping, social media, wireless authentication
What is a credential replay attack?
Capturing user’s login credentials and reusing them for unauthorized access
How can replay attacks be prevented?
Use session tokens, implement multi-factor authentication, use security protocols like WPA3
What is the purpose of a cookie?
To store information about a user when they visit a website
Why must cookies be protected?
They contain client information transmitted across the Internet
What are session cookies?
Non-persistent, reside in memory, deleted when browser is closed
What are persistent cookies?
Stored in browser cache, deleted by user or expiration date
What should be done to cookies that store confidential information?
Encrypt them
How can session hijacking attacks occur?
Theft or modification of cookies
What is a session prediction attack?
Attacker predicts session token to hijack a session
What is the requirement for generating a session token?
Non-predictable algorithm and no session information
What is cookie poisoning?
Modifying a cookie to exploit web app vulnerabilities
What is an on-path attack?
Attacker positions between hosts to intercept communication
What are some methods for On-Path Attacks?
ARP Poisoning, DNS Poisoning, Rogue Wireless Access Point, Rogue Hub or Switch
What is ARP Poisoning?
Manipulating ARP tables to redirect network traffic
What is DNS Poisoning?
Altering DNS responses to reroute traffic
What is a Rogue Wireless Access Point?
Creating a fake wireless access point to intercept traffic
What is a Rogue Hub or Switch?
Introducing a malicious hub or switch to capture data on a wired network
What is a Replay Attack?
Capturing valid data and replaying it immediately or with a delay
What is a relay attack?
Attacker becomes part of conversation
What is the role of the attacker in a relay attack?
Serves as a proxy to read or modify communication
What is one challenge faced by attackers in relay attacks?
Difficulty in intercepting and crafting communication due to encryption
What encryption scheme can pose significant challenges for attackers in relay attacks?
TLS 1.3
What is SSL stripping?
An attack that tricks the encryption application into presenting an HTTP connection instead of HTTPS
What does SSL stripping enable attackers to do?
Capture unencrypted data when the user believes they are using a secure connection
What is a downgrade attack?
An attacker forces a client or server to abandon a higher security mode in favor of a lower security mode
What is the scope of downgrade attacks?
Downgrade attacks can be used with various encryption and protection methods, including Wi-Fi and VPNs
What situations are vulnerable to a downgrade attack?
Any situation where a client agrees to a lower level of security that is still backward compatible
What are injection attacks?
Unspecified
What is LDAP?
An open application protocol for accessing and maintaining distributed directory information services
What is LDAP Injection?
An application attack that targets web-based applications by fabricating LDAP statements
How to protect against LDAP injection?
Use input validation and input sanitization
What is command injection?
Executing shell commands via a vulnerable web application
What is process injection?
Executing arbitrary code in a separate live process
What are some methods of process injection?
Injection through DLLs, Thread Execution Hijacking, Process Hollowing, Process Doppel Ganging, Asynchronous Procedure Calls, Portable Executable Injections
How can process injection be mitigated?
Endpoint security solutions, Security Kernel Modules, Least Privilege, Indicators of Compromise
What are indicators of compromise?
Forensic data that identify potentially malicious activity
What does IoC stand for?
Indicators of Compromise
What is account lockouts?
Locking an account due to multiple failed login attempts
Why is balancing security with usability crucial when implementing account lockout?
To avoid locking legitimate users out
What does concurrent session usage refer to?
Multiple active sessions from a single user account
What does blocked content involve?
Attempts to access or download content blocked by security protocols
What does blocked content suggest?
User trying to access malicious content or an attacker attempting to steal data
What are indicators of impossible travel in account logins?
Geographically distant locations and unreasonably short timeframe
What can unusual spikes in resource utilization indicate?
Malware infections or DDoS attacks
What is resource inaccessibility in relation to security attacks?
Inability to access files, databases, or network services
What does out-of-cycle logging indicate?
