2.0 Threats, Vulnerabilities, and Mitigation Flashcards

1
Q

The entity responsible for an event that has an impact on the safety of another entity
– Also called a malicious actor
– Describes characteristics of the attacker
* Useful to categorize the motivation – Why is this attack happening?
– Is this directed or random?

A

2.0 Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

External entity
– Government and national security
* Many possible motivations
– Data exfiltration, philosophical, revenge, disruption,
war
* Constant attacks, massive resources
– Commonly an Advanced Persistent Threat (APT)
* Highest sophistication
– Military control, utilities, financial control
– United States and Israel destroyed 1,000 nuclear
centrifuges with the Stuxnet worm

A

Nation states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Runs pre-made scripts without any knowledge of what’s really happening
– Anyone can do this
* Motivated by the hunt
– Disruption, data exfiltration, sometimes philosophical
Can be internal or external – But usually external
* Not very sophisticated
– Limited resources, if any
* No formal funding
– Looking for low hanging fruit

A

Unskilled attackers/Script Kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A hacker with a purpose
– Motivated by philosophy, revenge, disruption, etc.
* Often an external entity
– Could potentially infiltrate to also be an insider threat
* Can be remarkably sophisticated
– Very specific hacks
– DoS, web site defacing, private document release
* Funding may be limited
– Some organizations have fundraising options

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

More than just passwords on sticky notes – Motivated by revenge, financial gain
* Extensive resources
– Using the organization’s resources against themselves
* An internal entity
– Eating away from the inside
* Medium level of sophistication
– The insider has institutional knowledge
– Attacks can be directed at vulnerable systems – The insider knows what to hit

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Going rogue
– Working around the internal IT organization – Builds their own infrastructure
* Information Technology can put up roadblocks
– Use the cloud
– Might also be able to innovate
* Limited resources – Company budget
* Medium sophistication
– May not have IT training or knowledge

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Professional criminals
– Motivated by money
– Almost always an external entity
* Very sophisticated
– Best hacking money can buy
* Crime that’s organized
– One person hacks, one person manages the exploits,
another person sells the data, another handles customer support
* Lots of capital to fund hacking efforts

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client-based
– Infected executable
– Known (or unknown) vulnerabilities – May require constant update
Agentless
– No installed executable
– Compromised software on the server
would affect all users
– Client runs a new instance each time

A

Vulnerable software vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Patching is an important prevention tool – Ongoing security fixes
* Unsupported systems aren’t patched – There may not even be an option
* Outdated operating systems
– Eventually, even the manufacturer won’t help
* A single system could be an entry
– Keep your inventory and records current

A

Unsupported systems vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The network connects everything – Ease of access for the attackers – View all (non-encrypted) data
* Wireless
– Outdated security protocols (WEP, WPA, WPA2) – Open or rogue wireless networks
* Wired
– Unsecure interfaces - No 802.1X
* Bluetooth
– Reconnaissance, implementation vulnerabilities

A

Unsecure network vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Most network-based services connect over a TCP or UDP port
– An “open” port
* Every open port is an opportunity for the attacker – Application vulnerability or misconfiguration
* Every application has their own open port – More services expand the attack surface
* Firewall rules
– Must allow traffic to an open port

A

Open service ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most devices have default usernames and passwords – Change yours!
* The right credentials provide full control – Administrator access
* Very easy to find the defaults for your access point or router – https://www.routerpasswords.com

A

Default credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

amper with the underlying infrastructure – Or manufacturing process
* Managed service providers (MSPs)
– Access many different customer networks from one
location
* Gain access to a network using a vendor – 2013 Target credit card breach
* Suppliers
– Counterfeit networking equipment
– Install backdoors, substandard performance and availability – 2020 - Fake Cisco Catalyst switches

A

Supply chain vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ocial engineering with a touch of spoofing – Often delivered by email, text, etc.
– Very remarkable when well done
* Don’t be fooled – Check the URL
* Usually there’s something not quite right – Spelling, fonts, graphics

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

We trust email sources
– The attackers take advantage of this trust
* Spoofed email addresses
– Not really a legitimate email address – professor@professormessor.com
* Financial fraud
– Sends emails with updated bank information – Modify wire transfer details
* The recipient clicks the links
– The attachments have malware

A

Business email compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are they so successful?
– Digital slight of hand - It fools the best of us
* Typosquatting
– A type of URL hijacking - https://professormessor.com
* Pretexting - Lying to get information
– Attacker is a character in a situation they create
– Hi, we’re calling from Visa regarding an automated payment
to your utility service…

