#CompTIA Security+ 501 exam Chapter10 Responding to Security Incidents Part 2
Posted by Superadmin on November 17 2018 01:28:37

Chapter10 Responding to Security Incidents  Part 2

Command-line tools

 

Command-line tools are used each day by security professionals, therefore, for the Security + exam, you must be familiar with these, and so I have provided a screenshot for many of these. We are going to see when we would use each of these in turn:

Figure 5: Ping

Figure 6: Continuous ping

Figure 7: Netstat

Figure 8: Tracert

Exam tip:Netstat shows the established and listening port, but if you reboot the computer, the established connections disappear.

Figure 9: Nslookup

Figure 10: Dig

Figure 11: ARP

The ipconfig /displaydns command is run in the following screenshot, and it shows the DNS cache on a computer:

Figure 12: DNS cache

Ipconfig /flushdns is used to clear out all entries in the DNS cache—see the following screenshot:

Figure 13: Clear DNS cache

tcpdump -i eth0 shows information on the first ethernet adapter, as shown in the following screenshot:

Figure 14: tcpdump

Figure 15: Netcat

 

 

Analyzing and interpreting output from security technologies

 

There are various applications that security administrators can use to analyze and stop various attacks. Let's look at these here:

Figure 16: HIDS output

Figure 17: Quarantined viruses

The following screenshot shows a scan for sensitive documents held on a desktop, and you can see that 135 documents have been found. We may need to install Data Loss Prevention (DLP) to protect these:

Figure 18: Sensitive documents scan

Figure 19: System file checker

Figure 20: Host-based firewall

Figure 21: Application whitelisting

Figure 22: Removable media policies

Exam tip:Applications must be added to the whitelist so that they can be approved to be used.

Figure 23: Sophos UTM 9

 

Example: We wish to set up a template to prevent Visa, Mastercard, Diners Club, JCB, Discover, and American Express details from being emailed out. This is done by creating a template that consists of a regular expression. Should the pattern be matched, the email will be blocked and an administrator will be notified. The regular expression is shown here:

Figure 24: Regular expression for credit cards

Figure 25: Data execution prevention

Figure 26: WAF log file

 

 

Review questions

 

  1. What is the purpose of an incident response plan?

  2. Name three different categories of incidents.

  3. Name three different types of roles required to deal with an incident.

  4. What should the Help Desk do when an incident has just been reported?

  5. What is the purpose of an incident response exercise?

  6. What is the first phase of the incident response process and what happens there?

  7. What is the last phase of the incident response process?

  8. What would happen if the last process of the incident response process is not carried out?

  9. What is order of volatility?

  10. What is the first action I should take if your company has a web-based or remote attack?

  11. What should I do if I find a USB flash drive in one of the servers?

  12. What is the process of chain of custody and why would you investigate it?

  13. What is the purpose of legal hold?

  14. What is the purpose of record time offset and what purpose does it provide?

  15. What is the first stage a forensics officer should carry out when he has just taken possession of a laptop computer?

  1. What is the first stage a forensics officer should carry out when he has just taken possession of a hard drive or removable drive?

  2. Why would a forensics officer take hashes of data before he starts his investigation?

  3. What are the benefits of a security administrator using a SIEM system?

  4. Can I delete data that I have copies of on a WORM drive?

  5. Why would we carry out active monitoring?

  6. What tools can I use to find the operating system running on a computer?

  7. If I am using an unencrypted media package that runs across my network, how can I capture the passwords?

  8. If I want to find information about the operating system of a remote web server, what is the best tool to use?

  9. What is the purpose of a network mapper?

  10. If I have disabled the SSID on my wireless access point, can someone still find the SSID?

  11. What type of vulnerability scanner can audit files and find out account vulnerabilities?

  12. What is the most basic vulnerability scanner that can only find missing patches?

  13. What tools can I use to ensure that the settings on my server are correct?

  14. What is the purpose of using the technique of steganography?

  15. How can I find the attack method a hacker would use to exploit my website?

  16. What is the quickest form of backup?

  17. What is the quickest form of tape backup?

  18. What are the most common types of backup? Name two.

  19. How many tapes would I need to recover my data if I use a differential backup?

  20. What would happen to command line troubleshooting tools if I block incoming ICMP on the network firewall?

  21. What tool is used to test connectivity and what command would you use to make it continuous?

  22. What is normally the maximum value of a packets TTL?

  23. What does the command-line tool netstat -an provide and what would happen if I rebooted the computer?

  24. What tool can I use in a Windows environment to verify the hostname entry in the DNS server?

  25. What are the commands to display the DNS cache and then clear all entries from it?

  1. What command-line tool displays the route to a remote web server?

  2. What is a packet tracing tool used in a Linux/Unix environment?

  3. What is the command-line tool to show the session between two hosts in a Linux/Unix environment?

  4. What is the purpose of a file integrity checker?

  5. If an application is neither on the blacklist or the whitelist, how can I ensure that I can install it on my computer?

