Study Deck Flashcards

1
Q

Human Rights 1998

A

Act to give effect to the rights and freedom guaranteed under the European Convention of Human Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Protection 1998

A

Act to provide the regulations of the processing of information related to individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Police and Justice Act 2006

A

Act to establish a national policing improvement agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer Misuse Act 1990

A

Act to secure computer material against unauthorised material. Criminalises the act of accessing or modifying data stored on a computer system without permision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Well-known ports

A

0-1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Registered ports

A

1024-49,151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dynamic and private ports

A

49,152-65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP type 0

A

Echo Reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICMP type 3 (code 0-3)

A
Destination Unreachable 
Code 0 - Network Unreachable
Code 1 - Host Unreachable
Code 2 - Protocol Unreachable
Code 3 - Port Unreachable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP type 5

A

Redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICMP type 8

A

Echo Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP type 11

A

Time Exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ICMP type 12

A

Parameter Problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Traceroute

A

Tracks utility tracks the route that packets have taken from a network on their way to a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI

A

Open System Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI Layer 7

A

Application - Human computer interactions - HTTP, FTP, SMTP, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI Layer 6

A

Presentation - ensures data is in a usable format and is where data encryptions occurs - Proxies, Firewalls, encryption compressions and character sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSI Layer 5

A

Session - Maintains connections and is responsible for controlling ports and sessions - Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OSI Layer 4

A

Transport - transmits data using transmission protocols such as TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OSI Layer 3

A

Network - decides which physical path the data will take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSI Layer 2

A

Data Link - defines the format of data on the network - WAN, LAN protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

OSI Layer 1

A

Physical - transmits raw bit stream over physical medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Ingress Filtering

A

Concept of fire-walling traffic that enter the network from external sources such as the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Encryption

A

Process whereby data is transformed in a way to guarantee confidentiality - requires secret to be used (key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

MD5

A

Message Digest Algorithm - Ron Rivest and uses 128-bit key - Vulnerable to rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SHA

A

Secure Hash Algorithm
Hash function designed by NSA
SHA-1 160-bits
SHA-2 256/512 bits block sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HMAC

A

Hash-based Message Authentication Code - MAC is used to authenticate a message and provide integrity and authenticity assurance on messages

Works with other hash such as HMAC-SHA1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RSA

A

Rivest Shamir Adleman - Public key cryptography algorithm.
Slower than symmetric key algorithm but suitable for encryption (keys are much longer)

Uses two distinct prime numbers that can’t be factored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DES

A

Data Encryption Standard - old type of block cipher used in 1970s as an encryption standard - 64 bit block cipher using 54 bit key (Replace by AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Triple DES (3DES)

A

Triple Data Encryption Standard - applies cipher algorithm three times on each cipher block Block size is 64 bits but key can be up to 168 bits (Replaced by AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

AES

A

Advanced Encryption Standard - Symmetric key encryption standard with three standards - AES 128, AES 192, AES 256. Cipher block is 128 bits but keys are 128,192,256 bits respectively

Used in WPA2, remote control applications and windows encrypting file system like bit locker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

RC4

A

Stream Cipher used in protocols such as SSL, WEP, RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

PGP

A

Pretty Good Privacy - Used for signing, encrypting and decrypting emails in order to increase the security communication - PGP uses symmetric key sessions (pre-shared keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IPSEC

A

Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

AH

A

Authentication Header - Provides a mechanism for authentication only - (Integrity) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ESP

A

Encapsulating Security Payload - Provides data confidentiality (encryption) and authentication (data integrity, data origin auth and replay protection).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

SA

A

Security Association - The IPsec protocols use a security association, where the communicating parties establish shared security attributes such as algorithms and keys. As such IPsec provides a range of options once it has been determined whether AH or ESP is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

ISAKMP

A

Internet Security Association and key management protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

SSL

A

Secure Sockets Layer - Protocol used to secure websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

TLS

A

Transport Layer Security - Protocol used to secure websites- TLS 1.3 latest version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

WEP

A

Wireless Equivalent Privacy - 802.11 defined as method to make wireless link equivalent to wire connection - uses RC4 (on data frames) - Shared key security method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

