Chapter 1 4 Reviewer
Chapter 1 4 Reviewer
a. Threats
b. Control
c. Assets
d. Exploit
e. Vulnerability
f. Attack
a. Assets
b. Controls
c. Threats
d. Attack
e. Exploit
f. Vulnerability
Risk Management
ERM
- The comprehensive process of evaluating, measuring, and mitigating risk in an organization to achieve pre-
defined business objectives.
- Enterprise systems are often functional on a 24/7 basis.
- Very complex; a challenge to secure enterprise resources.
- Numerous ways in which people can intentionally or unintentionally compromise business operations.
- ERM is vital to achieving objectives in any enterprise.
Reasons to Implement ERM
Risk Exposure
- The property that indicates how susceptible an organization is to loss.
- Can be quantified as a product of the probability that an incident will occur and the expected impact, or loss,
if it does.
- Risk cannot be totally avoided, but ignoring exposure will hurt your business.
Risk Analysis Methods
- Control Objectives for information and Related - Information Technology Infrastructure Library
Technology or COBIT - Originally developed by the UK Government’s Central
- Created by ISACA, initially in 1996. Computer and Telecommunications Agency (CCTA) in
- COBIT 5 released in 2012. the 1980s
- Principles: - Comprehensive set of IT management publications of
o Meeting stakeholders needs. the 2011 edition include:
o Covering the enterprise end-to-end o ITIL Service Strategy
o Applying a single, integrated framework o ITIL Service Design
o Enabling a holistic approach o ITIL Service Transition
o Separating governance from o ITIL Service Operations
management o ITIL Continual Service Improvement
The SABSA Framework
The ISO Model
- Sherwood Applied Business Security Architecture.
- First International standard for information
- Based on the Zachman Framework.
technology management based on BS 15000
- Risk-based approach to implement security that
standard developed by BSI.
upholds business objectives.
- ISO/IEC 20000 published 2005.
- Layers:
- ISO/IEC 27001 published in 2013.
o Contextual, Conceptual, Logical, Physical,
- Provides comprehensive guidance on
Component, Operational
information assurance principles and
- Questions?
processes.
o What? Why? How? Who? Where? When?
Risk Determinations
- Likelihood of threat
o Motivation: What does an attacker stand to gain?
o Source: Who is the threat, and what is their experience?
o ARO: How often does the threat successfully affect the enterprise?
o Trend Analysis: How effective are emerging threats, and what do you know about them?
- Magnitude of Impact
a. Public
b. Private
c. Restricted
d. Confidential
a. Integrity
b. Availability
c. Confidentiality
a. Technical
Hardware or software that prevents and mitigates threats to computers.
Example: A network firewall
b. Physical
Measures that restrict, detect, and monitor access to physical areas or assets.
Example: Door locks
c. Administrative
Monitor organization’s adherence to security policies.
Example: A regular scheduled compliance audit
CVE
- Extreme Scenarios:
o Total DoS of network or systems.
o Theft of encryption keys.
o Theft, tampering, or destruction of trade secrets.
o Theft, tampering, or destruction of financial data.
o Theft, tampering, or destruction of national secrets.
o Total loss of systems through natural disasters.
- Strategies:
o Gather intelligence to identify threats that can instigate extreme scenarios.
o Identify the motivations of these threats.
o Identify the skill level of these threats.
o Identify what vectors these threats can take.
o Determine what assets in your organization are the most critical and susceptible to extreme
scenarios.
o Determine controls that will help prevent or mitigate an extreme scenario.
o Identify what exactly you risk by failing to prevent an extreme event.
Identify exemptions – Legacy systems may be exempt from specific risk processes. Newer systems may change
this, bringing on new risk, so you need to account for these exemptions.
Use deterrence – The process of influencing a threat’s decision to exploit or not exploit a risk.
Identify inherent risk – Risk that an event will pose if no mitigating controls are put in place. Helps you
determine which controls to put in place.
Identify residual risk – Risk that remains after controls are put in place. Helps you determine the effectiveness
of controls.
