CompTIA Security+ (SY0-601): Weak Points #2
This section introduces key cybersecurity concepts including cognitive passwords for user authentication, SQL injection tactics, and RADIUS for centralized access control. It also covers data sanitization techniques like clearing, and explains armored viruses—malicious programs that hide their presence through obfuscation and encryption to avoid detection and analysis.
Cognitive Password
A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity.
Rate to track your progress ✦
Key Terms
Cognitive Password
A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably s...
SQL Injection: Breaking a valid SQL Request
Use a single quote:
The single quote character (‘) is the character limiter in SQL. With a single quote,’ you delimit...
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol operating on port 1812 that provides centra...
Data Sanitization: Clearing
Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simpl...
Armored Virus
A type of virus that use various techniques to protect it from being reverse engineered. This includes changing its code...
COPE Policy
Corporate Owned, Personally Enabled:
A business model in which an organization provides its employees with mobile com...
Cookies: Secure Attribute
When a cookie has the Secure attribute, the user agent includes the cookie in an HTTP request only if transmitted over a...
Port Scanning
Using a tool like nmap, an attacker can create an SYN scan across every port in the range against the desired target. A ...
Prepending
Used in data URL phishing
Adding code to the beginning of a presumably safe file
XSS Characteristics
Exploits the trust a user’s web browser has in a website
A malicious script is injected into a trusted website
Session ID Characteristics
A unique identifier assigned by the website to a specific user
A piece of data that can...
Null-pointer Dereference
An attempt to read a variable value from an invalid memory address
Integer Overflow
A programming error where an application tries to store a numeric value in a variable that is too small to hold it
SSRF
Server-Side Request Forgery:
Allows an attacker to take control over a server and use i...
XSRF Characteristics
Exploits the trust a website has in the user’s web browser
A user is tricked by an atta...
Memory Leak
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required
SSL Stripping is a combination of…
Downgrade attack
On-path attack
Shimming
Alters the external behavior of an application and at the same time does not introduce any changes to the application’s ...
Refactoring
The practice of modifying an application’s code without changing its external behavior
Encryption Randomization (2 Methods)
IV
Salting
Biggest impact on domain reputation:
Distribution of spam
Threat Actors: Competitors
Threat actors that engage in illegal activities to get the know-how and gain market advantage
Vulnerability Databases
CVE (Common Vulnerabilities & Exposures)
NVD (National Vulnerability Database)
TTP
Tactics, Techniques, & Procedures:
A key concept in cybersecurity and threat intelligence.
CVSS
Common Vulnerability Scoring System:
| An industry standard for assessing the severity ...
DNS Sinkhole
An example of fake telemetry
A DNS server that has been configured to hand out non-rout...
Microservice
Independent and self-contained code components that can be put together to form an application
VM Escape Countermeasures
Sandboxing
| Patch management
SQL Injection Countermeasures
Stored procedures
| Input validation
HOTP Characteristics
Valid for only one login session
Based on a cryptographic hash function & secret cr...
NIC Teaming
The process of combining multiple physical network adapters into a single logical interface for increased throughput and...
Restoring from incremental backups (requirements)
All copies of incremental backups made since last full backup
Copy of last full backup
Sequential-Access Backup Media
Magnetic tapes
Non-persistence Characteristics
Last known-good configuration
Live boot media
Known state reversion
Session Affinity
A method that ignores the load balancing algorithm by consistently passing requests from a given client to the same server
Transparent Proxy Characteristics
Doesn’t require client-side configuration
Redirects client’s requests & responses w...
Nontransparent Proxy
Modifies client’s requests & responses
| Requires client-side configuration
MDM: Containerization
The isolation of corporate applications and data from other parts of the mobile device
UEM
Unified Endpoint Management:
| A software tool that provides a single management interf...
RADIUS Characteristics
Primarily used for network access
Combines authentication & authorization
TACACS+ Characteristics
Encrypts the entire payload of the access-request packet
Primarily used for device admi...
