Final Interviw Prepar
Final Interviw Prepar
Email Body- Email ID, Subject line, Attachments And Content of the email/ message
(URL, Urgency, Collecting information)
• Sender IP , From address, Return Path, Reply to, SCL Rating, BCL rating
Transport Layer Security/ Secure Sockets Layer (SSL/TLS)- We use TLS above 1.2version for
security reasons
SSL is a cryptographic protocol that uses explicit connections to establish secure
communication between web server and client.- Netscape introduced SSL in 1995.
TLS is also a cryptographic protocol that provides secure communication between web
server and client via implicit connections. NSA introduced TLS with TLS 1.0,1.1,1.2,1.3.
4. Extension of pcap?
The . pcap file extension is mainly associated with Wireshark; a program used for analysing
networks. . pcap files are data files created using the program and they contain the packet data of a
network. These files are mainly used in analysing the network characteristics of a certain data.
5. What is the MITRE ATT&CK framework?
MITRE ATT&CK® stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge
(ATT&CK). The MITRE ATT&CK framework is a curated knowledge base and model for cyber
adversary behaviour, reflecting the various phases of an adversary's attack lifecycle and the
platforms they are known to target.
The MITRE ATT&CK Windows Matrix for Enterprise consists of 12 tactics: Initial Access, Execution,
Persistence, Privilege Escalation, Défense Evasion, Credential Access, Discovery, Lateral Movement,
Collection, Command and Control, Exfiltration and Impact.
A firewall will block traffic based on network information such as IP address, network port and
network protocol. It will make some decisions based on the state of the network connection.
Need to check
Anomalies in privilege user account activity- User has limited privileges but he is using other
privileges.
Mismatch Ports traffic including secure or encrypted traffic on the plain ports
Suspicious file changes – Changes on file system, registry key changes
Unexpected Patches
AV is stop working
Lateral Movement
Lateral movement refers to the techniques that a cyberattacked use, after gaining initial access, to
move deeper into a network in search of sensitive data and other high-value assets. ... And with a
protracted dwell time, data theft might not occur until weeks or even months after the original
breach.
TTP----
Privilege Escalation - Privilege escalation of a process running with low privileges.
Pass-The-Hash Attacks- Malware dumps cached authentication credentials and reuses them in Pass-
the-Hash attacks
https://azeria-labs.com/persistence/
IOA-
APT- Advance persistent threat - From cyber criminals who seek personal financial information and
intellectual property to state-sponsored cyber-attacks designed to steal data and compromise
infrastructure, today's advanced persistent threats (APTs) can sidestep cyber security efforts and
cause serious damage to your organization.
API- API stands for Application Programming Interface. An API is a software intermediary that
allows two applications to talk to each other. In other words, an API is the messenger that delivers
your request to the provider that you're requesting it from and then delivers the response back to
you.
Registry- The registry is a hierarchical database that contains data that is critical for the operation of
Windows and the applications and services that run on Windows. The data is structured in a tree
format. Each node in the tree is called a key. Each key can contain both subkeys and data entries
called values.
What is OWASP?
OWASP stands for the Open Web Application Security Project, an online community that
produces articles, methodologies, documentation, tools, and technologies in the field of
web application security.
https://sucuri.net/guides/owasp-top-10-security-vulnerabilities-2021/+