ciekawe

 0    111 schede    patrykdastych
Stampa Gioca Testa il tuo livello
 
Domanda - Risposta -
NIST
inizia ad imparare
NIST ?
National Institute of Standards and Technology
RAID
inizia ad imparare
Redundant Array of Independent Disks
zwiekszenie niezawodnosci, redundancy, zwiekszenie wydajnosci
jest to sposób na polaczenie kilka dyskow fizycznych ktore sa widziane przez system jako jeden dysk logiczny
SSO
inizia ad imparare
Single Sing-On
np oauth, logujesz sie raz i masz dostep do wielu usług
ITIL
inizia ad imparare
Information Technology Infrastructure Library
zbiór najlepszych praktyk zarządzania usługami informatycznymi
SOC
inizia ad imparare
Security Operations Center
AAA
inizia ad imparare
Authentication Authorization Accounting
to identify, to give permission, to log an audit trail
NTFS
inizia ad imparare
New Technology File System
System plików czyli metoda przechowywania plików, zarządzania plikami
FAT
inizia ad imparare
File Allocation Table
System plików
show desktop shortcut
inizia ad imparare
Win+D
rename shortcut
inizia ad imparare
F2
hidden menu
inizia ad imparare
Win+X
DR/BC
inizia ad imparare
Disaster Recovery/Business Continuity
DAM
inizia ad imparare
Database Activity Monitoring
EDR
inizia ad imparare
Endpoint Detection and Response
pozwala usunac proces, usunac plik
EDR monitoruje: tworzenie procesów, modyfikacje rejestrów
LDAP
inizia ad imparare
Lightweight Directory Access Protocol
squid
inizia ad imparare
proxy software
tcp hit to jest cache tcp miss nie ma cache
np przechowuje cache, odciaza serwery http, usprawnia dzialanie
AD
inizia ad imparare
Active Directory
Usługa katalogowa czyli hierarchiczna baza danych zawierająca użytkownikow, aplikacje, urzadzenia sieciowe
PUP
inizia ad imparare
Potentially Unwanted Programs
RAT
inizia ad imparare
Remote Access Trojan
frame
inizia ad imparare
layer 2
packet
inizia ad imparare
layer 3
segment
inizia ad imparare
layer 4
hierarchia w systemie
inizia ad imparare
hardware->kernel->Shell/GNOME/KDE->User
SOAR
inizia ad imparare
Security Orchestration, Automation and Response
PTES
inizia ad imparare
Penetration Testing Execution Standard
DLP
inizia ad imparare
Data Loss Prevention
set of tools and processes to ensure that no sensitive dara is lost
IR process
inizia ad imparare
preparation, detection&analysis, containment eradication & recovery, post-incident activity
ATP
inizia ad imparare
Advance Threat Protection
IOC
inizia ad imparare
Indicators Of Compromise
IOA
inizia ad imparare
Indicators Of Attack
EFS
inizia ad imparare
Encrypting File System
WFH
inizia ad imparare
Work From Home
TTP
inizia ad imparare
Technics Tactics and Procedures
CVSS
inizia ad imparare
Common Vulnerability Scoring System
SAST DAST IAST
inizia ad imparare
(Static, Dynamic, Interactive) Application Security Testing
CI/CD
inizia ad imparare
Continuous Integration/Continuous Deployment
WAF
inizia ad imparare
Web Application Firewall
XML
inizia ad imparare
Extensible Markup Language
<quiz>xd</quiz>
csv, xls
inizia ad imparare
csv - comma-separated values, plain text separated by commas, xls - microsoft excel, holds info about worksheets, xlsx > 2007
DevSecOps
inizia ad imparare
DevOps Dev-ma byc szybko Ops-ensures quality, sec-integrated, automated, continuous security
OSS
inizia ad imparare
Open Source Software
MDM
inizia ad imparare
Mobile Device Managment
Allows to control the content allowed, redtrict access to smth, lock device if stolen
NAC
inizia ad imparare
Network Access Control
Restriciting unauthorized users
SIEM
inizia ad imparare
Securitt Information and Event Managment
makes data "human accessible"
Data aggregator, search and reporting system, rules, makes alerts
normalization
inizia ad imparare
turning raw data into strict format
UBA(UEBA)
inizia ad imparare
User(and Entity) Behavior Analytics
comparing historical user behavior to identify a compromise
PoS
inizia ad imparare
Point of Sale
birthday attack
inizia ad imparare
polega na znalezieniu kolizji funkcji hashujacej(md5 np mialo z tym problem)
skimming attack
inizia ad imparare
skimmer to to gowno w bankomacie co kradnie dane, skimming attack polega na kradziezy danych z karty
buffer overflow
inizia ad imparare
put more data in variable than variable can hold