A

Tricks and misdirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vishing (Voice phishing) is done over the phone or voicemail – Caller ID spoofing is common
– Fake security checks or bank updates
* Smishing (SMS phishing) is done by text message – Spoofing is a problem here as well
– Forwards links or asks for personal information
* Variations on a theme
– The fake check scam, phone verification code scam,
– Boss/CEO scam, advance-fee scam
– Some great summaries on https://reddit.com/r/Scams
© 2023 Messer Studios, LLC
Professor Messer’s CompTIA SY0-701 Security+ Course Notes - Page 20

A

Phishing with different bait

18
Q

Before the attack, the trap is set - There’s an actor and a story
* “Hello sir, my name is Wendy and I’m from Microsoft Windows. This is an urgent check up call for your computer as we have found several problems with it.”
* Voice mail: “This is an enforcement action executed by the US Treasury intending your serious attention.”
* “Congratulations on your excellent payment history! You now qualify for 0% interest rates on all of your credit card accounts.

A

The pretext

19
Q

Attackers pretend to be someone they aren’t – Halloween for the fraudsters
* Use some of those details from reconnaissance – You can trust me, I’m with your help desk
* Attack the victim as someone higher in rank – Office of the Vice President for Scamming
* Throw tons of technical details around
– Catastrophic feedback due to the depolarization of the
differential magnetometer
* Be a buddy - How about those Cubs?

A

Impersonation

20
Q

Extracting information from the victim
– The victim doesn’t even realize this is happening – Hacking the human
* Often seen with vishing (Voice Phishing)
– Can be easier to get this information over the phone
* These are well-documented psychological techniques – They can’t just ask, “So, what’s your password?”

A

Eliciting information

21
Q

Your identity can be used by others
– Keep your personal information safe!
* Credit card fraud
– Open an account in your name, or use your
credit card information
* Bank fraud
– Attacker gains access to your account or opens
a new account
* Loan fraud
– Your information is used for a loan or lease
* Government benefits fraud
– Attacker obtains benefits on your behalf

A

Identity fraud

22
Q

ever volunteer information – My password is 12345
* Don’t disclose personal details – The bad guys are tricky
* Always verify before revealing info
– Call back, verify through 3rd parties
* Verification should be encouraged
– Especially if your organization owns valuable
information

A

Protect against impersonation

23
Q

Determine which website the victim group uses – Educated guess - Local coffee or sandwich shop – Industry-related sites
* Infect one of these third-party sites – Site vulnerability
– Email attachments
* Infect all visitors
– But you’re just looking for specific victims – Now you’re in!

A

Watering Hole Attack

24
Q

Disseminate factually incorrect information – Create confusion and division
* Influence campaigns
– Sway public opinion on political and social issues
* Nation-state actors
– Divide, distract, and persuade
* Advertising is an option
– Buy a voice for your opinion
* Enabled through Social media
– Creating, sharing, liking, amplifying

A

Misinformation/disinformation

25
Q

Pretend to be a well-known brand
– Coca-cola, McDonald’s, Apple, etc.
* Create tens of thousands of impersonated sites – Get into the Google index, click an ad,
get a WhatsApp message
* Visitors are presented with a pop-up
– You won! Special offer! Download the video!
* Malware infection is almost guaranteed
– Display ads, site tracking, data exfiltration

A

Brand impersonation

26
Q

Always update
– Monthly or on-demand updates
– It’s a race between you and the attackers
* May require testing before deployment – A patch might break something else
* May require a reboot – Save all data
* Have a fallback plan
– Where’s that backup?

A

Best practices for OS vulnerabilities

26
Q

Add code into the memory of an existing process – Hide malware inside of the process
* Get access to the data in that process – And the same rights and permissions – Perform a privilege escalation

A

Memory injection

27
Q

Dynamic-Link Library
– A Windows library containing code and data – Many applications can use this library
* Attackers inject a path to a malicious DLL – Runs as part of the target process
* One of the most popular memory injection methods – Relatively easy to implement

A

DLL injection

28
Q

Overwriting a buffer of memory
– Spills over into other memory areas
* Developers need to perform bounds checking
– The attackers spend a lot of time looking for openings
* Not a simple exploit
– Takes time to avoid crashing things
– Takes time to make it do what you want
* A really useful buffer overflow is repeatable
– Which means that a system can be compromised