IT Governance
Strategies:
Evaluation/assessment – Identify the state or products and services to spot problem areas and suggest remediation.
Auditing – Comparing state of products and services to an established baseline to identify violations that require
remediation.
Maturity Model Implementation – Reviewing organization against expected goals and ascertaining level of risk based
on this. Can help guide risk management strategies.
Certification – Considering a product or service to have met all requirements after extensive tests. Assures
stakeholders that a product or service is of sufficient quality, reducing risk.
- Categorize information.
- Classify information in terms of CIA.
- Incorporate stakeholder input for CIA-based
decisions.
- Understand technical controls in terms of CIA.
- Create aggregate CIA scores.
- Plan for worst case scenarios.
- Avoid, transfer, mitigate, or accept risk.
- Identify exemptions and inherent and residual risk.
- Use deterrence techniques where mitigation fails.
- Implement continuous monitoring.
- Communicate risk response to relevant stakeholders.
- Conduct verification and quality control processes.
- Adopt a defense in depth strategy.
- Forensics
- Employment and Termination
- Continuous Monitoring
- Training and Awareness
- Auditing
Types of Policies
Acceptable use policy – define rules and restrictions for behavior. Behavior may reduce, increase, or have no effect
on risk.
Account management policy – define admin responsibilities for identity security. How user identity is created,
altered, and deleted.
Password policy – define the rules for generation and maintenance of credentials. Set restrictions like minimum
length, complexity, reset time, etc.
Data ownership policy – define how data is assigned to certain personnel. Owners are responsible for the data’s
security.
Data classification policy – outline how data sensitivity is categorized. Organizations can triage security based on
data classifications.
Data retention policy – define how and when data is stored/purged. PiI and PHI are often subject to legal/regulatory
compliance.
Patching – fixes new vulnerabilities that are discovered every day. May need steps to test patches before pushing
them out.
Compensation control development – mitigates risk when primary control fails. Can also support primary controls by
improving their efficacy.
Control testing procedures – tests can also evaluate planned or existing controls. Should be performed continuously;
not just once.
Remediation planning – steps to remove or suspend a system from production. Can include steps to remediate the
problem directly.
Exception management – exceptions arise when standard remediation doesn’t work. Plan must instruct security
personnel on best course of action.
Evidence production – support forensic investigation process after an incident. Evidence must uphold integrity and
authenticity.
Footprinting – using public tools to gather intel on target’s technology, personnel, and structure.
Scanning – using specialized tools to discover hosts and services running on a network.
Footprinting Methods
- Using Whois and SEC info to determine IP, names, emails, phone numbers, etc.
- Dumpster diving to find key company info to use in social engineering.
- HTML code of an organization's web page can provide web server info.
- Mining social media sites like Facebook and LinkedIn for organizational info.
- Using search engines to reveal domain info about targeted web apps.
- Using metadata analysis tools to search for hidden info in public files.
Reconnaissance Tools
1. Footprinting
- Whois, nslookup, dig, Netcraft, FOCA, Maltego
2. Scanning
- Nmap, ping, tracet, netstat, Netcat, Snort, Vega
3. Enumeration
- Nmap, Nessus, snmpwalk, snmputil, nbtscan, Cain & Abel
Social Engineering
1. Impersonation – pretending to be someone else. Successful when personal identity is hard to establish.
2. Hoax – tricking user into performing undesired actions based on a lie.
3. Phishing – attacker sends an email claiming to be from a reputable source to get user to reveal sensitive info.
4. Spear phishing – is phishing targeted at specific individuals.
5. SMiShing – uses SMS text messages.
6. Pharming – tricks users into visiting a spoofed website infected with malware.
7. Whaling – spear phishing that target wealthy individuals or groups.
8. Vishing – using telephony to engage in phishing practices.
9. Baiting – planting compromised physical media where someone will find it and use it.
10. URL hijacking – exploiting users’ typos while they enter a URL. Typo URL redirects to malicious site.
11. Spam – is flooding a target’s email with advertisements.
12. Spim – does this over instant messaging.
13. Shoulder surfing – looking over a user’s shoulder while they enter credentials.
14. Dumpster dividing – reclaiming information from items disposed of in trash containers.
15. Tailgating – attacker slips in through a secure area following an unaware employee.
16. Piggybacking – similar to tailgating but employee is aware someone is following behind. Employee may or may
not know attacker.
