Fiszki: Security+ 601 Part 4 | Quizlet

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 90

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

91 Terms

1

tracert/traceroute

A command used to determine a route of what a packet takes to a destination, take advantage if ICMP Time to Live Exceeded error messages (hop)

New cards
2

nslookup/dig

A command that is used to lookup information from DNS servers (IP addresses, canonical names, timers, etc.)

New cards
3

ipconfig/ifconfig

-used to display TCP/IP information
-also MAC addresses
-Subnet masks
-Host name

New cards
4

nmap

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner, a free open source utility.

New cards
5

ping/pathping

Uses ICMP to test connectivity issues and if communication between different systems is possible.

New cards
6

hping

An enhanced Ping utility for crafting TCP, IP, ICMP, and UDP packets to be used in port-scanning activities. A packet

New cards
7

netstat

A TCP/IP utility that shows the status of each active connection by monitoring network connections to and from systems, useful when viewing all listening ports on a computer

New cards
8

netcat

A network utility program that reads from and writes to network connections, can listen, create a backdoor

New cards
9

IP scanners

Able to scan networks for all IPs on it and report on the status of the IP addresses, some scanners are offered freely or through a third-party.

New cards
10

arp

Able to view local ARP table, the command allows administrator's the ability to see and manipulate the ARP table on a system.

New cards
11

route

A command used to display routing tables and modify static routes on a Windows system or Linux.

New cards
12

curl

A command tool designed to transfer data to or from a server, without user interaction

New cards
13

theHarvester

A python-based program designed to assist penetration testers in the gathering of information during the reconnaissance portion (OSINT) of a penetration test.

New cards
14

sn1per

A Linux-based tool used by penetration testers to combine many recon tools into a single framework, the attacker has the ability to choose the level of intrusiveness on their victim.

New cards
15

scanless

A command utility that interfaces with websites (separate hosts) that can perform port scans as part of a penetration test, your original IP is always hidden as the scan source.

New cards
16

dnsenum

A Perl script designed to enumerate DNS information, this can be used to collect information such as user names and IP addresses of targeted systems.

New cards
17

Nessus

A network-vulnerability scanner available from Tenable Network Security, one the leading scanners available in today's market.

New cards
18

Cuckoo

A sandbox used for malware analysis, its open source, free software that can run Linux/Windows.

New cards
19

head

A utility designed to return the first lines of a file, depending on what the writer of the code wants.

New cards
20

tail

A utility designed to return the last lines of a file, depending on what the writer of the code wants.

New cards
21

cat

A Linux command that is used to create and manipulate files

New cards
22

grep

find text inside files that match patterns of file contents you're searching, search many files at a time

New cards
23

chmod

A Linux command used to change access permissions of a file such as R,W,X

New cards
24

logger

A Linux command that lets you add log file information to a file.

New cards
25

SSH

A encrypted console communication on TCP/22 to help manage networks through unsecure spaces, this replaces Telnet.

New cards
26

Powershell

This is the command line for system administrators that use a .ps1 file extension.

New cards
27

Python

A computer language commonly used for scripting and data analysis tasks facing system administrators and security personnel, uses the file extension .py

New cards
28

OpenSSL

A toolkit and crypto library for SSL/TLS, this creates x.509 certificates and much more.

New cards
29

Tcpreplay

A free open source utility for editing and replaying previously captured network traffic, as a tool it specifically replays PCAP files on a network.

New cards
30

tcpdump

Utility designed to analyze network packets either from a network connection or a recorded file.

New cards
31

Wireshark

Application that captures and analyzes network packets, examines individual packets, monitor conversations, carve out files and more.

New cards
32

dd

A Linux command used to convert and copy files.

New cards
33

Memdump

A program that dumps system memory to the standard output stream, skipping over any holes in the memory maps, everything happens in the memory and can be seen by third-party tools

New cards
34

WinHex

A universal hexadecimal editor for Windows 10, able to disk clone, edit disk/files, secure wipe and more

New cards
35

FTK imager

A commercial program, free to use, and is designed to capture an image of a hard drive.

New cards
36

autopsy

A Windows tools that performs digital forensics of hard drives, smartphones and more, able to extract many different data types

New cards
37

Exploitation frameworks

A pre-built tool kit used to store information about security vulnerabilities. They are often used by penetration testers (and attackers) to detect and exploit software.

New cards
38

Password crackers

Software programs used to identify an unknown or forgotten password, many forms, but all capable of getting into systems.

New cards
39

Data sanitization

The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done, a one-way trip.

New cards
40

incident response plans

A plan that describes the steps an organization performs in response to any situation determined to be abnormal in the operation of a computer system or network.

New cards
41

incident response process

Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned

New cards
42

Incident response tabletop

An IR exercise that represents the closest simulation of a disaster recovery plan, making sure key players are present and go through their checklist of duties to perform.

New cards
43

Incident Response Exercises

tabletop, walkthroughs, simulations

New cards
44

Attack Frameworks

MITRE ATT&CK
The Diamond Model of Intrusion Analysis
Cyber Kill Chain

New cards
45

IR Stakeholder Management

The team responsible to keep a good relationship with IT, either external or internal customers who are what make IT exist.

New cards
46

MITRE ATT&CK

A framework that is not-for-profit that determines actions of attackers to understand the methods and identify attack techniques and block future attacks

New cards
47

The Diamond Model of Intrusion Analysis

Helps guide analysts to intrusions and applies specific principles to intrusion analysis, looks simple but is very complex.

New cards
48

Cyber Kill Chain

A systematic outline of the steps of a cyberattack, introduced at Lockheed Martin in 2011, seven phases based on a military concept.

