Uploaded by zoroxzoroxp

messer

advertisement
James "Professor" Messer
Professor Messer's
SY0-601 CompTIA
Security+ Course Notes
11
11
James Professor Messer
http://www. ProfessorMesser.com
Professor Messer's SY0-601 CompTIA Security+ Course Notes
W ritten by James "Professor" Messer
Copyright© 2020 by M esser Studios, LLC
http://www.ProfessorMesser.com
All rights reserved. No part of this book may be reproduced or t ransmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage and retrieval
system, without written perm ission from the publisher.
First Edition: November 2020
This is version 1.05
Trademark Acknowledgments
All product names and trademarks are the property of their respective ow ners,
and are in no w ay associated or affiliated with Messer Studios, LLC.
"Professor Messer" is a registered trademark of Messer Studios LLC.
"Com p TIA" and " Securit y+" are registered trademarks of Comp TIA, Inc.
Warning and Disclaimer
This book is designed to provide information about the Comp TIA SY0-601 Security+ certification exam.
However, there may be typographical and/or content errors. Therefore, this book should serve only as a
general guide and not as the ultimate source of subject information. The author shall have no liability or
responsibility to any person or entity rega rding any loss or damage incurred, or alleged to have incurred,
directly or indirectly, by the information contained in this book.
Contents
1.0 - Attacks, Threats, and Vulnerabilities ...................................................................................
.
1
1.1 - Phishing·············· ................................................................................................................................................................................................................................1
1.1 - Impersonation
............................................................................................................................1
1.1 - Dumpster Diving .................................................................................................................................................................................................................2
1.1- Shoulder Surfing.................................................................................................................................................................................................................2
1.1 - Hoaxes. ................. .................
3
1.1 - Watering Hole Attacks ...............................................................................................................................................................................................3
1.1 - Spam
3
1.1 - Influence Campaigns............................................................................ ..... .. ...................................................................................
...4
1.1 - Other Social Engineering Attacks................................................................................................................................................................--4
1.1- Principles of Social Engineering.
............
5
1.2 -An Overview of Malware ........................................................................................................................................................................................5
1.2 - Viruses and Worms
1.2 - Ransomware and Crypto-malware. ...................................................... ...... . ............................................................................7
1.2 - Trojans and RATs...................................................................................................................................................................................................................7
1.2 - Rootkits. ..............................................................................................................................................................................................................................................8
1.2 - Spyware. ......
1.2 - Bots and Botnets
..................................................................................................................8
1.2 - Logic Bombs.............................................................................................................................................................................................. .....
...........9
1.2 - Password Attacks. ···························································----····················································································································9
1.2 - Physical Attacks..................................................................................................................................................................................................................10
1.2 - Adversarial Artificial Intelligence
........................................................................................................................................11
1.2 - Supply Chain Attacks..................................................................................................................................................................................................11
1.2 - Cloud-based vs. On-Premises Attacks..............................................................................................................................................12
1.2 - Cryptographic Attacks..............................................................................................................................................................................................12
1.3 - Privilege escalation .......................................................................................................................................................................................................12
1.3 - Cross-site Scripting .....................................................................................................................................................................................................13
1.3 - Injection Attacks.
..................................................................................................................13
1.3 - Buffer Overflows.............................................................................................................................................................................................................14
1.3 - Replay Attacks....................................................................................................................................................................................................................14
1.3 - Request Forgeries...........................................................................................................................................................................................................15
1.3 - Driver Manipulation ....................................................................................................................................................................................................16
1.3 - SSL Stripping
........................17
1.3 - Race Conditions.................................................................................................................................................................................................................17
1.3 - Other Application Attacks................................................................................................................................................................................18
1.4 - Rogue Access Points and Evil Twins....................................................................................................................................................19
1.4 - Bluejacking and Bluesnarfing ············ ...........................................................................................................................................................19
1.4 - Wireless Disassociation Attacks.
......19
1.4 - Wireless Jamming.........................................................................................................................................................................................................20
1.4 - RFID and NFC Attacks................................................................................................................................................................................................20
1.4 - Randomizing Cryptography ............................................................................................................................................................................20
1.4 - On-Path Attacks ................................................................................................................................................................................................................21
1.4 - MAC Flooding and Cloning_
21
1.4 - DNS Attacks
........ .21
1.4 - Denial of Service...............................................................................................................................................................................................................22
1.4 - Malicious Scripts
..........23
......................23
1.5 - Attack Vect ors.......................................................................................................................................................................................................................24
1.5 - Threat Intelligence .........................................................................................................................................................................................................25
1.5 - Threat Research...............................................
26
1.6 - Vulnerability Types........................................................................................................................................................................................................27
1.6 - Third- party Risks...............................................................................................................................................................................................................28
1.6 - Vulnerability Impacts...............................................................................................................................................................................................29
1.7 - Threat Hunting ..................................................................................................................................................................................................................30
1.7 - Vulnerability Scans
.30
1.5 - Threat Actors............................
1.7 1.8 1.8 1.8 -
Securit y Information and Event Management ..................................................................................................................31
Penetration Testing.....................................................................................................................................................................................................32
Reconnaissance...............................................................................................................................................................................................................32
Securit y Teams ....................................................................................................................................................................................................................33
2.0 - Architecture and Design.............................................................................................................................................................................33
2.1
2.1
2.1
2.1
-
Configuration Management........................................................................................................................................................... .. .33
Protecting Dat a...................................................................................................................................................................................................................34
Data Loss Prevention .................................................................................................................................................................................................35
Managing Security
..
.35
2.1
2.1
2.2
2.2
-
Site Resiliency
..........................................................................................................36
Honeypots and Deception................................................................................................................................................................................37
Cloud Models.......................................................................................................................................................................................................................37
Edge and Fog Computing
....................................38
2.2
2.2
2.2
2.3
2.3
2.3
2.3
- Designing the Cloud ................................................................................................................................................................................................... 39
- Infrastructure as Code.......................................................................................................................................................................................... 40
- Virtualization Securit y ............................................................................................................................................................................................41
- Secure Deployments................................................................................................................................................................................................. 41
- Provisioning and Deprovisioning ........................................................................................................................................................... 42
- Secure Coding Techniques
............................................................................................................................................................ 42
- Software Diversity
.............. ...............
43
2.3 - Automation and Scripting.................................................................................................................................................. ........ ... ...44
2.4 - Authentication Methods..................................................................................................................................................................................... 44
2.4 - Biometrics .................................................................................................................................................................................................................................. 45
2.4 - Multi-fact or Authentication ..........................................................................................................................................................................46
2.5 - Disk Redundancy ............................................................................................................................................................................................................ 47
2.5 - Network Redundancy ........................................................................................................................................................................................... 47
2.5 - Power Redundancy.................................................................................................................................................................................................... 47
2.5 - Replication.
48
2.5 - Backup Types ..................................................................................................................................................................................................................... 48
2.5 - Resiliency
49
2.6 - Embedded Systems............................................................................................................................ ......
...... ........ ... ............50
2.6 - Embedded Systems Communication...............................................................................................................................................51
2.6 - Embedded Systems Constraints
..........
............ .52
2.7 - Physical Security Controls
................................................................................................................................................................52
2. 7 - Secure Areas...........................................................................................................................................................................................................................54
2. 7 - Secure Data Destruction.
... ...
55
2.8 - Cryptography Concepts..................................................................................................................... ..... . ........................................................55
2.8 - Symmetric and Asymmetric Cryptography_ .................................................................................................................................56
2.8 - Hashing and Digital Signatures.
57
2.8 - Cryptographic Keys
2.8 - Steganography_
58
................ ...............
59
2.8 - Quantum Computing................................................................................................................................................................ ... ....................59
2.8 - Stream and Block Ciphers......................................................................................................................................................................................60
2.8 - Blockchain Technology_ .................................................................................................................................................................................................61
2.8 - Cryptography Use Cases ............................................................................................................................................................................................62
2.8 - Cryptography Limitations .........................................................................................................................................................................................63
3.0 - Implementation
3.1 - Secure Protocols ....................................................................................................................................................................................................................63
3.2 - Endpoint Protection ..........................................................................................................................................................................................................65
3.2 - Boot Integrit y_ .............................................................................................................................................................................................................................65
3.2 - Database Security .............................................................................................................................................................................................................66
3.2 - Application Security........................................................................................................................................................................................................67
3.2 - Application Hardening ..................................................................................................................................................................................................68
3.3 - Load Balancing .......................................................................................................................................................................................................................69
3.3 - Network Segmentation ................................................................................................................................................................................................69
3.3 - Virtual Private Networks............................................................................................................................................................................................70
3.3 - Port Security...............................................................................................................................................................................................................................73
3.3 - Secure Networking .........................................................................................................................................................................................................74
3.3 - Firewalls ...........................................................................................................................................................................................................................................75
3.3 - Network Access Control ..............................................................................................................................................................................................76
3.3 - Proxies.
...........................................76
3.3 - Intrusion Prevention.......................................................................................................................................................................................................77
3.3 - Other Network Appliances..................................................................................................................................................................................78
3.4 - Wireless Cryptography ...............................................................................................................................................................................................79
3.4 - Wireless Authentication Methods
...............................................................................................................79
3.4 - Wireless Authentication Protocols.............................................................................................................................................................80
3.4 - Installing Wireless Networks.............................................................................................................................................................................81
3.5 - Mobile Networks...................................................................................................................................................................................................................82
3.5 - Mobile Device Management. ............................................................................................................................................................................83
3.5 - Mobile Device Security_ ................................................................................................................................................................................................84
3.5 - Mobile Device Enforcement.................................................................................................................................................................................85
3.5 - Mobile Deployment Models..............................................................................................................................................................................86
3.6 - Cloud Security Controls ..............................................................................................................................................................................................86
3.6 - Securing Cloud Storage ..............................................................................................................................................................................................87
3.6 - Securing Cloud Networks..........................................................................................................................................................................................87
3.6 - Securing Compute Clouds.................................................
.................................................................................................................................88
3.6 - Cloud Security Solutions...........................................................................................................................................................................................88
3. 7 - Identit y Controls ....................................................................................................................................................................................................................89
3.7 - Account Types............................................................................................................................................................................................................................89
3.7 - Account Policies
3.8
3.8
3.8
3.8
- Authentication Management.............................................................................................................................................................................91
- PAP and CHAP ..............................................................................................................................................................................................................................91
- Identity and Access Services .................................................................................................................................................................................92
- Federated Identities
.........93
3.8
3.9
3.9
3.9
3.9
- Access Control..........................................................................................................................................................................................................................93
- Public Key Infrastructure.........................................................................................................................................................................................94
- Certificates .......................................................................................................................................................................................................................................95
- Certificate Formats..............................................................................................................................................................................................................96
- Certificate Concepts ..........................................................................................................................................................................................................97
4.0 - Operations and Incident Response
4.1 - Reconnaissance Tools
.98
4.1 - File Manipulation Tools.
.............................................................................................................................................................................99
4.1 - Shell and Script Environments.
100
4.1
4.1
4.2
4.2
4.2
- Packet Tools................................................................................................................................................................................................................................100
- Forensic Tools..........................................................................................................................................................................................................................101
- Incident Response Process ..................................................................................................................................................................................101
- Incident Response Planning....
.....103
- Attack Frameworks
104
4.3
4.3
4.3
4.3
4.4
- Vulnerabilit y Scan Output.....................................................................................................................................................................................104
- SIEM Dashboards .................................................................................................................................................................................- -..........105
- Log files ............................................................................................................................................................................................................................................105
- Log Management ...............................................................................................................................................................................................................106
- Endpoint Security Configuration
107
4.4
4.5
4.5
4.5
4.5
- Security Configurations...........................................................................................................................................................................................107
- Digital Forensics...................................................................................................................................................................................................................108
- Forensics Data Acquisition ...................................................................................................................................................................................109
- On-Premises vs. Cloud Forensics
...................................................................................................................110
- Managing Evidence.
111
5.0 - Governance, Risk, and Compliance ...............................................................................................
..111
5.1 - Security Controls .................................................................................................................................................................................................................111
5.2 - Security Regulations and Standards....................................................................................................................................................112
5.2 - Security Frameworks.
112
5.2 - Secure Configurations.................................................................................................................................................................................................113
5.3 - Personnel Security .........................................................................................................................................................................................................114
5.3 - Third-party Risk Management
.115
5.3 - Managing Data ...................................................................................................................................................................................................................116
5.3 - Credential Policies
116
5.3
5.4
5.4
5.4
5.5
5.5
- Organizational Policies.................................................................................................................................................................................................117
- Risk Management Types...........................................................................................................................................................................................117
- Risk Analysis ..............................................................................................................................................................................................................................118
- Business Impact Analysis
.119
- Privacy and Data Breaches
119
- Data Classifications
..... ................................................................................................120
5.5 - Enhancing privacy.............................................................................................................................................................................................................120
5.5 - Data Roles and Res ponsibilities...................................................................................................................................................................121
Introduction
Information technology security is a significant concern for every IT specialist. Our systems are under
const ant attack, and the next generation of security professionals will be at t he forefront of keeping our
critical information safe.
CompTIA's Security+ exam tests you on t he specifics of net work security, vulnerabilities and threats,
cryptography, and much more. I've created these Course Notes t o help you through the det ails t hat you need
to know for the exam. Best of luck with your studies!
- Professor Messer
The Comp TIA Security+ certification
To earn the Security+ certification, you must pass a single SY0-601 certification exam. The exam is 90 minut es
in duration and includes both multiple choice questions and performance-based questions. Performancebased questions can include fill-in-the-blank, mat ching, sorting, and simulated operational environment s.
You will need to be very familiar wit h t he exam topics to have the best possible exam result s.
Here's the breakdown of each technology section and the percentage of each topic on the SY0-601 exam:
Section
Section
Section
Section
Section
1.0 - Attacks, Threats, and Vulnerabilities - 24%
2.0 - Architecture and Design - 21%
3.0 - Implement ation - 25%
4.0 - Operations and Incident Response - 16%
5.0 - Governance, Risk, and Compliance - 14%
CompTIA provides a det ailed set of exam objectives that provide a list of everything you need to know before
you take your exam. You can find a link to t he exam objectives here:
https://professormesser.com/objectives/
How to use this book
Once you're comfortable with all of the sections in the official CompTIA SY0-601 exam objectives, you can
use t hese notes as a consolidated summary of the most import ant t opics. These Course Notes follow the
same format and numbering scheme as t he exam objectives, so it should be easy to cross reference these
notes wit h t he Professor Messer video series and all of your other study materials. The CompTIA Security+
video training series can be found on the Professor Messer websit e at https://ProfessorMesser.com.
Professor Messer's
CompTIA Security+
SY0-601 Course Notes
pJ Professor
http://www.ProfessorMesser.com
1.1 - Phishing
Phishing
• Social engineering with a touch of spoofing
- Oft en del ivered by email, text, etc.
- Very remarkable wh en w ell done
• Smishing (SMS phishing) is done by text message
- Spoofing is a problem here as w ell
- Forward s li nks or asks for personal information
• Usually t here's someth ing not quite right
- Spelling, fon ts, graphics
• Variations on a t heme
- The fake check scam, phone verification code scam,
- Boss/ CEO scam, advance-fee scam
- Some great summaries on
https://reddit.com / r/ Scams
Tricks and misdirection
• How are they so successful?
- Digital slight of hand - it fools the best of us
Finding the best spot to phish
• Reconnaissance
- Gat her information on the victim
• Typosquatting
- A type of URL hijacking - https://professormessor.com
- Prepending: https://pprofe ssormesser.com
• Background information
- Lead generation sites
- Linked In, Tw itter, Facebook, lnstagram
- Corporate w eb sit e
• Don't be fooled
- Check t he URL
• Pret exting
- Lying to get information
- Attacker is a character in a situation they create
- Hi, w e' re calling from Visa regarding an automated
payment to your uti lity service ...
Pharming
• Redirect a legit w ebsite to a bogus site
- Poisoned DNS server or cli ent vulnerabilities
• Combine pharming with phishing
- Pharming - Harvest large groups of people
- Ph ish ing - Coll ect access credentials
• Diffi cu lt for anti-malw are softw are to stop
- Everything ap pears legitimate to the user
Phishing with different bait
• Vishing (Voice phish ing) is done
over the phone or voice mai l
- Caller ID spoofi ng is common
- Fake securit y checks or bank updates
• Attacker builds a bel ievable pret ext
- Where you w ork
- Where you bank
- Recent financial transactions
- Family and frien ds
Spear phishing
• Targeted phish ing w ith inside information
- Makes the attack more beli evab le
• Spear phish ing the CEO is "whaling"
- Targeted phish ing w ith t he possibilit y of a large catch
- The CFO (Chief Financial Offi cer) is commonly speared
• These executives have direct access to
the corporate ba nk account
- The attackers w ou ld love to have those credentials
1.1- Impersonation
The pretext
• Before the attack, the trap is set
- There's an actor and a story
Impersonation
• Attackers pretend to be someone they aren't
- Halloween for t he fraudsters
• "Hello si r, my name is Wendy and I'm from M icroso ft
Windows. Th is is an urgent check up call for your
com puter as w e have found several problems w ith it."
• Use some of t hose details from reconnaissance
- You can trust me, I'm w ith your help desk
• Attack the victim as someone higher in rank
- Office of the Vice President for Scamming
• Voice mail : " This is an enforcement action executed by
the US Treasury intending your serious attention."
• "Congratulations on you r excellent payment history! You
now qualify for 0% interest rates on all of you r credit
card accounts."
© 2020 Messer Studios, LLC
• Throw tons of technical details around
- Catastrophic feedback due to the
depolarization of t he differential magnetometer
• Bea buddy
- How about those Cu bs?
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 1
https://ProfessorMesser.com
1.1 - Impersonation (continued)
Eliciting information
• Extracting information from the victim
- The victim doesn't even reali ze this is happening
- Hacking the human
Protect against impersonation
• Never volunteer information
- My password is 12345
• Don't disclose personal details
- The bad guys are tricky
• Often seen w ith vish ing (Voice Ph ish ing)
- Can be easier to get th is information over the phone
• Alw ays veri fy before revea ling info
- Cal l back, verify through 3rd parties
• These are w ell-documented psychological techniques
- They can't just ask, "So, w hat's your password?"
• Veri fication shou ld be encouraged
- Especially if you r organization ow ns
valua ble information
Identity fraud
• Your identity can be used by others
- Keep your person al information safe !
• Credit card fra ud
- Open an account in you r name, or use your credit card information
• Ban k fraud
- Attacker ga ins access to you r account or opens a new account
• Loan fraud
- Your information is used for a loan or lease
• Government benefits fraud
- Attacker obtains benefits on your behalf
1.1- Dumpster Diving
Dumpster diving
• Mobil e garbage bin
- United States brand name " Dumpster"
- Similar to a rubbish skip
• Important information throw n out with the trash
-Thanks for bagging you r garbage for me !
• Gather details that can be used for a different attack
- Impersonate names, use phone numbers
• Tim ing is important
- Just after end of month, end of quarter
- Based on pickup schedu le
Is it legal to dive in a dumpster?
• I am not a lawyer.
- In the United States, it's legal
- Unless there's a local restriction
• If it's in the trash, it's open season
- Nobody ow ns it
• Dumpsters on pri vate property or "No Trespassing"
signs may be restricted
- You can't break the law to get to the rubbish
• Questions? Talk to a lega l professional.
Protect your rubbish
• Secure your garbage
- Fence and a lock
• Shred your documents
- This w il l on ly go so far
- Governments burn the good stuff
• Go look at your trash
- What's in there?
1.1- Shoulder Surfing
Shoulder surfing
• You have access to important information
- Many people w ant to see
- Curiosity, industrial espionage, competitive advantage
• Th is is surprisingly easy
- Airports/ Flights
- Hallway-facing monitors
- Coffee shops
• Surf from afar
- Binocu lars/ Telescopes
- Easy in the big city
- Webcam monitoring
© 2020 Messer Studios, LLC
• Preventing shoulder surfing
• Control your input
- Be aw are of your surroundings
• Use privacy filters
- It's amazing how w ell they w ork
• Keep your monitor out of sight
- Aw ay from w indow s and hallways
• Don't sit in front of me on your flight
- I can't hel p myself
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 2
https://ProfessorMesser.com
1.1- Hoaxes
Computer hoaxes
• A threat that doesn't actually exist
- But they seem like they COU LD be real
De-hoaxing
• It's the Internet. Believe no one.
- Consider the source
• Sti ll often consume lots of resources
- Forwarded email messages, printed memorandums, w asted time
• Cross reference
- http://www. hoax-slayer.net
- http://www.snopes.com
• Spam filters can help
- There are so many other w ays .. .
• Often an email
- Or Face book w all post, or t weet, or...
• Some hoaxes w ill take your money
- But not through electronic means
• A hoax about a virus can w aste as much time as a regular vi rus
• If it sounds too good to be true .. .
- So many sad stories
1.1- Watering Hole Attacks
Watering Hole Attack
• What if your netw ork w as really secure?
- You didn't even plug in that USB key
from the parking lot
Because that's where the money is
• January 2017
• Polish Fin ancia l Supervision Authorit y, National Banking
and Stock Comm ission of Mexico, State-ow ned
bank in Uruguay
- The w atering hole w as sufficiently poisoned
• The attackers can't get in
- Not responding to phishing emails
- Not opening any email attachments
• Visiting the site w ould download ma li cious JavaScript files
- But on ly to IP addresses matching ban ks and
other financial institutions
• Have the mountain come to you
- Go where the mountain hangs out
- The w atering hole
- This req uires a bit of research
• Did the attack w ork?
- We still don't know
Executing the watering hole attack
• Determ ine w hich w ebsite the victim group uses
- Educated guess - Local coffee or sandw ich shop
- Industry-related sites
Watching the watering hole
• Defense-in-depth
- Layered defense
- It 's never one th ing
• Infect one of these th ird-party sites
- Site vulnerabil ity
- Email attachments
• Infect all visitors
- But you're just looking for specific victims
- Now you're in!
• Firew alls and IPS
- Stop the netw ork traffic before things get bad
• Anti-virus/ Anti-ma lw are signature updates
- The Polish Financial Supervision Authority attack code
w as r ecognized and stopped by generic signatures in
Syma ntec's anti-virus softwar e
1.1- Spam
Spam
• Unsol icited messages
- Email, forums, etc.
- Spam over Instant Messaging ($PIM }
Mail gateways
• Unsoli cited email
- Stop it at the gatew ay before it reaches the user
- On-site or cloud-based
• Various content
- Commercial advertising
- Non-commercia l proselytizing
- Ph ish ing attempts
Identifying spam
• Allow ed list
- Only receive email from trusted senders
• Significant technology issue
- Security concerns
- Resource utilization
- Storage costs
- Managing the spam
• SMTP standard s checking
- Block anything that doesn't follow RFC standards
• rDNS - Reverse DNS
- Block ema il w here the sender's domain doesn't match the IP
address
• Tarpitting
- Intentionally slow dow n the server conversation
• Recipient filtering
- Block all email not addressed to a valid recipient ema il address
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 3
https://ProfessorMesser.com
1.1 - Influence Campaigns
Hacking public opinion
• Influence cam paigns
- Sw ay public opinion on political and social issues
Hybrid warfare
• Milit ary strategy
- A broad description of the techniques
- Wage w ar non-t raditionally
• Nation-state actors
- Divide, distract, and persuade
• Not a new concept
- The Internet adds new methods
• Advertising is an option
- Buy a voice for you r opinion
• Cyberwarfare
- Attack an entity w ith technology
• Enabled through Social media
- Creating, sha ring, liking
- Ampl ifi cation
• Influence w ith a m ilitary spin
- Influencing foreign elections
- " Fa ke new s"
-....
Create fake users
Post on social media
Real users share the message
\ I
I
Amplify message
\
Mass media picks up the story
1.1 - Other Social Engineering Attacks
Tailgating
• Use an authorized pers on to gain unauthorized
access to a building
- Not an accident
• Johnny Long / No Tech Hacking
- Blend in with cloth ing
- 3rd-party with a legitimate reason
- Temporarily take up smoki ng
- I sti ll prefer bringing doughnuts
• Once inside, there's little to stop you
- Most security stops at the border
Watching for tailgating
• Policy for visitors
- You should be able t o identify anyone
• One scan, one person
- A matter of policy or mechanica lly required
• Mant rap / Airlock
- You don't have a choice
• Don't be afraid to ask
- Who are you and w hy are you here?
© 2020 Messer Studios, LLC
Invoice scams
• Starts w ith a bit of spear phish ing
- Attacker know s w ho pays the bills
• Attacker sends a fake invoice
- Domain renew al, toner cartridges, etc.
- From : address is a spoofed version of the CEO
• Accounting pays the invoice
- It w as from the CEO, after all
• M ight also include a lin k to pay
- Now the attacker has payment details
Credential harvesting
• Also called passw ord harvesting
- Attackers col lect login credentials
• Ther e are a lot of stor ed credentials on your computer
- The attacker w ould like those
- Chrome, Firefox, Outlook, Windows Credential M anager, etc.
• User receives an email wit h a ma licious M icrosoft Word doc
- Opening the document runs a macro
- The macro downloads credentia l-ha rvesting ma lw are
• User has no idea
- Everything happens in the background
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 4
https://ProfessorMesser.com
1.1 - Principles of Social Engineering
Effective social engineering
• Constantly changing
- You never know what they'll use next
• May involve mu ltiple people
- And mu ltiple organizations
- There are ties connecting many organizations
• May be in person or electronic
- Phone calls from aggressive "customers"
- Emai led funeral notifications of a friend or associate
Socia l engineering principles
• Authorit y
- The social engineer is in charge
- I'm calling from the help desk/ office of the CEO/police
• Intimidation
- There will be bad things if you don' t help
- If you don't help me, the payroll checks
w on't be processed
• Consensus / Social proof
- Convince based on what's norma lly expected
- Your co-w orker Jill did th is for me last w eek
• Scarcity
- The situation will not be this w ay for long
- Must make the change before time expires
How I Lost My $50,000 Twitter Username
• Naoki Hiroshima - @N
- https :// professormesser.l i nk/tw ittername
• Attacker calls PayPal and uses socia l engineering to get
the last four digits of the credit card on fil e
• Attacker calls GoDaddy and tells them he lost the card,
so he can' t properly validate. But he has the last four,
does that help?
- GoDaddy let the bad guy guess the first
t w o digits of the card
- He w as allow ed to keep guessing until he got it right
- Social engineering done really, really w ell
How to st ea l a $50,000 Tw itter name
• Attacker is now in control of every domain name
- And there w ere some good ones
• Attacker extorts a sw ap
- Domain control for @N
- Ow ner agrees
• Tw itter review ed the case for a month
- Eventually restored access to @N
• How I Lost My $50,000 Tw itter Username
- https :// professormesser.l i nk/tw ittername
• Urgency
- Works alongside scarcity
- Act quickl y, don't think
• Familiarity/ Liking
- Someone you know, w e have common friends
• Trust
- Someone w ho is safe
- I'm from IT, and I'm here to help
1.2 - An Overview of Malware
Malware
• Malicious software
- These can be very bad
• Rootki t
• Keylogger
• Gather information
- Keystrokes
• Botnet
• Participate in a group
- Controll ed over the ' net
• Show you advertising
- Big money
• Viruses and w orms
- Encrypt you r data
- Ruin you r day
Malware Types and Methods
• Viruses
• Crypto-malware
• Ransomw are
• Worms
• Trojan Horse
© 2020 Messer Studios, LLC
• Ad w are/ Spyware
How you get malware
• These all w ork together
- A w orm takes advantage of a vu lnerability
- Insta lls malw are that includes a remote access
backdoor
- Bot may be installed later
• Your computer must run a program
- Email link - Don't click links
- Web page pop-up
- Drive-by dow nload
- Worm
• Your computer is vulnerable
- Operating system - Keep your OS updated !
