Term
|
Definition
memory segment used by a program and is allowed dynamically at run time with functions such as mailoc{}, calloc {}, realloc{} and using new operators in C# |
|
|
Term
|
Definition
Attempts to store more bites than allows |
|
|
Term
Extended Instruction Pointer |
|
Definition
Points to the code that you are currently executing. When you call a function, this gets saved on the stack for later use. |
|
|
Term
|
Definition
Points to the current position on the stack and allows things to be added and removed from the stack using the push and pop operations or direct stack pointer manipulations |
|
|
Term
|
Definition
EBP serves as a static point for referencing stack based information like variables and data in a function using offsets. This almost always points to the top of the stack for a function. |
|
|
Term
|
Definition
The "gets" command, which reads a string from the standard input to the specified memory location. Does not have a "length" configuration |
|
|
Term
How to check for Buffer Overflow |
|
Definition
1) Attach a debugger to target application or process 2) Generate malformed input of the application 3) Subject the application to malformed input 4) Inspect responses in the debugger |
|
|
Term
|
Definition
Program where code is hidden in a harmless program. The Trojan can take control of the computer. |
|
|
Term
|
Definition
A legitimate communication patch within a computer system or network, for transferring data. The simplest form of covert channel is a Trojan |
|
|
Term
Step 1 to Create A Trojan |
|
Definition
Create new packet using a Trojan horse construction kit |
|
|
Term
Step 2 to Create A Trojan |
|
Definition
Create a dropper, which is planted in a Trojan package that installs the malicious code on the target system |
|
|
Term
Step 3 to Create A Trojan |
|
Definition
|
|
Term
Step 4 to Create A Trojan |
|
Definition
|
|
Term
Step 5 to Create A Trojan |
|
Definition
|
|
Term
Step 6 To Create A Trojan |
|
Definition
|
|
Term
|
Definition
c:\nc -L -<port> -t -e cmd.exe |
|
|
Term
|
Definition
|
|
Term
|
Definition
1) Trojan creates fake form fields on ebanking pages 2) Additional fields elicit extranet information such as card number and date of birth 3) Attacker can use this information to impersonate and compromise victim's accounts |
|
|
Term
|
Definition
1) Trojan interceptor intercepts valid Transaction Authentication Numbers (TAN) entered by a user 2) Replaces the TAN with a random number that will be rejected by the bank 3) Attacker can misuse the intercepts TAN with user's login details |
|
|
Term
|
Definition
1) Trojan analyses POST requests and responses to the victim's browser 2) It compromises the scramble pad authentication 3) Trojan intercepts scrambled pad input as user enters Customer Number and Personal Access Code |
|
|
Term
|
Definition
Very destructive Trojan that formats all storage |
|
|
Term
|
Definition
1) Modular Malware of MS Windows 2) From middle eastern countries 3) Records skype conversations and uses bluetooth on devices 4) Uses USB devices |
|
|
Term
|
Definition
1) Malware is packed with UPX and a polymorphic decryptor 2) Malware injected piece of code within winlogin.exe virtual address space |
|
|
Term
View All Active Ports Using Netstat |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
All communicating TCP/UDP Ports open |
|
|
Term
Path to System Driver Services |
|
Definition
Run > msinfo32 > Software Environment > System Drivers > HKEY_LOCAL_MACHINE\System\CurrentControlSet\Service |
|
|
Term
|
Definition
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folder, Current |
|
|
Term
|
Definition
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell User Folder, Current |
|
|
Term
|
Definition
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell User |
|
|
Term
|
Definition
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folder |
|
|
Term
|
Definition
HKCU\Software\Microsoft\Windows NT\Current Version\Windows |
|
|
Term
Windows Startup Settings Registry Key #1 |
|
Definition
HKLM\Software\Microsoft\Windows\Current Version\Run |
|
|
Term
Windows Startup Settings Registry Key #2 |
|
Definition
HKCU\Software\Microsoft\Windows\Current Version\Run |
|
|
Term
Windows Startup Settings Registry Key #3 |
|
Definition
HKLM\Software\Microsoft\Windows\Current Version\RunOnce |
|
|
Term
Windows Startup Settings Registry Key #4 |
|
Definition
HKCU\Software\Microsoft\Windows\Current Version\RunOnce |
|
|
Term
IE Startup Settings Key #1 |
|
Definition
HKCU\Software\Microsoft\Internet Explorer\UrlSearchHooks |
|
|
Term
IE Startup Settings Key #2 |
|
Definition
HKLM\Software\Microsoft\Internet Explorer\Toolbar |
|
|
Term
IE Startup Settings Key #3 |
|
Definition
HKLM\Software\Microsoft\Internet Explorer\Extensions |
|
|
Term
|
Definition
File Checksum Integrity Verifier - Command line utility to generate checksum |
|
|
Term
|
Definition
Enterprise integrity verifier that scans and reports critical system files for changes |
|
|
Term
|
Definition
Checks the integrity of critical files that have been digitally signed by Microsoft |
|
|
Term
|
Definition
Used to check the integrity of file via MD5 checksum |
|
|
Term
|
Definition
|
|
Term
|
Definition
Self replicating, infects other programs, and encrypting itself |
|
|
Term
|
Definition
Design, replicate,Launch,Detection,Incorporation,Enlimination |
|
|
Term
|
Definition
Moves MBR to another location on the hard disk and copies itself to the original location of the MBR |
|
|
Term
|
Definition
Executed or intercepted files that are infected (require direct action or memory-resident) |
|
|
Term
|
Definition
Infect the system boot sector and execs at the same time |
|
|
Term
|
Definition
Infect files created by MS Word or Excel |
|
|
Term
|
Definition
Modify directory table entries so that it points users or system processes to the virus code instead of the actual program and launches itself first when a program starts |
|
|
Term
|
Definition
Virus evade the AV software by interpreting its request to the OS, intercepts the av request and passes the request to the uninfected file instead of the virus file |
|
|
Term
|
Definition
uses simple encryption to encipher the code and uses different keys for each infection so that AV can not detect using signatures |
|
|
Term
|
Definition
code that mutates while keeping the original algorithm intact and viruses much have a polymorphic engine (mutation engine) |
|
|
Term
|
Definition
rewrite themselves completely each time they infect and reprogram itself by translating its own code into a temporary representation and back into normal code |
|
|
Term
|
Definition
overwrites a par of the host file with a constant (usually null) without increasing the length of the file and preserving the functionality |
|
|
Term
|
Definition
infects only occasionally (every 10th program executed) or only file of a length of narrow range and difficult to detect |
|
|
Term
|
Definition
creates a companion files for each exe file the virus infects and therefore the companion file where notepad.com loads with notepad.exe |
|
|
Term
|
Definition
former a shell around the target host program's code, making itself the original program and host as it sub-routine and almost all boot viruses are shell viruses |
|
|
Term
|
Definition
File extension virus change the extension of files. Countermeasure - uncheck "hide file extension" |
|
|
Term
|
Definition
Append their code to the host file without making any changes to the latter or relocate the host code to insert their own code at the beginning |
|
|
Term
|
Definition
viruses that overwrite the host code partly or completely with the virus code |
|
|
Term
Direct Action or Transient Virus |
|
Definition
transfers all controls of the host code to where it resides and selects the target program to be modified and corrupt it. |
|
|
Term
Terminate and Stay Resident Virus (TSR) |
|
Definition
Stays permanently in the memory during the entire work session and can only be deleted by restarting and rebooting |
|
|
Term
|
Definition
worms are special viruses that replicate themselves and use memory but can not attach itself to other programs. Worms spread throughout the network and viruses do not. |
|
|
Term
|
Definition
Stuxnet hook is ntdll.dll and the wrapper program containing all components stored inside itself in a section called stub |
|
|
Term
|
Definition
analysis of suspect files, incoming messages, etc for malware - a sheep dip computer is installed with port monitors, file monitors, network monitors, and antivirus software and connects to a network under strictly controlled conditions |
|
|
Term
|
Definition
Perform static analysis when malware is innovative |
|
|
Term
|
Definition
|
|
Term
|
Definition
Setup network connection and check that is not giving any error |
|
|
Term
|
Definition
Run the virus and monitor the process actions and system info with help of process monitoring tools such as process monitor and process explorer |
|
|
Term
|
Definition
Record network traffic information using the connectivity and log packet counter monitoring tools such as TCP View and NetResident |
|
|
Term
|
Definition
Determine the files added, processes spawned, and changes to the registry with the help of registry monitoring tools such as Regshot |
|
|
Term
|
Definition
Collect the following information using debugging tools OllyDbg and ProcDump |
|
|
Term
Three Virus Detection Methods |
|
Definition
Scanning, Integrity, Interruption |
|
|
Term
Purpose of Incidence Management Process |
|
Definition
Improve service quality, pre-active problem resolution, reduce impact of incidents on business/ organization. Meets service availability requirements, Increase staff efficiency and productivity, improves users/customers satisfaction, assists in handling future incidents |
|
|
Term
Open Source or Passive Information Gathering |
|
Definition
collect information about a target from the publicly accessible source |
|
|
Term
|
Definition
Gathering information from sources where the author of the information can not be identified or traced |
|
|
Term
Organizational or private footprinting |
|
Definition
collect information from an organization's web-based calendar and email servers |
|
|
Term
Active Information Gathering |
|
Definition
Gathering information through social engineering on-site visits, interviews, and questionnaires |
|
|
Term
Pseudonymous Footprinting |
|
Definition
Collect information that might be published under a different name in an attempt to pursue privacy |
|
|
Term
|
Definition
Collect information about a target from the internet |
|
|
Term
Footprinting Process Step #1 |
|
Definition
Collect basic information about the target and its network |
|
|
Term
Footprinting Process Step #2 |
|
Definition
Determine the OS used, platform running, web server, version, etc |
|
|
Term
Footprinting Process Step #3 |
|
Definition
Perform technique such as Whois, DNS, network and organizational queries |
|
|
Term
Footprinting Process Step #4 |
|
Definition
Find vulnerabilties and exploits for launching attacks |
|
|
Term
|
Definition
Default ROM (OS) of an Android device supplied by the manufactuerer |
|
|
Term
|
Definition
Modified device ROM without the restrictions imposed by the device's origonal ROM |
|
|
Term
Bricking the Mobile Device |
|
Definition
Altering the device OS using rooting and jailbreaking in a way that causes the device to become unstable or inoperatable |
|
|
Term
|
Definition
Supports the complete mobile device management (MDM) lifecycle ofr smartphones and tablets including iPhone, iPad, Android, Windows Phone, BlackBerry, and Kindle Fire |
|
|
Term
|
Definition
Has rapid deployment capabilties, comprehensive visibility and control that spans across multiple devices, applications, and documents. |
|
|
Term
|
Definition
Urgent - Data contained in the packet should be processed immeadatly |
|
|
Term
|
Definition
Finished - There will no more transmissions |
|
|
Term
|
Definition
Push - Send all buffered data immeadately |
|
|
Term
|
Definition
Reset - resets a connection |
|
|
Term
|
Definition
Awknowledge - Awknowledeges the recipt of a packet |
|
|
Term
|
Definition
Initualizes a connection between hosts |
|
|
Term
|
Definition
|
|
Term
Hping Firewall and Timestamp |
|
Definition
Hping3 -s <ip> -p <port> -- tcp - timestamp |
|
|
Term
Hping Scan Entire Subnet for Live Host |
|
Definition
hping 3 -1 <ip>.x --rand -dest -I <interface> |
|
|
Term
Hping Intercept all traffic containing HPTTP signature |
|
Definition
hping3 -9 <protocol> -1 <interface> |
|
|
Term
|
Definition
|
|
Term
|
Definition
SYN/FIN Scnanning Using Frags |
|
|
Term
|
Definition
|
|
Term
Inverse TCP Flag Scanning |
|
Definition
|
|
Term
|
Definition
responses are collected to be compared with a database to determine the OS |
|
|
Term
Four Phases of Social Engineering |
|
Definition
Research on the target company Develop Relationship Select Victim Exploit the relationship |
|
|
Term
|
Definition
|
|
Term
|
Definition
Denotes social engineering victims |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
NetBOIS Name Service (NBNS) |
|
|
Term
|
Definition
NetBOIS Session Service (SMB over NEtBOIS) |
|
|
Term
|
Definition
SMB over TCP (Direct Host) |
|
|
Term
|
Definition
Simple Network Management Protocol (SNMP) |
|
|
Term
|
Definition
Lightweight Directory Access Protocol (LDAP) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Simple Mail Transfer Protocol (SMTP) |
|
|
Term
|
Definition
|
|
Term
|
Definition
agtorithm is designed to encypher and decypher blocks of dataconsisting of 64bits under control of a 56 bit key |
|
|
Term
|
Definition
an algorithm that takes a fixed-length string of plan text bits and transforms it into a ciphertext bitstring of the same length |
|
|
Term
|
Definition
a symmetrical-key algorithm for secruing senstivie but unclassified material by the U.S. Government agencies. AES is also iterated bit cipher, works by representing the same operation multiple times |
|
|
Term
|
Definition
A permeterized algorithm with a variable block size, a variable key size, and a variable number of rounds. The key size is 128 bits. |
|
|
Term
|
Definition
a 32-bit hexadecimal number |
|
|
Term
|
Definition
produces a 160-bit digest from a message with a maximum length of (2^64th -1) bits, and resembles the MD5 algorithm |
|
|
Term
|
Definition
Family of two smular hash functions, with different block sizes, namely SHA-256 that uses 32-bit wirds and SHA-512 that uses 64 bit words. |
|
|
Term
Certificate Authority (CA) |
|
Definition
Issues and verifies digital certificate |
|
|
Term
Registration Authority (RA) |
|
Definition
Acts as the verifyer for the certificate authority |
|
|
Term
|
Definition
Establishing credentials of a person when doing online transactions |
|
|
Term
Certificate Management System |
|
Definition
Generates, distributes, stores,a nd verifies certificates |
|
|
Term
|
Definition
Attacker has access to the ciper text; goal of this attack to recover encryption key from cipher text |
|
|
Term
|
Definition
Attacker defines his own plaintext, feed it into the cipher, and analyzes the resulting cipher text |
|
|
Term
Adaptive Chosen-plaintext Attack |
|
Definition
Attack makes a series of intricate queries, choosing subsequent plaintexts bases on the information from previous encryption |
|
|
Term
|
Definition
Attacker has knowledge of some parts of the plain text, using this information the used to generate cipher text is deduced so as to decipher other messages |
|
|
Term
|
Definition
Attacker obtains the plaintexts corresponding to an arbitrary set of ciphertexts of his own choosing |
|
|
Term
|
Definition
Extraction of cryptographic secrests (e.g. the password to an encrypted file) from a person by coercion or torture. |
|
|
Term
|
Definition
A generalisation of the chosen-text attack |
|
|
Term
|
Definition
It is based on repeatly measuring the execution times of the exponention operations |
|
|
Term
|
Definition
Brute-Force attack is high resource and time intensive process, however, more likely to achieve results |
|
|
Term
|
Definition
Success of brute force attack depeonds on length of key, time constraints, and system security mechanisms |
|
|
Term
|
Definition
Known as misuse detection and tries to identify events that misuse the system |
|
|
Term
|
Definition
Detects the intrustion based on fixed behavioral characteristics of the users and components in a computer system |
|
|
Term
Protocol Anomonaly Detection |
|
Definition
In this type of detection, models are built to explore anomalies in the way vendors deploy TCP/IP speccifictions |
|
|
Term
|
Definition
Black box that is placed on the network in promiscous mode, listening for patterns indicating an intrustion |
|
|
Term
|
Definition
mechanisms usually include auditing for events that occor on a specific host and not as common dude to the overhead they incur by having the monitor each system event |
|
|
Term
|
Definition
checks for trojan horse, or files that have otherwise been modified, indicating an intruder has already been there, for example tripwire |
|
|
Term
|
Definition
Mechanisms are typically programs that parse log files after an event has already occurred such as failed login attemps |
|
|
Term
|
Definition
computer system designed and configured to protect network resources from attacks |
|
|
Term
|
Definition
screened subnet or DMZ (additional zone) container hosts that offer public services. |
|
|
Term
|
Definition
A firewall with three or more interfaces is present that allow for further subdividing the system based on specific security objective o the organization |
|
|
Term
Packet Filtering Firewall |
|
Definition
Work at the network level of the OSI model or IP (Layer 3) |
|
|
Term
Circuit Level Gateway Firewall |
|
Definition
work at the session layer and monitors requests to creat sesssions, and determine if those sessions will be allowed (Level 4) |
|
|
Term
Application-level Gateway |
|
Definition
filter packets of the application layer of the OSI model and incomming and outgoing traffic is restricted to services supported by proxy; all other service requests are denied. |
|
|
Term
Stateful Multilayer Inspection Firewalls |
|
Definition
combine the aspects of the other three types of firewalls and fileter packets at the ntwork layer to determine weather packets are legitimate, and they evaluate the contnet of packets at the application layer |
|
|
Term
|
Definition
