What is offensive security?
Offensive security involves breaking into computer systems and exploiting vulnerabilities
What is defensive security?
Defensive security is the process of protecting an organization’s network and computer systems
Who specializes in offensive security?
Red teams and penetration testers
What is the role of a Security Operations Center (SOC) in defensive security?
A SOC monitors the network and systems (24/7) to detect malicious cybersecurity events.
What is threat intelligence in defensive security?
Threat intelligence gathers information to help organizations better prepare against potential adversaries.
What is identification in web application security?
Identification refers to uniquely identifying a user.
What is authentication in web application security?
Authentication is the process of verifying a user’s identity.
What is an example of an identification and authentication weakness? (One example for each)
Allowing brute force attacks and storing passwords in plain text.
What is broken access control in web application security?
Broken access control occurs when users can access files or data they shouldn’t have access to.
How can attackers exploit broken access control?
They can view or modify others’ accounts or access protected pages as unauthenticated users.
What is a common cryptographic failure?
Sending sensitive data in clear text, such as using HTTP instead of HTTPS.
What are the three ways of achieving authentication?
What is the most common form of authentication?
passwords
What is weak file permissions, and why is it a security risk?
Weak file permissions can allow unauthorized access to files, compromising confidentiality and integrity.
What is network security?
Network security is the protection of a computer network and its data from unauthorized access
What are some hardware solutions for network security?
Firewall appliances, Intrusion Detection System (IDS) appliances, and Intrusion Prevention System (IPS) appliances.
What is a host firewall, and how does it differ from a firewall appliance?
A host firewall is software that runs on a system, while a firewall appliance is a hardware device that filters network traffic.
What is the first step in network security exploitation from an attacker’s perspective?
Reconnaissance (Recon) involves gathering information about the target, such as server types, IP addresses, and email addresses.
What is weaponization in the context of network security exploitation?
Weaponization is the preparation of a file with a malicious component.
What is delivery, and how does it fit into network security exploitation?
Delivery involves delivering the weaponized file to the target through methods like email or USB drives.
What is digital forensics?
Digital forensics is the application of computer science to investigate digital evidence for a legal purpose.
What is the role of proper search authority (legality) in digital forensics?
Investigators cannot commence without the proper legal authority.
What is the chain of custody in digital forensics?
It tracks who had possession of evidence at any given time.
How is mathematical validation (hashing) used in digital forensics?
Hash functions are used to confirm that a file has not been modified.