- Applications - Check with the publisher
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 5
https://ProfessorMesser.com
1.2 - Viruses and Worms
Virus
• Malware that can r epro duce itself
- It needs you to execute a program
• Scri pt viruses
- Operating system and browser-based
• Reproduces through file systems or t he netw ork
- Just running a program can spr ead a virus
• M acro viruses
- Common in M icroso ft Office
• M ay or may not cause problems
- Some viruses are invisible, some ar e annoying
Fileless virus
• A stealth attack
- Does a good j ob of avoidi ng anti-virus detection
• Anti-virus is very common
- Thousands of new viruses every w eek
- Is you r signature file updated ?
• Operates in memory
- But never installed in a file or application
Virus types
• Program viruses
- It 's part of the application
• Boot sector viruses
- Who needs an OS?
Fileless virus
infection process
---+
User clicks on
malicious
website link
---+
Website exploits a
Flash/Java/Windows
vulnerability
Launches PowerShell
and downloads
payload in RAM
Worms
• Malware that self-repl icates
- Doesn't need you to do anything
- Uses the netw ork as a transm ission medium
- Self-propagates and spreads quickly
0
Infected computer
searches for
vu lnerable system
a-
!
~.
--~·
;r
r
....
.,,
•;
..
~
,
~
~
-. ,~_~
"
-
,,
.
-~
,
-
-.
Runs PowerShell scripts
and executables in memory,
exfi ltrates data, damages files
Adds an
auto-start
to Registry
• Worms are pretty bad things
- Can take over many systems very quickly
• Firew alls and IDS/IPS can mitigate
many w orm infestations
- Doesn't help much once t he w orm gets inside
. . Vulnerable
--------------1►► ~ computer
is exploited
---- ~½~
0
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 6
https://ProfessorMesser.com
1.2 - Ransomware and Crypto-malware
Your data is valuable
• Personal data
- Family pictur es and videos
- Important documents
Crypto-malware
• A new er generation of ransom w are
- Your data is unavailable until you provide cash
• Organization data
- Planning documents
- Employee persona lly identifiable information (PII)
- Financial information
- Company private data
• How much is it w orth?
- There's a number
Ransomware
• The attackers w ant your money
- They'll take you r computer in the meantime
• May be a fake ransom
- Locks your computer "by the police"
• The ransom may be avoided
- A security professional may be able to r emove
these kinds of malwar e
• Ma lw are encrypts your data files
- Pictures, documents, music, movies, etc.
- Your OS r emains available
- They w ant you runn ing, but not w orking
• You must pay the bad guys to obtain the decryption key
- Untraceable paym ent system
- An unfortunate use of public-key cryptography
Protecting against ransomware
• Al w ays have a backup
- An offline backu p, idea lly
• Keep you r operating system up to date
- Patch those vulnerabil ities
• Keep you r applications up to date
- Security patches
• Keep you r anti-virus/ anti-malware signatur es up to date
- New attacks every hou r
• Keep everything up to date
1.2 - Trojans and RATs
Trojan horse
• Used by the Greeks to capture
- Troy from the Trojans
- A digital w ooden horse
Remote Access Trojans (RATs)
• Remote Administration Tool
- The ultimate backdoor
- Administrative control of a device
• Softw are that pretends to be something else
- So it can conquer you r computer
- Doesn' t reall y care much about r eplicating
• Malw are installs the server/ service/host
- Attacker connects w ith the client softwar e
• Circumvents your existing security
- Anti-virus may catch it w hen it runs
- The better Trojans ar e built to avoid and disa ble AV
• Once it's inside it has free reign
- And it may open the gates for other programs
Potentially Unwanted Program (PUP)
• Identifi ed by anti-virus/anti-mal w are
- Potentially undesirable softw are
- Often insta lled along with other softw are
• Overly aggressive browser tool bar
-..
rb~•~.W,,ituw~iouol • ~
::~~ ·,i:.="" •-i..- ~-...-
~----··-.
....... 'Si.~
· :-:.:
.
arr cr •
...... ,., . .'l
_ _ _ _ _,:,..
are
a
4
,_.,
·~·-.~": --- -J.i;~c.-
.-
• A backup utility that displays ads
!=.:
;
0',(#
·
-
GII.C-
·
-
19:,--=.-
• Brow ser search engine hijacker
Backdoors
• Why go throu gh normal authentication methods?
- Just w alk in the back door
• Often placed on you r computer through malware
- Some malware software can take advantage of
backdoors created by other malw are
• Some softw are includes a backdoor (oops)
- Old Linux kernel included a backdoor
- Bad softw are can have a backdoor as part of the app
© 2020 Messer Studios, LLC
• Control a device
- Key logging
- Screen recording / screenshots
- Copy files
- Embed more malwar e
Protecting against Trojans and RATs
• Don' t run unknow n softw are
- Consider the consequences
• Keep anti-virus/ anti-malware signatur es updated
- There are always new attacks
• Alw ays have a backup
- You may need to quickly r ecover
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 7
https://ProfessorMesser.com
1.2 - Rootkits
Rootkits
• Originally a Un ix technique
- The "root" in root kit
Finding and removing rootkits
• Look for the unusua l
- Anti-malware scans
• Modifies core system fil es
- Part of the kernel
• Use a remover specific to the rootkit
- Usually bu ilt after the rootki t is discovered
• Can be invisible to the opera ting system
- Won't see it in Task Manager
• Secure boot w ith UEFI
- Secu rity in the BIOS
• Also invisible to traditional anti-virus utilities
- If you can' t see it, you can't stop it
....
,,.. Otttrw; . .
, IHKLN'o$EQ . f t ~ \ S C '
. HIQ.N\SECl.A~\SM-lt\lMOel
Kernel drivers
• Zeus/ Zbot malwar e
- Famous for cleaning out bank accounts
SIC,,,._
,.,,... Hllffln,._...,.,._..,,
~..,,,.~----""""
uoi;a
4/ZZfl01 111$7AH
0~• H-"Wl-~J.PI
:::IC..,._
4/ZV20l11157AM
l(N)i;J H°'9rl ....Ww-odooolN'I
Hd:WI.._WincloMAPt
:ic-•
.t/2V20111157H4
Obret H'"'"*\lflf'ldOilllNl"!
'1_C\JC...-o\tl)..ol•
4/ZV2011 11$7AM
:ic - •
.t/22/2011 11 57 AM
0 ~ Ho:»litl._W.,..1'Pl
4/22/20l 1 11 $7 AH
Sl 1$),9 HdilnNaW..._.M't
:IC"'61
.t/Z2f201111$7AW
lt)t• Ho;wliloa~J.PI
4(N)IJHllffln'-'W..,_..,,
Ot,.• HdilrlMWindollllAA
,le,,_
u c,sc~
S.9'GI H.:fflnllo,a,Windoool.tl'I
Jll'61J HQ:WI ...WwldD,,,eJ.PI
â—„nl/201 1 1157.tH
~c,~..
• Necurs makes sure you can't delete Zbot
- Access denied
S.cit OetCIIIPl.cn
Oe,,.• ~_,,.ODl"&llnl~M,M
.tl%2f20ll 11$7AW
4/ZZl201 1 11$7AH
4/22120l l 11$7AW
~ t\18.dl:M-• ..,
• Now combined w ith Necurs rootki t
- Necu rs is a kernel-level driver
,_
4/22/20l 14 1ll'W
.t/W2011 • 18 PM
-it\$WflMt1
4/WlOl l 1157 ....
:lC\ISeN•
.t/ZZl20ll 11$7AM
c-
4/ZZ/201 1 11$7.IH
4nl/20l 1 11 57 AM
-..c\JUDC...
o.,,...
o.,,...
Hdfilrl.._W~l,flt
1a.oou Hd:h'l111oaw...,...,,
0~• HQaf'l-~J.Pt
• Trying to stop the Win dow s process?
- Error terminating process : Access denied
1.2 - Spyware
Adware
• Your computer is one big advertisement
- Pop-ups with pop-ups
Why is there so much adware and spyware?
• Money
- Your eyeballs ar e incredibly valuable
• May cause performance issues
- Especially over the netw ork
• Money
- Your computer time and bandwidth
is incr edibly valuable
• Instal led accidental ly
- May be included with other software
• Be careful of softw are that claims to r emove adware
- Especially if you learned about it from a pop-up
• Money
- Your bank account is incredibly valuable
- Yes, even you r bank account
Spyware
• Malware that spies on you
- Advertising, identity theft, affiliate fraud
Protecting against adware/spyware
• Maintain your anti-virus/ anti-malware
- Al w ays have the latest signatu re s
• Can trick you into installing
- Peer to peer, fake security softw are
• Always know w hat you're insta lli ng
- And w atch your options during the installation
• Brow ser mon itoring
- Capture su rfing habits
• Where's your backup?
- You might need it someday
- Cleaning adw are isn' t easy
• Keyloggers - Captu re every keystroke
- Send it back to the mother ship
• Run some scans - M alw arebytes
1.2 - Bots and Botnets
Bots (Robots)
• Once your machine is infected, it becomes a bot
- You may not even know
Botnets
• A group of bots w orking together
- Nothing good can come from th is
• How does it get on you r com puter?
- Trojan Horse (I just saw a funny video of you! Click her e.) or...
- You run a program or click an ad you THOUGHT w as legit,
but...
- OS or application vu lnerabi lity
• Distributed Denial of service (DDoS)
- The pow er of many
• A day in the life of a bot
- Sit around. Check in w ith the Command and Control (C&C)
server. Wait for instructions.
© 2020 Messer Studios, LLC
• Relay spam, proxy netw ork traffic,
di stributed computing tasks
• Botnets are for sale
- Rent time from the botnet ow ner
- Not a long-term business proposition
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Pages
https://ProfessorMesser.com
1.2 - Bots and Botnets (continued)
Stopping the bot
• Prevent the initial infection
- OS and application patches
- Anti-virus/anti-malwar e and updated signatu re s
• Prevent command and control (C&C)
- Block at the firewall
- Identify at the w orkstation with a
host-based firew all or host-based IPS
• Identify an existing infection
- On-d emand scans, netw ork monit oring
1.2 - Logic Bombs
Logic Bomb
• Waits for a predefined event
- Often left by someone with grudge
• Time bom b
-Time or date
• User event
- Logic bomb
• Diffi cu lt to identify
- Difficult to recover if it goes off
Real-world logic bombs
• March 19, 2013, South Korea
- Email w ith malicious attachment sent to
- South Korean organizations
- Posed as a bank email
- Trojan installs malw are
• M arch 20, 2013, 2 p.m. local time
- Malware time-based logic-bomb activates
- Storage and master boot record deleted, system
reboots
- Boot device not found.
- Please install an operating system on you r hard disk.
• December 17, 2016, 11:53 p.m.
- Kiev, Ukraine, high-voltage substation
- Logic bomb begins disabling electrical circuits
- Malware mapped out the control network
- Began disabling power at a predetermined time
- Custom ized for $CADA netw orks
(Supervisory Control and Data Acquisition)
Preventing a logic bomb
• Difficult to recogni ze
- Each is unique
- No predefined signatures
• Process and procedu re s
- Formal change control
• Electronic monitoring
- Alert on changes
- Host-based intrusion detection, Tripwire, etc.
• Constant aud iting
- An administrator ca n circumvent existing systems
1.2 - Password Attacks
Plaintext / unencrypted passwords
• Some applications store passw ords " in the clear"
- No encryption. You can read the stored password.
- This is rare, thankfully
• Do not store passwords as plaintext
- Anyone with access to the password file or database
has every credential
• What to do if you r application saves
passwords as plaintext :
- Get a better application
Linux Account
Hashes
© 2020 Messer Studios, LLC
Hashing a password
• Hashes represent data as a fixe d-length string of text
- A message digest, or " fingerprint"
• Will not have a collision (hopefu lly)
- Different inputs will not have the same hash
• One-w ay trip
- Impossible to recover the original message
from the digest
-A common w ay to store passwords
The password file
• Different across operating systems and applications
- Different hash algorithms
Jumper Bay : ·
Ca rter : 1 007 : : cf4eb977a6859c76e f d2lf5094ec f 77d :::
Jackson : 1008 :: elf757d9cdc06690509e04b5446317d2 : ::
O' Ne il l : 1009 :: 78a8c423 f aedd2 f 002c6 aef 69 a 0acl af : ::
Teal' c : 1 0 1 0 : : bf8 4 666c8 1 974686e50d300bc36aea0 1 :::
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 9
https://ProfessorMesser.com
1.2 - Password Attacks (continued)
Spraying attack
• Try to login with an incorrect passw ord
- Eventually you' re locked out
• There are some common passw ords
- https://en.wikipedia.org/w iki/list_of_the_most_
common_passw ords
• Attack an account with the top three (or more) passw ords
- If they don't w ork, move to the next account
- No lockouts, no alarms, no alerts
Rainbow tables
• An optim ized, pre-bui lt set of hashes
- Saves time and storage space
- Doesn' t need to contain every hash
- Contains pre-calculated hash chains
• Remarkable speed increase
- Especially with longer passw ord lengths
• Need different tables for different hashing methods
- W indow s is different than MySQL
Brute force
• Try every possible passw ord combination
until the a hash is matched
Adding some salt
• Salt
- Random data added to a passw ord w hen hashing
• This might take some time
-A strong hashing algorithm slow s things dow n
• Every user gets their ow n random salt
- The salt is commonly stored w ith the passw ord
• Brute force attacks - Online
- Keep trying the login process
-Very slow
- Most accounts will lockout after a number
of failed attempts
• Rainbow tables w on't w ork with salted hashes
- Additional random value added to the
original passw ord
• Brute force the hash - Offline
- Obtain the list of users and hashes
- Calculate a passw ord hash, compare it to a stored hash
- large computational resource requirement
• Each user gets a differ ent random hash
- The same passw ord creates a different hash
Dictionary attacks
• Use a dictionary to find common w ords
- Passw ords are cr eated by humans
• Many common w ordlists available on the 'net
- Some are customized by language or line of w ork
• The password crackers can substitute letters
- p&ssw 0rd
• This takes time
- Distributed cracking and GPU cracking is common
• This slows things dow n the brute force process
- It doesn' t completely stop the reverse engineering
When the hashes get out
• January 2019 - Collection #1
- A collection of email addresses and passw ords
- 12,000+ files and 87 GB of data
• 1,160,253,228 unique emails and passw ords
- A compilation of data breach results
• 772,904,991 unique usernames
-That's about 773 mil lion people
• 21,222,975 unique passw ords
- You really need a passw ord manager
• https://haveibeenpw ned.com/
• Discover passw ords for common w ords
- This w on't discover random character passw ords
1.2 - Physical Attacks
Malicious USB cable
• It looks like a normal USB cable
- It has additional electronics inside
• Operating system identifies it as a HID
- Human Interface Device
- It looks like you've connected a keyboard or mouse
-A keyboard doesn't need extra rights or permissions
• Once connected, the cable takes over
- Dow nloads and insta lls malicious softw are
• Don't just plug in any USB cable
-Alw ays use t rusted hardware
Malicious flash drive
• Free USB flash drive !
- Plug it in and see w hat's on it
- That's a bad idea
© 2020 Messer Studios, LLC
• Older operating systems w ould automatically run files
- This has now been disabled or removed by default
• Could still act as a HID (Human Interface Device) /
Keyboard
- Start a command prompt and type anything
without your intervention
• Attackers can load malware in documents
- PDF files, spreadsheets
• Can be configur ed as a boot device
- Infect the computer after a reboot
• Acts as an Ethernet adapter
- Redirects or modifies Internet t raffic requests
- Acts as a wireless gatew ay for other devices
• Never connect an untrusted USB device
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 10
https://ProfessorMesser.com
1.2 - Physical attacks (continued)
Skimming
Card cloning
• Stealing credit card information,
usually during a normal transaction
- Copy data from the magnetic stripe:
- Card number, expiration date, card holder's name
• ATM skimming
- Includes a small camera to also w atch for your PIN
• Get card detai ls from a skim mer
- The clone needs an original
• Attackers use the ca rd information for other financial
transactions
- Fraud is the responsibility of the seller
• Create a dupl icate of a card
- Looks and fe els like the original
- Often includes the printed eve (Card Validation Code)
• Can only be used with magnetic st ripe cards
- The chip can't be cloned
• Cloned gift cards are common
- A magnetic st ripe technology
• Always check before using card readers
1.2 - Adversarial Artificial Intelligence
Machine learning
Evasion attacks
• Our computers are getting smarter
- They identify patterns in data and improve
their predictions
• The Al is only as good as the t raining
- Attackers find the holes and limitations
• This requires a lot of t raining data
- Face r ecognition requires analyzing a lot of faces
- Driving a car requires a lot of road time
• In use every day
-Stop spam
- Recommend products from an on line retailer
-What movie w ould you like to see? This one.
- Pr event car accidents
Poisoning the training data
• Confuse the artificial intelligence (Al)
-Attackers send modified training data that causes
the Al to behave incorrectly
• Microsoft Al chatter bot named Tay
• (Thinking About You)
- Joins Twitter on March 23, 2016
- Designed to learn by interacting w ith Twitter users
- Microsoft didn't program in anti-offensive behavior
- Tay quickly became racist, sexist, and inappropriate
• An Al that know s w hat spam looks like can be
fooled by a different approach
- Change the number of good and bad w ords in the
message
• An Al that uses r eal-w orld information can release
confidential information
- Trained w ith data that includes social security
numbers
- Al can be fooled into revealing those numbers
Securing the learning algorithms
• Check the training data
- Cross check and verify
• Constantly retrain w ith new data
- More data
- Better data
• Train the Al with possible poisoning
-What w ould the attacker try to do?
1.2 - Supply Chain Attacks
Supply chain
• The chain conta ins many moving parts
- Ra w materials, suppliers, manufactur ers,
distributors, customers, consumers
• HVAC vendor w as the supplier
- Attackers used a w ide-open Ta rget netw ork to
infect every cash register at 1,800 stores
• Attackers can infect any step along the w ay
- Infect different parts of the chain without suspicion
- People t rust their suppliers
• One exploit can infect the entir e chain
- There's a lot at stake
Supply chain security
• Can you trust your new
server/router/ sw itch/ ft rew all/softw are?
- Supply chain cybersecurity
Supply chain security
• Target Corp. breach - November 2013
- 40 mi llion credit cards stolen
• Heating and AC firm in Pennsylvania w as infected
- Malware delivered in an email
- VPN cr edentials for HVAC techs w as stolen
© 2020 Messer Studios, LLC
• Do these technicians look like an IT security issue?
• Use a small supplier base
- Tighter control of vendors
• Strict controls over policies and procedures
- Ensure proper security is in place
• Security should be part of the overall design
- There's a limit to trust
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 11
https://ProfessorMesser.com
1.2 - Cloud-based vs. On-Premises Attacks
Attacks can happen anywhere
• Tw o categories for IT security
- The on-pr emises data is more secure !
- The cloud-based data is more secure!
• Cloud-based security is centralized and costs less
- No dedicated hardw are, no data center to secure
- A third-party handles everything
• On-premises puts the security burden on the client
- Data center security and infrastructure costs
• Attackers w ant your data
- They don't care w here it is
On-premises security
• Custom ize you r secu rity post ure
- Full control w hen everyth ing is in-house
• On-site IT t eam can manage security better
- The local team can ensur e everything is secure
- A local team can be expensive and difficult to staff
• local team maint ains uptime and ava ilabilit y
- System checks can occur at any time
- No phone call for support
• Security changes can take time
- New equipment, configurations, and additional costs
Security in the cloud
• Dat a is in a secure environment
- No physica l access to the data center
- Third-party may have access to the data
• Cloud providers are managing large-sca le security
-Automated signature and security updates
- Users must follow security best-practices
• lim it ed dow ntime
- Extensive fault-tolerance and 24/7/365 monitoring
• Sca lable security options
- One-click security deployments
- This may not be as customizable as necessary
1.2 - Cryptographic Attacks
Cryptographic attacks
• You've encrypted data and sent it to another person
- Is it really secure? How do you know ?
Collisions
• Hash digests are supposed to be unique
- Different input data should never cr eate the same hash
• The attacker doesn' t have the combination (the key)
- So they break the safe (the cryptography)
• Finding w ays to undo the security
- There are many potential cryptographic shortcomings
- The problem is often the implementation
• MOS hash
- Message Digest Algorithm 5
- Published in April 1992, Collisions identified in 1996
Birthday attack
• In a classroom of 23 students, w hat is the chance of
t w o students sharing a birthday? About 50%.
- For a class of 30, the chance is about 70%
• In the digital w orld, this is a hash coll ision
-A hash collision is the same hash value for t w o
different plaintexts
- Find a collision through brute force
• The attacker w ill generate mu ltiple versions of
plaintext to match the hashes
- Protect yourself with a large hash output size
• December 2008: Researchers created CA certificate
that appeared legitimate w hen MOS is checked
- Built other certificates that appeared to be legit
and issued by RapidSSL
Downgrade attack
• Instead of using perfectly good encryption, use
something that's not so great
- Force the systems to dow ngrade their security
• 2014 - TLS vulnerability - POODLE (Padding Oracle
On Dow ngraded Legacy Encryption)
- On-path attack
- Forces cl ients to fall back to SSL 3.0
- SSL 3.0 has significant cryptographic vulnerabilities
- Because of POODLE, modern brow sers w on't fall back
to SSL 3.0
1.3 - Privilege escalation
Privilege escalation
• Gain higher-level access to a system
- Exploit a vulnerability - Might be a bug or design fla w
Mitigating privilege escalation
• Patch quickly
- Fix the vulnerabi lity
• Higher-level access means mor e capabilities
- This common ly is the highest-level access
- This is obviously a concern
• Updated anti-virus/anti-malw are softw are
- Block know n vulnerabilities
• These are high-priority vulnerabil ity patches
- You w ant to get these holes closed very quickly
-Any user can be an adm inistrator
• Horizontal privilege escalation
- User A can access user B resources
© 2020 Messer Studios, LLC
• Data Execution Prevention
- Only data in executable ar eas can run
• Address space layout randomization
- Pr event a buffer overrun at a know n
memory address
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 12
https://ProfessorMesse r.com
1.3 - Cross-site Scripting
Cross-site scripting
Hacking a Subaru
• xss
• June 2017, Aaron Guzman
- Security researcher
- Cascading Style Sheets (CSS) ar e something else entirely
• Originally called cross-site because of brow ser security fla ws
- Information from one site could be shared with another
• When authenticating with Subaru, users get a token
-This token never expires (bad!)
• One of the most common w eb application
development errors
- Takes advantage of the trust a user has for a site
- Complex and varied
• Malw are that uses JavaScript - Do you allow scripts? Me too.
• A valid token allow ed any service request
- Even adding your email addr ess to someone
else's account
- Now you have ful l access to someone else's car
Non-persistent (reflected) XSS attack
• Web site allow s scripts to run in user input
- Search box is a common source
• Web front-end included an XSS vu lnerability
-A user clicks a malicious link, and you have
their token
Protecting against XSS
• Attacker emails a li nk that takes advantage of this
vulnerabi lity
- Runs a script that sends credentials/session IDs/cookies
to the attacker
• Script embedded in URL executes in the victim's brow ser
- As if it came from the server
• Be carefu l w hen clicki ng untrusted links
- Never bl indly click in your ema il in box. Never.
• Consider disabling JavaScript
- Or control with an extension
- This offers limited protection
• Keep your brow ser and applications updated
-Avoid the nasty brow ser vulnerabilities
• Attacker uses credentials/ session IDs/cookies to steal
victim's information without their knowledge
- Very sneaky
• Validate input
- Don't allow users to add their ow n scripts to an
input field
Persistent (stored) XSS attack
• Attacker posts a message to a social netw ork
- Includes the malicious payload
• It's now "persistent" - Everyone gets the payload
• No specific target - All view ers to the page
• For social netw orking, this can spread quickly
- Everyone w ho view s the message can have it
posted to their page
- Where someone else can view it and propagate it further...
1.3 - Injection Attacks
Code injection
• Code injection
- Adding your ow n information into a data stream
XML injection and LDAP injection
• XML - Extensible Markup Language
- A set of rules for data transfer and storage
• Enabled because of bad programming
- The application should properly handle
input and output
• XML injection
- Modifying XML requests - a good application w ill validate
• So many different data types
- HTML, SQL, XML, LDAP, etc.
SQL injection
• SQL - Structured Query Language
- The most common relational database
management system language
• SQL Injection
- Modifying SQL requests
- Your application shouldn't really allow this
© 2020 Messer Studios, LLC
• LDAP - Lightw eight Directory Access Protocol
- Created by the telephone companies
- Now used by almost everyone
• LDAP injection
- Modify LDAP requests to manipulate application r esults
DLL injection
• Dynam ic-Link Library
- A W indow s library containing code and data
- Many applications can use this library
• Inject a DLL and have an application run a program
- Runs as part of the target process
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 13
https://ProfessorMesser.com
1.3 - Buffer Overflows
Buffer overflows
• Overw riting a buffer of memory
- Spills over into other memory areas
Variable A and B before buffer overflow
• Developers need to perform bounds checking
- The attackers spend a lot of time looking for openings
• Not a simple exploit
- Takes time to avoid crash ing things
- Takes time to make it do w hat you w ant
• A really useful buffer overflow is repeatable
- Wh ich means that a system can be compromised
Variable Name
A
Value
(null string]
Hex Value
00
8
1979
I oo I oo I oo I oo I oo I oo I
00
I
07
88
Overflowing variable A changes variable B
Variable Name
A
8
Value
'e'
·x·
'c'
'e'
'$ '
'$ '
'i'
'v'
Hex Value
65
78
63
65
73
73
69
76
25856
65
I
00
1.3 - Replay Attacks
Replay attack
• Useful information is transmitted over the netw ork
- A crafty hacker will take advantage of this
• This is not an on-path attack
- The actual replay doesn't r equire
the original w orkstation
• Need access to the ra w netw ork data
- Network tap, ARP poisoning, malware on the victim computer
• Avoid this type of r eplay attack w ith a salt
- Use a session ID w ith the passw ord hash to
create a unique authentication hash each time
• The gathered information may help the attacker
- Replay the data to appear as someone else
Pass the Hash
~
Client authenticates to
. . the server with a username
and hashed password
------==--------Server
During authentication,
~ the attacker captures
~ the username
and password hash
Attacker
Header manipulation
• Information gathering
-Wireshark, Kismet
• Exploits
- Cross-site scripting
• Modify headers
- Tamper, Firesheep, Scapy
• Modify cookies
- Cookies Manager+ (Firefox add-on )
© 2020 Messer Studios, LLC
Attacker sends his own
authentication request
using the captured credentials
Prevent session hijacking
• Encrypt end-to-end
- They can't capture your session ID if they can't see it
- Additional load on the w eb server (HTTPS)
- Firefox extension: HTTP$ Everyw here, Force-TL$
- Many sites are now HTTPS-only
• Encrypt end-to-somew here
-At least avoid capture over a local wireless network
- Still in-the-clear for part of the journey
- Personal VPN (OpenVPN, VyprVPN, etc.)
