Uploaded by 7nf1zao294rt

study viewer

advertisement
GIAC
GSECtitle
Crashstyle
Course
Click to edit
Master
Michael J. Shannon
CISSP
Cisco CCNP R&S and CCNP Security
Palo Alto Networks Certified
Network Security Engineer (PNCSE7)
GIAC GSEC and Security+
ITIL 4 Managing Professional (MP)
OpenFAIR Foundation
AWS SysOps Administrator Associate
Introduction
Click to edit Master title style
• Welcome to the GSEC Challenge – that’s exactly what you are officially
doing if you attempt a GIAC exam without the official SANS 5-6 day class.
• Is the SANS GSEC $7000 worth the price?
• It’s an open book exam - All tools are free and open-source
• Here is what I’m giving you in this crash course
•
•
•
•
Slides in PDF – print them
An index of the course
Cheat sheets
YouTube videos for tools
Setting up Learning Labs
Click to edit Master title style
• You have several options for lab environments
• A powerful workstation/laptop
• VM Workstation Pro or VirtualBox 6
• Kali Linux + Metasploitable + Windows 10
• Virtual networks at AWS, GCP, IBM Cloud, or Azure
• Cisco Modeling Labs 2.0
https://www.virtualbox.org/
https://www.kali.org/downloads/
https://github.com/rapid7/metasploitable3
https://www.cisco.com/c/en/us/products/cloud-systems-management/modelinglabs/index.html
The OSI Reference Model
Click to edit Master title style
Number
Name
Description
7
Application
To accomplish a networked user task
6
Presentation
Expressing and translating data formats
5
Session
To accommodate multiple session connections
4
Transport
Connecting multiple programs on same system
3
Network (or
Internetwork)
Facilitate multihop communications across potentially different link
networks
2
Link
Communication across a single link including media access control
1
Physical
Specifies connectors, data rates, and encoding bits
The OSI Reference Model
Click to edit Master title style
Number
Name
Example
7
Application
HTTP, FTP, SMTP, DNS, TELNET
6
Presentation
ASCII, PNG, MPEG, AVI, MIDI
5
Session
SSL/TLS, SQL, RPC, NFS
4
Transport
TCP, UDP, SPX, AppleTalk
3
Network (or
Internetwork)
IP, IPX, ICMP, ARP, BGP, OSPF
2
Link
PPP/SLIP, Ethernet, Frame Relay, ATM
1
Physical
Binary transmission, encoding, bit rates, voltages
The TCP/IP Reference Model
Click to edit Master title style
Number
OSI Name
TCP/IP Model
7
Application
6
Presentation
5
Session
4
Transport
Transport
3
Network (or
Internetwork)
Internet
2
Data Link
Application
Network
1
Physical
OSI Model Mnemonics
Click to edit Master title style
• All People Seem To Need Data Processing
• All Proper Suitors Tell No Devious Phrase
_____________
• Please Do Not Throw Sausage Pizza Away
• Please Do Not Tell Secret Passwords Anytime
• Physical Data Networks Transport Session Presentation
Applications
Hexadecimal Math
Click to edit Master title style
• Hexadecimal is Base-16 math
• Digits are 0-9, A, B, C, D, E, F (16 elements)
Hexadecimal: 0 1 2 3 4 5 6 7 8 9 A
Decimal:
B
C D E F
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
There are 16 Hexadecimal digits. They are the same as the decimal digits up to 9, but
then there are the letters A, B, C, D, E and F in place of the decimal numbers 10 to 15
Hexadecimal Math
Click to edit Master title style
A
2
F
7
163
162
161
160
10 X 163
= 40960
2 X 162
= 512
15 X 161
= 240
7 X 160
=7
40960 + 512 + 240 + 7 = 41719
Just like 2^0 power is one in binary, 16 ^ 0 = 1 in hex -- 7 x 1 = 7
16 ^ 1 is 16 x 1 = 16 -- 15 x 16 = 240
16 ^ 2 is 16 x 16 =256 -- 2 x 256 = 512
16 ^ 3 is 16 x 16 x 6 = 4096 -- 10 x 4096 = 40960
40960 + 512 + 240 + 7 – 41719. Notice how we can now express a much larger
number with only 4 characters?
Hex to Decimal
Click to edit Master title style
Hexadecimal Addresses
Click to edit Master title style
MAC addresses and IPv6 addresses both use Hexadecimal numbers
Logical (Virtual) MAC addresses
Click to edit Master title style
AWS uses Elastic Network Interfaces (ENI). We just call them Network Interfaces. It is
a virtual NIC vNIC and is eth0 of the instance by default.
Internet Protocol (IP)
Click to edit Master title style
•
•
•
•
IP is the core protocol of the TCP/IP suite and the key
protocol of the Network (internetwork) layer
Its main purpose is to provide internetwork datagram
delivery services to layer 4 protocols like TCP and UDP
Often uses layer 3 devices like routers, multilayer
switches, load balancers, and firewall appliances to
forward datagrams (packets)
Exam Tip: The Time To Live (TTL) field designates
the number of hops a packet can take before it
reaches its destination.
Key Characteristics of IP
Click to edit Master title style
• Universal addressing
o Defines addressing mechanism
• Protocol independence
o Works with both the Ethernet and the 802.11 wireless family
• Connectionless delivery
o No handshake setup before transmission to remote host
• Unreliable and unacknowledged delivery - no tracking of
datagrams
• Fragmentation – to break up datagram into smaller packets
for a neighbor router that supports a smaller max
transmission unit (MTU)
Address Resolution Protocol (ARP)
Click to edit Master title style
• A technique used by a host to find the MAC address of
another host and map it to an IP address
• A protocol and a utility to view the cache
• Described in RFC 829
• IPv6 does not use ARP – uses ICMPv6 instead
• ARP reque t = “ W o a 10.10.10.33?; tell 192.168.10.45”
Main IP Protocol Versions
Click to edit Master title style
• The functions of IP were planned and designed well before
the protocol suite was defined
• The original Transmission Control Program was divided into
Transmission Control Protocol (TCP) and Internet Protocol (IP)
• There were three previous versions of the original TCP; so
when split, IP was called version 4
• There were never IP versions 1, 2 or 3
RFC 1918 Private Addresses
Click to edit Master title style
• The Internet Assigned Numbers Authority (IANA)
reserved these three blocks of the IP space for
private internets address space:
• 10.0.0.0 - 10.255.255.255 (10/8 prefix)
• 172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
• 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)
Hosts within enterprises that use IP can be partitioned into three categories:
Category 1: hosts that need network layer access outside the enterprise (provided via
IP connectivity); hosts in this category require IP addresses that are globally
unambiguous.
Category 2: hosts that do not require access to hosts in other enterprises or the
Internet at large; hosts within this category may use IP addresses that are
unambiguous within an enterprise - but may be ambiguous between enterprises.
Category 3: hosts that need access to a limited set of outside services (e.g., E-mail,
FTP, remote login) which can be handled by mediating gateways (e.g., application
layer gateways). For many hosts in this category an unrestricted external access
(provided via IP connectivity) may be unnecessary and even undesirable for
privacy/security reasons. Such hosts may use IP addresses that are unambiguous
within an enterprise - but may be ambiguous between enterprises.
IP version 6
Click to edit Master title style
• IPv6 was intended to replace the widely used IPv4 that is
considered the backbone of the modern Internet
• IPv6 is often referred to as the "next generation Internet"
because of its expanded capabilities and its growth through
recent large-scale deployments
IPv4 vs. IPv6
Click to edit Master title style
Version 4
Version 6
232 address space
2128 address space
Dotted decimal format
Hexadecimal notation
DHCP dynamic addressing
SLAAC and DHCPv6
Header has 20 bytes and 13 fields
Header has 40 bytes and 8 fields
Variable header length
Fixed header length
Header options (obsolete)
Header extensions
Header checksum
No header checksum
IPv4 vs. IPv6
Click to edit Master title style
Version 4
Version 6
Packet size: 576 bytes required,
fragmentation optional
Packet size: 1280 bytes required
without fragmentation
Packet fragmentation: Routers and
sending hosts
Packet fragmentation: Sending hosts
only
IPv4 was never designed to be secure
Has native encryption and
authentication
IPsec optional
IPsec mandatory
Non-equal geographical distribution
(>50% USA)
No geographic limitations
IPv4 has the lack of security. IPv4 was never designed to be secure. It was originally
designed for an isolated military network, then adapted for a public educational &
research networks.
Assigning IPv6 Addresses
Click to edit Master title style
There are three methods for assigning IPv6 addresses:
• Manual
• Stateful Autoconfiguration (using a DHCPv6 server)
• Stateless Autoconfiguration (SLAAC)
Stateless Autoconfiguration
Click to edit Master title style
• Uses ICMP version 6 neighbor discovery to find routers and
then dynamically create IPv6 addresses
• You must connect the host to a network that uses at least one
IPv6-capable router that will send advertisement messages to
the link
• The connected IPv6 nodes can self-configure with an IPv6
address and routing parameters without further human
intervention (RFC 2462)
Stateless autoconfiguration uses neighbor discovery mechanisms to find routers and
dynamically create IPv6 addresses. To use this method for an IPv6 node, it is
important to connect the IPv6 node to a network that uses at least one IPv6 router.
The router transmits router advertisements to the link. These announcements can
allow the on-link connected IPv6 nodes to configure themselves with an IPv6 address
and routing parameters, as specified in RFC 2462, without further human
intervention.
Stateless Autoconfiguration
Click to edit Master title style
• The node can automatically configure its
global IPv6 address by appending its
interface identifier (64 bits) to the prefix
(64 bits) that is included in the router
advertisement messages
• This is an important feature for allowing
the rollout of new devices on the
Internet, such as mobile phones,
wireless devices, home appliances, IoT
devices, networks and more
A node on the link can automatically configure its global IPv6 address by appending
its interface identifier (64 bits) to the prefix (64 bits) that is included in the router
advertisement messages. Stateless autoconfiguration enables "plug and play," which
connects devices to the network without any configuration and without any stateful
servers (such as DHCP servers). It is an important feature for enabling the deployment
of new devices on the Internet, such as cell phones, wireless devices, home
appliances, and networks.
Note: A router announcement can even tell hosts that more configuration
parameters are available using stateful configuration (DHCPv6). These would be
other services like DNS, NTP, IP extensions, and so on.
IPv6 Neighbor Discovery
Click to edit Master title style
• The ICMPv6 provides the same diagnostic services as ICMPv4
o Error and informational messages
• It extends the functionality for some specific IPv6 functions
that did not exist in IPv4:
o Router solicitation and advertisement
o Neighbor solicitation and advertisement
o Redirection of nodes to the best gateway (router)
Neighbor solicitation and advertisement involves acquiring the data link layer
addresses for IPv6 neighbors
The IPv6 Header
Click to edit Master title style
Test Tip: The Version field is 4 bits
Traffic Class: Source host uses this field to mark the priority of outbound packets.
The IPv6 header has 40 octets (320-bits), instead of 20 octets (160-bits) as in IPv4.
The IPv6 header has fewer fields, and the header is aligned on 64-bit boundaries
Traffic Class: This 8-bit field is similar to the ToS field in IPv4. The source host uses
this field to mark the priority of outbound packets.
Next Header: The value of this field determines the type of information that follows
the basic IPv6 header. For example, the critically important ICMPv6 packet is
identified as 58 in the Next Header field.
IPv6 Extension Headers
Click to edit Master title style
•
IPv6 uses two distinct types of headers: The regular IPv6 Header
and IPv6 Extension Headers
• The extension headers, if there are any, follow the original 8 fields
• The number of extension headers is not fixed, so the total length of
the extension header chain is variable
IPv6 is using two distinct types of headers: Main/Regular IPv6 Header and IPv6
Extension Headers. The main IPv6 header is equivalent to the basic IPv4 one despite
some field differences that are the result of lessons learned from operating IPv4.
The options field in the IPv4 header (go back and show slide 5) is used to convey
additional information on the packet or on the way it should be processed. Routers,
unless configured otherwise, must process the options in the IPv4 header. The
processing of most header options pushes the packet into the slow path leading to a
forwarding performance hit. The options field has also been used as a vector for a
variety of network attacks as well.
