Domain 2: Threats, Vulnerabilities and Mitigations Flashcards

1
Q

Threat actors

Objective 2.1

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat actors

A
  • familiarize yourself with the following thread actors, understand their motivations, their level of sophistication, funding, and if they are internal or external to an organization
    • Nation-state (aka advanced persistent threat)
    • Unskilled attacker (aka script kiddie)
    • Hacktivist
    • Organized crime
      • also an APT
    • Insider threat
    • Shadow IT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nation-state or APT

A

• advanced persistent threat (APT)

• carry out attacks against foreign countries or organizations for the benefit of their parent country

• can be made up of the countries, military or cyber operations group

• compromise network security of their targets with innovative, sophisticated network attacks through advanced tools and techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unskilled attacker

A

• “script kiddie”

• low skilled attacker, who knows enough to be dangerous, but may not be able to carry out tax on their own. Instead, they leverage tools created by others without fully understanding how or why of vulnerability works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacktivist

A

• a person who hacks to further a social or political cause

• target groups out of ethical or philosophical differences
- political, media or financial groups

• actions include the facing websites, leaking information and performing Dos attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Organized crime

A

• organize criminals that use hacking to further their criminal enterprises

• cybercrime is gaining popular due to the ability to operate from different countries, making prosecution more complex

• examples include ransom data, theft, extortion, blackmail, and identity, theft

• ransom where as a service is a form of attack perpetrated by organized crime groups who will carry out a ransom attack on a target organization. You bring them to target and ways to deliver the ransomware and they’ll split the proceeds with you 80/20 or 90/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insider threat

A

• a threat actor that comes from inside the organization

• threat can be due to malicious action or simply incompetence

• examples include disgruntled or uneducated employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shadow IT

A

• The installation and use of IT systems or software without the permission of the IT department

• may be trying to be helpful to colleagues, but might circumvent policy or under my security controls in the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat vectors and attack surfaces

Objective 2.2

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social engineering attacks

A

• message-based attacks
- email (phishing)
- SMS or text messages
- chat - direct messages (DM) or instant messaging (IM)

• Voice-based attacks
- “vishing” or “voice phishing”
- method of talking an individual into doing something they normally would not do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

Spear phishing

Whaling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File-based attacks

A

• many forms of malware attack system through a download file or email attachment

• fileless malware is a form of an attack where there is no file that stays resident on the system
- usually a downloader pulls them out from online, runs the malware, does the damage and removes itself making it hard to identify it or spot

• images can also be malicious:

  • Do use of stenography
  • Can contain malware hidden inside
  • Can contain sensitive information being exfiltrated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerable software

A

• software can have number of security flaws baked in:

  • inadvertent, oversights
  • malicious inclusion, “backdoor”

• two correct discovered vulnerabilities, we must watch for patches and update as necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Removable media

A

• mass storage devices

• data can be infiltrated from an organization through removable media

• “Airgapped” systems can be compromised through removal media

  • Ex. Stuck-net attack on Iranian nuclear facility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unsupported systems and applications

A

• any system connected to an organizations network should be identified and monitored

• any software in use at an organization should be listed and watched for updates

• if users are introducing other systems or software that are not receiving regular patches or updates, this is a vulnerability

• two ways to scan for:

  • client-based scanning (agent-based)• Use of software agent on the endpoint systems to scan software and report back to central server
  • agentless• use of a network service to scan for (enumerate) hosts and query software installed on those hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Insecure networks

A

• wired

  • Active network ports within facilities, especially those in public or obscure areas (e.g. lobby, dining facility, hallways, vacant offices)

• wireless

  • lack of wireless security, use of insecure protocols
  • Transmitting beyond confines of the facility

• Bluetooth

  • disable Bluetooth if not needed
  • Monitor connections via Bluetooth
  • Be aware that Bluetooth can be an attack vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Open ports

A
  • any point where data can connect to an internal service is potential point of attack
  • on the host or firewall is a potential vulnerability
  • all unnecessary, unneeded services should be disabled in their port closed
  • only required ports should be opened on a firewall
  • Data passing through these ports should be monitored and manage for malicious activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Default credentials

A

• admin : admin

• leaving the default settings on system can open an organization up to widespread attacks. Numerous scanners exist that attempt to exploit default login information on commercially available devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Supply chain attacks

