Threat Hunting Flashcards
Threat Modeling
the process of identifying and assessing the possible threat actors and attack vectors that pose a risk to the security of an app, network, or other system
Attack Surface vs Vector
Point a network receives internal/external connection (network, apps, clous services, website) vs a specific path a threat actor gains access to a system (cyber, human, physical)
Threat Hunting
Cybersecurity technique designed to detect presence of threats that
have not been discovered by normal security monitoring.
Email Harvesting
OSINT technique to gather email from a domain
Harvesting Techniques
whois - public list of all registered domains and admins
DNS Zone transfer - replicate DNS database across DNS servers
DNS Harvesting - OSINT gather info about domain
AbuseIPDB
A community-driven database that keeps track of IP addresses reported for abusive behavior
Deep web vs dark web
Sensitive info not searchable to public intel vs Illegal activities
Bug Bounty
a way for companies to crowdsource security testing of their software services and applications to identify and address potential security issues