- Email, Electronic postcards, Instant messaging, Text messaging, Social networking sites, QR codes.
Chapter 3
Analyzing Attacks on Computing and Network Environments
System Hacking
Start with a goal Plan the attack Perform reconnaissance Identify potential
vulnerabilities Exploit vulnerabilities Cover tracks
Password Sniffing
Brute-force – tries all possible permutations of random characters. Resource- and time-intensive. Best used for short
passwords.
Dictionary – uses words from a precompiled list. Usually faster than brute-force. People often use real words or
variations.
Hybrid – uses both brute-force and dictionary methods. Modifies wordlist to add random or substitute characters.
Faster than brute-force, slower than dictionary.
Rainbow table – a file that includes pre-computed passwords and their hashes. Drastically reduces time needed to
crack passwords. Infeasible against strong hashing algorithms and algorithms using cryptographic salts.
Privilege Escalation
Vertical – user can perform functions not normally assigned to their role
or explicitly permitted. Example: Normal users gains access to admin
rights.
Horizontal – user can access or modify specific resources they are not
entitled to. Example: Normal user gains access to other users’ private
data.
- Wireshark, Cain & Abel, tcpdump, Kismet, Ettercap, Microsoft Message Analyzer, Nagios Network Analyzer
Password Crackers
- John the Ripper, Cain & Abel, THC Hydra, pwdump, Ophcrack, Medusa, Ncrack
Exploitation Frameworks
Client-Side – targets users who access resources from a web server. Often depends on social engineering to trick
user. Example. User tricked into selecting a button, which executes malicious JavaScript on their browser.
Server-Side – targets computers that host data. Attacks can manifest on the client but are localized on the server.
Example: Attacker injects malicious code into a web app; any client who loads the web app could be compromised.
XSS
Stored attack – attacker injects malicious code into website forums or other data. Users views the with the malicious
code is attacked.
Reflected attack – attacker crafts a malicious request to send to a legitimate server. Attacker sends link to victim,
victim click it, and script is reflected off the server.
DOM-based attack – malicious scripts not sent to server at all. Attack takes advantage of JavaScript to execute solely
on client side.
XSRF
SQL Injection
Session fixation - attacker forces a known session onto targeted users. Attacker can provide alternate inputs in GET
requests. Attacker can execute XSS to set session cookie directly. Attacker identifies weakness in session token
generation.
Session prediction - attacker identifies weakness in session token generation. Attacker predicts future values and
takes over new session. Attacker tricks client into clicking a link that goes somewhere else.
Clickjacking - attacker tricks client into clicking a link that goes somewhere else. Can redirect user to malicious site.
Made possible by iframes that hide content.
Cookie hijacking – attacker injects malicious code to take control of cookie. Attacker hijacks session and can initiate a
DoS.
Cookie poisoning – attacker modifies cookie contents after generation. Modified cookie can exploit web app
vulnerabilities.
Probing - attacker tests which requests a service is vulnerable to. Attacker uses this info to craft requests that reveal
vulnerabilities.
Coercive parsing - attacker modifies SOAP XML-based requests. Attacker can craft payload to trigger DoS conditions.
External references - attacker can exploit SOAP that allows third party XML. Attacker can corrupt XML schema to
initiate DoS or modify data.
Malware – XML messages can include malicious software. Executes compressed files, documents can include
malicious macros.
SQL Injection - SQL statements should not be transmitted over SOAP. Attacker could compromise the CIA of database
records.
