Technical Interview Flashcards

1
Q

Vulnerability
Threat
Risk

A

A weakness on a system, application or network that can be exploited by a threat.
Examples:
Misconfiguration, default settings
Unpatched or outdated software
SMB v1, weak passwords.

How to find vulnerabilities:
Automated scanning software (Nessus, Qualys, Rapid7)

How to mitigate them:
Hardening of system settings
Patch and update
====
Threat:
Any potential negative event that is caused by a vulnerability that can result to harm.

====
Risk:
The likelihood of a vulnerability being exploited by a threat.
Risk is measure by the impact and the likelihood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How will you manage an incident as an Incident Manager?
Use NIST SP 800-61

A
  1. Preparation
  2. Detection & Analysis
  3. Containment, Eradication & Recovery.
  4. Post-Incident Activity

Let’s take a email phishing incident:
1. Verify that the incident is indeed phishing activity and not some phishing simulation test. Detection and analysis.
2. Identify the scope of the incident; how many users are affected and what kind of threats are associated with the phishing attack.
3. Contain by identifying the source and putting blocks in place to stop the flow of traffic.

  1. Eradicate- password changes and clean all the threats artifacts from inboxes and computers. Maybe take assets offline. Maybe wipe and re-image.
  2. Recovery, unblock the user, bring assets back online and restore services.
  3. As always, postmortem to summarize the actions and what we learned - reinvent the wheel with new knowledge.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How will you respond to a suspected data breach?

A

Using the NIST Computer Security Incident Handling Guide, there would have a prepared incident response plan and a playbook to triage the incident.

  1. Verify that there is indeed a confirmed incident. Perform analysis to determine what kind incident it is.
  2. Next I quarantine or stop the breach “containment, eradication and recovery ”—- then verify that the breach was stopped.
  3. Then address any legal requirements afterwards if we have to notify any HIPPA customers or stakeholders.
  4. Finally, I conduct a postmortem meeting to discuss lessons learned to now rebake back into our preparation phase.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How would you secure a server?

A

Use a CIS benchmark to perform a general security hygiene to tackle the low hanging fruits based on the function and criticality of that server and the data on it.

Steps:
Disable unused services
Use a strong password and lockout policy
Unused ports are closed
Implementing RBAC via GPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encoding
Encrypting
Hashing

A

Encoding is the process of converting data from one form to another according to a certain scheme, often for the purposes of standardization, speed, or compression. It’s not primarily meant for security and is easily reversible.

Hashing is the process of converting data into a fixed size of numerical or alpha-numerical value. It’s a one-way function, meaning the original data cannot be easily derived from the hash.

Encryption is a process that converts data into a cipher or encoded text to prevent unauthorized access. It uses a key to transform the data, and the data can be decrypted back to its original form using the appropriate decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Traceroute
Ping

A

Traceroute is a network diagnostic tool used to track in real-time the pathway taken by a packet on an IP network from source to destination. It also records the transit delays of packets across the network.

Ping is a computer network diagnostic tool used to test the reachability of a host on an IP network and to measure the round-trip time for packets sent from the source host to the destination. ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Frameworks:
MITREATT$CK
NIST

A

**MITRE ATT&CK ** is a universally accessible resource that outlines adversary tactics and techniques, based on observed real-world incidents. It’s utilized by the cybersecurity community for creating specific threat models and methodologies.

The NIST (The NIST Framework is a collection of voluntary standards, guidelines, and recommended practices designed to manage cybersecurity-related risks. Its main resource is the Framework for Improving Critical Infrastructure Cybersecurity, also referred to as the Cybersecurity Framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL
TLS
SSL/TLS Handshake

A

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols designed to provide secure communication over a computer network. They are most commonly used in applications like web browsing, email, and voice over IP (VoIP).

SSL is the older of the two protocols and is now largely deprecated due to known vulnerabilities.

TLS is the successor to SSL and offers improved security. When you see “HTTPS” in a web address, it signifies that the website is using TLS (or its predecessor SSL) to secure the communication between your browser and the website.

An SSL/TLS handshake is a process that begins communication between a client and server. It ensures that both parties verify each other, agree on a common encryption algorithm, and establish session keys for secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anomalies and how to identify them

A

An anomaly refers to patterns in data that do not conform to a well-defined notion of normal behavior. In the context of cybersecurity, it might refer to any unusual behavior or patterns that could indicate a potential security breach.

Identifying anomalies typically involves building a model of what’s considered “normal” behavior, often through machine learning or statistical analysis. This might involve analyzing system logs, network traffic, or user behavior. Any data points or activities that significantly deviate from this model are flagged as anomalies. This method is often used in Intrusion Detection Systems (IDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would you do first?
Compress and Encrypt

A

Compress first, then encrypt. Compression algorithms work by removing redundancy, while encryption algorithms aim to remove patterns to make data look random.