A

• type of cyber attack where an attacker goes for a less secure system within supply chain

• rather than attacking a company directly, attacker may realize the target information may be in a less protected system elsewhere in the supply chain

• supply chain consists of:

  • Manage service providers (MSP)
  • vendors
  • suppliers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Social engineering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Phishing

A

• phishing

  • is a method of sending digital correspondences that appears legitimate, but actually is meant to lure potential victim into providing personal information for malicious purposes
  • vishing - portmanteau of “voice” and “phishing”• using fishing techniques over voice calls

• Smishing - portmanteau of “SMS” and “phishing”

   • using phishing techniques over SMS or text messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Misinformation and pretexting

A

Misinformation/disinformation

• providing false or misleading information to a potential victim to sway their line of thinking or trick them into doing something

• ex. “Your computer is at risk. Click here to download the latest security patch now.”

Pretexting

• form of social engineering, where an attacker creates a fake backstory to trick a user into doing something against the users or organizations interest

• ex. Calling ahead to let the front desk know and inspector will arrive that afternoon and will need access to elevator control room and the primary data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Watering hole

A

• why work hard breaking into a network?

• instead, attackers lie in wait

• let victims come to them

• Typosquatting

  • Buying up a domain that is similar to a popular site, hoping to catch a victims who mistype a URL or will go to a site because the link appears similar to the intended trusted site
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Vulnerabilities

Objective 2.3

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Zero-day

A

• vulnerability in a software or system that the creators or responsible parties are not aware of

• if exploited by an attacker, no users will have had this vulnerability fixed. Does. The attack will always succeed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Application vulnerabilities

A

• Improper input handling

  • when a program incorrectly handles validation, sanitization or handling of input
  • this results in common exploits such as SQL injection and cross site scripting (XSS)

• Improper error handling

  • if an error divulges too much information to the end user, and attacker can use this to learn about the underlying code
  • conversely, graceful, and properly logged (rather than displayed error) messages can serve as an indicator of an attack and help determine possible remedies. 
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Application vulnerabilities continued

A

• replay attacks

  • when and re-transmits valid data with malicious intent
  • For example, an attacker might resend a victims hashed password to fraudulently authenticate with a service as that user. This is referred to as “pass the hash”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

OS vulnerabilities

A

• malicious libraries

  • Attackers attack operating systems through malicious libraries that will be incorporated into an application when it executes and loads the library

• malicious drivers

  • attackers attack OS through malicious drivers that monitor data transiting the device or carry out malicious activity deeper in the operating system since drivers are inherently trusted by the OS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Web vulnerabilities

A

• SQL injection

- common method of attacking database supported systems
  • if Web application takes user input and does not validate information or sanitize the input. Base will execute whatever the user provides.
  • Example:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Web vulnerabilities continued

A

• cross-site scripting (XSS)

  • type of injection attack
  • involves injecting, malicious Scripps typically Java script into trusted websites
  • Attackers input is not properly sanitized, the attacker can modify the code, behavior, and or content of the website

• reflected XSS

  • Tells site to pull in code from another website

• stored XSS

- Gives code to site to be stored in database, when database is queried for following users, script is executed and alters site behavior for those users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Web vulnerabilities continued

A

• cross-site request forgery

  • An attack against a user who is authenticated to a web application
  • The attacker takes advantage of the authentication to force the user to take an unwanted action by convincing the user to submit a malicious request a cover by their credentials
32
Q

Web vulnerabilities continued

A

• directory traversal

  • A possible attack when the attacker reads files on a web server outside the websites home directory
  • identifiable through use of ..in the URL
33
Q

Hardware vulnerabilities

A

• physical to a system should be restricted. And attacker can physically touch the vulnerable system, they can carry out a range of attack.

• data can be infiltrated via malicious cables, mass storage devices (USB drives, cameras, media, converters, etc.)

