Technical Flashcards

1
Q

What are the common types of attacks and signatures

A

“There are three types of attacks:
Reconnaissance These include ping sweeps, DNS zone transfers, e-mail recons, TCP or UDP port scans, and possibly indexing of public web servers to find cgi holes.

Exploits Intruders will take advantage of hidden features or bugs to gain access to the system.

Denial-of-service (DoS) attacks Where the intruder attempts to crash a service (or the machine), overload network links, overloaded the CPU, or fill up the disk. The intruder is not trying to gain information, but to simply act as a vandal to prevent you from making use of your machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a network based IDS system

A

“An IDS is a system designed to detect and report unauthorized attempts to access or utilize computer and/or network resources. A network-based IDS collects,
filters, and analyzes traffic that passes through a specific network location. “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A digital certificate

A

“is a credential required by PKI systems that can securely identify an individual, as well as create an association between the individual?s authenticated identity and public keys.
A trusted third party, called a certificate authority (CA), is used to sign and issue certificates.
The CA is responsible for verifying the identity of a key owner and binding the owner to a public key.
This enables users who have never met to exchange encrypted communications, because the authentication is performed by the third-party CA.
Each certificate contains a unique serial number, identity, and public key information of the user, and the validity dates for the life of the certificate.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A digital signature

A

is a hash value that has been encrypted with the sender?s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

Holding individuals responsible for their actions. In a system, the ability to trace actions to an individual (auditing) so they can be held accountable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

After I&A, the granting to a user, program, or process the right of access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

countermeasure, or safeguard -

A

a software configuration, a hardware device, or a procedure that eliminates a vulnerability or that reduces the likelihood a threat agent will be able to exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exposure -

A

is an instance of being exposed to losses from a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HASH

A

is an instance of being exposed to losses from a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would you define Buffer Overflow

A

it’s a programming flaw that can be exploited to improperly processes input and run code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would you harden a Windows Server What about a Linux Server

A

”? Enforce a password policy. Time of expiration. Length of passwords with character sets. Add thresholds for bad passwords and length of lock out.
? Disable guest accounts
? Patch the hell out of the servers and applications
? Remove default password
? Check for null sessions
? Enable FW feature set on the NIC.
? Audit admin rights for all accounts.
? Backup on regular basis.
? Mandate SMB signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identification and Authentication

A

Recognition of a subject by a computer system and verification by the computer system that the subject is indeed who the identification process says he is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Please detail 802.1x security vs. 802.11 security (dont confuse the protocols).

A

802.1x port-based Network Access Control (PNAC) - provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

IEEE 802.11 is a set of standards carrying out wireless local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process of PGP:

A

The users private key is generated and encrypted when the application asks the user to randomly type on her keyboard for a specific amount of time.
Instead of using passwords, PGP uses passphrases.
The passphrase is used to encrypt the user?s private key that is stored on her hard drive.
PGP does not use a hierarchy of CAs, or any type of formal trust certificates, but instead relies on a ?web of trust? in its key management approach.
Each user generates and distributes his or her public key, and users sign each other?s public keys, which creates a community of users who trust each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk

A

is the likelihood of a threat agent taking advantage of a vulnerability and the corresponding business impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SYN Flood Mitigation

A

“By implementing a SYN proxy on the firewall, now the firewall can manage the
connections to the server. If a predefined threshold of SYN requests (let?s say 500 in a second) occurs, the firewall is on guard. If requests continue to come in, the firewall has the option of dropping the oldest requests that haven?t resulted in an established connection, thereby allowing legitimate connections to make their way to be processed by the server.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat

A

“is any potential danger to information or systems.
The threat is that someone, or something, will identify a specific vulnerability and use it against the company or individual.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat agent

A

The entity that takes advantage of a vulnerability is referred to as a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Vulnerability

A

is a software, hardware, procedural, or human weakness that may provide an attacker the open door he is looking for to enter a computer or network and have unauthorized access to resources within the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What anonymous account allows access to resources through IIS

A

IUSR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the latest threats you foresee for the near future

A

Wireless is becoming the norm for connecting to the internet, so Wireless threats are going to be the majority of hacks out there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the most common application security flaws

A

” * A1: Injection
* A2: Cross-Site Scripting (XSS)
* A3: Broken Authentication and Session Management
* A4: Insecure Direct Object References
* A5: Cross-Site Request Forgery (CSRF)
* A6: Security Misconfiguration
* A7: Insecure Cryptographic Storage
* A8: Failure to Restrict URL Access
* A9: Insufficient Transport Layer Protection
* A10: Unvalidated Redirects and Forwards “

23
Q

What Command do you use in UNIX to search a file

A

GREP

24
Q

What do you do if you are a victim of a DoS

A

Follow the incident response process at work. If at home, contact the ISP to change IP Address.

25
Q

What is a spoofed packet

A

A packet with a fake source IP Address.

26
Q

What is a buffer overflow

A

it’s a programming flaw that can be exploited to improperly processes input and run code.

27
Q

What is a Denial of Service attack

A

Exhaust all resources on a system or network to keep it from fuctioning properly.

