Fiszki: Security+ 601 Part 4 | Quizlet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/90

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

91 Terms

1
New cards

tracert/traceroute

A command used to determine a route of what a packet takes to a destination, take advantage if ICMP Time to Live Exceeded error messages (hop)

2
New cards

nslookup/dig

A command that is used to lookup information from DNS servers (IP addresses, canonical names, timers, etc.)

3
New cards

ipconfig/ifconfig

-used to display TCP/IP information
-also MAC addresses
-Subnet masks
-Host name

4
New cards

nmap

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner, a free open source utility.

5
New cards

ping/pathping

Uses ICMP to test connectivity issues and if communication between different systems is possible.

6
New cards

hping

An enhanced Ping utility for crafting TCP, IP, ICMP, and UDP packets to be used in port-scanning activities. A packet

7
New cards

netstat

A TCP/IP utility that shows the status of each active connection by monitoring network connections to and from systems, useful when viewing all listening ports on a computer

8
New cards

netcat

A network utility program that reads from and writes to network connections, can listen, create a backdoor

9
New cards

IP scanners

Able to scan networks for all IPs on it and report on the status of the IP addresses, some scanners are offered freely or through a third-party.

10
New cards

arp

Able to view local ARP table, the command allows administrator's the ability to see and manipulate the ARP table on a system.

11
New cards

route

A command used to display routing tables and modify static routes on a Windows system or Linux.

12
New cards

curl

A command tool designed to transfer data to or from a server, without user interaction

13
New cards

theHarvester

A python-based program designed to assist penetration testers in the gathering of information during the reconnaissance portion (OSINT) of a penetration test.

14
New cards

sn1per

A Linux-based tool used by penetration testers to combine many recon tools into a single framework, the attacker has the ability to choose the level of intrusiveness on their victim.

15
New cards

scanless

A command utility that interfaces with websites (separate hosts) that can perform port scans as part of a penetration test, your original IP is always hidden as the scan source.

16
New cards

dnsenum

A Perl script designed to enumerate DNS information, this can be used to collect information such as user names and IP addresses of targeted systems.

17
New cards

Nessus

A network-vulnerability scanner available from Tenable Network Security, one the leading scanners available in today's market.

18
New cards

Cuckoo

A sandbox used for malware analysis, its open source, free software that can run Linux/Windows.

19
New cards

head

A utility designed to return the first lines of a file, depending on what the writer of the code wants.

20
New cards

tail

A utility designed to return the last lines of a file, depending on what the writer of the code wants.

21
New cards

cat

A Linux command that is used to create and manipulate files

22
New cards

grep

find text inside files that match patterns of file contents you're searching, search many files at a time

23
New cards

chmod

A Linux command used to change access permissions of a file such as R,W,X

24
New cards

logger

A Linux command that lets you add log file information to a file.

25
New cards

SSH

A encrypted console communication on TCP/22 to help manage networks through unsecure spaces, this replaces Telnet.

26
New cards

Powershell

This is the command line for system administrators that use a .ps1 file extension.

27
New cards

Python

A computer language commonly used for scripting and data analysis tasks facing system administrators and security personnel, uses the file extension .py

28
New cards

OpenSSL

A toolkit and crypto library for SSL/TLS, this creates x.509 certificates and much more.

29
New cards

Tcpreplay

A free open source utility for editing and replaying previously captured network traffic, as a tool it specifically replays PCAP files on a network.

30
New cards

tcpdump

Utility designed to analyze network packets either from a network connection or a recorded file.

31
New cards

Wireshark

Application that captures and analyzes network packets, examines individual packets, monitor conversations, carve out files and more.

32
New cards

dd

A Linux command used to convert and copy files.

33
New cards

Memdump

A program that dumps system memory to the standard output stream, skipping over any holes in the memory maps, everything happens in the memory and can be seen by third-party tools

34
New cards

WinHex

A universal hexadecimal editor for Windows 10, able to disk clone, edit disk/files, secure wipe and more

35
New cards

FTK imager

A commercial program, free to use, and is designed to capture an image of a hard drive.

36
New cards

autopsy

A Windows tools that performs digital forensics of hard drives, smartphones and more, able to extract many different data types

37
New cards

Exploitation frameworks

A pre-built tool kit used to store information about security vulnerabilities. They are often used by penetration testers (and attackers) to detect and exploit software.

38
New cards

Password crackers

Software programs used to identify an unknown or forgotten password, many forms, but all capable of getting into systems.

39
New cards

Data sanitization

The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done, a one-way trip.

40
New cards

incident response plans

A plan that describes the steps an organization performs in response to any situation determined to be abnormal in the operation of a computer system or network.

41
New cards

incident response process

Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned

42
New cards

Incident response tabletop

An IR exercise that represents the closest simulation of a disaster recovery plan, making sure key players are present and go through their checklist of duties to perform.

43
New cards

Incident Response Exercises

tabletop, walkthroughs, simulations

44
New cards

Attack Frameworks

MITRE ATT&CK
The Diamond Model of Intrusion Analysis
Cyber Kill Chain

45
New cards

IR Stakeholder Management

The team responsible to keep a good relationship with IT, either external or internal customers who are what make IT exist.

46
New cards

MITRE ATT&CK

A framework that is not-for-profit that determines actions of attackers to understand the methods and identify attack techniques and block future attacks

47
New cards

The Diamond Model of Intrusion Analysis

Helps guide analysts to intrusions and applies specific principles to intrusion analysis, looks simple but is very complex.

48
New cards

Cyber Kill Chain

A systematic outline of the steps of a cyberattack, introduced at Lockheed Martin in 2011, seven phases based on a military concept.

