Elliot's Study Guides - Sec+ Notes (Ch.01-Ch.10)
Elliot's Study Guides - Sec+ Notes (Ch.01-Ch.10)
10)
________________________________
– CIA Triad:
– Confidentiality
– Integrity
– Availability
– (Nonrepudiation)
– DAD Triad:
– Disclosure
– Alteration
– Denial
– Breach Impacts:
– Financial Risk
– Reputational Risk: goodwill of public
– Identity Theft
– Strategic Risk: meeting major goals
– Operational Risk: day-to-day functions
– Compliance Risk: legal or regulatory requirements
DATA PROTECTION:
● Encryption: use math algos to protect data from prying eyes
● DLP (Data Loss Prevention):
● Agent-based DLP: Detecting and monitoring software searching for
sensitive info
● Agentless (network-based) DLP: a dedicated devices on network that
blocks traffic and auto-applies encryption
● Segmentation: placing sensitive systems on separate networks
● Isolate: cuts system off from access
________________________________
THREAT VECTORS:
– Message-based Threat Vectors: SMS, email, voice phishing, social media
– Wired Networks: physical security
– Wireless Networks: bluetooth, unsecured wireless networks
– Systems: OS, legacy apps
– Files & Images: individual files
– Removable devices: USB drives
– Cloud: improper access controls, security flaws, compromised API
– Supply Chain: MSPs (Managed Service Providers)
name
● IoCs (Indicators of Compromise): file signatures, log patterns, file and
code repositories
● Proprietary and Closed-Source Intelligence
● Threat maps: geographic view of threat intelligence (geo info is
notoriously unreliable)
● Confidence score: score orgs give intelligence on how much they can
trust it (ex: high, medium, low)
●
● OASIS (Organization for the Advancement of Structured Information
Standards): nonprofit that maintains XML & HTML
● TAXII (Trusted Automated eXchange of Intelligence Information protocol):
companion to STIX, communication via HTTPS
________________________________
Robin
○ IoCs: known malicious files, remote systems, C&C with remote
web browsers
○ Counters: anti-malware, IPS, awareness
● Spyware: associated with identity fraud, stalkerware
○ IoCs: remote access indicators, known software signatures, malicious
– Analyzing malware:
– VirusTotal
– Sandbox
– Code analysis
________________________________
purpose
○ Disinformation: incorrect information on purpose to serve a goal
○ Maliformation
● Impersonation
● Brand Impersonation
● BEC (Business Email Compromise): compromised accounts, spoofed
email, typo squatting domains, malware
● Pretexting: made-up scenario to justify
● Watering Hole Attack
● Typo squatting
○ Pharming: redirects victim to lookalike site by attacking system’s
hosts file
– Key Principles:
– Authority
– Intimidation
– Consensus-based
– Scarcity
– Familiarity
– Trust
– Urgency
– CISA recommends “TRUST” model to counter:
– Tell your story
– Ready your team
– Understand and assess MDM
– Strategize response
– Track outcomes
PASSWORD ATTACKS:
● Brute-force attacks:
○ Password spraying attack: one password, many accounts
○ Dictionary attacks: using list of words for attacks (ex: John The
Ripper)
● Rainbow attacks: creating a hash collision
● OWASP (Open Worldwide Application Security Project): maintains cheat
sheet of secure password storage
________________________________
configuration issues
○ CPE (Common Platform Enumeration): product names and versions
○ CVE (Common Vulnerability & Exposures): security flaws
○ CVSS (Common Vulnerabilities Scoring System): measuring and
describing severity
○ XCCDF (Extensible Configuration Checklist Description Format):
reporting checklist results
○ OVAL (Open Vulnerability and Assessment Language): low-level
testing procedures
PENETRATION TESTING:
● Pen testing: most effective way to gain a complete picture of security
vulnerabilities
○ Attackers only need to win once. Cybersecurity need to win every
time
○ Benefits of Pen Testing: first-hand knowledge, constructive feedback,
Association)
________________________________
●
