Week 4 - Analyzing Vulnerabilities Flashcards

1
Q

Vulnerability Ranking

A

The process of evaluating and ranking vulnerabilities in terms of the potential threat they may pose to the organization.

  • CVSS is an open standard for ranking vulnerabilities.
    − Quantifies vulnerability data through three metric groups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Automated Vulnerability Scanners

A
  • Will have signatures that tie into specific vulnerabilities.
  • Vulnerability scanners are only able to detect the known vulnerabilities;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OpenVAS

A
  • An all-in-one vulnerability scanner that leverages a variety
    of built-in tests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nessus

A
  • One of the most popular vulnerability scanners on the market.
  • Like other vulnerability scanners, it contains a database of known
    vulnerabilities across different platforms and protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross-Compiled Code

A
  • Code that has been compiled into an executable on one platform but is designed to run on a different platform.
  • Common approach when crafting your own exploits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploit Chaining

A

The act of using multiple exploits to form a larger attack.
* Success may depend on all exploits doing their part.
* Distributed nature makes them complex and difficult to defend against.
* Some chained exploits must run consecutively.
* Some run in parallel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proof of Concept Development

A

A benign exploit developed to highlight vulnerabilities.
* Usually created by security researchers.
* Demonstrates security issue to target organization or general public.
* Technical aspects might be published in great detail.
* Or researcher may not include specifics.
− Discourages malicious actors from using this exploit in the wild.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A
  • Attacker may need to persuade victim to do something for them:
    − Disabling or bypassing security controls.
    − Granting physical or network access.
    − Creating or resetting credentials.
    − Delivering messages.
    − Installing software.
    − Authorizing payments.
    − Connecting or disconnecting devices.
    − Reconfiguring systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary Attacks

A

An attack in which a password cracking tool goes through a list of words until it either finds the password or exhausts the list.

  • Practical limitations:
    − Must know username, though usernames can also be in wordlists.
    − Lists can become unwieldy in their size (1.5 billion words ≈ 15 GB uncompressed).
    − Lockout policies on authentication systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rainbow Table Attacks

A

The passwords in the wordlist have been pre-computed into their corresponding hashes, then compressed in a highly efficient manner.

  • Makes offline cracking much faster.
    − No need to compute hashes of every password tried.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credential Brute Force Attacks

A

An attack in which the attacker tries many passwords in the hope of eventually guessing the right one.

  • If wordlist is exhausted, tool can try variations.
    − Substitute numbers or special characters for letters.
    − Combinations of characters.
  • Short passwords (e.g. 4-digit PIN) can be brute forced in minutes or even seconds.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly