Ethical Hacking and CVSS Principles
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of CVSS in organizations?

  • To measure vulnerability severity accurately and consistently (correct)
  • To encrypt sensitive data
  • To ensure compliance with regulatory standards
  • To monitor network traffic

Which of the following is listed as a common use of CVSS?

  • Creating marketing strategies
  • Prioritizing vulnerability remediation activities (correct)
  • Developing new software systems
  • Conducting employee training

What type of attack is represented by an unauthorized user accessing a secured network?

  • Evil twin
  • Social engineering
  • Man-in-the-middle
  • Piggybacking (correct)

How does an evil twin attack function?

<p>Through a fraudulent Wi-Fi access point (C)</p> Signup and view all the answers

What is the primary risk when users log into unsecured accounts with an evil twin setup?

<p>Interception of sensitive information (C)</p> Signup and view all the answers

Which action can attackers easily perform with a fake access point after gaining credentials?

<p>Connect to other related networks (D)</p> Signup and view all the answers

What is a key characteristic of an evil twin access point?

<p>It adopts the same SSID and BSSID of nearby Wi-Fi networks (D)</p> Signup and view all the answers

What makes evil twin attacks particularly challenging to detect?

<p>The ability to shut down instantly (D)</p> Signup and view all the answers

What technique might ethical hackers use to bypass security systems during their testing?

<p>Leaving USB drives with auto-start software in public areas (D)</p> Signup and view all the answers

Which of the following methods is NOT mentioned as a technique for ethical hackers?

<p>Malware distribution (D)</p> Signup and view all the answers

Which tool is specifically mentioned as a security scanner used by ethical hackers?

<p>Nessus (D)</p> Signup and view all the answers

What vulnerability related to WPA3 encryption allows attackers to gain access to networks?

<p>Dragonblood (A)</p> Signup and view all the answers

What is a potential consequence of employing long-term infiltration tactics in ethical hacking?

<p>Access to highly sensitive information over time (B)</p> Signup and view all the answers

Which of the following is an advantage of WPA3 over WPA2?

<p>Protection against offline dictionary attacks (D)</p> Signup and view all the answers

What is the main purpose of frameworks like Metasploit in ethical hacking?

<p>To provide a platform for vulnerability demonstration and exploitation (A)</p> Signup and view all the answers

Which of the following best describes a 'back-door' in the context of ethical hacking?

<p>A hidden method to bypass normal authentication (C)</p> Signup and view all the answers

What potential issue occurs when file system permissions are improperly set?

<p>Legitimate binaries can be replaced with malicious ones. (A)</p> Signup and view all the answers

What is the primary consequence of a process running under higher-level permissions after binary replacement?

<p>The replaced binary executes under higher-level permissions. (B)</p> Signup and view all the answers

Which method of password cracking is known for requiring the least computational effort?

<p>Dictionary attack (A)</p> Signup and view all the answers

What does a brute force attack require from the attacker?

<p>A specific set of predefined values to test (A)</p> Signup and view all the answers

Which of the following vulnerabilities would allow an anonymous user to upload files to a Linux FTP server?

<p>Improper file system permissions (A)</p> Signup and view all the answers

What is a disadvantage of using brute force attacks compared to other methods?

<p>They can take an extensive amount of time for complex passwords. (A)</p> Signup and view all the answers

Which process command can demonstrate that a binary file is actively running on a system?

<p>ps (D)</p> Signup and view all the answers

What could indicate that a system has been compromised via an FTP server?

<p>Presence of unknown files in the root directory. (C)</p> Signup and view all the answers

What is one significant disadvantage of bug bounty programs for organizations?

<p>They might generate a high volume of low-quality submissions. (D)</p> Signup and view all the answers

Why might organizations miss out on the benefits of a bug bounty program?

<p>They are unable to quickly address known problems. (A)</p> Signup and view all the answers

Which statement accurately describes the majority focus of bug bounty participants?

<p>72% are focused on web site vulnerabilities. (A)</p> Signup and view all the answers

What is a possible consequence of having an insufficient number of participants in a bug bounty program?

<p>The program may not identify any vulnerabilities. (C)</p> Signup and view all the answers

What is a potential risk of allowing freelance researchers to test an organization's network?

