• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Vulnerability Scanning (Security Threats)

Software app that checks the network for weaknesses

Penetration Testing

Port Scanner

Port Scanner, Identify's what services are running on a network (firewalls, packets filters, apps. without authenticating

Open Ports

Banner Gabbing

Identify the banner or header info messages sent with data to find out about the sys



*App can be chatty (Say to much)


*Banner is always there (behind the scene)


*Capture it w/ Telnet or automatically tool

Banner can be snagged Telnet

Passive Testing (Tool)

No interaction, external testing of system

Opposite of Active

Protocol Analyzer

Monitors data that is transmitted across a network

Packet Sniffer

Vulnerability Scanner

App scanner identify vulnerability in web server database servers

Identify vulnerability for windows, Linux, Mac OS

Honeypots

Attract the bad guys and trap them

A trap

Honeynets

More than one honeypot on a network

Interpreting Vulnerability Scan

Scanner aren't perfect: Go back and go over the Vulnerability results and make sure the scanner is giving correct info

Networks is fickle

Active Testing (Tool)

Log in device: Actively go deep and interact with systems/devices look for Vulnerabilities

Like a Vulnerability scanner

Vulnerability Assessment

Actively scans a network for known Vulnerability

Opposite of Vulnerability Scanning (Passive Test)

Security Risk

Events that can comprise your assets. Understanding the risk.



Physical (lock doors)


Technical (Firewalls, Anitvirus etc.)

Action/Circumstances

Vulnerability

Weakness in the system



Unlocked Door or Firewall Disable

Known or Unknown

Threat

Intentional (Bad Guy Hacker) or accident.



Loss of Security


Access to a Room that's lock causing a "Data Breach, System Failure and Data Theft"

Action to exploit

Baseline Reporting

Determining the Risk



New Patches, New Applications and Hardware changes.



Changes indicate security concerns

Metric & Resources to monitor

Code Review

Audit "in House" Application


Examine source code


Injection Attacks

Rely on the Organization to give you this access code

Design Review

How does the software work. How many ways can a users interact w/ the App.

Look at all the details about the App

Architecture Review

Review the Database engine, Web server, browser type



Consider confidentially, integrity and availability.

This is a broad Security Requirement

Penetration Testing

Simulate an Attack



(Similar to Vulnerability scanning)



Only difference, we actually exploit the Vulnerability

Penetration Testing

Simulate an Attack



(Similar to Vulnerability scanning)



Only difference, we actually exploit the Vulnerability

Pentest

Verify a Threat Exist

Stay updated (watch the news)


Reference NIST


Perform regular Vulnerability scans

Be aware of any lastest Threats news

Bypass Security Controls

Force your way into the network.

Get in the Building

Actively Test Security Codes

Think like the Bad Guy, use the same controls through firewalls, IPS etc.



Try different testing techniques/methods to understand what the bad guys sees

To fight your way around the security system

Exploit Vulnerabilities

Purposely break into the system



Try the following;



Password Brute force attack


Social Engineering


Database injection


Buffer Overflows

This can assure you if you can break in the bad guy can as well!

Black Box Test


Pentest is not aware of a system attack

This is a Blind Teat

Black Box Test


Pentest is not aware of a system attack

This is a Blind Teat

White Box Test

Full Aware (disclosure) of a system attack

Opposite of a "Blind" test

Grey Box Test

Mixture of BLACK/WHITE BOX TESTING

Focusing on certain Sys & Apps

False Negatives

Identifying a Vulnerability that doesn't exist.



Real but not a High Priority

911 is a good example

False Negatives

Identifying a Vulnerability that doesn't exist.



Real but not a High Priority

911 is a good example

False Negative

A vulnerability exists, but you didn't detect it

Learning a vulnerability after being updates.

Vulnerability Scanning (Penetration Testing)

A passive test


Test from outside or inside

Unlike penetration test

Scan Types

Non-Intrusive- not exploiting any vulnerabilities



Intrusives Scans- exploit any vulnerabilities



Non-credentials scans- no log in access into the remote device



Credential scans- Your a normal user, emulate an insider attack



Ways to gather as much information

Vulnerability Scan Results

Indentified:



Lack of security controls


No firewall


No Anti-Virus


No Anti-Spyware


Misconfiguration


Open shares


Guest access


Real vulnerabilities

Identify Vulnerabilities

Scanner; Searching many types of vulnerabilities

When you cross-referenced online you are?

Malware

A variety types of hostile or intrusive software

This umbrella term is used by both BLACK HAT HACKERS and GOVERNMENTS to steal personal, financial, business information

Virus

Malware that can reproduce itself

A hidden program that produces/perform malicious action

Virus Types

Boot Sector (Drive Boot Area)


Program (Part of a legitimate App)


Script (OS and Browser Based)


Macro (Common in Microsoft


Multipartite (Infects and Spread multiple ways)

Worms

A Malware that replicates itself in order to spread to other computers

Worms

A Malware that replicates itself in order to spread to other computers

Adware

A Malware that spies/observes the computer users activities w/ out their consent

Adware

A Malware that observes the computer users activities w/ out their consent.

Spyware

Malware that spies on comp users. Also can trick you to installing bad programs

Spyware

A Malware that spies on comp users. Also can trick you to installing bad programs

Trojan Horse

A Malware that pretends to be a software that is something else

Backdoors

A Malware that can bypass normal authentication by enter they the backdoor

Backdoors

A Malware that can bypass normal authentication methods by entering thru the backdoor

Rootkits

A Malware, malicious software that is difficult to detect because they are activated before your sys OS has completely booted up

Rootkits

A Malware, malicious software that is difficult to detect because they are activated before your sys OS has completely booted up

Logic Bomb

A Malware, piece of code inserted in the OS or APP that implements a malicious function after a certain amount of time.

Botnet

A Malware, that infects a number of computers turning them into a BOT(s)

Botnet

A Malware, that infects a number of computers turning them into a BOT(s) (Robots)

Ransomware

A Malware, preventing/limiting users from accessing their system.

Polymorphic Malware

A Malware, is harmful, destructive or intrusive software making it differcult to detect w/ anti-malware programs

Armored Virus

A Malware, hard to identify/block using special tricks making disassembly difficult