• common defense is to disable USB ports entirely or prevent mass storage devices from being connected 

34
Q

Virtualization vulnerabilities

A

• virtualization is the practice of operating several virtual machines on one discrete computer

• VM sprawl

  • Making virtual machines has become relatively easy and far cheaper than setting up a physical server. This makes it more likely that the deployment of VM’s become too trivial. The excessive deployment of VMs is known as VM sprawl.
  • VM sprawl can lead to performance issues (as VMs increase, available resources decrease) and security issues (VM escapes). A sound provisioning and deprovisioning policy can help alleviate this problem.
35
Q

Virtualization vulnerabilities continued

A

• VM escape

  • Attackers will attempt to escape their virtual environment and interact with the host environment
  • this can be a hard problem to solve. Layered security in good logging practices can go along way toward mitigating these threats. Be sure to keep VM Software up-to-date!
36
Q

Supply chain vulnerabilities

A

• rather than compromising a company directly through their network system, and attacker may realize the information they are looking for may be in a less protected system somewhere along the supply chain

• relationships at risk:

  • Suppliers
  • vendors
  • business partners
37
Q

Cryptographic vulnerabilities

A

• attackers focus on finding methods of cracking encryption techniques to extract, sensitive data

• the goal of cryptographic attack is to get the unencrypted plaintext values of an encrypted ciphertext

• “pass the hash” is a common form of cryptographic vulnerability

38
Q

Misconfigurations

A

• misconfiguration

  • when a system or component of a system is configured in a way that causes a vulnerability
  • Examples included default accounts, error handling and unnecessary components
39
Q

Mobile device vulnerabilities

A

• third-party App Stores

  • may offer apps that are not available in the official store; not typically as well regulated
  • app validation may not be as strict as the official App Store, more likely to contain malware

• sideloading

  • Method for loading unapproved apps onto a mobile device, no App Store needed

• rooting and jailbreaking

  • process of modifying a mobile device to allow the circumvention of manufacturer restrictions
  • Involves gaining access to the root or privileged account used to install the operating system on a device
40
Q

Mobile device vulnerabilities continued

A

camera use

  • the camera on a device can present a multitude of challenges:
  • Pictures of sensitive data or areas
  • Personal or private pictures on devices

short message service (SMS) and multimedia message service (MMS) allow for sending text messages and transferring files within an environment, but they come with challenges:

  • spreading of malware
  • phishing
  • data exfiltration
  • DoS attacks
41
Q

Malicious activity and indicators

Objective 2.4

A
42
Q

Malware

A

virus

  • A malicious computer program that attaches to applications or executable components. The virus infects these applications in order to replicate itself.
  • can contain a payload which execute when the virus is activated 

worm

  • Malware that spreads from the computer to computer with little or no interaction from a user
  • self-contained, no need to attach to other files as a virus does
  • Rapidly consumes network bandwidth due to ease of replication
43
Q

Malware continued

A

trojans

  • Malware that is disguised or hidden in seemingly legitimate software
  • because the software seems legitimate, it is more likely to be given the permissions to execute malicious code

backdoor

  • a way to circumvent security features surreptitiously built into software or systems
  • Back doors can be created mostly, but can also be included for testing and development purposes and then forgotten
44
Q

Malware continued

A

remote access Trojan (RAT)

  • a RAT is a specific type of Trojan, which is used to install a back door on a system
  • RATs typically give the attacker administrative level control of the compromise machine, allowing them to modify files, record, keystrokes, and even distribute viruses to other machines
45
Q

Malware continued

A

keyloggers

  • Hardware or software that covertly records, the key strokes of a user
  • can be used to capture credit card numbers, login, information, etc.

spyware

  • software that collects information about the user, system or organization by monitoring, user activity without their knowledge or consent
  • includes keyloggers and may take screenshots and use built-in recording devices like a microphone or WebCam
46
Q

Malware continued

A

logic bomb

  • A code that is secretly incorporated into legitimate software, and is set to execute when a specific condition is met in the program
  • Generally used to commit a malicious action:
    • code that deletes company data when the IT employee is fired, “dead man switch”
    • code that erases part of a website on a specific date
47
Q

Physical attacks

A

Malicious USB cables

  • Cables that have been altered to allow for malware to infect computers using the cables
  • Cables that exfiltrate data out through their own cellular connection

Malicious flash drive

  • malware-filled USB that infects a computer once inserted. Usually dropped in a parking lot and praise on victims sense of curiosity to plug it in on their work computer.
48
Q

Physical attacks continued

A

card cloning

  • special hardware to copy the contents of an electrical card. Often used to copy building access credentials off employees access cards.

skimming

  • special hardware that copies the information from a magnetic strip. Usually appended to ATMs or gas pumps to still pin and card information.
49
Q