<p>It can lead to security breaches if not managed correctly. (A)</p> Signup and view all the answers

Why might organizations not achieve a significant return on investment (ROI) from bug bounties?

<p>They are seeking vulnerabilities requiring specialized experience. (B)</p> Signup and view all the answers

What is a consideration for organizations regarding the timing of bug bounty reports?

<p>There is no guarantee on the timing or receipt of reports. (C)</p> Signup and view all the answers

What happens if a bug bounty program doesn't lead to finding unknown issues for the company?

<p>The program has little to no value for the organization. (C)</p> Signup and view all the answers

What is the primary function of an evil twin access point in a phishing scam?

<p>To lure victims to a phishing site (A)</p> Signup and view all the answers

What term describes the risk that remains after all countermeasures have been applied?

<p>Residual risk (D)</p> Signup and view all the answers

What is the main purpose of session splicing in an IDS evasion technique?

<p>To make it hard for IDS to detect attacks (D)</p> Signup and view all the answers

Which tool is designed for performing session splicing attacks?

<p>Whisker (D)</p> Signup and view all the answers

What might a hacker do after collecting sensitive data from a phishing site?

<p>Disconnect the victim from the fake site (D)</p> Signup and view all the answers

What common misconception is associated with inherent risks?

<p>They can be entirely eliminated with proper controls (B)</p> Signup and view all the answers

What characteristics define a phishing site created through an evil twin attack?

<p>Lures victims for sensitive data (D)</p> Signup and view all the answers

When an IDS stops reassembling a packet stream, what can lead to this situation?

<p>Failure to receive packets within a reasonable time (D)</p> Signup and view all the answers

Which advantage is associated with using both symmetric and asymmetric cryptography in SSL/TLS?

<p>It allows less-powerful devices to utilize symmetric encryption. (A)</p> Signup and view all the answers

Calculate the Annual Loss Expectancy (ALE) if the Single Loss Expectancy (SLE) is $440 and the Annual Rate of Occurrence (ARO) is 0.33.

<p>$145.2 (C)</p> Signup and view all the answers

What is the Annual Rate of Occurrence (ARO) if a hard drive failure happens once every three years?

<p>0.33 (C)</p> Signup and view all the answers

Which of the following is true regarding recovery costs associated with a hard drive failure?

<p>Restoring the OS and software requires additional labor costs. (A)</p> Signup and view all the answers

Which attack type is identified as a known plaintext attack against DES that shows no added security with double encryption?

<p>Meet-in-the-middle attack (C)</p> Signup and view all the answers

What is the cost of recovering a database and restoring the OS if each task takes 10 hours and 4 hours respectively at a rate of $10/hour?

<p>$440 (B)</p> Signup and view all the answers

If the exposure factor (EF) is set to 1 (100%), what impact does it have on Single Loss Expectancy (SLE)?

<p>It increases SLE to the asset value. (C)</p> Signup and view all the answers

In the context of SSL/TLS, what typically characterizes asymmetric cryptography?

<p>It is suitable for securely negotiating session keys. (C)</p> Signup and view all the answers

Flashcards

CVSS (Common Vulnerability Scoring System)

A system for measuring the severity of vulnerabilities, offering a standardized approach across industries, organizations, and governments. It provides consistent scoring based on factors like impact and exploitability.

Evil Twin Attack

A security attack where a fake Wi-Fi access point is created to mimic a legitimate network, often used to steal sensitive data.

Piggybacking

A process of gaining access to a wireless network without proper authorization, often done by exploiting vulnerabilities in the network's security settings or by leveraging a lack of password protection.

Wireless Sniffing

The act of monitoring wireless network traffic with the intention of intercepting sensitive information, such as passwords and data.

Signup and view all the flashcards

Wardriving

The practice of driving around with a device that scans for Wi-Fi networks, often to identify vulnerable or unprotected networks.

Signup and view all the flashcards

What is the purpose of CVSS?

A system to calculate the severity of vulnerabilities, combining factors like impact and exploitability to create objective scores.

Signup and view all the flashcards

How is CVSS used in security?

CVSS scores are used to help prioritize vulnerability remediation efforts, focusing on the vulnerabilities posing the highest risk to systems.

