2.0 Threats, Vulnerabilities, and mitigations Flashcards

(58 cards)

1
Q

What is phishing?

A

A: Social engineering attack using spoofed links/emails to steal data or deliver malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What is smishing and vishing?

A

A: Smishing = phishing via SMS; vishing = phishing via voice call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What are removable device vectors?

A

A: Malware delivered via USB drives; may emulate a keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is agentless malware?

A

A: Malware exploiting vulnerable software without installing itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some vectors of attack a hacker could enter through?

A

Bluetooth, wifi, file based or image based vectors, voice fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Agentless?

A

No installed executable, compromised software on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some unsecure wireless network protocols?

A

WEP, WPA, WPA2, 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is smishing?

A

Phishing over text message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an SQL injection?

A

inject malicious SQL code into a database query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an LDAP injection?

A

Targets LDAP queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to keep OS’s safe?

A

Patch and up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cross-site scripting (XSS)?

A

When information from one site goes onto another

Hackers hijacks a victim who goes to a legitimate site and thus the javascript code will execute.

Steal info, hijack sessions, or redirect users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is non-persistent XSS attack?

A

Script is included in the URL or input and reflected back immediately in the response

Only works if the user clicks on a suspicious link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a persistent XSS attack?

A

The malicious script is stored on the server like in a comment, profile bio or post

Runs everytime a person visits the affected page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is End of Life?

A

When a manufactuer will stop selling a product, usually a warning out first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is end of service?

A

Complete end of support unless maybe you pay a lot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is directory traversal?

A

When you move to a part of the project/folder that you shouldn’t have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name insecure protocols

A

Telnet, FTP, SMTP, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name some secure protocols

A

SSH, SFTP, IMAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port is FTP on?

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What port is Telnet on?

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is port http on?

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is port SMTP on?

A

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port is IMAP on?

25
What port is POP3 on?
Port 110
26
What does Telnet do?
Remote command line login
27
What does FTP do?
Transfers files without encryption File transfer protocol
28
What doe SMTP do?
Sends emails without encryption Simple mail transfer protocol
29
What does IMAP do?
Retrieves email (plaintext login) Internet message access protocol
30
What does POP3 do?
Downloads email messages to local device (no encryption)
31
What is the secure version of Telnet? and what port does it run on?
SSH port 22
32
What is the secure version of FTP? and what port does it run on?
SFTP port 22
33
What is the secure version of IMAP? and what port does it run on?
IMAPS and port 993
33
What is the secure version FTP?
34
What is the secure version of POP3? and what port does it run on?
POP3S and port 995
35
What is the secure version of HTTP? and what port does it run on?
HTTPS and port 443
36
Whats the difference between SFTP and FTPS?
SFTP is a new protocol using SSH, more modern FTPS is an older FTP that uses TLS encryption
37
What is the difference between hashing and encryption?
Hashing, you hash a password and check the hash with the hash you have saved in your system Encryption - you encrypt a message and send it, decrypt with the correct key
38
Difference between jailbreaking and rooting?
Jailbreaking is for iPhones Rooting is for Androids
39
Difference between a Virus and a Worm?
Viruses need something to latch onto for it to spread whether that be a packet or file Worms can spread by themselves
40
What is RFID cloning?
Where you clone someone's badge ID
41
Fileless virus
Stays in memory
42
What is a Fox Hunt?
Where you hunt for the radio frequency that is jamming your signals
43
How does ARP Poisoning work?
We have an ARP server and a victim laptop. The attacker will send a message to ARP saying “hey, we are that victim” then the server will send the info to the attacker and the attacker then feeds the info to the victim
44
How do replay attacks work?
Hijacks a session or save the credentials for reuse
45
What is a birthday attack?
Looking for a hash collision
46
What are some indicators of compromise?
1. Unusually amount of traffic 2. Change to file hash values 3. International traffic increase 4. Changes to DNS data 5. Uncommon patterns like reading a file more than usual
47
Why is segmentation good for cybersecurity?
Keeps things seperate
48
What does SIEM do and mean?
Security Information and Event Management Monitor, log, event correlation, alerting, dashboards and reporting
49
What are some mitigation techniques?
1. Patching vulnerabilities - auto updates - third party updates 2. Encryption - prevent access to application data files or full disk encryption 3. Monitoring - network, servers, etc… SIEM - Security event manager 4. Least privilege - role based access, best solution is to have no administrative privileges 5. Configuration enforcement 6. Decommissioning - once someone is out, or if a technology is faulty and must be decommission DESTROY
50
What does Nmap tool do?
Scans all the ports to see the ones that are open
51
Difference between Firewall, IDS and IPS
Firewalls manage the traffic and blocks IDS tries to detect and notify IPS tries to detect and block
52
What does Wireshark do?
Packet capture and network analysis
53
What does metasploit do?
Exploitation framework for penetration testing
54
What does burp suite do?
Web app vulnerability testing tool
55
What does tcpdump do?
Command line packet analyzer
56
Main difference between TCP and UDP?
TCP is reliable and establishes a connection UDP is fast and is connectionless
57
Difference between VPN and a proxy?
VPN is meant to encrypt all data transferring between the two poitns Proxy is meant to establish an alternate communication