A

Buffer overflows

29
Q

A programming conundrum
– Sometimes, things happen at the same time – This can be bad if you’ve not planned for it
* Time-of-check to time-of-use attack (TOCTOU)
– Check the system
– When do you use the results of your last check?
– Something might happen between the check and the use

A

Race condition

30
Q

– Adding your own information into a data stream
* Enabled because of bad programming
– The application should properly handle input
and output
* So many different data types – HTML, SQL, XML, LDAP, etc.
An example of website code:
– “SELECT * FROM users WHERE name = ‘“ + userName + “’”; * How this looks to the SQL database:
– “SELECT * FROM users WHERE name = ‘Professor’”; * Add more information to the query:
– “SELECT * FROM users WHERE name = ‘Professor’ OR ‘1’ = ‘1’”; * This could be very bad
– View all database information, delete database information, add users, denial of service, etc.

A

Code injection

30
Q

The most common relational database management
system language
* SQL injection (SQLi)
– Put your own SQL requests into an existing application – Your application shouldn’t allow this
* Can often be executed in a web browser – Inject in a form or field

A

SQL injection - SQL - Structured Query Language

31
Q

One of the most common web app (browser) vulnerabilities – Takes advantage of the trust a user has for a site – Complex and varied
* commonly uses JavaScript – Do you allow scripts? Me too.

A

Cross-site scripting XXS

32
Q

Web site allows scripts to run in user input – Search box is a common source
* Attacker emails a link that takes advantage of this vulnerability
– Runs a script that sends credentials/
session IDs/cookies to the attacker
* Script embedded in URL executes in the victim’s browser – As if it came from the server
* Attacker uses credentials/session IDs/cookies to steal victim’s information without their knowledge
– Very sneaky

A

Non-persistent (reflected) XSS attack

33
Q

Attacker posts a message to a social network – Includes the malicious payload
* It’s now “persistent”
– Everyone gets the payload
* No specific target
– All viewers to the page
For social networking, this can spread quickly – Everyone who views the message can
have it posted to their page
– Where someone else can view it and propagate it
further…

A

Persistent (stored) XSS attack

34
Q

Cloud adoption has been nearly universal
– It’s difficult to find a company NOT using the cloud
* We’ve put sensitive data in the cloud – The attackers would like this data
* We’re not putting in the right protections – 76% of organizations aren’t using
– MFA for management console users
* Simple best-practices aren’t being used
– 63% of code in production are unpatched
– Vulnerabilities rated high or critical (CVSS >= 7.0)

A

Security in the cloud

34
Q

The hypervisor manages the relationship between physical and virtual resources
– Available RAM, storage space, CPU availability, etc.
* These resources can be reused between VMs – Hypervisor host with 4 GB of RAM
– Supports three VMs with 2 GB of RAM each – RAM is allocated and shared between VMs
* Data can inadvertently be shared between VMs
– Time to update the memory management features – Security patches can mitigate the risk

A

Resource reuse

34
Q

he virtual machine is self-contained – There’s no way out
– Or is there?
* Virtual machine escape
– Break out of the VM and interact with the host
operating system or hardware
* Once you escape the VM, you have great control – Control the host and control other guest VMs
* This would be a huge exploit
– Full control of the virtual worl

A

VM escape protection

35
Q

Quite different than non-virtual machines – Can appear anywhere
* Quantity of resources vary between VMs – CPU, memory, storage
* Many similarities to physical machines
– Complexity adds opportunity for the attackers
* Virtualization vulnerabilities – Local privilege escalations – Command injection
– Information disclosure

A

Virtualization security

36
Q

March 2017 - Pwn2Own competition
– Hacking contest
– You pwn it, you own it - along with some cash
* JavaScript engine bug in Microsoft Edge – Code execution in the Edge sandbox
* Windows 10 kernel bug
– Compromise the guest operating system
* Hardware simulation bug in VMware – Escape to the host
Patches were released soon afterwards

A

Escaping the VM

37
Q

Denial of Service (DoS)
– A fundamental attack type
* Authentication bypass
– Take advantage of weak or faulty authentication
* Directory traversal
– Faulty configurations put data at risk
* Remote code execution
– Take advantage of unpatched systems – Attack the application
* Web application attacks have increased – Log4j and Spring Cloud Function
– Easy to exploit, rewards are extensive
* Cross-site scripting (XSS)
– Take advantage of poor input validation
* Out of bounds write
– Write to unauthorized memory areas
– Data corruption, crashing, or code execution
* SQL injection
– Get direct access to a database

A

Cloud Specific Vulnerabilities

38
Q
A