Signup and view all the flashcards

Where can you find CVSS scores?

The National Vulnerability Database (NVD) provides CVSS scores for known vulnerabilities, enabling organizations to assess risk and prioritize remediation actions efficiently.

Signup and view all the flashcards

Dragonblood vulnerability

A security vulnerability that allows attackers to exploit weaknesses in the WPA3 encryption protocol on Wi-Fi networks. This vulnerability could allow an attacker to gain access to the network and potentially steal sensitive information.

Signup and view all the flashcards

Social engineering

A type of attack where an attacker tricks a user into performing an unintended action, such as clicking a malicious link or providing sensitive information.

Signup and view all the flashcards

Penetration Testing

A technique used by ethical hackers to test the security of a system by attempting to break into it in a controlled way. This helps identify vulnerabilities before malicious actors can exploit them.

Signup and view all the flashcards

DoS attack

A type of denial-of-service attack that floods a network or server with traffic, making it unavailable to legitimate users. This can be used by ethical hackers to test the resilience of a network to traffic overload.

Signup and view all the flashcards

Reverse engineering

A technique used to analyze and understand the internal workings of software or hardware. Ethical hackers use this to find potential vulnerabilities that could be exploited.

Signup and view all the flashcards

Key Reinstallation Attack

A type of attack targeting wireless networks that uses vulnerabilities in the WPA2 encryption protocol. The attacker can exploit these vulnerabilities to gain unauthorized access to the network.

Signup and view all the flashcards

Metasploit

A set of tools and techniques used to identify and exploit vulnerabilities in software and systems. Ethical hackers use this to assess the security of a system and identify potential threats.

Signup and view all the flashcards

Network Security

The ability of a system or protocol to resist attacks and maintain its integrity and availability even when facing malicious attempts to disrupt it.

Signup and view all the flashcards

Residual Risk

The remaining risk after implementing security measures to mitigate vulnerabilities.

Signup and view all the flashcards

Evil Twin Access Point

A type of attack where an intruder creates a fake Wi-Fi access point that mimics a legitimate one, tricking users into connecting and stealing their data.

Signup and view all the flashcards

Session Splicing

An attack technique that divides data into small packets to bypass Intrusion Detection Systems (IDS).

Signup and view all the flashcards

Whisker

A tool used to perform session splicing attacks, making it difficult for IDS to detect malicious activity.

Signup and view all the flashcards

Inherent Risk

The inherent risk associated with a system or process before any security measures are implemented.

Signup and view all the flashcards

Phishing

A technique used to lure users into giving up their sensitive data by creating fake websites and emails.

Signup and view all the flashcards

Deferred Risk

A risk that is acknowledged but not addressed immediately.

Signup and view all the flashcards

Binary Overwriting

Exploiting vulnerabilities in file system permissions to replace legitimate binaries with malicious ones, allowing attackers to execute code with elevated privileges.

Signup and view all the flashcards

Brute Force Attack

A type of attack that tries every possible combination of characters to guess a password. This method is very time-consuming but can be effective against weak passwords.

Signup and view all the flashcards

File System Permissions Vulnerability

An attack where an attacker exploits vulnerabilities in file system permissions to gain access to unauthorized files or directories.

Signup and view all the flashcards

Dictionary Attack

A technique used to guess passwords by trying commonly used words and phrases from a list.

Signup and view all the flashcards

Rainbow Table Attack

A method of password cracking that uses pre-computed tables of password hashes, allowing for faster password retrieval.

Signup and view all the flashcards

Rainbow Table

A technique that uses pre-calculated tables of password hashes and their corresponding plain text passwords. This is faster than brute force attack but requires pre-calculation of hashes and can be less effective against strong passwords.

Signup and view all the flashcards

Privilege Escalation

An attack where an attacker gains unauthorized access to a system by exploiting vulnerabilities that allow the execution of code with elevated privileges.

Signup and view all the flashcards

Shoulder Surfing

An attack that occurs when an attacker observes someone entering their password or other sensitive information.

Signup and view all the flashcards

SSL/TLS hybrid cryptography advantage

Combining symmetric and asymmetric cryptography in SSL/TLS allows devices with limited processing power, like mobile phones, to utilize symmetric encryption effectively, while still benefiting from the security of asymmetric cryptography for key negotiation.

