Cybersecurity - Offensive Security Flashcards

(16 cards)

1
Q

Offensive Security

A

Offensive security means attacking systems to find vulnerabilities before hackers do. So the workers or employess are trying to β€œattack” their own to find vulnberbalties. It includes ethical hacking, penetration testing, and bug hunting.
πŸ“Œ Example: A security team tries to hack their own company’s website to check for weak spots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber Kill Chain

A

A model that describes the steps of a cyberattack from reconnaissance to stealing data. It has seven stages:
1️⃣ Reconnaissance – Collecting information about the target.
2️⃣ Weaponization – Creating a hacking tool (e.g., malware).
3️⃣ Delivery – Sending the tool to the target (e.g., phishing email).
4️⃣ Exploitation – Running the attack on the system.
5️⃣ Installation – Making the malware persistent.
6️⃣ Command & Control – Taking control of the system.
7️⃣ Actions on Objective – Stealing, modifying, or damaging data.
πŸ“Œ Example: A hacker sends a phishing email that installs malware on a company’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APT

A

Advanced Persistent Threat

An APT is a secret, long-term cyber attack where hackers break into a system, stay hidden, and steal important data. These attacks are usually done by governments or big hacker groups to spy or cause harm. πŸš€

πŸ“Œ Example: APT29 (Cozy Bear), a Russian-backed group, is suspected of hacking the US government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Analysis Frameworks

A

These frameworks help analyze cyber threats and plan defenses. The most common ones are:

MITRE ATT&CK – A database of known hacking techniques.
STRIDE – A model for categorizing cyber threats.

πŸ“Œ Example: A security team uses MITRE ATT&CK to check how hackers might attack their network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVE

A

Common Vulnerabilities and Exposures

A public database of known cybersecurity weaknesses. Each vulnerability gets a unique CVE ID (e.g., CVE-2023-12345).
πŸ“Œ Example: A security researcher finds a new Windows bug and reports it as CVE-2024-56789.

So bassicly a list of common cybersecurity weaknesses, that are named with a unique name. And it reports it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVSS

A

Common Vulnerability Scoring System

A rating system (0-10) that shows how dangerous a vulnerability is:

0.0-3.9 β†’ Low risk
4.0-6.9 β†’ Medium risk
7.0-8.9 β†’ High risk
9.0-10.0 β†’ Critical risk
πŸ“Œ Example: A banking app bug rated 9.5 (critical) must be fixed immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability Scanners

A

These tools scan networks and websites for security weaknesses.
πŸ“Œ Example:

Nmap – Scans for open ports on a system.
Nessus – Scans for known vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metasploit

A

Metasploit is a hacking tool used for testing security by finding and exploiting system weaknesses.

What It Does:
βœ… Helps ethical hackers test for vulnerabilities.
βœ… Can launch real cyber attacks (for testing).
βœ… Used for penetration testing & cybersecurity training.

Example:
πŸ“Œ A company uses Metasploit to test its network and fix weak spots before hackers attack.

βœ… Think of Metasploit like a security scannerβ€”it helps find and fix problems before real hackers do! πŸš€

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Delivery (Attack Methods)

A

Hackers use different ways to deliver malware or gain access to a system. Here are the main attack methods:

1️⃣ Phishing πŸ“© – Fake emails trick users into clicking bad links or giving passwords.
2️⃣ Malicious Attachments πŸ“Ž – Infected files (PDFs, Word docs) that install malware.
3️⃣ Drive-By Downloads 🌍 – Malware downloads automatically when visiting a hacked website.
4️⃣ USB Drop Attack πŸ’Ύ – A hacker leaves an infected USB for someone to plug in.
5️⃣ Exploiting Weak Software πŸ”„ – Hackers use security holes in outdated programs.
6️⃣ Social Engineering 🎭 – Tricking people into revealing passwords or sensitive info.
7️⃣ Malvertising πŸ–₯️ – Fake ads on websites that spread malware.

βœ… Hackers use these methods to deliver malware, so staying alert and using security tools helps prevent attacks! πŸš€

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bug Bounty Programs

A

A Bug Bounty Program is when companies pay ethical hackers to find and report security flaws in their systems before real hackers do.

How It Works:
βœ… Hackers search for bugs in websites, apps, or software.
βœ… If they find a bug, they report it to the company.
βœ… The company rewards them with money or recognition.

Example:
πŸ“Œ Google and Facebook pay hackers thousands of dollars for finding security flaws in their systems.

βœ… Bug bounties help companies stay safe by fixing weaknesses before attackers can exploit them! πŸš€

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Responsible Disclosure

A

Responsible Disclosure is when a hacker finds a security flaw and privately reports it to the company instead of sharing it publicly.

How It Works:
βœ… Hacker finds a bug in a system.
βœ… Reports it to the company (instead of leaking it online).
βœ… The company fixes the problem before hackers can exploit it.

Example:
πŸ“Œ A hacker finds a vulnerability in a bank’s website and reports it instead of using it for harm.

βœ… Responsible Disclosure helps keep systems safe by fixing security flaws before bad actors can use them! πŸš€

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-Day Vulnerabilities

A

A Zero-Day Vulnerability is a security flaw that hackers find before the company knows about it. Since there’s no fix available, it’s very dangerous.

How It Works:
βœ… A hacker discovers a new security flaw in software or hardware.
βœ… The company has β€œzero days” to fix it before it can be exploited.
βœ… Hackers can use it for attacks (until a patch is made).

Example:
πŸ“Œ A hacker finds a weakness in Windows that lets them take control of computers before Microsoft knows about it.

βœ… Zero-Day Vulnerabilities are dangerous because no one is prepared for themβ€”companies must fix them fast!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero-Day Brokers

A

These are black-market dealers who buy and sell zero-day vulnerabilities.
πŸ“Œ Example: A broker sells a new Windows exploit to a hacking group for cyberespionage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Penetration Testing (Pentesting)

A

Simulating real cyberattacks to find and fix vulnerabilities before real hackers do.
πŸ“Œ Example: A pentester tests a bank’s security by attempting to hack into its system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ethical Hacking vs. Black Hat Hacking

A

Ethical hacking β†’ Legal, with permission.
Black hat hacking β†’ Illegal, criminal activity.
πŸ“Œ Example: Ethical hackers work for companies; black hat hackers steal money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical vs. Remote Exploitation

A

Physical exploitation – The hacker needs direct access to the device.
Remote exploitation – The hacker attacks over the internet.
πŸ“Œ Example: A hacker installs malware on a USB stick (physical) vs. sends a phishing email (remote).