○ Requires: continuous validation & continuous monitoring
INJECTION VULNERABILITIES:
– Injection Vulnerabilities: primary attack for web applications
– SQL Injection attacks
– Blind SQL attacks:
– Blind content-based SQL Injection: no data shown but website
displays true or false
– Blind timing-based SQL injection: show password using boolean
commands (ex: If the first letter of the first database’s name is an ‘A’,
wait for 10 seconds)
– Code Injection Attacks: seeking to insert malicious code
– LDAP (lightweight directory access protocol) injection attack
– XML injection attack
– DLL injection attack
– XSS (uses HTML)
– Command Injection Attacks:
– Exploiting Authentication Vulnerabilities:
– Exploiting password authentication: social engineering, spying,
credential harvesting, default password
– Session Attacks:
– Session hijacking
– Cookies stealing: digital version of a badge. Methods:
Eavesdropping, malware, on-path attack
– Session replay attack: literally replaying your session as you
– Use secure cookies
– NTLM pass-the-hash attacks: steals the hash tries to unlock stuff
with it
– Unvalidated Redirects: insecure URL redirects
– Counter: only allow validated redirects
– Exploiting Authorization Vulnerabilities
– IDOR (Insecure direct object reference): when a web app provides
direct access to something by modifying the URL
– Example: changing it from 123 to 124 to 125
– Directory Traversal: navigating directory paths to somewhere else on
the server (ex: using the “..” In the header
– Locale file inclusion: tricks web application to running code contained
within a malicious file
. Locale file inclusion: executing code stored locally on the web
.
server
. Remote file inclusion: tricks web app to run file on a remote server
(even worse)
– Privilege Escalation
– Exploiting Web Application Vulnerabilities:
– XSS (cross-site scripting): attacker uses HTML injection into a web
app
– Non-persistent XSS (Reflected): injecting HTML code into the error
message and the website unknowingly spits it right back
– Stored/Persistent XSS: waiting in the site’s database for your to
interact with it (ex: in a blog’s comments)
– DOM Based XSS: written deep in JS code, look for eval() method
– Blind XSS: sending a hidden payload that collects victims info like
cookies, credentials, etc. XSS Hunter Express is a good tool
– Counters to XSS: input validation, don’t allow for things like <SCRIPT>
– Request Forgeries: exploit trust relationships
. CSRF/XSRF (Cross-Site Request Forgery): AKA Sea Surf or Session
Riding. Uses one session to hack another site’s session (ex: like an
open banking tab)
. SSRF (Server-side Request Forgery): tricking a server to visit a URL
based on user-supplied input. Possible when web app accepts URLs
as input
________________________________
image files
– Cryptography goals:
– CIA triad except A stands for AUTHENTICATION and not
AVAILABILITY
– Nonrepudiation
– Historical Cryptography:
– First cryptographic effort was 4000 years ago
– Cipher: method to obfuscate characters
– Ciphering: act of obfuscation
– Non-mathematical cryptography substitution and transportation
GOALS OF CRYPTOGRAPHY:
● Confidentiality
● Integrity: ensures data is not altered without authorization
○ Via digital signatures
● Authentication: verifies the claimed identity
○ Via challenge-response authentication technique
● Non-repudiation: prevents sender from saying that they never sent the
message
CRYPTOGRAPHIC CONCEPTS:
● P: Plaintext
● C: cipher text
● Cryptographic Keys: every crypto algorithm relies on keys to maintain
their security
○ Key Space: range of values that are valid for the key to use for an
all agree)
◆ In private/secret cryptosystems, all participants use single shared
key
◆ In public key cryptosystems, all participants use their own pair of
keys
○ Cyptovariables: another term for cryptographic keys
○ Cryptography: creating and implementing secret codes and ciphers
○ Cryptanalysis: the study of methods to defeat codes and ciphers
