Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

[CERTMaster]

  • Data exfiltration
  • Vendor support for Wi-Fi access points (APs)
  • note: a problem with the system kernel affects the Operating system
  • default configurations of devices have minimal security

[CLC]

  • Race conditions 
  • System Vulnerabilites 
  • Improper input and Error Handling 
  • Misconfiguration 
  • Resource Exhaustion 
  • Untrained Users
  • Improperly Configured Accounts 
  • Vulnerable Business Processes
  • Weak Cipher Suite and Implementations 
  • Memory and Buffer Vulnerability 
  • System Sprawl and Undocumented Assets
  • Architecture and Design Weaknesses
  • New Threats and Zero-day attacks 
  • Improper certificate and Key management

 

 [CERTMaster]

  • log aggregation
  • credentialed scan
  • non credentialed scan
  • appropriate data inputs:
    • Windows 10 hosts
    • DLP systems
    • Vulnerability scanners
  • configuration review 
  • False positive (Caused by passive & port scanning)
  • Intelligence fusion
  • Nikto (a web application scanner that scans for SQL injection exploits)

[CLC: software tools for security assessment ]

  • protocol analyzerz
  • network scanners
  • wireless scanners/cracker 
  • password crackers 
  • vulnerability scanners 
  • configuration compliance scanners
  • exploitation frameworks 
  • data sanitization tools 
  • steganography tools 
  • honeypots 
  • backup utilities 
  • banner grabbing 
  • passive vs. active 
  • other command line tools:
    • ping
    • netstat 
    • tracert
    • nslookup/dig =dns tools 
    • arp =IP addresses 
    • ipconfig/ ip/ifconfig
    • tcpdumb
    • nmap
    • netcat      

 

  •