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 14
https://ProfessorMesser.com
1.3 - Replay Attacks (continued)
Browser cookies and session IDs
• Cookies
- Information stored on your computer by the brow ser
• Could be considered be a privacy risk
- lots of personal data in there
• Used for tracking, personalization, session management
- Not executable, not generally a security risk
- Unless someone gets access to them
• Session IDs ar e often stored in t he cookie
- Maintains sessions across multiple brow ser sessions
Session hijacking (Sidejacking)
Victim authenticates
to the serve r
0
Client authentication
A
Your session ID: 3B0027A38FDF37
â—„•-------------------- v
Server provides
a session ID
to the client
•
Victim
Attacker intercepts
the session ID and
uses it to access the
se rver with the
victim's credentials
Attacker
Web Server
1.3 - Request Forgeries
Cross-site requests
• Cross-site requests ar e common and legitimate
- You visit ProfessorM esser.com
- Your brow ser loads text from t he
ProfessorMesser.com server
- Your brow ser loads a video from You Tube
- Your brow ser loads pictures from lnstagram
• HTML on ProfessorMesser. com directs
requests from your brow ser
- This is normal and expected
- M ost of these are unauthenticated requests
The client and the server
• Website pages consist of client-side
code and server-side code
- Many moving parts
• Client side
- Renders the page on the screen
- HTML, JavaScript
• Server side
- Performs requests from
the client - HTML, PHP
- Transfer money from one
account to another
- Post a video on YouTube
Cross-site request forgery
• One-click attack, session riding - XSRF, CSRF (sea surf)
• Takes advantage of the t rust that a w eb application
has for the user
- The w eb site trusts your brow ser
- Requests are made w ithout your consent or your know ledge
- Attacker posts a Facebook status on your account
• Significant w eb application development oversight
- The application should have anti-forgery techniques added
- Usually a cryptographic token to pr event a forgery
Cross-site request forgery
A
V
Re q uest is se nt as a
hyperlink to a user wh o
may a lready be logge d
io<o<heba,k 7
0
~ â—„
~
~
8
'":~::,,ito,~
Attacke, " "" "
funds t ra nsfer req uest
~~
~
Attacker
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 15
•
A
V
Visito r clicks the link a nd
un knowi ngly sends th e
t ra nsfer req uest to
•i<e
0
__,-/ Bank Web Server
Bank validat es the tra nsfer
and se nds the visitor's funds
to th e attacker
https://ProfessorMesser.com
1.3 - Request Forgeries (continued)
Server-side request forgery (SSRF)
• Attacker fin ds a vulnerable w eb application
- Sends requests to a w eb server
- Web server performs the request on
behalf of the attacker
• Caused by bad programming
- Never trust the user input
- Server should validate the input
and the responses
- These are rare, but can be
critical vulnerabilities
Capital One SSRF breach - March 2019
• Attacker is able to execute commands
on the Capital One w ebsite
- This is normally stopped by a WAF
(Web Application Firew all)
- The WAF w as misconfigured
• Attacker obtained security credentials for the WAF role
• WAF-Role account listed the buckets on Amazon S3
• Attacker retrieved the data from the Amazon buckets
• Credit card application data from 2005 through 2019
- 106 million names, address, phone, email, DoB
- 140,000 Social Security numbers,
80,000 bank accounts
O0
Server-side request forgery (SSRF)
0
Attacker sends a request
•
t hat cont rols a web application
----------------
~
~
Web server sends request
t o another service,
. _. 0
~
~,
Web Server
Attacker
. . Web Server fo rwards
~ response t o attacker
~
such as cloud fi le st orage
~
•
::::::
•
=
Cloud st orage
~ sends response
. , to Web server
~
•
~
Dat abase
Cache
o~o::::::
•
~
File Storage
•
~
Di rect ory
Services
1.3 - Driver Manipulation
Malware hide-and-go-seek
• Traditional anti-virus is very good at identifying
know n attacks
- Checks the signatur e
- Block anything that matches
• There are still w ays to infect and hide
- It 's a constant w ar
- Zero-day attacks, new attack types, etc.
Your drivers are powerful
• The interaction betw een the hardw are and your
operating system
- They ar e often t rusted
- Great opportunity for security issues
• May 2016 - HP Audio Drivers
- Conexant audio chips
- Driver installation includes aud io control softw are
- Debugging feature enables a keylogger
• Hardw are interactions contain sensitive information
- Video, keyboard, mouse
Shimming
• Fi lling in the space betw een t w o objects
- A middleman
• W indow s includes it's ow n shim
- Backw ards compatibility with previous
W indow s versions
- Application Compatibility Shim Cache
• Malw are authors w rite their ow n shims
- Get around security (like UAC)
• January 2015 Microsoft vulnerability
- Elevates privilege
Refactoring
• Metamorphic malw are
- A differ ent program each time it's dow nloaded
• Make it appear different each time
- Add NOP instructions
- Loops, pointless code strings
• Can intelligently redesign itself
- Reorder functions
- Modify the application flow
- Reorder code and insert unused data types
• Difficult to match w ith signature-based detection
- Use a layered approach
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 16
https://ProfessorMesser.com
1.3 - SSL Stripping
SSL stripping/ HTTP downgrade
• Com bin es an on-pat h attack w ith a downgrade attack
- Difficult t o im plement, but big returns for the attacker
SSL and TLS
• SSL (Secu re Socket s Layer) 2.0 - Deprecated in 2011
• SSL 3.0
- Vulnerable to the POODLE attack
- Deprecated in June 2015
• Tra nsport Layer Securit y (TLS) 1.0
- Upgrade to SSL 3.0, and a name change
from SSL to TLS
- Can downgrade to SSL 3.0
• Attacker must sit in the m iddle of t he conversation
- Must modify data betw een the victim and w eb server
- Proxy server, ARP spoofing, rogue Wi-Fi hotspot, etc.
• Victim does not see any signifi cant problem
- Except the browser page isn't encrypted
- Strips the S away from HTTP$
• Th is is a client and server problem
- Works on SSL and TLS
• TLS 1.1
- Deprecated in January 2020 by modern brow sers
• TLS 1.2 and TLS 1.3 - The latest standards
SSL stripping
4iJ
GET http://examp le.com
(J
_ .
GET http://example.com
Web site
Visitor
Web Server
301 Moved
Attacker
GET https://example.com
200 O K {HTTPS)
200 OK {H TTP)
POST http://examp le.com
M an-in-the -m idd le
Rewrites URls
HTTP/HTTPS
POST https://exam ple.com
user: professor & password: ninjal
_
user: professor & password : ninja l
1.3 - Race Conditions
Race condition
• A programmin g conundrum
- Sometimes, th ings happen at the same time
- This can be bad if you've not planned for it
• Time-of-check to time-of-use attack (TOCTOU)
- Check the system
- When do you use the r esults of your last check?
- Something might happen between the check
and the use
Race conditions can cause big problems
• January 2004 - Mars rover " Spirit"
- Reboot when a problem is identified
- Problem is w ith the file system, so reboot because
of t he file system problem
- Reboot loop w as the re sult
• GE Energy - Energy Management System
- Three pow er lines failed at the same time
- Race con dition delayed alerts
- Caused the Northeast Blackout of 2003
• Therac-25 radiation thera py machine in t he 1980s
- Used software interlocks instead of hardware
- Race con dition caused 100 times the normal dose of ra diation
- Six patients inj ured, th ree deaths
Transfer $50 from
User 1
AccountAto
Acco unt B
-
-
Account A= $100
Account 8 = $100
Add $50 to
Account B
-
Account A = $100
Account 8+50 = $150
Remove $50 from Account A
~
~
Account A-SO= $50
Account 8 = $200
Transfer $50 from
User 2
Account A to
Account B
-
-
Account A = $100
Account 8 = $100
© 2020 Messer Studios, LLC
Add$50to
Account B
-
Account A = $100
Account 8+50 = $200
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 17
Remove$50from
Account A
Account A-SO= $50
Account 8 = $200
-
~
~
Ending Account Value
Account A= $50
Account 8 = $200
https://ProfessorMesser.com
1.3 - Other A plication Attacks
Memory vulnerabilities
• Manipulating memory can be advantageous
- Relatively difficult to accomplish
• Memory leak
- Unused memory is not properly released
- Begins to slow ly grow in size
- Eventually uses all available memory
- System crashes
• NULL Pointer dereference
- Programming technique t hat references a
portion of memory
- W hat happens if that reference points to nothing?
- Application crash, debug information displayed, DoS
• Integer overflow
- Large number into a smaller sized space
-Where does t he extra number go?
- You shouldn't be able to manipulate
memory this w ay
Directory traversal
• Directory traversal/ path t raversal
- Read files from a w eb server t hat are outside of
the w ebsite's file directory
- Users shouldn't be able to brow se
the W indow s folder
• Web server software vulnerability
- Won't stop users from browsing past the
w eb server root
• Web application code vulnerability
- Take advantage of badly w ritten code
Improper error handling
• Errors happen
- And you should probably know about it
• Messages should be j ust informational enough
-Avoid too much deta il
- Netw ork information, memory dump,
stack t races, database dumps
• This is an easy one to find and fix
-A development best-practice
Improper input handling
• Many applications accept user input
- We put data in, w e get data back
• All input should be considered malicious
- Check everything. Trust nobody.
• Allowing invalid input can be devastating
- SQL inj ections, buffer overflow s,
denial of service, etc.
• It takes a lot of w ork to find input that
can be used maliciously
- But they w ill find it
API attacks
• API - Application Programming Interface
• Attackers look for vulnerabilities in this new
communication path
- Exposing sensitive data, DoS, intercepted
communication, privileged access
Resource exhaustion
• A specialized DoS (Denial of Service) attack
- May only r equire one device and low bandw idths
• ZIP bomb
-A 42 ki lobyte .zip compr essed fil e
- Uncompresses to 4.5 petabytes (4,500 terabytes)
-Anti-virus w ill identify t hese
• DHCP starvation
-Attacker floods a network w ith IP address requests
- MAC address changes each time
- DHCP server eventually runs out of addresses
- Switch configurations can rate limit DHCP requests
Traditional vs. APl-based applications
HTTP GET
Traditional
Application
HTTP Response
Browser
Web Server
Database
Server
Database
API Requests
AP I-based
App
API Responses
Mobile
Devices
•
Messer Studios
LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 18
https://ProfessorMesser.com
1.4 - Rogue Access Points and Evil Twins
Rogue access points
• An unaut horized wireless access poi nt
- May be added by an employee or an attacker
- Not necessarily malicious
- A signifi cant potential backdoor
Wireless evil twins
• Looks legitimate, but actually malicious
- The w ireless version of phishing
• Very easy to plug in a wireless AP
- Or enable wireless sharing in your OS
• Overpow er the existing access points
- M ay not req uire the same physical location
• Schedule a periodic survey
- Walk around your buildi ng/campus
- Use third-party tools/ WiFi Pineapple
• Consider using 802.lX (Network Access Control)
- You must authenticate, regardless of the
connection t ype
• W iFi hotspots (and users) are easy to fool
- And they're w ide open
• Configure an access point to look like an existing network
- Same (or sim ilar) SSID and security settings/ca ptive portal
• You encrypt you r communication, right?
- Use HTTP$ and a VPN
1.4 - Bluejacking and Bluesnarfing
Bluejacking
• Send ing of unsolicited messages to another
device via Bluetooth
- No mobile carrier req uired !
Bluesnarfing
• Access a Blu etooth-enabled device and transfer data
- Contact list, calendar, email, pictures, video, etc.
• First major security w eakn ess in Bluetooth
- Ma rcel Holtmann in September 2003 and
- Adam Laurie in November 2003
- This w eakn ess was patched
• Typical fun ctional distance is about 10 meters
- More or less, dependi ng on antenna and interference
• Bl uejack w ith an address book object
- Instead of contact name, w ri te a message
- "You are Bl uejacked !"
- "You are Bluejacked ! Add to contacts?"
• Serious security issue
- If you know the file, you can down load it without
authentication
• Third-party softwar e may also be used
- Blooover, Bluesniff
1.4 - Wireless Disassociation Attacks
It started as a normal day
• Surfing along on you r wireless netw ork
- And then you're not
Protecting against disassociation
• IEEE has already addressed the problem
- 802.llw - July 2014
• Some of the importa nt management frame s
are encrypted
- Disassociate, deauthenticate,
channel switch announcements, etc.
• And then it happens agai n
- And again
• You may not be able to stop it
- There's (almost) noth ing you can do
- Time to get a long patch cable
• Not everything is encrypted
- Beacons, probes, authentication, association
• 802.llw is require d for 802.llac compliance
- This wil l roll out going forward
• Wireless disassociation
- A signifi cant w ireless
denial of service (DoS) attack
802.11 management frames
• 802.11 w ireless includes a number of
management featu re s
- Frames that make everything w ork
- You never see them
• Important for the operation of 802.11 w ireless
- How to find access points, manage QoS, associate/
disassociate w ith an access point, etc.
• Original wireless standards did not add
protection for management frames
- Sent in the clear
- No authentication or validation
© 2020 Messer Studios, LLC
• IEEE 802 . 11 wireless LAN management f rane
• Fixed parameters ( 4 bytes)
â–º Capabilities Information: 0x0011
Listen Interval: 0x0014
• Tagged parameters ( 146 bytes )
Tag:
Tag:
Tag :
• Tag:
â–º Tag:
â–º Tag:
â–º Tag :
â–º Tag:
â–º Tag:
â–º
â–º
â–º
Supported Rates 6(8) , 9, 12(8), 18, 24(8), 36, 48, 54, (Mbit/sec)
Power Capability Min: 2, Max : 17
Suppo rted Channels
RSN I nformation
HT Capabilities (802 .lln 01.10 )
Vendor Specific Apple
Vendor Specific Epigram : HT Capabilities (802. lln 01.10)
Vendor Specific Broadcom
Vendor Specific Mic rosof: \ofolM/ WME: Information Element
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 19
https://ProfessorMesser.com
1.4 - Wireless Jamming
Radio frequen cy (RF) j amming
• Denial of Service
- Prevent w ireless communication
W ireless jamming
• Many different types
- Constant, random bits/ Constant, legitimate frames
• Transmit interfering w ireless signals
- Decrease the signa l-to-noise ratio at
the receiving device
- The receiving device can't hear the good signa l
• Dat a sent at ran dom times
- Random data and legitimate fram es
• Sometimes it's not intentional
- Interference, not jamming
- Microw ave oven, fluorescent lights
• Needs to be somew here close
- Difficult t o be effective from a distance
• Jamming is intentional
- Someone w ants your net w ork to not w ork
• Reactive jamm ing
- On ly w hen someone else tries to communicate
• Time to go fox hunting
- You'll need the right eq uipment to hunt dow n the jam
- Directiona l antenna, attenuator
1.4 - RFID and NFC Attacks
RFID (Radio-frequency identification)
• It 's everyw here
- Access badges
- Inventory/Assembly li ne tracking
- Pet/ An imal identifi cation
- Anything that needs to be t racked
• Radar technology
- Radio energy transmitted to t he t ag
- RF pow ers t he tag, ID is t ransmitted back
- Bidirectional communication
- Some tag format s can be active/ pow ered
RFID Attacks
• Data capt ur e
- View commun ication
- Replay attack
• Spoof the reader - Writ e your ow n data to the tag
Near field communication (NFC)
• Tw o-w ay w ireless communication
- Builds on RFID, w hich is mostly one-w ay
• Payment systems
- Many options available
• Bootstrap for ot her w ireless
- NFC helps with Bluetooth pairing
• Access token, identity "card"
- Short range wit h encryption su pport
NFC Security Concern
• Remote capture
- It 's a w ireless net w ork
- 10 meters for active devices
• Fre quency jamm ing
- Denial of service
• Denial of service - Signal jamming
• Relay / Replay attack
- On-path attack
• Decrypt commun ication
- Many defau lt keys are on Google
• Loss of NFC device control
- Stolen/lost phone
1.4 - Randomizing Cryptography
Cryptographic nonce
• Arbitrary number
- Used once
- "For the nonce" - For the time being
Initialization Vectors (IV)
• A type of nonce
- Used for random izing an encryption scheme
- The mor e random the better
• A random or pseudo-random number
- Someth ing that can't be reasonably guessed
- Can also be a counter
• Use a nonce du ring t he login process
- Server gives you a nonce
- Calcu lat e your passw ord hash using t he nonce
- Each passw ord hash sent t o the host wi ll be
different , so a replay w on't w ork
• Used in encryption ciphers, WEP, and some
SSL im plement ations
Salt
• A nonce most commonly associated w ith passw ord
ran domization
- Make the passw ord hash unpredictable
• Passw ord storage should alw ays be salt ed
- Each user gets a different salt
• If the passw ord database is br eached, you can't corr elate
any passw ord s
- Even users with the same passw ord have different
hashes stored
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 20
https://ProfessorMesser.com
1.4 - On-Path Attacks
On-path network attack
On-path browser attack
• How can an attacker w atch without you knowing? • What if the middleman w as on the same computer as the victim?
- Formerly known as man-in-the-middle
- Malw are/ Trojan does all of the proxy w ork
- Formerly know n as man-in-the-browser
• Redirects your traffic
- Then passes it on to the destination
• Huge advantages for the attackers
- You never know your t raffic w as redirected
- Relatively easy to proxy encrypted traffic
- Everything looks normal to the victim
• ARP poisoning
- ARP has no security
- On-path attack on the local IP subnet
• The malware in your brow ser w aits for you to login to your bank
- And cleans you out
1.4 - MAC Flooding and Cloning
The MAC address
• Ethernet Media Access Control address
- The "physical" address of a netw ork adapter
- Unique to a device
MAC flooding
• The MAC table is only so big
• Attacker starts sending traffic with different source
MAC addresses
- Force out the legitimate MAC addresses
• 48 bits / 6 bytes long
- Displayed in hexadecimal
• The table fills up
- Sw itch begins flooding traffic to all interfaces
8c:2d:aa : 4b:98:a7
Organizationally Unique
Identifier (OUI)
(the manufacturer)
• This effectively turns the sw itch into a hub
- All traffic is transmitted to all interfaces
- No interruption in traffic flows
Network Interface
Controller-Specific
(the serial number)
• Attacker can easily capture all netw ork t raffic!
LAN switching
• Forwa rd or drop frames
- Based on the destination MAC address
• Flooding can be restricted in the switch's port
security settings
MAC cloning/ MAC spoofing
• An attacker changes their MAC address to match
the MAC address of an existing device
- A clone / a spoof
• Circumvent filters
- W ireless or w ired MAC filters
- Identify a va lid MAC address and copy it
• Gather a constantly updating list of MAC addresses
- Builds the list based on the source MAC addr ess of
incoming traffic
- These age out periodica lly, often in 5 minutes
• Mainta in a loop-free environment
- Using Spanning Tree Protocol (STP)
Learning the MACs
• Switches examine incoming t raffic
- Makes a note of the source MAC address
• Create a DoS
- Disrupt communication to the legitimate MAC
• Adds unknow n MAC addresses to the MAC address table
- Sets the output interface to the r eceived interface
• Easily manipulated through softw are
- Usually a device driver option
1.4 - DNS Attacks
DNS poisoning
• Modify the DNS server
- Requires some crafty hacking
• Modify the client host file
- The host file takes precedent over DNS queries
• Send a fake response to a va lid DNS request
- Requires a redirection of the original request
or the resulting response
Domain hijacking
• Get access to the doma in r egistration,
and you have control w here the traffic flow s
- You don't need to touch the actual servers
- Determines the DNS names and DNS IP addresses
• Many w ays to get into the account
- Brute force
- Social engineer the passw ord
- Gain access to the email address that manages the account
- The usual things
Domain hijacking
• Saturday, October 22, 2016, 1 PM
• Domain name r egistrations of
36 domains are changed
- Brazilian bank
- Desktop doma ins, mobile domains, and more
• Under hacker control for 6 hou rs
- The attackers became the bank
• 5 million customers, $27 bill ion in assets
- Results of the hack have not been publi cly released
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 21
https://ProfessorMesser.com
1.4 - DNS Attacks (continued)
URL hijacking
• Make money from your mistakes
- There's a lot of advertising on the 'net
Domain reputation
• The Internet is t racking your security posture
- They know w hen things go sidew ays
• Sell the badly spelled domain to the actual ow ner
- Sell a m istake
• Email reputation
- Suspicious activity
- Malware originating from the IP address
• Redirect to a competitor
- Not as common, legal issues
• Phishing site
- Looks like the real site, please login
• Infect with a drive-by dow nload
-You've got malware !
•A bad reputation can cause email delivery to fail
- Email rej ection or simply dropped
• Check w ith the email or service provider to check
the r eputation
- Follow their instructions to remediate
• Infected systems are noticed by the search engines
- Your doma in can be flagged or removed
Types of URL hijacking
• Typosquatting / brandjacki ng
- Take advantage of poor spelling
• Outright misspelling
- professormesser.com vs. professormessor.com
• A typing error
- professormeser.com
• Users w ill avoid the site
- Sales w ill drop
- Users will avoid your brand
• Malw are might be r emoved quickly
- Recovery ta kes much longer
• A different phrase
- professormessers.com
• Differ ent top-level domain
- professormesser.org
1.4 - Denial of Service
Denial of Service
• Force a service to fail
- Overload the service
DDoS amplification
• Turn your small attack into a big attack
- Often reflected off another device or service
• Take advantage of a design failure or vulnerabil ity
- Keep your systems patched !
• An increasingly common DDoS technique
-Turn Internet services against t he victim
• Cause a system to be unavailable
- Competitive advantage
• Create a smokescreen for some other exploit
- Precursor to a DNS spoofing attack
• Doesn't have to be complicated
- Turn off the pow er
• Uses protocols w ith little (if any) authentication or checks
- NTP, DNS, ICMP
-A common example of protocol abuse
A "friendly" Dos
• Unintentional DoSing - It 's not always a ne'er-do-w ell
• Netw ork DoS - Layer 2 loop w ithout STP
• Bandw idth DoS - Dow nloading multi-gigabyte Linux
distributions over a DSL line
• The w ater line br eaks
- Get a good shop vacuum
Distributed Denial of Service (DDoS)
• Launch an army of computers to bring dow n a service
- Use all the bandw idth or resources - t raffic spike
• This is w hy the attackers have botnets
- Thousands or mill ions of computers at your command
- At its peak, Zeus botnet infected over 3.6 mil lion PCs
- Coordinated attack
• Asymmetric threat
- The attacker may have few er resou rces than the victim
© 2020 Messer Studios, LLC
Application DoS
• Make the application break or w ork harder
- Increase dow ntime and costs
• Fill the disk space
- A 42 kilobyte .zip compressed file
- Uncompr esses to 4.5 petabytes (4,500 terabytes)
- Anti-virus will identify these
• Overuse a measured cloud resource
- More CPU/ memory/ netw ork is more money
• Increase the cloud server response time
- Victim deploys a new application instance - repeat
Operational Technology (OT) DoS
• The hardw are and softw are for industrial equipment
- Electric grids, traffic control, manufacturing plants, etc.
• This is more than a w eb server failing
- Pow er grid drops offline
- All t raffic lights are green
- Manufacturing plant shuts dow n
• Requires a different approach
- A much more critical security posture
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 22
https://ProfessorMesser.com
1.4 - Malicious Scripts
Scripting and automation
• Automate tasks
- You don't have to be there
- Solve problems in you r sleep
- Mon itor and re solve problems before they happen
• The need for speed
- The script is as fast as the computer
- No typing or delays
- No human error
• Automate the attack
- The hacker is on borrow ed time
Windows PowerShell
• Command line for system administrators
- .psl file extension
- Included w ith W indow s 8/8. 1 and 10
• Extend command-line functions
- Uses cmdlets (command-lets)
- Pow erShell scripts and functions
- Standalone executables
Shell script
• Scripting the Unix/Li nux shell
- Automate and extend the command line
- Bash, Bourne, Korn, C
• Starts w ith a shebang or hash-bang #!
- Often has a .sh file extension
• Attack the Linux/Un ix environment
- Web, database, virtualization servers
• Control the OS from the command line
- Ma lware has a lot of options
Macros
• Automate functions wit hin an application
- Or operati ng system
• Designed to make the application easier to use
- Can often create security vu lnerabilities
• Attackers create automated exploits
- They j ust need the user to open the file
- Prompts to run the macro
Visual Basic for Applications (VBA)
• Automates processes wit hin W indow s applications
- Common in Microsoft Offi ce
• Attack W indows systems
- System administration
- Active Domain administration
- File share access
• A pow erful programming language
- Interacts with t he operating system
Python
• General-purpose scripting language
- .py file extension
• Popular in many technologies
- Broad appeal and support
• Commonly used for cloud orchestration
- Create and tear dow n application instances
• CVE-2010-0815 / MSl0-03 1
- VBA does not properly search for ActiveX
controls in a document
- Run arbitrary code embedded in a document
- Easy to infect a computer
• Attack t he infrastruct ure
- Routers, servers, sw itches
1.5 - Threat Actors
Threat actors and attributes
• The entity responsible for an event t hat has
an impact on the safety of anot her entity
- Also called a malicious actor
• Sophistication may not be advanced,
but t he insider has instit utional knowledge
- Attacks can be directed at vu lnerable systems
- The insider know s w hat to hit
• Broad scope of act ors
- And motivations vary w idely
• Extensive resources
- Eating aw ay from the inside
• Advanced Persistent Threat (APT)
- Attackers are in the net w ork and undetected
- 2018 FireEye report:
Americas : 71 days,
EMEA: 177 days,
APAC: 204 days
Nation states
• Governments
• Nationa l security, job security
• Always an external entity
Insiders
• More t han just passw ords on sticky notes
- Some insiders are out for no good
© 2020 Messer Studios, LLC
• Highest sophistication
• M ilit ary control, utilities, financial control
• United States and Israel destroyed 1,000 nuclea r
centrifuges w ith the Stuxnet w orm
• Constant attacks
• Commonly an Advanced Persistent Threat (APT)
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 23
https://ProfessorMesser.com
1.5 - Threat Actors (continued)
Hacktivist
• A hacker wit h a purpose
- Social change or a political agenda
- Oft en an external entity
• Can be remarkably sophisticated
- Very specifi c hacks
- DoS, w eb site defacing, release of private documents, et c.
