Security, encryption, exploitation Flashcards

1
Q

What capabilities does encryption provides?

A
  1. Authentication
  2. Integrity
  3. Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How could someone break a cypher text?

A
  1. Flaw in the encryption algorithm (older algorithm or algorithm relying on obfuscation)
  2. Brute force
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the difference between encryption and encoding.

A

Encoding is the transformation of data from one form to another (method). Encryption is the transformation of data from one form to another, with the use of a key (method and key).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AES?

A

Advanced Encryption Standard. Symmetric encryption (one key). Key size of 128, 192 or 256.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a SSL certificate?

A

A certificate delivered by a CA on behalf of a website. It acts as the public key for the website. On login, the SSL certificate is used to negotiate a symmetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is hashing?

A

Hashing is one way encryption. It produces a message digest that can be used to validate a message. MD5, SHA1, SHA2, SHA3, SHA256, SHA512.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the purpose of the Red Team.

A

The Red Team is responsible for offensive operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the purpose of the Blue Team.

A

The Blue Team is responsible for defensive operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the concept of defense in depth.

A

The idea that defensive positions should be built in depth to produce redundancy in depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the three key areas of risk.

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 20 most important security controls.

A
  1. Inventory of authorized and unauthorized devices
  2. Inventory of authorized and unauthorized software
  3. Secure configuration for hardware and software
  4. Continuous vulnerability assessment and remediation
  5. Controlled use of administrative privilege
  6. Maintenance, monitoring and analysis of log files
  7. Malware defenses
  8. Limitation and control of network ports, protocols and services
  9. Email and Web Browser Protections
  10. Data recovery capability
  11. Secure configuration for Network devices such as Firewalls, Routers and Switches
  12. Boundary defense
  13. Data protection
  14. Controlled access based on the need to know
  15. Wireless access control
  16. Access monitoring and control
  17. Security skills assessment and appropriate training to fill gaps
  18. Application software security
  19. Incident response and management
  20. Penetration tests and red team exercises
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 stages of an attack?

A
  1. Reconnaissance
  2. Initial exploitation
  3. Persistence & Privilege
  4. Move laterally
  5. Exfiltration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Slingshot?

A

Distribution packaged by SANS institute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SIFT?

A

Distribution focused on forensic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Kali Linux?

A

Made by a company named Offensive Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name a few tools that can be used for reconnaissance.

A
Google & Robots
Job posting and LinkedIn
Wordlists & CeWL
Whois
DNSRecon and Dirb
NMap
17
Q

How can google be used for reconnaissance?

A

It can be used to find data and metadata that shouldn’t be shared publicely. Tools like metagoofil and exiftool can be used to find these data.

18
Q

How can you use job posting for reconnaissance?

A

It gives a good indication of what equipment and software a company is using. Tools like CeWL can help you build a word list from a job website.

19
Q

How could you use whois for reconnaissance?

A

Whois is a tool given information about the owner of a domain.

20
Q

What is DNS recon?

A

Reconnaissance of the DNS with a word list. The tool dnsmap can help you with that. Dirb can help you extract all directories exposed to the web.

21
Q

What is NMap?

A

Nmap is a tool to scan open ports on a system.

22
Q

What is a chain of custody?

A

The chain of custody is the record of all manipulation/transfer/ownership a piece of evidence goes through. It is important to ensure the evidence has not been tempered.

23
Q

What is steganography?

A

Steganography is the process of concealing information in a unsuspecting data recipient.

24
Q

Name the 7 steps of incident response.

A
  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
  6. Lesson learned
  7. Conclusion