TKIP

A

Temporary Key integrity protocol - used to make WEP more secure - 802.11I - Per packet mixing function - Message intergrity Code (MIC function) - enhanced IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

WPA

A

WPA improves on WEP in that it provides the TKIP encryption scheme to scramble the encryption key and verify that it hasn’t been altered during the data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

PSK

A

Pre shared key - used in WPA and users enter shared secret in AP or client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

SUID

A

u+s - File executes as owner o the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

SGID

A

g+s - File executes as the group owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Sticky Bit

A

Sets a special restriction on deleting files. Only owner of file and root can delete files within directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Umask

A

a command that determines the settings of a mask that controls how file permissions are set for newly created files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

netstat -noa

A

List processes and associated network socket in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

netstat -lptu

A

List processes and associated network socket in Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

lsof -i

A

List processes that own a file or directory (linux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

‘wmic qfe list’ or ‘wmic qfe list full’

A

(Quick Fix Engineering) Windows command that lists all patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

uname -a

A

Check which kernel version linux os is running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

WHOIS

A

Queries Top Level Domain (TLD) port 43

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

RIR

A

Regional Internet Registry
ARIN - American Registry of Internet Numbers
APNIC - Asian Pacific Network Information Centre
LACNIC - Latin America and Caribbean Network Information Centre
AfriNIC - African Network Information Centre
RIPE NCC - Europe, West Asia and former USSR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DNS

A

Domain Name Server - Port 53 TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A Record

A

Maps host name to IPv4 Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

CNAME

A

Maps multiple names (alias) to A record

Canonical Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

MX

A

Mail Exchange - Maps a domain to a mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

NS

A

Name Server - Assigns a DNS zone to access the give authoritative name servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

PTR

A

Pointer - Maps IP addresses to the host names for reverse look ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

SOA

A

Start of Authority - Specifies authoritative info for a DNS zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

HINFO

A

Host Information Resource Record - Provide OS and platform info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

SRV

A

Service Locator - Specifies a generic service location record for newer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

AAAA

A

Maps host name to IPv6 Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Dig

A

Can be used to preform DNS Zone Transfer - dD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Telnet

A

Port 23 - Provides remote access to servers and network equipment - Can be used to get banner from hosts to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

SSH

A

Secure Shell Protocol - Port 22 - Replaced Telnet (Ssh more secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

TFTP

A

Trivial File Transfer Protocol - UDP port 69 - Used for unauthenticated file transfers - Need file name and exact location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

SNMP

A

Simple Network Management Protocol - UDP port 161 - Designed to provide information about network devices, software and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

SNMP MIB

A

Simple Network Management Protocol Management information base which is implemented by some vendors and contain vendor specific information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

NTP

A

Network Time Protocol - UDP port 123 - Can be queried for host name OS and ntp version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

PCAP

A

Packet Capture - API that captures live network packet data.

Type of Files: .PCAP,Libpcap,WinPcap,PCAPng,Npcap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

ARP

A

Address Resolution Protocol - Used by the internet protocol (IPv4) to map IP network addresses to hardware addresses (MAC Addresses) used by the data link protocol.

ARP Request,reply
RARP Request,reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

DHCP

A

Dynamic Host Configuration Procotol - UDP - used to provide local systems’ network settings such as IP address, subnet, default gateway and DNS.
port 67 68

77
Q

Cisco Discovery Protocol (CDP)

A

Runs on all media that support Subnetwork Access Protocol; LAN,Frame Relay and ATM media - Data link Layer only

78
Q

Hot Standby Router Protocol

A

Provides redundancy for IP Networks, ensuring that traffic can transparently recover from first hop failures.

79
Q

Virtual Router Redundancy Protocol

A

VRRP - Computing networking protocol that provides for automatic assignment of available Internet Protocols routers to participating hosts

80
Q

VLAN Trunking Protcol

A

provides a way for engineers to distribute VLAN configuration information among switches

81
Q

Spanning Tree Protocol

A

STP (STP) was introduced into the networking world as a means to prevent layer 2 network loops (frame broadcast storms) from disrupting the service of a local area network.

