Ch 2,3 - Assessment Workflow... & Vulnerabilities... Flashcards

1
Q

4 steps for Network Security Assessment Methodology

A

Reconnaissance to identify networks, hosts, and users of interest
Vulnerability scanning to identify potentially exploitable conditions
Investigation of vulnerabilities and further probing by hand
The exploitation of vulnerabilities and circumvention of security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ZDI

A

Zero Day Initiative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SCADA

A

Supervisory Control And Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Surfaces

A

This surface often encompasses
server applications, client endpoints, users, communication channels, and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Taxonomy of Software Security Errors

A
  1. Input Validation
  2. API abuse
  3. Security features (low level)
  4. Time & State
  5. Errors
  6. Code quality
  7. Encapsulation
  8. Environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial Goals

A
  1. Data extraction/manipulation
  2. Elevation of privilliges
  3. Arbitrary code execution
  4. Denial of Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Level of System Access

A
  1. Remote
  2. Close proximity
  3. Direct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secrets stored in volatile memory

A

Private keys, credentials, session tokens, other cryptographic materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DEP

A

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ROP

A

Return Oriented Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic Flaws

A
  1. Inference of login info
  2. Session management issues
  3. Command Injection
  4. Encapsulation bugs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common cryptographic functions

A
  • Pseudorandom number generators (PRNGs)
  • Protocols providing transport layer security (such as TLS and IPsec)
  • Encryption of data-at-rest
  • Signing of data to provide integrity checking (e.g., HMAC calculation)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attacks against Cryptosystems

A
  1. Collisions
  2. Modification of ciphertext
  3. Replay of ciphertext
  4. Side channel attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly