Cybersecurity Notes

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/159

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

160 Terms

1
New cards

complexity, computational power, and security measures

Success of brute force attack depends on..

2
New cards

accounta

3
New cards

brute force process

start→generate possible combination→check if successful→ access granted→ end

4
New cards

types of brute forcing

  • simple

  • dictionary

  • hybrid

  • credential stuffing

  • password spraying

  • rainbow table

  • reverse

  • distributed

5
New cards

simple bf attack

definition: systematically trying all possible combinations of characters within defined character set and length range

best when used when: no prior information is available and comp resources are abundant

6
New cards

dictionary attack

definition: use pre-compiled list of common words, phrases, and passwords

best when used when: target likely uses weak or easily guessable password based on common patterns

7
New cards

which brute force attack method is equivalent to using wordlists in john the ripper?

dictionary

8
New cards

hybrid attack

def: combines elements of simple bf attacks and dictionary attacks, often appending or prepending characters to dictionary words…….

best usage: the target might use a slightly modified version of a common password

9
New cards
<p>delete</p>

delete

delete

10
New cards
<p>password spraying</p>

password spraying

def: attempts a small set of commonly used passwords against large number of usernames

best usage: you could be locked out, so you spread attempts across multiple accounts; if one door closes, another one is still open

11
New cards

reverse brute force

def: using a leaked password from one service to try logging into multiple accounts with different usernames

best usage case: A strong suspicion exists that a particular password is being reused across multiple accounts

12
New cards
<p>rainbow table</p>

rainbow table

def: uses pre-computed tables of password hashes to reverse hashes and recover plaintext passwords quickly

best to use when: a large number of password hashes need to be cracked, and storage space for rainbow tables is available

13
New cards

which is the best to use when a large number of password hashes need to be cracked, and storage space for this method is available?

rainbow tables

14
New cards

distributed brute force

def: distributes brute forcing workload across multiple computers or devices to accelerate process

best usage: target password or key is highly complex and a single machine lacks comp power to crack it

15
New cards

password problems

  • when orgs created easy default usernames and passwords; makes people who are too lazy to change them perfect targets

  • what tools are used is determined by how complex passwords are perceived to be (to optimize resources)

16
New cards

increasing the number of passwords by just two characters has the potential to

a. double the combinations

b. triple the combinations

c. 10x the combinations

c

17
New cards

-p-

scans all ports

18
New cards

-sV

performs service detection on specified ports

19
New cards

-v

adds more detail to scan

20
New cards

arp

stands for address resolution protocol; t’s a way for computers to find out where to send their messages

21
New cards

—disable-arp-ping

disables arp ping

makes scan more stealthy

22
New cards

arp ping

when a device sends an ARP request instead of using regular ICMP ping

benefits:

(1) Hides users from basic network scans

(2) Limits what methods are used during discovery and scanning

23
New cards

-Pn

disables ICMP Echo requests

24
New cards
<p>ICMP </p>

ICMP

Stands for internet Control Message protocol: used by computers to send helpful messages to eachother about network information

25
New cards

auth

determines authentication credentials

26
New cards

broadcast

scripts which are used for host discovery by boradcasting and the discovered hosts, can be added to remaining scans brute

27
New cards

brute

executes scripts that try to log in to service by brute forcing with creedentials

28
New cards

default

default scripts executed by the -sC option

29
New cards

discovery

evaluation of accessible services

30
New cards

dos

scripts used to check services for denial of service vulnerabilities and are used less as it harms the services experience

31
New cards

exploit

category of scripts that try to exploit known vulnerabilities for the scanned port

32
New cards

external

scripts that use external services for further processing

33
New cards

intrusive

nmap scripts that could negatively affect the target system

34
New cards

malware

an nmap script category that checks if some malware infects target systems

35
New cards

safe

defensive scripts that do not harm the target

36
New cards

version

an extension for service detection

37
New cards

-O

nmap scanning option for OS detection

38
New cards

-A

nmap command for an aggressive scan approach

39
New cards

type the command needed to call a specific script category

sudo nmap (ip) —script (category)

40
New cards

41
New cards

TCP

transmission control protocol; enables applications and computing to send messages over a network; designed to send packets

42
New cards

—packet-trace

nmap scripting text that when used, shows all packets sent and received

43
New cards

—reason

nmap script that shows why port is in specific state

44
New cards

-sV

scan for version

45
New cards

how to create alias

  1. determine what you want to shortcut

  2. write:

alias alias_name='nmap -n -Pn

46
New cards

—open

this shows only open ports

47
New cards

icmp echo request

a tool for network diagnostics that sends a message via the Internet Control Message Protocol (ICMP) to check if a device on an IP network is reachable

48
New cards

packet

A formatted unit of data carried by computer networks, consisting of control information (headers) and user data (payload). They enable the breaking down of large messages into smaller chunks for efficient transmission across networks, with each packet containing addressing information to ensure proper routing.

49
New cards

how many different states are there for a scanned port?

6

50
New cards

unfiltered

This state of a port only occurs during the TCP-ACK scan and means that the port is accessible, but it cannot be determined whether it is open or closed.

51
New cards

-D RND:5

Rotates ports

52
New cards

Cntrl+C

how to get nmap to stop running

53
New cards

ls /usr/share/nmap/scripts/*category*

how to view all scripts in an nmap category

54
New cards

http-auth

55
New cards

nmap script categories & contents

auth

  • http-auth: Tests HTTP authentication

  • ssh-auth-methods: Lists SSH authentication methods

  • ftp-anon: Checks for anonymous FTP login

  • mysql-auth-bypass: Tests MySQL authentication bypass vulnerabilities

  • rdp-ntlm-info: Extracts information from RDP NTLM authentication

  • smtp-auth-methods: Enumerates SMTP authentication methods

broadcast

  • broadcast-dhcp-discover: DHCP service discovery

  • broadcast-dns-service-discovery: DNS service discovery

  • broadcast-dropbox-listener: Listens for Dropbox broadcasts

  • broadcast-netbios-master-browser: Discovers NetBIOS master browsers

  • broadcast-ping: Sends broadcast ping packets

  • broadcast-upnp-info: Discovers UPnP devices

brute

  • ftp-brute: Brute-forces FTP credentials

  • http-brute: Brute-forces HTTP basic authentication

  • mysql-brute: Brute-forces MySQL credentials

  • smb-brute: Brute-forces SMB accounts

  • ssh-brute: Brute-forces SSH credentials

  • rdp-brute: Brute-forces RDP credentials

default

  • ssl-cert: Retrieves SSL certificates

  • http-title: Shows HTTP title

  • ssh-hostkey: Retrieves SSH host keys

  • smb-os-discovery: Attempts OS discovery via SMB

  • dns-recursion: Checks for DNS recursion

  • banner: Grabs banners from network services

discovery

  • http-methods: Finds supported HTTP methods

  • dns-service-discovery: Discovers services using DNS

  • smb-enum-shares: Enumerates SMB shares

  • snmp-interfaces: Lists network interfaces via SNMP

  • http-sitemap-generator: Spiders websites to create sitemaps

  • ssh-hostkey: Retrieves target SSH host keys

dos

  • http-slowloris: Tests Slowloris DoS vulnerability

  • smb-flood: Floods SMB with requests

  • dns-flood: Performs DNS amplification attack tests

  • ipv6-ra-flood: Floods IPv6 router advertisements

  • smb2-vuln-uptime: Tests SMB2 DoS vulnerability

  • http-apache-server-status: Attempts to retrieve server status

exploit

  • smb-vuln-ms17-010: Tests for EternalBlue vulnerability

  • http-shellshock: Checks for Shellshock vulnerability

  • ftp-vsftpd-backdoor: Tests for vsftpd backdoor

  • smtp-vuln-cve2010-4344: Checks for Exim SMTP vulnerability

  • mysql-vuln-cve2012-2122: Tests MySQL authentication bypass

  • ssl-heartbleed: Checks for Heartbleed vulnerability

external

  • shodan-api: Uses Shodan API for additional information

  • whois-ip: Performs WHOIS lookups

  • dns-blacklist: Checks IP addresses against DNS blacklists

  • http-virustotal: Submits URLs to VirusTotal

  • ip-geolocation-*: Uses various services for geolocation

  • twitter-*: Scripts that interact with Twitter API

fuzzer

  • dns-fuzz: Fuzzes DNS service

  • http-form-fuzzer: Fuzzes HTTP forms

  • smtp-commands: Fuzzes SMTP commands

  • smb-enum-shares-fuzzer: Fuzzes SMB share names

  • http-method-fuzzer: Fuzzes HTTP methods

  • snmp-brute: Fuzzes SNMP community strings

intrusive

  • http-backup-finder: Searches for backup files

  • http-wordpress-users: Enumerates WordPress users

  • smb-enum-users: Enumerates SMB users

  • ftp-proftpd-backdoor: Tests for ProFTPD backdoor

  • mysql-empty-password: Checks for empty MySQL passwords

  • smtp-enum-users: Enumerates SMTP users

malware

  • smb-vuln-conficker: Detects Conficker infection

  • smtp-strangeport: Checks for malware on SMTP

  • dns-zeustracker: Checks against Zeus tracker

  • http-malware-host: Checks if web server hosts malware

  • ftp-libopie: Checks for OPIE backdoor in FTP

  • auth-spoof: Checks for authentication spoofing malware

safe

  • http-comments-displayer: Shows HTML comments

  • ssh-hostkey: Retrieves SSH host keys

  • ssl-cert: Retrieves SSL certificate information

  • banner: Retrieves service banners

  • dns-recursion: Checks for DNS recursion

  • http-headers: Shows HTTP headers

version

  • banner: Retrieves version from service banners

  • http-server-header: Retrieves HTTP server header

  • mysql-info: Retrieves MySQL server information

  • ssh2-enum-algos: Lists supported SSH algorithms

  • telnet-ntlm-info: Retrieves version from NTLM

  • tls-nextprotoneg: Determines supported protocols

vuln

  • http-vuln-cve*: Checks for various HTTP CVEs

  • smb-vuln-ms17-010: Checks for EternalBlue vulnerability

  • ssl-heartbleed: Checks for Heartbleed vulnerability

  • ftp-vsftpd-backdoor: Checks for vsftpd backdoor

  • smtp-vuln-cve*: Checks for SMTP vulnerabilities

  • mysql-vuln-cve*: Checks for MySQL vulnerabilities

56
New cards

tcpdump

a network packet analyzer that captures and analyzes network traffic. It allows users to capture packets transmitted over a network interface and provides a textual analysis of the captured packets. Tcpdump does not encrypt packets, but it can capture and analyze them for troubleshooting and security purpose

57
New cards

fuzzing

Sending random characters into a website to see how it reacts and find vulnerabilities. And, to see what pages **exist

58
New cards

union based

requires knowledge of table structure

combines results of injected SELECT with legitimate query; can be used to poison a query to return records from a different table