• Funding is li mited
- Some organizations have fund raising options
Script kiddies
• Runs pre-ma de scripts wit hout any knowledge
of w hat's r eally happening
- Not necessarily a youngster
• Can be internal or external
- But usua lly external
• Not very sophisticated
Hackers
• Experts with technology
- Often driven by money, pow er, and ego
• Au t horized
- An et hica l hacker with good intentions
- And perm ission to hack
• Unauthorized
- Malicious, violates security for persona l gain
• Semi-authorized
- Finds a vulnerability, doesn't use it
Shadow IT
• Going rogue
- Working around the int ernal IT organization
• Information Technology can put up roadblocks
- Shadow IT is unencumbered
- Use the cloud
- M ight also be able t o innovate
• No forma l funding
- Looking for low hanging fru it
• Motivated by the hunt
- Working the ego, trying t o make a name
Organized crime
• Professiona l criminals
- Motivat ed by money
- Almost always an external entity
• Very sophisticated
- Best hacking money can buy
• Crime that's organized
- One person hacks, one person manages the exploit s,
another person sells the data, anot her handles
customer support
• Lot s of capital to fund hacking efforts
• Not alw ays a good th ing
- Wasted time and money
- Security risks
- Compl iance issues
- Dysfunctiona l organization
Competitors
• Many different motivations
- DoS, espionage, harm reputation
• High level of soph istication
- Based on some significant funding
- The com petitive upside is huge (and very uneth ical)
• Many different intents
- Shut dow n your com petitor during an event
- St ea l customer lists
- Corrupt manufacturing databases
- Take fi nancial information
1.5 - Attack Vectors
• Attach a keylogger
- Collect usernames and passw ords
Attack vectors
• A method used by the attacker
- Gain access or infect to t he ta rget
• A lot of w ork goes into fin ding vu lnerabilities in t hese
vectors
- Some are more vu lnerable than ot hers
• IT security professiona l spend their career w atch ing
these vectors
- Closing up existing vectors
- Finding new ones
Direct access attack vectors
• There's a r eason w e lock t he data center
- Physical access to a system is a significant attack
vector
• Modify t he operating system
- Reset the administrator passw ord in a few minutes
© 2020 Messer Studios, LLC
• Transfer files
- Take it with you
• Denial of service
- This pow er cable is in the w ay
W ireless attack ve ctors
• Default login cred entia ls
• Modify the access point configuration
• Rogue access point
• A less-secu re entry point t o the net w ork
• Evil t win
• Attacker collect s aut hentication deta ils
• On-path attacks
• Prot ocol vulnerabilities
• 2017 - WPA2 Key Reinstallation Attack (KRACK}
• Older encryption prot ocols (W EP, WPA)
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 24
https://ProfessorMesser.com
1.5 - Attack Vectors (continued)
Email attack vectors
• One of the biggest (and most successful) attack vectors
- Everyone has email
Removable media attack vectors
• Get around the firew all
- The USB interface
• Phishing attacks
- People w ant to click links
• Malicious software on USB flash drives
- Infect air gapped networks
- Industri al systems, high-security services
• Deliver the malware to the user
- Attach it to the message
• Social engineering attacks
- Invoice scam
• USB devices can act as keyboards
- Hacker on a chip
• Data exfiltration
- Tera bytes of data w alk out the door
- Zero bandwidth used
Supply chain attack vectors
• Tamper w ith the underlying infrastructure
- Or manufacturing process
• Gain access to a netw ork using a vendor
- 2013 Target credit card br each
Cloud attack vectors
• Publicly-facing applications and services
- M istakes are made all the time
• Malw are can modify the manufacturing process
- 2010 - Stuxnet disrupts Iran's uranium enrichment program
• Security misconfigurations
- Data permissions and publ ic data stores
• Counterfeit netw orking equipment
- Instal l backdoors, substandard performance and availability
- 2020 - Fake Cisco Catalyst 2960-X and WS-2960X-48TS-L
• Brute force attacks
- Or phish the users of the cloud service
Social media attack vectors
• Attackers thank you for putting your personal information
online
- Where you are and w hen
- Vacation pictures are especially telling
• Orchestration attacks
- Make the cloud bu ild new application instances
• Denial of service
- Disable the cloud services for everyone
• User profiling
-Where w ere you born?
- What is the name of your school mascot?
• Fake friends ar e fake
- The inner circle can provide additional information
1.5 - Threat Intelligence
Threat intelligence
• Research the threats - And the threat actors
• Data is everyw here
- Hacker group profiles, tools used by the attackers,
and much more
• Make decisions based on this intelligence
- Invest in the best prevention
• Used by researchers, security operations teams,
and others
Open-source intelligence (OSINT)
• Open-source
- Publicly available sources
- A good place to start
• Internet
- Discussion groups, social media
• Government data
- Mostly public hearings, reports, w ebsites, etc.
• Commercial data
- Maps, financial reports, databases
Closed/proprietary intelligence
• Someone else has already compiled the threat information
- You can buy it
• Threat intelligence services
- Threat analytics, correlation across different data sources
• Constant threat monitoring
- Identify new threats
- Cr eate automated prevention w orkflows
Vulnerability databases
• Researchers find vulnerabilities
- Everyone needs to know about them
• Common Vulnerabilities and Exposur es (CVE)
-A community managed list of vulnerabilities
- Sponsored by the U.S. Department of Homeland
Security (OHS) and Cybersecurity and Infrastructure
Security Agency (CISA)
• U.S. National Vulnerability Database (NVD)
-A summary of CVEs
- Also sponsored by OHS and CISA
• NVD provides additional details over the CVE list
- Patch availability and severity scoring
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 25
https://ProfessorMesser.com
1.5 - Threat Intelligence (continued)
Public/private information-sharing centers
• Public t hr eat intelligence
- Oft en classifi ed information
• Private threat intelligence
- Private compan ies have extensive resources
• Need t o share critica l security details
- Rea l-time, high-qua lity cyber threat information sharing
• Cyber Threat Alliance (CTA)
- Members upload specifically formatted th reat intelligence
- CTA scores each submission and validat es
across ot her submissions
- Ot her members can extract the validated data
Automated indicator sharing (AIS)
• Intelligence industry needs a st andard w ay to shar e
important t hreat data
- Share information freely
• Structured Threat Information eXpr ession (STIX)
- Describes cyber t hr eat information
- Includes motivations, abilities, capabilities, and
response information
• Trusted Aut omated exchange of Indicator Information (TAXII)
- Secu rely sha res STIX data
Dark w eb intelligence
• Dark w eb
- Overlay net w orks that use t he Internet
- Requires specific softw are and configurations to access
• Hacking grou ps and services
- Activities
- Tools and techniques
- Credit card sales
- Accounts and passw ords
• Monitor forums for activity
- Com pany names, executive names
Indicators of compromise (IOC)
• An event that indicates an intrusion
- Confi dence is high
- He's calling from inside t he house
• Indicat ors
- Unusual amount of network activit y
- Change to file hash values
- Irregu lar international traffi c
- Changes to DNS data
- Uncommon login patterns
- Spikes of read request s t o certain fil es
Predictive analysis
• Analyze large amounts of data very qu ickly
- Find suspicious patterns
- Big data used for cybersecu rity
• Identify behaviors
- DNS queri es, t raffi c patterns, location dat a
• Creates a forecast for potential attacks
- An early-w arning system
• Often com bined wit h machine learning
- Less emphasis on signat ures
Threat maps
• Identify attacks and trends
- View w orldw ide perspective
• Created from r eal attack data
- Identify and react
File/code repositorie s
• See w hat the hackers are building
- Publi c code repositori es, GitHub
• See w hat people are accidentally releasing
- Private code can often be published publicly
• Attackers are always looking for th is code
- Potential exploits exist
- Content for phishing attacks
1.5 - Threat Research
Threat re search
• Know your enemy
- And their tools of w ar
• A never-ending process
- The fi eld is constantly moving and changing
• Information from many different places
- You can't rely on a single source
Vendor w ebsites
• Vendors and manufactur ers
- They w rote the softw are
Vulnerability feeds
• Automat ed vulnerabilit y notifi cations
• National Vulnerability Dat abase
(https:// nvd.nist.gov)
• CVE Data Feeds (https:// cve.m it r e.org)
• Third-party feeds
• Additiona l vulnerability coverage
• Roll-up t o a vulnerability management system
• Coverage across teams
• Consolidated view of security issues
• They know w hen problems are announced
- Most vendors are involved in t he disclosure process
• They know t heir product better than anyone
- They react w hen surprises happen
- Scrambling after a zero-day announcement
- Mitigating and support options
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 26
https://ProfessorMesser.com
1.5 - Threat Intelligence (continued)
Conferences
• Watch and learn
- An early warning of things to come
Local industry groups
• A gathering of local peers
- Shared industry and technology, geographical pre sence
• Researchers
- New DDoS methods, intelligence gathering,
hacking the latest technologies
• Associations
- Information Systems Securit y Association,
Network Professional Association
- Meet others in the area, discuss loca l challenges
• Stories from the trenches
- Fighting and recovering from attacks
- New methods to protect your data
• Building relationsh ips - forge alliances
Academic journals
• Research from academic professionals
- Cutting edge secu rity analysis
• Evaluations of existing security technologies
- Keeping up with the latest attack methods
• Detailed post mortem
- Tear apart the latest malw are and
see what makes it tick
• Industry user groups
- Cisco, Microsoft, VMware, etc. - Secure specific technologies
Social media
• Hacking group conversations - Mon itor the chatter
• Honeypot monitoring on Tw itter
- Identify new exploit attem pts
• Keyw ord monitoring - CVE-2020-*, bugbounty, 0-day
• Analysis of vulnerabilities - Professionals discussing the details
• Command and control - Use social media as the transport
Threat feeds
• Monitor threat announcements - Stay informed
• Extremely detailed information
- Break apart topics into their smal ler pieces
Request for comments (RFC)
• Published by the Internet Society (ISOC)
- Often w ritten by the Internet Engineering
Task Force {IETF}
- Internet Society description is RFC 1602
• Not all RFCs are standards documents
- Experimental, Best Current Practice,
Standard Track, and Historic
• M any informational RFCs analyze threats
- RFC 3833 - Threat Analysis of the Domain
Name System
- RFC 7624 - Confidentiality in the Face of
Pervasive Surveillance :
- A Threat Model and Problem Statement
• M any sources of information
- U.S. Department of Homeland Security
- U.S. Federal Bureau of Investigation
- SANS Internet Storm Center
- VirusTotal Intelligence:
- Google and Facebook correlation
TTP
• Tactics, techniques, and procedures
- Wh at are adversaries doing and how are they doing it?
• Search through data and netw orks
- Proactively look for threats
- Signatures and firewall rules can't catch everything
• Differ ent t ypes of TTPs
- Information on targeted victi ms (Finance for energy
compan ies)
- Infrastructure used by attackers (DNS and IP addr esses)
- Outbreak of a particular malw are variant on a service type
1.6 - Vulnerability Types
Zero-day attacks
• M any applications have vulnerabilities
- We've just not found them yet
Open permissions
• Very easy to leave a door open
- The hackers will alw ays find it
• Someone is w orking hard to find the next
big vulnerability
- The good guys share these with developers
• Increasingly common w ith cloud storage
- Statistical chance of finding an open permission
• Attackers keep these yet-to-be-discovered holes
to themselves
- They w ant to use these vulnerabilities for
personal gain
• June 2017 - 14 million Verizon records exposed
- Third-party left an Amazon S3 data repository open
- Researcher found the data before anyone else
• M any, many other examples
- Secure your permissions!
• Zero-day
- The vulnerabil ity has not been detected or published
- Zero-day exploits are increasingly common
• Common Vulnerabilities and Exposures (CVE)
- http://cve.mitre.org/
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 27
https://ProfessorMesser.com
1.6 - Vulnerability Types (continued)
Unsecured root accounts
• The Linux root account
- The Administrator or superuser account
Default settings
• Every application and netw ork device has a default login
- Not all of these are ever changed
• Can be a misconfiguration
- Intentionally configuring an easy-to-hack passw ord
- 123456, ninja, football
• Disable direct login to the root account
- Use the su or sudo option
• Protect accounts w ith root or administrator access
- There should not be a lot of these
• M irai botnet
- Takes advantage of default configurations
- Takes over Internet of Things (loT) devices
- 60+ default configurations
- Cameras, routers, doorbells, garage door openers, etc.
Errors
• Error messages can provide useful information
to an attacker
- Service type, version information, debug data
Open ports and services
• Services w ill open ports
- It's important to manage access
• September 2015 - Patreon is compromised
- Used a debugger to help mon itor and troubleshoot
w eb site issues
- Was left exposed to the Internet
- Effectively allow ed for remote code executions
- Gigabytes of customer data w as released online
• M irai released as open-source softw are
- There's a lot more w here that came from
• Often managed with a fir ew all
- Manage traffic flow s
-Allow or deny based on port number or application
• Firew all rulesets can be complex
- It's easy to make a mistake
• Always test and audit
- Double and triple check
Weak encryption
• Encryption protocol (AES, 3DES, etc. )
- Length of the encryption key (40 bits, 128 bits,
256 bits, etc.)
- Hash used for the integrity check (SHA, MD5, etc. )
- W ireless encryption (WEP, WPA)
Improper patch management
• Often centrally managed
- The update server determine w hen you patch
- Test all of your apps, then deploy
- Efficiently manage bandw idth
• Some cipher su ites are easier to break than others
- Stay updated with the latest best practices
• Operating system- Monthly and on-demand patches
• TLS is one of the most common issues
- Over 300 cipher suites
• Which are good and w hich are bad?
- Weak or null encryption (less than 128 bit key sizes),
outdated hashes (MD5)
Insecure protocols
• Some protocols aren't encrypted
- All traffic sent in the clear - Telnet, FTP, SMTP, IMAP
• Verify with a packet capture
- View everything sent over the netw ork
• Use the encrypted versions- SSH, SFTP, IMAPS, etc.
• Firmw are - The BIOS of the device
• Applications
- Provided by the manufactur er as-needed
Legacy platforms
• Some devices remain installed for a long time
- Perhaps too long
• Legacy devices
- Older operating systems, applications, middlew are
• May be running end-of-life softw are
- The risk needs to be compared to the return
• May require additional security protections
-Additional firewall rules
- IPS signatur e ru les for older operating systems
1.6 - Third-party Risks
Third-party risks
• IT security doesn't change because it's a th ird-party
- There should be more security, not less
System integration risk
• Professional installation and maintenance
- Can include elevated OS access
• Always expect the w orst
- Prepare for a breach
• Can be on-site
- With physical or virtual access to data and systems
- Keylogger installations and USB flash drive data
t ransfers
• Human error is still the biggest issue
- Everyone needs to use IT security best practices
• All security is important
- Physical security and cybersecurity w ork hand-in-hand
© 2020 Messer Studios, LLC
• Can run softw are on the internal network
- Less security on the inside
- Port scanners, traffic captur es
- Inject malware and spyw are, sometimes inadvertently
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 28
https://ProfessorMesser.com
1.6 - Third-party Risks (continued)
Lack of vendor support
• Security requires diligence
- The potential for a vu lnerability is always there
• Vendors are the only ones w ho can fi x their products
- Assum ing they know about the problem
- And care about fixing it
• Trane Comfortlink II thermostats
- Control the temperature from your phone
- Trane notified of three vu lnerabilities in April 2014
- Tw o patched in April 2015, one in January 2016
Supply chain risk
• You can't always control security at a third-party location
- Always maintain local security controls
• Hardw are and software from a vendor can contain malware
- Verify the security of new systems
• Counterfeit hardware is out ther e
- It looks like a Cisco switch ... ls it malicious?
Outsourced code development
• Accessing the code base
- Internal access over a VPN
- Cloud-based access
• Verify security to other systems
- The development systems shou ld be isolated
• Test the code security
- Check for backdoors
- Validate data protection and encryption
Data storage
• Consider the type of data
- Contact information
- Healthcare details, financia l information
• Storage at a th ird-party may need encryption
- Limits exposure, adds complexity
• Transferring data
- The entire data flow needs to be encrypted
1.6 - Vulnerability Impacts
• Attackers sent secure messages to t ransfer nearly one
Vulnerability impacts
• Ma licious cyber activity cost the U.S. economy bet w een
billion dollars in reserves to accounts in Phili ppines
$57 billion and $109 billion in 2016
and Sri Lanka
- The Cost of Mal icious Cyber Activity to the U.S. Economy, - Fortunately, most of the messages w ere
- The Council of Econom ic Advisers, February 2018
incorrectl y formatted
• Many other non-economic impacts - Far reaching effects
• These are the reasons w e patch vulnerabilities
Data loss
• Vulnerability: Unsecured databases
- No passw ord or default password
• July 2020 - Internet-facing databases are being deleted
- No w arning, no explanation
• Thousands of databases ar e missing
- I hope you had a backup
• Overwrites data w ith iterations of the w ord "meow"
- No messages or motivational content
Identity theft
• May through July 2017 - Eq uifax
- Data breach of 147.9 million Americans,
- 15.2 million British citizens, 19,000 Canadian citizens
- Names, SSNs, birthdates, addresses, some driver's
license num bers
• Apache Struts vulnerabilit y from March 7, 2017
- Breach started March 12th
- Wasn't patched by Equifax unti l July 30th after
discovering "suspicious network traffic"
- September 7th - Public disclosure
• September 15th - CIO and CSO depart Equifax
• July 2019 - Equifax pays $575 million in fine s
Financial loss
• Ma rch 2016 - Bank of Bangladesh
- Society for Worldwide Interbank Financial
Telecommu nications (SWIFT)
© 2020 Messer Studios, LLC
• Thirty-five requests w er e acted upon
- $81 mill ion lost and launder ed through the
Fi lipino casino industry
• Similar SWIFT vu lnerabilities: $12 mill ion from
Wells Fargo, $60 million from Taiwanese Far Eastern
International Bank
Reputation impacts
• Getting hacked isn't a great look
- Organizations are often req uired to disclose
- Stock prices drop, at least for the short term
• October 2016 - Uber breach
- 25.6 million Names, email addresses, mobile numbers
• Didn't publicly announce it until November 2017
- Allegedly paid the hackers $100,000 and had them
sign an NOA
- 2018 - Uber paid $148 million in fines
• Hackers pleaded guilt y in October 2019
- August 2020 - Ube r's former Ch ief Security Officer
Availability loss
• Outages and downtime - Systems are unavailable
• The pervasive ransom w are th reat
- Brings dow n the largest netw orks
• September 2020 - BancoEstado
- One of Chile's three biggest banks
- Ransom w are attack over the w eekend
• Bank closed for an extended period
- Segmented netw ork - Only hit internal systems
- Wipe and restore everything
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 29
https://ProfessorMesser.com
1. 7 - Threat Hunting
Threat hunting
• The constant game of cat and mouse
- Find the attacker before they fin d you
• Strategies are constantly changing
- Firew alls get stronger, so phishing gets better
• Intelligence data is reactive
- You can't see the attack until it ha ppens
• Speed up the reaction time
- Use technology to fight
Fusing the data
• Collect the dat a
- Logs and sensors, net w ork information,
Internet events, intrusion detection
• Add external sources
- Threat feed s, government al alert s, advisories and
bulletins, socia l media
• Correlat e with big data analytics
- Focuses on predictive ana lytics and user behavior
analytics
- Mathematica l analysis of unst ructured data
Intelligence fu sion
• An overw helming amount of security data
- Too much data t o properly detect, ana lyze, and react
• Many data types
- Dramatica lly different in t ype and scope
Cybersecurity maneuvers
• In the physical w orld, move t roops an d tanks
- Stop t he enemy on a bridge or shore
• Sepa rate t eams
- Secu rity operations, security intelligence, t hreat
re sponse
• In the virt ual w orld, move firew alls and operating systems
- Set a fir ew all ru le, block an IP addr ess, delete ma licious
softw are
• Fuse the security data toget her w ith
big dat a analytics
- Analyze massive and diverse dat aset s
- Pick out the inter esting data point s
and correlations
• Automated maneuvers
- Moving at the speed of light
- The computer react s instant ly
• Combine wit h fused intelligence
- Ongoing combat from many fronts
• Tomorrow it 's a different fight
1. 7 - Vulnerability Scans
Vulnerability scanning
• Usually m inima lly invasive
- Unlike a penetration test
Identify vulnerabilities
• The scanner looks for everything
- Well, not everyt hing - The signatu re s ar e the key
• Port scan
- Poke around and see w hat 's open
• Application scans
- Deskt op, mobi le apps
• Identify systems
- And security devices
• Web application scans
- Softw are on a w eb server
• Test from the outside and inside
- Don't dismiss insider threat s
• Network scans
- M isconfigur ed firew alls, open ports, vulnerable devices
• Gather as much information as possible
- We'll sepa rate w heat from chaff later
Vulnerability research
• The vulnerabilities can be cross-referenced online
- Almost all scanners give you a place t o go
Scan t ypes
• Scanners are very pow erfu l
- Use many different techniques to identify
vulnerabilities
• Non-intrusive scans
- Gather information, don't t ry to exploit a
vulnerabilit y
• Intrusive scans
- You' ll try out the vulnera bil ity to see if it w orks
• Non-cred entia led scans
- The scanner can't login to t he remote device
• Credentialed scan
- You' re a norma l user,
emu lates an insider attack
• National Vu lnerability Data base: http://nvd.nist.gov/
• Common Vulnerabilities and Exposures (CVE):
https://cve.m it r e.org/cve/
• M icroso ft Securit y Bulletins:
http://www.m icroso ft.com/technet/ security/current.aspx
• Some vulnerabilities cannot be defi nitively identifi ed
- You' ll have t o check manua lly to see if a
system is vulnerable
- The scanner gives you a heads-up
CVE-2020-25079 - An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS2670L through 2.02 devices. cgi-bin/ ddns_enc.cgi allows authenticated command injection.
V3. l :V2:-
Published: September 02, 2020; 12:15:12 PM -04:00
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 30
https://ProfessorMesser.com
1. 7 - Vulnerability Scans (continued)
• National Vulnerability Database: http://nvd.nist.gov/
- Synchronized with the CVE list
- Enhanced search functionality
Dealing with false positives
• False positives
-A vulnerability is identified that doesn't really exist
• Common Vulnerability Scoring System (CVSS)
- Quantitative scoring of a vulnerability - 0 to 10
- The scoring standards change over time
- Different scoring for CVSS 2.0 vs CVSS 3.x
• This is different than a low -severity vulnerability
- It's real, but it may not be your highest priority
• Industry col laboration
- Enhanced feed sharing and automation
• Update to the latest signatures
- If you don't know about it, you can't see it
Vulnerability scan log review
• Lack of security controls
- No firewall
- No anti-virus
- No anti-spyw are
• Work with the vulnerability detection manufacturer
- They may need to update their signatur es for your
environment
• False negatives
-A vulnerability exists, but you didn't detect it
Configuration review
• Validate the security of device configurations
- It's easy to misconfigure one thing
-A single un locked wi ndow puts the entire home at risk
• M isconfigurations
- Open shares
- Guest access
• Real vulnerabilities
- Especially new er ones
- Occasionally the old ones
• Workstations
-Account configurations, local device settings
• Servers - Access controls, permission settings
• Security devices - Firew all rules, authentication options
1. 7 - Security Information and Event Management
SIEM
• Security Information and Event Management
- Logging of security events and information
Security monitoring
• Constant information flow
- Important metrics in the incoming logs
• Log collection of security alerts
- Real-time information
• Track important statistics
- Exceptions can be identified
• Send alerts w hen problems ar e found
- Email, text, call, etc.
• Create t riggers to automate responses
- Open a ticket, reboot a server
• Log aggregation and long-term storage
- Usually includes advanced reporting features
• Data corr elation - Link diverse data types
• Forensic analysis - Gather detai ls after an event
Analyzing the data
• Big data analytics
- Analyze large data stores
- Identify patterns that w ould normally r emain invisible
Syslog
• Standard for message logging
- Diverse systems, consolidated log
• Usually a central log collector
- Integrated into the SIEM
• You' re going to need a lot of disk space
- No, more. More than that.
- Data storage from many devices over
an extended timeframe
SIEM data
• Data inputs
- Server authentication attempts
- VPN connections
- Firew all session logs
- Denied outbound traffic flow s
- Network utilizations
• Sentiment analysis
- Public discourse corr elates to real-w orld behavior
- If they hate you, they hack you
- Social media can be a barometer
SOAR
• Security orchestration, automation, and response
- Automate routine, tedious, and time intensive activities
• Packet captures
- Network packets
- Often associated w ith a critica l alert
- Some organizations capture everything
© 2020 Messer Studios, LLC
• User and entity behavior analytics (UEBA)
- Detect insider threats
- Identify targeted attacks
- Catches w hat the SIEM and OLP systems might miss
• Orchestration
- Connect many different tools together
- Firew alls, account management, email filters
• Automation - Handle security tasks automatically
• Response - Make changes immediately
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 31
https://ProfessorMesser.com
1.8 - Penetration Testing
Penetration testing
• Pentest
- Simulate an attack
Exploiting vulnerabilities
• Try to break into the system
- Be carefu l; th is can cause a den ial of service or
loss of data
- Buffer overflow s can cause instability
- Gain privilege escalation
• Similar to vu lnerabi lity scanning
- Except w e actually try to exploit
the vulnerabilities
• Often a compliance mandate
- Regular penetration testing by a 3rd-party
• National Institute of Standards and Technology
Technical Guide to Information Security Testing
and Assessment
- https://professormesser.link/800115 (PDF}
Rules of engagement
• An important document
- Defines purpose and scope
- Makes everyone aware of the test parameters
• Type of testing and schedu le
- On-site physical breach, internal test,
external test
- Normal w orking hou rs, after 6 PM on ly, etc.
• The ru les
- IP address range s
- Emergency contacts
- How to handle sensitive information
- In-scope and out-of-scope devices
or applications
Working knowledge
• How much do you kn ow about the test?
- Many different approaches
• Unknow n environment
- The pentester knows nothing about the
systems under attack
- "Blind" test
• Know n environment
- Full disclosu re
• Partially know n environment
-A mix of know n and unknow n
- Focus on certain systems or applications
• You may need to try many different vulnerability t ypes
- Passw ord brute-force, social engineering,
database injections, buffer overflows
• You'll only be sur e you're vulnerable if you can
bypass security
- If you can get through, the attackers can get through
The process
• Initial exploitation - Get into the netw ork
• Lateral movement
- Move from system to system
- The inside of the netw ork is relatively unprotected
• Persistence
- Once you're ther e, you need to make sure ther e's a
w ay back in
- Set up a backdoor, build user accounts, change or
verify default passwords
• The pivot
- Gain access to systems that w ould normally not
be accessible
- Use a vulnerable system as a proxy or relay
Pentest aftermath
• Cleanup
- Leave the netw ork in its original state
- Remove any binaries or temporary files
- Remove any backdoors
- Delete user accounts created during the test
• Bug bounty
-A rew ard for discovering vulnerabilities
- Earn money for hacking a system
- Document the vulnera bility to earn cash
1.8 - Reconnaissance
Passive footprinting
• Learn as much as you can from open sources
- There's a lot of information out there
- Remarkably difficult to protect or identify
Reconnaissance
• Need information before the attack
- Can't rush bli ndly into battle
• Gathering a digital footprint
- Learn everything you can
• Social media
• Corporate w eb site
• Understand the security postu re
- Firew alls, security configurations
• Online forums, Reddit
• M inimize the attack area
- Focus on key systems
• Social engineering
• Create a network map
- Identify routers, netw orks, remote sites
© 2020 Messer Studios, LLC
• Dumpster diving
• Business organizations
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 32
https://ProfessorMesse r.com
1.8 - Reconnaissance (continued)
Ward riving or warflying
• Combine W iFi mon itoring and a GPS
- Search from your ca r or plane
- Search from a drone
Open Source Intelligence (OSI NT)
• Gathering information from many open sources
- Find information on anyone or anything
- The name is not related t o open-source softw are
• Huge amount of intel in a short period of time
- And often some su rprising r esu lts
• Data is everyw her e - https:// osintframew ork.com/
• Automated gathering - Many softw are t ools available
• All of this is free
- Kismet , inSSIDer
- W ireless Geographic
- Logging Engine
- http://wigle.net
Active footprinting
• Trying the doors
- Maybe one is unlocked
- Don't open it yet
- Relatively easy t o be seen
• Visib le on network traffi c and logs
• Ping scans, port scans, DNS queries,
OS scans, OS fingerprinting, Service scans, version scans
1.8 - Security Teams
Security teams
• Cybersecurity involves many skills
- Operational secu rity, penetration testing,
exploit research, w eb application hardening, et c.
