Unit 2
Unit 2
It is not advisable to conduct such tests after hours due to the potential
danger and ineffectiveness.
Manned Checkpoints:
Yes, there are manned checkpoints such as guard desks or reception areas
in the lobby of a building. These checkpoints are often encountered
during penetration testing and can be subverted with creative thinking and
planning. There are also high-security areas, visitors and employees may
be required to enter through turnstiles or mantraps.
--Multitenant Building Lobby Security: There are security procedures
typically encountered in the lobby of a multitenant office building. These
procedures usually involve contract security staff positioned in the lobby
who will ask visitors to sign in at the desk, present a photo ID, and
explain who they are there to see. The guard will then call the person or
company to confirm the appointment and direct the visitor to the
appropriate elevator. In most cases, visitors are issued an adhesive-backed
paper visitor badge, which may have their name and a printed photo on it.
The paper also provides tips on how to subvert these security procedures,
such as making a convincing facsimile of a visitor badge or gaining
access to the building by arranging an appointment with another tenant.
Locked Doors:
Physical penetration testing which involves testing the security of a
building or system by attempting to gain unauthorized access.
OR
It also provides guidance on how to master fitting in with the crowd and
timing the entry so that we do not arouse suspicion.
It also suggests using our foot or grabbing the handle to prevent the door
from completely closing and latching while we swipe our fake ID card.
Key Slot: Key fits into a slot in the cylinder, aligning pins for rotation.
Mitigating Measures:
Key card turnstiles
Manned photo ID checkpoints
Enclosed or fenced smoking areas
Locked loading area doors with doorbells
Mandatory key swipe for entry/re-entry
Daily rotation of visitor badge markings
Manned security camera systems
5. Insider Attacks:
Insider Attacks:
Insider attacks focus on exploiting individuals with existing access to an
organization's information systems.
1. What are the primary methods discussed in the previous chapters for
obtaining access to information assets during a penetration test?
3. How does testing from the insider perspective help assess security
controls?
5. Who are the likely actors in insider-related crimes, and what kinds of
privileges do they usually possess?
6. What are the main reasons for conducting a simulated attack from the
insider perspective?
8. What are the key topics covered in this chapter regarding insider attacks?
Access Control: Limit access to sensitive data and systems based on the
principle of least privilege.
User Monitoring: Implement continuous monitoring of user activities to
identify abnormal or suspicious behaviour.
Security Policies: Develop and enforce clear security policies, including
data handling and acceptable use policies.
Training and Awareness: Regularly educate employees about security
risks, best practices, and the potential consequences of insider attacks.
Whistleblower Programs: Establish mechanisms for employees to
report concerns without fear of retaliation.
Two-Factor Authentication: Require multi-factor authentication for
accessing sensitive systems and data.
Data Loss Prevention (DLP): Employ DLP solutions to identify and
prevent unauthorized data transfers or sharing.
Behavioural Analytics: Utilize machine learning and AI to analyse user
behaviour patterns and detect anomalies.
13. Can technology help prevent insider attacks? Yes, technology plays a
crucial role in prevention. Intrusion Detection Systems (IDS), User and
Entity Behaviour Analytics (UEBA) platforms, Security Information and
Event Management (SIEM) systems, and Endpoint Detection and
Response (EDR) solutions are examples of technologies that can help
detect and respond to insider threats.
1. Perpetrator Location:
Insider Attacks: Perpetrators are current or former employees,
contractors, or other individuals with legitimate access to the
organization's systems and data.
External Attacks: Perpetrators are individuals or entities who
have no legitimate affiliation with the organization and attempt to
breach its security from outside.
2. Access Level:
Insider Attacks: Insiders typically have privileged access to the
organization's systems, making it easier for them to execute
attacks.
External Attacks: External attackers often lack direct access and
must find vulnerabilities or use social engineering techniques to
gain access.
3. Motivations:
Insider Attacks: Insiders may have various motivations, including
financial gain, revenge, ideology, curiosity, or a desire to leak
sensitive information.
External Attacks: External attackers are often motivated by
financial gain, information theft, political objectives, or other
malicious intent.
Potential Motivations for Insider Attacks:
19.
20. What are some real-world examples of insider attacks?
1. Edward Snowden: A former NSA contractor leaked classified
documents, revealing extensive surveillance programs.
2. Jerome Kerviel: A trader at Société Générale caused massive
financial losses through unauthorized trading.
3. Harold Martin: A contractor at the NSA stole classified documents
and software, exposing sensitive information.
4. Tesla Insider Attack: A disgruntled Tesla employee sabotaged
manufacturing operations and shared sensitive data.
Defending Against Insider Attacks:
Insider Attacks: Companies must shift from the notion that attacks only
come from external sources. Insider attacks, originating from within the
organization, are often more damaging. Internal LAN access controls and
policies tend to lag behind external border controls.
Q2: Why do access controls and policies on the internal LAN often lag
behind external border controls?
A2: Access controls and policies on the internal LAN lag behind because
companies tend to focus more on external threats and may underestimate
the risks posed by insiders.
Q4: What is the benefit of eliminating LM hashes from domain and local
SAM files?
A4: Eliminating LM hashes prolongs the time required to carry out an
attack, making it more likely to be detected and giving security teams a
better chance to respond.
Q7: What's the purpose of password protecting CMOS setup and boot
menu?
A7: Password protection prevents unauthorized individuals from altering
CMOS settings, including boot order, which attackers might exploit to
launch malicious software during system startup.
1. What is Metasploit, and what role did it play in the computer security
scene?
Metasploit is a downloadable framework that facilitates the acquisition,
development, and launch of exploits for software vulnerabilities. It was
released in 2003 by H.D. Moore and had a transformative impact on
computer security. It provided easy access to professional-grade exploits for
various vulnerabilities, allowing almost anyone to engage in hacking
activities.
Meterpreter:
Meterpreter is a powerful, extensible payload provided by Metasploit. It is
often used after a successful exploitation of a target system. Meterpreter
allows an attacker to have remote control over the compromised system and
provides features such as:
Shell Access: Meterpreter provides a command shell interface, allowing
an attacker to execute commands on the target system.
File System Manipulation: Attackers can upload, download, or delete
files on the target system.
Privilege Escalation: Meterpreter can help an attacker escalate their
privileges on the compromised system, potentially gaining administrator
or root access.
Port Forwarding: It can forward ports on the target system to establish
connections to other systems or services within the target network.
Password Hash Dumping: Meterpreter can extract password hashes
from the target system's memory for later cracking or lateral movement.
It's important to note that the Metasploit Framework is a legitimate tool used
for ethical and authorized penetration testing and security assessments. Its
use in any other context is illegal and unethical. Penetration testers should
always obtain proper authorization before using Metasploit or any other
penetration testing tools. Additionally, organizations should regularly
conduct security assessments to identify and address vulnerabilities
proactively, helping to improve their overall cybersecurity posture.
6. A
7. A
8. A
9. A