Ben's Security+ Notes
Ben's Security+ Notes
Ben's Security+ Notes
Thanks for supporting my channel! These are my notes that I used to pass the Sec+
Exam on my first try!
Prompt:
I am currently studying to get my CompTIA Security+. I want you to act as if you are my
tutor preparing me for the test. I am going to ask you about a bunch of different
concepts, I want your answers to include a few things.
Answer all of my question in this format, until I say otherwise. Can you do that for me?
Phishing -
Pharming - redirecting requests to fraudulent websites via DNS spoofing
Vishing - a form of social engineering that uses VOIP to retrieve personal information
from its victims
Watering hole attack - when attackers target a specific group and exploits websites that
the group commonly visits by injecting malicious code, users that visit the website will
be automatically infected without their knowledge
Sec+ Notes 1
Pretexting - creating a fake scenario to elicit sensitive information from victims
Prepending - when an attacker manipulates the caller ID to make it seem as if its calling
from a trusted entity
Fileless virus - malware that resides and executes within a system’s memory that does
not leave a trace behind
Cryptomalware - malicious software that is used to encrypt files on a user’s system, until
a ransom is paid to the attacked.
Spyware - malicious software that is used to gather information from a user’s device
without their knowledge or consent
Password attacks
Brute force - straight up guessing passwords using every possible combination of
characters, can be automated with scripts
Rainbow Table - a table with ciphertext and their corresponding plain text values,
that is used to compare and match with encrypted passwords
Credential Stuffing - using previous passwords from other breaches to gain access
to other accounts, relying on users that use the same passwords for multiple
accounts
Sec+ Notes 2
Replay - attackers intercept data packets and retransmits them to gain unauthorized
access
Birthday attack - exploits the probability of two different inputs producing the same
hash value
On-path attack/man in the middle attack - when an attacker places them in the middle of
communication between two entities and intercepts/alters communication between them
Cross site scripting attack (XSS) - attacker injects a website with malicious code, and
when victims visit the website, their browser automatically executes the code
XSS
Cross site request forgery (XSRF) - when authenticated users unknowingly perform
malicious actions by exploiting their session
DDOS
LDAP Injection
XML Injection
Pointer dereference -
Sec+ Notes 3
Buffer overflow - when buffer overflows with storage and spills over into other memory
locations
SSL Stripping - a form of a MITM attack and downgrade attack in which the attacker
places themselves in between a communication and downgrades the secure HTTPS
connection to an insecure HTTP connection
Pass the Hash - a hacking technique that uses the hashed value to authenticate
Race condition - when multiple processes share the same resources without proper
synchronization, this can lead to data inconsistencies, unexpected program behavior,
and security vulnerabilities
Refactoring - improving the internal structure of code without compromising its external
behavior
Shimming - a thin layer of code that allows for increased compatibility between different
software components
RFC Request for Comment - document series that sets the standards of design,
development, and implementation of internet standards
Sec+ Notes 4
NVD (National Vulnerability Database) - government repository of vulnerability
management data
TTP (Tactics, Techniques, and Procedures) - the methods and approaches used by
attackers to conduct attacks
CVSS (Common Vulnerability Scoring System) - framework that is used to quantify the
severity and impact of security vulnerabilities
STIX (Structured Threat Information Expression) - WHAT info is relayed, language and
framework to exchange cybersecurity threat intel
TAXII (Trusted Automated Exchange Indicator Information) - HOW the info is relayed
SIEM (Security Information and Event Management) - collects log data and takes
appropriate action
PCAP (Packet Capture) - software tool that captures and analyzes network traffic
DLP (Data Loss Prevention) - defines how your organization shares and protects data
without exposing it to unauthorized users
Sec+ Notes 5
Hot Site - fully operational and ready to use off-site facility
Cold Site - off-site facility that provides physical space, but does not have the necessary
technological infrastructure
MSP (Managed Service Provider) - third party company that ensures that your IT
systems are operational
MSSP (Managed Security Service Provider) - third party company that ensures that
your people and IT operations are secure and reliable
Data sanitization - the erasure of data to ensure that it cannot be recovered from the
storage device
VM escape - an attacker runs code on the VM that grants them access to the hypervisor
Sec+ Notes 6
TOTP (Time-based One Time Password) - an algorithm that generates a one time
password
FAR (False Acceptance Rate) - the rate in which a biometric security feature will
incorrectly allow an unauthorized party to pass
FRR (False Rejection Rate) - the rate in which a biometric security system will reject an
authorized user
RAID 6 - similar to RAID 5, but can withstand two drives failing without data loss
RAID 10 - combines RAID 0 and RAID 1, minimum four drives and provides
increased fault tolerance and redundancy
Sec+ Notes 7
Restore point - a file-based representation of the current state of a virtual machine
Backups
Incremental backups - backing up only the data that has changed since the last full
or incremental backup
Differential backups -
SCADA (Supervisory Control and Data Acquisition) - system used to monitor and
control industrial processes and infrastructure
ICS (Industrial Control System) - used to control industrial systems, works with
SCADA
Secure boot
Remote attestation
Sec+ Notes 8
Data sealing
HSM (Hardware Security Module) - a hardware device that is used to secure and
protect cryptographic keys and perform cryptographic operations
Zigbee - wireless communication protocol for low-power, low-data rate devices (IoT
devices)
Degaussing - permanently erasing data from the magnetic media by disrupting the
magnetic patterns that store the data
Encryption
Key stretching - a technique used to increase the computational effort required to
derive keys from a password
Bcrypt
PBKDF2
Sec+ Notes 9
Ephemeral Key - an asymmetric key that is used for only one session
Static key - a key that is used for a longer duration and sessions
Session key - asymmetric key that is used for encryption and decryption in a single
session
Triple Data Encryption Standard (3DES): 3DES is a variant of DES that applies
the DES algorithm three times to each block of data, using two or three different
keys.