Purple team
• Red and blue teams
- Working together
• Become an expert in you r niche
- Everyone has a role t o play
• Competition isn't necessarily useful
- Interna l battles can stifl e organizational securit y
- Cooperate instead of com pet e
• The teams
- Red team, blue team, purple team, w hite team
• Deploy applications and data securely
- Everyone is on-board
Red team
• Offensive securit y team - The hired attackers
• Create a feedback loop
- Red informs blue, blue informs red
• Eth ical hacking - Find security holes
White team
• Not on a side
- Manages the int eractions betw een red t eams
and blue teams
• Exploit vu lnerabilities -Ga in access
• Social engineering - Constant vigilance
• Web application scann ing - Test and test again
Blue team
• Defensive security - Protecting the data
• Operational securit y - Daily secu rity tasks
• Incident response - Damage control
• Th reat hunting - Find and fi x the holes
• Digital forensics - Find dat a everyw here
• The referees in a securit y exercise
- Enforces t he rules
- Resolves any issues
- Det erm ines the score
• Manages the post-event assessments
- Lessons learned
- Results
2.1- Configuration Management
Configuration management
• The on ly constant is change
- Operating systems, patches, application updates, netw ork
modifications, new application instances, etc.
• Identify and document ha rd w are and softw are settings
- Manage t he securit y w hen changes occu r
• Rebuild those systems if a disaster occurs
- Documentation and processes will be critica l
Diagrams
• Netw ork diagrams - Document the physical wi re and device
• Physical data center layout
- Can include physical rack locations
Baseline configuration
• The security of an application environment
shou ld be w ell defined
- All application instances must foll ow t his baseli ne
- Firew all settings, pat ch levels, OS file versions
- May require constant updates
• Integrity measurement s check for the
secure baseline
- These shou ld be perform ed often
- Check against w ell-documented baselines
- Fa il ure req uires an immediat e correction
• Device diagrams - Individual cabli ng
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 33
https://ProfessorMesser.com
2.1 - Configuration Management (continued)
Standard naming conventions
• Create a standard
- Needs to be easily understood by everyone
• Devices
- Asset tag names and numbers
- Com puter names - location or region
- Serial num bers
• Netw orks - Port labeling
• Doma in configurations
- User account names
- Standard email addresses
IP schema
• An IP addr ess plan or model
- Consistent addressing for netw ork devices
- Helps avoid du plicate IP addressing
• Locations
- Number of su bnets, hosts per su bnet
• IP ranges
- Different sit es have a different su bnet
- 10.1.x.x/ 24, 10.2.x.x/24, 10.3.x.x/24
• Reserved addr esses
- Users, printers, routers/default gatew ays
2.1- Protecting Data
Prot ecting Data
• A primary job task
- An organization is out of business w ithout data
• Dat a is everyw here
- On a storage drive, on the net w ork, in a CPU
• Protecting t he data
- Encryption, secu rity policies
• Dat a perm issions
- Not everyone has the same access
Data sovereignty
• Dat a sovereignty
- Data t hat re sides in a country is subject to
the law s of that country
- Legal monit oring, court orders, et c.
• Law s may proh ibit w here dat a is stored
- GDPR (General Data Protection Regulation)
- Data collect ed on EU citizens must be stored
in t he EU
- A com plex mesh of technology and legalities
• Where is your data stored?
- Your compliance laws may prohibit
moving data out of the country
Data masking
• Dat a obfuscation
- Hide some of the original data
• Protect s PII
- And ot her sensitive dat a
• May only be hidden from view
- The data may sti ll be intact in storage
- Control the view based on permissions
• Many different techniques
- Substituting, shuffli ng, encrypting, masking out , etc.
Data encryption
• Encode information into unreadable data
- Original information is plaintext , encrypted
form is ciphertext
• Th is is a tw o-w ay street
- Convert bet w een one and t he other
- If you have t he proper key
© 2020 Messer Studios, LLC
• Confusion
- The encrypted data is drastically different
than the plaintext
• Diffusion
- Change one cha racter of the input , and many
characters change of the output
Data at-rest
• The data is on a storage device
- Hard drive, SSD, fl ash drive, etc.
• Encrypt the data
- Whole disk encryption
- Database encryption
- File- or folder-level encryption
• Apply permissions
- Access control lists
- On ly authorized users can access t he data
Data in-transit
• Dat a t ransm itted over the netw ork
- Also called data in-motion
• Not much protection as it travels
- Many different swit ches, routers, devices
• Netw ork-based prot ection
- Firew all, IPS
• Provide t ransport encryption
- TLS (Transport Layer Securit y)
- IPsec {Internet Protocol Secu rity)
Data in-use
• Dat a is actively processing in memory
- System RAM, CPU registers and cache
• The data is almost alw ays decrypted
- Ot herwise, you cou ld n' t do anyth ing with it
• The attackers can pick the decrypted information
out of RAM
- A very attractive option
• Target Corp. br each - Novem ber 2013
- 110 m ill ion cr edit cards
- Data in-transit encryption and dat a at-rest encryption
- Attackers picked t he credit card numbers out of the
point-of-sale RAM
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 34
https://ProfessorMesser.com
2.1 - Protecting Data (continued)
Tokenization
• Replace sensitive data wit h a non-sensitive placeholder
- SSN 266-1 2-1 112 is now 691-61-8539
• Common w ith credit card processing
- Use a temporary t oken du ring payment
- An attacker captu ring the card numbers
can't use them later
• Th is isn't encryption or hashing
- The original data and token aren't mathematically r elated
- No encryption overhead
Information Rights Management (IRM)
• Cont rol how dat a is used
- Microsoft Offi ce documents,
ema il messages, PDFs
• Restrict data access to unauthori zed persons
- Prevent copy an d paste
- Control screenshot s
- Manage printing
- Restrict editing
• Each user has their ow n set of rights
- Attackers have limited options
2.1- Data Loss Prevention
Data Loss Prevention (DLP)
• Where's your data?
- Social Security numbers, credit card num bers,
medical records
• Stop the data before the attackers get it
- Data " leakage"
• So many sources, so many destinations
- Oft en requires mu ltiple solutions in different places
Data Loss Prevention (DLP) system s
• On your computer
- Data in use
- Endpoint OLP
• On your netw ork
- Data in motion
• On your server
- Data at rest
USB blocking
• OLP on a w orkst ation
- Allow or deny certain tasks
• November 2008 - U.S. Department of Defense
- Worm virus "agent.btz" replicates using USB st orage
- Bans removable flash medi a and storage devices
• All devices had to be updat ed
- local DLP agent handled USB blocking
• Ban w as lifted in Februa ry 2010
- Replaced with st rict gu idelines
Cloud-based DLP
• Located betw een users and the Internet
- Watch every byte of net w ork t raffic
- No hardw are, no softwar e
• Block custom defined data strings
- Unique data for your organization
• Manage access t o URLs
- Prevent file transfers to cloud storage
• Block viruses and malw are
- Anything traversing the net w ork
DLP and email
• Email continues to be the most critical risk vector
- Inbound threat s, outbound data loss
• Check every email inbound and outbound
- Internal system or cloud-based
• Inbound - Block keywords, identify im postors,
quarantine email messages
• Outbound - Fake w ire t ransfers, W-2 t ransm issions,
employee information
Emailing a spreadsheet templat e
• November 2016 - Boeing employee emails spouse a
spreadsheet t o use as a template
• Contai ned the PII of 36,000 Boeing em ployees
- In hidden columns
- Social secu rity numbers, dat e of birth, et c.
• Boeing sells it s ow n DLP softw are
- But on ly uses it for classified w ork
2.1 - Managing Security
Geographical considerations
• Legal im plications
- Business regu lations vary betw een st ates
- For a r ecovery sit e outside of t he country, personnel
must have a passport and be able to clear immigration
- Refer to your legal team
• Offsit e backup
- Organ ization-ow ned site or 3rd-party secure fa cility
• Offsit e r ecovery
- Hosted in a different location, outside the scope of the
disaster
- Travel considerations for su pport staff and employees
© 2020 Messer Studios, LLC
Response and recovery controls
• Incident response and recovery has become
commonplace
- Attacks ar e frequent and complex
• Incident response plan should be established
- Documentation is critical
- Identify t he attack
- Contain the attack
• Li mit the impact of an attacker
- limit data exfiltration
- limit access t o sensitive data
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 35
https://ProfessorMesser.com
2.1 - Managing Security (continued)
SSL/TLS inspection
• Commonly used to examine outgoing SSL/TL$
- Secure Sockets Layer/Transport layer Security
- For example, from your computer to your bank
• Wait a second. Examine encrypted traffic?
- Is that possible?
• SSL/TL$ rel ies on trust
- W ithout t rust, none of this w orks
Trust me, I'm SSL
• Your brow ser contains a list of t rusted CAs
- My brow ser contains about 170 trusted
CAs certificates
• Your brow ser doesn't trust a w eb site unless a CA has
signed the w eb server's encryption certificate
- The w eb site pays some money to the CA for this
• The CA has ostensibly performed some checks
- Validated against the DNS record, phone call, etc.
• Your brow ser checks the w eb server's certificate
- If it's signed by a t rusted CA, the encryption
w orks seamlessly
Hashing
• Represent data as a short string of text
- A message digest
• One-w ay t rip
- Impossible to recover the original message
from the digest
- Used to store passw ords / confidentiality
• Verify a dow nloaded document is the same
as the original
- Integrity
• Can be a digital signature
-Authentication, non-repudiation, and integrity
• Wi ll not have a collision (hopefully)
- Different messages will not have the same hash
API considerations
• API (Application Programm ing Interface)
- Control softwar e or hardw are programmatically
• Secure and harden the login page
- Don't forget about the AP I
• On-path attack
- Intercept and modify AP I messages,
replay API commands
• API injection
- Inject data into an API message
• DDoS (Distributed Denial of Service)
- One bad API call can bring dow n a system
API security
• Authentication
- Limit API access to legitimate users
- Over secure protocols
• Authorization
-API should not allow extended access
- Each user has a lim ited role
-A r ead-only user should not be able to make
changes
• WAF (Web Application Firew all )
-Apply rules to API communication
2.1- Site Resiliency
Site resiliency
• Recovery site is prepped
- Data is synchron ized
Cold Site
• No hardw are
- Empty building
• A disaster is called
- Business processes fa ilover to the alternate
processing site
• Problem is addressed
- This can take hours, w eeks, or longer
• Revert back to the primary location
- The process must be documented for both directions
• No data
- Bring it with you
Hot site
• An exact replica
- Duplicate everything
• Stocked with hardw are
- Constantly updated
- You buy t w o of everything
• Applications and softwar e are constantly updated
- Automated r eplication
• Flip a switch and everything moves
-This may be qu ite a few sw itches
© 2020 Messer Studios, LLC
• No people
- Bus in your team
Warm site
• Somew here betw een cold and hot
- Just enough to get going
• Big room w ith rack space
- You bring the hardw are
• Hardw are is ready and waiting
- You bring the softw are and data
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 36
https://ProfessorMesser.com
2.1- Honeypots and Deception
Honeypots
• Attract the bad guys
- And trap them there
Fake telemetry
• Machin e learning
- Interpret big data to identify the invisible
• The "attacker" is probably a machine
- Makes for interesting recon
• Train the machine w ith actual data
- Learn how malware looks and acts
- Stop ma lw are based on actions instead of signatures
• Honeypots
- Create a virtua l w orld to explor e
• Send the machine learning model fake telemetry
- Make malicious malware look benign
• Many different options
- Kippo, Google Hack Honeypot, Wordpot, etc.
• Constant battle to discern the real from the fake
DNS sinkhole
• A DNS that hands out incorrect IP addresses
- Blackhole DNS
Honeyfiles and honeynets
• Honeynets
- More than one honeypot on a network
- More than one source of information
- Stop spa mmers - https://projecthoneypot.org
• This can be bad
- An attacker can redirect users to a ma licious site
• This can be good
- Redirect known malicious domains to a benign IP addr ess
- Watch for any users hitting that IP address
- Those devices are infected
• Honeyfiles
- Bait for the honeynet (passw ord s.txt)
- An alert is sent if the file is accessed
- A virtual bear trap
• Can be integrated with a firewall
- Identify infected devices not directly connected
2.2 - Cloud Models
Infrastructure as a service (laaS)
• Sometimes called Hardware as a Service (HaaS)
- Outsource your equipment
Anything as a Service (XaaS)
• Abroad description of all cloud models
- Use any combination of the cloud
• You're still respon sible for the management
- And for the security
• Services delivered over the Internet
- Not locally hosted or managed
• You r data is out there, but more within you r control
• Flexible consumption model
- No large upfront costs or ongoing licensing
• Web server providers
• IT becomes more of an operating model
- And less of a cost-center model
- Any IT function can be changed into a service
Platform as a service (PaaS)
• No servers, no softw are, no maintenance team,
no HVAC
- Someone else handles the platform,
you handle the development
as a Service
Application
Application
Application
Application
Data
Data
Data
Data
Runtime
Runtime
Ru ntime
Runtime
Middleware
Middleware
M iddlewa re
Middleware
OS
OS
OS
OS
Virtualization
Virtua lization
Virt ualization
Virtualization
Servers
Servers
Servers
Servers
Storage
Storage
Storage
Storage
Networking
Networking
Networking
Networking
• Put the building blocks together
- Develop you r app from what's
available on the platform
- SalesForce.com
• Centra l management of data and applications
- Your data is out there
• A complete application offering
- No development w ork req uired
- Google Mail
© 2020 Messer Studios, LLC
Software
as a Service
• You don't have direct control of the data,
people, or infrastructure
- Tra ined security professionals are
w atching your stuff
- Choose carefu lly
Software as a service (SaaS)
• On-demand softw are
- No local installation
- Why manage your own email distribution?
- Or payroll?
Infrast ructure
Platform
as a Service
On Premises
I
[
Client Managed
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 37
I
Provider Managed
https://ProfessorMesser.com
2.2 - Cloud Models (continued)
On-premises vs. off-premises
• On-premises
- Your applications ar e on local hardware
- Your servers are in your data center in your building
Cloud service providers
• Provide cloud services
- Saas, PaaS, laaS, etc.
• Charge a flat fee or based on use
- More data, more cost
• You still manage your processes
- Internal staff
- Development team
- Operational support
• Off-premises / hosted
- Your servers are not in your building
- They may not even be running on your hardware
- Usually a specialized computing environment
Cloud deployment models
• Public
-Available to everyone over the Internet
Managed service providers
• Managed Service Provider (MSP)
- Also a cloud service provider
- Not all cloud service providers are MSPs
• Community
- Several organizations share t he same r esources
• MSP support
- Network connectivity management
- Backups and disaster r ecovery
- Growth management and planning
• Private
- Your ow n virtualized local data center
• Hybrid
- A mix of public and private
• Managed Security Service Provider (MSSP)
- Fi rew all management
- Patch management, security audits
- Emergency r esponse
2.2 - Edge and Fog Computing
Cloud computing
• Computing on-demand
- Instantly ava ilable computing pow er
- Massive data storage capacity
Fog computing
• Fog
- A cloud that's close to your data
- Cloud+ Internet of Things - Fog computing
• Fast implementation
- IT teams can adj ust rapidly to change
- Smaller startup costs and pay-as-you-go
• A distributed cloud architecture - Extends the cloud
• Not always the best solution
- Latency - t he cloud is far away
- Limited bandwidth
- Difficult to protect data
- Requires Internet/ netw ork connectivity
• Distribute the data and processing
- Immediate data stays local - No latency
- Local decisions made from local data
- No bandw idth requirements
- Private data never leaves - M inimizes security concerns
- Long-term analysis can occur in the cloud - Internet
on ly w hen required
Edge computing
• Over 30 billion loT devices on the Internet
- Devices w ith very specifi c functions
- A huge amount of data
• Edge computing - " Edge"
- Process application data on an edge server
- Close to the user
• Often process data on the device itself
- No latency, no netw ork r equirement
- Increased speed and performance
- Process wh ere t he data is, instead of
processing in the cloud
© 2020 Messer Studios, LLC
Ill
Cloud / Data Centers
Fog/
Nodes
•
Internet of Things
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 38
https://ProfessorMesser.com
2.2 - Designing the Cloud
Designing t he cloud
• On-d emand computing pow er
- Click a button
Application containerization
• Contai ner
- Contains everything you need t o run an application
- Code and dependencies
- A standardized un it of softwar e
• Elasticity
- Scale up or dow n as needed
• An isolated process in a sandbox
- Self-contained
- Apps can't interact w ith each other
• Applications also scale
- Access from anyw her e
• How does it all happen?
- Plann ing and t echnology
Thin client
• Basic application usage
- Appl ications actually run on a remote server
- Virtual Desktop Infrastructur e (VD I),
- Desktop as a Service (DaaS)
- Local device is a keyboa rd, mouse, and screen.
• M inimal operating system on the client
- No huge memory or CPU needs
• Netw ork connectivity
- Big netw ork requirement
- Everything happens across the wire
Virtualization
• Virtualization
- Run many different operating systems on t he
same hardw are
• Contai ner image
- A standard for portability
- Lightw eight , uses the host kernel
- Secu re separation betw een applications
Microservices and APls
• Monolithic applications
- One big application t hat does everyth ing
• Application cont ains all decision making processes
- User interface
- Business logic
- Data input and output
• Code chall enges
- Large codebase
- Change control challenges
• APls
- Appl ication Programming Interfaces
• API is the "glue" for the m icroservices
- Work together to act as the application
• Each application instance has its
ow n operating system
- Adds overhead and complexit y
- Virtualization is relatively expensive
• Scalable
- Scale j ust the microservices you need
• Resi li ent
- Outages are contai ned
• Security and compliance
- Containment is bui lt-in
Virtualized Applications
Virtual
Machine
Virtual
Machine
Virtual
Machine
App A
App B
AppC
Guest
Operating
System
Guest
Operating
System
Guest
Operati ng
System
Containerized Applications
<(
a.
a.
<(
co
a.
a.
<(
u
0
<(
<(
a.
a.
a.
a.
w
a.
a.
<(
Host Operating System
Infrastructure
Infrastructure
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 39
a.
a.
<(
(.!)
a.
a.
<(
Docker
Hypervisor
© 2020 Messer Studios, LLC
LL
https://ProfessorMesser.com
2.2 - Designing the Cloud (continued)
Serverless architecture
• Function as a Service (FaaS}
- Applications are separated into individual, autonomous
functions
- Remove the operating system from the equation
• Developer still cr eates the server-side logic
- Runs in a stateless compute container
• May be event triggered and ephemeral
- May only run for one event
• Managed by a third-party
- All OS security concerns are at the third-party
Microservice Architecture
Resource policies
• Assigning permissions to cloud r esources
- Not the easiest task
- Everything is in constant motion
• Specify w hich resources can be provisioned (Azu re)
- Create a service in a specific region,
deny all others
• Specify the resource and w hat actions are
permitted (Amazon )
-Allow access to an API gatew ay from an
IP address range
• Explicitly list the users w ho can access the
resource (Amazon)
- Userlist is associated with the resource
Service integration
• Service Integration and Management (SIAM)
• Many different service providers
- The natural result of multisourcing
• Every provider w orks differently
- Different tools and processes
• SIAM is the integration of these
diverse providers
- Provide a single business-facing
IT organization
• An evolving set of processes and procedures
Transit gateway
• Virtual Private Cloud (VPC)
- A pool of resources created in a public cloud
Transit Gateway Network Architecture
• Common to create many VPCs
- Many different application clouds
0
• Connect VPCs w ith a t ransit gatew ay
- And users to VPCs
- A "cloud router"
customer Router
• Now make it secure
- VPCs are commonly on different IP subnets
- Connecting to the cloud is often through a VPN
2.2 - Infrastructure as Code
Infrastructure as code
• Describe an infrastructur e
- Define servers, netw ork, and applications as code
• Modify the infrastructur e and create versions
- The same w ay you version application code
• Use the description (code) to build other application
instances
- Build it the same w ay every time based on the code
• An important concept for cloud computing
- Build a perfect version every time
SDN (Software Defined Networking)
• Netw orking devices have t wo functional planes
of operation
- Control plane, data plane
• Directly programmable
- Configuration is different than forwarding
• Agile - Changes can be made dynamically
• Centrally managed - Global view, single pane of glass
• Programmatica lly configured
- No human intervention
• Open standards / vendor neutral
-A standard interface to the network
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 40
https://ProfessorMesser.com
2.2 - Infrastructure as Code (continued)
SDV (Software Defined Visibility)
• You must see the traffic to secure the data
- React and respond
• Dynamic deployments include security and network
visibility devices
- Next-generation firew alls, w eb appl ication firew alls,
- Security Information and Event Management (SIEM)
• Data is encapsulated and encrypted
- VXLAN and SSL/TLS
• New technologies change w hat you can see
- Infrastructure as code, microservices
• Security devices monitor application t raffic
- SDV provides visibil ity to t raffic flow s
• Visibility expands as the application instances expand
- Real-time metrics across all t raffic flow s
• Application flow s can be controlled via API
- Identify and react to threats
2.2 - Virtualization Security
VM sprawl avoidance
• Click a button
- You've built a server
- Or multiple servers, networks, and firewalls
• Once you escape the VM, you have great control
- Control the host and control other guest VMs
• It becomes almost too easy to build instances
- This can get out of hand very quickly
Escaping the VM
• March 2017 - Pw n2Ow n competition
- Hacking contest
- You pw n it , you ow n it - along w ith some cash
• The virtual machines are sprawled everyw her e
- You aren't sure w hich VMs ar e related to w hich applications
- It becomes extremely difficult to deprovision
• Formal process and detailed documentation
- You should have information on every virtual object
VM escape protection
• The virtual machine is self-contained
-There's no w ay out - Or is there?
• Virtual machine escape
- Break out of the VM and interact w ith the host operating
system or hardw are
• This w ould be a huge exploit
- Full control of the virtual w orld
• JavaScript engine bug in M icrosoft Edge
- Code execution in the Edge sandbox
• Window s 10 kernel bug
- Compromise the guest operating system
• Hardw are simulation bug in VM war e
- Escape to the host
• Patches w ere released soon afterwards
2.3 - Secure Deployments
Development to production
• Your programming team has been w orking on a new application
- How w ill you deploy it safely and reliably?
• Patch Tuesday
- Test and deploy Wednesday? Thursday? Friday?
• Manage the process
- Safely move from a non-production phase to full production
Sand boxing
• Isolated testing environment
- No connection to the real w orld or production system
- A technological safe space
• Use during the development process
- Try some code, break some code, nobody gets hurt
• Incremental development
- Helps build the application
Building the application
• Development
- Secure environment
- Writing code
- Developers test in their sandboxes
© 2020 Messer Studios, LLC
• Test
- Still in the development stage
-All of the pieces are put together
- Does it all w ork?
- Functional tests
Verifying the application
• Quality Assurance (QA)
- Verifies features are w orking as expected
- Validates new functionality
- Verifies old errors don't r eappear
• Staging
-Almost ready to roll it out
- Works and feels exactly like the production
environment
- Working w ith a copy of production data
- Run performance tests
- Test usability and features
Using the application
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 41
https://ProfessorMesser.com
2.3 - Secure Deployments {continued)
• Production
- Application is live
- Rol led out to the user community
• A challenging step
- Impacts the users
• The security of an application environment should
be w ell defined
-All application instances must follow this baseline
- Firewall settings, patch levels, OS file versions
- May require constant updates
• Logistical challenges
- New servers
- New softwar e
- Restart or interrupt of service
• Integrity measur ements check for the secur e baseline
- These should be performed often
- Check against w ell-documented baselines
- Failure requires an immediate correction
Secure baselines
2.3 - Provisioning and Deprovisioning
Provisioning
• Deploy an application
- Web server, database server, middlew are server, user
w orkstation configurations, certificate updates, etc.
Orchestration
• Automation is the key to cloud computing
- Services appear and disappear automatically,
or at the push of a button
• Application softw are security
- Operating system, application
• Entire application instances can be instantly provisioned
- All servers, netw orks, sw itches, fir ew alls, and policies
• Instances can move around the w orld as needed
- Follow the sun
• Netw ork security
- Secure VLAN, internal access, external access
• Softw are deployed to w orkstations
- Check executables for malicious code, verify security
posture of the w orkstation
• The security policies should be part of the orchestration
- As applications are provisioned, the proper security is
automatically included
Scalability and elasticity
• Handle application w orkload
- Adapt to dynamic changes
Deprovisioning
• Dismantling and removing an application instance
- All good things
• Scalability
- The ability to increase the w orkload in a
given infrastructure
- Build an application instance that can handle
- 100,000 transactions per second
• Security deprovisioning is important
- Don't leave open holes, don't close important ones
• Elasticity
- Increase or decrease available resources as the
w orkload changes
- Deploy multiple application instances to handle
- 500,000 transactions per second
• Firew all policies must be reverted
- If the application is gone, so is the access
• What happens to the data?
- Don't leave information out there
2.3 - Secure Coding Techniques
Secure coding concepts
• A balance betw een time and quality
- Programming with security in mind is often secondary
• Stor ed procedures limit the client interactions
- 'CALL get_options'
- That's it. No modifications to the query are possible.
• Testing, testing, testing
- The Quality Assurance (QA) process
•Tobe r eally secure, use only stored procedures
- The application doesn't use any SQL queries
• Vulnerabi lities w ill eventually be found
- And exploited
Obfuscation/camouflage
• Obfuscate
- Make something normally understandable very
difficult to understand
Stored procedures
• SQL databases
- Client sends detailed requests for data
- 'SELECT* FROM w p_options WHERE option_id = 1'
• Client requests can be complex
- And sometimes modified by the user
- This w ould not be good
© 2020 Messer Studios, LLC
• Take perfectly readable code and turn it into nonsense
- The developer keeps the readable code and gives you
the chicken scratch
- Both sets of code perform exactly the same w ay
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 42
https://ProfessorMesser.com
2.3 - Secure Coding Techniques {continued)
• Helps prevent the search for security holes
- Makes it more difficult to figure out
w hat's happen ing - But not impossible
Memory management
•Asa developer, you must be mindful of how memory is used
- Many opportunities to build vulnerable code
Code reuse/dead code
• Code r euse
- Use old code to build new applications
- Copy and paste
• Never trust data input
- Malicious users can attempt to circumvent your code
• If the old code has security vulnerabilities, reusing
the code spreads it to other applications
- You're making this much more difficult for everyone
• Some built-in functions are insecur e
- Use best practices w hen designing your code
• Dead code
- Calcu lations are made, code is executed,
results are tallied
- The results aren't used anyw her e else in the
application
• All code is an opportunity for a security problem
- Make sure your code is as alive as possible
Input validation
• What is the expected input?
