Securing User Envirionment Flashcards

1
Q

what is the password file in linux?

A

/etc/passwd is the file where all users are categorized and listed as having pws and group policies listed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the format for each line in the passwd file?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the category of files you will find in /etc ?

A

all config files for the system and programs. all of them are customizable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the /etc/group File work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the /etc/shadow File?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the /etc/login.def ?

A

This is called the login.default file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Commands to create user accounts and setting account passwords

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the chage command work?

A

Looks like CHANGE, but chage shows how long ago a password was changed.

But it’s really CH-AGE, change age.

and setting password policies for when the password can be change, min/max days allowed to change password or have it expire. also set the days before hand that they will be warned that their pw is expire. and you can make the account inactive after x days expires that it’s disabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

examples of how to use chage command by finding the user id, etc.

A

The image chage example is missing the actual username, which should be specified at the end of the syntax.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Setting password policy.

what are the 3 main files where you can set password policy?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would you change the the number of previous passwords it would compare against? IOW, you can’t use any of the previous 5 pws, for example…

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How would you require a pw length?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How would you set the minimum number of required class of characters for use in the password?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the useradd document work and where is it located?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you lock or disable user accounts manually?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to lock a user account after 3 failed attempts?

A
17
Q

What happeneds after a user’s account is locked after x failed attempts and they use the CORRECT password?

A

It will fail just like it did previously for the first x number of attempts BEFORE you used the right one. This is because the account is locked an no password will open it.

18
Q
A
19
Q

Deployed in conjunction with snort, what is bro.org bro IDS?

A

Anomaly detection
Network analysis framework
IDS - intrusion detection system
Domain specific language
Traffic analysis
Programming experience required

20
Q

What is Openwips-ng?
openwips-ng.org

A

Wireless intrusion prevention system
Open source
Sig based intrusion detection
Composed of 3 parts:
Sensor - dumb devices that capture wireless traffic and send it to the server for analysis. They respond to attacks

Server - aggregates the data from all sensors analyzes it and responds to attacks. Also logs

Interface - gui manages the server and displays information about the threats on your wireless networks

21
Q

What’s a HIDS?

A

Host based intrusion detection system

22
Q

What is ossec?

A

Open source HIDS Security
O S SEC

Scalable
Supports multiple platforms
Maintained by trendmicro
It performs log analysis, file integrity checks, windows reg monitoring, centralized policy enforcement, root kit detection, real time alerting, and active response.
The active response is supposed to be really nice.
Windows requires an agent, the other OS are agentless.

Free.
Has high admin burden

Honey pots might be a better solution if you don’t have the man power to support it and deploy it

23
Q

ossec.conf

A

/var/ossec/etc/ossec.conf
Configure server completely here

24
Q

Manage agents config command
manage_agents

A

sudo /var/ossec/bin/manage_agents
Add an agent
Can get auth keys here for agents

25
Q

Network analysis tools for NBA
What’s NBA?

A

Network behavior analysis
Network security monitoring

26
Q

NBA Sguil (squeal)

A

Network security analyzer
Gui
Access to real-time events, session data and raw packet captures
The client is written in tickleTK

27
Q

Xplico.org

A

X pleeco
Network forensics and analysis tool
Web gui
Supports lots of protocols
It’s in many distros
Like Kali and security onion

28
Q

NetworkMiner

A

Network forensic analysis tool for windows and some Linux distros
Can packet capture without outing any traffic on the network. The caps will reveal hosts, files shared or downloaded, messages, creds, sessions, dns requests

29
Q

Portswigger.net
Burp

A

Proxy software

30
Q

Mitmproxy

A

Man in the middle proxy. Can install on os and find out what it’s connecting to

31
Q

OWASP Zed Attack Proxy (ZAP)

A

Burp and Zap are also good proxy’s for detection if you want to check out what’s happening in your web traffic

32
Q

FIMs

A

File integrity monitoring
Host based
Preforms the act of validating files
Checks hash against the calculated check some
Other ways to check for file integrity as well
Typically automated with alerts on changes

33
Q

Recommended FIMs:
Osquery
Ossec

A

Intrusion detection
Can also act as a FIM

34
Q

Windows files to include in FIM

A