82
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, TACACS+ is a separate protocol that handles authentication, authorization, and accounting (AAA) services

83
Q

VOIP

A

Voice Over Internet Protocol -

84
Q

PBX

A

Private branch exchange - Cost effect solution to telephony services in small and medium sized companies because it provides flexibility and intercommunication throughout companies.

85
Q

SCCP

A

Skinny Call Control Protocol - lightweight protocol used in IP telephony and call management - developed by Cisco

86
Q

SIP

A

Session Initiation Protocol - Session management protocol - UDP and TCP and supports TLS

87
Q

SIP Methods

A

INVITE, ACK, BYE, CANCEL, REGISTER, OPTIONS

88
Q

WPA2

A

device supports TKIP and AES

89
Q

LEAP

A

Lightweight Extensible Authentication protocol - LEAP takes an MS CHAPv2 challenge and responses and transmits them clearly over the wireless network - Password used - Made from CISCO

90
Q

PPTP

A

Point to point tunnelling protocol - TCP 1723 - to negotiate and establish connection and IP 47 (GRE) for data communication (legacy protocol)

91
Q

mysql

A
Port 3306 (Maria db is free version)
netstat or telnet to ID version
92
Q

ms-sql

A

Microsoft SQL Server
TCP 1433
1434(SSRS) - provides referral service for mutiple SQL server instances
TCP 2433 - Hidden Mode

93
Q

oracle

A

Use Transparent Network Substrate (TNS Protocol) to connect to the database port 1521 or (1526,1541)

94
Q

Oracle DBSNMP User

A

used by OEM (Oracle Enterprise Manager) intelligent agent to log on automatically to remote servers, to provide information to oracle enterprise manager - SELECT ANY DICTIONARY priv needed
Default password needs to be changed to prevent access to sys.user$

95
Q

Ms-sql server stored procedures

A

No output from Store procedure because not ran on the front end presentation tier

xp_cmdshell - query and execute OS calls directly
sp_makewebtask - dump results of SQL SELECT to HTML file
xp_regread - dump registry keys from database server and can obtain password

96
Q

Threat modelling

A

designing of security flaws or vulnerability of an application by thinking based on specific functionality.

User Functionality
Business Logic
Software Package version installed on the system

97
Q

XXS

A

Cross Site Scripting is a common attack vector that injects malicious code into a vulnerable web application.

98
Q

SQL Injection

A

Attacker modifies a string that he/she knows will be processed by an SQL server running in the backend to form an SQL.

99
Q

NetBIOS Name Server

A

UDP port 137 - Provides NetBIOS Name Table - nbtstat -n or nbtstat -A IP

100
Q

net user /domain

A

list local and global groups user belongs to

101
Q

NetBIOS name server, NetBIOS Datagram Service and NetBIOS session Service

A

UDP 138- gets info from datagram header and store in NetBios name cache and
TCP 139 - Authentication across windows workgroups or domain and provides access to resources such as printers

102
Q

net view

A

used to show all computers within a network

103
Q

net share

A

will show accessible SMB shares

104
Q

SYSVOl

A

Important part of AD - SYSVOL folder is shared on an NTFS volume on all domains controllers in a domain and used to deliver policy and logon scripts to domain members

105
Q

SNMP

A

Simple Network Management Protocol - UDP 161 - found on infrastructure devices such as switches and routers

106
Q

LDAP

A

Lightweight Directory Access Protocol - Provides directory information to clients

LDAP Global Catalogue (GC) TCP 3268 - ldapsearch is a tool used for enum

107
Q

FSMO

A

Flexible Single Master Operations - Five roles divided used in AD

108
Q

Schema Operation master

A

Primary Domain Controller - Emulator operation master - Only one allowed in the forest - Only DC that can update AD schema

109
Q

Domain naming operation master

A

The relative Identifier (RID) operation master - Responsible for adding and removing DC to and from the AD forest

110
Q

Primary Domain Controller Emulator Operation Master (PDC)

A

PDC operation master role is domain wide setting (each domain in forest will have one) - responsible for synchronisation - PDCs sync time with forest root domain PDC role-holder and sync time with external time sources - ALSO, responsible for password change replications

111
Q

Relative ID Operation Master Role (RID)

A

Domain wide setting (each domain has one) - responsible for maintaining a poll of relative identifiers that will be used when creating objects in the domain - RID is used in the process of creating a Security Identifier (SID) - Once RID is used to generate SID, it is not used again.

