Domain 4.0 Operations/Incident Response

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/122

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:57 PM on 6/15/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

123 Terms

1
New cards

Tracert / Traceroute

Shows the route to a remote host like a website and displays response latency at each hop.

2
New cards

Nslookup / Dig

Command line tools to verify IP addresses of hostnames or domains in DNS server database.

3
New cards

Ipconfig / Ifconfig

Tools to display IP configuration, with Windows using ipconfig and Unix/Linux using ifconfig.

4
New cards

Nmap

Free Network Mapper for device inventory, service discovery, and banner grabbing, used cautiously for active reconnaissance.

5
New cards

Pathping

Combines Ping and Traceroute functionalities, calculating statistics and packet loss at each router.

6
New cards

Hping

Open-source TCP/IP Packet Generator and Analyzer for auditing firewalls and networks, useful for pentesting.

7
New cards

Netstat

Windows tool for network statistics, showing connections, listening ports, and running services.

8
New cards

Nc

Linux/Unix utility for network connections, port scanning, and file transfer.

9
New cards

IP Scanners

Tools like Angry IP scanner to scan IP addresses for open ports, available in command line and GUI versions.

10
New cards

Arp

Address Resolution Protocol for mapping IP to MAC addresses on LAN, with commands like arp -a and arp -d.

11
New cards

Route

Windows and Linux command for listing and adding routes in local routing tables.

12
New cards

Curl

Command line tool for data transfer using various protocols like HTTP, FTP, and SMTP.

13
New cards

TheHarvester

Passive tool in Kali Linux for harvesting email addresses, useful for reconnaissance.

14
New cards

Sn1per

Linux tool for automated penetration testing, scanning vulnerabilities, open ports, and web app vulnerabilities.

15
New cards

Scanless

Linux pentesting tool for anonymous open port scans on target hosts, developed in Python.

16
New cards

Dnsenum

Linux command line tool for identifying DNS records and attempting reverse DNS resolution in penetration testing.

17
New cards

Nessus

Network security scanner for vulnerability checks, available in Linux and Windows.

18
New cards

Cuckoo

Open-source tool for creating a sandbox for malware inspection on Windows and Linux.

19
New cards

(Cat)

Linux command for viewing, creating, and combining files, and redirecting output in terminal or files.

20
New cards

Head

Command to view top messages in log files like var/log/messages.

21
New cards

Tail

Command to view last lines in log files, complementary to the head command.

22
New cards

Grep

Linux command for searching text and log files using regular expressions.

23
New cards

Chmod

Command for changing permission levels on files or directories.

24
New cards

What a logger can do?

Adds messages to local system logs or remote syslog servers, commonly used in automation scripts.

25
New cards

SSH

Secure alternative to Telnet for remote command execution, commonly used for secure remote access.

26
New cards

PowerShell

Scripting language for performing tasks in Windows environments, with commands known as commandlets.

27
New cards

Python

Widely used programming language in cybersecurity and data science.

28
New cards

OpenSSL

Software suite for managing TLS and SSL functions like keys and certificates.

29
New cards

Protocol Analyzers

Tools like Wireshark for capturing and analyzing network packets.

30
New cards

Tcpreplay

Open-source tool for analyzing and replaying traffic from .pcap files.

31
New cards

TcpDump

Linux/Unix network packet analyzer tool for monitoring Ethernet adapter information.

32
New cards

Wireshark

Free and open-source network packet analyzer available for Windows and Linux.

33
New cards

Forensics

Tools used in forensic investigations for analyzing digital evidence.

34
New cards

Dd tool

Linux command for cloning disks or copying folders in forensic investigations.

35
New cards

WinHex

Hexadecimal editor for finding evidence in forensic investigations on Windows OS.

36
New cards

Memdump

Linux tool for analyzing dump files created during system crashes.

37
New cards

FTK Imager

Data preview and imaging tool for assessing electronic evidence quickly.

38
New cards

Autopsy

Forensic tool for analyzing hard drives, smartphones, and media cards, with translation capabilities.