Network attacks

A

on-path attack

  • formerly man-in-the-middle
  • when an attacker is between two targets, communications, intercepting, and or forwarding messages
  • Attack can passively watch (spy) on the communication or actively altered it. This attack is associated with defeating encryption.
50
Q

Network attacks continued

A

ARP

  • when an attacker changes address resolution protocol (ARP) records in a way that resolves the attackers and MAC address to a legitimate IP address

DNS poisoning

  • an attack against a domain name system (DNS) that resolves a request away from legitimate servers and towards malicious servers
  • domain reputation is the positive or negative association of a domain. Domains that host malware would have a negative domain reputation

-

51
Q

Application attacks

A

• also known as resource exhaustion attacks

denial-of-service (DoS)

  • where in attacker attempts to make a network resource unavailable to others by disrupting the host’s connection to the network

distribution denial-of-service (DDoS)

-a DoS attack in which multiple computers work together to cause a denial of service to a network source

  • Attacking computers are often compromised by malicious software that makes the attack possible

52
Q

Application attacks continued

A

Amplification attack

  • when an attacker spoofs lookup requests to DNS servers and redirect the response towards a target
  • The response is larger than the request, allowing the attacker to amplify their efforts
53
Q

Application attacks continued

A

buffer overflow

  • when a program overruns a buffers boundary as a result of too-large input and over right adjacent memory locations
  • Memory locations are often well defined, allowing an attacker to write the overflow code into an executable area of memory

Privilege escalation

  • When an attacker elevates his privileges to gain access to resources that he would would not otherwise have
  • The ability to elevate the privileges can be caused by a bug or simple oversight 
54
Q

Password attacks

A

brute force

  • Trying each combination and permutation in an attempt to guess a password

Dictionary attack

  • Trying a list of mini possible passwords to guess the password for one account
  • Dictionary list are publicly available online, some are enormous in size (reaching over 1 Tb)
  • each compromised system can yield more possible passwords that get thrown onto the heap of known passwords making up dictionary lists

password spraying

  • Trying one “known-good” password across many accounts
  • less likely to trigger account lockouts or failed password timeouts
55
Q

Cryptographic attacks

A

birthday attack

  • A birthday attack is a subset of a collision attack. A collision attack is simply when a process is found that can produce the same value. These are associated with cryptographic hashing.

Collusion attack

  • And attack that exploits, weak cryptographic hash functions. It works by finding separate input values that produce the same has values.
56
Q

Cryptographic attacks continued

A

Rainbow tables

  • A table of previously-computed values for reversing hashing functions
  • Used to crack hash passwords
57
Q

Cryptographic attacks continued

A

known plaintext attack

  • when an attacker has access to both the plane text and ciphertext of an encryption method
  • The attacker can use this to look for weaknesses in the encryption method and easily decipher future encrypted messages
  • In a known ciphertext attack, the attacker knows the deciphertext but has no access to the plaintext. This can make finding weaknesses more difficult.
58
Q

Indicators of compromise

A
  • Account lockout
  • Concurrent sessions
  • Blocked content
  • impossible travel
  • Resource consumption
  • Inaccessibility
  • out-of-cycle logging
  • Missing logs
  • Published/documented
59
Q

Enterprise security

Objective 2.5

A
60
Q

Segmentation

A
  • dividing a network into smaller divisions for management, monitoring, a limiting scope of any possible attack
  • Segments can be defined in the following way:
    • logical segmentation
      • subnetting
      • virtual local area networks (VLAN)
    • Physical segmentation
      • Physically distinct
      • “Airgapoed”
61
Q

Segmentation continued

A
  • logical separation
    • VLANs dividing network into smaller blocks of IP addresses defined by subnet
  • VLAN
    • VLANs divide network in a non-physical way using same shared, cabling, but packets are handled separately (by layer 3 switches)
    • VLANs can help segment network traffic on physical routers
62
Q

Segmentation continued

A
  • Air gaps
    • not physically connected to another system in anyway, a specific form of isolation
    • The air gap prevents malware that utilizes a network from being able to find the system
    • As with any system, a human can still introduce him malware
63
Q

Access control

A
  • managing authorized access to resources
    • “ who can access what?”
  • access access control list
    • Determines what activity is allowed and what activity is blocked or denied?
    • Can be in the form of user permissions, firewall rules, or routing tables
  • file system permissions
    • Linux has three primary perm: read , write and execute
    • These permissions apply to the files users, group and others
64
Q

