CompTIA Security+ (SY0-601): Vulnerability Management
This topic covers the structured approaches to identifying and validating system vulnerabilities through vulnerability assessments and penetration testing. It includes key concepts such as defining security baselines, using tools like Metasploit, and understanding attacker techniques like pivoting and maintaining persistence within a compromised environment.
Vulnerability Assessment Methodology
Define the desired state of security
Create a baseline
Prioritize the vulnerabilities
Mitigate vulnerabilities
Monitor the network and systems
Key Terms
Vulnerability Assessment Methodology
Define the desired state of security
Create a baseline
Prioritize the vulnerabilities
Mitigate...
Penetration Testing Methodology
Penetration tests look at a network’s vulnerabilities from the outside
Metasploit and CANVAS are commonly used
1)...
Penetration Testing: Pivot & Persistence
Pivot:
Occurs when an attacker moves onto another workstation or user account
Persistence:
Ability of an attac...
TTX
Tabletop Exercise:
Exercise that uses an incident scenario against a framework of controls or a red team
A tablet...
Pentest Teams
Red Team
The hostile or attacking team in a penetration test or incident response exercise
Blue Team
The defen...
OVAL
Open Vulnerability & Assessment Language:
A standard designed to regulate the transfer of secure public information across networks and the ...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Vulnerability Assessment Methodology |
|
Penetration Testing Methodology | Penetration tests look at a network’s vulnerabilities from the outside 1) Get permission and document info |
Penetration Testing: Pivot & Persistence | Pivot: Persistence: |
TTX | Tabletop Exercise: A tabletop exercise is a discussion of simulated emergency situations and security incidents |
Pentest Teams | Red Team Blue Team White Team Purple Team |
OVAL | Open Vulnerability & Assessment Language: OVAL is comprised of a language and an interpreter A shared standard & language for various tools to share vulnerability info Language is an XML schema |
OVAL Interpreter | A reference developed to ensure the information passed around by these programs complies with the OVAL schemas and definitions used by the OVAL language |
Network Mapping | Discovery and documentation of physical and logical connectivity that exists in the network Commercial and free network mapping software is available |
Vulnerability Scanning: Banner Grabbing | A technique used to gain information about servers and inventory the systems or services Nessus and Qualysguard are commercial vulnerability scanners |
Network Sniffing | The process of finding and investigating other computers on the network by analyzing the network traffic or capturing the packets being sent Network sniffer, packet sniffing, and protocol analyzer can all conduct packet capture |
Protocol Analyzer | Software tool that allows for the capture, reassembly, and analysis of packets from the network |
Cryptanalysis Attack | Comparing a precomputed encrypted password to a value in a lookup table |
Rainbow Table | List of precomputed values used to more quickly break a password since values don’t have to be calculated for each password being guessed |
Rubber Hose Attack | Attempt to crack a password by threatening or causing a person physical harm in order to make them tell you the password |