Signup and view all the flashcards

Meet-in-the-middle attack on DES

The known plaintext attack exploits a weakness in the double encryption of DES, demonstrating that encrypting data with two separate DES keys is equivalent to using a single key, making the encryption less secure.

Signup and view all the flashcards

Single Loss Expectancy (SLE)

The Single Loss Expectancy (SLE) quantifies the potential financial loss from a single occurrence of a specific risk. It's calculated by multiplying the Asset Value (AV) by the Exposure Factor (EF).

Signup and view all the flashcards

Annual Rate of Occurrence (ARO)

The Annual Rate of Occurrence (ARO) represents the frequency of a specific risk event occurring within a year. It's expressed as a probability or a proportion.

Signup and view all the flashcards

Annual Loss Expectancy (ALE)

The Annual Loss Expectancy (ALE) calculates the expected financial loss from a specific risk over a year. It's calculated by multiplying the Single Loss Expectancy (SLE) by the Annual Rate of Occurrence (ARO).

Signup and view all the flashcards

Asset Value (AV)

The Asset Value (AV) refers to the estimated monetary worth of an asset, representing its cost for replacement or recovery. It includes factors like the cost of hardware, software, and any associated restoration efforts.

Signup and view all the flashcards

Exposure Factor (EF)

The Exposure Factor (EF) expresses the percentage of an asset's value that would be lost due to a specific risk event. It quantifies the potential impact of the risk.

Signup and view all the flashcards

Hard drive failure ALE calculation

A hard drive failure is estimated to occur every three years. The cost to replace the drive is $300, and the restoration process takes 14 hours at a labor rate of $10 per hour. The annual loss expectancy (ALE) for this scenario is approximately $145.2.

Signup and view all the flashcards

What is a bug bounty program?

Bug bounty programs encourage ethical hackers to find and report vulnerabilities in a company's systems which might be missed by internal security teams.

Signup and view all the flashcards

When are bug bounty programs not the right solution?

Bug bounty programs might not be suitable for companies that lack the capacity to quickly fix discovered vulnerabilities, resulting in a backlog of unaddressed issues.

Signup and view all the flashcards

What's a challenge of managing bug bounty reports?

A large influx of bug reports, including many that might not be valuable, can overwhelm a company's security team, making it difficult to prioritize and address the most critical issues.

Signup and view all the flashcards

What happens if a bug bounty program fails to attract the right participants?

If a bug bounty program doesn't attract enough skilled participants, it might not be effective in uncovering significant security flaws.

Signup and view all the flashcards

What's the typical focus of bug bounty participants?

Most bug bounty participants focus on web application vulnerabilities, while fewer specialize in finding vulnerabilities in operating systems or network hardware that require specialized expertise.

Signup and view all the flashcards

Where do bug bounties typically see a better return on investment?

Companies might see a better return on investment for bug bounties related to web applications, since fewer participants have the specialized skills needed to assess vulnerabilities in other areas.

Signup and view all the flashcards

Why are bug bounty timelines uncertain?

Bug bounty programs lack guaranteed timelines for discovering issues, meaning a company might not receive reports within a specific timeframe, potentially hindering critical projects.

Signup and view all the flashcards

What's a potential security risk with bug bounty programs?

Allowing freelance researchers to potentially penetrate a company's network can pose security risks, requiring careful consideration and risk assessment.

Signup and view all the flashcards

Study Notes

General Information

  • No specific information was provided to create study notes. Please provide more details.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on the primary purposes and uses of the Common Vulnerability Scoring System (CVSS) within organizations. This quiz covers various aspects of ethical hacking, including techniques, types of attacks, and specific tools used by ethical hackers. Delve into the concepts surrounding evil twin attacks and their implications in network security.

More Like This

CVSS Assessment Quiz
5 questions

CVSS Assessment Quiz

ReliablePrehnite avatar
ReliablePrehnite
Cybersecurity Protocols and Vulnerabilities
4 questions
Cybersecurity Vulnerability Assessment Quiz
72 questions
Use Quizgecko on...
Browser
Browser