If you encrypt first, you might not be able to effectively compress the data later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cross-Site Scripting - XSS
Cross-Site Forgery - CSRF

A

Cross-Site Scripting (XSS) is a type of security vulnerability typically found in web applications, where malicious scripts are injected into trusted websites. These scripts can steal user data, spread malware, or manipulate web content.

Defending against XSS generally involves:

  1. Input Validation: Ensure that all user-supplied data is checked and validated to allow only expected inputs.
  2. Output Encoding: Encode user-supplied data when it’s displayed back on the website, especially in places where user input could be interpreted as code.
  3. Content Security Policy (CSP): Implement CSP headers to restrict the sources from which scripts can be loaded, helping to prevent the execution of malicious scripts.
  4. Regularly Update and Patch: Regularly update and patch systems and libraries to fix any known vulnerabilities that might be exploited via XSS.
  5. Use of Security Headers: Security headers like X-XSS-Protection can help prevent reflected XSS attacks.
  6. Use secure development frameworks: Some modern web development frameworks like React.js auto-escape HTML inputs, providing a certain level of protection against XSS.

Cross-Site Request Forgery (CSRF) is a type of cyber attack that tricks a victim into making an unwanted action in a web application they’re authenticated in, often leading to data loss, theft, or malicious function execution.

Defense:

  1. Use Anti-CSRF Tokens: Include unique, unpredictable tokens in each HTTP request to ensure the request is made intentionally by the user.
  2. SameSite Cookie Attribute: Configure your application’s cookies to use the SameSite attribute, which prevents the browser from sending cookies along with cross-site requests.
  3. Implement CAPTCHA: CAPTCHAs can ensure a real user is making the request, although they can be cumbersome for the user.
  4. Check HTTP Referer Headers: Validate that the request came from an authorized page.
  5. Use a robust web application firewall (WAF): A WAF can help to block CSRF attacks by identifying and filtering out malicious requests.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a threat actor maintain persistence?

A

Registry Keys: Malware can create or modify registry keys to ensure automatic execution during system startup or login.

Startup Folder: Malicious files can be placed in system startup folders, allowing them to run when the user logs in.

Scheduled Tasks: Malware may create scheduled tasks that trigger at specific times or events, ensuring persistence and regular execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you stay current with threats and vulnerabilities?

A

I regularly attend industry conferences, participate in webinars, and engage in online forums to learn about the latest developments. I also follow trusted sources such as security blogs, whitepapers, and podcasts.

(US-CERT), National Vulnerability Database, SecurityFocus, SANS Internet Storm Center, Krebs on Security, Malwarebytes Labs, The CyberWire, Dark Reading, ThreatPost, Security Weekly Podcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how you will prioritize and escalate incidents

A
  1. Initial Assessment: Evaluate incident severity based on data sensitivity, system criticality, and potential business impact.
  2. Classify incidents into predefined levels based on urgency and importance to determine their priority.
  3. Incident Prioritization: Assign priorities based on potential damage, operational risk, compliance, and customer impact. Address high-priority incidents as a priority.
  4. Resource Allocation: Allocate personnel, tools, and infrastructure based on incident priorities. Ensure skilled personnel are available to handle critical incidents efficiently.
  5. Escalation Criteria: Establish clear criteria for incident escalation, considering complexity, potential impact escalation, and lack of resolution progress.
  6. Escalation Process: Establish a clear, defined process for escalation, including levels, channels, and designated individuals for effective communication.
  7. Maintain transparent communication with stakeholders, including management, teams, and relevant parties. Provide regular updates on incident status, progress, and resolution efforts.
  8. Continuous Monitoring: Monitor incident progress, re-evaluate priorities if needed, and adjust resource allocation and escalation as required.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are TTPS

A

TTP stands for “Tactics, Techniques, and Procedures” used by threat actors in cybersecurity.
It refers to the knowledge of attack methods, hacker tools, and processes used to compromise systems and networks.
Understanding TTPs is vital for incident response and implementing preventative measures.

Example:
Reconnaissance
Tools: Maltego, Shodan, Recon-ng
Purpose: These tools help threat actors gather information about target systems, networks, and individuals by exploring public data sources, conducting network scanning, and performing OSINT (Open-Source Intelligence) analysis.

Exploitation
Tools: Metasploit Framework, Cobalt Strike, ExploitDB
Purpose: These tools provide pre-built exploits and payloads to identify and exploit vulnerabilities in target systems or applications. They assist threat actors in gaining unauthorized access or control over the compromised systems.