39
New cards

Exploitation Frameworks

Software tools for detecting and exploiting vulnerabilities on remote systems.

40
New cards

Password Crackers

Tools like Cain and Abel for cracking passwords and creating password hashes.

41
New cards

Data Sanitization

Process of irreversibly removing data from memory devices to ensure it's not recoverable.

42
New cards

Plan vs Process vs Procedures

Definitions distinguishing between high-level plans, ordered processes, and detailed procedures.

43
New cards

Incident Response Plans

Plans designed to respond to incidents quickly and prevent further compromise of an organization, focusing on maintaining Confidentiality, Integrity, and Availability (C.I.A).

44
New cards

Incident Response Process

Comprised of 6 phases - Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned - to effectively manage and resolve incidents.

45
New cards

Tabletop (Exercise)

A paper-based hypothetical distribution of Incident Response Plans to team members for review and feedback to keep the plan current.

46
New cards

Walkthroughs

Involves role-playing an incident scenario in a large conference room to ensure team members are familiar with their roles and available resources.

47
New cards

Simulations

Structured walkthroughs where response measures are tested, making it the best exercise to enhance incident response capabilities.

48
New cards

MITRE ATT&CK Framework

An online framework developed by MITRE to provide information about adversaries, their tactics, techniques, and common knowledge to prevent cyber-attacks.

49
New cards

The Cyber Kill Chain

Traces stages of a cybersecurity attack from early reconnaissance to achieving the intruders' objectives, following a structured process.

50
New cards

The Diamond Model of Intrusion Analysis

A framework used for gathering intelligence on network intrusion attacks, focusing on adversary, capabilities, infrastructure, and victim.

51
New cards

Communication Plan

Details how stakeholders will be informed in the event of a security breach, ensuring confidentiality and compliance with regulations like GDPR.

52
New cards

Stakeholder Management

Involves informing and managing various groups of stakeholders such as internal stakeholders, cyber insurance providers, and law enforcement during incidents.

53
New cards

Business Continuity Plan (BCP)

An organizational plan focused on how to continue business operations during and after an incident.

54
New cards

Disaster Recovery Plan (DRP)

A plan for recovering from a disaster impacting IT infrastructure and returning it to regular operations.

55
New cards

Retention Policies

Policies determining how long an organization can store data, considering data classification and regulatory compliance requirements.

56
New cards

Vulnerability Scanner

Identifies and reports vulnerabilities like software flaws, missing patches, and weak passwords to prevent known attacks.

57
New cards

Credentialed Vulnerability Scanner

A thorough scan using admin credentials to expose vulnerabilities effectively, providing detailed information for mitigation.

58
New cards

SIEM Dashboards

Collect data for correlation and analysis, offering centralized visibility and real-time information on threats.

59
New cards

Sensors

Deployed across networks to monitor changes in network patterns or log file entries, aiding in detecting and responding to events.

60
New cards

Sensitivity (SIEM Dashboards)

Monitors sensitive data to ensure regulatory compliance, focusing on protecting personally identifiable information (PII) and other sensitive data.

61
New cards

Trends

Identify patterns in network traffic, event volume, and activities to understand changes in the environment.

62
New cards

Alerts (from SIEM Solution)

Provide information about events on network devices, with optional email notifications and response automation for timely actions.

63
New cards

Correlation

Analyzes log files from multiple sources to generate a centralized view, emphasizing the importance of time synchronization for accurate analysis.

64
New cards

Log Files

Core evidence sources for investigations, including network, web, system, application, security, DNS, and authentication logs.

65
New cards

VOIP and Call Managers

Systems that log call details, including call quality metrics, to secure VoIP phones and monitor call activities for security purposes.

66
New cards

Session Initiation Protocol (SIP) / Traffic

Used for internet-based calls, log files show events like INVITE and 200 OK, helping detect potential attacks based on call patterns.

67
New cards

Syslog

A log collector that gathers event logs from various devices and sends them to a central syslog server. In Linux, it is implemented as syslogd or syslog daemon, storing logs in the var/log/syslog directory.