Regardless, the IPv4 Options perform a key role in the IP protocol operation so the
functionality had to be preserved in IPv6. On the other hand, the impact of IPv4
Options on performance was taken into consideration in the development of IPv6. So
the functionality of options is removed from the main header and implemented
through a set of additional headers called extension headers. The main header
remains fixed in size (40 bytes) while customized EHs are added as needed.
IPv6 Extension Headers
Click to edit Master title style
Extension headers are an intrinsic part of the IPv6 protocol and they support some
basic functions and certain services.
Common Use Cases for EH
Click to edit Master title style
•
•
•
•
•
•
•
Hop-by-Hop EH is used for the support of Jumbo-grams
Destination EH is used in IPv6 Mobility
Routing EH is used in IPv6 Mobility and in Source Routing
Fragmentation EH is critical
Mobility EH is used in support of Mobile IPv6 service
Authentication EH and Encapsulating Security Payload EH
Hop-by-Hop EH is used for the support of Jumbo-grams or, with the Router Alert
option, it is an integral part in the operation of MLD. Router Alert is an integral
part in the operations of IPv6 Multicast through Multicast Listener Discovery (MLD)
and RSVP for IPv6.
• Destination EH is used in IPv6 Mobility as well as support of certain applications.
• Routing EH is used in IPv6 Mobility and in Source Routing. It may be necessary to
disable "IPv6 source routing" on routers to protect against DDoS.
• Fragmentation EH is critical in support of communication using fragmented packets
(in IPv6, the traffic source must do fragmentation-routers do not perform
fragmentation of the packets they forward)
• Mobility EH is used in support of Mobile IPv6 service
• Authentication EH is similar in format and use to the IPv4 authentication header
defined in RFC2402
• Encapsulating Security Payload EH is similar in format and use to the IPv4 ESP
header defined in RFC2406. All information following the Encapsulating Security
Header (ESH) is encrypted and for that reason, it is inaccessible to intermediary
network devices. The ESH can be followed by an additional Destination Options EH
and the upper layer datagram.
Internet Control Message Protocol (ICMP)
Click to edit Master title style
• IP is unreliable and doesn't guarantee
delivery, so ICMP is the feedback
mechanism offering feedback about
network problems
• IP also doesn’t offer a direct method
for collecting diagnostic information
• It resides somewhere between the
Transport and Network layers
• ICMP provides error messages and
informational messages
Even though IP is unreliable and doesn't guarantee delivery, it is important to notify
the sender when something goes wrong. The Internet Control Message Protocol
(ICMP) is the mechanism used to give feedback about network problems that are
preventing packet delivery. Upper protocols, like TCP, will be able to realize that
packets aren't getting through, but ICMP provides a method for discovering more
serious issues such as "TTL exceeded" and "need more fragments."
Uncommon problems like the IP checksum being in error, will not be reported by
ICMP.
ICMP messages are typically acted on by the IP layer, TCP or UDP, or even by some
web-enabled applications.
ICMP Characteristics
Click to edit Master title style
• ICMP will affect network operations in both positive and
negative ways
• Many border routers and firewalls will block most, if not all,
ICMP messages
• However, if blocked, diagnostic tools like ping and traceroute
will not work
• There are a number of Types and Codes and only a few are
commonly used
Common ICMPv4 Messages
Click to edit Master title style
Type
E/ I
Description
Echo Reply
0
I
Ping reply that returns data
Destination
Unreachable
3
E
Unreachable host/protocol
Redirect
5
E
Alternate gateway should be used
Echo
8
I
Ping request (data optional)
Time Exceeded
11
E
Resource exhausted (TTL decremented)
Parameter
Problem
12
E
Malformed packet or header
Name
All of the Types and Codes are on the SANS cheat sheet
TCP Functionality
Click to edit Master title style
•
•
•
•
•
Addressing and multiplexing
Connection handling
Packaging and managing data
Transferring data
Providing reliability and
transmission quality
• Providing flow control
• Congestion avoidance
- Many applications use TCP for transport and multiplexing the data is accomplished
using the underlying network protocol (IP, IPX, AppleTalk, etc,) and is identified
using ports. EXAMPLE: Lets say I open up a Chrome browser session, an Internet
Explorer browser session and a Mozilla Firefox session. Each one has a different
default Home page: Google for Chrome, Bing for IE, and Yahoo for the Firefox. I
also open up my company email through Outlook On The Web in a TOR browser
and a Mozilla Thunderbird email client for my POP3 email account -- different
ephemeral source ports and different server sockets etc.
- Has processes for negotiating, establishing, managing, and terminating
connections
- Packages upper layer data with a header of valuable metadata
- TCP stack on participating node transfers the packaged segments to the TCP
process on the other node
- Maintains reliability and transmission quality
- Flow control and congestion avoidance
TCP Characteristics
Click to edit Master title style
•
•
•
•
•
•
•
Connection-oriented
Stream-oriented
Bidirectional transport
Allows multiple connections
Reliable and acknowledged
Unstructured data
Managed data flow
Unstructured – multiple messages are sent using TCP, the applications must offer a
method for differentiating one message (data element, database record, etc.) from
another
TCP Operations
Click to edit Master title style
• TCP takes the bytes from upper layers and sends it on to the
network layer protocol (IP)
• Bytes are divided into segments (a discrete piece of a stream)
• IP places them into datagrams and passes the encapsulated
packet to the link layer to be “framed” with a header and
trailer
• TCP Session Closing:
• Graceful = FIN > FIN-ACK> ACK
• Abrupt = RST/ACK
Look for wireshark output that shows a graceful TCP closing
TCP Operations
Click to edit Master title style
•
•
•
•
•
•
•
Since TCP is reliable, it tracks each byte of data with a sequence
number applied to blocks
Sequence numbers are used to make sure the segmented data can
be reassembled and retransmitted if necessary
To provide reliability and flow control, TCP uses a sliding window
acknowledgement system
Each node’s TCP stack uses a retransmission queue
Each sent segment is placed in the queue and a retransmission
timer is started
When an ACK is received, the data is removed from the queue
If the timer expires, the segment is retransmitted
The sliding window mechanism is very complicated yet at the heart of TCP operations
TCP Operations
Click to edit Master title style
TCP takes the bytes from upper layers and sends it on to the network layer protocol
(IP)
Bytes are divided into segments (a discrete piece of a stream)
IP places them into datagrams and passes the encapsulated packet to the link layer to
be “framed” with a header and trailer
tcpdump
Click to edit Master title style
•
•
•
Network packet sniffer that uses libpcap capture library
Simply a sniffer and not a protocol analyzer
You must be familiar with this tool and what the output looks like
on the exam
TCP has to use IPsec or SSL/TLS to get security services
TCP sends data as a continuous stream of segments instead of as discrete messages –
the application decides where one message begins and ends
TCP Handshake
Click to edit Master title style
TCP Header
Click to edit Master title style
TCP Control Bits
Click to edit Master title style
Subfield
Name*
Description
URG
Indicates priority data transfer feature for this segment
ACK
Indicates that segment is carrying acknowledgement
PSH
Push feature requests that data be pushed to receiving
application immediately
RST
Sender has encountered problem and needs to reset the
connection
SYN
A request to synchronize sequence numbers to establish a
connection
FIN
The sender is requesting to terminate the connection
* Each Control Flag’s subfield is 1 bit in size
Comparing UDP to TCP
Click to edit Master title style
•
•
•
•
•
•
UDP does not ensure data delivery
If TCP is used, the transport layer
has those additional responsibilities
UDP does not provide
segmentation services
Behavior is best-effort and
connectionless
No sequencing of segments
Best for video, audio, conferencing,
and content streams
•
Use UDP when…
• you need a rapid response from a
server (DNS query)
• the response comes back in a
single packet
• Connection costs are too high for
TCP
• you can afford to lose some data
(stock ticker, weather data,
gaming data, audio, video)
• it can be multicasted to more than
one host
Both TCP and UDP protocols manage the communication of multiple applications and
provide communication services directly to the application process on the host.
The basic service that the transport layer provides is tracking individual
communication between applications on the source and destination hosts. This
service is called session multiplexing, and it is performed by both UDP and TCP.
A major difference between TCP and UDP is that TCP can ensure that the data is
delivered, while UDP does not.
UDP provides applications with best-effort delivery and does not need to maintain
state information about previously sent data. As a benefit, UDP does not need to
establish any connection with the receiver and is termed connectionless.
Multiple communications often happen simultaneously; for instance, you may be
searching the web and using FTP to transfer a file at the same time from one laptop
host. The transport tracks these communications and keeps them separate. This
tracking is provided by both UDP and TCP. To pass data to the proper applications, the
transport layer must identify the target application. If TCP is used, the transport layer
has the additional responsibilities of establishing end-to-end operations, segmenting
data and managing each piece, reassembling the segments into streams of
application data, managing flow control, and applying reliability mechanisms.
UDP does not provide segmentation services - instead it expects the application
process to perform any necessary segmentation and supply it with data chunks that
do not exceed the MTU of lower layers. The MTU of the IP protocol is 1500 bytes.
Larger MTUs are possible, but 1500 bytes is the normal size.
The terms reliable and best effort are terms that describe two types of connections
between computers. TCP is a connection-oriented protocol that is designed to ensure
reliable transport, flow control, and guaranteed delivery of IP packets. For this
reason, it is labeled a "reliable" protocol. UDP is a connectionless protocol that relies
on the application layer for sequencing and detection of dropped packets and is
considered "best effort." Each protocol has strengths that make them useful for
particular applications.
Common UDP Services
Click to edit Master title style
•
•
•
•
•
•
•
DNS queries
Simple Network Management Protocol (SNMP)
Routing Information Protocol (RIP)
Dynamic Host Configuration Protocol (DHCP)
Datagram TLS (DTLS)
Real-time audio and video streaming protocols
Business applications
Numerous key Internet applications use UDP, including: the Domain Name System
(DNS), where queries must be fast and only consist of a single request followed by a
single reply packet, the Simple Network Management Protocol (SNMP), the Routing
Information Protocol (RIP)[1] and the Dynamic Host Configuration Protocol (DHCP).
Voice and video traffic is generally transmitted using UDP. Real-time video and audio
streaming protocols are designed to handle occasional lost packets, so only slight
degradation in quality occurs, rather than large delays if lost packets were
retransmitted. Because both TCP and UDP run over the same network, many
businesses are finding that a recent increase in UDP traffic from these real-time
applications is hindering the performance of applications using TCP, such as point of
sale, accounting, and database systems. When TCP detects packet loss, it will throttle
back its data rate usage. Since both real-time and business applications are important
to businesses, developing quality of service solutions is seen as crucial by some.
Some VPN systems such as OpenVPN may use UDP while implementing reliable
connections and error checking at the application level.
The CIA Triad
Click to edit Master title style
Confidentiality
CIA Triad
Integrity
Availability
Confidentiality
Click to edit Master title style
• Confidentiality is the act of preserving authorized restrictions
on information access and disclosure, including means for
protecting personal privacy and proprietary information
using:
• Cryptosystems
• Compartmentalization
• Encapsulation
Integrity and Availability
Click to edit Master title style
• Integrity involves guarding against improper information
modification or destruction and ensuring information nonrepudiation and authenticity using:
• Cryptographic hashing
• Digital signatures
• Availability – ensuring timely and reliable access to and use of
information using
•
•
•
•
Backups and snapshots
Redundancy and failover
Availability zones
Business Continuity Planning
Categories of Controls
Click to edit Master title style
• Administrative/Managerial Controls are activities that
enforce the guidance, risk treatment, and policy directives of
an organization
• Examples: acceptable use policies, no piggybacking or tailgating
directives, security awareness training
• Technical Controls are combinations of software and
hardware to achieve confidentiality, integrity, and availability
• Examples: firewalls, routers, endpoint protections, web
application firewalls, cloud-based threat modeling
Categories of Controls
Click to edit Master title style
• Operational/Physical Controls deal with
the effectiveness of your controls
combined with the protection of
personnel, data, hardware and the
facility from physical threats that could
harm, damage, or disrupt business
operations
• Examples: IAM, SSO, gates, etc.
Types of Controls
Click to edit Master title style
• Directive Controls are managerial or administrative measures
to advise personnel on the proper behavior and handling of
systems, applications, services, and physical components
• Examples: AUPs, written policies, guidelines, best practices, etc.
