combined

  1. List the stages in the Hacking lifecycle ?
    0-Goal/target

    1-Learn it

    2-Explore it

    3-Break it (with permission)

    4-Fix it


    5-Make it better
  2. Hacking lifecycle ?


    Target Or Goal
    Understand why you are assessing its security
  3. Hacking lifecycle process
    Learn it -Learn as much as you can about it…

    Explore it :Understand how it works and what others know about it

    • Fix it: secure operating systems, applications and networks.
    • Make it better: figure out a better way to secure the asset.
    • Tell others: tell others what we find. It’s called ethical
    • disclosure.
  4. The hacking process is mainly used for
    in order to categorize assets, risks, threats, vulnerabilities, and exploits affecting computer systems
  5. asset
    A major application, general support system, high impact program, physical plant, mission-critical system, personnel, equipment, or a logically related group of systems.
    ss
  6. Which phase of the hacking lifecycle tries to understand system or
    application vulnerabilities?
    *Break it
  7. When ethical hackers see a problem, they keep it secret to protect
    the owner from getting exploited.
    False
  8. You should always have explicit or written permission before you
    test, attack or try to break anything that doesn't belong to you as a
    part of the hacking process.
    True
  9. You should always have explicit or written permission before you
    test, attack or try to break anything that doesn't belong to you as a
    part of the hacking process.
    True
  10. reconnaissance
    The first step of the hacking lifecycle is to understand the networks, devices, systems, and applications under review. This is known as
  11. You've taken the first step in the hacking lifecycle by capturing
    device, operating system and application information.
    Relate these steps to your device used during the exercise
  12. Performing Threat Intelligence Network Ownership
    Each IP address and domain on the Internet has an owner. This is the organization or person who registered it. In this exercise, you'll practice viewing ownership of Internet domains and IP addresses. Viewing Domain Owners
  13. Vulnerability definition according to Nist ?
    Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat.”
  14. Process followed in the vulnerability management

    Identification -identifying the vulnerability(Just knowing that something could be a problem)
    Analyze -is the decision ,what to do about it.
    Action -implementing the decision
    In IT, vulnerabilities are inevitable. No matter how hard we try, there will always be weaknesses in software, operating systems and networks. Most vulnerabilities are minor or the path to use or exploit them to cause harm is long and difficult. We need to pay attention and know what vulnerabilities need to be fixed right away and which ones can maybe wait
  15. Vulnerabilities in information technology
    • Networks
    • Code/software applications
    • Unpatched systems


    • patched systems
    • There’s a large community dedicated to finding vulnerabilities and letting others know. Sources include:
    • Vendors
    • Vulnerability lists & databasesNIST National Vulnerability Database (NVD)

    MITRE Common Vulnerabilities and Exposures (CVE) list

    • Bug Bounties
    • Security assessments
    • Vulnerability Management - Analysis and Action
  16. mmary
    CVE is “a list of common identifiers for publicly known cybersecurity vulnerabilities.” It was started over 20 years ago to create a common language and naming convention for all vulnerabilities. In the early days, manufactures would have their own names and identification numbers, which became very confusing.
    Description from the CVE website: “The process of creating a CVE Entry begins with the discovery of a potential security vulnerability. The information is then assigned a CVE ID by a CVE Numbering Authority (CNA), the CNA writes the Description and adds References, and then the completed CVE Entry is added to the CVE
    List and posted on the CVE website by the CVE Team”
    The NVD is the U.S. government repository of standards-based vulnerability management data. They perform analysis on CVEs that have been published to the CVE Dictionary.
    aking Action is doing something about the vulnerability once you’ve analyzed its risks and the benefits of applying a fix.

    Zero-Day (0-Day) Vulnerabilities are vulnerabilities that have no notification to the manufacturer or public.

    • Vulnerability Information Resources
    • There are two resources for discovering and analyzing vulnerabilities: the MITRE Common Vulnerabilities and Exposures (CVE) list and the NIST National Vulnerability Database (NVD).

    They are commonly used in the cybersecurity world and you will see them very often. In this section, we will only cover them at a high-level.
  17. MITRE Common Vulnerabilities and Enumeration


    NIST
    MITRE Common Vulnerabilities and Enumeration - https://cve.mitre.org


    NIST National Vulnerability Database - https://nvd.nist.gov/general
  18. In this phase of the vulnerability management process, we decide what
    to do about a vulnerability.
    Analysis is studying the vulnerability and deciding a course of action
  19. Risk
    : A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence
  20. ddd
    Penetration Testing: A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of an information system.Source
  21. Threat:
    Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service
  22. Vulnerability:
    Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat
  23. Which of the following is true about the CVE List (pick all that
    apply):
    • IT
    • QUIZ QUESTION
    • Which of the following is true about the CVE List (pick all that
    • apply):
    • One identifier for one vulnerability or exposure
    • One standardized description for each vulnerability or exposure
    • A database rather than a dictionary
    • Allows tools to "speak" the same language
    • Free for public download and use
    • SUBMIT
    • QUIZ QUESTION
    • CVE entries contain all of the following except?
    • CVE-ID

    • Description
    • References
    • Severity rating
    • Date Entry Created
Author
bvxlsvhdals
ID
360807
Card Set
combined
Description
Updated