General Flashcards
(267 cards)
Apache log file path
/var/log/httpd/access_log
/var/log/httpd/access_log
This file records all requests processed by the Apache server
httpd_log
Log file for WebSphere, an old web server application from the early 2000’s for z/OS
http_log
C header library for http logging, utilized by Apache
apache_log
Binary/executable file used for parsing Apache logs in a Postgres DB
The incident response policy contains procedures and guidelines, divided into these categories
- Preparation
- Detection/Analysis
- Containment
- Eradication/Recovery
- Post-incident stages
Incident Response Procedures
Provide detailed, tactical information to the CSIRT
CSIRT
Cybersecurity Incident Response Team
A Policy is
a statement of intent
A Guideline is
A statement by which to determine a course of action, aiming to streamline a routine process
A Framework is
A basic structure underlying a system, concept, or text
Mimikatz
Post-exploitation tool that dumps passwords from memory, as well as hashes, PINs, and Kerberos tickets
Tool for performing pass-the-hash, pass-the-ticket, or building Golden Kerberos tickets
Mimikatz
Extensible Configuration Checklist Description Format (XCCDF)
XCCDF is a specification language for writing security checklists, benchmarks, and related kinds of documents in XML.
Common Vulnerabilities and Exposures (CVE)
Provides a reference-method for publicly known information-security vulnerabilities and exposures
Common Configuration Enumeration (CCE)
Provides unique identifiers to system configuration issues to facilitate fast and accurate correlation of configuration data across multiple information sources and tools
Used with vulnerability scanners
Common Platform Enumeration (CPE)
A structured naming scheme for IT systems, software, and packages
Used to identify an endpoint’s characteristics when conducting network authentication
Network Access Control (NAC)
Port Security
Enables an administrator to configure individual switch ports to allow only a specified number of source MAC addresses ingressing the port
Shellshock/Bash Bug/Bashdoor
A critical Bash vulnerability that was discovered in 2014 that enabled RCE by encoding a script in an environment variable via the “function export” feature
Logjam
A TLS downgrade attack, discovered in 2015
Drupalgeddon
A highly critical Drupal vulnerability discovered in 2014 that allows RCE
Stagefright
A critical Android vulnerability that enables RCE by utilizing Multimedia Messages (MMS), discovered in 2015
Heartbleed
A high severity vulnerability in OpenSSL effecting the TLS protocol via improperly handled Heartbeat Extension packets (bad input validation), causing a “buffer-over-read” condition that allows the retreival of sensitive information in process memory