senior member promo study guide

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:32 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

65 Terms

1
New cards

SQLi

structured query language injection

2
New cards

XSS

cross-site scripting

3
New cards

CSRF

cross-site request forgery

4
New cards

IDOR

insecure direct object references

5
New cards

SET

social engineering toolkit

6
New cards

PKI

public key infrastructure

7
New cards

CA

certificate authorities

8
New cards

C2

command-and-control

9
New cards

websites

largest attack surfaces that cybersecurity experts have to defend.

10
New cards

SQLi

Manipulating database queries through unsanitized user input. Attackers can extract, modify, or delete database contents

11
New cards

XSS

Injecting malicious scripts into web pages viewed by other users, allowing attackers to steal session cookies, redirect users, or perform actions on their behalf

12
New cards

CSRF

Tricks an authenticated user's browser into sending an unwanted request to a web application, exploiting the trust a site has in the user's session

13
New cards

Broken Authentication

Weak session management, poor password handling, and exposed tokens that allow attackers to assume other users' identities

14
New cards

IDOR

Changing a user ID or filename in a URL to access data belonging to another user without authorization.

15
New cards

SET

create phishing pages, distribute malware, and host C2 panels

16
New cards

attack delivery mechanisms

SET, Burp Suite, OWASP, ZAP

17
New cards

encryption

using algorithms to turn plaintext into ciphertext so only authorized parties can read it

18
New cards

symmetric encryption

uses the same key to encrypt and decrypt (e.g., AES). Fast, but key distribution is a challenge

19
New cards

asymmetric encryption

uses a public key to encrypt and a private key to decrypt (e.g., RSA). solves the key distribution problem

20
New cards

digital signatures

prove authenticity and integrity of a message using asymmetric keys. the sender signs with their private key; the receiver verifies with the sender's public key

21
New cards

PKI

the system of certificates and CAs that validates the ownership of public keys. Used in HTTPS, email signing, and VPNs

22
New cards

cryptography tools

openssl, certutil, GPG

23
New cards

blue team tasks

read org charts, network diagrams, incident response plans, rules of engagement, and legal authority docs before touching anything

24
New cards

blue team collect

Network diagrams, data flow diagrams, asset lists, IR plan, business continuity plan, RoE, and threat intel summaries.

25
New cards

network scanning

finds every live host, open port, and running service. Build a complete picture before defenders or attackers can act

26
New cards

network scanning tools

nmap, Nessus, OpenVAS

27
New cards

asset inventory

List all users, computers, servers, and AD objects. You have to understand what you're defending. Hashing files creates a baseline to detect tampering

28
New cards

asset inventory tools

dsquery, netdom, FCIV / certutil, MBSA

29
New cards

service reduction

Stop and disable anything you don't need. Every running service is an attack surface. Fewer services = fewer entry points

30
New cards

service reduction tools

sc / service, wmic

31
New cards

host firewalls

Block inbound traffic by default. Only allow what's explicitly needed. log everything dropped. Works at the individual host level

32
New cards

firewall tools

netsh advfirewall, iptables, ufw

33
New cards

application whitelisting

only allow approved programs to run. prevents malware execution even if it lands on disk. strong control, high maintenance

34
New cards

application whitelising tools

AppLocker, GPO

35
New cards

registry hardening

Disables legacy auth (NTLM/LM), admin shares, sticky keys, RDP caching, and blocks common attacker techniques at the registry level

36
New cards

registry hardening tools

reg add, PowerShell

37
New cards

packet capture

Records raw network traffic for analysis. Capturing is the primary goal pre-investigation. Rotate files so you don't fill the disk. Filter to reduce noise

38
New cards

packet capture tools

tcpdump, tshark, Wireshark

39
New cards

log auditing

Windows Event Logs and Linux syslog/auth.log record user actions, logins, policy changes, and service starts. Enable auditing first — it is off by default

40
New cards

log auditing tools

auditpol, wevtutil, Get-EventLog, auditd

41
New cards

honeypots and deception

Set traps that only an attacker would trigger. Honey ports, honey hashes, and fake accounts. Any connection is a high-confidence alert

42
New cards

honeypots and deception tools

netcat, HoneyDrive, DCEPT, labrea

43
New cards

live triage

On a running system, quickly gather who is logged in, what processes are running, what ports are listening, and what auto-starts on reboot. Do this before rebooting — volatile data is lost on shutdown

44
New cards

live triage tools

netstat, tasklist / ps, wmic, lsof, autoruns

45
New cards

malware static analysis

Examine a suspicious file without running it. Check the compile timestamp, look for embedded strings (URLs, commands, IPs), verify the file hash against threat intel databases, and check digital signatures

46
New cards

malware static analysis tools

strings, hexdump, sigcheck, VirusTotal, Team Cymru

47
New cards

memory forensics

Malware can run entirely in RAM with no disk artifacts. Memory dumps capture running processes, injected code, and credentials that disappear on reboot. Always dump memory before powering off a suspected system

48
New cards

memory forensics tools

Volatility, dd / LiME, Process Explorer

49
New cards

disk imaging

A bit-for-bit copy of a drive preserves deleted files, timestamps, and unallocated space for forensic analysis. Always image a drive before making any changes to preserve chain of custody

50
New cards

disk imaging tools

dc3dd, dd, FTK / Autopsy

51
New cards

incident indicators to look for

Processes with no icon or company name, unsigned executables, open network connections to unknown IPs, unexpected scheduled tasks or startup entries, and recently modified system files

52
New cards

patching

Apply OS and 3rd-party patches to close the vulnerabilities that were exploited. Patch known-bad before restoring to production

53
New cards

patching tools

wusa / wuauclt, apt-get / yum

54
New cards

kill malware process

Suspend before killing. If malware has a watchdog process, terminating directly respawns it. Suspend first, confirm it is not restarting, then kill and remove startup entries

55
New cards

kill malware process tools

GMER, Stop-Process (PS), kill (Linux), Autoruns

56
New cards

rootkit detection

they hide themselves from the OS. Run dedicated scanners from clean media. Comparing file hashes against a known-good baseline is the most reliable detection method

57
New cards

rootkit tools

chkrootkit, rkhunter, lynis, Linux Malware Detect (LMD)

58
New cards

Recon (Lockheed Martin Kill Chain Model)

Research the target — gather information about systems, personnel, and vulnerabilities

59
New cards

Weaponize (Lockheed Martin Kill Chain Model)

Build the payload — pair an exploit with a backdoor into a deliverable package

60
New cards

Deliver (Lockheed Martin Kill Chain Model)

Transmit the payload — email attachment, USB drop, watering hole website

61
New cards

Exploit (Lockheed Martin Kill Chain Model)

Trigger the vulnerability on the target system to execute the payload.

62
New cards

Install (Lockheed Martin Kill Chain Model)

Malware establishes persistence — registry keys, startup entries, scheduled tasks

63
New cards

C2 (Lockheed Martin Kill Chain Model)

Malware beacons out to an attacker-controlled server to receive instructions

64
New cards

Act on Objectives (Lockheed Martin Kill Chain Model)

Exfiltrate data, cause damage, move laterally, or deploy ransomware

65
New cards

blue team goal

detect and disrupt as early in the chain as possible. Stopping at phase 1-3 is far better than catching at phase 6-7. Each phase is an opportunity to: Detect, Deny, Disrupt, Degrade, Deceive, or Destroy