memory leak
inizia ad imparare
memory that is no longer needed is not deleted,(free up memory) nie zwalniamy zarezerwowanej pamieci, moze prowadzi do ataku DoS
IT/OT
inizia ad imparare
Information Technology/Operational Technology
OT to np SCADA, PLC, ICS(Industrial Control Systems)
logic bomb
inizia ad imparare
trigger malicious code while specific conditons met np time bomb sie wlacza w piatek 13
NFC
inizia ad imparare
Near Field Communication
wardriving, warflying, warwalking
inizia ad imparare
idziesz, jedzeisz przez miasto i szukasz wifi
pivot/pivoting
inizia ad imparare
utilizing compromised network/system to perform attacks on other systems in the same network
DAD triad
inizia ad imparare
Disclosure, Alternation, Denial
HSTS
inizia ad imparare
Http Strict Transport Security
its just a header strict-transport-security: preload is a list of safe websites
informs browsers that the site should only be acceses using HTTPS
IEEE 802.1X
inizia ad imparare
standard kontroli dostepu w sieciach przewodowych i bezprzewodowych
IAAS, PAAS, SAAS
inizia ad imparare
(Infrastructure, Platform, Software) as a service
I - virtualization and you got whole machine to manage(os included) P - you onlyanage application and datagt
typosquatting/cybersquatting
inizia ad imparare
okupowanie domain name jakiejs firmy, okupowanie domain name podobnego do nazwy glownej domeny firmy
apt update vs upgrade
inizia ad imparare
update gets information about latest version of packages, upgrade installs them
. so file in unix
inizia ad imparare
so -share object, dynamic libraries
x86
inizia ad imparare
32bit
dll vs static
inizia ad imparare
dll to te pliki dll, a biblioteka statyczna jest embed into exe file
vishing
inizia ad imparare
voice phishing
http status codes
inizia ad imparare
1xx info 2xx success 3xx redirect 4xx client error 5xx server error
dwa najpopularniejsze silniki przegladarki internetowej
inizia ad imparare
gecko - mozilla, blink - google/czesc projektu chromium
multiplexing
inizia ad imparare
multiple signals combined into one signal over shared medium
hol blocking
inizia ad imparare
head of line blocking
happens when a line of packets is held in queue by a first packet(to maintain order)
quic
inizia ad imparare
quick udp internet connections
quic ensures reliability
it remoces tcp-based head of line blocking, it makes tls handshake faster
race conditions
inizia ad imparare
when two processes/threads attempts to access same resource at thr same time
common issue for multithreaded applications
path do logow linuxowych/windowsowych web servers
inizia ad imparare
np /var/log/apache2 /var/log/nginx/access. log
np error. log/access. log
np Program Files/Apache/logs/access. log
sysmon
inizia ad imparare
system monitor - usługa systemowa rejestrujaca eventy
tcp/udp nazwa ramed layer 4
inizia ad imparare
tcp - segment udp - datagram
tcp/ip layers
inizia ad imparare
app/transport/internet/network interface
rainbow table
inizia ad imparare
precomputed table of hashes
netbios, porty windows file share
inizia ad imparare
windows file share 135-139,445
netbios to protokol umozliwiajacy laczenie sie aplikacji w sieci
kerberos/ldap in ad
inizia ad imparare
kerberos os default authentication and authorization protocol, ldap also is auth protocol
if you want to havre linux/mac in ad you use ldap or samba
web server/application server
inizia ad imparare
web server handles httl requests, app server holds business logic
apache - web server, apache tomcat - app server
post/put/patch
inizia ad imparare
post tworzy nowy obiekt, put aktualizuje lub tworzy nowy obiekt(wymaga kompletu danych, podobnie jak post) patch akutalizuje obiekt, obiekt musi istniec, przesyla tylko dane ktore maja byc zaktualizowane
post - gdy chcemy stworzyc, put gdy chcemy zaktualizowac(czesto blokuje sie tworzenie nowych obiektow), patch gdy obiekt ma ogromne ilosci danych, wtedy chcemy tylko przesylac te dane ktore chcemy zaktualizowac a nie komplet danych jak w przypadku PUT
noc vs soc
inizia ad imparare
noc analysis performance, wants system to respond
network(security) operation center
soc investigates
reverse proxy vs load balancer
inizia ad imparare
load balancer is spreading the load among servers