- Validate actua l vs. expected
• Buffer overflow s are a huge security risk
- Make sure your data matches your buffer sizes
Third-party libraries and SDKs
• Your programming language does everything· Almost
• Third-party librari es and softw are development kits
- Extend the functionality of a programming language
• Security risk
- Application code w ritten by someone else
- M ight be secure. Might not be secure.
- Extensive testing is required
• Balancing act - Application features vs. unknow n code base
• Document all input methods
- Forms, fields, type
• Check and correct all input (normalization)
- A zip code should be only X characters long w ith a
letter in the X column
- Fix any data with improper input
Data exposure
• So much sensitive data
- Credit card numbers, social security numbers, medical
information, address details, email information
• How is the application handling the data?
- No encryption w hen stored
- No encryption across the netw ork
- Displaying information on the screen
• The fuzzers w ill find w hat you missed
- Don't give them an opening
• All input and output processes are important
- Check them all for data exposure
Validation points
• Server-side validation
- All checks occur on the server
- Helps protect against malicious users
- Attackers may not even be using your interface
Version control
• Create a file, make a change, make another change,
and another change
- Track those changes, revert back to a previous version
• Client-side validation
- The end-user's app makes the validation decisions
- Can filter legitimate input from genuine users
- May provide additional speed to the user
• Use both - But especially server-side va lidation
• Commonly used in softw are development
- But also in operating systems, wiki softw are, and
cloud-based file storage
• Useful for security
- Compare versions over time
- Identify modifications to important files
-A security challenge
- Historical information can be a security risk
2.3 - Software Diversity
Exploiting an application
• Attackers often exploit application vulnerabilities
- They find the unlocked door and open it
• Once you exploit one binary, you can exploit them all
- The application w orks the same on al l systems
- A W indow s 10 exploit affects all W indow s 10 users
• What if all of the computers w ere running different
softwar e?
- Unique binaries
- Functionally identical
© 2020 Messer Studios, LLC
Software diversity
• Alternative compiler paths w ould result in a different
binary each time
- Each compiled application w ould be a little bit
different
- But functionally the same
• An attack against different binaries w ould only be
successful on a fraction of the users
- An attacker w ouldn't know w hat exploit to use
- Make the game much harder to win
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 43
https://ProfessorMesse r.com
2.3 - Automation and Scripting
Automation and scripting
• Plan for change
- Implement automatically
Continuous integration (Cl)
• Code is constantly w ritten
-And merged into the central repository many times a day
• Automated courses of action
- Many problems can be predicted
- Have a set of automated responses
• So many chances for security problems
- Security should be a concern from the beginning
• Continuous monitoring
- Check for a particular event, and then react
• Configuration va lidation
- Cloud-based technologies allow for
constant change
- Automatically validate a configuration
before going live
- Perform ongoing automated checks
• Basic set of security checks during development
- Documented security baselines as the bar e minimum
• Large-scale security analysis during the testing phase
- Significant problems w ill have already been cover ed
Continuous delivery/deployment (CD)
• Continuous delivery
- Automate the testing process
- Automate the release process
- Click a button and deploy the application
• Continuous deployment
- Even more automation
-Automatically deploy to production
- No human integration or manual checks
2.4 - Authentication Methods
Directory services
• Keep all of an organization's usernames and passw ords
in a single database
- Also contains computers, printers, and other devices
• Large distributed database
- Constantly r eplicated
• All authentication requests reference this di rectory
- Each user only needs one set of credentials
- One username and passw ord for all services
• Access via Kerberos or LDAP
Federation
• Provide netw ork access to others
- Not j ust employees - Partners, suppliers, customers, etc.
- Provides SSO and more
• Third-parties can establish a federated netw ork
- Authenticate and authori ze betw een the
tw o organizations
- Login with your Facebook credentials
• The third-parties must establish a t rust r elationship
- And the degr ee of the t rust
Attestation
• Prove the hardware is really yours
- A system you can trust
• Easy w hen it 's j ust your computer
- More difficult w hen there are 1,000
• Remote attestation
- Device provides an operational report to a
verification server
- Encrypted and digitally signed with the TPM
- An IMEI or other unique hardware component can be
included in the report
© 2020 Messer Studios, LLC
Short message service (SMS)
• Text messaging
- Includes more than text these days
• Login factor can be sent via SMS to a predefined
phone number
- Provide username and passw ord
- Phone receives an SMS
- Input the SMS code into the login form
• Security issues exist
- Phone number can be reassigned to a
different phone
- SMS messages can be intercepted
Push notification
• Similar process to an SMS notification
-Authentication factor is pushed to a specia lized app
- Usually on a mobile device
• Security challenges
-Applications can be vulnerable
- Some push apps send in the clear
• Still more secure than SMS
- Multiple factors are better than one factor
Authentication apps
• Pseudo-random token generators
-A useful authentication factor
• Carry around a physical hardw are token generator
- Where are my keys again?
• Use softwar e-based token generator on your phone
- Pow erful and convenient
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 44
https://ProfessorMesser.com
2.4 - Authentication Methods (continued)
TOTP
• Time-based One-Time Passw ord algorithm
- Use a secret key and the time of day
- No incremental counter
• Secret key is configured ahead of time
- Timestamps are synchronized via NTP
• Timestamp usually increments every 30 seconds
- Put in your username, passw ord, and TOTP code
• One of the more common OTP methods
- Used by Google, Facebook, Microsoft, etc.
HOTP
• One-time passw ords
- Use them once, and never again
- Once a session, once each authentication attempt
• HMAC-based One-Time Passw ord algorithm
- Keyed-hash message authentication code (HMAC)
- The keys are based on a secret key and a counter
• Token-based authentication
- The hash is different every time
• Hardw are and software tokens available
- You'll need additional technology to make this w ork
Phone call
• A voice call provides the token
- The computer is talking to you
- " Your code is 1-6-2-5-1-7."
• Similar disadvantages to SMS
- Phone call can be intercepted or forwarded
- Phone number can be added to another phone
Static codes
• Authentication factors that don't change
- You just have to remember
• Personal Identification Number (PIN}
- Your secret numbers
• Can also be alphanumeric
-A passw ord or passphrase
Smart cards
• Integrated circuit card - Contact or contactless
• Common on credit cards - Also used for access control
• Must have physica l card to provide digital access
- A digital certificate
• Multiple factors
- Use the card w ith a PIN or fingerprint
2.4 - Biometrics
Biometric factors
• Fingerprint scanner
- Phones, laptops, door access
• Retinal scanner
- Unique capillary structur e in
the back of the eye
• Iris scanner
- Texture, color
• Voice recogn ition
- Talk for access
• Facial recognition
- Shape of the face and features
• Gait analysis
- Identify a person based on
how they w alk
- Many unique measurements
Biometric acceptance rates
• False acceptance rate (FAR)
- Likelihood that an unauthorized user w ill be accepted
- Not sensitive enough
• False rejection rate (FRR)
- Likelihood that an authori zed user will be rejected
- Too sensitive
• Crossover error rate (CER)
- Defines the overall accuracy of a biometric system
- The rate at w hich FAR and FRR are equal
-Adjust sensitivity to equalize both values
False Acceptance
Rate (FAR)
False Rejection
Rate (FRR)
• Veins
- Vascular scanners
- Match the blood vessels visible
from the surface of the skin
Sensitivity
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 45
https://ProfessorMesser.com
2.4 - Multi-factor Authentication
AAA framework
• Identification
-This is w ho you claim to be
- Usually your username
Something you are
• Biometric authentication
- Fingerprint, iris scan, voice print
• Authentication
- Prove you are w ho you say you are
- Passw ord and other authentication factors
• Authori zation
- Based on your identification and authentication,
w hat access do you have?
• Accounting
- Resources used: Login time, data sent
and r eceived, logout time
Cloud vs. on-premises authentication
• Cloud-based security
- Third-party can manage the platform
- Centralized platform
- Automation options w ith API integration
- May include additional options (for a cost)
• On-premises authentication system
- Internal monitoring and management
- Need internal expertise
- External access must be granted and managed
Multi-factor authentication
• Factors
- Something you know
- Something you have
- Something you are
• Usua lly stores a mathematical representation
of your biometric
- Your actual fingerprint isn't usually saved
• Difficult to change
- You can change your passw ord
- You can't change your fingerprint
• Used in very specific situations
- Not foolproof
Somewhere you are
• Provide a factor based on your location
-The transaction only completes if you are in a
particular geography
• IP address
- Not perfect, but can help provide more info
- Works with 1Pv4, not so much with 1Pv6
• Mobile device location services
- Geolocation to a very specific area
- Must be in a location that can r eceive GPS
information or near an identified mobile
or 802.11 netw ork
- Still not a perfect identifier of location
Something you can do
• A persona l w ay of doing things
- You' re specia l
• Handwriting analysis
- Signature comparison
- Writing technique
• Attributes
- Somew here you are
- Something you can do
- Something you exhibit
- Someone you know
• Very similar to biometri cs
- Close to something you are
Something you know
• Passw ord
- Secret w ord/ phrase, string of characters
- Very common authentication factor
• PIN
- Personal identification number
- Not typically contained anyw her e on a
smart card or ATM card
Other attributes
• Something you exhibit
-A unique trait, personal to you
- Gait analysis - the w ay you w alk
- Typing analysis - the w ay you hit the
enter key too hard
• Pattern
- Complete a seri es of patterns
- Only you know the right format
Something you have
• Smart card
- Integrates with devices
- May require a PIN
• USB token - Certificate is on the USB device
• Hardw are or softw are tokens
- Generates pseudo-random authentication codes
• Your phone -SMS a code to your phone
© 2020 Messer Studios, LLC
• Someone you know
- A social factor
- It's not w hat you know ...
- Web of t rust
- Digital signature
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 46
https://ProfessorMesser.com
2.5 - Disk Redundancy
Redundancy
• Duplicate parts of the system
- If a part fails, the redundant part can be used
• Disperse technologies to different geograph ies
- Use multiple data centers
- In different locations
• Ma inta in uptime
- The organization continues to function
• Data centers m ight be part of the normal operations
- East coast and w est coast operations centers
• No hardware failure
- Servers keep running
• May be part of a disaster recovery center
- If Florida gets hit, fire up the Denver data center
• No softw are failure
- Services always available
• No system failure
- Network performing optimally
Disk redundancy
• Multipath 1/0 (Input/Output)
- Especially useful for netw ork-based storage subsystems
- Mu ltiple Fibre Channel interfaces with multiple switches
Geographic dispersal
• Bad things can happen in a local area
- Hurricanes, tornadoes, flooding,
• RAID - Redundant Array of Independent Disks
• Multiple drives create redundancy
- Many different designs and implementations
RAIO Level
Description
Details
RAID 0
Striping w ithout parity
High pe rformance, no fault tolerance
RAID 1
Mirroring
Duplicat es data for fau lt tolerance,
but requi res t wice the disk space
RAID 5
Striping wit h parity
Fau lt tolerant , only requires an
add itiona l disk for redundancy
RAID O+l, RAID l+O,
RAID 5+1, etc.
Multiple RAID t ypes
Combine RAID met hods t o increase redundancy
2.5 - Network Redundancy
Load balancing
• Some servers are active - Others are on standby
• If an active server fails, the passive server takes its place
NIC teaming
• Load Ba lancing/ Fa il Over (LBFO)
- Aggregate bandwidth, redundant paths
- Becomes more important in the virtual w orld
~
l oad
Balancer . ~
• Mu ltiple netw ork adapters
- Looks like a single adapter
- Integrate w ith sw itches
I \
• NICs talk to each other
- Usually mu lticast instead of broadcast
- Fa ils over w hen a NIC doesn't respond
Server A
00
Server B
Server C
Server D
2.5 - Power Redundancy
UPS - Uninterruptible Power Supply
- Short-term backup pow er
- Blackouts, brow nouts, surges
Generators
• Long-term pow er backup
- Fuel storage requ ired
• UPS types
- Offline/ Standby UPS
- Line-interactive UPS
- On-l ine/Double-conversion UPS
• Pow er an entire building
- Some pow er outlets may be marked as
generator-pow ered
• Features
- Auto shutdow n, battery capacity, outlets,
phone line suppression
© 2020 Messer Studios, LLC
• It may take a few m inutes to get the
generator up to speed
- Use a battery UPS w hile the generator is starting
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 47
https://ProfessorMesser.com
2.5 - Power Redundancy (continued)
Dual-power supplies
• Redundancy
- Internal server pow er suppli es
- External pow er circu its
Power distribution units (PDUs)
• Provide multi ple pow er outlets
- Usua lly in a rack
• Often include mon itoring and control
- Manage pow er capacity
- Ena ble or disable individual outlets
• Each pow er supply can handle 100% of the load
- Would normally run at 50% of the load
• Hot-sw appable
- Replace a faulty pow er supply without pow ering dow n
2.5 - Replication
SA N replication
• Sha re data betw een different devices
- If one device fails, you can still w ork w ith the data
- VERY fast recovery times com pared to
t raditional backups
• Storage area net works (SANs)
- Specialized high-performance net w ork of
storage devices
• Consistent service offering
- Ma int ain copies anyw her e in t he w orld
• Recover from a replicated copy
- Provides a backup if needed
• Efficient copying
- On ly replicates the data that has changed
On premises vs. cloud redundancy
• Speed
- Local devices are connect over very fast netw orks
- Cloud connections are almost always slow er
• SAN-to-SAN replication
- Du plicate data from one data center to another
• SAN snapshot
- Create a state of data based on a point in time
- Copy that state to ot her SANs
• Money
- Purchasing your ow n storage is an expensive
capital investment
- Cloud costs have a low entry point and can scale
VM replication
• Virtual machine redundancy
- Maintain one VM, replicate to all others
- The virtual machine is really just one big file
• Security
- Local data is private
- Data stored in the clou d requ ires additional
security controls
2.5 - Backup Types
Backup Types
• The archive attribut e
- Set w hen a file is modifi ed
• Full - Everything
- You' ll w ant t his one first
• Incrementa l
- All files changed since the last incrementa l backup
• Differ entia l
- All files changed since the last full backup
Data Selection
Backup / Restore nme
Archive Attribute
Full
All selected data
High /low
(one tape se t )
Cleared
Incre me ntal
New files a nd files
mod ified since t he
last backup
Low /High
(Multiple ta pe sets)
Cleared
Differential
All d ata modified
sinee t he last full
backup
Mod e rate / Moderate
(No more than 2 sets)
Not Cleared
,---
Increment al Backup
• A full backup is t aken first
Incremental
• Subseq uent backups contain
data changed since the last full
backup and last incremental backup
- These are usual ly smaller
than the fu ll backup
• A restoration re quires the full
backup and all of t he increment al
backu ps
...... [ Incremental]
r
__.,.,
r-....
Incremental
Incremental
Incremental
Incremental ]
Full
Backup
Full
Backup
'
Monday
© 2020 Messer Studios, LLC
[
Tuesday
Wednesday
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 48
Thursday
~
Recovery
https://ProfessorMesser.com
2.5 - Backup Types {continued)
Differential Backup
• A full backup is t aken first
• Subseq uent backups contain
data changed since the last
fu ll backup
- These usua lly grow larger as
data is changed
• A restoration re quires the full
backup and t he last differ entia l
backup
[ Differential ]
Differential
Differential
Full
Backup
Monday
Thursday's
Differential
Full
Backup
Tuesday
Wednesday
Thursday
Recovery
Backup media
• Magnetic ta pe
- Sequential storage
- 100 GB to mu ltiple terabytes per cart ridge
- Easy to sh ip and st ore
Other backups
• Cloud
- Backup to a remote device in the cloud
- Su pport many devices
- May be limited by bandwidth
• Disk
- Faster than magnetic t ape - Dedu plicate and com pr ess
• Image
- Captu re an exactly replica of everyt hing on a
storage drive
- Restore everything on a partition, includi ng
operating system fi les and user documents
• Copy
- A useful strategy
- May not include version ing - May need to keep offsite
NAS vs. SAN
• Netw ork Attached Storage (NAS)
- Connect to a sha red storage device across the net w ork
- File-level access
• Storage Area Network (SAN)
- Looks and feels like a local storage device
- Block-level access
- Very efficient r eadi ng and w riting
• Requires a lot of bandw idt h
- May use an isolated netw ork and high-speed
netw ork t echnologies
Backup locations
• Offline backup
- Backup to loca l devices
- Fast and secure
- Must be protected and ma int ained
- Often requires offsite storage for disaster recovery
• Online backup
- Remote net w ork-connected third -party
- Encrypted
- Accessible from anyw her e
- Speed is limited by net work bandwidth
2.5 - Resiliency
Non-pe rsistence
• The cloud is alw ays in motion
- Appl ication instances are constantly built
and t orn dow n
• Sna pshots can ca pture the current confi guration and data
- Preserve the com plet e state of a device, or
just t he con figu ration
• Revert to know n state
- Fa ll back t o a previous sna pshot
• Roll back to know n con figu ration
- Don't modify the data, but use a pr evious con figuration
• Live boot media
- Run the operating system from removable
media - very portable !
High availability
• Redundancy doesn't always mean always ava ilable
- May need to be pow ered on manually
© 2020 Messer Studios, LLC
• HA (high avai lability)
- Alw ays on, alw ays available
• May include many different components
w orking together
- Active/ Active can provide sca lability advantages
• Higher availability almost always means higher costs
- There's alw ays another contingency you cou ld add
- Upgraded pow er, high-quality server components,
etc.
Order of restoration
• Application-specific
- Certain com ponents may need to be rest ored fi rst
- Databases should be restored before the application
• Backu p-specific
- Incr emental backups restor e the fu ll backup,
then all subseq uent incrementa l backups
- Differential backups restore the fu ll backup,
then t he last differ entia l backup
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 49
https://ProfessorMesser.com
2.5 - Resiliency (continued)
Diversity
• Technologies
- A zero-day OS vulnerability can cause significant
outages
- Multiple security devices
• Vendors
- A single vendor can become a disadvantage
- No options du ring annual renewals
- A bad support team may not be able to resolve
problems in a timely manner
• Cryptographic
- All cryptography is temporary
- Diverse certi ficate authorities can provide
add itiona I protection
• Controls
-Administrative controls
- Physical controls
- Technical controls
- Combine them together
- Defense in depth
2.6 - Embedded Systems
Embedded systems
• Hardw are and software designed for a specific function
- Or to operate as part of a larger system
• Is built w ith only this task in m ind
- Can be optim ized for size and/or cost
• Common examples
- Traffic light controllers
- Digital w atches
- Medical imaging systems
Soc {System on a Chip)
• Multiple components running on a single chip
- Common with embedded systems
• Small form-factor
- External interface support
- Cache memory, flash memory
- Usually low er power consumption
• Security considerations are important
- Difficult to upgrade hardw are
- Limited off-the-shelf security options
Field-programmable gate array {FPGA)
• An integrated circuit that can be configured
after manufacturing
- Array of logic blocks
- Programmed in the field
• A problem doesn' t require a hardware replacement
- Reprogram the FPGA
• Common in infrastructu re
- Firew all logic
- Routers
SCADA/I CS
• Supervisory Control and Data Acquisition System
- Large-scale, multi-site Industrial Control Systems (ICS)
• PC manages equipment
- Pow er generation, refin ing, manufacturing equipment
- Facilities, industrial, energy, logistics
• Distributed control systems
- Real-time information
- System control
• Requires extensive segmentation
- No access from the outside
M ser Stu d.,os "C
uc
Smart devices/ loT {Internet of Things)
• Sensors - Heating and cooling, lighting
• Smart devices - Home automation, video doorbells
• Weara ble technology - Watches, health monitors
• Facility automation - Temperature, air quality, lighting
• Weak defaults
- IOT manufacturers are not security professionals
Specialized
• Medical devices
- Heart mon itors, insulin pumps
- Often use older operating systems
• Vehicles
- Internal netw ork is often accessible from
mobile netw orks
- Control internal electronics
• Aircraft
- DoS could damage the aircraft
-An outage w ould be problematic
• Smart meters - Measure pow er and w ater usage
VoIP
• Voice over Internet Protocol
- Instead of analog phone line or the
- Plain Old Telephone Service (POTS}
• A relatively complex embedded system
- Can be relatively important
• Each device is a computer
- Separate boot process
- Individual con figurations
- Different capabilities and functiona lities
HVAC
• Heating, Ventilation, and Air Conditioning
- Thermodynamics, flu id mechanics, and heat transfer
• A complex science
- Not something you can properly design yourself
- Must be integrated into the fire system
• PC manages equipment
- Makes cooling and heating decisions for w orkspaces
and data centers
• Traditionally not built with security in mind
- Difficult to recover from an infrastructure DoS
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page SO
https://Pro essor esser.com
2.6 - Embedded Systems (continued)
Drones
• Flying veh icle
- No pilot on board
• May be manual ly controlled from the ground
- Oft en w ith some autonomy
- Set it and forget it
• Extensive commercia l and non-commercial use
- May require federal licenses
- Secu rity and fail-safes are required
Printers, sca nners, and fax machines
• All-in-one or mu ltifunction devices (M FD)
- Everything you need in one single device
RTOS (Real-Time Operating System)
• An operating system wit h a deterministic
processing schedu le
- No time t o w ait for other processes
- Industrial equipment, automobiles,
- Mil itary environments
• Extremely sensitive to secu rity issues
- Non-t rivial systems
- Need to alw ays be available
- Difficult t o know w hat type of security is in place
• No longer a simple print er
- Very sophisticat ed firm w are
Surveillance systems
• Video/ audi o surveillance
- Embedded systems in t he cameras and t he
monitoring st ations
• Some images are stored loca lly on the device
- Can be ret rieved externally
• Secure the security system
- Restrict access from others - Prevent a denial of service
• Logs are stored on t he device
- Contain commun ication and fax details
• Physically difficult to replace cameras
- Accessible independently over the net w ork
- May allow for fi rm w are upgrades
2.6 - Embedded Systems Communication
SG
• Fifth generation cellular networking
- Launched w orldwide in 2020
• Significant performance im provements
- At higher frequenci es
- Eventually 10 giga bit s per second
- Slow er speeds from 100-900 Mbit/s
• Significant loT impact
- Bandwidth becomes less of a constraint
- Larger data t ransfers
- Faster monitoring and notifi cation
- Additional cloud processing
• Bid irectional communication
- But not at t he same time using the same w ire/fiber
• Ethernet standard - 100BASE-TX,
l000BASE-T, 10GBASE-T
Narrowband
Signal
Subscriber identity m odule (SIM)
• SIM card - A universal integrated circu it ca rd
• Used to provide information to a cellular
network provider - Phones, t ablets, embedded systems
• Cont ains mobil e details
- IMSI (Int ernationa l Mobile Subscriber Identity)
- Authentication information, cont act information
• Important to manage
- Many em bedded systems, many SIM cards
Narrowband
• Communicate analog signals over a narrow range
of frequencies
- Over a longer distance - Conserve t he frequency use
• Many loT devices can communicate over long distances
- SCADA eq uipment - Sensors in oil fi elds
Baseband
• Generally a single cable w ith a digita l signa l
- Can be fiber or copper
• The commun ication signa l uses all of t he bandwidth
- Utilization is either 0% or 100%
© 2020 Messer Studios, LLC
Broadband
Signal
Frequency
Zigbee
• Internet of Th ings networking
- Open standard - IEEE 802.15.4 PAN
• Alternative t o Wi Fi and Bluetooth
- Longer distances t han Bluetooth
- Less pow er consum ption than W iFi
• Mesh netw ork of all Zigbee devices in your home
- Light sw itch commun icates to light bulbs
- Tell Amazon Echo to lock the door
• Uses t he ISM band
- Industrial, Scientifi c, and Medical
- 900 MHz and 2.4 GHz frequencies in the US
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 51
https://ProfessorMesser.com
2.6 - Embedded Systems Constraints
Embedded systems
• Not usua lly a fu lly capable computer
- Low cost, purpose-built
• Crypto
- Limited hardware options
- Difficult to change or modify cryptography features
• Adds additional constraints
- May have limited or missing features
- Upgradability limitations
- Limits in communication options
• Inability to patch
- Some loT devices have no fi eld-upgradable options
- Upgrade options may be limited or difficult to install
• An ongoing trade off
- Low cost systems - Unique management challenges
Constraints
• Pow er - May not have access to a main pow er source
- Batteries may need to be replaced and maintained
• Compute
- Low-pow er CPUs are limited in speed
- Cost and heat considerations
• Netw ork
- May not have the option for a w ired link
- May be in the middle of a field
- W ireless is the limiting factor
• Authentication
- Security features are often an afterthought
- Limited options, no multi-factor, limited integration
w ith existing directory services
• Range
- Purpose-bu ilt - usually does one thing very w el l
- May not provide much additional fun ctionality
• Cost
- Single-purpose functionality comes at a low cost
- Low cost may affect product quality
• Implied trust
- Limited access to the hardware and softw are
- Difficult to veri fy the security posture
2.7 - Physical Security Controls
Barricades/ bollards
• Prevent access
- There are limits to the prevention
• Channel people through a specific access point
- And keep out other things
- Allow people, prevent cars and trucks
• Identify safety concerns
- And prevent injuries
• Can be used to an extreme
- Concrete barriers / bollards
- Moats
Access control vestibules
• All doors normal ly unlocked
- Opening one door causes others to lock
• All doors normal ly locked
- Unlocki ng one door prevents others from being
unlocked
• One door open/ other locked
- When one is open, the other cannot be unlocked
• One at a time, controlled groups
- Managed control through an area
• Consider personal safety
- Fire exits
- Warn ing signs
- Chemicals
- Construction
- Medical resources
• Informational
- In case of emergency, call this number
Video surveillance
• CCTV (Closed circuit television)
- Can replace physical guards
• Camera featu res are important
- Motion recogn ition can alarm and alert w hen
something moves
- Object detection can identify a license plate or
person's face
• Often many different cameras
- Netw orked together and recorde d over time
Alarms
• Circuit-based
- Circuit is opened or closed
- Door, w indow, fence
- Useful on the perimeter
Industrial camouflage
• Conceal an important facility in plain sight
- Blends in to the local environment
• Motion detection
- Radio reflection or passive infrared
- Useful in areas not often in use
• Duress
- Triggered by a person - The big red button
© 2020 Messer Studios, LLC
Signs
• Clear and specific instructions
- Keep people aw ay from restricted areas
- Consider visitors
• Protect a data center
- No business signs
- No visual clues
- Surround it with a w ater feature
- Install a guard gate
- Planters out front are bollards
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 52
https://ProfessorMesser.com
2. 7 - Physical Security Controls (continued)
Guards and access lists
USB data blocker
• Security guard
- Physical protection at the reception area of a
facility
- Validates identification of existing employees
- Provides guest access
• Don't connect to unknow n USB interfaces
- Even if you need a quick charge
- Prevent "juice jacking"
• ID badge
- Picture, name, other details
- Must be w orn at al l times
• Use you r pow er adapter
- Avoid the issue entirely
• Use a USB data blocker
- Allow the voltage, reject the data
Proper lighting
• Access list
- Physical list of names
- Enforced by security guard
• More light means more security
- Attackers avoid the light
- Easier to see w hen lit
- Non IR cameras can see better
• Mainta ins a visitor log
Guards
• Tw o-person integrity/control
- Minim ize exposure to an attack
- No single person has access to a physical asset
• Robot sentries
- Mon itoring
- Rounds/ Periodic checks
- An emerging technology
• Specialized design
- Consider overall light levels
- Lighting angles may be important
- Facial recognition
- Avoid shadows and glare
Fencing
Biometrics
• Build a perimeter
- Usually very obvious
- May not be w hat you're looking for
• Biometric authentication
- Fingerprint, retina, voiceprint
• Transparent or opaque
- See through the fence (or not)
• Usually stores a mathematical representation
of your biometric
- Your actual fingerprint isn't usually saved
• Robust
- Difficult to cut the fence
• Prevent climbing
- Razor wire
- Build it high
• Difficult to change
- You can change your passw ord
- You can't change your fingerprint
Fire suppression
• Used in very specific situations
- Not foolproof
• Electronics require unique responses to fire
- Water is generally a bad thing
Door access controls
• Detection
- Smoke detector, flame detector, heat detector
• Conventional - Lock and key
• Deadbolt - Physical bolt
• Electronic - Keyless, PIN
• Token-based
- RFID badge, magnetic sw ipe ca rd, or key fob
• Biometric - Hand, fingers or retina
• Multi-factor - Smart card and PIN
• Suppress with w ater
- Where appropriate
• Suppress with chemicals
- Halon - No longer manufactured
- Destroys ozone
- Commonly replace d with Dupont FM-200
Sensors
Cable locks
• Temporary security
- Connect your hardware to someth ing solid
• Motion detection
- Identify movement in an area
• Noise detection
- Recognize an increase in sound
• Cable w orks almost anyw here
- Useful wh en mobile
• Most devices have a standard connector
- Reinforced notch
• Not designed for long-term protection
- Those cables are pretty thin
• Proximity reader
- Commonly used w ith electronic door locks
- Combined w ith an access card
• Moisture detection
- Useful to identify w ater leaks
• Temperature
- Monitor changes over time
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 53
https://ProfessorMesser.com
2. 7 - Physical Security Controls (continued)
Drones
• Quickly cover large areas
- More than just one building
• More than physical security
- Site surveys, damage assessments
• On-board sensors
- Motion detection
- Thermal sensors
Screened subnet
• Formerly know n as a demilitari zed zone (DMZ)
-An additional layer of security betw een the
Internet and you
- Public access to public resources
Protected distribution
• Protected Distribution System (PDS)
-A physically secure cabled network
• Video evidence
- High resolution video capture
• Protect your cables and fibers
-All of the data flow s through these conduits
Faraday cage
• Prevent cable and fiber taps
- Direct taps and inductive taps
• Blocks electromagnetic fields
- Discovered by M ichael Faraday in 1836
• A mesh of conductive material
- The cage cancels the electromagnetic field's
effect on the interior
-The w indow of a microw ave oven
• Prevent cable and fiber cuts
-A physical denial of service (DoS)
• Hardened protected distribution system
- Sealed metal conduit , periodic visual inspection
• Not a comprehensive solution
- Not all signal types are blocked
- Some signal types are not blocked at all
• Can r estrict access to mobile networks
- Some very specific contingencies w ould need to
be in place for emergency calls
2. 7 - Secure Areas
Secure areas
• Physically secure the data
- As important as the digital secu rity
• An important part of a security policy
- Not a question to leave unansw ered
• Secure active operations
- Prevent physical access to the systems
• Secure offline data
- Backups are an important security concern
Air gap
• Physical separation betw een networks
- Secure netw ork and insecure network
- Sepa rate customer infrastructures
• Most environments are shared
- Shared routers, switches, firew al ls
- Some of these are virtualized
• Safe
- Similar to a vault, but smaller
- Less expensive to implement
- Space is limited - Install at more locations
Hot and cold aisles
• Data centers
- Lots and lots of equipment
- This equipment generates heat
• Optimize cooling
- Keep components at optimal temperatures
• Conserve energy
- Data centers are usually very large rooms
- Focus the cooling
- Low er energy costs
• Specialized netw orks require air gaps
- Stock market netw orks
- Pow er systems/ SCADA
-Airplanes
- Nuclear pow er plant operations
Vaults and safes
• Vault
- A secure reinforced room
- Store backup media
- Protect from disaster or theft
- Often onsite
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 54
https://ProfessorMesser.com
2.7 - Secure Data Destruction
Data destruction and media sanitization
• Disposal becomes a legal issue
- Some information must not be destroyed
- Consider offsite storage
• You don't w ant critica l information in the t rash
- People really do dumpster dive
- Recycling can be a security concern
- Physically destroy the media
• Reuse the storage media
- Sanitize the media for r euse
- Ensure nothing is left behind
Protect your rubbish
• Secure your garbage - Fence and a lock
• Shred your documents
- This wi ll only go so far
- Governments burn the good stuff
• Burn documents - No going back
• Pulp the paper
- Large tank w ashing to remove ink
- Paper broken dow n into pulp
- Creates recycled paper
Physical destruction
• Shredder/ pulverizer
- Heavy machinery, complete destruction
• Drill / Hammer
- Quick and easy - Platters, all the w ay through
• Electromagnetic (degaussing)
- Remove the magnetic field
- Destroys the drive data and renders the drive unusable
• Incineration - Fire hot.