112
Q

Infrastructure Operation Master

A

Role responsible for replicating SID and Distinguished name (DN) value change to cross-domains- Checks its database at regular intervals for foreigns group members from other domains and once it finds objects it check SID and DN values with the global catalogue servers. If mismatch it will replace its value with the global catalogue

113
Q

FSMO Role Placement

A

The first DC in a AD forest will hold all five FSMO roles

114
Q

Domain Controller

A

Component thats runs windows server OS and holds AD domain services role.

115
Q

Global Catalogue Server

A

Global catalogue server holds the full writable copy of objects in its host domain and a partial copy of objects in other domains in the same forest

116
Q

AD DNS

A

Without DNS an AD domain infrastructure cannot work because it wouldn’t be able to locate Domain Controllers and maintain a hierarchical infrastructure design.

117
Q

Active Directory Database

A

Maintains a databse to store schema information, configuration information and domain information.

ntds.dit file is the AD database file - contains classes, attributes and relationships between the two.

C:\Windows\System32\ntds.dit
C:\Windows\NTDS\ntds.dit

118
Q

Group Policy

A

Rules applied to manage application settings, security setting and system setting of the AD Objects

A set of Group Policy configurations is called a Group Policy Object (GPO)

119
Q

Local Security Policy

A

Set of information about the security of a local computer -
1, domain trusted to authenticate logon attempts
2.which users can access systems
3.privilege assigned to accounts
4. security auditing policy

Local Security Authority stores the local policy info in a set of LSA policy Objects

120
Q

Password Policies

A

Password Rules and Lock out policies, lifetime and password complexities

121
Q

Account Lockout Policy

A

This setting control the threshold for this response and the actions to be taken after that threshold has been reach

122
Q

LM Hash (Hash Storage)

A

Lan manager - old technique that Microsoft used back in the 1980s to create hash passwords. 14 character max, find in SAM or NTDS database on a DC - encrypted with DES - disabled in older systems like vista or 2008 srv

123
Q

NT (NTLM) Hash (Hash Storage)

A

New Technology Lan Manager is the new way that Microsoft uses to hash password. In SAM db or NTDS.dit database. - RC4 Cipher (which is an old cryptographic methods such as AES or SHA-512

Version 2 use MD5 hash

Both unsalted hashes

124
Q

Patch Management

A

Is a field on system management that involves acquiring, testing and installing patches to a computer

125
Q

Software Update Services (SUS)

A

Free patch management tool from Microsoft to help system admins to deploy security patches - Each workstation connects to the SUS server and gets update from there

126
Q

System Management Server (SMS)

A

2003 - Provides a rich management and servicing solution. Can be used to manage networked windows embedded standard- based devices alongside windows desktop and sever.

127
Q

Windows Server Update Services (WSUS)

A

WSUS enables system administrators to deploy the latest Microsoft product updates- WSUS server can be the update source for other WSUS servers within the organisation (upstream server)

128
Q

Microsoft Baseline Security Analyser (MBSA)

A

MSBA helps to stay on top of regular network auditing tasks by scanning both local and remote Microsoft systems from security Misconfigurations. Also can identify any missing security updates and service packs available through the Microsoft update technologies

129
Q

Snowball effect

A

A small issue leads to another increasing severity and risk.

130
Q

Microsoft Exchange Servers

A

Extended SMTP feature - Once connected to server EHLO command will enum authentication types

131
Q

EternalBlue

A

SMBv1 vulnerability - 2017 - Mishandles specially-crafted packets from remote packets allowing an arbitrary code to be executed on the target. Wannacry ransom used Eternalblue to spread itself

132
Q

Finger user enum

A

Finger protocol is a app level protocol that provides an interface between the finger command and the fingerd daemon - returns information about the users currently logged in to a specified host

TCP port 79 - ‘finger @IP’ or ‘finger oracle@IP’ or ‘finger user@IP’ users with string user

133
Q

ruser

A

RPC service endpoint which listens to dynamic port - First connects to RPC port mapper and returns whereabouts of the rusersd service. If rusersd is running you can use ‘r -l 192.168.1.5’ to see users logged in.