New cards
49

IR Communication Plan

Part of the IR effort that answers the preceding questions and defines responsibilities for communication is a key element to developed during the prep phase, ensures that a contact list is made when disaster hits.

New cards
50

Disaster Recovery Plan

This plan defines the data and resources necessary and the steps required to restore critical organizational processes.

New cards
51

Business Continuity Plan

Guidelines and arrangements for response to disruption of critical business functions, to restore and MAINTAIN operation and create profit.

New cards
52

COOP (Continuity of operations planning)

This plan determines which subset of normal operations need to be continued during the periods of disruption.

New cards
53

Incident response team

The personnel that are composed to respond to an incident.

New cards
54

IR Retention Policies

This policy determines what data storage is kept secure and needed if operations were to be halted by a disaster.

New cards
55

Vulnerability Scan Output

Provides information as to the systems that are running, any addt. services that are listening on the network, and what the known vulnerabilities are against each of those.

New cards
56

SIEM dashboards

Sensors, Sensitivity, Alerts, Correlations, and Trends

New cards
57

SIEM Sensitivity

In a SIEM, the quality of being quick to detect or respond to slight changes, signals, or influences (important data)

New cards
58

SIEM Alerts

The primary communication in the SIEM that visualizes raw data, log info, and identifies security events.

New cards
59

SIEM Correlation

In a SIEM, the process of establishing a relationship between two variables, this is extremely useful because it can identify a large amount of malicious activity on networks much easier.

New cards
60

SIEM Sensors

In a SIEM, provides security data into the datastore.

New cards
61

Network Log Files

Files contained with switches, routers, APs, VPN concentrators, and other infrastructure devices, any routing updates or authentication issues log these files.

New cards
62

Application Log Files

A file specific to apps:
Windows - Event Viewer / Application log
Linux - macOS / - /var/log

New cards
63

Security Log Files

Files related to detailed security information, security information, security devices, malicious activity, etc.

New cards
64

Web Log Files

Files related to web server access, errors trying to access, malicious activity, and specific server activity.

New cards
65

DNS Log Files

Files that view lookup requests to websites, IP addresses, and identify queries to bad URLs

New cards
66

Authentication Log Files

Files that know who are logged into a system and who aren't, correlates with other devices.

New cards
67

Dump Files

Able to store all contents of memory into a diagnostic file, some applications have their own process.

New cards
68

VoIP and call messages

Files that show inbound and outbound call info, security information such as audit trails/authentications, and SIP traffic

New cards
69

Session Initiation Protocol (SIP) traffic

A text-based protocol used for signaling voice, video, and messaging apps over IP, alerts on unusual numbers or country codes.

New cards
70

Syslog

System Logging protocol that MOVES data into log files on a log server

New cards
71

Rsyslog

Open source variant of syslog that follows the specifications but also provides addt. features such as content-based filtering

New cards
72

Syslog-ng

Open source variant of syslog that follows the specifications but also provides addt. features such as content-based filtering and can tag, classify, and correlate in real time, which improves SIEM performance.

New cards
73

journalctl

A command in Linux systems that makes you able to view logs in plaintext and to search/filter log servers.

New cards
74

NXLog

A multiplatform log management tool designed to assist in the use of log data during investigations, can identify security issues, policy violations, and operational problems within a system.

New cards
75

Bandwidth monitors

A utility designed to measure network bandwidth usage over time, the higher it is the more resources are being used, hence slower systems.

New cards
76

Metadata

data that describes other data:
Email - header details, sending servers, dest. address
Mobile - type of phone, GPS
Web - OS, browser type, IP address
Files - name, address, phone number, etc.

New cards
77

Netflow

a tool used to gather information about data flowing through a network and shared between devices, the standard collection method, useful in intrusion investigations

New cards
78

IPFIX

The newer, NetFlow-based standard, has flexible data support

New cards
79

Protocol Analyzer Output

Software that can capture and decode network traffic through packet sniffing, can identify unknown traffic, and verify packet filtering and security controls, able to view plain-language description of app data

New cards
80

sFlow

Only a portion of network traffic is monitored and its usually embedded in infrastructure (switches, routers)

New cards
81

Legal Hold

technique to preserve relevant information to prepare for litigation, data for the most part is preserved in case of potential lash back or unknown issues in the future.

New cards
82

Digital Forensics Documentation

legal reasons, video, admissibility, chain of custody, time stamps, time offset, tags, reports, event logs, interviews

New cards
83

Admissibility

Determines what data can be used in court and can't

New cards
84

Chain of Custody

A list of all people who came into possession of an item of evidence, make sure to label everything so you ensure who was in contact with evidence

New cards
85

Time offset

Identify times on tape recordings, for example, rather than the actual time.

New cards
86

Acquisition Types

Snapshot, Disk, RAM, Swap/pagefile, OS, Devices, Firmware, Cache, Network, or Artifacts.

New cards
87

Artifacts

Something digital that a human left behind as evidence, from flash memory, recycle bin, log info, etc.

New cards
88

Swap/Pagefile

A place to store RAM when memory is deleted, can also store parts of applications too.

New cards
89

cloud forensics

Adds complexity and devices are not in you control, fully, sometimes may have limited access due to maintenance, and certain laws for the cloud may be different around the world.

New cards
90

Right to Audit Clauses

A legal agreement to have the option to perform a security audit at any time, ability to verify security before a breach occurs.

New cards
91

E-discovery

The process of identifying and retrieving relevant electronic information to support litigation efforts, doesn't include analysis

New cards
robot