Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
- 3rd side (hint)
Vulnerability Scanning (Security Threats) |
Software app that checks the network for weaknesses |
Penetration Testing |
|
Port Scanner |
Port Scanner, Identify's what services are running on a network (firewalls, packets filters, apps. without authenticating |
Open Ports |
|
Banner Gabbing |
Identify the banner or header info messages sent with data to find out about the sys
*App can be chatty (Say to much) *Banner is always there (behind the scene) *Capture it w/ Telnet or automatically tool |
Banner can be snagged Telnet |
|
Passive Testing (Tool) |
No interaction, external testing of system |
Opposite of Active |
|
Protocol Analyzer |
Monitors data that is transmitted across a network |
Packet Sniffer |
|
Vulnerability Scanner |
App scanner identify vulnerability in web server database servers |
Identify vulnerability for windows, Linux, Mac OS |
|
Honeypots |
Attract the bad guys and trap them |
A trap |
|
Honeynets |
More than one honeypot on a network |
|
|
Interpreting Vulnerability Scan |
Scanner aren't perfect: Go back and go over the Vulnerability results and make sure the scanner is giving correct info |
Networks is fickle |
|
Active Testing (Tool) |
Log in device: Actively go deep and interact with systems/devices look for Vulnerabilities |
Like a Vulnerability scanner |
|
Vulnerability Assessment |
Actively scans a network for known Vulnerability |
Opposite of Vulnerability Scanning (Passive Test) |
|
Security Risk |
Events that can comprise your assets. Understanding the risk.
Physical (lock doors) Technical (Firewalls, Anitvirus etc.) |
Action/Circumstances |
|
Vulnerability |
Weakness in the system
Unlocked Door or Firewall Disable |
Known or Unknown |
|
Threat |
Intentional (Bad Guy Hacker) or accident.
Loss of Security Access to a Room that's lock causing a "Data Breach, System Failure and Data Theft" |
Action to exploit |
|
Baseline Reporting |
Determining the Risk
New Patches, New Applications and Hardware changes.
Changes indicate security concerns |
Metric & Resources to monitor |
|
Code Review |
Audit "in House" Application Examine source code Injection Attacks |
Rely on the Organization to give you this access code |
|
Design Review |
How does the software work. How many ways can a users interact w/ the App. |
Look at all the details about the App |
|
Architecture Review |
Review the Database engine, Web server, browser type
Consider confidentially, integrity and availability. |
This is a broad Security Requirement |
|
Penetration Testing |
Simulate an Attack
(Similar to Vulnerability scanning)
Only difference, we actually exploit the Vulnerability |
|
|
Penetration Testing |
Simulate an Attack
(Similar to Vulnerability scanning)
Only difference, we actually exploit the Vulnerability |
Pentest |
|
Verify a Threat Exist |
Stay updated (watch the news) Reference NIST Perform regular Vulnerability scans |
Be aware of any lastest Threats news |
|
Bypass Security Controls |
Force your way into the network. |
Get in the Building |
|
Actively Test Security Codes |
Think like the Bad Guy, use the same controls through firewalls, IPS etc.
Try different testing techniques/methods to understand what the bad guys sees |
To fight your way around the security system |
|
Exploit Vulnerabilities |
Purposely break into the system
Try the following;
Password Brute force attack Social Engineering Database injection Buffer Overflows |
This can assure you if you can break in the bad guy can as well! |
|
Black Box Test
|
Pentest is not aware of a system attack |
This is a Blind Teat |
|
Black Box Test
|
Pentest is not aware of a system attack |
This is a Blind Teat |
|
White Box Test |
Full Aware (disclosure) of a system attack |
Opposite of a "Blind" test |
|
Grey Box Test |
Mixture of BLACK/WHITE BOX TESTING |
Focusing on certain Sys & Apps |
|
False Negatives |
Identifying a Vulnerability that doesn't exist.
Real but not a High Priority |
911 is a good example |
|
False Negatives |
Identifying a Vulnerability that doesn't exist.
Real but not a High Priority |
911 is a good example |
|
False Negative |
A vulnerability exists, but you didn't detect it |
Learning a vulnerability after being updates. |
|
Vulnerability Scanning (Penetration Testing) |
A passive test Test from outside or inside |
Unlike penetration test |
|
Scan Types |
Non-Intrusive- not exploiting any vulnerabilities
Intrusives Scans- exploit any vulnerabilities
Non-credentials scans- no log in access into the remote device
Credential scans- Your a normal user, emulate an insider attack
|
Ways to gather as much information |
|
Vulnerability Scan Results |
Indentified:
Lack of security controls No firewall No Anti-Virus No Anti-Spyware Misconfiguration Open shares Guest access Real vulnerabilities |
|
|
Identify Vulnerabilities |
Scanner; Searching many types of vulnerabilities |
When you cross-referenced online you are? |
|
Malware |
A variety types of hostile or intrusive software |
This umbrella term is used by both BLACK HAT HACKERS and GOVERNMENTS to steal personal, financial, business information |
|
Virus |
Malware that can reproduce itself |
A hidden program that produces/perform malicious action |
|
Virus Types |
Boot Sector (Drive Boot Area) Program (Part of a legitimate App) Script (OS and Browser Based) Macro (Common in Microsoft Multipartite (Infects and Spread multiple ways) |
|
|
Worms |
A Malware that replicates itself in order to spread to other computers |
|
|
Worms |
A Malware that replicates itself in order to spread to other computers |
|
|
Adware |
A Malware that spies/observes the computer users activities w/ out their consent |
|
|
Adware |
A Malware that observes the computer users activities w/ out their consent. |
|
|
Spyware |
Malware that spies on comp users. Also can trick you to installing bad programs |
|
|
Spyware |
A Malware that spies on comp users. Also can trick you to installing bad programs |
|
|
Trojan Horse |
A Malware that pretends to be a software that is something else |
|
|
Backdoors |
A Malware that can bypass normal authentication by enter they the backdoor |
|
|
Backdoors |
A Malware that can bypass normal authentication methods by entering thru the backdoor |
|
|
Rootkits |
A Malware, malicious software that is difficult to detect because they are activated before your sys OS has completely booted up |
|
|
Rootkits |
A Malware, malicious software that is difficult to detect because they are activated before your sys OS has completely booted up |
|
|
Logic Bomb |
A Malware, piece of code inserted in the OS or APP that implements a malicious function after a certain amount of time. |
|
|
Botnet |
A Malware, that infects a number of computers turning them into a BOT(s) |
|
|
Botnet |
A Malware, that infects a number of computers turning them into a BOT(s) (Robots) |
|
|
Ransomware |
A Malware, preventing/limiting users from accessing their system. |
|
|
Polymorphic Malware |
A Malware, is harmful, destructive or intrusive software making it differcult to detect w/ anti-malware programs |
|
|
Armored Virus |
A Malware, hard to identify/block using special tricks making disassembly difficult |
|