• Preventative Controls are physical, technical, and
administrative measures to preclude activities that may
violate policy or increase risk to resources and assets
• Examples: firewalls, IPS, security guards, biometrics, fences and
gates, locks, mantraps, etc.
Types of Controls
Click to edit Master title style
• Deterrent controls include implementing warnings and
forewarnings of consequences to security violations
• Examples: signage, bollards, banners, guards, dogs, lighting,
video Surveillance, alarms, etc.
• Corrective (compensating) controls leverage all control
categories to respond to the detection of an event or incident
to eliminate or reduce any unwanted consequences
• Examples: software and firmware updates to applications and
systems, policy enforcement, privilege removal, etc.
Types of Controls
Click to edit Master title style
• Recovery controls are triggered
once an incident compromises
confidentiality, integrity, or
availability to restore systems
back to an acceptable state
• Examples: BCP, DRP, offsite
facilities, snapshots and backups
Enterprise Architecture
Click to edit Master title style
“Enterprise architecture is a well-defined security architecture that links
all necessary security controls to a combination of design, baseline
administrative controls, business drivers, legal requirements, and threat
scenarios. It ensures that all the necessary physical, administrative, and
technical safeguards are in place and in sync with each other and with the
overall IT architecture and business culture.“
- Ken Cutler, CISSP, CISA, Managing Director of Information Security
Institute
NIST Enterprise Security Architecture
Click to edit Master title style
The Center for Internet Security (CIS®)
Click to edit Master title style
•
The CIS® (Center for Internet Security, Inc.) is a progressive, nonprofit organization that leverages a global IT community to defend
private and public organizations against cyber threat actors and
their exploits and malware
• The CIS offers four popular services:
•
•
•
•
•
The CIS Controls®
CISBenchmarks™
CIS Hardened Images®
The Multi-State Information Sharing and Analysis Center® (MSISAC®)
Make sure you are familiar with the CIS on the exam
The CIS Controls®
Click to edit Master title style
• The CIS Controls® are a prioritized collection of activities and
controls to protect the enterprise, systems, applications, and
data from known cyber attack vectors
• There are 20 controls and resources in three categories:
• Basic
• Foundational
• Organizational
Sample CIS Control Countermeasures
Click to edit Master title style
• Inventory of Authorized and Unauthorized Software
• Devise a list of authorized software monitored with file-integrity
checking tools
• Deploy application whitelisting on firewalls from layer 3 to layer
7 of OSI model
• Deploy software inventory tools to track operating systems and
applications in a CMDB
• Virtual machines, containerization, and air-gapped systems
should be used as often as feasible
CISBenc mark ™
Click to edit Master title style
• CISBenchmarks™are best practices to securely configure
various systems
• The benchmarks are available for more than 140 technologies
• They were established using an exclusive technique built from a
consensus of global cybersecurity professionals and subject
matter experts around the world
• CIS Benchmarks™are security configuration guides created by
government, business, industry, and academia
CIS Hardened Images®
Click to edit Master title style
• CIS provides virtual images that are hardened using CIS
Benchmarks™secure configuration guidelines
• CISHardened Images™offer a secure, on-demand, scalable
computing environment
• They are available from the leading cloud computing providers AWS, Azure, and Google Cloud Platform
The MS-ISAC®
Click to edit Master title style
• The Multi-State Information Sharing and Analysis Center® (MSISAC®) has the mission of improving the total cybersecurity
stance of the nation's state, local, tribal and territorial
governments using concentrated cyber threat prevention,
protection, response, and recovery techniques
The MS-ISAC®
Click to edit Master title style
• 24/7 Security Operation Center
• Incident Response Services
• Cybersecurity Advisories and
Notifications
• Access to Secure Portals for
Communication and Document
Sharing
• Cyber Alert Map
• Malicious Code Analysis
Platform (MCAP)
• Weekly Top Malicious Domains/IP
Report
• Monthly Members-only Webcasts
• Access to Cybersecurity Table-top
Exercises
• Vulnerability Management
Program (VMP)
• Nationwide Cyber Security
Review (NCSR)
• Awareness and Education
Materials
Assurance Standards Mapping
Click to edit Master title style
Assurance Standard
References
NIST 800-53 rev. 4
CA-7: Continuous Monitoring
CM-2: Baseline Configuration
CM-8: Information System Component Inventory
CM-10: Software Usage Restrictions
CM-11: User-Installed Software
SA-4: Acquisition Process
SC-18: Mobile Code
SC-34: Non-Modifiable Executable Programs
SI-4: Information System Monitoring
PM-5: Information System Inventory
NIST Core Framework (2014)
ID.AM-2: Asset Management
PR.DS-6: Data Security
ISO 27002:2013 Annex A
A.12.5.1: Installation of software on operational
systems
A.12.6.2: Restrictions on software installation
There are a number of parallels between the CIS Controls and various NIST and ISO
controls as seen in this table. This is just a sampling, and although the mappings are
not necessarily a one-to-one match, the concepts overlap quite effectively
Access Control Concepts
Click to edit Master title style
• Access management and control must
always be driven by the Least Privilege
principle
• There are a variety of models that can be
used depending on the organization type
and sensitivity of the subjects and objects
involved
• Data classification is critical and is the
responsibility of the data owner
Data Classification
Click to edit Master title style
• Common government
classifications:
• Top Secret
• Secret
• Secret but unclassified
• Confidential
• Unclassified
• Common private sector or
commercial classifications:
• Confidential
• Private
• Sensitive
• Public
Top secret is the highest level of sensitivity and should garner the most mission
critical protection controls
Secret is very important, and exposure could harm agency, governmental unit, or
even national security
SBU – is not classified but should be protected as the unauthorized release could
jeopardize confidence in the organization or cause embarrassment and loss of
goodwill with other entities
Confidential data should be well-protected and might be a threat to subjects if
compromised – usually personnel files, PII, PHI, and IP
Unclassified – some or all of this information could be released under the right
circumstances. There may be some redaction to maintain confidential or SBU
information
Data Classification Process
Click to edit Master title style
1.
2.
3.
4.
5.
6.
Identify roles such as owner, custodian, steward, and user
Classify and label (tag) data
Identify exceptions based on review board
Designate controls
Identify processes for de-classification, transfer, and disposition of
data
Conduct ongoing awareness and continual improvement
The owner is responsible for classifying the data and determining the sensitivity level
in the model or architecture
A data custodian is accountable for data assets from a technical perspective such as
granting temporary access through tickets or assertions.
A data steward is accountable for data assets from a business perspective.
The user us responsible for working with the data within the permission set and
acceptable use policies
Key Terms
Click to edit Master title style
• Identity is claiming to be a certain entity
• Authentication is the process of proving who you are using
various factors
• Something you have, know, are, or reside
• Authorization dictates actions
• Accounting is for auditing and/or billing purposes
Key Principles
Click to edit Master title style
• Least Privilege is giving just the right amount of access
• Need to Know relates to mandatory access controls that use
sensitivity levels and lattices
• Separation of duties divides critical tasks or systems to be
operated by one or more subjects
• Rotation of Duties involves a revolving job role for personnel
to mitigate against theft, fraud, or a single point of failure
• Mediated Access uses proxies
Separation of duties is called Dual Operator when 2 high-level parties are involved
Rotation of duties can also include the “forced vacation” principle
Access Control Models
Click to edit Master title style
•
Discretionary Access Control (DAC)
• Managed by the owner of object and can grant permissions to
other entities
• Mandatory Access Control (MAC)
• Uses a strict set of established sensitivity levels and access
controls for integrity and confidentiality based on classifications
• Role-based Access Control (RBAC)
• Based on group or role assignments from directory, org chart,
functions, etc.
Access Control Models
Click to edit Master title style
•
Rule-based (ruleset) Access Control
• A set of rules processed in a certain order and applied to users,
data, or traffic common with firewalls and access control lists
• Attribute-based Access Control (ABAC)
• Dynamic controls based on different variables and user
behavior
• Token-based Access Control
• Temporary access granted by assertions made using federated
services like Single Sign-On
Token-based: SAML 2.0 assertions, AWS Security Token Service (STS), Microsoft
Kerberos tickets, Azure shared access signature (SAS) token, or JSON Web Token
(JWT) used in OAUTH 2.0
Password Management
Click to edit Master title style
• Passwords are still widely used
credentials for access even though they
represent a continuous vulnerability due
to human error
• They should always be part of a multifactor authentication if used
• Consider password managers and SSO
solutions
Single Sign-On with AWS SSO
On-Premise AD
Click to edit Master title style
SSO
SSO
Custom
SAML 2.0
Applications
SSO
Cloud Business
Applications
OU
Dev
OU
Prod
AWS Organization
Single Sign-On Considerations
Click to edit Master title style
• Advantages of SSO:
•
•
•
•
•
•
Can reduce security risks
Simplifies management
Reduces password fatigue
Protects identities
Improves productivity
Reduces workloads for
helpdesk and service desk
• Establishes solutions are readily
available
• Challenges of SSO:
• Passwords must be long and
strong
• Single point of failure
• Can be cumbersome to deploy
(SAML for example)
• Risky on multi-user systems
• Social network use enhances
organizational risk
• Data can be sold to thirdparties
Irreversible Cryptosystems and Hashing
Click to edit Master title style
• In many organizations,
passwords are the only security
control used for authentication
and authorization of access
• Irreversible encryption and
hashing algorithms are
commonly used by operating
systems to store passwords
• Common for servers to store
hashes on backend databases
Computer systems store only the hashed passwords and not the original password on
disk. When a user tries to authenticate, the system applies a hash algorithm to the
user-supplied password to see if it matches the one in storage.
Also common for web servers to store password hashes in a backend SQL or NoSQL
database
Cryptographic Hashing of Passwords
Click to edit Master title style
Password Cracking
Click to edit Master title style
•
•
•
•
•
The technique to determine or guess plaintext passwords
The algorithm is not broken
Each guess is hashed and compared to a stored value
Can be an online or offline operation
There a many standalone tools and module in exploit kits
available on the web
• The tools are often combined with various published lists
Password Hash Cracking
Click to edit Master title style
Password Cracking
Click to edit Master title style
1. Locate a valid username or ID
2. Determine the algorithm
used
3. Get the hashed password
4. Create or download a
wordlist
5. Hash each password in the
list
6. Find a match
• Brute Force – attempting
every possibility in keyspace
• Dictionary – using a word file
or dictionary of feasible
passwords
• Pre-computation – using
Rainbow tables of precomputed hash values
• Hybrid – a combination of
techniques in succession
Password Attack Countermeasures
Click to edit Master title style
•
•
•
•
Strong password policies
Avoid common patterns
Use mnemonic techniques
Add additional factors
•
•
•
•
OTP token/card
TOTP soft tokens
Challenge/response
Biometrics (fingerprint, facial, retina, iris, voice, etc.)