Twofish: Twofish is a symmetric key block cipher that supports key sizes up to
256 bits and operates on 128-bit blocks.
Sec+ Notes 10
Serpent: Serpent is a symmetric key block cipher that operates on 128-bit blocks
and supports key sizes of 128, 192, and 256 bits.
RC4: RC4 is a stream cipher known for its simplicity and speed. It operates on
variable-length keys and generates a keystream that is XORed with the plaintext
to produce the ciphertext.
Asymmetric Algorithms
RSA (Rivest-Shamir-Adleman):
RSA is one of the most widely used asymmetric encryption algorithms. It relies
on the difficulty of factoring large prime numbers. The algorithm generates a
public-private key pair, where the public key is used for encryption, and the
private key is used for decryption. RSA is often employed in secure email
communication, SSL/TLS protocols, digital signatures, and key exchange.
Diffie-Hellman (DH):
Diffie-Hellman is a key exchange algorithm that allows two parties to establish a
shared secret key over an insecure communication channel. It enables secure
communication even if an eavesdropper intercepts the exchange. Diffie-Hellman
is used in various protocols such as SSL/TLS, IPsec, and secure email.
Sec+ Notes 11
Things (IoT) devices. ECC is utilized in SSL/TLS, digital signatures, and secure
key exchange.
PGP
DNSSEC - ensures that you are communicating with the correct website or service
2. WPA (Wi-Fi Protected Access): WPA is an improvement over WEP and provides
stronger security. It uses TKIP (Temporal Key Integrity Protocol) for encryption
and includes authentication mechanisms like WPA-PSK (Pre-Shared Key) and
WPA-Enterprise (using an authentication server).
3. WPA2 (Wi-Fi Protected Access 2): WPA2 is the current standard for wireless
network security. It uses the AES (Advanced Encryption Standard) algorithm for
encryption and offers stronger security than WPA. It supports both WPA2-PSK
and WPA2-Enterprise authentication modes.
4. WPA3 (Wi-Fi Protected Access 3): WPA3 is the latest iteration of Wi-Fi security
protocols. It enhances security by introducing new features like SAE
(Simultaneous Authentication of Equals) and stronger encryption methods.
WPA3 is backward compatible with WPA2.
Sec+ Notes 12
PEAP (Protected EAP), and EAP-FAST (Flexible Authentication via Secure
Tunneling).
Network Protocols
IPsec - rules or protocols for secure connections over a network
POP3 - one-way incoming mail protocol that downloads emails onto a local device
SNMPv1
SNMPv2
SNMPv3
SNMPv4
TCP is responsible for delivery, while IP is responsible for the correct address to
which the data is sent
MAC (Mandatory Access Control) - high level of access control security that requires
all access to be predefined based on system classification, configuration, and
authentication
Sec+ Notes 13
Nessus - vulnerability assessment tool that assesses vulnerabilities in computer
networks, systems, and apps
Aircrack-ng - a suite of network security tools for assessing the security of Wi-Fi
networks, capturing network packets, and conducting various attacks on Wi=Fi
encryption protocols
MD5 and SHA-1 are cryptographic hash functions, which means they take any
length input and produce a fixed-size output called a hash value or digest.