Persistence
Tools: PowerShell Empire, Covenant, Metasploit Post-exploitation modules
Purpose: These tools help threat actors establish persistence in compromised systems. They provide capabilities for maintaining control, creating backdoors, and ensuring persistent access even after initial compromise.

Lateral Movement:
Tools: BloodHound, Mimikatz, Responder
Purpose: These tools assist threat actors in moving laterally through a network by compromising additional systems. They exploit weaknesses like weak credentials, pass-the-hash attacks, or exploiting trust relationships to escalate privileges and gain access to other systems.

Data Exfiltration:
Tools: APT34’s “Poison Frog” tool, HTRAN, WinRAR
Purpose: These tools enable threat actors to steal and extract sensitive data from compromised systems. They may employ encryption, compression, or covert channels to exfiltrate data while evading detection or bypassing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reconnaissance

A

Phishing: Sending deceptive emails, messages, or calls to trick individuals into revealing sensitive information or downloading malware.

OSINT (Open-Source Intelligence): Gathering information from publicly available sources like social media, websites, or online forums to gain insights about potential targets.

17
Q

Exploitation

A

Social Engineering: Manipulating individuals through psychological tactics to deceive them into providing access credentials or sensitive information.

SQL Injection: Exploiting vulnerabilities in web applications to execute unauthorized SQL commands, manipulate databases, or gain unauthorized access.

18
Q

Persistence

A

Backdoors: Creating hidden entry points or malicious software within compromised systems to maintain persistent access.

Rootkits: Concealing malicious processes, files, or network connections to evade detection by security systems and maintain long-term control.

19
Q

Lateral Movement

A

Pass-the-Hash: Using stolen hashed credentials to authenticate and gain access to other systems within the same network.

Exploiting Vulnerabilities: Leveraging unpatched software vulnerabilities or weak configurations to move laterally and escalate privileges.

20
Q

Data Exfiltration

A

Covert Channels: Utilizing unconventional communication methods to bypass network monitoring or firewalls and exfiltrate data.

Stenography: Hiding sensitive data within innocuous files or images to avoid detection while transferring information out of the compromised system.

21
Q

Current and Emerging Threats & Vulnerabilities

A

One of the emerging threats is ransomware attacks on healthcare facilities and local governments.

AI-driven attacks are also increasing. In terms of vulnerabilities, unpatched systems and weak authentication methods are still leading causes.

The rise of remote work has also led to an increase in endpoint attacks.

Vulnerabilities:

Common cybersecurity vulnerabilities include:

  1. Injection Vulnerabilities: These happen when harmful data is sent through an application, such as SQL injections or Cross-Site Scripting (XSS).
  2. Buffer Overflows: Overfilling a program’s buffer, causing adjacent memory overwrite and possible malicious code execution.
  3. Unpatched Software: Attackers can exploit known vulnerabilities in software if updates aren’t installed promptly.
  4. Misconfigured Access Controls: Poorly configured permissions can allow unauthorized access to sensitive data or systems.
  5. Phishing Attacks: These trick users into revealing sensitive information or clicking malicious links.
  6. Weak Passwords: Easily guessed or cracked passwords present a significant vulnerability.
  7. Insecure Network Connections: Unsecured Wi-Fi networks can be exploited to intercept data.
  8. Insufficient Logging and Monitoring: Without effective monitoring, suspicious activities might not be detected in time.
  9. Poorly Implemented Encryption: Incorrectly implemented encryption could allow attackers to decrypt sensitive data.
  10. Outdated Systems or Hardware: Old, unsupported systems or hardware may contain unpatched vulnerabilities.
22
Q

IOC - Indicators of Compromise

A

IOCs are pieces of forensic data that identify potentially malicious activity on a system.

Examples: include unusual outbound network traffic, anomalies in privileged user account activity, or the presence of malware files.

I’ve used IOCs extensively in my previous roles to detect, prevent, and respond to security incidents.

23
Q

Endpoint Protection and Enterprise Detection & Response Software - EDR

A

EDR, or Endpoint Detection and Response, is a cybersecurity technology focused on detecting and responding to advanced threats at the endpoint level. It provides real-time monitoring, threat detection, and incident response capabilities.

By collecting and analyzing data from endpoints, EDR tools identify potential threats using techniques like machine learning and behavior analytics.

When a security incident is detected, EDR solutions trigger alerts, providing detailed information and enabling security teams to investigate, contain, and remediate the threat.

Sometimes, I even use these tools to maintain an inventory of all applicable devices on the network to ensure that they are meeting the company’s security standards.

24
Q

A Host Intrusion Detection System (HIDS)

A

A Host Intrusion Detection System (HIDS) operates on individual devices in a network, monitoring inbound and outbound packets exclusively from that device. It alerts users or administrators to suspicious activity. HIDS can detect local and network attacks by focusing on system files and configuration integrity, offering the advantage of detecting unusual behavior within the host.