Least privilege

A
  • Least privilege
    • A security principle that says each entity (individual, system, script) should be granted only the minimum system resources and authorizations needed to perform its function
    • following this principle helps mitigate the damage which can be caused by disgruntled employees and or an attacker who has compromised and employee account
65
Q

Allow lists and block lists

A
  • application allow list/block list
    • List of applications and application components (libraries, configuration files, etc) that are authorized (allowed) to be present or active on a host according to a well defined baseline
    • when used correctly, any applications which are not on the allow list will not be allowed to run
    • an application block list is the opposite of an allow list: any applications on the block list will be prohibited (blocked) from running
66
Q

Isolation

A
  • isolation
    • once malicious activity has been discovered, it will be important to isolate the source of that malicious activity from the wrist of the network for forensics
  • Containment
    • ensuring malicious activity does not spread to other parts of the network or system 
67
Q

Patching

A
  • the systematic notification, identification, deployment, installation and verification of software updates. These updates revisions are known as patches, hot fixes, and service packs.
  • Software needs to be kept up to date to address any newly discovered vulnerabilities
68
Q

Encryption

A
  • Full disk encryption (FDE)
    • encrypts the entire contents of the hard drive on a device. Examples include BitLocker for windows and filevault for macOS.
    • Self-encrypting drives (SED) are a hardware implementation of FDE. These drives encrypt the data as it enters and leaves the drive so that it is not a burden on the host operating system
  • virtual private networks (VPN)
    • provides trusted endpoint, communications encryption over and trusted network
  • Email encryption
    • email is inherently insecure, but can be encrypted with protocols such as PGP (Pretty Good Privacy), GPG (GNU Privacy Guard) or S/MIME (Secure/multipurpose Internet Mail)
69
Q

Configuration enforcement

A
  • secure base
    • A defined way that the software should behave and is initial state, including the requirements needed to run the software securely
    • Later used to confirm that changes conform to the baseline, and to detect any unauthorized changes
70
Q

Configuration enforcement continued

A
  • secure configuration guides
    • platform and vendor specific guides
    • specify through policy
    • Having secure configurations will depend heavily on the specific technology being used. It is important to remember that, although the technology may work, it does not mean that it is secure!
  • configuration validation
    • scripts can be run against configuration baselines to check for compliance with security policies
    • Can be bolstered by the idea of templating virtualization. this allows an admin to have a preapproved framework for building virtual environments that matches specific need and meet configuration requirements. 
71
Q

Monitoring

A
  • Ensuring secure, configurations and security controls remain in place
  • Triggers and automated response based on certain events, continuous monitoring is also needed
  • monitoring can be scripted by having scripts interact with API’s, checking logs, etc
  • this concept can be expanded out into looking at security issues as well - e.g., collecting and monitoring security logs with a security information and event management system (SIEM)
72
Q

Decommissioning

A
  • when removing a device from an organizations network, care must be taken that any sensitive data is purged from the device
  • this is accomplish varies by device:
    • Spinning disc (magnetic) hard drives, for example, should be degaussed or shredded to ensure no residual data remains
    • solid-state drives cannot be degaussed and should be securely erased or shredded
    • network appliances (routers, switches) should have any configuration data reset and purged
    • devices such as scanners and printers should be evaluated according to the manufacturers documentation about how best to remove any possible data stored on the device
73
Q

Hardening

A
  • endpoint protection
    • Host-based firewall
    • Host-based intrusion detection system (HIDS)
    • Host-based intrusion prevention system (HIPS)
    • disable, unnecessary ports, protocols
    • Change default passwords
    • remove unnecessary software
74
Q

HIDS/HIPS

A
  • Host-based intrusion detection system (HIDS)
    • A host-based intrusion detection system (HIDS) monitors the characteristics of a single host and the events occurring within that host to identify and analyze suspicious activity. It does not actively stop threats as they happen
  • host-based intrusion prevention system (HIPS)
    • A host-based intrusion prevention system (HIPS) is similar to a HIDS, but is able to actively prevent threats as they occur
75
Q

Host-based firewall

A
  • Host-based firewall
    • A software firewall installed on a single host to monitor and control its incoming and outgoing network traffic