  6. How could I prevent 4,000 people from installing USB flash drives on their computers?

  7. What tool is a firewall that can URL filter, content filter, and provide malware inspection?

  8. What tool can prevent PII and sensitive data from leaving your network via email or from being copied onto a USB flash drive.

  9. What is the tool that can prevent malicious programs from accessing the registry?

  10. What tool would you use to prevent an attack on a web-based application?

 

 

 

 

Answers and explanations

 

  1. An incident response plan is written for a particular incident and lays out how it should be tackled and the key personnel required.

  2. The different categories of incidents are as follows:

  3. The different roles required to deal with an incident are as follows:

  4. The help desk identifies the incident response plan required and the key personnel that need to be notified.

  5. An incident response exercise is to carry out the incident response plan and any shortfalls.

  6. The first phase of the incident response process is the preparation phase where the plan is already written in advance of any attack.

  7. The last phase of the incident response process is lessons learned where we review why the incident was successful.

  8. If we do not carry out lessons learned, the incident may re-occur. Lessons learned is a detective control where we try to identify and repair any weaknesses.

  9. Collecting the most volatile evidence first.

  10. The first action would be to capture the network traffic so that we can identify the source of the attack.

  11. You should collect the data in the volatile memory first.

  1. Chain of custody lists who has handled the evidence before it goes to court. Any break in the chain or the evidence leaving your site is a breach of the chain of custody and the judge would ask for it to be investigated.

  2. Legal Hold is a process to ensure the securing data so it cannot be deleted, for example putting someone's mailbox on hold. This is sometimes called litigation hold. 

  3. Record time offset is used for time normalization across multiple time zones.

  4. He should take a system image so that it can be used for investigation.

  5. He should take a forensic copy so that it can be used for investigation.

  6. To ensure that when he is finished that he can prove integrity of the data.

  7. A SIEM system can be used to correlate logs from multiple places and give real time reporting of incidents.

  8. Data cannot be deleted from a WORM drive, as it is write-once, read many.

  9. Active monitoring is used to identify an incident in real time.

  10. You can use a protocol analyzer to find the operating system running on a computer.

  11. You can use a protocol analyzer to capture the data and command going to a network-based application.

  12. Banner grabbing is the best tool to use if you want to find information about the operating system of a remote web server.

  13. A network mapper can identify all hosts on your network, their patch level, and any services running on them.

  14. You can use a wireless packet sniffer or a SSID de-cloak device to find the SSID of your WAP, as it is embedded in the network traffic going to the WPA.

  15. A credentialed vulnerability scanner can audit files and find out account vulnerabilities.

  16. A non-credentialed vulnerability scanner that can only find missing patches.

  17. A compliance scanner ensures that the settings on your server are correct.

  18. Steganography allows you to hide a file, an audio, video, or image inside another a file, audio, video, or image. You may notice a larger file or faded image.

  19. You would set up a honeypot to find the attack method a hacker would use to exploit your website.

  20. The quickest form of backup is a snapshot of a virtual machine.

  21. The quickest form of tape backup is a full backup, as all backups need a full backup to start with.

  22. The two most common tape backups are full and incremental.

  23. You will need two tapes to perform a differential backup.

  24. If incoming ICMP was blocked on the network firewall, none of your command-line tools would work as ICMP bring back the replies.

  25. Ping is the tool that is used to test connectivity and the command ping -t is used for continuous ping.

  26. The normal maximum value of a packets TTL is 128 seconds or less.

  27. Netstat -an shows listening and established ports. If you reboot your computer, the established sessions will disappear.

  28. DNS lookup is used in a Windows environment to verify the hostname entry in the DNS server. Dig is the Unix/Linux equivalent.

  29. Ipconfig /displaydns displays the DNS cache and Ipconfig /flush clears all entries.

  30. Tracert is used to display the route to a remote web server over a maximum of 30 hops.

  31. tcpdump is a packet tracer used in a Linux/Unix environment.

  32. Netcat or nc shows the session between two hosts in a Linux/Unix environment.

  33. A file integrity checker can determine whether a file has been altered by an application or is corrupt.

  34. If an application is neither on the blacklist or the whitelist, you need to add it to the whitelist so that you can install it on your computer.

  35. You can use group policy to prevent 4,000 people from installing USB flash drives on their computers.

  36. A UTM is a firewall that can URL filter, content filter, and provide malware inspection.

  37. DLP can prevent PII and sensitive data from leaving your network via email or from being copied onto a USB flash drive.

  38. DEP can prevent malicious programs from accessing the registry by restricting the area that programs can access.

  39. A web application firewall can prevent an attack on a web-based application.