Software Security Tools 2.2 Flashcards

1
Q

Passive Tools

A

Passive security is observing packets and learning. Observing frequent talkers, servers, clients, apps, OS’s, services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Tools

A

Sending traffic to a device and observing the results. Query a login page, try a known vulnerability, actively checking for vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol Analyzer

A

Helps solve complex issues by getting details. Gathers packets on the wired network or wirelessly. Sometimes the ability to capture the packets are built into the device. Views traffic patterns and identifies unknown or unusual traffic. Stores large amounts of data to create big data analytics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Scanners

A

Commonly used to determine what services or OS are running on a remote device. These are commonly told to scan a range of IP addresses in order to find what’s out there. It can then visually map the network based on what it’s found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Scanners and Crackers

A

You need tools to find out what kind of traffic is traversing your wireless network. You also need tools to see if your wireless access points are vulnerable to attacks. Additional tools to see if it easy to crack a password on your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password Crackers

A

Passwords are stored as hashes in most cases. You can turn a pass and turn it into a hash but no way to take a hash and turn it back into a pass. If a hash is stored without and protection such as salting or using a weak hashing algorithm, these hash’s can be brute forced or compared with rainbow tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability Scanners

A

Used to check if you are up to date on security patches. Minimally invasive unlike a penetration test. Gathers as much info as possible and sort information out later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configuration Compliance Scanners

A

Does your device meet minimum security configs? Helpful if you need to comply with internal requirements ore industry regulations. Checks devices for detailed information about your OS versions, installed apps, network setting, anti-virus settings and versions, server configs, etc. Information about all devices are stored on a database and its able to detect if a certain login is coming from a new or updated device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exploit Framework

A

Attackers keep blueprints of previously used or commonly used exploits. They take the blueprint, add code and test the waters. For example, RouterSploit is a router exploitation framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Sanitization Tools

A

Generally if you overwrite the data on a hard drive, its gone forever. There is software to assist with ensuring this occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Steganography Tools

A

Finding an invisible message concealed into an image. Data can also be hidden in network packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeypots

A

Traps designed to entice attackers to waste time. The honeypots can be very elaborate such as creating a large server farm that exists only in a virtual world. Bad guys are aware of these and actively try to avoid them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Backup Tools

A

Real-time file sync, hourly backups, full complete backups. Make sure every device is covered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Banner Grabbing

A

Applications provide information about themselves when you first connect to it. Some give too much information. They sometimes give information about the server they are running on. This data can be captured and used for intel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly