.pkg file
Apple installer package file
.dmg file
Apple file for disk image, full package/installer for a full virtual disk
.app file
Apple file that contains code and resources for apps on macOS
Mitigating DDoS/DoS attacks
-stop it at the firewall
-use ISP and/or third party software to protect against these types of attacks
Port forwarding
-24/7 access to service due to the port the service is live through gets forward to an open port so it’s always available, does not expire or timeout
-process if redirecting network traffic from one port and ip to another
Boot repair command
“bootrec /rebuildbcd”
“bootrec /fixmbr
Screened subnet
-aka, DMZ (demilitarized zone)
-network architecture of layers of firewalls as another layer of security
-can host public resources
Non-persistent cross site scripting attacks
-Usually an email, with a sketchy link
1. Website allows scrips to run input prompts and text boxes
2. Email sent
3. Link runs script that send credentials and other info to attacker
4. Simultaneously, the script embedded in URL gets ran
On-path attack
Attacker sits in between your system and the network and redirects your traffic
Quick format (Windows)
-deletes old file system table and creates a new one
-old files appear to be gone but can be recovered
Full format (windows)
-does a full new file table on a disc, writing it all to zeros
-data is gone gone
-checks for bad sectors
PowerShell files and scripts
-can run to automate tasks
-.ps1 file extension
Software licenses are…
-included with software
-can be per-seat or concurrent
-can expire or not
WPA3
Current most advanced WPA (WiFi protected access)
-uses GCMP (wireless encryption)
-uses AES
-uses MIC with GMAC
FAT 32 size limits
-up to 2 TB volume sizes
-Max file size of 4 GB
ARP poisoning
-when an attacker sends spoofed ARP messages on a network, allowing them to “act” like a router or other type of hub so that they receive network traffic instead of the intended recipient
-utilizes spoofing of ARP (address resolution protocol)
-on-path attack that occurs on local IP subnet
-ARP has lack of security features
Patch Management (steps)
System Instability
troubleshooting:
- run a full hardware diagnostic (first)
- check the OS (Windows updates, chkdsk if HDD)
- run SFC (system file checker)
- perform an anti-malware scan (Windows Defender, or whatever is used)
Privacy (Settings)
enable or disable shared application activity, shared language, and speech recognition
Verifying Certificate Details (list)
verify
- not expired
- domain name
- properly signed
- date and time
MBR Partition Style
primary partitions:
- bootable
- maximum of four per hard disk
- one can be marked as active
extended partitions:
- used for extending the maximum number of partitions
- one per hard disk (though optional)
- contains additional logical partitions
- not bootable
Altered System or Personal Files (Troubleshooting)
indicates malware
- remove or reload from a known good backup
PCI DSS
Payment Card Industry Data Security Standard
- a standard for protecting credit card information
- six control objectives
OS EOL Policies
vary depending on the OS