Certificate of destruction
• Destruction is often done by a 3rd party
- How many drills and degaussers do you have?
• Need confirmation that your data is destroyed
- Service should include a certificate
• A paper t rail of broken data
- You know exactly w hat happened
Sanitizing media
• Purge data
- Remove it from an existing data stor e
- Delete some of the data from a database
• Wipe data
- Unrecoverable removal of data on a storage device
- Usually overwrites the data storage locations
- Usefu l w hen you need to reuse or continue using
the media
Data security
• July 2013 - UK National Health Service Surr ey
- Provided hard drives to a 3rd-party to be destroyed
- Contained 3,000 patient records
- Received a destruction certificate, but not
actually destroyed.
- Sold on eBay. Buyer contacted authorities,
fined £200,000
• File level overwriting
- $delete - W indow s Sysinternals
• Whole drive wipe secure data removal
- DBAN - Dari k's Boot and Nuke
- Physical drive destruction - One-off or industrial r emova l and destroy
2.8 - Cryptography Concepts
Cryptography
• Greek: " kryptos"
- Hidden, secret
Cryptographic keys
• Keys
- Add the key to the cypher to encrypt
- Larger keys are generally more secure
• Confidentiality
- It 's a secret
• Authentication and access control
- I know it's you. I REALLY know it 's you.
• Non-repudiation - You said it. You can't deny it.
• Integrity- Tamper-proof
Cryptography terms
• Plaintext - An unencrypted message (in the clear)
• Ciphertext - An encrypted message
• Cipher - The algorithm used to encrypt and/ or decrypt
• Cryptanalysis
- The art of cracking encryption
- Researchers are constantly trying to find
w eaknesses in ciphers
- A mathematically flaw ed cipher is bad for everyone
© 2020 Messer Studios, LLC
• Some encryption methods use one key
- Some use more than one key
- Every method is a bit differ ent
Give weak keys a workout
• A w eak key is a w eak key
- By itself, it 's not very secure
• Make a w eak key stronger by performing
multiple processes
- Hash a passw ord. Hash the hash of the passw ord.
And continue ...
- Key stretching, key strengthening
• Brute force attacks w ould r equire reversing each
of those hashes
- The attacker has to spend much more time, even
though the key is small
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 55
https://ProfessorMesser.com
2.8 - Cryptography Concepts (continued)
• New st andards are being created
- National Institute of Standards and Technology (NIST)
lead ing t he effort
- Provide pow erful encryption
- Include int egrity feat ures
- Keep costs low
Key stretching libraries
• Alrea dy built for your appli cation
- No additional programm ing involved
• bcrypt
- Generates hashes from passw ords
- An extension to t he UN IX crypt li bra ry
- Uses Blow fish cipher t o perform multiple
rounds of hashing
Homomorphic encryption (HE)
• Encrypted data is difficu lt t o w ork w ith
- Decrypt the data
- Perform a fun ction
- Encrypt the answ er
• Homomorphic encryption
- Perform calculations of data w hile it's encrypted
- Perform the w ork directly on t he encrypted data
- The decrypted data can only be view ed with
t he private key
• Passw ord-Based Key Derivation Function 2 (PBKDF2)
- Part of RSA public key crypt ography st andards
(PKCS #5, RFC 2898)
Lightweight cryptography
• Pow erful cryptography has traditiona lly
required st rength
- A pow erful CPU and lots of time
• Internet of Things (loT) devices have li mited pow er
- Bot h w atts and CPU
• Many advantages
- Secur ely store data in the cloud
- Perform research on data without viewing the data
2.8 - Symmetric and Asymmetric Cryptography
The key pair
• Asymmetric encryption
- Pu blic Key Cryptography
Symmetric encryption
• A single, shared key
- Encrypt w ith the key
- Decrypt w ith the same key
- If it get s out, you' ll need anot her key
• Key generation
- Build bot h the publ ic and private key at the same
time
- Lots of randomization
- La rge prime num bers
- Lots and lots of mat h
• Secret key algorithm
- A shared secret
• Doesn't scal e very w ell
- Can be challenging t o distribute
• Everyone ca n have the pu blic key
- Only Alice has the private key
• Very fast to use
- Less overhead than asymmet ric encryption
- Oft en combined w ith asymmetric encryption
Elliptic curve cryptography (ECC)
• Asymmetric encryption
- Need large integers composed of t wo or more large
prime factors
Asymmetric encryption
• Public key cryptogra phy
- Tw o (or more) mathematically r elated keys
• Private key - Keep th is private
• Public key - Anyone can see this key - Give it aw ay
• The private key is the only key that can decrypt data
encrypted w ith the pu blic key
- You can't derive the private key from t he public key
• Instead of numbers, use curves !
- Uses smaller keys than non-ECC asymmetric
encryption
- Smaller st orage an d t ransmission req uirements
- Perfect for mobile devices
Alice's Key Generation
Large
Random
Number
© 2020 Messer Studios, LLC
Key Generation
Program
__
.___
______. ~
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 56
https://ProfessorMesser.com
2.8 - Symmetric and Asymmetric Cryptography (continued)
Asymmetric encryption
Hello,
Alice
sBcBAE~
Plaint ext
BCAAQ
BQJYtX
ToCRA
He llo,
Alice
Ciphertext
Plaintext
Bob's Laptop
Alice's Public Key
0
Alice's Private Key
Bob combines Alice's public key
with plaintext t o create ciphertext
~ Al ice uses her private key to decrypt
~ the ciphertext into the original plaintext
Symmetric key from asymmetric keys
~
Bob's P,i"" Key
~
~
Symm&dc Key
Bob's Laptop
Bob's Public Key
Al ice's Public Key
0
Bob combines his private key with
Alice's public key to create a symmetric key
~ Alice combin es her private key with
~ Bob's pu blic key to create the same symmetric key
2.8 - Hashing and Digital Signatures
• The hash should be unique
• Represent data as a short string of text - A message digest
- Different in puts should never crea te the same hash
• One-w ay trip
- If they do, it's a collision
- Im possible to recover the original message from the digest • MOS has a collision problem
- Used to store passwords/ confidentiality
- Found in 1996 - Don't use MOS
• Verify a downloaded document is t he same as the original
Practical hashing
- Integrity
• Veri fy a down loaded file
- Hashes may be provided on the download site
• Can be a digit al signatu re
- Compar e the down loaded file hash with the
- Authentication, non-r epudiation, and integrity
posted hash va lue
• Will not have a collision (hopefully)
Hashes
- Different messages will not have the same hash
Collision
• Hash functions
- Take an input of any size - Create a fi xed size string
- Message digest, checksum
© 2020 Messer Studios, LLC
• Password storage
- Instead of storing the password, store a salted hash
- Compar e hashes during t he authentication process
- Nobody ever know s your actual password
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 57
https://ProfessorMesser.com
2.8 - Hashing and Digital Signatures (continued)
Adding some salt
• Salt
- Random data added to a password when hashing
Digital signatures
• Prove the message w as not changed
- Integrity
• Every user gets their own random salt
- The salt is commonly stored w ith the passw ord
• Prove the source of the message
- Authentication
• Make sure the signature isn't fake
- Non-repudiation
• Rain bow tables w on't w ork with salted hashes
- Additional random va lue added to the
original passw ord
• This slows things dow n the brute force process
- It doesn't completely stop the reverse engineering
• Sign with the private key
- The message doesn't need to be encrypted
- Nobody else can sign this (obviously)
• Each user gets a different random hash
- The same passw ord creates a different hash
• Veri fy with the pu blic key
- Any change in the message will invalidate the signatur e
•
•
Creating a Digital Signature
~~
1
You re
hired,
Bob
sBc BA€8CAA
QBQJZzBlbCR
AWS.ZAwUFg
0
Hash of
Pla intext
Pla intext
Hash
Alice's Com puter
Hashing
Algorithm
sBcBAE8CAA
QBQJZzB bCR
st-~ss-etMS
ft
AWSZAwUFg
Hash of
Plaintext
You're
hired,
GmcBkELopt
D igital
Signature
o
•
Alice encrypts t he hash
with her private key
•
The encrypted hash
(digital signat ure) is
included with t he plaintext
Bob
---.
Alice creates a hash
of the original plaintext
Gl"ld8'ELopt
e~Fss·edYJS
Plaintext
and Digital
Signature
Al ice's Private Key
Verifying a Digital Signature
You're
You 1 re
hired,
GmC:B<E~opt
8"f85TetMS
Bob
D,g,tal
Signature
GmCIB<ELopt
Sh~851'etMS
Oecrvpnon
Pla intext
and Digital
Signature
Bo b's Lap top
ft
hired,
0
Bob
sBcBAEBCAA
QBQJZzBlbCR
AWSZAwUFg
Hash of
Plaintext
Plaintext
Hash
Hash ing
A lgorithm
8
sBcBAEBCAA
QBQJZzBlbCR
AWSZAwUFg
Hash o f
Plaintext
o
Bob decrypts the
digita l signature
to obtain the
plaintext hash
Bob hashes the
8
plaintext and
compa res it to
the decrypted hash
Al ice's Public Key
2.8 - Cryptographic Keys
Cryptographic Keys
• There's very little that isn' t know n about the
cryptogra p hie process
- The algorithm is usually a known entity
- The only thing you don't know is the key
• The key determines the output
- Encrypted data
- Hash value
- Digital signature
• Keep you r key private !
- It 's the only thing protecting you r data
Key strength
• Larger keys tend to be more secure
- Prevent brute-force attacks
- Attackers can try every possible key combination
© 2020 M e sser Studios, LLC
• Symmetric encryption
- 128-bit or larger symmetric keys are common
- These numbers get larger as time goes on
• Asymmetric encryption
- Complex calculations of prime numbers
- Larger keys than symmetric encryption
- Common to see key lengths of 3,072 bits or larger
Key exchange
• A logistical challenge
- How do you transfer an encryption key across an
insecur e medium w ithout having an encryption key?
• Out-of-band key exchange
- Don' t send the symmetric key over the 'net
- Telephone, courier, in-person, etc.
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 58
https://ProfessorMesser.com
2.8 - Cryptographic Keys (continued)
• In-band key exchange
- It 's on the netw ork
- Protect the key with additional encryption
- Use asymmetric encryption to deliver
a symmetric key
Real-time encryption/decryption
• There's a need for fast security
- W ithout compromising the security part
Traditional web server encryption
• SSL/TLS uses encryption keys to protect w eb
server communication
- Traditionally, this has been based on the w eb server's
RSA key pair
- One key that encrypts all symmetric keys
• This server's private key can rebuild everyth ing
- If you capture all of the traffic, you can decrypt all of
the data
• Share a symmetric session key using
asymmetric encryption
- Client encrypts a random (symmetric) key with a
server's publ ic key
- The server decrypts this shared key and uses it to
encrypt data
- This is the session key
Perfect Forward Secrecy {PFS)
• Change the method of key exchange
- Don't use the server's private RSA key
• Implement session keys carefully
- Need to be changed often (ephemeral keys)
- Need to be unpr edictables
• Can't decrypt w ith the private server key
- Every session uses a different private key for the
exchange
Symmetric key from asymmetric keys
• Use public and private key cryptography to create
a symmetric key
- Math is pow erfu l
• PFS requires more computing pow er
- Not all servers choose to use PFS
• One point of failure for all of your w eb site encryption
• Elliptic curve or Diffie-Hellman ephemeral
- The session keys aren't kept around
• The brow ser must support PFS
- Check your SSL/TLS information for details
2.8 - Steganography
Obfuscation
• The process of making something unclear
- It 's now much more difficult to understand
Common steganography techniques
• Netw ork based
- Embed messages in TCP packets
• But it 's not impossible to understand
- If you know how to read it
• Use an image
- Embed the message in the image itself
• Make source code difficult to read
- But it doesn't change the functionality of the code
• Invisible w atermarks
- Yel low dots on printers
• Hide information inside of an image
- Steganography
Other steganography types
• Audio steganography
- Modify the digital audio file
- Interlace a secret message within the audio
- Similar technique to image steganography
Steganography
• Greek for "concealed w riting"
- Security through obscurity
• Video steganography
-A sequence of images
- Use image steganography on a larger scale
- Manage the signal to noise ratio
- Potentially transfer much more information
• Message is invisible
- But it's really ther e
• The covertext
- The container document or file
2.8 - Quantum Computing
Quantum computing
• Computers based on quantum physics
- This is not an upgrade to your existing computer
- This is a new computing technology
• Classical mechanics
- Smallest form of information is a bit
- Bits ar e zeros and ones
• Quantum mechanics
- Smallest form of information is a qubit
© 2020 Messer Studios, LLC
- Bits are zeros, ones, and any combination
in-betw een, at the same time
- This is called quantum superposition
• Search quickly through large databases
- Index everything at the same time
• Simulate the quantum w orl d
- Medical advances, w eather prediction,
astrophysics, and much more
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 59
https://ProfessorMesser.com
2.8 - Quantum Computing {continued)
• We w ill need to consider our options for future
cryptography
- This is a problem that can be easily seen and
addressed
Post-quantum cryptography
• Breaks ou r existing encryption mechanisms
- Quickly factor large prime numbers
• Th is w ould cause signifi cant issues
- None of t he existing crypt ography could be t rusted
- No financia l transactions w ould be safe
- No data w ou ld be private
• Pet er Shor invented Shor's algorithm in 1994
- Given an int eger N, fi nd its prime factors
- Traditional com puters w ould take longer than the
lifetime of the un iverse
- Shor's algorithm w ou ld t heoretica lly be much,
much faster
Quant um communication
• Prot ect against eavesdropping using quantum
cryptography
- Quantum Key Distribution (QKD)
• Create un breakable encryption
- Send a ran dom stream of qubit s (the key) across a
quant um net w ork channel
• Both sides can verify the key
- If it's identical, the key w as not view ed du ring
transmission
• Time for upd at ed cryptography
- Not vulnera ble t o quantum com puter based attacks
• An attacker eavesdropping on the communication
w ou ld modify the data stream
- The attacker w ould have to violate quantum physics
• NTRU
- A cryptosystem using lattice t heory
- Relies on the "closest-vector" problem
- Instead of finding t he prime fa ctorizations of
large numbers
2.8 - Stream and Block Ciphers
Stream ciphers
• Encryption is done one bit or byte at a time
- High speed, low ha rd w are complexit y
Block cipher mode of operation
• Encrypt one fixed-lengt h grou p of bit s at a time
- A block
• Used w ith symmetric encryption
- Not common ly used wit h asymmetric encryption
• Mode of operation
- Defi nes the method of encryption
- May provide a method of authentication
• The sta rting stat e shou ld never be the same t wice
- Key is often com bined wit h an initialization vector {IV)
Block ciphers
• Encrypt fixed-length grou ps
- Oft en 64-bit or 128-bit blocks
- Pad added to short blocks
- Each block is encrypted or decrypted independent ly
• Symmetric encryption
- Similar to stream ciphers
• Block cipher modes of operation
- Avoid patterns in the encryption
- Many different modes t o choose from
• The block size is a fi xed size
- Not all data matches the block size perfectly
- Split you r plaintext into smaller blocks
- Some modes requ ire padding befor e encrypting
ECB (Electronic Code Book)
• The simplest encryption mode
- Too simple for most use cases
• Each block is encrypt ed w ith the same key
- Identical plaintext blocks create identical
ciphertext blocks
ECB (Electronic Code book) cipher mode
Pla int ext
ft-
1
Block Cipher
Encryption
Key
Pla int ext
ft-
1
Block Cipher
Encryption
Key
1
Ciphert ext
© 2020 Messer Studios, LLC
Plaint ext
ft-
1
Block Cipher
Encryption
Key
1
Ciphert ext
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 60
1
Ciphert ext
https://ProfessorMesser.com
2.8 - Stream and Block Ciphers (continued)
CBC (Cipher Block Chaining)
• A popular mode of operation - Relatively easy to implement
• Each plaintext block is XORed w ith the previous
ci phertext block
- Adds additional ran dom ization
- Use an initia lization vector for the first block
CTR (Counter)
• Block cipher mode/ act s like a stream cipher
- Encrypt s successive values of a "counter"
• Plaintext can be any size, since it 's part of the XOR i.e., 8 bits
at a time (streaming) instead of a 128-bit block
GCM (Galois/Counter Mode)
• Encryption w ith authentication
- Authentication is part of t he block mode
- Com bines Counter Mode with
- Galois authentication
• M inimum latency, minimum operation overhead
- Very efficient encryption and authentication
• Commonly used in packetized data
- Network t raffi c security (w ireless, IPsec)
- SSH, TLS
CBC (Cipher Block Chaining) cipher mode
?la in text
-~
f;P-
f;P-
e o ck c ph i:~ : ncryption
Pla in text
~
~
f;P-
e oc,: Ci."hr Ef'cry:,tion
Key
Key
I I I I
LI
LI
Ophe ttext
0
Block. c ph e~ : ncryp:-on
Key
LI I I LI
I I
LI
Ciphertext
CTR (Counter) cipher mode
0
Pla int-:xt
Ophe ttext
Counter
Counter
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
31ock Cipher Encryption
Block Cipher Encryption
Ciphertext
Ophertext
0
0
0
1
2.8 - Blockchain Technology
Blockchain
• A dist ribut ed ledger
- Keep t rack of t ransactions
• Everyone on the blockchain net w ork
mainta ins the ledger
- Records and replicates t o anyone
and everyone
© 2020 Messer Studios, LLC
• Many practical applications
- Payment processing
- Digital identification
- Supply cha in monit oring
- Digital voting
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 61
https://ProfessorMesser.com
2.8 - Blockchain Technology {continued)
©
I
-
,----,r---,
\
1 A transaction Is requested. The transaction
2 The transaction Is sent to every computer,
could be any digital transaction from
transferring Bitcoins, medical records, data
backups, to transferring house title
information.
or node, in a d ecentralized network to be
verified.
3 The verified transaction Is added to a new
block of data containing other recently
verified transactions.
-- -- ----- --5 The block Is added to the end of the
4 A secure code, called a Hash, is calculated
from the previous blocks of transaction data
in the Blockchain. The hash is added to the
new block of verified transactions.
Blockchain which is then updated to all nodes
in the network for security. The transaction is
complete.
6
If any blocks are altered, its hash and all
following hashes in the chain are
automa tically recalculated. The altered chain
will no longer match the chains stored by the
rest of the network, and w ill be rejected.
2.8 - Cryptography Use Cases
Finding the balance
• Low power devices
- Mobile devices, portable systems
- Smaller symmetric key sizes
- Use elliptic curve cryptography (ECC} for
asymmetric encryption
• Low latency
- Fast computation time
- Symmetric encryption, smal ler key sizes
• High r esiliency
- La rger key sizes
- Encryption algorit hm qualit y
- Hashing provides data integrity
Use cases
• Confidentia lity
- Secrecy and privacy
- Encryption (file-level, drive-level, email)
© 2020 M esser Studios, LLC
• Integrit y
- Prevent modification of data
- Validate the contents with hashes
- File downloads, passw ord storage
• Obfuscation
- Modern malw are
- Encrypted data hides the active ma lw are code
- Decryption occurs during execution
• Authentication
- Password hashing
- Protect the original password
- Add salt to randomize the stored passw ord hash
• Non-Repudiation
- Confirm the authenticity of data
- Digital signature provides both integrit y
and non-repudiation
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 62
https://ProfessorMesser.com
2.8 - Cryptography Limitations
Finding the balance
• Cryptography isn't a perfect solution
- It can have sign ificant li mitations
• Not all im plement ations are the same
- Different platforms, different cryptogra phic options
• Cryptography can't fi x bad technique
- Hashing easily guessed passw ords w it hout a salt
• Every situation is different
- Do you r homew ork
Limit ations
• Speed
- Cryptography adds overhead
- A system needs CPU, CPU needs pow er
- More involved encryption increases the load
• Size
- Typica l block ciphers don't increase t he size of
encrypted dat a
- AES block size is 128 bits/16 byt es
- Encrypting 8 byt es w ou ld pot entia lly double the
storage size
• Weak keys
- Larger keys are generally more difficult to brute force
- The w eak IV in RC4 resulted in the WEP secu rity issues
• Longevity
- A specific cryptogra phic t echnology can becomes
less secure over time
- Smaller keys are easier t o brute force, larger keys
t ake longer t o process
- Key retirement is a good best practice
• Predictability and entropy
- Random num bers are critical for secure cryptography
- Hardw are random number generators can
be predictable
- A passphrase needs t o be appropriately random
• Key reuse
- Reusing the same key reduces complexity
- Less cost and effort to r ecertify keys
- Less administrative overhead
- If the key is compromised, everything using t hat
key is at risk
- loT devices often have keys embedded in the firmware
• Resource vs. security constraints
- loT devices have li mited CPU, memory, an d pow er
- Real-time applications can't delay
- Diffi cult to ma int ain and update securit y com ponents
• Time
- Encryption and hash ing takes time
- Larger files take longer
- Asymmetric is slow er than symmetric
3.1 - Secure Protocols
Voice and video
• SRTP
- Secu re Real-Time Transport Protocol / Secu re RTP
• Adds security featu res to RTP
- Keep conversations privat e
• Encryption
- Uses AES t o encrypt the voice/video flow
• Authentication, integrit y, and replay protection
- HMAC-SHAl - Hash-based message authentication
code using SHAl
Time synchronization
• Classic NTP has no secu rity feat ures
- Exploit ed as amplifiers in DDoS attacks
- NTP has been around pri or t o 1985
• NTPsec
- Secu re net w ork time protocol
- Began development in June of 2015
• Cleaned up the code base
- Fixed a number of vulnera bil ities
© 2020 Messer Studios, LLC
Email
• S/M IME
- Secur e/Multi purpose Internet Mail Ext ensions
- Publi c key encryption and digit al signing
of ma il content
- Requires a PKI or similar organization of keys
• Secure POP and Secure IMAP
- Use a STARTTLS extension to encrypt POP3 w ith
SSL or use IMAP wit h SSL
• SSL/TLS
- If the mail is brow ser based, alw ays encrypt w ith SSL
Web
• SSL/TLS
- Secur e Sockets Layer/ Transport Layer Secu rity
• HTTP$
- HTTP over TLS / HTTP over SSL/ HTTP Secu re
• Uses public key encryption
- Private key on the server
- Symmetric session key is transferred using
asymmetric encryption
- Security and speed
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 63
https://ProfessorMesser.com
3.1 - Secure Protocols (continued)
IPSec (Internet Protocol Security)
• Security for OSI Layer 3
- Authentication and encryption for every packet
Domain name resolution
• DNS had no security in the original design
- Relatively easy to poison a DNS
• Confidentiality and integrity/anti-replay
- Encryption and packet signing
• DNSSEC
- Domain Name System Security Extensions
• Very standardized
- Common to use multi-vendor im plementations
• Va lidate DNS re sponses
- Origin authentication
- Data integrity
• Tw o core IPSec protocols
- Authentication Header (AH)
- Encapsulation Security Payload (ESP}
File transfer
• FTPS
- FTP over SSL (FTP-SSL}
- File Transfer Protocol Secure
- This is not SFTP
• Public key cryptography
- DNS records ar e signed with a t rusted third party
- Signed DNS record s are published in DNS
Routing and switching
• SSH • Secure Shell
- Encrypted terminal communication
• SFTP
- SSH File Transfer Protocol
- Provides file system functiona lity
- Resuming interrupted t ra nsfers, directory listings,
remot e file removal
LDAP (Lightweight Directory Access Protocol)
• Protocol for rea ding and w riting di rectories over
an IP network
- An organized set of record s, like a phone directory
• X.500 specifi cation w as w ritten by the Internationa l
Telecommunications Union (ITU)
- They know directories !