28
Q

What is a log host

A
29
Q

What is a Man In The Middle attack

A

“The man-in-the middle attack intercepts a communication between two systems.
For example, in an http transaction the target is the TCP connection between client and server.
Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server

Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication”

30
Q

What is a SYN Flood

A

“A SYN flood is where attackers send fake SYN requests to servers in an attempt to exhaust the amount of legitimate requests the server can maintain.
If the attacker is successful, the server will wait for a predetermined timeout period for the bogus connections to complete (which, of course, never do), and most legitimate requests will be ignored by the server.”

31
Q

What is Cross-Site Scripting and how can it be prevented

A
32
Q

What is DNS Hijacking

A

An illegal change to a DNS server that directs a URL to a different Web site.

33
Q

What is GPG (GNU Privacy Guard)

A

“GnuPG allows to encrypt and sign your data and communication, features a versatile key managment system as well as access modules for all kind of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.

GnuPG encrypts messages using asymmetric keypairs individually generated by GnuPG users. The resulting public keys can be exchanged with other users in a variety of ways, such as Internet key servers. They must always be exchanged carefully to prevent identity spoofing by corrupting public key ? ““owner”” identity correspondences. It is also possible to add a cryptographic digital signature to a message, so the message integrity and sender can be verified, if a particular correspondence relied upon has not been corrupted.”

34
Q

What is IDS or IDP

A

Signature or behavior based?.IDS is passive where IPS is inline and can block.

35
Q

What is included in the system state of a windows2003 server

A

Registry, boot files., COM+class registration and system files.

36
Q

What is NAT and how does it work

A

Network Address translation - Translates private IP Address to Public address.

37
Q

What is PGP (GNU Privacy Guard)

A

Encrypts and digitally signs files

38
Q

What is RFC 1918

A

Private Addressing - 10.0.0.0 - 172.16-32.0.0 , 192.168.0.0

39
Q

What is SSH

A

“network protocol that allows data to be exchanged using a secure channel between two networked devices.[1] Used primarily on GNU/Linux and Unix based
systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis.[2] The encryption used by SSH provides confidentiality and integrity of data over an insecure network, such as the Internet.”

40
Q

What is SSL

A

SSL allows application to have authenticated and encrypted communication.

41
Q

What is stateful packet inspection

A

is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.

42
Q

What is Syskey used for

A

is a utility that encrypts the hashed password information in a SAM database in a Windows

43
Q

What is the default network bandwidth for IIS bandwidth throttling 1024 BPS

A

1024 BPS

44
Q

What is web-caching

A

Web caching is the caching of web documents (e.g., HTML pages, images) to reduce bandwidth usage, server load, and perceived lag. A web cache stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met.

45
Q

What kind of authentication does AD use

A

“Active Directory is a technology created by Microsoft that provides a variety of network services, including:

* Lightweight Directory Access Protocol (LDAP)-like[1] directory services [Lightweight Directory Access Protocol]
* Kerberos-based authentication
* DNS-based naming and other network information
* Central location for network administration and delegation of authority [2]
* Information security and single sign-on for user access to networked based resources [3]
* The ability to scale up or down easily [4]
* Central storage location for application data [5]
* Synchronization of directory updates amongst several servers [6]

46
Q

what unix command list the server IP info

A

Ifconfig

47
Q

Whats port scanning and how does it work

A

Basic Port Scan: This the easiest type of port scan which involves scanning a designated port by sending a specifically configured packet that contains the port number of the port that is to be scanned. This technique is used to determine which port is available within a specific machine.

TCP Connect: A TCP connect is used to scan a series of ports on a machine to determine port availability. If a port on the machine is listening then the TCP connect is successful in reaching that specific port.

Strobe Scan: This type of scan is generally used by a hacker to find the ports that the hacker already knows how to exploit. A strobe scan performs scanning on a more constricted level and also allows for disclosure of the username of the TCP connection.

Stealth Scan: This type of scan is specifically designed for hacking because it is set up to go undetected by network auditing tools. When a port scanner is used, the ports that are listening will log an error message if an inbound connection is detected but there is no data associated with the connection. Stealth scans are able to bypass this process and therefore go undetected during audits.
48
Q

Whats the difference between a Proxy and a Firewall

A
49
Q

Whats the difference between encryption and hashing

A

Encryption is reversable, where hashing is one way.

50
Q

Whats the difference between symmetric and asymmetric encryption

A

Symmentric encryption is done through private keys. Both sender and reciver will need to have the private key to encrypt and decryp

51
Q

Where are UNIX password and account information save

A

Etc/password - etc/shadow - etc/secure

52
Q

Why are proxy servers useful

A

To keep machines behind it anonymous (mainly for security).

To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.

To apply access policy to network services or content, e.g. to block undesired sites.

To log / audit usage, i.e. to provide company employee Internet usage reporting.

To scan transmitted content for malware before delivery.

To scan outbound content, e.g., for data leak protection.

To circumvent regional restrictions.”

53
Q

Your network has been infected by malware. Please walk me through the process of cleaning up the environment.

A

Set a schedule for malware removing software to run during non work hours, and remind the user that this is going to happen.