Attacker trying to hide activities during off-peak hours
What does missing logs suggest?
Logs have been deleted to hide attacker activities
What are some examples of published articles or documents that attackers can use to publicly disclose their actions?
Social media, hacker forums, newspaper articles, victim’s own website
What is the purpose of hardening in security?
Strengthen overall security posture and resilience against cyberattacks
What are some measures of hardening?
Apply security patches, configure access controls, disable unnecessary services
What are default configurations in security?
System or application settings that are pre-set by the vendor
What is the purpose of restricting applications in security?
Prevent unauthorized or malicious software from running
What is a method to identify unnecessary services?
System audit or vulnerability scanning
What are the risks and consequences of running unnecessary services?
Increased attack surface
How can disabling unnecessary services reduce the attack surface?
By reducing potential entry points for attackers
What are trusted operating systems?
Operating systems with rigorous security evaluations and certifications
What is the role of Group Policies in Windows environments?
Central management and control of user and computer settings
What is SELinux?
Security-Enhanced Linux, implementing mandatory access controls for enhanced security
What are the different levels of data encryption?
Full-disk, Partition, File, Volume, Database, Record Level Encryption
What is the purpose of secure baselines?
Establishing a secure starting point for minimizing security risks
Why should default passwords be changed?
To ensure security
How often should passwords be rotated?
Every 90 days
What should be used to manage passwords?
Password manager
What should be done with unneeded ports?
Close them
What should be done with enabled ports and protocols?
Audit them
What should be used instead of insecure protocols?
Secure versions
What should be done with extra open ports?
Close the insecure ones
What can be done to restrict applications?
Implement application restrictions
What is the goal of least functionality?
To provide only the necessary applications and services
Why should unneeded applications be restricted or uninstalled?
To reduce vulnerabilities
Why is keeping software up-to-date important for security?
To ensure the latest security patches and fixes are applied
What is the challenge with managing software in large networks?
Controlling excessive installations
What are secure baseline images used for?
To install new computers
What does a secure baseline image include?
OS, minimum required applications, and strict configurations
How should secure baseline images be updated?
Based on evolving business needs
Why is preventing unauthorized software installation important?
It poses security risks
What are application allowlisting and blocklisting used for?
To control which applications can run on a workstation
How does application allowlisting work?
Only approved applications are allowed to run
What happens to applications not on the approved list in application allowlisting?
They are blocked from running
What is a Trusted Operating System (TOS)?
Operating system that enforces stringent security policies
What is Evaluation Assurance Level (EAL)?
Security standard for assessing security controls in an OS
What is the highest level of assurance?
EAL 7
What is mandatory access control?
Access permissions determined by system administrators and enforced by operating system
What is security auditing?
Process of monitoring and analyzing computer systems to ensure they are operating securely
What is role-based access control?
Access permissions determined by roles assigned to users
What is an example of a trusted operating system?
SELinux
What does Trusted Solaris offer?
Secure multi-level operations with MAC and detailed system audits
How does Trusted OS enhance security?
By using microkernels and minimizing the trusted base
What should be considered when choosing an operating system?
Balancing security with usability, performance, and functional requirements
What are the two methods of patch management?
Manual and Automated
What is a hotfix?
A software patch that solves a security issue and should be applied immediately
What is an update?
Provides additional functionality but doesn’t usually patch security issues
What is a service pack?
Includes all hotfixes and updates since the release of the operating system
What are the risks of updates?
They can introduce new vulnerabilities
What does effective patch management involve?
Assigning a dedicated team to track vendor security patches
What is the importance of establishing automated system-wide patching for OS and applications?
1
How can cloud resources be included in patch management?
2
What are the categories for prioritizing patches?
2
Why is it important to create a test environment for critical patches before production deployment?
1
What is the purpose of maintaining comprehensive patching logs?
3
How can firmware updates be evaluated, tested, and deployed?
2
How can urgent patches be deployed to production?
2