Information Gathering and Vulnerability Scanning Flashcards

1
Q

Cyber Kill Chain

A
  • Reconnaissance
  • Weaponisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reconnaissance

A
  • Social Media
  • Website
  • Whois
  • DNS
  • Footprint
  • Open ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weaponisation

A

The attacker is going through the information gathered and identify techniques that can be used to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delivery

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploitation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Installation

A

Install malicious payload, backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command and Control

A

Two way communication. Privilege escalation. Hide the evidence of my compromise using encryption. Command and control your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Action on Objective

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Diamond Model

A

Provides a structure for identifying correlated groups of events. Efficient methods to stop attracts while increasing analytic productivity:
- Adversary
- Infrastructure
- Capability
- Victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TTPs

A

Tactics, Techniques and Procedures
Activities and patterns that attackers would utilise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tactics

A

The way that attackers operate during an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Techniques

A

The techniques used by hackers during their exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Procedures

A

Sequence of actions performed by an attacker to gain or achieve certain goals throughout their attack lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internal Reconnaissance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Enumeration

A

What kind of does the targeted organisation have:
- OS
- Services
- Apps and versions
- Hosts
- Processes
- User accounts
- IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adversary Behavioural Identification

A
  • Internal Reconnaissance
  • PowerShell
  • CLI processes
  • Suspicious proxy events
  • HTTP user agent
  • C&C servers
17
Q

DNS tunneling

A

Use DNS to tunnel and hide my malicious traffic

18
Q

Web-shells

A

You can use web-shells to control we servers

19
Q

Data Staging

A
20
Q

Indicator of Compromise

A
  • Unauthorised software and files
  • Suspicious emails
  • Suspicious registry entries and file system changes
  • Unknown ports and protocol usage
  • Excessive bandwidth usage
  • Rogue hardware
  • Service disruption and defacement
  • Suspicious or unauthorised account usage