CySA+ CS0-002 Cheat Sheet
CySA+ CS0-002 Cheat Sheet
Intelligence Sources
Indicator Management
Threat Classification
Threat Actors
• Insider Threat:
Intelligence Cycle
• Financial: FS-ISAC
• Aviation: A-ISAC
Attack Frameworks
Threat Research
• Likelihood: Likelihood that threat source will initiate risk & likelihood
that the risk has adverse effects on the organization
Vulnerability Identification
• Active vs. Passive scanning: Interact with targets VS use stored data
to find info/identify targets
• Mapping/Enumeration: Host/asset/network/infrastructure/systems
discovery/mapping
Validation
Remediation/Mitigation
• Risk Acceptance: Don't take any action against risk (low risk; ALE <
mitigation cost)
Special Considerations
Inhibitors to Remediation
• OWASP ZAP
• Burp suite
• Nikto
• Nessus
• OpenVAS
• Qualys
• Static analysis
• Dynamic analysis
• Reverse engineering
• Fuzzing
Enumeration
FPGA (Field Programmable Gate Array): Fault injection; hardware trojans; design
leaks; foundry fabrication
Building Automation Systems: Hardcoded secret; BOF; XSS; path traversal; auth
bypass
1.6 Explain the threats and vulnerabilities associated with operating in the
cloud
Unprotected Storage: Insider threats; malicious file entry; impersonation; worm that
is auto-synced to the cloud, and spread from the cloud to other users
Attack Types
Overflow attack
Directory Traversal: Ensure user cannot supply entire file path; accept known-good
input
Session Hijacking: Key/cookie/link encryption; Secure & HttpOnly flags for cookies
Cross-Site Scripting
• Persistent: WAF; filter input & encode data on output; escape HTML
data on arrival
Vulnerabilities
Asset Management
Segmentation
• Physical: placing network devices to control access => new
hardware + additional costs
• System Isolation
Network architecture
Change Management: Change identification -> request -> request review ->
prioritization -> evaluation/impact analysis -> approval/rejection -> testing ->
implementation -> review
Virtualization
Containerization: Isolate from host OS; monitoring; VA process; patch base & app
image
Honeypot: Intentionally vulnerable system that monitors attackers for intentions &
blacklists the IP address
Certificate management: Creation -> storage -> dissemination -> suspension ->
revocation
Platforms
• Mobile
• Web application
• Client/server
• Embedded
• SoC (System-on-Chip)
• Firmware
• User Acceptance Testing: Ensures software users are satisfied with the
functionalities
• Input Validation: Validate all untrusted data; specify character sets + data
types/length; whitelist allowed characters; additional controls for hazardous
characters
• Output Encoding: Encode all unsafe characters; sanitise SQL, XML queries
& OS CMDs
Dynamic Analysis Tools: Test inputs during code execution for complex
vulnerabilities
• SOAP (Simple Object Access Protocol): Exchange structured info for web
services (extensibility [extensions] + neutrality [over any app/transport layer
protocol] + independence [any programming model]) - Token-based/digest
authentication; validate digital signatures; encrypt data with keys
UEFI (Unified Extensible Firmware Interface): Secure boot (only signed apps used
at boot; OS needs recognized key to boot)
Trusted foundry: DoD program to secure supply chain of hardware for military
Secure processing
Measured boot and attestation: Object signature hashes are recorded in TPM
(measured boot); host reliably authenticates hardware/software config to remote
server to determine level of trust in platform (remote attestation)
Trend analysis: Identifies unexpected changes that don't match expected growth
rates; predicts behaviors based on existing data (e.g. network congestion based on
bandwidth)
Endpoint
Network
Log Review
• Event logs: Logins, service start/stop, file activity, rights usage; Windows
(application logs, security logs, setup logs, system logs, Forwarded Events
logs)
• Rule Writing: Take action (e.g. trigger alert) if event occurs => quick incident
response
Query Writing
• Script: Use languages to query for items from event logs (according to e.g.