WPA (Wi-Fi Protected Access) - wireless security protocol designed to secure Wi-Fi
networks, more secure than WEP
tracert - a command line tool that allows you to trace the route a network packet
takes from your computer to a destination IP address or hostname
SOX (Sarbanes-Oxley) - U.S. federal law that sets requirements for all US public
company boards
DHCP scope - the range of IP addresses that are able to be assigned to devices
within a network
Sec+ Notes 14
DHCP snooping - a security feature on network switches that mitigates the risk of
rogue DHCP serves and unauthorized network access
EDR (Endpoint Detection and Response) - security solutions designed to detect and
respond to threats and malicious activities on endpoints
SWG (Secure Web Gateway) - provides organizations with visibility, control, and
protection for web traffic.
CASB (Cloud Access Security Broker) - acts as the middle man between an
organization’s on prem infrastructure and cloud, to ensure that both are secure
MTBF (Mean Time Between Failures - measure to estimate the average time
between the failures of a system
MTTR (Mean Time To Recovery) - the amount of time it’ll take to repair a system
MTTF (Mean Time to Failure) - the amount of time until a system is expected to fail
RTO (Recovery Time Objective) - the maximum amount of time that is tolerable to
have the systems down
Sec+ Notes 15
802.1X - an authentication framework that controls access to a network, ensures
that only authorized devices are granted access to the network resources
Sec+ Notes 16
Screened subnet or DMZ - a network architecture design that separates the internal
network from the internet (like a network air gap)
VPN concentrator or VPN gateway - networking device that enables secure remote
access to a private network over the internet
IMAP (Internet Message Access Protocol) - email retrieval protocol that allows
clients to manage emails stored on the mail server
S/MIME - a standard for securing email messages with encryption and digital
signatures
Data Custodian - a team or individual responsible for the storage, management, and
protection of data
ALE - the expected financial impact of a specific risk over one year
SLE (Single Loss Expectancy) - the expected loss of revenue from a specific risk
ARO - the frequency of the specific event occurring within a one-year period
Containerization -
Types of Booting
Measured - a process that involves measuring and recording the integrity of
various boot components during startup like firmware, bootloader, OS kernel by
the TPM
Sec+ Notes 17
Standards
GDPR (General Data Protection Regulation) - data protection and privacy for
individuals in the EU
PCI DSS (Payment Card Industry Data Security Standard) - a standard for
protecting credit cards
CSA CCM (Cloud Security Alliance Cloud Controls Matrix) - security controls
and best practices frameworks for secure cloud computing environments
FISMA (Federal Information Security Management Act) - U.S. federal law
framework that protects gov. info, ops, and assets
ISO
1. ISO/IEC 27001: This standard specifies the requirements for an information
security management system (ISMS). It provides a framework for implementing
and managing security controls to protect information assets.
4. ISO/IEC 27017: This standard offers specific guidelines for information security
controls in cloud computing environments. It addresses security considerations
related to the use of cloud services and provides guidance for both cloud service
providers and cloud customers.
Sec+ Notes 18
controls to protect personal data in cloud-based services.
Commands
tail - command used to display the last part of a file or stream
grep - a command that is used for searching and filtering text files or streams
based on patterns or regular expressions
Nmap - open source network scanning tool, identifies open ports, and gathers
information about hosts and services that are running in a network
curl - command line tool that is used for making HTTP requests and interacting
with web servers, can be used to download files, send data to web servers, and
test APIs.
head - command used to display the first few lines of a file or beginning of a
stream
tracert - command that is used to trace the route a packet takes from the source
device to the destination device
dig - command used for querying DNS servers to get information about domain
names, IP addresses, and more.
hping - used for security auditing and testing of firewalls and networks
Sec+ Notes 19
chmod - sets permissions of files or directories
STP frame (Spanning Tree Protocol) - a network protocol used to prevent loops in
Ethernet networks
MTU (Maximum Transmission Unit) - the maximum size of a data packet that can be
transmitted over a network protocol without fragmentation
Jump server - a dedicated system used as an access point for connecting and
managing other systems in a network
Geofencing - technology that allows the creation of virtual boundaries around real-
world geographic areas
IdP (Identity Provider) - manages the authentication and authorization process for
users within a network
GPO (Group Policy Object) - Windows group policy settings that defines what a
system looks like and how it behaves to a group of users
Sec+ Notes 20
Syslog - centralized log management system
Nessus - vulnerability scanning tool that helps identify vulnerabilities, and take
appropriate actions to mitigate them
Port numbers
1. FTP (File Transfer Protocol): 20 (data), 21 (control)
3. Telnet: 23
10. SNMP (Simple Network Management Protocol): 161 (SNMP agent), 162 (SNMP
manager)
Sec+ Notes 21
19. FTPS (FTP Secure): 990
Sec+ Notes 22