Common patterns: dictionary words and jargon, birthdays, names, common numbers,
environment attributes, qwerty key patterns
Network Types
Click to edit Master title style
• Personal Area Network (PAN)
• Bluetooth, Infrared, Tethered Wi-Fi
• Local Area Network (LAN)
• Ethernet, fiber, wireless
• Campus Area Network (CAN)
• Fiber, wireless mesh
• Metropolitan Area Network (MAN)
• FDDI ring, fiber, wireless mesh
• Wide Area Network (WAN)
Network Topologies
Click to edit Master title style
•
•
•
•
•
•
Bus topology
Ring topology
Star topology
Tree topology
Hybrid topology
Mesh topology
Physical Star Topology
Click to edit Master title style
Logical Star Topology
Click to edit Master title style
Mesh Networks
Click to edit Master title style
This type of network offers the greatest fault tolerance
Network Zones
Click to edit Master title style
• Zoning is used to counter the risk of an open network by
partitioning infrastructure services into logical groupings that
have the same communication security policies and security
requirements
• Zoning is a logical design approach used to manage and
govern access and data communication flows according to
security policies
• A zone is defined by a logical grouping of services under the
same policy constraints, driven by business requirements
Network Zones
Click to edit Master title style
• Every zone contains one or more separate, routable networks
• Every separate, routable network is contained within a single
zone
• Every zone connects to another zone via a perimeter that
contains zone interface points (firewalls and load balancers)
• The only zone that may connect to the public zone is the
public access zone or subnet (DMZ)
Network Zones
Click to edit Master title style
Uncontrolled
Zones
Internet
Controlled
Zones
DMZ
Perimeter
Web Tier
Perimeter
Perimeter
DB Tier
Perimeter
Perimeter
Directory
Services
Describe on-premises vs. AWS scenario
Perimeter
MGMT
VLAN or
Other
Restricted
Tier
Network Zones
Click to edit Master title style
Jump
Jump
Network Hubs and Taps
Click to edit Master title style
• Hubs (micro hubs)
• Traditional Ethernet hubs have become virtually obsolete and
replaced with switches or USB micro hubs
• Network Taps
• A Network Tap (Terminal Access Point) is used by administrators
and attackers to capture packets inline to analyze a network
• Has A, B, and C ports
These are OSI layer 1 devices
Packet Sniffers can use Taps
Click to edit Master title style
Secure Access Switches
Click to edit Master title style
• Security Switches or L2 data plane control is part of a trend to
move security closer to the endpoints
• Security Switches offer a variety of services to secure frames
to and from endpoints and between switches
• There should be an established secure setup baseline
Securing a Cisco 3550 switch
Click to edit Master title style
Switch Security Features
Click to edit Master title style
• IEEE 802.1x (PNAC) and RADIUS/DIAMETER
• IEEE 802.1AE MACsec with AES-GCM-128/256
• DHCP Snooping Database
• IP-ADDR + MAC-ADDR + VLAN-ID + PORT-ID
• Supports Dynamic ARP Inspection (DAI)
• Supports IP Source Guard (PACLs)
• Ethertype ACLs
802.1X (PNAC)
Click to edit Master title style
802.1AE MACsec
Click to edit Master title style
AES-128-GCM with GMAC
or
AES-256-GCM with GMAC
Wireless APs and Controllers
Click to edit Master title style
Wireless Analysis
IAM
IDS/IPS
Rogue Detection
802.1X
802.11w – MFP
WPA3 Enterprise
Secure Routers
Click to edit Master title style
Routers are primarily layer 3 devices although they can function as Layer 2 (bridged or
transparent mode) through Layer 5/7 (Application layer gateways – deep packet
inspection) devices. They physically and logically separate broadcast domains or
VLANs. Typically route IPv4 and IPv6 traffic although other routed protocols like
AppleTalk and IS-IS (Intermediate System-to-Intermediate System protocol) can be
supported depending on the environment. IS-IS is still used at the core of some ISP
networks.
Routers require knowledge of all of the LANs in their domain to decide which
destination packets will be forwarded. If the destination does not exist in the router's
routing table, the packet should be dropped. Routers use static routing or dynamic
routing protocols such as RIPv2, OSPF, EIGRP, BGP, and others.
Security Services: (modular and/or integrated into O/S) Firewall services, IDS/IPS, VPN
gateways and concentrators; NAT and PAT translation; URL filtering; Proxy services;
Inspection of traffic layer 2-7 (DPI,AIC)
Secure Routers
Click to edit Master title style
• Primary roles of a router
• Packet forwarding on the data
plane and VRF
• Inter-area and AS routing
• QoS and traffic engineering
• Static packet filtering
(Infrastructure ACL)
• VoIP and Wireless gateways
or bridging
• Security roles of a router:
• Firewall services
• IDS/IPS
• VPN gateways and
concentrators
• NAT and PAT translation
• URL filtering and proxies
• Inspection of traffic layer 2-7
(DPI,AIC)
Security Services of a router: (modular and/or integrated into O/S)
CSP Elastic Load Balancing
Click to edit Master title style
• Elastic Load Balancing (ELB) automatically distributes
incoming application traffic across multiple targets, such as
Amazon EC2 instances, containers, and IP addresses
• It can handle the varying load of your network (TCP, UDP) or
application (HTTP/HTTPS) traffic in a single Availability Zone
or across multiple zones (failover)
• Can also perform flow logging, TLS 1.2/3 gateway services
(Listener), certificate services, web application firewall (WAF),
health checks, offload to HSM or SSL accelerator
ELBs and Auto-scaling
Click to edit Master title style
Internet
Firewalls
Click to edit Master title style
• A firewall is a metaphor representing an integrated security
system combining hardware (physical or virtual) and software
and/or on-premise and cloud-based solutions
• Firewalls should be placed between all domains, zones,
networks and subnets (VLANs) in order to “prevent the fire from
spreading”
• Linux builds have a native stateful firewall called iptables
iptables –A INPUT –p tcp –dport ssh –j ACCEPT
Append this rule to the input chain to view ingress traffic; look for TCP (-p tcp); if so,
does it go to the destination SSH port?; if yes, then permit the traffic (-j ACCEPT)
Firewalls
Click to edit Master title style
•
•
•
•
•
Physical vs. virtual
Stateless (NACLs) vs. stateful
Whitelisting only
Restrictive vs. permissive
Web Application Firewall
(ALG/AIC/AVC/DPI/Layer 5-7)
• Proxy services (mediated access)
for NAT, authentication, IPS, and
more
Next Generation Firewalls
Click to edit Master title style
• URL and reputation filtering
• Application Visibility and Control
(WAF)
• Content Security
• Intrusion prevention (IDS/IPS)
• Advanced malware protection with
cloud correlation
• VPN gateway with inspection
• Integration with directories
• Machine Learning
URL Filtering: cloud server-based web site reputation scores
Application Visibility and Control: For example, applications like Skype and
Webex or P2P file sharing that can hop from one port to another can be
recognized. Another example is only whitelisting Facebook without features
like gaming. IM without web cam or sending files.
Context Awareness: Who is connecting, to what, from where, using what
device, at what time?
Intrusion Prevention System:
Advanced Malware Protection with Cloud correlation
NG Application Visibility and Control
Click to edit Master title style
NG Application Visibility and Control
Click to edit Master title style
NG Application Visibility and Control
Click to edit Master title style
Web Application Firewall (WAF)
Click to edit Master title style
• Generate or leverage WebACLs that match on:
•
•
•
•
IP addresses of originating requests
Country that requests originate from
Values in request headers (e.g. User-Agent, Content-Type)
Literal or regex string patterns that appear in requests
(e.g. [cC][mM][dD].[eE][xX][eE])
• Length of requests (buffer overflows)
• Presence of SQL injection code that is likely to be malicious
• Presence of a malicious cross-site scripting attack
Automating WAF at AWS
Click to edit Master title style
@aws.amazon.com
IDS and IPS
Click to edit Master title style
• Today we typically just use the term IPS for intrusion
detection and prevention services depending on the mode of
operation
• IPS will begin in a passive/monitor (IDS) mode
• Traditional sensors are Signature/Rule/Anomaly based
• Anomaly-based based builds a knowledge base over several
hours and then looks for deviations from the baseline
• NGIPS uses cloud-based heuristics and machine learning
• Heuristic analysis uses rules and estimation engines to
discover anomalies
IPS Deployment Options
Click to edit Master title style
•
•
•
•
NIPS or HIPS
Switch SPAN port or a network tap (GIGAMON or VIAVI nTap)
Between VLANs on multi-layer switch or hypervisor
As a multiport bridge or routing appliance with multiple
interfaces
• Cloud-based MSSP solution
IPS Deployment Options
Click to edit Master title style
•
•
•
•
•
•
IPS sensor is in fail-open or fail-closed modes
Tuning and optimization is critical before deploying
True positive = correct + action
True negative = correct + no action
False positive = error + action
False negative = error + no action
True positives: The security control, such as an IPS sensor, acted as a consequence of
malicious activity. This represents normal and optimal operation.
True negatives: The security control has not acted, because there was no malicious
activity. This represents normal and optimal operation.
False positives: The security control acted as a consequence of non-malicious activity.
This represents an error, generally caused by too tight proactive controls (which do
not permit all legitimate traffic) or too relaxed reactive controls (with too broad
descriptions of the attack).
False negatives: The security control has not acted, even though there was malicious
activity. This represents an error, generally caused by too relaxed proactive controls
(which permit more than just minimal legitimate traffic) or too specific reactive
controls.
Cisco IPS Sensor
Click to edit Master title style
Snort is an Open-source IDS
Click to edit Master title style
•
•
•
•
Excellent lightweight NIDS with a good reputation since 1998
Low-cost or free versions
Can identify several attack variants with flexible ruleset
Administrators can create custom pattern matching rules for
zero-days, new worms, and exploits
A Basic Snort Rule
Click to edit Master title style
Snort 101 and Snort Rules
https://www.youtube.com/watch?v=W1pb9DFCXLw
https://www.youtube.com/watch?v=RUmYojxy3Xw
IEEE 802.11 Wireless
Click to edit Master title style
•
802.11 was created in 1997 and ratified by IEEE in 1999
• .11b in 1999 offered max bandwidth of 11 Mbps in the 2.4 GHz
frequency
• .11a in 1999 with max BW of 54 Mbps in 5 GHz range
• .11g in 2003 with max BW of 54 Mbps in 2.4 GHz range
• These were all officially incorporated in 2007
•
802.11n came in 2009 and offered BW from 100 – 600 Mbps
• Enhanced performance due to Multiple Input Multiple Output
(MIMO) and signal reflection
• Operates in both 2.4 GHz and 5 GHz ranges
• Standardized in 2012
802.11ac and .11ax Wireless
Click to edit Master title style
• 802.11ac is the most recent standard
ratified in 2016
• Aggregate BW of 1 Gbps with some
deployments to 6.77 Gbps
• Utilizes multiple radios and
bandwidth aggregation in the
5 GHz range
• Newest, non-ratified draft is
802.11ax in ranges below 6 GHz with
speeds up to 11 Gbps using
aggregated bandwidths
Evolution of Wireless Security
Click to edit Master title style
• Wi-Fi Protected Access 1 (WPA-2003) was a temporary
fix to the first WEP security mechanism
• Used TKIP to generate “better” keys for underlying RC4
encryption
• Used a Message Integrity Check (MIC) to thwart forgery
and replay
• Both protocols had issues so WPA 2 was introduced
afterwards
• Remember that Kismet is a popular wireless network
sniffer and wireless IDS
WEP has been deprecated due to the following reasons:
Hackers can easily obtain challenge phrase and encrypted response to crack the WEP
key
Crackers have decrypted captured data traffic
Provides only weak encryption of data
The initialization vector (IV) is a clear-text 24-bit field – a pseudo-random number
used along with the secret key for data encryption
The small space guarantees the re-use of the same key stream
The weakness is NOT with the RC4 protocol per se
Temporal Key Integrity Protocol - TKIP
Evolution of Wireless Security
Click to edit Master title style
• WPA2 was the replacement for
WPA in 2004 and devices required
testing and certification from Wi-Fi
Alliance by 2006
• Based on IEEE 802.11i
• Supports PSK and Enterprise
authentication
• In October 2017, the major KRACK
attack targeted the 4-way
handshake
Temporal Key Integrity Protocol - TKIP
Evolution of Wireless Security
Click to edit Master title style
•
WPA2-PSK (personal)
•
•
•
•
•
Shared secret key is used
Manually configured on devices and AP
Local access controls
AES-128 used for encryption
WPA2-Enterprise (802.1X)
• Authentication server is required
• Centralized RADIUS used for authentication and key
distribution
• AES-128 used for encryption
•
Management Frame Protection (PMF or MFP) was
introduced in WPA 2
Protected Management Frames (PMF)
Click to edit Master title style
• Wi-Fi uses three different frame types: Management, Control,
and Data
• Management frames like authentication,
de-authentication, association, disassociation, beacons, and
probe frames are used by wireless stations to locate and
connect wireless networks
• They also manage the client connection after a successful
association
Protected Management Frames (PMF)
Click to edit Master title style
• To keep your Wi-Fi infrastructure safe from attack, you should
implement Management Frame Protection (MFP) features
• The management frames sent between APs and clients are
protected, so that both APs and clients can detect and drop
invalid or spoofed management frames
• APs can be set up to not emit certain broadcast management
frames like disassociation, deauthentication, or action frames
Protected Management Frames (PMF)
Click to edit Master title style
• Based on IEEE 802.11w, PMF offers integrity protection for
both unicast and broadcast management frames
• It also encrypts unicast management frames in the same way
as data to ensure data confidentiality
• Protected Management Frames are intended to stop a variety
of wireless attacks such as disconnect, honeypot, and evil
twin
• Device vendors and security administrator should make sure
that Protected Management Frames are configured
automatically
WPA3
Click to edit Master title style
• WPA3 adds new mechanisms to streamline wireless security,
support more robust authentication schemes, and deliver
increased cryptographic strength for sensitive data
• All WPA3 networks will utilize the latest security techniques
while prohibiting outdated protocols
• WPA3 requires the use of Protected Management Frames
(PMF) to preserve the resiliency of mission critical wireless
networks
WPA3-Personal
Click to edit Master title style
• Use for SO/ HO environments or when devices can’t support
802.1X authentication
• WPA3-Personal provides the Simultaneous Authentication of
Equals (SAE)
• SAE is a secure key establishment protocol between wireless
nodes to provide strong protections against third-party
password guessing tools
WPA3-Personal
Click to edit Master title style
• The Wi-Fi Alliance said in a past statement “Recently
published research identified vulnerabilities in a limited
number of early implementations of WPA3 Personal, where
those devices allow collection of side channel information on
a device running an attacker’s software, do not properly
implement certain cryptographic operations, or use
unsuitable cryptographic elements.”