134
Q

rwho

A

rwhod service listens on port 513 - and if it is accessible, use the command rwho to query the service and get list of currents users logged in to the remote host

135
Q

Solaris

A

Allows a malicious user to bypass authentication due to improper sanitation of input (Crafting a special telnet string)

136
Q

FTP

A

TCP 20 - used to send data from server to client
TCP 21 - used to accept and process FTP commands from the client.
ID banner by using quote help or syst command
rwt in tmp directory with anonymous access

137
Q

SMTP

A

Protocol for sending emails through several software packages such as sendmail, Microsoft exchange etc.

Commands: HELP,VRFY,EXPN, RCPT TO. MAIL FROM

138
Q

POP-3

A

Post Office Protocol is a standard mail protocol used to receive emails from a remote server to a local email client.

common to not have a Lockout Policy so susceptible to brute forcing

139
Q

IMAP

A

Internet Message Access Protocol an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection.

Plain text and also susceptible to brute forcing

140
Q

NFS

A

Network File System is a distributed file system protocol that allows a user on a client computer to access files over a computer network much like local storage is accessed.
Port 2049 - UDP and TCP and NFSv4 is latest version

141
Q

ro

A

Read only on NFS

142
Q

rw

A

Read write on NFS

143
Q

no_root_squash

A

Root on NFS is treated as nfsnobody by NFS server (security measure) - to disable such protection use no_squash_root

144
Q

mount options

A

Nosuid - disables set user identifier or set group identifier bits to prevent remote users from gaining higher privileges
Noexec - prevents execution of binaries on mounted file systems

145
Q

R-services

A

The most popular are “rsh” for a remote shell, “rlogin” for a remote login, and “rexec” for remote execution.

exec 512/tcp
login 513/tcp
shell 514/tcp

uses Pluggable Authentication Modules (PAM) username and password for auth, which can be overridden by ~/.rhost and /etc/hosts.equiv

146
Q

X Windows System (X11 or X)

A

X provides the basic framework for a GUI environment: drawing and moving windows on the display device and interacting with a mouse and keyboard.

X server 6000 to 6063

xhost + or - used to give access or remove access host

147
Q

.xauthority

A

Magic cookie saved when user logs into X windows under the users home directory

148
Q

XWININFO

A

get information about X windows using a build-in utility in Kali

xwininfo -tree -root -display IP

149
Q

RPC

A

A number of Linux daemons run as remote procedure call services using dynamic ports.

rpcinfo can be used to query RPC port mapper to list the accessible RPC service endpoints

150
Q

Portmapper

A

TCP and UDP port 111 or 32771

151
Q

SSH

A

Secure Shell Protocol- encrypted access to linux, unix and windows OS and allows file access using secure copy (SCP) secure FTP (SFTP) and SSH Port forwarding.

152
Q

Presentation Tier

A

Web browser and mobile clients support rich functionality using Javascript and other client-side technologies which interact with server APIs and Endpoints

153
Q

Application Tier

A

Application server supports code execution written in languages like Java,Ruby,Python and Microsoft ASP.NET. Connectors and adaptors are used to negotiate the communications between the clients and applications.

154
Q

Data Tier

A

The data stores used with web applications are databases, key-values stores and distributed file systems.

