Security+ Key Notes
Security+ Key Notes
Useful Items:
IR Process: PICERL (this one's not mine - someone else posted it here in r/CompTIA
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Lockheed Martin Kill Chain (needs a better acronym): Round Wheels Do Exceptionally In Certain Areas
Recon, Weaponization, Delivery, Exploitation, Installation, C2, Actions on Objective
Diamond Model of Intrusion Analysis: Anyone Can Ingest Viagra
Adversary, Capability, Infrastructure, Victim
Order of Volatility: CSS Looks Cool Always
CPU registers and cache memory, System memory (RAM, process table, ARP cache, routing table, swapfiles), Storage (HDD, SDD, flash drives/removeable media), Logging and monitoring
data, Configuration and topology information, Archival/backup media
Hash sizes increase alphabetically (not mine - someone else posted it in this subreddit):
Md5 and Ntlm – 128-bit
Ripemd and Sha1 – 160-bit
Sha256 – 256-bit (other hash sizes too)
Playbook comes alphabetically before runbook (playbook is checklist of actions to perform to respond to a specific kind of incident, runbook is an automated version of a playbook with room for human
input/interaction)
Kerberos is used with Windows and implements mutual authentication with tickets
Private cloud != virtual private cloud
Caching proxy != forward / reverse proxy
XSS != XSRF/XSRF
Cold site (power/Internet connectivity but not hardware/software or data) vs warm site (same as cold site + hardware/infrastructure but no data) vs hot site (warm site + data)
Alert types: can’t tell you the number of times I got stumped because I couldn’t work out the difference between false negative and true positive in my head… ‘False’ means ‘incorrectly’ and ‘true’ means
‘correctly’ and ‘positive’ means ‘malicious activity/file’ (or vulnerability) and ‘negative’ means ‘legit activity/file’:
false positive: traffic/activity was incorrectly identified as malicious (or system was incorrectly identified as vulnerable)
true negative: traffic/activity was correctly identified as legitimate/non-malicious
Password spraying sounds like it’s brute forcing passwords but it’s trying a set of passwords with a bunch of accounts/usernames (try one then move onto the next username)
Netflow is metadata (sender/receiver, content size, but not content) vs pcaps (metadata and content; content is usually / should be encrypted though)
Bluejacking is taking control of a Bluetooth device (think hijacking) but not actually stealing data – that’s bluesnarfing
MTTR and MTBF are different from RPO and RTO
Hashing -> integrity, encryption -> confidentiality