This relates to the Dragonfly handshake, which forms the core of WPA3, and is also
used on certain Wi-Fi networks that require a username and password for access
control: the EAP-pwd protocol.
WPA3-Enterprise
Click to edit Master title style
• WPA3-Enterprise offers a new 192-bit security level based on
the NSA’s ‘Suite B’ Cryptography for environments needing
stronger security
• It allows fewer EAP types to be used:
• TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
(mandatory)
• TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (optional)
• TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (optional)
• It only allows GCMP-256 encryption
Personal Area Networks (PAN)
Click to edit Master title style
•
•
•
•
•
•
The primary PAN technology in use today is Bluetooth
Bluejacking is a legacy Bluetooth prank that takes advantage of
sending contact information automatically without authentication
or authorization
The cracker creates an address book object and a contact in the
contact list then spoof a name to appear on your phone
Bluesnarfing is much more dangerous as it can steal data from a
wireless device over the Bluetooth connection
Often conducted between iPhones, Android phones, iPods, iPads,
laptops, and assorted PDAs
Bluesnarfing can access contact lists, calendars, emails, and text
messages
Personal Area Networks (PAN)
Click to edit Master title style
• Zigbee is a low-power solution that
can even run on batteries
• A collection of automation
standards
• Based on IEEE 802.15.4
• Less expensive and easier to deploy
PAN alternative to Bluetooth
Near Field Communications (NFC)
Click to edit Master title style
• NFC technologies let you harness the benefits of rapid and
contactless payments
• They facilitate entry and exit from transit systems without
long waiting times
• The advantages of RFID/NFC for travelers and shoppers are
abundant and the technology will only expand in the future
NFC Threats and Vulnerabilities
Click to edit Master title style
• Cloning and emulating Point-of
Sale (POS) devices
• Sniffing, spoofing, and replay attacks
• Man-in-the-middle attacks
• Denial of service
• RFID malware
NFC Threats and Vulnerabilities
Click to edit Master title style
• NFC and RFID blocker tags and
jammers can mitigate
• Special blocking wallets
• RFID zapper
• Disposable cameras that disable
RFID chips
5G
Click to edit Master title style
• 5G offers bigger channels to speed data transfer, lower
latency, and the ability to connect to many devices
simultaneously
• Low-band 5G operates in frequencies below 2GH - the oldest
cellular and TV frequencies
• Mid-band 5G is in the 2-10GHz range. That covers most current
cellular and Wi-Fi frequencies, as well as frequencies slightly
above those
Low-band can go great distances, but there aren't very wide channels available, and
many of those channels are being used for 4G. So low-band 5G is slow. It acts and
feels like 4G, for now. Low-band 5G channels are from 5MHz in width (for AT&T) up to
20MHz (for T-Mobile), so you can see they aren't roomier than 4G. Complicating
things, AT&T and T-Mobile low-band phones sometimes show 5G icons when they
aren't even using 5G, making it hard to tell any difference.
Mid-band 5G is in the 2-10GHz range. That covers most current cellular and Wi-Fi
frequencies, as well as frequencies slightly above those. These networks have decent
range from their towers, often about half a mile, so in most other countries, these are
the workhorse networks carrying most 5G traffic. Most other countries have offered
around 100MHz to each of their carriers for mid-band 5G. Here in the US, New TMobile will use Sprint's spectrum for a mid-band network, using up to 120MHz per
city. AT&T and Verizon will shave off little bits of their 4G spectrum using DSS for midband 5G, 10MHz here and 10 there.
5G
Click to edit Master title style
• High-band 5G is also called millimeter-wave
• So far, it is mostly airwaves in the 20-100GHz range that
haven't been used for consumer applications before
• They are very short range with 800-foot distances from
towers
• Can provide very fast speeds using up to 800MHz at a time
• Verizon relies extensively on high-band, which it calls “ultra
wideband”
5G
Click to edit Master title style
• With current phones in low- and mid-bands, you can combine
two 100MHz channels, for 200MHz usage and you can also
stack three more 20MHz 4G channels on top of that
• In high-band 5G, you can use up to eight 100MHz channels
• Dynamic spectrum sharing (DSS) allows carriers (like AT&T
and Verizon) to dynamically split channels between 4G and
5G based on demand with DSS-compatible phones
• Studies are not definitive on the dangers to people and
animals from high-band
Many devices: sensors, smart devices, IoT.
The great speeds 5G carriers promise are just about leveraging more airwaves at
once. But if you don't have the airwaves available, you don't get the speeds.
Attacks: Replay
Click to edit Master title style
• On a wireless network, it is easier to gather the data
necessary for a replay attack
• WEP and WPA are vulnerable to ARP replay attacks, among
others, as there are many tools available that will crack their
encryption keys (AirSnort and AirCrack are classics)
• Ettercap and dsniff are two popular man-in-the-middle attack
tools that use Wireshark to modify the data in transit
Attacks: Rogue APs
Click to edit Master title style
• Honeypots and Evil Twins are
malicious rogue APs tricking users
to associate
• Can be a wireless man-in-themiddle attack or DHCP starvation
• An evil twin AP replaces an existing
network so users will connect to
the fake one instead of the real one
• Evil twins spoofing a public hotspot
can also be a serious concern
Modern managed APs and controllers can detect other APs over the air, and if not
known it is classified as a rogue
The location of the rogues can be plotted on a floor-plan map
If the found AP is determined to be a known internal AP, it can be marked accordingly
If the AP is found to be a neighboring wireless LAN, such as in a hotspot or adjacent
business, then it can be marked as a known external
Attacks: Jamming
Click to edit Master title style
• Jamming is a form of wireless DoS attack that floods the RF
with interference or excessive traffic so that wireless links
cannot be sustained
• Exploit kits have several jamming modules and scripts
included for hard and soft APs
• Some DoS attacks may not be due to malicious activity, but
rather poorly written drivers on endpoint Wireless NICs
Attacks: Disassociation
Click to edit Master title style
• Wireless clients use authentication, deauthentication,
association, disassociation, beacons, and probe frames to find
an AP and initiate a network session
• Attacker spoofs the AP MAC address and sends management
frames, usually deauthentication or disassociation messages,
to valid clients
• The goal is typically to perform a DoS attack against the
network or to force the client to reauthenticate
Wireless clients use control and management frames, such as authentication and
deauthentication, association and disassociation, beacons, and probes, to choose an
AP and initiate a session for network service
AP impersonation is a common attack against wireless networks where the attacker
spoofs the AP MAC address and sends management frames, usually deauthentication
or disassociation messages, to valid clients
The goal is typically to perform a DoS attack against the network or to force the client
to reauthenticate
Attacks: Wi-Fi Protected Setup (WPS)
Click to edit Master title style
•
•
•
•
Originally called “Wi-Fi Simple Config”
Attacks on the PIN generated by the AP entered on the device
Online and offline brute-force attacks are possible
Captured packets determine PIN and gain unauthorized
access
• If the device does not allow the pin to be changed,
unauthorized access is possible
• If the AP is accessible by anyone, just push the button
PIN is printed on device or listed in configuration menu
Attacks: WPA2 KRACK
Click to edit Master title style
•
Key reinstallation attacks (KRACK) are a form of cyberattack that
exploits a vulnerability in WPA2 resulting in stolen data transmitted
over networks
• An encrypted WPA2 connection is initiated with a four-way
handshake sequence, but the entire sequence is not required for a
reconnect - only the third part of the four-way handshake needs to
be retransmitted
• When a user reconnects to a familiar Wi-Fi network, the network
resends the third part of the handshake sequence and this
resending can occur multiple times to ensure the connection
succeeds
• This repeatable step is the vulnerability that can be exploited by a
man-in-the-middle evil twin or rogue AP
An encrypted WPA2 connection is initiated with a four-way handshake sequence,
although the entire sequence isn’t required for a reconnect. In order to enable faster
reconnections, only the third part of the four-way handshake needs to be
retransmitted. When a user reconnects to a familiar WiFi network, the WiFi network
resends them the third part of the handshake sequence; this resending can occur
multiple times to ensure the connection succeeds. This repeatable step is the
vulnerability that can be exploited.
Attacks: WPA3
Click to edit Master title style
• In July 2019 two security researchers disclosed information
regarding several vulnerabilities (known as Dragonblood) in
the Wi-Fi Alliance's WPA3 Wi-Fi security and authentication
standard
• Three main attack categories:
• Downgrading to WPA2
• Offline password cracking through side-channel attack
• Denial of service
Dragonfly is the key exchange mechanism through which users authenticate on a
WPA3 router or access point. In April, Vanhoef and Ronen found that Dragonfly key
exchanges that relied on P-521 elliptic curves could be downgraded to use the
weaker P-256. As a result, the WiFi Alliance recommended that vendors use the
stronger Brainpool curves as part of the Dragonfly algorithms. However, we found
that using Brainpool curves introduces a second class of side-channel leaks in the
Dragonfly handshake of WPA3.
Common Social Engineering Attacks
Click to edit Master title style
•
•
•
•
Tailgating and piggybacking
Scams, fraud, and hoaxes
Dumpster diving
Shoulder surfing
• Watering hole
• Influence campaigns
• Trolling organizational
social media sites
Eliciting information and reconnaissance, hoaxes, Identity fraud, Impersonation and
pretending, Invoice scams, Credential harvesting
Influence campaigns are also called misinformation operations and influence
operations:
To Launch propaganda or disinformation initiative – and - Gain a competitive
advantage or confuse adversary or competitor
Phishing Attacks and Variants
Click to edit Master title style
• Phishing is a cyber attack that
uses disguised email and
webmail as a delivery method
• The goal is to hoax the
recipient into accepting it as a
real message
• Attackers request reply,
clicking a hyperlink or
downloading an attachment
• Spear phishing targets specific
roles and responsibilities
• Whaling targets high-profile,
highly privileged, or C-suite
• Vishing attacks telephones,
cell phones, and VoIP systems
• Smishing uses SMS texting as
the vector
Indicators of Phishing
Click to edit Master title style
•
•
•
•
•
•
•
•
Vague salutations – "Dear valued customer"
Suspicious display names or domains
Entity name is farther down the URL path
Wrong information or suspicious IP addresses when you
hover over links
Awkward grammar and misspelled words
Subject line has urgent or intimidating phrases
Lack of legitimate contact information
Spoofed headers, graphics and logos
Business Email Compromise (BEC)
Click to edit Master title style
• Business Email Compromise (BEC) is a type of special attack
that targets entities who outsource, conduct wire transfers,
and have suppliers abroad, and more
• Corporate email accounts of high-level employees are either
spoofed or compromised through keyloggers or phishing
attacks, in order to perform fraudulent transfers
Typosquatting
Click to edit Master title style
• Typosquatting involves sitting on sites under someone else's
brand or copyright and targeting Internet users who
erroneously type a web site address into their browser
address bar
• Examples: gooogle, facebooj, amaxon, insdagram
• Other terms are URL hijacking, sting sites, or fake URL
Common Malware Payloads
Click to edit Master title style
•
•
•
•
•
•
Trojans and RATs
Polymorphic worms
DDoS Bots
Spyware and adware
Keyloggers
Ransomware
Potentially unwanted programs (PUPs) will show up as red flags in anti-virus/antimalware tools
Malvertisments
Remote Access Trojans
Click to edit Master title style
Command and Control Server (C&C-C2)
Act as client
Act as server
Attacker
Capture webcam
Keystrokes logging
Remote shell
Update RAT version
Download file
Upload file
RAT-infected PC
Complex Malware Types
Click to edit Master title style
• Rootkits
• Backdoors
• File-less/memory-only
viruses
• Logic bombs
• Stegomalware
• Polymorphic packers
• Multipartite
A rootkit is a category of malicious software intended to advance administrator-level
or root level control over a computer system without being detected by authorized
users. The term is a combination of the words "root", which represents the root user
in a UNIX/Linux system or the administrator in a Windows system and "kit", meaning
software toolkit. Typically, the goal of a rootkit is to execute malicious activities on a
target system at a later time without the knowledge of the users of that computer.