techniques that use TTL values to determine gateway ACL filters and map networks by analyzing IP packet responses. If the packet makes it through the gateway, it is forwarded to the next hop where the TTL equals one and elicits an ICMP "TTL exceeded in transit" to be returned as the origonal packet is disregarded. |
|
|
Term
|
Definition
FTP, Telnet, and web servers send banners on 25 |
|
|
Term
|
Definition
These honeypots simulate only a limited number of services and aplications of a target system or network and used to collect higher level information about attack vectors such as network probing and worm activities |
|
|
Term
|
Definition
Honeypot simulates all services and applications and can be completely comporomised by attackers to get full access to the system in a controlled area. Used to capture information about attack vectors such as techniques, tools, and intent of the attack |
|
|
Term
|
Definition
Can be used as a straight packet sniffer like tcpdump, packet logger (useful for network traffic debugger), and a network intrustion prevention system. |
|
|
Term
|
Definition
|
|
Term
Does Snort rule parcer handle rules on multiple lines? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Used to bypass IDS or encoding so that a computer will not understand it. |
|
|
Term
|
Definition
An IDS blindly believes and accepts a packet that an end system rejects. An attacker exploits that condition and inserts data into the IDS. The attack occurs when NIDS is less strict in processing packets. Attacker observes extra and IDS concludes traffic is harmless.Hense the IDS gets more pakcets than the destination. |
|
|
Term
|
Definition
If fragment timeout is 10 seconds of the IDS and 20 seconds at the target system, attacker will send the second fragmentation after 15 seconds of sending the first fragmentation. |
|
|
Term
|
Definition
These attacks requre the attacker to have previous knowledge of the topology of the victim's network. Information can be obtained with tools like tracert to determine the numebr of hops between the attacker and the victim |
|
|
Term
|
Definition
the urgency pointer causes one byte |
|
|
Term
|
Definition
Used to bypass signature detection by encoding shellcode containing a stob that decodes the shellcode that follows |
|
|
Term
|
Definition
contains a special DNS server and a special dns client and the client and the server wil work in tandem to provide a TCP (and UDP) tunnel through the standard DNS protocol |
|
|
Term
|
Definition
Attackers use botnets and carry out DDoS attacks by flooding the network with ICMP Echo packets |
|
|
Term
|
Definition
Service request flood attacks flood servers with a a high rate of connections for a valid source |
|
|
Term
|
Definition
The source address is fake, hense the target meeting does not get the response back |
|
|
Term
Permananet Denial of Service Attack (Phlashing) |
|
Definition
Permanent DOS, also known as phlashing, refer to attacks that can cause irreversible dammage to system hardware |
|
|
Term
|
Definition
software applications that run automated tasks over the Internet and perform simple repatetive tasks, such as web spdiering and search engine indexing. A botnet is a huge network of the compromised stystem and can be used by an intruder to create a denial-of-service attack |
|
|
Term
|
Definition
There is a good probably that that the spoofed source address of a DDoS attack packets will not represent a valid source address of the specific subnetwork |
|
|
Term
|
Definition
Providers can increate the bandwith on critical connections to prevent them from going down in the event of an attack |
|
|
Term
|
Definition
This method sets up routers that access a server with logic to adjust (throttle) incomming traffic to levels that will be safe for the server to process |
|
|
Term
|
Definition
Any traffic coming from unused or reserved IP address is bogus and should be filtered out by the ISP between it enters the Internet link |
|
|
Term
|
Definition
Administrators can request Ips to block the origonal affected IP and move their site to another IP after performing DNS propagation |
|
|
Term
|
Definition
Can operate in either active intercept mode or passive watch mode. The default is intercept mode. |
|
|
Term
Session ID Brute Force Attack |
|
Definition
knows as session prediction attack if the predicted range of values for a session ID is very small |
|
|
Term
|
Definition
Network level can be defined as the interception of the packets during the transmission between the client and the server in a TCP and UDP session |
|
|
Term
Application Level Hijacking |
|
Definition
Application level is about gaining control on the HPTTP's user session by optaining the session ID |
|
|