load balancer is specific thing
reverse proxy can be a load balancer but also is caching, can provide security, ssl acceleration(removing ssl)
linux remove file/directory
inizia ad imparare
rm file. txt / rm -r dir
-r usuwa caly directory z innymi rzeczami w srodku razem z subdirectory
/etc/passwd vs /usr/bin/passwd
inizia ad imparare
kontener na hasla vs komenda
rwx vs rws
inizia ad imparare
rws wtedy s to suid(set user id) czyli uruchamiajac ten plik uruchamiamy go z uprawnieniami tego kto stworzyl plik a nie ze swoimi uprawnieniami
exploit/payload/vulnerability
inizia ad imparare
exploit takes advantage of vulnerability, vulnerability is a flaw in a design, coding, logic, that can be exploited
payload is a code that will run on the target system
vpr
inizia ad imparare
vulnerability priority ranking
made by tanable it is a vulnerability scoring system
firmware
inizia ad imparare
oprogramowanie wbudowane, zainstalowane na stale w urzadzenii zapewniajace podstawowe procedury jego obslugi np firmware w oscyloskopie, no raczej go nie zmieniasz masz wbudowane oprogramowanie na stale i jest git
pgp
inizia ad imparare
pretty good privacy, software that implementa ecnryption
cyber kill chain
inizia ad imparare
recon, weaponization, delivery, exploitation, installation, c2, accomplishing goals
threat intelligence
inizia ad imparare
data collected and analyzed
is used to provide information about current and potenital attacks against organization
firmware/driver/os
inizia ad imparare
firmware is built in into ROM, it is fixed code e. x BIOS or firmware for gpu, driver tells OS how to communicate with the device os can be updated obviously
firmware low level tasks, os high level tasks
serial vs pararell transmission
inizia ad imparare
serial oznacza ze bity sa przesylane w ustalonej kolejnosci a pararell ze kilka bitow jest przesylanych rownolegle za pomoca kilku roznych kanalow
pararell jest szybsze ale mniej reliable
watering hole attack
inizia ad imparare
zwierzeta na sawannie podchodza do wody zeby sie napic i krokodyl atakuje
czyli stawiasz stronke i czekasz az ktos na nia wejdzie, wtedy jakis drive by download czy cos
ISO/OSI
inizia ad imparare
Internation Standards Organization
Open Systems Interconnection
RTO, RPO
inizia ad imparare
Recovery Time Objective - how quickly after disaster you must be back i production
RPO - Recovery Point Objective - how much you can afford to lose
. run files in linux
inizia ad imparare
its like exe, executable file in linux
horizontal/verical/box scan
inizia ad imparare
horizontal - one port many ip, vertical - many ports one ip
box is combination of both
RPC
inizia ad imparare
Remote Procedure Call, client server protocol, klient wysyla dane w ustalonym formacie a serwer realizuje usluge
adapter vs interface
inizia ad imparare
adapter - piece of hardware(works on datalink level), network interface is software construct(works on ip level)
promisc vs monitor mode
inizia ad imparare
promisc is getting all the traffic(without promisc you would analyze only packets sources or destined to you, so you can still sniff but you won't get packets that are not destined to you)
monitor mode it is on wlan and it allows to sniff all traffic on channel(even encrypted ones with WPA)
dpkg -l
inizia ad imparare
lists all of installed packages on system
find command
inizia ad imparare
syntax: find where what; if not specified where, it will look recursively(current driectory and subdirectories)
inne przydatne: -type (f lub d) -perm,
find -name "text. txt"; find -name "*. py"; find /home/kali/Desktop -name "*xdd*"
ws-discovery
inizia ad imparare
web services discovery, multicast discovery protocol that locates services on local network
rx tx
inizia ad imparare
rx - received bytes, tx - transmited bytes
FIPS
inizia ad imparare
Federal Information Processing Standard
ENS
inizia ad imparare
Endpoint Security
symlink
inizia ad imparare
dowiazanie symboliczne, mozemy sprawic ze plik znajdzie sie w danym miejscu, mimo ze bedzie w innym
NEWS
inizia ad imparare
Notable Event Weather Sport
. tar. gz
inizia ad imparare
tar is archive stored many files in single file,. tar is not compressing
. gz is compressing

Devi essere accedere per pubblicare un commento.