This malicious software can target the BIOS, boot loader, kernel, system files, and
much more. Rootkits are difficult to detect since they are initiated before the
operating system has fully booted. It might install hidden files, processes, and hidden
user accounts. Because rootkits can be installed in firmware or software, they can
even intercept data from network connections, keyboard input and output,
among others.
Injection Attacks
Click to edit Master title style
• DLL Injection
• Malicious code forces itself to run in place of other benign code
• This "injected" code is usually code written by a third-party
developer, designed to perform some malicious function
• SQLi
• Involves inserting a SQL query through input data from client to
server application and can allow for several exploits
• Read sensitive database data (SELECT FROM)
• Change database data (INSERT, UPDATE, DELETE)
• Defend with input validation and length limits
The injection attack is often the result of MITM exploit or RAT attack. Malware can
inject false MAC or IP addresses.
Injection Attacks
Click to edit Master title style
• LDAP Injection
• The web server accepts input from the client for additional
processing
• The attacker exploits the data not being properly sanitized or
data/commands being sent directly to a back-end database
• The attacks can render sensitive user information or change
information in the LDAP directory
Yersinia for Layer 2 – 7 Injection
Click to edit Master title style
Cross-site Scripting (XSS)
Click to edit Master title style
•
DOM-Based: (Local XSS or Type 0)
•
•
Reflected XSS (Nonpersistent/Type 1)
•
•
Insecurely written HTML page on end
user's system or local gadgets and
widgets
An input trust vulnerability where the
app expects input like a query string,
but the attacker sends something the
developer did not expect
Stored XSS (Persistent or Type 2)
•
A variant of type 1 where, rather
than reflecting the input, the web
server persists the input
DOM-Based: Also called Local XSS or Type 0, Does not involve vulnerable web servers,
Insecurely written HTML page on end user's system or local gadgets and widgets
(Widgets – Apple, Nokia, Yahoo; Gadgets – Microsoft and Google; Also have similar
code in GNOME and KDE (stock tickers, RSS feeds, sports scores, clocks, mini-games,
social networking tools, notifications, etc, and much more)
Allows the attacker to manipulate the DOM through untrusted input and they can
render input that might lead to other XSS vulnerabilities
Reflected XSS (Nonpersistent or Type 1): A classic input trust vulnerability where the
application is expecting some input (i.e. a query string) and the attacker sends
something developer did not expect. Example: attacker provides a JavaScript code
fragment as the querystring and the victim clicks on the link. Prevalent since it's not
feasible to turn off all scripting in browsers.
Stored XSS (Persistent or Type 2): A variant of type 1 where, rather than reflecting the
input, the web server persists the input. The user is served up later to unsuspecting
victims. Difference is an intermediate phase where the untrusted input is stored in a
file or a database before unloading on the victim. Often found in blogs and
review/feedback web applications.
Cross-site Request Forgery (CSRF)
Click to edit Master title style
• CSRF occurs when a malicious web site, blog, email, instant
message, or program causes a web client to do unsolicited actions
on a trusted site for which a user (preferably an administrator) is
presently authenticated
• An effective CSRF/XSRF attack can force users to perform exploits
like changing passwords and email addresses to conducting
transactions such as funds transfers
• If the victim is an administrative or root account, the attack can
affect the entire web site application
Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious
web site, email, blog, instant message, or program causes a user’s web browser to
perform an unwanted action on a trusted site for which the user is currently
authenticated.
Common Application Attacks
Click to edit Master title style
• Cookie storage and transmission
• Buffer overflow and integer overflows
• Memory leaks
• Short lived user-land application
• Long lived user-land application
• Kernel-land process
• Race conditions and TOC/TOU
• The result of an unexpected ordering of events – poor code
design
Cookies typically don’t hold confidential info, but attackers can still use them to
develop well-crafted attacks. For example they can extract a users regular visits to a
banking or brokerage site to support a spear phishing or pharming attack. Cookies
should be securely stored using encryption. Sensitive cookies should be stored
securely on the web server will pointers on the clients.
Buffer overflows take advantage of poorly written applications or operating system
code. Injection of malicious code can be accomplished with a DoS to memory buffers
and addresses or even SQL injection methods. They cause errors or command shells
and programs to run in order to further launch the exploit or deliver the malware.
One example is a packet holding a long string of NOP – no-operation instructions
followed by a command (NOP Slide) that forces the processor to locate where a
command can actually be executed. This can be mitigated with proper input
validation and regular vendor patches and updates.
OWASP = “Arithmetic operations cause a number to either grow too large to be
represented in the number of bits allocated to it, or too small. This could cause a
positive number to become negative or a negative number to become positive,
resulting in unexpected/ dangerous behavior.” SOLUTION Never perform arithmetic
operations on numeric primitives without strict checking for overflow/underflow
conditions. Static analysis can be helpful in checking for possible overflow/underflow
conditions. Some runtime environments automatically check for overflow/underflow
and trigger exceptions, but no mainstream language runtimes used for web
application development currently do this except for some flavors of Python.
A memory leak is unintentional memory consumption where the programmer fails to
free an allocated block of memory when it’s no longer needed. Consider the
following general three cases:
• Short Lived User-land Application: Little if any noticeable effect. Modern operating
system recollects lost memory after program termination.
• Long Lived User-land Application: Potentially dangerous. These applications
continue to waste memory over time, eventually consuming all RAM resources.
Leads to abnormal system behavior
• Kernel-land Process: Very dangerous. Memory leaks in the kernel level lead to
serious system stability issues. Kernel memory is very limited compared to user
land memory and should be handled cautiously.
Race Conditions happen when a piece of code doesn’t function as designed. They are
the result of an unexpected ordering of events, which can lead to the finite state
machine of the code transitioning to a undefined state. It can also cause contention
of more than one thread of execution over the same resource. Multiple threads of
execution acting or manipulating the same area in memory or persisted data which
gives rise to integrity issues. FIX: programmers have to test for race conditions or use
something like OWASP ZAP to test for vulnerabilities.
Time of Check/Time of Use = (OWASP) Time-of-check, time-of-use race conditions
occur when between the time in which a given resource is checked, and the time that
resource is used, a change happens in the resource to invalidate the results of the
check.
Consequences:
• Access control: The attacker can gain access to otherwise unauthorized resources.
• Authorization: race conditions such as this kind may be employed to gain read or
write access to resources which are not normally readable or writable by the user
in question.
• Integrity: The resource in question, or other resources (through the corrupted
one), may be changed in undesirable ways by a malicious user.
• Accountability: If a file or other resource is written in this method, as opposed to
in a valid way, logging of the activity may not occur.
• Non-repudiation: In some cases it may be possible to delete files a malicious user
might not otherwise have access to, such as log files.
Related Controls:
• Design: Ensure that some environmental locking mechanism can be used to
protect resources effectively.
• Implementation: Ensure that locking occurs before the check, as opposed to
afterwards, such that the resource, as checked, is the same as it is when in use.
The most common result of resource exhaustion exploits is denial of service. The
software may slow down, crash due to unhandled errors, or lock out legitimate users.
In some situations, it may be possible to force the software to "fail open" in the event
of resource exhaustion. The state of the software - and possibly the security
functionality - may then be compromised. The aforementioned memory leaks are
forms of RE.
Firmware Vulnerabilities
Click to edit Master title style
• Embedded systems increasingly use software-driven lowpower microprocessors for security-critical settings
• Firmware programs are often written in the C language so
existing source-code analysis tools do not work well for this
• Intel, Apple, and Android still fight this battle among many
other manufacturers and vendors
• Rootkits and tools can modify a computer’s UEFI (Unified
Extensible Firmware Interface) so that it silently reinstalls its
surveillance tool even if the hard drive is wiped clean or
replaced
UEFI is a replacement for the traditional BIOS (Basic Input/Output System) and is
meant to standardize modern computer firmware through a reference specification.
But there are multiple companies that develop UEFI firmware, and there can be
significant differences between the implementations used by PC manufactures.
CryptoMalware
Click to edit Master title style
• CryptoMalware technically applies to any malicious code that
involves encryption and/ decryption during the lifecycle
•
•
•
•
Rogue cryptomining (cryptojacking)
Ransomware
Crypto DDOS
Steganography
The goal of a cryptojacking crypto-malware isn’t to steal data – it is to remain in place
for as long as possible, quietly mining in the background.
Crypto-malware can also impact the DDoS market. Instead of botnet CPUs being used
to generate packets to blackmail the victim, who may or may not pay the ransom, the
DDoS botnet could be repurposed to mine cryptocurrencies, guaranteeing a payoff
for the criminal.
Ransomware Lifecycle
Click to edit Master title style
1. INSTALL
Crypto-ransomware
installs itself after
bootup
2. CONTACT HQ
The installed
malware contacts
a server belonging
to an attacker or
group (C&C)
3. HANDSHAKE
AND KEYS
The ransomware
client and server
"handshake" and the
server generates two
cryptographic keys
4. ENCRYPT
The ransomware
starts encrypting
every file it finds
with common file
extensions
5. EXTORT
A screen displays
giving a time limit to
pay up before the
criminals destroy the
key to decrypt the
files
Ransomware
Click to edit Master title style
Cryptolocker Infection Chain
Click to edit Master title style
This is a Cryptolocker infection chain
Stegomalware
Click to edit Master title style
• Stegomalware uses steganography to
avoid detection
• Steganography is a method of hiding
concealing files, messages, images, or
videos within another file, message,
image, video or network traffic
• Cryptography offers confidentiality – not
steganography
Samples and Case Studies
Click to edit Master title style
•
•
•
•
Rig EK Exploit Toolkit
Facebook Compromise of 2013
WannaCry Ransomware of 2017
Marriot Data Breach of 2018
Rig EK Exploit Toolkit
Click to edit Master title style
• Rig Exploit Kit (EK) is one of the best-known malware and
exploit tools to attack popular applications
• It has been used more recently to launch cryptojacking
campaigns
• Fallout EK, GrandSoft EK, Magnitude EK, Underminer EK,
GreenFlash Sundown EK
Facebook Compromise of 2013
Click to edit Master title style
• Internal Facebook workstations were attacked in 1/2013 due
to insecure Java builds
• Developers went to mobile development site that hosted an
Oracle Java exploit
• Apple and Microsoft were also affected around the same
time
WannaCry Ransomware of 2017
Click to edit Master title style
•
•
•
•
CIA attack spread over 150 nations and over 200,000 devices
Banks, schools, hospitals, municipalities and more
Many organizations decided to pay the $3 - $600+ ransom
Began on 5/12/2017 in Asia using a U.S. born kit (NSA) on
mostly Microsoft systems
WannaCry Ransomware of 2017
Click to edit Master title style
• Multi-layered attack used Eternal Blue against SMBv1 and
DoublePulsar trojan backdoor
• Ping first did diagnostics
• Kill terminated running processes
• Exec loaded ransomware on the victim system
Common WannaCry Characteristics
Click to edit Master title style
• The system could be reached from the Internet
• Security flags and alerts from scanning and enumeration were
ignored
• Exploited unpatched known vulnerabilities
• Systems used weak and long-term credentials
Marriot Data Breach of 2018
Click to edit Master title style
• A data breach of 8.6 million credit cards and over 25 million
passports
• Timeline of breach:
• First active in Q3 of 2014
• Marriot discovered 9/8/18
• Breach reported 11/30/18
• 380 - 500+ records affected and full impact TBD
Marriot implemented:
Free Web Watcher enrollment for customers with free credit monitoring
Created new call centers to deal with calls
Millions spent on new security technology
Thousands of people hours to find root of attack – still ongoing
Internet of Things (IoT)
Click to edit Master title style
• This is the most rapidly emerging global vulnerabilities
• There will soon be billions of IPv4 and IPv6 devices in homes,
offices, retail sites, factories, utility companies, hospitals,
cars, and many other places
• With the explosion of Internet-connected devices, you must
find solutions to connect them and collect, store, analyze, and
secure the device and data
Internet of Things (IoT)
Click to edit Master title style
• IoT developers are building industrial IoT applications for
predictive quality and maintenance as well as the remote
monitoring of operations
• They build connected home applications for automation,
security, monitoring, and home networking
• Some IoT developers are building commercial applications for
traffic monitoring, public safety, and health monitoring
• Eventually everything will be identified with a unique IPv6
address for global end-to-end connectivity
Example: AWS IoT Defender
Click to edit Master title style
AWS IoT Device Defender is a fully managed service that helps you secure your fleet
of IoT devices. AWS IoT Device Defender continuously audits your IoT configurations
to make sure that they aren’t deviating from security best practices. A configuration is
a set of technical controls you set to help keep information secure when devices are
communicating with each other and the cloud. AWS IoT Device Defender makes it
easy to maintain and enforce IoT configurations, such as ensuring device identity,
authenticating and authorizing devices, and encrypting device data. AWS IoT Device
Defender continuously audits the IoT configurations on your devices against a set of
predefined security best practices. AWS IoT Device Defender sends an alert if there
are any gaps in your IoT configuration that might create a security risk, such as
identity certificates being shared across multiple devices or a device with a revoked
identity certificate trying to connect to AWS IoT Core.