49
New cards

IR Communication Plan

Part of the IR effort that answers the preceding questions and defines responsibilities for communication is a key element to developed during the prep phase, ensures that a contact list is made when disaster hits.

50
New cards

Disaster Recovery Plan

This plan defines the data and resources necessary and the steps required to restore critical organizational processes.

51
New cards

Business Continuity Plan

Guidelines and arrangements for response to disruption of critical business functions, to restore and MAINTAIN operation and create profit.

52
New cards

COOP (Continuity of operations planning)

This plan determines which subset of normal operations need to be continued during the periods of disruption.

53
New cards

Incident response team

The personnel that are composed to respond to an incident.

54
New cards

IR Retention Policies

This policy determines what data storage is kept secure and needed if operations were to be halted by a disaster.

55
New cards

Vulnerability Scan Output

Provides information as to the systems that are running, any addt. services that are listening on the network, and what the known vulnerabilities are against each of those.

56
New cards

SIEM dashboards

Sensors, Sensitivity, Alerts, Correlations, and Trends

57
New cards

SIEM Sensitivity

In a SIEM, the quality of being quick to detect or respond to slight changes, signals, or influences (important data)

58
New cards

SIEM Alerts

The primary communication in the SIEM that visualizes raw data, log info, and identifies security events.

59
New cards

SIEM Correlation

In a SIEM, the process of establishing a relationship between two variables, this is extremely useful because it can identify a large amount of malicious activity on networks much easier.

60
New cards

SIEM Sensors

In a SIEM, provides security data into the datastore.

61
New cards

Network Log Files

Files contained with switches, routers, APs, VPN concentrators, and other infrastructure devices, any routing updates or authentication issues log these files.

62
New cards

Application Log Files

A file specific to apps:
Windows - Event Viewer / Application log
Linux - macOS / - /var/log

63
New cards

Security Log Files

Files related to detailed security information, security information, security devices, malicious activity, etc.

64
New cards

Web Log Files

Files related to web server access, errors trying to access, malicious activity, and specific server activity.

65
New cards

DNS Log Files

Files that view lookup requests to websites, IP addresses, and identify queries to bad URLs

66
New cards

Authentication Log Files

Files that know who are logged into a system and who aren't, correlates with other devices.

67
New cards

Dump Files

Able to store all contents of memory into a diagnostic file, some applications have their own process.

68
New cards

VoIP and call messages

Files that show inbound and outbound call info, security information such as audit trails/authentications, and SIP traffic

69
New cards

Session Initiation Protocol (SIP) traffic

A text-based protocol used for signaling voice, video, and messaging apps over IP, alerts on unusual numbers or country codes.

70
New cards

Syslog

System Logging protocol that MOVES data into log files on a log server

71
New cards

Rsyslog

Open source variant of syslog that follows the specifications but also provides addt. features such as content-based filtering

72
New cards

Syslog-ng

Open source variant of syslog that follows the specifications but also provides addt. features such as content-based filtering and can tag, classify, and correlate in real time, which improves SIEM performance.

73
New cards

journalctl

A command in Linux systems that makes you able to view logs in plaintext and to search/filter log servers.

74
New cards

NXLog

A multiplatform log management tool designed to assist in the use of log data during investigations, can identify security issues, policy violations, and operational problems within a system.

75
New cards

Bandwidth monitors

A utility designed to measure network bandwidth usage over time, the higher it is the more resources are being used, hence slower systems.

76
New cards

Metadata

data that describes other data:
Email - header details, sending servers, dest. address
Mobile - type of phone, GPS
Web - OS, browser type, IP address
Files - name, address, phone number, etc.

77
New cards

Netflow

a tool used to gather information about data flowing through a network and shared between devices, the standard collection method, useful in intrusion investigations

78
New cards

IPFIX

The newer, NetFlow-based standard, has flexible data support

79
New cards

Protocol Analyzer Output

Software that can capture and decode network traffic through packet sniffing, can identify unknown traffic, and verify packet filtering and security controls, able to view plain-language description of app data

80
New cards

sFlow

Only a portion of network traffic is monitored and its usually embedded in infrastructure (switches, routers)

81
New cards

Legal Hold

technique to preserve relevant information to prepare for litigation, data for the most part is preserved in case of potential lash back or unknown issues in the future.

82
New cards

Digital Forensics Documentation

legal reasons, video, admissibility, chain of custody, time stamps, time offset, tags, reports, event logs, interviews

83
New cards

Admissibility

Determines what data can be used in court and can't

84
New cards

Chain of Custody

A list of all people who came into possession of an item of evidence, make sure to label everything so you ensure who was in contact with evidence

85
New cards

Time offset

Identify times on tape recordings, for example, rather than the actual time.

86
New cards

Acquisition Types

Snapshot, Disk, RAM, Swap/pagefile, OS, Devices, Firmware, Cache, Network, or Artifacts.

87
New cards

Artifacts

Something digital that a human left behind as evidence, from flash memory, recycle bin, log info, etc.

88
New cards

Swap/Pagefile

A place to store RAM when memory is deleted, can also store parts of applications too.

89
New cards

cloud forensics

Adds complexity and devices are not in you control, fully, sometimes may have limited access due to maintenance, and certain laws for the cloud may be different around the world.

90
New cards

Right to Audit Clauses

A legal agreement to have the option to perform a security audit at any time, ability to verify security before a breach occurs.

91
New cards

E-discovery

The process of identifying and retrieving relevant electronic information to support litigation efforts, doesn't include analysis