○ Cryptology: cryptanalysis + cryptography
○ Cryptosystems: specific implementation of code or cipher in hardware
○ Ciphers: algorithms to perform encryption and decryption
○ Cipher suites: sets of ciphers and key lengths to support a system
◆ Block ciphers: apply encryption algorithm
◆ Stream ciders: one character or a bit at a time (ex: Caesar cipher)
MODERN CRYPTOGRAPHY:
● Symmetric key encryption algorithms, asymmetric key encryption
algorithms, and hashing algorithms
● Modern cryptosystems: secret of one or more cryptographic keys to
personalize the algorithm
● Columnar transposition (also known as permutation cipher): scrambles
the position of the characters without changing the characters
themselves
● DES (Data Encryption Standard): 56-bit key created decades ago
(insecure)
○ Modern cyrptographic systems need at least 128-bit keys
● AES (Advanced Encryption Standard): for symmetric keys, current version
is 256 bit
● Symmetric Key Algorithms: also known as secret key cryptography and
private key cryptography
○ Drabacks: key exchange is dangerouso, no non-repudiation, not
HASH FUNCTIONS:
● Hash function: takes a message and outputs a unique output value
○ Message digest: the output value of a hash function. Original
180
○ SHA-1 considered insure, modern hash uses SHA-2 and SHA-3 (made
in 2015)
○ MD5: made in 1991. Insecure, lots of collisions
● Digital Signatures: Enforce non-repudiation & integrity
● HMAC (Hash-Based Message Authentication Code): partial digital
signature —> guarantees integrity but not non-repudiation, has as shared
secret key
signing
○ Root CAs protected by offline CA
◆ Uses intermediate CAs that serve the online CAs (Like proxy
servers)
○ Certificate chaining: verifies intermediate CA —> root CA (CA trust
model)
MITM
. Revocation:
◆ Reasons: certificate was compromised, mistakenly issued,
verification
◆ Certificate Stapling: extension of OCSP, website contacts OSCP
first and gets it approval —> then staples it to the certificate for
speed
– Certificate Formats: binary and text-based
– DER (Distinguished Encoding Rules) format: binary file stored
in .der .crt or .cer extension
– PEM (Privacy Enhanced Mail): text-version of the DER format, stored
in either .pem or .crt extension
– Check file contents for differences in .crt files
– Windows:
– PFX (Personal Information Exchange): format for windows systems
using .pfx or .p12 file
– P7B certificates in text format
CRYPTOGRAPHIC ATTACKS:
● Brute Force
● Frequency Analysis: looking for patterns in encrypted messages
● Known Plain Text: example would be “Heil Hilter”
● Chosen Plain Text: selecting text to use a cipher
● Related Key Attack: obtaining plaintext and cipher text and trying to
derive a key
● Birthday Attack: collision attack using the same hash (Same birthday
theory)
● Downgrade Attack: trick the user in shifting to less secure cryptographic
mode
● Rainbow table: attempts to reverse a hash value by taking common
passwords, making hashes out of them, and seeing if they match
○ Salting: adds random generated value to each password PRIOR to
hashing
○ Key Stretching: thousands of iterations of salting and hashing (ex:
PBKDF2)
● Weak Keys/Protocols: WEP (Wireless Equivalent Privacy) uses RC4
encryption algorithm
● Human errors:
○ Unencrypted AKA in the clear
the relay chain from reading messages and only lets them forward
traffic
○ Allows for: anonymously browsing standard internet + hosting
application of blockchain
○ Other applications: property ownership records, track supply chains
● Lightweight Cryptography: specialized hardware that can minimize power
consumption
○ Examples: satellites, Smartcards, VPN hardware device
● Homomorphic Encryption: encrypts data but stills lets you do
computations on it —> protects privacy
● Quantum Computing: quantum mechanics to use superposition to
perform computing and communication skills
________________________________
AAA system for networks, system, etc. Sends passwords via shared
secret and MD5 hashed passwords.