Defense in Depth
Click to edit Master title style
• Defense in depth involves
implementing multiple layers of
security to defend property,
facilities, systems, applications,
and data
• Can be physical, logical or
virtual
•
The goal is to protect CIA and
beyond (prevent D.A.D.)
• Security is a continuous
balancing act
• According to the SANS institute,
there are four fundamental
approaches to DiD, based on risk
treatment:
•
•
•
•
Uniform protection
Protected zoning
Information-centric
Analyze threat vectors
Confidentiality vs. Disclosure; Integrity vs. Alteration; Availability vs. Destruction is
often quoted. However, this isn’t the most accurate as the opposite of destruction
would be “Durability”.
Uniform Protection
Click to edit Master title style
• Involves identical controls for all systems
which are deemed to be of equal value
• Assets are not considered to be missioncritical
• A very traditional and common approach at
least as the starting point in the lifecycle
• “Drinking the firewall Kool-Aid”
Protected Zoning
Click to edit Master title style
• Creates logical and physical security domains or zones
• Software-defined-networking using VLANs and PVLANs is a
modern example
• There are interface points between all zones and mediated
access from any public zones (Internet)
• Can also be a secure enclave on a mobile or embedded
device
Zoning
Click to edit Master title style
172
Cloud Service Provider Zoning DiD
Click to edit Master title style
Data or Information-Centric DiD
Click to edit Master title style
Network
Endpoint
Application
Data
At the center is data and information in this model: IP, PII, PHI. But it could be things
stored in a walk-in safe or highly secure room such as where safe deposits boxes are
in a bank. Or perhaps it is an HSM storing Private Keys and Access Keys.
This process involves asset assessment, valuation, labeling (tags), classification, and
handling = risk management.
Could involve elaborate DLP systems and Digital Rights Management solutions
Vector-oriented DiD
Click to edit Master title style
• Identifying all ingress and egress points and all probable
threat agents and specific vectors
• Disable USB fobs
• Block email attachments
• Use DLP engines for IP leakage
• Leverage the threat matrices and risk registers
• Conduct vulnerability and risk assessment with a quantitative
analysis focus
• OpenFAIR is an emerging taxonomy to identify vulnerability and
handle subjectively
NIST Security Strategy
Click to edit Master title style
Understand the Physical Architecture
Click to edit Master title style
• Where is the defensible property boundary?
• Work back to the location of core mission-critical assets
•
•
•
•
•
•
•
Gates and fences
Guards
Lighting and sensors
Bollards
Locks and cameras
All entry/exit points
Service provider junctions and demarcation
Understand the Physical Architecture
Click to edit Master title style
• Diagram the physical topology of the campus with graphical
tools
• Include wireless analysis and topologies
• Document all cable runs and distribution frames
• Map the physical topologies to the logical networking flow
Recognize All Communication Flows
Click to edit Master title style
• Identify all information flows with all possible technologies
•
•
•
•
•
Corporate edge
Email and webmail
Messaging and social media
Telephony and cellular
Bluetooth, RFID, NFC, etc.
• Information flow may also be governed by mandatory access
control architectures
Identify Critical Data
Click to edit Master title style
•
•
•
•
•
Data at rest, in transit, in use
Understand the SAN, NAS solutions
Evaluate all database and storage systems
Abstract data whenever possible
Strict access controls and mediated access
What is Active Defense?
Click to edit Master title style
• Active defense involves an offensive approach to security
defense
• Involves understanding more about how the attack is
performed
• Takes the point of view of the attacker
• Enhances existing technologies
Enhance and augment – not replace technologies
Active Defense Lifecycle
Click to edit Master title style
Phase 1 - Identify Critical Internal Assets
Phase 2 – Provide Environmental Context
Phase 3 – Classify Threat Agents
Phase 4 – Launch Active Threat Campaigns
Spectrum of Attacks and Defenses
Click to edit Master title style
@ Defense Science Board
Main Types of Active Defense
Click to edit Master title style
Deception
Attribution
Counterattack
Deception as Active Defense
Click to edit Master title style
• Slows down or redirects the attacker
• Presents false information
•
•
•
•
Honeypots and honeynets
Evil twin WAPs
Server decoys
DNS fabrication
• Has the lowest impact from a legal perspective but can affect
scanning and pentesting
Attribution as Active Defense
Click to edit Master title style
• Attribution discovers information about the attacker(s) and
their goals or targets
• It is a valuable activity for incident response team members
• It may be ineffective since source addresses are likely spoofed
• It actively uses trace back tools and beaconing software
Counterattack as Active Defense
Click to edit Master title style
• This strategy involves:
• Information gathering
• Seek and disrupt
• Seek and destroy
• Attack back involves the most
negative legal issues
• It has a high degree of risk and
consequences
Honeypots
Click to edit Master title style
• Honeyfiles are bait files strategically placed for attackers to
access (passwords.txt)
• They usually reside on a file server, which will trigger an alert
when read
• These also include honeytokens, honeycreds, honeynets
Tarpits
Click to edit Master title style
•
A Tarpit is a network security technique of delaying inbound
connections to intentionally slow down scanning attacks and spam
• This method can often restrict and discourage spammers from
sending bulk messages towards you
• Tarpits are applied to:
• Networks
• Email (ESMTP)
• Authentication
(Teergube in German). To avoid being tarpitted, a spammer may send bulk emails in
short batches over a relatively longer period than normal.
Decoys
Click to edit Master title style
• Decoys can be honeycreds representing fake privileged
accounts
• They are also decoy IP addresses and honeynets
• Routers and firewalls
• Virtual machines
• They can be TCP and UDP ports on a gateway or server
Jailed Environments
Click to edit Master title style
• A jailed environment is a subcomponent of a host
environment that allows all attackers in
• The authentic environment allows authorized access while
attackers are redirected to the jailed environment for active
defense measures
• This can also be an evil twin wireless environment
Fake DNS Records
Click to edit Master title style
• DNS is a common recon action by attackers
• Bogus DNS records can redirect attackers to honeypot
databases or domain controllers in a jailed subnet
• Often used in combination with other active defense
measures such as decoys
False Headers
Click to edit Master title style
• Various TCP/IP services will offer metadata in headers
• HTTP response, SMTP, and FTP headers are common vectors
• As a countermeasure, remove header data or insert false
information into header
• Example: declare that a web server is running IIS when it is
really running Apache
Service banners are often used by system administrators for inventory taking of
systems and services on the network. The service banners identify the running
service and often the version number too. Banner grabbing is a technique to retrieve
this information about a particular service on an open port and can be used during a
penetration test for performing a vulnerability assessment. When using Netcat for
banner grabbing you actually make a raw connection to the specified host on the
specified port. When a banner is available, it is printed to the console.
Making a Raw Connection with Netcat
Click to edit Master title style
Example: To demonstrate how a raw connection works we issue some FTP commands after
we’re connected to the target host on the FTP service. Let’s then see if anonymous access is
allowed on this FTP server by issuing the USER and PASS command followed by anonymous.
Netcat is the Swiss army knife of networking tools and it can be run standalone or in
Kali Linux as seen here. The most common cracking uses for Netcat are setting up
reverse and bind shells, piping and redirecting network traffic, port listening,
debugging programs and scripts and banner grabbing by making a raw connection to
an FTP or Web server.
https://www.hackingtutorials.org/networking/hacking-with-netcat-part-3-advancedtechniques/
To demonstrate how a raw connection works we will issue some FTP commands after
we’re connected to the target host on the FTP service. Let’s see if anonymous access
is allowed on this FTP server by issuing the USER and PASS command followed by
anonymous.
NIST on User Responsibility
Click to edit Master title style
According to NIST:
"The responsibilities and accountability of owners, providers,
and users of computer systems and other parties concerned
with the security of computer systems should be explicit.
The assignment of responsibilities may be internal to an
organization or may extend across organizational boundaries.
Depending on the size of the organization, the program may be
large or small, even a collateral duty of another management
official."
Enhance and augment – not replace technologies
NIST on User Responsibility
Click to edit Master title style
According to NIST (continued):
"However, even small organizations can prepare a document
that states organization policy and makes explicit computer
security responsibilities.
This element does not specify that individual accountability must
be provided for on all systems.
For example, many information dissemination systems do not
require user identification and, therefore, cannot hold users
accountable."
Enhance and augment – not replace technologies
Acceptable Use Policies (AUP)
Click to edit Master title style
• The most important aspect of the written security policy from
the endpoint perspective is the Acceptable Use Policy (AUP)
• It should be a dynamic published document updated for new
technologies (augmented reality, TikTok, mobile solutions,
etc.)
Endpoint Physical Security
Click to edit Master title style
•
•
•
•
•
•
Computer and laptop locks
Clean desk policies
Visibility screens
Disable unused peripheral ports
Removable device policy
MDM onboarding and offboarding
• Geofencing
• Geotagging
• Remote-wipe
Clean desk = locked drawers, cabinets, and safes
Endpoint Physical Security
Click to edit Master title style
•
•
•
•
•
Use hardware and software multi-factor authentication
Consider biometric authentication
Disconnect and/or remove unused computers
Use client-side and full disk encryption
Employ SSO and/or password managers
Use smart cards and tokens according to AUP
Update Personal Endpoints
Click to edit Master title style
• Update and upgrade the most secure browsers and clients
• Auto-update with digitally signed patches (Java, Adobe,
Zoom, etc.)
• Update and upgrade all anti-x software
• Install manufacturer firmware updates
Browser Best Practices
Click to edit Master title style
• Be certain browser software is
updated
• Manage and disable
unnecessary/malicious plugins
• Always connect using HTTPS
and TLS1.2 or 1.3
• Choose EV validated sites if
possible
• Clear browser histories
automatically
• Use strong passwords and
password managers
• Never store passwords in a
browser
• Disable popups (install
AdBlock)
• Use VPNs and Proxy servers
(Cisco Umbrella)
• Make use of browser security
configurations
Web Safaris for Endpoint Protection
Click to edit Master title style
https://www.sans.org/securityresources/policies/general/pdf/acceptable-use-policy
https://www.quest.com/kace/
https://resources.infosecinstitute.com/best-practices-webbrowser-security/
https://www.sans.org/security-resources/policies/general/pdf/acceptable-use-policy
https://www.quest.com/kace/
https://resources.infosecinstitute.com/best-practices-web-browser-security/
Host-Based IDS
Click to edit Master title style
• Host-based IDS monitors the host system infrastructure
through an installed agent to analyze traffic and log
suspicious and malicious behavior
• HIDS should provide deep visibility into critical systems and
files to detect and respond when anomalous activities are
discovered
• HIDS often works in conjunction with SIEM systems and other
advanced threat intelligence – often using Sec-as-a-Service
(MSSP)
Common HIDS Activities
Click to edit Master title style
• Detect attempts at unauthorized access
• Identify anomalous activities
• Enumerate access and changes to critical files with File
Integrity Monitoring (FIM)
• Protect integrity of data and other host-based assets
• Conduct continuous threat intelligence
• Integrate with other agents (VPN, .1X, OpenDNS, etc.)