68
New cards

Rsyslog

Known for high performance, it receives, transforms, and sends data to destinations like SIEM servers or other syslogs. It is an open-source option.

69
New cards

Syslog-ng

An open-source logging solution for Unix and Linux systems with broader platform support than Rsyslog.

70
New cards

Journalctl

Utility for querying and displaying logs from journald, systemd's logging service, to view logs in a readable format.

71
New cards

NXLog

An open-source log management tool for identifying security risks in Linux/Unix environments, offering log processing features and supporting Linux, Windows, and Android.

72
New cards

Bandwidth Monitors

Tools used to understand network traffic flow, monitor changes in traffic patterns, identify network devices causing bottlenecks, and detect broadcast storms or denial-of-service attacks.

73
New cards

Metadata

Data providing information about other data, such as email headers, mobile telecom data, website metadata, and file metadata.

74
New cards

Netflow, sflow, IPFIX

Network monitoring solutions like Netflow (CISCO proprietary), sflow (multi-vendor), and IPFIX (Open Standard Protocol) used to monitor network traffic and identify patterns.

75
New cards

Protocol Analyzer Output

Details on output format, compatibility, and use in forensic investigations, often referred to as a packet sniffer, saving data to a .PCAP file format.

76
New cards

Reconfigure Endpoint Security Solutions

Adjusting endpoint security solutions due to technological changes or data breaches.

77
New cards

Approved Applications List

A list of authorized applications; if an app is not listed, it cannot be launched.

78
New cards

Application Block List/Deny List

Catalog of dangerous apps, preventing them from running, especially offensive security tools.

79
New cards

Quarantine

Isolating infected devices from the network, ensuring compliance before granting access, and potentially placing them in a remediation network.

80
New cards

Configuration Changes

Adjustments made to secure the environment against emerging threats.

81
New cards

Firewall Rules

Used to block traffic, with changes applied through MDM solutions or group policies on endpoint devices.

82
New cards

MDM (Mobile Device Management)

Manages and configures mobile devices, enforcing settings like password policies and camera blocking.

83
New cards

Data Loss Prevention (DLP)

Policy-based protection of sensitive data, safeguarding data at rest or in transit, in various platforms.

84
New cards

Content Filter / URL Filter

Filters updated to counter new threats, especially on proxy servers or UTM firewalls.

85
New cards

Update or Revoke Certificates

Updating or revoking certificates to address errors or compromises, essential for internet-facing services.

86
New cards

Isolation

Blocking all access, like air-gapping endpoints to protect against network-based attacks.

87
New cards

Containment

Minimizing damage and limiting incident scope, crucial in incident response before root cause analysis.

88
New cards

Segmentation

Dividing a network into smaller parts for better management, including mobile device, endpoint, and application segmentation.

89
New cards

SIEM & SOAR

Security solutions utilizing AI, ML, and threat intelligence, offering centralized alerting and response automation.

90
New cards

Runbooks

Documents detailing actions to stop threats, human response steps for security incidents, and pre-defined procedures for managing incidents.

91
New cards

Playbooks

Contain rules and actions to identify and respond to incidents, often requiring amendments for better automated responses.

92
New cards

Legal Hold

Protecting evidence from alteration or destruction, also known as litigation hold.

93
New cards

Chain of Custody

Tracks evidence movement through collection, safeguarding, and analysis, documenting handling and transfers.

94
New cards

Admissibility

Requirements for evidence to be valid in court, ensuring relevance, materiality, and legal collection.

95
New cards

Video

CCTV as evidence for identifying attackers and reconstructing events.

96
New cards

Timelines of Sequences of Events

Using timestamps and time offsets to reconstruct event sequences accurately.

97
New cards

Tags

eDiscovery labels attached to documents for easier search and organization.

98
New cards

Reports

Documenting key discussions and decisions post-incident for review and stakeholder presentation.

99
New cards

Event Logs (For Documentation / Evidence)

Centralized log collection for reconstructing events and maintaining audit trails.

100
New cards

Interviews

Witness statements and photofits used to develop a picture of involved parties.