○ UDP or TCP
○ Uses MD5 hash to encrypt passwords (not very secure)
○ Also uses IPSec tunnels
● TACACS+ (Terminal Access Controller Access Control System Plus):
AUTHENTICATION METHODS:
● Passwordless Authentication: security tokens, one-time passwords,
certificates
○ Security Key: hardware devices
○ FIDO
○ U2F (Universal 2nd Factor)
○ FIDO2: key pair, private and public. Supports W3C Web
known token
◆ Example: SMS code. But susceptible to SIM cloning or VoIP
network
◆ Example: push notifications.
○ Static codes: algorithmically generated, stored in a secure location,
but can be compromised
○ Biometrics: something you are (physiology) like fingerprints, retina
scans, facial recognition, voice recognition, vein recognition, gait
analysis (how a person walks)
◆ FRR (False Rejection Rate): FIDO sets their standards for 3% of
attempts
◆ FAR (False Acceptance Rate): FIDO sets their standards at 0.01%
for FAR
◆ ROC (Receiver Operating Characteristic)
◆ IAMPR (Imposter Attack Presentation Match Rate)
ACCOUNTS:
– Account Types:
– User Account
– Privileged or administrative accounts (AKA root counts)
– Linux, Unix, Windows default Administrator
– Shared and generic accounts or credentials
– Guest accounts
– Service accounts: associated with applications and services
– Provisioning and Deprovisioning Accounts:
– Identity Proofing: process of ensuring that the person who the
account is being created for is claiming the account
– Examples: Government IDs, personal information
– Permission Creep: when an employee gains a new positions and
keeps all of the new and existing permissions with themself
– Least Privilege is the key
– Deprovisioning: terminating account, removing permissions, data, etc
– PAM (Privileged Access Management): tools for ensuring least
privilege
– JIT (Just-in-time) permissions: granted and revoked only when
needed
– Password vaulting: access privileged accounts without knowing
the password
– Ephermeral accounts: temp accounts with a limited lifespan
– Access Control Schemes: what users, services, and programs can access
various files
– MAC (Mandatory access control): OS sets security policy, users do
not have the ability to change security settings (rare setting)
– Found in SELinux and MIC (Mandatory Integrity Control)
– DAC (Discretionary Access Control): more common, access control
scheme to control home PCs.
– Examples: Linux file permissions
– RBAC (ROLE-based access controls): roles are matched with
privileges, popular with enterprises (ex: cashier, database admin)
– Role assignment: subjects can only use permission that they have
been assigned
– Role authorization: subject’s active role must be authorized for
subject
– Permission authorization: subjects can only use permissions that
their active role is allowed to use
– RuBAC (RULE-based access control): set of rules that apply to
various objects or resources (ex: firewall ruleset)
– ABAC (Attribute-based access control): relies on policies that are
driven by attributes of the users. Complex to manage
– Time-of-day restrictions: limits who activities can occur
– Least privilege: concept that says users should only be given the
minimum set of permissions and capabilities they need to perform
their job
– Filesystem Permissions: which users can perform actions like reading,
–
writing, and executing
– Windows file permissions set in GUI
– Linux set in command line
– Filesystem permissions often exploited by attackers
________________________________
– Redundancy Factors:
– Geographic dispersion
– Separate servers and PDUs (power distribution units)
– Multiple network paths (multipath)
– Redundant network devices:
– Load balancing: allows multiple systems to appear like a single
resource
– Clustering: group of computers provide the same task
– Power protection:
– UPS (uninterruptible power supply)
– Generator
– Dual-supply
– PDUs (managed power distribution units)
– System storage redundancy
– Platform diversity: different tech & vendors
STORAGE RESILIENCY:
● RAID: Redundant Array of Independent Disks
●
●
●
RAID Description Advantage Disadvantage
description
RAID 0 - Data is spread Best I/O Not fault tolerant
Striping across all drives performance —all data lost if a
(speed); all drive is lost.
capacity used.
