CySA+ Flashcards
Sysmon
System Monitor tool that is part of Sysinternals. Logs activity to Event Monitor, and incorporates XML config files to establish rules to alert on (exclude typical Microsoft activity, look for this malicious behavior, etc)
Stored or Reflected XSS
Cross-site Scripting attack where an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way.
Example- script posted in a comment on a message board that then loads for any user that visits the page.
Blind XSS
A form of Stored XSS. Attacker injects the malicious script or payload ‘blindly’ on some web pages without having any assurance that it will be executing. Web pages that are likely to save their payload into the database are the most important carrier for Blind XSS attacks.
Example- script posted into a Reporting form on a website
Exact Data Match
EDM
Structured database of string values to match, used in DLP
Example- could store hashes of credit card numbers, then if DLP thinks a credit card number is being exported, hash it and see if the value matches in EDM.
SDL
Security Development Lifecycle
Microsoft’s security framework for application development that supports dynamic development processes
Rootkit
Class of malware that modifies system files (often at the kernel level) to conceal its presence and establish persistence
Buffer Overflow
Attack where data goes past the boundary of the destination buffer and begins to corrupt adjacent memory
Smash the Stack
Attacker fills up the buffer with NOP (No Operation) so that the return address may hit a NOP and continue on until it finds the attacker’s code to run
Heap Overflow
Vulnerability where software attempts to move data from one location in memory into a fixed-length buffer allocated on the heap, which is too small to hold the data.
Dereferencing
Software vulnerability that occurs when the code attempts to remove the relationship between a pointer and the thing it points to
How can we mitigate race conditions?
Develop applications to not process things sequentially if possible.
Implement a locking mechanism within the app to provide exclusive access to that resource- for example SharePoint files get “checked out” and can’t be edited by someone else
icacls
Windows command-line utility that IT admins can use to change access control lists on files and folders.
Which coding languages are especially vulnerable to buffer overflow attacks?
C and C++, as strcpy does not perform boundary checking of buffers
How can we mitigate overflow attacks?
Proper input validation
Proper boundary checking
Use ASLR (address space layout randomization)
Run programs with least privilege
SEV
Secure Encrypted Virtualization
AMD Processor Security Extension
SGX
Software Guard Extensions
Intel Processor Security Extension
ASLR
Address Space Layout Randomization
Technique that hinders some types of security attacks by making it more difficult for an attacker to predict target addresses by randomly arranging theaddress spacepositions of key data areas of aprocess, including the base of theexecutableand the positions of thestack,heapandlibraries.
SME
Secure Memory Encryption
AMD Processor Security Extension
TXT
Trusted Execution Technology
Intel Processor Security Extension
Modbus
Communications protocol used in OT networks
Vehicular Vulnerabilites
Exploit over onboard cellular
Exploit over onboard WiFi
Attach exploit to the OBD-II
Masquerading
Dropper replaces legitimate executable with a malicious one (malicious one masquerades as legitimate one)
DLL Injection
DLL injection is a method of executing arbitrary code in the address space of a separate live process.
DLL Sideloading
Malicious DLL is loaded as part of a legit program that has a vulnerability that was exploited