- Sqlmap, Metasploit Framework, Burp Suite, OWASP WebScarab, OWASP ZAP, w3af, BeEF, Nikto, Paros Proxy
Malware Categories
1. Virus – replicate with user action. Attaches to files.
2. Worm – self-replicating. Does not attach to files.
3. Adware – displays unwanted advertisements.
4. Spyware – secretly collects data.
5. Trojan horse – hidden control program. Does not replicate or attach to files.
6. Rootkit – controls system at lowest levels. Runs invisibly.
7. Logic bomb – triggered by a specific event.
8. Ransomware – restricts access to system of data. Demands ransom to unlock access.
9. Malvertisement – malicious code delivered through ads. Carried in dynamic web content.
Spyware
DoS Attacks
ICMP flood - sending large amount of pings to target. Also called ping floods and Smurf attacks.
UDP flood – sending large amount of UDP pings to target. DoS condition usually happens on spoofed source IP.
SYN flood – attacker sends SYN message with spoofed IP source. Target responds to invalid IP with SYN-ACK. Memory
for reply remains open, and the server is flooded with requests.
Buffer overflow - Too much data sent to fixed-length memory buffer. Adjacent areas of memory are overwritten.
Service may not respond or may not function properly.
Reflected DoS attack - Attacker forges source IP and sends request to large number of systems. All systems respond
to forged IP, causing the target to crash. NTP reflection and DNS amplification are examples.
Resource exhaustion – application does not properly restrict access to resources. Attacker consumes bandwidth or
CPU time, stopping the app.
Permanent DoS attack – Attackers target hardware to cause outage not easily recovered from. Victim must repair or
replace hardware. Also called phlashing.
DoS Tools
- HOIC, LOIC, XOIC, OWASP HTTP Post Tool, DDOSIM, RUDY, Slowloris, PyLoris, Tor's Hammer, HULK
Wireless Threats
- Cracking wireless password through online password attacks.
o Attackers can use brute force or use a wordlist against weak wireless security.
- Even WPA2 is vulnerable if combined with WPS.
o WPS enrolls devices with an 8-digit PIN that is easy to crack.
- Wireless infrastructure is also a big target for attackers.
o Attackers can DoS poorly configured networks.
o They can also break into ones that "leak" wireless signals beyond the premises.
- Attackers also target clients.
o Wireless clients are easier to compromise physically.
o Physical compromise is a vector to wider-reaching network compromise.
BYOD Threats
De-perimeterization - Shifting or reducing the organization's boundaries. Work done in the office may leave the
office. Poorly secure devices may fall into the wrong hands.
Unpatched and insecure devices – Devices may be running outdated software or have no anti-malware. Malware can
spread throughout the network once device connects.
Strained infrastructure – many devices can grind the network to a halt, causing DoS.
Forensic complications – including personal devices in an investigation may be difficult or impossible.
Lost or stolen devices – unencrypted data on lost or stolen devices is open to compromise.
Android – Larger number of devices to target. Many users run older OS versions with unpatched vulnerabilities. Third
party apps can include malware.
IOS – Malware targets jailbroken devices that remove restrictions. Masque attack installed through third party source
spoofed legitimate apps.
Windows 10 Mobile – much less market share than Android and iOS, so less targeted. Windows Store not as tightly
controlled, so malware is more likely to be hosted within this official channel.
Virtual Threat
VM escape – attacker executes code to escape VM and interact with hypervisor. Attacker could gain access to
underlying host OS and other VMs.
Privilege elevation – attack could access host machine and execute administrator actions.
Live VM migration exploitation – VMs need to be physically moved without service interruption. Attackers can hijack
the migration process without security control.
Data remnants – Remnants are leftover data on storage media. Data deleted on VM may not be truly gone. Primarily
a concern during de-provisioning process.
- Big data is large, complex data too big for traditional management tools.
- Existing architecture may need to be restructured to keep up with big data.
- Big data presents certain challenges to security.
- Breach of privacy
o A large store of personal data may net an attacker more info in one attack.
- Privilege escalation
o Users may be able to view data they are not authorized to, threatening confidentiality.
- Repudiation
o Size of big data makes monitoring difficult, so an attacker could deny having changed data.
- Forensic complications
o Big data often lacks consistent structure, making securing and collecting data sets difficult.