155
Q

HTTP

A

Hypertext Transfer Protocol - Application level protocol for hypermedia information systems.
Connectionless, Independent Media and Stateless

156
Q

URI

A

Uniform Resource Identifiers formatted case-insensitive strings containing a name, location and much more in order to identify a resource such as a website

157
Q

HTTPS

A

TLS (Transport Layer Security) and SSL (Secure Socket Layer) are cryptographic protocols which provide secure communication over the HTTP protocol

158
Q

GET

A

Passes parameters to the web app through URL

159
Q

POST

A

Passes data to the server through the body of the request

160
Q

HEAD

A

Gets the HTTP header without sending any payload

161
Q

TRACE

A

when this method is used, the server bounces back the TRACE response with the original request message in the body of the response - used to Identify alterations to the request by intermediates devices such as firewalls and proxies

162
Q

PUT AND DELETE

A

PUT is used to upload and DELETE is used to remove data

163
Q

OPTIONS

A

Used to query the server for the methods that it supports

164
Q

CONNECT

A

used to establish a tunnel to the server identified by a five URI

165
Q

1xx

A

Informational - Request received and the process continued

166
Q

2xx

A

Success - Action successfully recieved nd understood and accepted

167
Q

3xx

A

Redirection - Further action must be taken in order to complete the request

168
Q

4xx

A

Client Error - The request contains incorrect syntax or cannot be fulfilled

169
Q

5xx

A

Server Error - The server failed to fulfill an apparently valid request

170
Q

SOAP Protocol

A

Simple Object Access Protocol - XML message protocol in order for computers to exchange information.

  • Communication protocol for internet
  • Can extend HTTP for XML messaging
  • Can exchange complete documents or call a remote procedure
  • Can be used to broadcast a message
  • Is platform and language - independent
  • Enables clients applications to easily connect to remote services and invoke remote methods
  • Is an EML way to define what information is sent and how
171
Q

X-Frame Option

A

gives instructions to the broswer if and when a page should be displayed as part of another page

172
Q

Strict-Transport-Security

A

HTST - HTTP Strict Transport Security - instructs browser to enforce a HTTPS connection

173
Q

X-XXS Protection

A

Instructs website to used Cross-site Scripting protection

174
Q

Content-Security-Policy

A

Sent from server to demand the location where scripts can be loaded

175
Q

Set-Cookie

A

header may contain different flags. Expire sets a date til the cookie is valid

176
Q

Persistent Cookie

A

Max-Age or Expires attribute and stored on disk by web browser until the expiration date.

177
Q

Non persistent cookie

A

Stored in RAM on the client computer and deleted when the browser is closed

178
Q

Secure Flag

A

Forces the web browser to send cookies though an encrypted connection such as HTTPS which prevents eavesdropping.

179
Q

HTTPOnly

A

instructs the web browser not to expose the cookie through client-side scripts thus disallowing access to the cookie from any script

180
Q

XML

A

Extensible Markup Language
XML Document Type Definition (DTD) is a document used to validate an XML document for a certain criteria. Acts as a validation template containing a definition a valid structure attributes and elements for an XML document.

181
Q

PHP

A

Scripting language and interpreter are used on the server-side (on ISS and Apache) to support PHP functionality.

182
Q

AJAX

A

Asynchronous Javascript and XML is a combination of technologies used to create fast and dynamic pages. Uses an asynchronous request-response method which makes the application more interactive. Allows content of a web page to be updated without submitting the entire page to the server.

183
Q

DOM

A

Dynamic Object Model - is a framework to organise elements in an HTML or XML document. Convention for representing and interacting with HTML objects.

184
Q

.NET Framework

A

Set of APIs that support an advanced type system,data,graphics,network and what is needed to write enterprise apps in a Microsoft ecosystem.

185
Q

ISAPI

A

Internet Server Application Programming Interface provides application support within ISS through DLL that are mapped with specific file extensions

186
Q

CGI

A

Common Gateway Interface is a way for a web server to pass a user request to an application programme and to receive data to forward them to the user. (part of HTTP protocol)

187
Q

IIS Versions

A
  1. 0 2000
  2. 1 Windows XP
  3. 0 W Server 2003
  4. 0 W Server 2008 and Vista
  5. 5 Windows 7
  6. 0 Server 2012 and windows 8
  7. 5 Windows 2012 R2 and Windows 8.1
  8. 0 Windows 2016
188
Q

EAP

A

Extensible Authentication Protocol - Used to authenticated people to wireless networks (WPA and WPA2 use it)

189
Q

PEAP

A

Protected Extensible Authentication Protocol - TLS tunnel (SSL) authentication communication is encrypted in the tunnel