542.1 Introduction and Information Gathering Flashcards

1
Q

Why are web applications important?

A
  • Are ubiquitous across all sizes and types of businesses
  • Enable business-critical functionality
  • Provide access to sensitive and/or critical data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Web application Pen Test provides one method of assessing an application’s security posture.

A

Understanding how web app pen testing fits into the overall
spectrum proves important

  • Might not be the right or best tool for a given application
  • Might need to be complemented by other approaches

Also, varied approaches to web app pen testing itself also exist and could be relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different security testing methods?

A

Security testing methods:

  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • Interactive Application Security Testing (IAST2)
  • Out-of-Band Application Security Testing (OAST3)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is threat modelling?

A

Brainstorm potential vulnerabilities and realistic threats to the web
application, then think of mitigation strategies for each weakness:

  • Consider using NIST 800-301, Appendix D, as a resource to assist with threat
    modeling
  • Can help to prioritize limited resources to address the most likely attack vectors and weaknesses in the application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Advantages of Threat Modeling?

A
  1. Practical attacker’s view of the
    system

2.Flexible

3.Early in the SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Advantages of Threat Modeling?

A

1.) Relatively new technique

2.) Good threat models don’t automatically mean good software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Source Code Review?

A
  • Certain vulnerabilities cannot be found without reading the source code
  • The time necessary to develop a suitable exploit can be dramatically reduced
  • Usually only performed under a full knowledge pen test, or if a vulnerability permits access to source code within the web root.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some advantages of a Source Code Review?

A
  1. Completeness and effectiveness
  2. Accuracy
  3. Fast (for competent reviewers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some disadvantages of a Source Code Review?

A
  1. Requires highly skilled security developers
  2. Can miss issues in compiled libraries
  3. Cannot detect run-time errors easily
  4. The source code actually deployed might differ from the one being analyzed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Static Application Security Testing (SAST) ?

A

SAST involves scrutinizing application source code looking for security deficiencies.

Employs tools rather than relying simply on manual code review

  • However, SAST can be seen simply as a more automated or efficient type of code review
  • Characterized as a full knowledge testing technique due to source code
    access being required for this type of testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some strengths and weakness of SAST ?

A

Strengths: Identifies security deficiencies not readily apparent in deployed application

Weaknesses: Requires access to source code; might overlook APIs or libraries leveraged by the application; overlooks ops side of apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Dynamic Application of Security Test (DAST) ?

A
  • Commonly used as the sole way to find vulnerabilities in applications
  • Pen tests are not always the most efficient method of finding security weaknesses

o Certain classes of vulnerabilities (i.e., logic flaws) are much easier to detect in a DAST test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some advantages and Disadvantage of DAST ?

A

Advantages
-Can be automated and fast (and therefore cheap)

-Requires a relatively lower skill set than source code review

-Tests the code that is actually being exposed

Disadvantages

-Too late in the SDLC

-Front impact testing only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wielding DAST tools effectively proves much more challenging than merely pushing a button; at a minimum it requires ?

A
  • Properly configuring scans for the target application
  • Guiding scans to ensure comprehensive review
  • Following up on results to reduce false positives
  • Assessing true positives to understand potential impact
  • Understanding and shoring up deficiencies in capabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Manual Inspections and Reviews ?

A

Manual inspections are human reviews that typically test the security implications of people, policies, and processes — WSTG v4.2, p. 18

  • Involves reviewing documentation, as well as interviewing designers and system owners
  • To ensure accuracy, be sure to verify the documentation and information related in
    interviews are correct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages of Manual Inspection and Reviews.

A

Requires no supporting technology

Can be applied to a variety of situations

Flexible

Promotes teamwork

Early in the SDLC

17
Q

What are some disAdvantages of Manual Inspection and Reviews?

A

Can be time consuming

Supporting material not always available

Requires significant human thought and skill to be effective

18
Q

What is the best method of Pentesting?

