IEEE 802.1X
Standard for network access control that authenticates devices before they can access a network, typically using an authentication server like RADIUS.
Which technique would provide the largest increase in security on a network with ICS, SCADA, or IoT devices?
User and entity behavior analytics, as these devices often can’t run traditional security tools
SDN Layers
Application Layer - focuses on the communication resource requests or information about the network
Control Layer - uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to
Infrastructure Layer - contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements
Management Plane - monitor traffic conditions, the status of the network, and allows network admins to oversee the network and gain insight into its operations
Blind SQL Injection
Attack that asks the database true or false questions and determines the answer based on the applications response. This attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection.
External vulnerability scans typically cannot confirm if a server is vulnerable to this
What does a SNMP “no response” indicate?
Could be several things based on how SNMP doesn’t send error messages:
Unreachable
Target machines are not running SNMP servers
The community string being used is invalid
Attestation Services
Used to ensure the integrity of the computer’s startup and runtime operations
Hardware-based attestation is designed to protect against threats and malicious code that could be loaded before the OS is loaded
SDLC Waterfall Method
Planning
Requirements Analysis
Design
Implementation
Testing
Deployment
Maintenance
RITA
Real Intelligence Threat Analytics
Tool used for analyzing network traffic logs to detect anomalies, such as beaconing or C2 activity, often used in malware infections
TCO
Total cost of ownership
Associated cost of an asset including acquisition costs and maintance/operational costs over its lifespan
XML Gateway
Application layer firewall specifically to monitor XML formatted messages as they enter or leave a network or system
Used for inbound pattern detection and prevention of outbound data leaks
Certificate Stapling
Allows a webserver to perform certificate status checking instead of having the browser perform the checking. The web server checks the status of a certificate and provides the browser with the digitally signed response from the OCSP responder. Much faster than using individual queries to the CA using OCSP.
OCSP
Online Certificate Status Protocol
Allows clients to request the status of a digital certificate and to check whether it is revoked.
Certificate Pinning
Deprecated method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize on-path attacks
FPGA
Field Programmable Gate Array
Type of processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture, for the customer’s specific use case or application
ASIC
Application-Specific Integrated Circuit
Type of processor designed to perform a specific function; expensive to design and only work for a single application or function
QoS
Quality of Service
Set of technologies that work on a network to guarantee its ability to run high-priority applications and traffic dependably
Pre-Boot Authentication (PBA)
Ensures self encrypting drives (SEDs) require user authentication before allowing access to the drive, effectively protecting the data even if the device is stolen.
Cipher Mismatch Error
Generated by a modern web browser if an old or deprecated cipher suite is being requested for use by the webserver
Can also occur if the client is using an older OS that doesn’t support a more modern cipher suite
Vertical Scaling
Allows additional resources to be added to an individual system, such as adding processors, memory, and storage to an existing server
Horizontal Scaling
Adding servers to help process the same workload
Autoscaling
The ability to expand and contract the performance of workloads based on policies with specific maximum and minimum capacity specifications
Clustering
Allows multiple redundant processing nodes that share data to accept connections; the cluster appears to be a single server to the clients but provides additional levels of redundancy and resiliency.
BeEF
Browser Exploitation Framework
Penetration testing tool included with Kali Linux that focuses on web browsers. Can be used for XSS and injection attacks against a website.
Netcat
Open-source networking utility for debugging and investigating the network, and can be used to create TCP/UDP connections and investigate them