59
New cards

blind injection

type: sql injection

speed: slow

what happens: where the attacker does not receive an obvious response from attacked database and instead reconstructs the database structure step by step by observing behavior of database

60
New cards

time-based

61
New cards
62
New cards
Internal threats
Threats that come from inside the organization
63
New cards

External threats

threats that come from outside of an organization

64
New cards
Compliance
65
New cards
Common roles
66
New cards
Security analyst or specialist
67
New cards
Cybersecurity specialist
68
New cards
Information security analyst
69
New cards

security frameworks

Guidelines for building plans to help mitigate risks and threats to data and privacy

components include:

  1. identify and document goals

  2. setting guidelines to achieve goals

  3. implementing strong security processes

  4. communicating and monitoring the results

70
New cards

security controls

safeguards designed to reduce specific security risks. Used with security frameworks to establish strong security posture

71
New cards
Security posture
an organizations ability to manage defense of critical assets and data and react to change
72
New cards
Threat actor
malicious attacker; any person or group who presents a security risk. Risk can relate to computers, applications, networks, and data
73
New cards
Cloud security

Process of ensuring that assets stored in the _____ are properly configured, or setup correctly, and that access is limited to authorized users. It's a growing field that focuses on protection of data, applications, and infrastructure

74
New cards
Programming
Set of processes that can be used to create specific set of instructions for a computer to execute tasks
75
New cards

processes in information security

  1. risk assessment: identifies and evaluates potential threats and vulnerabilities determines potentail impact of security breaches help prioritize other security efforts

  2. security planning: develops strategies to address identified risks creates policies and procedures to guide security efforts allocates resources for security initiatives

  3. implementation of security controls: puts security plans into action; deploying technical solutions and enforcing policies; includes preventative and detective controls

  4. monitoring and detection: continuously watches for security events and a using tools like SIEM systems and intrusion detection systems

  5. disaster recovery: focuses on restoring systems and data after a major incident implementing backup and redundancy measures

  6. continuous improvement: reviewing and learning from security incidents and near-misses; updates security measures based on new threats and technologies

76
New cards

asset security

Secures digital and physical assets; related to storage maintenance, and destruction of data
77
New cards
Security architecture and engineering
Optimizing data security by ensuring proper tools are put into place
78
New cards
Communication and network security
79
New cards
Identity and access management
Keeps data secure by ensuring users follow established policies to control and manage physical assets like networks and applications
80
New cards

security assessment and testing

Conducting control testing, analyzing data, and conducting audits to monitor for vulnerabilities
81
New cards

security operations

Conducting investigating and implementing preventative methods
82
New cards
Software development security
using secure coding practices to which are using a set of recommended guidelines that are used to create secure apps and services
83
New cards

CIA Triad

stands for confidentiality, integrity, and availability

84
New cards

logs

records of data

85
New cards

siem

stands for security information and event management tool

86
New cards

network protocol analyzer

tool designed to capture and analyze data within a network; examples of these tools include tcdump and netwire

87
New cards

linux

an open source operating system that relies on command line as primary user interface; not a programming language but can use text based commands

88
New cards

sql

stands for structured query language; used to create interact with and collect information from a database

89
New cards

risk mitigation

having the right procedures in place to reduce the impact of security breaches

90
New cards

compliance

method used to develop internal organization’s policies

91
New cards

continuance

the process of maintaining business operations with balancing security needs

92
New cards

asset security domain

the domain of security dedicated to securing physical and digital assets

93
New cards

shared responsibility

94
New cards

I&AM (identity and access management)

ensuring user access is limited to what people need and reducing overall risks to systems and data. components include

  • identification

  • authentication

  • authorization

  • accountability

95
New cards

identification

when someone identifies who they are

96
New cards

authentication

when someone proves their identity

97
New cards

authorization

gives level of access after authentication has been completed

98
New cards

accountability

recording attempts to ensure things are done properly

99
New cards

security assessment & testing

focused on conducting testing and audits

100
New cards

security operations

conducting and investigating and implementing preventative methods