Thor Teaches Study Guide CISSP Domain 6
Thor Teaches Study Guide CISSP Domain 6
1|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• Penetration tests.
• Vulnerability assessments.
• Security audits.
2|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• Should be automated, secure and even administrators should have
limited access.
• Often a central repository is hashed and never touched, and a
secondary copy is analyzed to ensure integrity.
• Logs should have a retention policy to ensure we are compliant, and we
keep the logs as long as we need them.
• Checking logs is often an afterthought and rarely done, where do we
start?
• Since they are often keeping everything, there can be 10's of millions of
lines of log info, we need to implement systems to automate this as
much as makes sense.
3|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• It is very important to have very clear rules of engagement defined in a SOW
(Statement Of Work)
• Which IP ranges, time frame, tools, POC, how to test, what to test, …
• We confirm with our legal team before hiring Pen Testers, even if you
allow it what they do may still be illegal.
• Senior management set the goals for the Pen testing.
• Why are we doing it? What are we trying to achieve? They have to sign
off on it.
• If we are the pen testers, we are there to test and document the vulnerabilities,
not to fix them.
• We provide the report to senior management and they decide which
vulnerabilities they want to address.
• Use multiple attack vectors and Pen testing uses an iterative process that is
similar to Agile project planning.
4|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• The Pen tester may also not be allowed to access certain files (PII/PHI), but a
dummy file is created in the same location, if the Pen tester can get to the
target file, they could get to the actual data file.
• The Pen testing is done in clearly defined time windows, often in maintenance
windows after hours, the point is to prove we are vulnerable, not disrupt our
business.
• Some low impact Pen tests can also be done on DR environments, to not affect
our live environments, but they are often less useful since most DR
environments are not a mirror copy of the production environment.
5|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• Authority (someone you trust or are afraid of) - Look and sound
like an authority figure, be in charge, this can be in a uniform or
a suit. Most effective with impersonation, whaling, and vishing
attacks.
• Intimidation (If you don't bad thing happens) - Virus on the
network, credit card compromised, lawsuit against your
company, intimidation is most effective with impersonation and
vishing attacks.
6|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• Uses the password combination & sniffing technique for cracking
unsecured wireless network, so a proper set up is required for making
the whole process semi-automated and automated.
7|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• Assessment and test strategies.
• Software testing:
• Code testing uses white and black box terms just like in Pen testing.
• White box software testing:
• The tester has full access to program source code, data
structures, variables, ...
• Black box software testing:
• The tester has no details, just the software, they then test for
functionality and security flaws.
8|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• Assessment and test strategies.
• Software testing:
• Software Testing levels:
• Component interface testing:
• Testing can be used to check the handling of data passed
between various units, or subsystem components, beyond full
integration testing between those units.
• Tests a completely integrated system to verify that the system
meets its requirements.
• Operational acceptance:
• Used to conduct operational readiness (pre-release) of a
product, service or system as part of a quality management
system.
9|Page
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• All-pairs testing (Pairwise testing):
• All-Pairs Testing is defined as a black-box test design technique
in which test cases are designed to execute all possible discrete
combinations of each pair of input parameters.
• The most common bugs in a program are generally triggered by
either a single input parameter or an interaction between pairs
of parameters.
• It uses carefully chosen test vectors, this can be done much
faster than an exhaustive search of all combinations of all
parameters, by parallelizing the tests of parameter pairs.
• If we have a very simple piece of software with 3 input
parameters:
• Server type A: Physical B: VM Vendor: A: Dell B: HP Serial
number: A Valid (5000) B Invalid
• If we test all possible combinations, we would test
2x2x5000 = 20000 combinations.
• If we test all-pairs, we would test 2x2x2 = 8
combinations – we only look at valid or invalid input.
10 | P a g e
https://thorteaches.com/
CISSP Domain 6 Lecture notes
• What we covered in the sixth CBK Domain:
• In this domain we covered how we test the actual security levels of our organization,
including vulnerability scanning, penetration testing, security assessments, and audits.
• The Vulnerability scanning can show us half of the Risk = Threat × Vulnerability
equation.
• In the Penetration testing we try to match those vulnerabilities with threats, so
we can show the actual risk, if there are no real threats to a vulnerability, we
may focus on vulnerabilities with actual threats.
• How we perform both internal and external audits and full security
assessments.
• Finally, how we review and test the code, the different methodologies and
approaches we use to test different elements of the code.
11 | P a g e
https://thorteaches.com/