time, severity)
E-mail Analysis
• DKIM (Domain Keys Identified Mail): Receiver checks that domain owner
indeed sent/authorized the email + assures message/attachments weren't
modified (encrypted signature)
Permissions: DAC (end users can delegate/control permissions); MAC (end users
cannot modify permissions); RBAC (rights granted to roles) => limits
access/functions
Whitelisting: Only allows specific IP/MAC addresses, apps, files, emails (more
strict)
Blacklisting: Prevents specific IP/MAC addresses, apps, files, emails (simple, less
secure)
IPS rules: Connection-based block; rules to identify known attack signatures =>
action
Malware Signatures
• Port security: Restricts source MAC addresses that can connect to port;
static or dynamic filtering (e.g. maximum no. of MAC addresses, MAC
address moved to different port)
Bundling Critical Assets: Assets grouped together for ease of management &
control
Automated Malware Signature Creation: Inbound unknown file monitoring for file
behavior & content classifiers; signature generated based on malware classification
Data Enrichment: Add context to data (e.g. asset inventory tools, 3rd party
databases) => meaningful insights + threat prioritization + quick investigation/action
Threat Feed Combination: Combine machine data from many sources to SIEM,
UEBA
Communication plan
• Public relations: Coordinate communications with the media & the public
• Internal and External: Within team for rapid response + externally for
advice/regulatory
Preparation
• Testing: Incident response drill scenarios, mock data breaches => IR plan
evaluation
• Data correlation: info from multiple sources => centrally analyze to identify
attacks
Containment
• Secure Disposal: Encrypt/delete => physically destroy media => 3rd party
collector
• Patching: Patch directly involved systems -> indirectly involved systems ->
other systems
Post-Incident Activities
• Evidence Retention: Follow retention policies (no court use); consult legal
counsel before discarding (prosecution); US government agencies must retain
records for 3 years
Network-Related
• Beaconing: HTTP/S traffic sent to C2 server from a botnet system => IDPS
with known C2 server rules, behavior-based analysis, outbound traffic
analysis
• Scan/Sweep: Port scanning, repeated requests etc. => IDPS + SIEM (attack
correlation)
Host-Related
Application-Related
• Application log: Windows app log (SCOM), /var/log, transactional logs, error
messages
• Tcpdump: CLI tool for capturing & analysing PCAP traffic + advanced header
filtering
Endpoint
• Disk: Registry, autorun keys, MFT, event logs, INDX files, change logs,
volume shadow copies, user artifacts, Recycle Bin, hibernation files/memory
dumps, temporary directories, app logs, removable devices
• Memory: Linux kernel extensions fmem & LiME (access to physical memory
and copy data); Windows DumpIt (copy physical memory to USB) & crash
dump (%SystemRoot%\MEMORY.DMP, live memory); Volatility Framework
(extract encryption keys, user activity/rootkit analysis)
Mobile: Physical (acquire SIM card, memory cards, backups); logical (image of
logical storage volumes); manual access (review/record unlocked phone); filesystem
(deleted files & existing files details [e.g. search histories, messages, call records])
Cloud: determine contract info regarding investigations -> legal recourse with vendor
-> identify data & their availability -> work with vendor
Procedures: Form problem statement -> determine required data & their locations
-> document & review plan -> acquire & preserve evidence -> initial analysis & track
actions -> deeper investigation & review missing/additional data -> report on findings
Hashing
Carving: Extract files from unallocated space with magic numbers; cluster-based
(file start near FAT/NTFS cluster boundary), sector-based (de-clustered files), byte-
based (file in file)
Data acquisition: Copies all (used, slack, unallocated) spaces; dd/FTK Imager +
write blocker; forensic copy devices (duplicate) => compare both hashes, chain of
custody
5.0 Compliance and Assessment
Privacy vs. Security: Personal data collection/sharing vs protect data against illegal
access
Non-Technical Controls
• Legal requirements: Privacy Act, FERPA, HIPAA, PCI DSS, GLBA, SOX,
notification laws
• Data sovereignty: Privacy data in another country that is subject to local laws
Technical Controls
• Deidentification: Separate PII from PHI; deidentified data can be HIPAA non-
compliant
• Tokenization: Swap sensitive data (cloud vault) with random numbers (and
swap back)
Risk calculation
• Probability: Likelihood that threat will execute attack + risk having adverse
effects
• Magnitude: The adversity of the impact the risk has on the organisation
Risk Prioritization
• Blue team: Secure target environment and keep red team out
Frameworks
• Data retention: what info is maintained & length of time categories are
retained for
Category Types
Control Types
• Deterrent: Anything intended to warn a would-be attacker that they should not
attack