25
Q

A Network Intrusion Detection System (NIDS)

A

A Network Intrusion Detection System (NIDS) monitors network traffic. It evaluates traffic across the entire subnet, matches it to known attacks, and alerts administrators if abnormal behavior is detected. NIDS identifies patterns or signatures of known threats and can monitor an entire network from a single point. In essence, a HIDS focuses on individual hosts, while a NIDS oversees network traffic. Both offer unique advantages and, when used together, provide a thorough defense against threats.

26
Q

Stateful Firewalls - Filtered Ports

A

Filtered ports are used in stateful firewalls. These firewalls keep track of network connections and allow traffic through if it is part of an established connection or if it’s related to a previously established connection. They provide a higher level of security because they examine each packet of data, ensuring it matches an established connection in its state table.

27
Q

Stateless Firewalls - Closed Ports

A

Closed ports are used in stateless firewalls. These firewalls use rules to block or allow traffic based on IP address, port, or protocol. They don’t keep track of connections and treat each packet individually. This can offer performance advantages, but it might not provide as much security as a stateful firewall, because it doesn’t examine the context of traffic.

28
Q

Port Scanning

A

Port scanning is a method used to detect open ports on a host network. These open ports, which serve as communication interfaces for applications, can reveal potential system vulnerabilities. Various types of port scans, such as TCP connect, SYN, and UDP scanning, are utilized to discover these open ‘doors’ into a system.

29
Q

Fingerprinting

A

A technique used to identify the operating system or software on a remote computer. This is achieved by analyzing responses from the target system to specific requests. It can expose details like the operating system, system configurations, and application types and versions, potentially highlighting vulnerabilities for exploitation.

30
Q

Find the original IP address of a malicious email

A
  1. Inspect the email header, which contains information about the path the email took to reach you.
  2. Open the Email Header
  3. Find the “Received: from” Lines
  4. Identify the Original IP: The original sender’s IP address should be the one listed in the last “Received: from”
  5. Verify the IP- IPVoid, VirusTotal, etc.
31
Q

Recent Breaches

A
  1. Healthcare management firm Intellihartx suffered a data breach where hackers stole medical details of over half a million patients, including social security numbers. The breach occurred in January but was not discovered until April.
  2. The MOVEit file transfer tool was hacked, compromising sensitive data from numerous user firms. Among those affected were Zellis, British Airways, BBC, and the province of Nova Scotia, with the possibility of many more unreported cases. The Russian ransomware group Clop took responsibility for the June 6th attack.
  3. Password management tool LastPass experienced a security breach where certain customer information was accessed. According to LastPass, no passwords were compromised during this incident. This isn’t the first breach for LastPass this year, as an intrusion into their development environment occurred in August, but similarly, no passwords were accessed during that incident.
32
Q

Threat Actor

A

A threat actor is a person or group of people who conduct malicious targeting or attacks on others. Typically motivated by espionage, financial gain or publicity, threat actors may conduct a full campaign alone or work with other groups who specialize in specific aspects of an attack.

Examples:
1. Individual Hackers: Single entities hacking for personal gain, political reasons, or for the thrill of the challenge.

  1. Organized Crime Groups: Collectives orchestrating cybercrime for financial profit, engaging in actions such as ransomware attacks or data breaches.
  2. Hacktivist Groups: Entities like Anonymous that use hacking to advocate political or social change.
  3. Insider Threats: Individuals within an organization compromising its cybersecurity, either intentionally (e.g., disgruntled employees) or inadvertently (e.g., those falling for phishing scams).
  4. State-Sponsored Actors: Hackers supported by governments, executing espionage, disruption, or attacks on other nations, organizations, or individuals. Examples are APT28 (Fancy Bear, linked to Russia) and APT3 (Gothic Panda, linked to China).
  5. Terrorist Groups: Such groups may employ hacking to disrupt infrastructure, propagate their messages, or cause harm.
  6. Competitor Companies: Businesses may engage in illicit activities, such as industrial espionage, to secure a competitive advantage.
33
Q

Symmetric vs. Asymmetric Encryption

A

Symmetric encryption uses the same key for both encryption (converting plaintext to ciphertext) and decryption (converting ciphertext back to plaintext). It’s faster and more efficient, making it suitable for encrypting large amounts of data, but sharing the key securely can be challenging.

Asymmetric encryption, also known as public key encryption, uses two different keys: one public key for encryption and a corresponding private key for decryption. This method is more secure as the private key doesn’t need to be shared, but it’s slower and requires more computational resources, making it less suitable for encrypting large amounts of data.