Related Flashcard Decks
| Term | Definition |
|---|---|
Cognitive Password | A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity. |
SQL Injection: Breaking a valid SQL Request | Use a single quote: If not escaped directly, you can end any string supplied to the application and add other SQL code after it. This is a common technique for SQL injections. |
RADIUS | Remote Authentication Dial-In User Service (RADIUS) is a networking protocol operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service. The RADIUS protocol utilizes an obfuscated password created from the shared secret and creates an MD5 hash of the authentication request to protect the communications. |
Data Sanitization: Clearing | Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques. Clearing involves overwriting data once (and seldom more than three times) with repetitive data (such as all zeros) or resetting a device to factory settings. |
Armored Virus | A type of virus that use various techniques to protect it from being reverse engineered. This includes changing its code during execution and encrypting its payloads. |
COPE Policy | Corporate Owned, Personally Enabled: Can facilitate MDM/MAM |
Cookies: Secure Attribute | When a cookie has the Secure attribute, the user agent includes the cookie in an HTTP request only if transmitted over a secure channel (typically HTTPS). Although seemingly useful for protecting cookies from active network attackers, the Secure attribute protects only the cookie’s confidentiality. |
Port Scanning | Using a tool like nmap, an attacker can create an SYN scan across every port in the range against the desired target. A port scan or SYN scan may trigger an alert in your IDS. While scanners support more stealthy scans, default scans may connect to each port sequentially. |
Prepending | Used in data URL phishing Adding code to the beginning of a presumably safe file Activates when the file is opened |
XSS Characteristics | Exploits the trust a user’s web browser has in a website A malicious script is injected into a trusted website User’s browser executes attacker’s script |
Session ID Characteristics | A unique identifier assigned by the website to a specific user A piece of data that can be stored in a cookie, or embedded as a URL parameter Stored in a visitor’s web browser |
Null-pointer Dereference | An attempt to read a variable value from an invalid memory address |
Integer Overflow | A programming error where an application tries to store a numeric value in a variable that is too small to hold it |
SSRF | Server-Side Request Forgery: Allows an attacker to take control over a server and use it as a proxy for unauthorized actions |
XSRF Characteristics | Exploits the trust a website has in the user’s web browser A user is tricked by an attacker into submitting unauthorized web requests Website executes attacker’s request |
Memory Leak | A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required |
SSL Stripping is a combination of… | Downgrade attack On-path attack |
Shimming | Alters the external behavior of an application and at the same time does not introduce any changes to the application’s code |
Refactoring | The practice of modifying an application’s code without changing its external behavior |
Encryption Randomization (2 Methods) | IV Salting |
Biggest impact on domain reputation: | Distribution of spam |
Threat Actors: Competitors | Threat actors that engage in illegal activities to get the know-how and gain market advantage |
Vulnerability Databases | CVE (Common Vulnerabilities & Exposures) NVD (National Vulnerability Database) |
TTP | Tactics, Techniques, & Procedures: The purpose is to identify patterns of behavior which can be used to defend against specific strategies and threat vectors used by malicious actors. |
CVSS | Common Vulnerability Scoring System: | An industry standard for assessing the severity of computer system security vulnerabilities |
DNS Sinkhole | An example of fake telemetry A DNS server that has been configured to hand out non-routable addresses for a certain set of domain names Computers that use the sinkhole fail to access the real site |
Microservice | Independent and self-contained code components that can be put together to form an application |
VM Escape Countermeasures | Sandboxing | Patch management |
SQL Injection Countermeasures | Stored procedures | Input validation |
HOTP Characteristics | Valid for only one login session Based on a cryptographic hash function & secret cryptographic key Not vulnerable to replay attacks |
NIC Teaming | The process of combining multiple physical network adapters into a single logical interface for increased throughput and redundancy |
Restoring from incremental backups (requirements) | All copies of incremental backups made since last full backup |
Sequential-Access Backup Media | Magnetic tapes |
Non-persistence Characteristics | Last known-good configuration |
Session Affinity | A method that ignores the load balancing algorithm by consistently passing requests from a given client to the same server |
Transparent Proxy Characteristics | Doesn’t require client-side configuration Redirects client’s requests & responses without modifying them Clients might be unaware of the proxy service |
Nontransparent Proxy | Modifies client’s requests & responses | Requires client-side configuration |
MDM: Containerization | The isolation of corporate applications and data from other parts of the mobile device |
UEM | Unified Endpoint Management: | A software tool that provides a single management interface for mobile devices, PCs, printers, IoT devices and wearables |
RADIUS Characteristics | Primarily used for network access Combines authentication & authorization Encrypts only the password in the access-request packet |
TACACS+ Characteristics | Encrypts the entire payload of the access-request packet Primarily used for device administration Separates authentication & authorization |