Snort – a network IDS
Click to edit Master title style
• Since the late 90’s it has been an open-source solution
• Has a powerful rule language
• New patterns can be used from the community
Alert tcp any any -> 10.10.10.0/24 80 (msg
“ i nbound HTTP Tr af f i c” ;
sid: 3251022;)
Intrusion Prevention Defined
Click to edit Master title style
• Intrusion Prevention Systems (IPS) are proactive inline
systems that have the ability to drop packets and block
attackers before the payload enters the network or host
•
•
•
•
•
Signature-based
Anomaly-based
Heuristic and UBA
Machine-learning
Cloud-based
Host-based IPS
Click to edit Master title style
• A host-based intrusion
prevention system (HIPS) is a
program that is usually
installed on a single host
• It often complements
traditional fingerprint-based
and heuristic antivirus
detection applications as part
of an integrated endpoint
security suite
• When malware or some other
exploit attempts to alter the
system or software, HIPS can
prohibit the action
automatically or alert the end
user to grant permission
• Most endpoint protection
systems are actually IPS
sensors installed on hosts that
can be deployed in IDS or IPS
modes
IPS Tuning
Click to edit Master title style
• True Positive
• Accurate + alarm fires
• True Negative
• Accurate + alarm does not fire
• False Positive
• Error + alarm fires
• False Negative
• Error + alarm does not fire
True positives: The security control, such as an IPS sensor, acted as a consequence of
malicious activity. This represents normal and optimal operation.
True negatives: The security control has not acted, because there was no malicious
activity. This represents normal and optimal operation.
False positives: The security control acted as a consequence of non-malicious activity.
This represents an error, generally caused by too tight proactive controls (which do
not permit all legitimate traffic) or too relaxed reactive controls (with too broad
descriptions of the attack).
False negatives: The security control has not acted, even though there was malicious
activity. This represents an error, generally caused by too relaxed proactive controls
(which permit more than just minimal legitimate traffic) or too specific reactive
controls (with too specific descriptions of the attack).
IEEE 802.1X (PNAC)
Click to edit Master title style
• The 802.1X framework delivers
authentication and authorization
of endpoints attempting to get
network access
• VLAN assignment - the
authentication server can
associate a VLAN with a specific
user or group and instruct the
switch to dynamically assign the
authenticated user into that
VLAN
VLANs = wired, wireless, Guest, Restricted until remediation, full access with
additional EAP (like EAP-TLS using PKI certificates), leverage SSO with directory
service as Identity Provider (OpenLDAP, AD)
IEEE 802.1X (PNAC)
Click to edit Master title style
•
ACL assignment - the authentication server associates an ACL with a
specific user or group and commands the NAD to dynamically
assign the ACL to the session of the user
• Time-based access - the authentication server can control the times
at which the user can connect to the network
• Security group access - security group access provides topologyindependent, scalable access control
• The ingress switches classify data traffic for a specific role and label
the traffic with security group tags
• The egress network devices read the security group tags and
perform filtering by applying the appropriate security group ACLs
to the packets
IEEE 802.1X (PNAC)
Click to edit Master title style
Supplicant
Authentication server
Authenticator
EAPOL-Start
EAP-Request/Identity
RADIUS Access-Request
EAP-Response/Identity
RADIUS Access-Challenge
EAP-Request/OTP
EAP-Response/OTP
RADIUS Access-Request
EAP-Success
Port authorizes
EAPOL-Logoff
Port unauthorized
RADIUS Access -Accept
IEEE 802.1AE (MACsec)
Click to edit Master title style
Guest user without
MACsec supplicant
AES-GCM-128 with GMAC or AES-GCM-256 with GMAC
Endpoint Detection and Response (EDR)
Click to edit Master title style
• Endpoint Detection and Response (EDR) are tools that are
mainly dedicated to detection and investigation of suspicious
activities and indicators of compromise (IoCs) on
hosts/endpoints
• EDR tools monitor endpoint and network events and send
information to a SIEM system or centralized database so
further analysis, investigation, and reporting can take place
Endpoint Detection and Response (EDR)
Click to edit Master title style
• A software agent installed on the host system often provides
the basis for event monitoring and reporting
• EDR systems are more modern than traditional HIDS/HIPS
solutions but considered legacy software compared to newer
next-generation endpoint protection
Key EDR Features
Click to edit Master title style
• Filtering - better solutions excel at filtering out false positives
which can lead to alert fatigue and increasing the possibility
for real threats to go unnoticed
• Advanced Threat Blocking -preventing threats as soon as
detected and throughout the lifecycle of the attack
• Incident Response Capabilities - threat hunting and incident
response can help avert full-scale data breaches to augment
DLP
• Multiple Threat Protection - advanced attacks can overwhelm
endpoints if the installed security solution is not prepared to
handle multiple types of threats simultaneously
Advanced Threat Blocking: Prevent threats as soon as detected and throughout the
lifecycle of the attack. Persistent attacks could eventually overcome security
measures on products with weaker offerings.
Multiple Threat Protection - advanced attacks, or multiple different attacks at once,
can overwhelm endpoints unless the installed security solution is prepared to handle
multiple types of threats at the same time (i.e. ransomware, malware, suspicious
data movements).
Next-generation Endpoint Protection
Click to edit Master title style
• IT hygiene
• Next-generation Antivirus
• Offers verifiable vendor claims
• Doesn’t focus exclusively on IoCs
• Looks for indicators of attack (IoA)
• Managed hunting service
• Threat intelligence
• Cloud-based architecture
IT Hygiene - allows you to identify and close gaps in your environment by offering the
visibility and information your security teams need to implement preemptive actions
and make sure you’re as prepared as possible to face today’s sophisticated threats.
Out-of-date and unpatched applications, credential abuse and employing stolen
credentials are key attack vectors. The ability to discover, patch and update
vulnerable applications and monitor login activities is critical.
Next-Generation Antivirus (NGAV)
Traditional antivirus (AV) solutions boast of up to 99 percent effectiveness, but a gap
of just one percent means 100% probability of a breach by adversaries using either
known or unknown malware. That’s why NGAV can be an important tool, though
finding the right solution can be challenging. A recent blog on this topic outlines the
four steps to choosing the right AV replacement. Among those steps is verifying
vendor claims. Organizations should be wary that some vendors claiming to have
behavioral analytics capabilities offer solutions that focus exclusively on indicators of
compromise (IOCs), which are only present after an attack has occurred. Effective
NGAV must also look for indicators of attack (IOAs) that identify active attacks and
allow you to stop an event before damage is done. This gives you a tremendous
advantage over attackers.
Managed Hunting
At the end of the day, attackers are people and as such, they can be adaptive and
creative — relying on technology alone to thwart them is simply not enough. To be
truly next-gen, a cybersecurity platform should include a managed hunting service.
An elite team can find things your automated response systems may miss. It can learn
from incidents that have taken place, aggregating crowdsourced data and providing
response guidance when malicious activity is discovered. Having expert hunters
working 24/7 on your behalf matches the ingenuity of determined attackers like no
automated technology can.
Threat Intelligence
Because sophisticated adversaries can move so quickly and stealthily, security teams
must receive intelligence that ensures your defenses are automatically and precisely
instrumented throughout your enterprise to stop breaches with minimum impact and
maximum protection. Such threat intelligence needs to provide more than the
tactical advantage of understanding and resolving incidents faster; it must also offer
the proactive alerts and reports that security experts need in order to prioritize their
resources at an operational level.
Cloud-Based Architecture
Delivering these crucial elements can only be accomplished via purpose-built cloud
architecture. The older on-premises model simply isn’t capable of performing the
tasks required of a true next-gen EPP solution, such as collecting a massive, rich data
set in real time, storing it for long periods and thoroughly analyzing it in a timely
manner to prevent breaches. With the cloud, it is possible to store and instantly
search petabytes of data, gaining historical context on any activity running on any
managed system. Many vendors claiming to have a cloud-based solution actually are
still relying on older architectures developed primarily for on-premises systems,
though perhaps retrofitted with some newer "cloud-enabled" features. Such a "bolton" model can never match the performance of a purpose-built, cloud-native
solution.
Endpoint Protection Suites
Click to edit Master title style
• These are all-in-one, full-scale security packages that offer a
single, integrated solution
• There is only one vendor to get the upgrades and updates
from
• Depending on the security vendor, the suite may also include
a two-way firewall, parental control system, a local spam
filter, VPN to protect your data in transit, online backup, and
dedicated ransomware protection
Endpoint Protection Suites
Click to edit Master title style
Endpoint Encryption Products
Click to edit Master title style
Endpoint Encryption Products
Click to edit Master title style
System Logging
Click to edit Master title style
• There are many sources of
system logs in the enterprise:
• Infrastructure devices
• Windows server system,
application, and security logs
• Web, Email, and Unified
Communications services
• Firewalls, IDS/IPS, WAF, and
specialty appliances
• Database and storage
•
•
•
•
•
•
•
•
Messages
Alerts
Traps
Log files
Debugging
Traces
Devices
Log servers
System Logging Concepts
Click to edit Master title style
• Log output can be overwhelming in the beginning
• Filtering and tuning is critical to gathering meaningful metrics
(events and information)
• There are too many standards!
• Some use the Syslog RFC as a standard
Cisco, Microsoft, Juniper, AWS flow logs, Linux builds
Syslog
Click to edit Master title style
• Syslog is a standard defined in IETF RFCs 3164 then 5424
• Messages include:
•
•
•
•
•
•
Time stamps
Event messages
Severity level (0-7)
Host IP addresses
Diagnostics
And more
Syslog is a standard for sending and receiving notification messages–in a particular
format–from various network devices. The messages include time stamps, event
messages, severity, host IP addresses, diagnostics and more. In terms of its built-in
severity level, it can communicate a range between level 0, an Emergency, level 5, a
Warning, System Unstable, critical and level 6 and 7 which are Informational and
Debugging.
Moreover, Syslog is open-ended. Syslog was designed to monitor network devices
and systems to send out notification messages if there are any issues with
functioning–it also sends out alerts for pre-notified events and monitors suspicious
activity via the change log/event log of participating network devices.
The Syslog protocol was initially written by Eric Allman and is defined in RFC 3164.
The messages are sent across IP networks to the event message collectors or syslog
servers. Syslog uses the User Datagram Protocol (UDP), port 514, to communicate.
Although, syslog servers do not send back an acknowledgment of receipt of the
messages. Since 2009, syslog has been standardized by the IETF in RFC 5424.
Syslog on a Cisco Device
Click to edit Master title style
Syslog on a Cisco Device
Click to edit Master title style
Syslog on a Cisco Device
Click to edit Master title style
Syslog on a Cisco Device
Click to edit Master title style
Syslog on a Cisco Device
Click to edit Master title style
Syslog on a Cisco Device
Click to edit Master title style
Log Distinctives to Remember
Click to edit Master title style
• Logs are critical records for metrics, indicators,
documentation, reporting, and governance
• Servers should be in a high-availability or cluster solution
• Logging may be a component of larger SIEM system or cloudbased analysis tool
Build a Basic Linux Log Server
Click to edit Master title style
1. Build a Linux server on a network, virtual environment, or
cloud service provider virtual network (AWS VPC)
2. Place in the same VLAN as devices generating logs
3. Allow SSH (TCP 22) and Syslog (TCP/UDP 514) access only
4. Forward syslog logs to the server IP address from Linux
source devices by modifying /etc/syslog.conf files
5. On Syslog server, change syslog.conf to send logs to files or
backend storage
6. Configure logrotate.conf on server to retain logs
Key Log Reporting Activity
Click to edit Master title style
• Authentication and
authorization
• Failures and critical errors
• Malware activities (IoC/IoA)
• Modification and change
reports
• Network activity
• Resource access
• Never Before Seen (NBS)
analytics reporting
Download