RAID 1 - All data is High read Uses twice the
Mirroring duplicated to speeds from storage for the
another drive or multiple drives; same amount of
drives data available if a data.
drive fails.
RAID 5 - Data is striped Data reads are Can tolerate only
Striping with across drives, fast; data writes a single drive
parity with one drive are slightly failure at a time.
used for parity slower. Drive Rebuilding arrays
(checksum) of failures can be after a drive loss
the data. Parity is rebuilt as long as can be slow and
spread across only a single impact
drives as well as drive fails. More performance.
data. Parity efficient than
drives can RAID 1
restore lost data
RAID 10 - Requires at least Combines the Combines the
Mirroring and four drives, with advantages and advantages and
striping drives added in disadvantages of disadvantages of
pairs. Data is both RAID 0 and both RAID 0 and
mirrored, then RAID 1. RAID 1.
striped across Sometimes
drives. written as RAID
1+0.
– Backup Types:
– Full Backup: copies the entire device or storage system
– Incremental backup: captures changes since last incremental backup
– Fatest to backup
– Slowest to recover
– Differential backup: captures changes since last full backup
– Slow to backup
– Fast to recover
– Replication: synchronous (real-time) or asynchronous (after-the-fact)
methods of copying data
– Journaling: creates log of changes that can be replies of an issue
–
occurs —> restoring to a fixed snapshot
– Journal also needs to be stored somewhere
– Snapshot: captures full state of a system at the time the backup is
completed (common for VMs)
– Captured live
– Can consume a lot of storage
– Images: complete copy of a server or a drive down to each bit.
Backup method of choice for complex servers
– Gold Master Image: best and final version of a VDI (Virtual Desktop
Infrastructure), System, or Server
– Recovery Process:
– RPO (Recovery Point Objectives): how much data loss is acceptable
– RTO (Recovery Time Objectives): how long the recovery can take
– Backup Medias: encrypt in storage and transit
– Tape: lowest cost, still in use
– Disks: HDD/SSD, NAS or SANs, more expensive than tape
– Optical Media: Blu-Ray, DVDs —> not common
– Flash Media: SD cards, thumb drives
– Nearline backups: not immediately available but can be retrieved
– Faster than offsite, but slower than onsite
– Examples: Amazon’s S3 Glacier, Google’s Coldline storage
– Off-Site Storage: Iron Mountain
– Quick restoration is not possible
– Takes a long time and higher cost
– Overestimated reliability
– New security models require for backups
– New code backups: industry becoming software-defined
infrastructure model, only code that defines cloud being backed up
same system
○ Horizontal Scaling: using smaller systems but adding more of them.
problem
________________________________
VIRTUALIZATION:
● Virtualization: allowing multiple guests (multitenancy) with the same
hardware
○ Runs on hypervisor —> OS (Windows/Linux)
● Hypervisors: isolates virtual machines. Must present illusion of being
●
hardware
○ Type 2 Hypervisor: runs on top of existing operating system. Common
for devs
● VMs (Virtual Machines): VMs are the building block of cloud, cost of a
server based on an hourly rate of computing resources
○ Microsoft Remote Desktop tool: RDP (Remote Desktop Protocol) +
Windows IaaS
● Containers: application-level virtualization (ex: Docker), interface is the
same regardless of hardware/OS, can shift between systems as needed
○ Security issues: isolation
○ NIST recommendations: container-specific OS, segmenting
CLOUD NETWORKING:
● SDN (Software-Defined Networking): allows engineers to interact and
modify cloud resources via APIs
○ SDV (Software-Defined Visibility): traffic insight on virtual networks
party)
– Examples: AWS’s CloudFormation -> devs customize
infrastructure requirements (i.e. JS, JSON, YAML)
– APIs
– Microservices: CSP offering that provide granular functions