Key Definitions Penetration testing: The practice of finding vulnerabilities and risks with the purpose of securing the computer or network system. Indicators: Indicators are bits of information that can be used to identify or describe a known threat. Indicators could include unusual activity, a unique filename, attack methods, or malicious commands. Threat actors: A threat actor is a person or organization that threatens another person’s or organization’s security.
TESTOUT CYBERDEFENSE PRO
Penetration Test Process and Types
ESTOUT CYBERDEFENSE PRO
Penetration Testing Find vulnerabilities and risks Simulate an actual attack Detect potential weaknesses Fix security gaps
TESTOUT CYBERDEFENSE PRO
Planning Timing Scope Authorization
TESTOUT CYBERDEFENSE PRO
Information Sources Websites or sales materials Social engineering Public records Port scans Vulnerability scans
TESTOUT CYBERDEFENSE PRO
Information Gathering Employees Organizational hierarchy Vendors Applications Operating systems Hardware
TESTOUT CYBERDEFENSE PRO
Execution Access targeted systems Escalate privileges Explore the system Use pen testing tools
TESTOUT CYBERDEFENSE PRO
Penetration Test Process and Types
TESTOUT CYBERDEFENSE PRO
Penetration Test Process and Types
TESTOUT CYBERDEFENSE PRO
Penetration Test Process and Types
TESTOUT CYBERDEFENSE PRO
Pen Testing Types Black box White box Gray box
TESTOUT CYBERDEFENSE PRO
Summary Penetration testing Pen testing process Pen testing types
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
ESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Threat Data and Intelligence
TESTOUT CYBERDEFENSE PRO
Open-Source Intelligence Available to public Publicly gathered Government-hosted Industry-hosted
TESTOUT CYBERDEFENSE PRO
Closed-Source Intelligence Private organizations Private research Sold by security companies Contains proprietary info
Requirements Consider recent attacks Review risk assessment Research current trends Verify access to data Gather additional data Verify any restrictions
TESTOUT CYBERDEFENSE PRO
Collection Gather internal data Gather external data Prepare data for analysis
Class Discussion Where can a penetration tester gather information about a target network? What are the four steps involved in the attack phase of penetration testing? What are the three types of penetration testing? What types of sources can be used for intelligence gathering?
TESTOUT CYBERDEFENSE PRO
Class Discussion What are zero-day threats, and why are they particularly dangerous? Why do some organizations choose to keep their threat intelligence private? What are the five phases of the security intelligence cycle? What are the benefits of threat hunting? What are the two types of internal threat actors?
TESTOUT CYBERDEFENSE PRO
2.2 THREAT INTELLIGENCE
Organizational Security
TESTOUT CYBERDEFENSE PRO
Key Terms Threat actor
TESTOUT CYBERDEFENSE PRO
Key Definitions Threat actor: A threat actor is an individual or an organization that threatens an organization's security.
TESTOUT CYBERDEFENSE PRO
Attack Frameworks
ESTOUT CYBERDEFENSE PRO
Attack Frameworks Kill Chain MITRE ATT&CK Framework Diamond Model
TESTOUT CYBERDEFENSE PRO
Attack Frameworks
TESTOUT CYBERDEFENSE PRO
Reconnaissance Targets selected Attack vectors identified Total attack surface mapped
TESTOUT CYBERDEFENSE PRO
Weaponization/ Delivery PDF files Image files Word documents Websites Email attachments
TESTOUT CYBERDEFENSE PRO
Exploitation/ Installation Weaponized file is executed Weapon is installed Backdoor is installed
TESTOUT CYBERDEFENSE PRO
Actions on Objectives Intrusion Extract information Destruction Pathway to final target
TESTOUT CYBERDEFENSE PRO
Diamond Model Infrastructure Adversary Capability Victim
TESTOUT CYBERDEFENSE PRO
Attack Frameworks
TESTOUT CYBERDEFENSE PRO
Attack Frameworks
TESTOUT CYBERDEFENSE PRO
Summary Kill chain process MITRE ATT&CK framework Diamond Model
TESTOUT CYBERDEFENSE PRO
Threat Research
ESTOUT CYBERDEFENSE PRO
Reputational Research Search for threat indicators Compare to reputational data Collect data about the threat
TESTOUT CYBERDEFENSE PRO
Indicators of Compromise Unusual emails Unusual registry updates Unusual system changes Unauthorized software Unauthorized files Unauthorized hardware Unauthorized access
TESTOUT CYBERDEFENSE PRO
Threat Research
TESTOUT CYBERDEFENSE PRO
Threat Research
TESTOUT CYBERDEFENSE PRO
Summary Reputational threat research Indicators of compromise Behavioral threat research
TESTOUT CYBERDEFENSE PRO
Threat Modeling
ESTOUT CYBERDEFENSE PRO
Risk Considerations What is worth protecting? What am I protecting it from? Will I need protection? What if I fail to protect data? Are controls in place? How much am I willing to do?
Class Discussion What types of sources can be used for intelligence gathering? What are zero-day threats and why are they particularly dangerous? What are the five phases of the security intelligence cycle? What are the benefits of threat hunting?
TESTOUT CYBERDEFENSE PRO
2.3 THREAT INTELLIGENCE
Security Controls
TESTOUT CYBERDEFENSE PRO
Key Terms Code of ethics Acceptable use policy Password policies Security frameworks Security controls
TESTOUT CYBERDEFENSE PRO
Key Definitions Code of ethics: A code of ethics is a set of rules or standards that help you to act ethically in various situations. Acceptable use policy: The acceptable use policy (AUP) defines how users should use the information and network resources in the organization. Password policies: Password policies detail the requirements for passwords for the organization. Security frameworks: Security frameworks are listings of objectives and actions taken to mitigate risks. Security controls: Security controls are hardware, software, firmware, policies, and procedures used to reduce the risks of threats to your systems.
TESTOUT CYBERDEFENSE PRO
Security Frameworks and Policies
ESTOUT CYBERDEFENSE PRO
Security Frameworks Performance goals Performance evaluation Reduce IT service risks Policies and procedures Compliance documentation
TESTOUT CYBERDEFENSE PRO
Prescriptive Frameworks Policies and procedures Monitoring Intelligence-sharing
Policies and Procedures Code of ethics Acceptable use policy Password policy Data ownership policy Account management policy Data retention policy Monitoring policy
TESTOUT CYBERDEFENSE PRO
Summary Risk-based frameworks Prescriptive frameworks Policies and procedures
TESTOUT CYBERDEFENSE PRO
Security Control Categories and Types
ESTOUT CYBERDEFENSE PRO
Security Control Categories Managerial Operational Technical
TESTOUT CYBERDEFENSE PRO
Security Control Types Preventative Detective Corrective Deterrent Compensating Physical
Summary Security control categories Security control types Evaluate security controls
TESTOUT CYBERDEFENSE PRO
Class Discussion What are the benefits of framework-based governance? How do prescriptive frameworks differ from risk-based frameworks? What is included in a data retention policy? What are the four implementation tiers of a risk-based framework? What are the three security control categories? Which factors should you consider when evaluating security controls?