A

Balancing both automated and manual = BesT!

19
Q

Zero knowledge vs Full knowledge.

A
  • Zero-knowledge represents an assessment in which the pen tester has very few details, perhaps only a URL, about the target application

o Difficult and time consuming (i.e., expensive) to perform
o

o Many people mistakenly think this form of test represents a “real-world” scenario

  • Full-knowledge testing involves the pen tester having access to all details about the application, such as architecture drawings, source code,
    developers, etc.

o Common with in-house security teams

o Try to shift assessments as close to a full knowledge assessment as possible

20
Q

what are 2 Frameworks that exist on Pen Testing

A
  • OWASP Web Security Testing
    Guide (WSTG)
  • Penetration Testing Execution
    Standard (PTES)
21
Q

What can a Pen Test Methodology help?

A
  • Consistent
  • Reproducible
  • Rigorous
  • Under quality control
22
Q

What is OWASP ?

A

“The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software.

Our mission is to make software security visible, so that individuals and organizations are able to make informed
decisions.

OWASP is in a unique position to provide impartial, practical
information about AppSec to individuals, corporations, universities, government agencies and other organizations worldwide.

Operating as a community of like-minded professionals, OWASP issues software tools
and knowledge-based documentation on application security. “1

23
Q

What are interception PRoxies ?

A

On one end of the spectrum we have automated scanners, and on the other we have browsers

Interception proxies are a major piece of our toolkit, providing a middle ground between the fully automated and the overtly manual

The interception proxy occupies a primary role in the web penetration tester’s arsenal

ZAP and Burp will be the proxies of choice for the class, and we will spend much time with each.

24
Q

Most Essential piece of Burp Suite is to understand the Scope Tab.

A

Properly defining the scope of your application assessment:

  • Makes the difference between tools running forever and completing
  • Keeps you from accidentally
    overlooking relevant resources
  • Allows you to avoid paths/systems explicitly excluded
  • Ensures you generally don’t run afoul of your authority and scan the universe.
25
Q

Sometimes the things you want to see in Burp is flitered because of the site map Fliter function.

A

New Burp users very often
overlook the Site Map: Filter

  • Once it’s discovered, simple
    filtering makes finding
    desired data much easier
  • Also makes finding
    inadvertently hidden data
    easier
26
Q

SEC 542 OSINT information means the following.

A
  • Could be free/open information about target in the public domain
  • Data provided by users/employees of the target organization
  • Information provided (un)intentionally by the target organization
  • Information from social media sites
27
Q

Domain NAme System - global hierarchical database of
domain names.

A

o Uses UDP port 53 for payloads <= 512 bytes*

Uses TCP port 53 for payloads > 512 bytes, notably zone transfers

28
Q

what is the command line to do a zone transfer using dig?

A

$ dig sec542 . org -t axfr

29
Q

What is a Reverse DNS Scan?

A

Many DNS administrators (and DNS tools) reliably create reverse (PTR) records for every forward (A) record:

  • A: www.sec542.org -> 192.168.1.8
  • PTR: 192.168.1.8 -> sec542.sans.org

or they never configure a reverse lookup zone.

30
Q

Tools for DNS Reconnaissance

A
  • nslookup
  • dig
  • Nmap
  • DNSRecon
31
Q

Dig Syntaxes

A

The basic usage is:
$ dig example.com options
* Will use the default DNS name server if@<nameserver> is omitted</nameserver>

Iook up all sec542.org records (SOA, A, NS, MX, and more):

dig @192.168.1.8 sec542.org

look up sec542.org MX records only:
dig @192.168.1.8 sec542.org -t mx

Attempt a zone transfer of sec542.org:
dig @192.168.1.8 sec542.org -t axfr

Simplified yrR (reverse) lookup:
$ dig -x 192.168.1.23

Query the nameserver’s version of BIND:
$ dig @192.168.1. 8 version. bind. chaos txt

32
Q
A