Chapter 4
Threats to Big Data
IRC
- IRC is a group communication protocol.
- Also allows for private messages and file sharing.
- Historically the most common C&C channel.
- Easy to set up, and infrastructure allows full interactive control through commands.
- Example: C&C server could force IRC clients to download malicious software.
- Use is on the decline; many admins block IRC traffic altogether.
HTTP/S
- Can't be feasibly blocked like IRC; hard to separate legit from malicious traffic.
- Not as flexible as IRC without building up server backend.
- Still can be used to distribute C&C messages.
- Example: uploading text files to web servers that trigger malware downloads.
- Attackers adapt to domain blocking by changing domains frequently.
DNS
ICMP
- Bots can ping C&C controller to ask for orders; controller can respond.
- Transmission done in single ICMP packet.
- Packets are small, so most common use is to check a bot's status.
- File transfer and shell commands are difficult, but possible.
- Attackers may use ICMP because it's not usually thought of as a C&C vector.
- Reasons that might dissuade an attacker:
o Many admins block ICMP altogether.
o Admins may set a baseline size for ICMP packets that C&C messages exceed.
o ICMP packets are not encrypted and therefore easily inspected.
C&C Channel
Social media websites - Attacker can blend in with the crowd. Issues commands through messaging or profiles.
Facebook, LinkedIn, and Twitter have all been used for C&C.
Media files - Media file formats use metadata to describe the media. Attacker can embed control message in media
file. Scanners don't usually monitor media metadata.
XML-based documents - Modern Office documents use XML for better functionality. Attackers can embed control
messages in the XML. Like media, scanners won't always detect document messages.
P2P network - Normal C&C is centralized and a single point of failure. P2P is decentralized; control distributed
amongst many peers. If one or more peers is taken out, botnet can still function. P2P networks are hard to establish.
Cloud services – Attackers use free or cheap cloud resources to operate C&C. Attackers used App Engine to host an
app sending C&C messages. Cloud services have reliable, scalable infrastructure for attackers to exploit.
Rootkits
- Exist at low level and conceal malicious code - perfect for APT.
- Can mask pretty much any activity on a system.
- Can take over core parts of OS to hide running processes, services, files, etc.
- Trojan horse may evade a scan because the rootkit changes the OS to hide it.
- APTs use rootkits to hide keyloggers, malware drivers, bot controllers, and backdoors.
- Often installed by privileged users who have been socially engineered.
- Difficult to detect and remove because the OS itself is now untrusted.
- Anti-rootkit software exists but may not be adequate.
Backdoors
Rouge Accounts
- Rogue accounts avoid injecting malicious software on a host.
- Compromised account is trusted by the OS.
- One account may get lost in the shuffle of hundreds, or thousands.
- APT can use rogue account to remote into system and cause harm.
- How APT creates or hijacks account can determine its privileges.
- Example:
o 1. User tricked into revealing privileged credentials.
o 2. APT uses credentials to create a new account.
o 3. Later, APT uses new account to cause damage on the system.
- Account creation and use is logged on most critical systems.
Lateral Movement
PsExec
Covert Channels
Steganography
- Rise of file sharing services makes it difficult to clamp down on outbound traffic.
- Employees may share sensitive files over the Internet for convenience.
- This opens up more channels for the attacker to exfiltrate data over.
- Instead of using a covert channel, the attacker can leak data using a cloud service.
- Data loss systems won't be able to detect illegitimate vs. legitimate use.
- Attacker can open up their own file share and just drop the files in.
Anti-forensics
Disrupting a forensic investigation by:
Buffer Overflows
Memory Residents
- Method of compression:
o Executable is mostly compressed.
o Rest includes code to decompress executable.
o All combines into a single executable.
o When run, the entire code is decompressed before executing.
- Advantages:
o Reduces file size.
o Slows reverse engineering of proprietary software.
- Malware using this technique can obfuscate its existence.
- Anti-malware solutions may not be able to detect packed malware accurately.
- While packed, malware can modify its signatures to make detection difficult.
- Can be mitigated by unpacking the malware in a sandbox.