• DAP ra n on t he OSI protocol stack
- LDAP is lightw eight, and uses TCP/IP
• LDAP is the protocol used to query and update
an X.500 directory
- Used in W indow s Active Directory,
Apple OpenDirectory, Open l DAP, etc.
Directory services
• LDAP (Lightw eight Directory Access Protocol)
• LDAPS (LDAP Secur e)
- A non-sta ndard implementation of LDAP over SSL
• SASL (Sim ple Authentication and Securit y Layer)
- Provides authentication using many different
met hods, i. e., Kerberos or client certifi cate
Remote access
• SSH (Secure Shell)
- Encrypted termina l communication
- Replaces Telnet (and FTP)
- Provides secure terminal communication and
file tra nsfer features
• SNMPv3 • Simple Netw ork
- Management Protocol version 3
- Confidentiality - Encrypted data
- Integrity - No ta mpering of data
- Authentication - Verifies the source
• HTTP$
- Brow ser-based management
- Encrypted commun ication
Network address allocation
• Securing DHCP
- DHCP does not include any built-in security
- There is no "secu re" version of t he DHCP protocol
• Rogue DHCP servers
- In Active Directory, DHCP servers must be authorized
- Some sw itches can be con figured with
" trusted" interfaces
- DHCP distribution is only allow ed from
trusted interfa ces
- Cisco calls th is DHCP Snooping
- DHCP client DoS - Starvation attack
- Use spoofed MAC addresses to exhaust the DHCP pool
- Switches can be configured to limit the number of
MAC addresses per interface
- Disable an interface w hen mu ltiple MAC addr esses
are seen
Subscription services
• Automated su bscriptions
- Anti-virus/ Anti-ma lw are signatu re updates
- IPS updates
- Ma licious IP addr ess databases / Firew all updates
• Constant updates
- Each subscription uses a different update method
• Check for encryption and integrity checks
- May require an additional public key configuration
- Set up a trust relationship
- Certificates, IP addresses
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 64
https://ProfessorMesser.com
3.2 - Endpoint Protection
The endpoint
• The user's access - Applications and data
• Stop the attackers - Inbound attacks, out bound attacks
• Many different platforms - Mobil e, deskt op
• Protection is multi-facet ed - Defense in depth
Anti-virus and anti-malware
• Anti-virus is the popular t erm
- Refers specifica lly to a type of malwar e
- Trojans, w orms, macro viruses
• Ma lw are refers t o the broa d malicious
softwar e category
- Anti-malware stops spyw are, ransomw ar e,
fileless ma lw are
• The terms are effectively the same t hese days
- The names are more of a marketing t ool
- Anti-virus software is also anti-ma lware softw are now
- Make sure your system is using
- a comprehensive solution
Endpoint detection and response (EDR)
• A different method of th reat protection
- Scale to meet the increasing num ber of t hreats
• Detect a threat
- Signat ures aren't t he only detection tool
- Behaviora l analysis, mach ine learning,
process monitoring
- Lightw eight agent on t he endpoint
• Investigate the threat
- Root cause analysis
• Respond to the thr eat
- Isolate the system, quarantine the threat , rollback
to a previous config
- API driven, no user or technician intervention requ ired
Data Loss Prevention (OLP)
• Where's your data?
- Social Security numbers, credit card num bers,
medical records
• Stop the data before the attacker get s it
- Data " leakage"
• So many sources, so many destinations
- Oft en requires mu ltiple solutions
- Endpoint cli ent s
- Cloud-based systems
- Emai l, cloud storage, collaboration tools
Next-generation firewall (NGFW)
• The OSI Application Layer - All data in every packet
• Can be called different names
- Appl ication layer gat eway
- Stat eful multi layer inspection, deep packet inspection
• Broa d secu rity controls
- Allow or disa llow application feat ures
- Identify attacks and malware
- Exam ine encrypted data
- Prevent access to URLs or URL categories
Host-based firewall
• Softw are-based firew all
- Personal firew all, runs on every en dpoint
• Allow or disallow incom ing or outgoing
application traffi c
- Control by application process
- View all dat a
• Identify and block unknow n processes
- Stop malwar e before it can sta rt
• Manage centra lly
Finding intrusions
• Host-based Intrusion Detection System (H IDS)
- Uses log fi les t o identify int rusions
- Can reconfi gure fi rew alls to block
• Host-based Intrusion Prevention System (H IPS)
- Recogn ize and block know n attacks
- Secu re OS and application confi gs, validate
incom ing service requests
- Oft en built into endpoint protection softw are
• HIPS identifi cation
- Signat ures, heuristics, behaviora l
- Buffer overfl ow s, registry updates, w riting files
to the W indows fold er
- Access t o non-encrypted data
3.2 - Boot Integrity
Hardware root of trust
• Security is based on trust
- Is you r dat a safely encrypted?
- Is th is w eb sit e legitimate?
- Has the operating system been infected ?
Trusted Platform Module (TPM)
• A specification for cryptographic functions
- Hardw are t o help w ith encryption functions
• The trust has to start somew her e
- Trusted Platform Module (TPM),
- Hardw are Security Modu le (HSM)
- Designed t o be the hardware root of the trust
• Persistent memory
- Comes with unique keys burned in during production
• Diffi cu lt to change or avoid
- It 's hardware
- Won't w ork without t he hardwar e
• Passw ord protected
- No dictionary attacks
© 2020 Messer Studios, LLC
• Cryptographic processor
- Random number generator, key generators
• Versatile memory
- Storage keys, hardw are confi guration information
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 65
https://ProfessorMesser.com
3.2 - Boot Integrity (continued)
Boot integrity
• The attack on ou r systems is constant
- Techn iques are constantly changing
Trusted Boot
• Bootloader verifies digital signature of the OS kernel
- A corrupted kernel wil l halt the boot process
• Attackers comprom ise a device
- And w ant it to stay compromised
• The kernel verifies all of the other start up components
- Boot drivers, start up files
• The boot process is a perfect infection point
- Rootkits run in kernel mode
- Have t he same right s as t he operating system
• Just before loading the drivers,
- ELAM (Early Launch Anti-Ma lw are) starts
- Checks every driver to see if it's trusted
- W indow s w on't load an untrusted driver
• Protecting t he boot process is import ant
- Secu re boot, trusted boot, and measured boot
- A cha in of trust
Measured Boot
• Not hing on t his comput er has changed
- There have been no malw are infections
- How do you know ?
UEFI BIOS Secure Boot
• Secure Boot
- Part of the UEFI specifi cation
• Easy w hen it 's just your computer
- More diffi cu lt w hen there are 1,000
• UEFI BIOS protections
- BIOS includes the manufactu rer's public key
- Digital signat ure is checked during a BIOS update
- BIOS prevents unauthori zed w rites to the flash
• UEFI st ores a hash of the firm w are, boot drivers, and
everyth ing else loaded during the Secu re Boot and
- Trusted Boot process
- Stored in the TPM
• Secure Boot verifies the bootloader
- Checks the boot loader's digital signat ure
- Bootloader must be signed w ith a t rusted certifi cate
- Or a manually approved digital signature
• Remote attestation
- Device provides an operational report to a
verification server
- Encrypted and digitally signed wit h t he TPM
• Attestation server r eceives the boot report
- Changes are identified and managed
3.2 - Database Security
Database security
• Protecting stored data
- And the t ransmission of that data
Tokenization
• Replace sensitive data w ith a non-sensitive placeholder
- SSN 266-12-111 2 is now 69 1-61-8539
• Intellectual property storage
- Data is valuable
• Common w ith credit card processing
- Use a temporary token during payment
- An attacker capturing the card numbers
can't use them lat er
• Compliance issues
- PCI DSS, HIPAA, GDPR, etc.
• Keep the business running
- Secu rity provides continuity
• This isn't encryption or hash ing
- The original dat a and token aren't mat hematica lly related
- No encryption overhead
• Breaches ar e expensive - Keep costs low
Tokenization
Remote Token
Service Server
(J
4545 .... . ... 5 678
is the t oken for
111111111111234
~
•
~
f)
Card is regist e red
with t he token
service server
D
A
V
Token Service
Se rver provides a
token instead:
4545 .... .... 5678
A
______ W
A
V
User registers a credit ca rd
o n t heir mobile phone:
411111111111 1234
© 2020 Messer Studios, LLC
Pho ne is used
at a st ore
d uring checkout
usi ng NFC
A
W
Token is
validated
D
A
V
Pay with:
4545 •••• •••• 5678
E)
Lt]
.
Mereha~t Payment
Processing Serve r
Tran sactio n approved
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 66
https://ProfessorMesser.com
3.2 - Database Security {continued)
Hashing a password
• Hashes repr esent data as a fi xed-length string of text
- A message digest, or " fingerprint"
Adding some sa lt
• Salt
- Random data added t o a passw ord w hen hash ing
• W ill not have a collision (hopefu lly)
- Different input s will not have the same hash
• Every user gets their ow n random salt
- The salt is commonly stored with the passw ord
• One-w ay t rip
- Im possible to recover the original message
from the digest
- A common w ay to store passw ords
• Rainbow tables w on' t w ork with salted hashes
- Additiona l random value added to the original
passw ord
• This slow s th ings dow n the brute force process
- It doesn' t completely stop t he reverse engineering
3.2 - Application Security
Secure coding concepts
• A balance bet w een time and quality
• Programm ing w ith secu rity in m ind is oft en secondary
• Testing, testing, testing
• The Quality Assurance (QA) process
• Vulnerabilities w ill eventually be found
• And exploited
Input va lidation
• What is the expected input?
• Validate actual vs. expected
• Used for t racking, personalization, session
management
• Not execut able, not generally a secu rity risk
• Unless someone gets access to them
• Secure cookies have a Secure attribute set
• Brow ser will only send it over HTTP$
• Document all input methods
• Forms, fi elds, t ype
• Check and correct all input (normalization)
• A zip code shou ld be on ly X cha racters long
with a letter in t he X column
• Fix any data w ith improper input
• The fuzzers w ill find w hat you missed
• Don' t give them an opening
Dyna mic analysis (fuzzing)
• Send ran dom input to an application
• Fau lt-injecting, robustness testing,
syntax testing, negative testing
• Looking for someth ing out of the ordinary
• Application crash, server error, exception
• 1988 class proj ect at t he Un iversit y of Wisconsin
• " Operating System Utility Program Reliability"
• Professor Bart on M iller
• The Fuzz Generat or
Fuzzing engines and fra meworks
• Many different fuzzing options
• Platform specifi c, language specific, etc.
• Very time and processor resource heavy
• Many, many different iterations t o try
• Many fuzzing engines use high-probability t ests
• Carnegie Mellon Comput er
• Emergency Response Team (CERT)
• CERT Basic Fuzzing Framew ork (BFF)
• https://profe ssormesser.lin k/ bff
© 2020 Messer Studios, LLC
Secure cookies
• Cookies
• Information stored on your computer by the
brow ser
• Sensitive information shou ld not be saved in a cookie
• This isn' t designed t o be secure storage
HTTP secure headers
• An additional layer of security
• Add these to the w eb server configuration
• You can't fi x every bad application
• Enforce HTTPS communication
• Ensur e encrypted communication
• Only allow scripts, stylesheets, or images from
the local site
• Prevent XSS attacks
• Prevent data from loading into an inline frame
(iframe)
• Also helps to prevent XSS attacks
Code signing
• An application is deployed
• Users run application executa ble or scripts
• So many security questions
• Has the application been modified in any w ay?
• Can you confirm that the application w as w ritten
by a specific developer?
• The application code can be digitally signed by the
developer
• Asymmetric encryption
• A trusted CA signs the developer's public key
• Developer signs the code w ith their privat e key
• For int ernal apps, use you r ow n CA
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 67
https://ProfessorMesser.com
3.2 - Application Security {continued)
Allow list / deny list
• Any application can be dangerous
• Vu lnerabi lities, trojan horses, ma lw are
• Security policy can control app execution
• Allow list, deny/block list
• Allow list
• Nothing runs unless it's approved - Very restrictive
Static code analyzers
• Static Application Security Testing (SAST)
• Help to identify security fla ws
• Many security vu lnerabilities found easily
• Buffer overflows, database injections, etc.
• Not everything can be identified through analysis
• Authentication security, insecure cryptography, etc.
• Don't rely on automation for everyth ing
• Deny list
• Nothing on the "bad list" can be executed
• Anti-virus, anti-malw are
• Still have to verify each fin ding
• False positives are an issue
Examples of allow and deny lists
Static code analyzer results
flaal.RtsullS
• Decisions are made in the operating system
• Often built-in to the operating system management • •l-"ffll....,._ &,,u.., _ _..,,,.
-~••...,.....,""--•-,vA>o,Nllltl;..,.,,..,1/,C, J)AI '"".........., ~-...__..... _ _ , . . , _ ...........
• Application hash
• Only al lows applications w ith this unique identifier
• Certificate
• Allow digitally signed apps from certain publishers
...~.... i....,.-_......... _.,,_"_'"···- • · -.... ..,,.
• ....,.
_,.,,-Cfln,,,M,')
..-.....
" 1._
. ' -l .......
...,...,
_ _ _-_ ..~--'--"'1.,11,•
_ _,.......,._..,
-••
f#. ...,......._,.._,.(,\1$~J ~IJlll, (\..,....,........,..._""'\..... --"").._,.._ it\ol' e ...... a.
• -1-P11-.....~....... l>o,f--,wn,,,r, ....... ~,......... -
••
,,,,....,11-11 ...........w-,-u .....
- - lCU1Jb
• Path - Only run applications in these folders
• Netw ork zone
• The apps can on ly run from this network zone
3.2 - Application Hardening
Application hardening
• M inim ize the attack surface
- Remove all possible entry points
Disk encryption
• Prevent access to application data files
- Fi le system encryption
• Remove the potential for all known vulnerabilities
-As w ell as the unknow n
• Full disk encryption (FDE)
- Encrypt everything on the drive
- Bitlocker, FileVault , etc.
• Self-encrypting drive (SEO)
- Hardw are-based full disk encryption
- No operating system software needed
• Some hardening may have compliance mandates
- HIPAA servers, PCI DSS, etc.
• There are many different resources
- Center for Internet Security (CIS)
- Network and Securit y Institute (SANS)
- National Institute of Standards and Technology (NIST)
• Opal storage specification
- The standard for of SEO storage
Open ports and services
• Every open port is a possible entry point
- Close everything except required ports
Operating system hardening
• Many and va ried
- Windows, Linux, iOS, Android, et al.
• Control access w ith a firew all
- NGFW w ould be ideal
• Unused or unknow n services
- Instal led with the OS or from other applications
• Updates
- Operating system updates/service packs,
security patches
• Applications w ith broad port ranges
- Open port O through 65,535
• Use Nmap or similar port scanner to verify
- Ongoing monitoring is important
Registry
• The primary configuration database for W indow s
- Almost everything can be configured from the registry
• User accounts
- Minimum passw ord lengths and complexity
- Account limitations
• Netw ork access and security
- Limit netw ork access
• Monitor and secure
- Anti-virus, anti-ma lware
• Useful to know w hat an application modifies
- Many third-party tools can show registry changes
• Some registry changes are important securit y settings
- Configure registry permissions
- Disable SMBvl
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 68
https://ProfessorMesser.com
3.2 - Application Hardening (continued)
Patch management
• Incredibly important
- System stability, secu rity fixes
Sand boxing
• Applications cannot access unrelated r esources
- They play in their ow n sandbox
• Mont hly updates
- Increment al (and important)
• Commonly used du ring development
- Can be a usefu l production t echnique
• Th ird-part y updates
- Appl ication developers, device drivers
• Auto-upd at e - Not alw ays the best option
• Used in many differ ent deployments
- Virtual machines
- Mobil e devices
- Browser ifram es (lnli ne Frames)
- W indow s User Account Control (UAC)
• Emergency out-of-band upd at es
- Zero-day and important secu rity discoveri es
3.3 - Load Balancing
Balancing the load
• Distribute the load
- Multiple servers
- Invisible to t he end-user
Scheduling
• Round-robin
- Each server is selected in turn
• Large-sca le implementations
- Web server farms, database farms
• Fault tolerance
- Server out ages have no effect
- Very fast convergence
• Weighted round -robin
- Prioritize t he server use
• Dynamic round-robin
- Monitor the server load and distribute t o the server
wit h t he low est use
• Active/active load balancing
Load balancer
• Configu rable load
- Manage across servers
Affinity
• Affi nity
- A kinship, a likeness
• TCP offload
- Protocol overhead
• Many applications req uire commun ication to t he same
instance
- Each user is "stuck" t o the same server
- Tracked th rough IP address or session IDs
- Sou rce affinit y/ sticky session/ session persistence
• SSL offload
- Encryption/Decryption
• Caching
- Fast response
Active/ passive load balancing
• Some servers are active
- Others are on st andby
• Prioritization
- QoS
• Content swit ching
- Appl ication-centric balancing
• If an active server fa ils, the passive server takes it s place
3.3 - Network Segmentation
Segmenting the network
• Physical, logical, or virtual segmentation
- Devices, VLANs, virtual netw orks
• Performance
- High-bandwidth applications
Physical segmentation
• Devices are physically separat e - Air gap betw een
Switch A and Switch B
• Security
- Users should not talk directly to database servers
- The only applications in the core ar e SQL and SSH
• Web servers in one rack - Database servers on another
• Compliance
- Mandated segmentation (PCI compliance)
- Makes change control much easier
• Separate devices
- Mu ltiple un its, separate infrastructu re
© 2020 Messer Studios, LLC
• Must be connected to provide communication
- Direct connect , or another sw itch or router
• Customer A on one switch, customer B on anot her
- No opport un ity for mixing data
Logical segment ation with VLAN s
• Virtual Local Area Net w orks (VLANs)
- Sepa rat ed logically instead of physica lly
- Cannot commun icat e betw een VLANs wit hout
a Layer 3 device/ rou ter
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 69
https://ProfessorMesser.com
3.3 - Network Segmentation (continued)
Screened subnet
East-west traffic
• Previously known as the demilitarized zone (DMZ)
- An additional layer of security betw een
the Internet and you
- Public access to public resources
• Traffic flows w ithin a data center
- Important to know wh ere traffic starts and ends
Extra net
• A pri vate network for partners
- Vendors, suppliers
• Usually r equires additional authentication
- Only allow access to authori zed users
• East-w est
- Traffic betw een devices in the same data center
- Relatively fast response times
• North-south traffic
- Ingress/ egress to an outside device
- A differ ent security posture than east-w est t raffic
Zero-trust
Intranet
• Private network - Only available internally
• Company announcements, important documents,
other company business
- Employees only
• No external access
- Internal or VPN access only
• Many netw orks are relatively open on the inside
- Once you're through the firewall, there are few
security controls
• Zero trust is a hol istic approach to network securit y
- Covers every device, every process, every person
• Everything must be verified
- Nothing is trusted
- Multifactor authentication, encryption, system
permissions, additional firewalls, monitoring and
analytics, etc.
North-South
Traffic
East-West
Traffic
Image Server
Directory Services
Web Servers
File Servers
3.3 - Virtual Private Networks
VPNs
SSL VPN (Secure Sockets Layer VPN)
• Virtual Private Netw orks
- Encrypted (private) data traversing a public netw ork
• Uses common SSL/TLS protocol (tcp/443)
- (Almost) No firewall issues!
• Concentrator
- Encryption/decryption access device
- Often integrated into a firewall
• No big VPN clients
- Usually remote access communication
• Many deployment options
- Specialized cryptographic hardw are
- Softw are-based options available
• Used w ith client software
- Sometimes built into the OS
© 2020 Messer Studios, LLC
• Authenticate users
- No requirement for digita l certificates or shared
passwords (like IPSec)
• Can be run from a browser or from a
(usually light) VPN client
- Across many operating systems
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 70
https://ProfessorMesser.com
3.3 - Virtual Private Networks (continued)
Remote access VPN
• On-d emand access
from a remote device
- Softw are
connects to a VPN
concentrator
~
Q
~
orporate
etwork
• Some softw are can
be con figu red as
always-on
0
Site-to-site VPN( ]
Traffic is encrypted
as it passes through the
local VPN concentrator
A
V
~
•
A
V
Traffic is decrypted
in t he VPN concentrator
on the other side of
the tunnel
.....------...
~
,-
1---- -- -Firewall/
VPN Concentrator
Full VPN Tunnel
0
A
V
~
~
•
Firewall /
VPN Concentrator
Remote
Site
~
VPN concentrator
decrypts the tunneled
traffic and routes it
int o the corporate network
A
V
~
®
Remote user creates
a secu re tunnel to
the VPN concentrator
Corporate _ _ _ _ ~__,-- - -;
Netw~rk
~
~
<>
VPN Concentrator
User
A The process is reversed
V' for t he return traffic
Traffic to a ll oth er
sites is "split" from.
the tunnel a nd is
not decrypted
Split VPN Tunnelo
Internet
_
~
professormesser.com
o
A
V
~
~
•
~
~
Only traffic to
th e corporate
network t raverses
th e VPN tunnel
Corporate _ _ _ _ ~
- , - - ----,
Networ~
~
© 2020 Messer Studios, LLC
VPN Concentrator
User
Internet
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 71
https://ProfessorMesser.com
3.3 - Virtual Private Networks (continued)
L2TP
• Layer 2 Tunneling Protocol
- Connecting sites over a layer 3 netw ork as if they
w ere connected at layer 2
• Commonly im plemented w ith IPsec
- L2TP for the tunnel, IPsec for the encryption
- L2TP over IPsec (L2TP/1Psec)
IPSec (Internet Protocol Security)
• Securit y for OSI Layer 3
- Authentication and encryption for every packet
• Confidentiality and integrit y/anti-replay
- Encryption and packet signing
• Very standardi zed
- Common to use multi-vendor implementations
• Tw o core IPSec protocols
- Authentication Header (AH)
- Encapsulation Security Payload (ESP)
AH (Authentication Header)
• Data integrit y
• Origin authentication
• Replay attack protection
• Keyed-hash mechanism
• No confidentiality/ encryption
IP Packet w ith Authentication (tunnel mode)
AH
Header
New IP Header
I
IP Header
Data
Authenticated
ESP (Encapsulating Security Payload)
• Data confidentiality (encryption)
• Limited traffic flow confidentiality
• Data integrit y
• Anti-replay protection
IPsec Datagram w ith ESP (tunnel mode}
New IP Header
ESP
Header
IP Header
ESP
Data
Trailer
Integrity
Check Value
Encrypted
Authenticated
IPsec Transport mode and Tunnel mode
AH and ESP
• Combine the data integrity of AH
w ith the confidentialit y of ESP
Original Packet
IP Header
Data
IPsec Datagram with AH and ESP (transport mode)
IP Header
AH
Header
ESP
Header
Data
ESP
Trailer
Integrity
Check Value
Encrypted
Authenticated
IPsec Datagram with AH and ESP (tunnel mode)
New IP Header
AH
Header
ESP
Header
IP Header
Data
ESP
Tra iler
Integrity
Check Va lue
Encrypted
Authenticated
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 72
https://ProfessorMesser.com
3.3 - Virtual Private Networks (continued)
Authentication Header {AH)
• Hash of t he packet and a shared key
- SHA-2 is common
- Adds t he AH to t he packet header
IPsec Transport mode and Tunnel mode
• Tunnel mode is the most common
- Transport mode may not even be an option
• Th is doesn't provide encryption
- Provides data integrity (hash)
- Guarantees the data origin (authentication)
- Prevent s r eplay attacks (sequence numbers)
• Hypertext Markup Language version 5
-The language common ly used in w eb brow sers
Encapsulation Security Pay load (ESP)
• Encrypts and authenticates the tunneled data
- Commonly uses SHA-2 for hash, AES for encryption
- Adds a header, a t railer, and an Integrit y Check Va lue
• Combine wit h Authentication Header (AH) for integrity
and aut hentication of the outer header
HTMLS VPN s
• Includes comprehensive AP I support
- Appl ication Programming Interface
- Web cryptography API
• Create a VPN tunnel wit hout a separate VPN application
- Nothing to insta ll
• Use an HTM LS compliant browser
- Communicate direct ly to t he VPN concentrator
3.3 - Port Security
Port security
• There's a lot of security that happens at the
physical sw itch interface
- Oft en the fi rst and last point of transmission
• Cont rol and protect
- Limit overall t raffi c
- Control specific traffi c t ypes
- Watch for unusual or unw ant ed t raffi c
• Differ ent options are available
- Manage different securit y issues
• IEE E standa rd 802.10 to prevent loops in bridged
(sw itched) networks (1990)
- Created by Radia Perlman
- Used practically everyw here
BPDU Gua rd
• Spann ing tree takes time to determine if a swit ch port
shou ld forward frames
- Bypass the listening and learning states
- Cisco calls t his PortFast
Broadcast s
• BPDU (Bridge Protocol Data Unit)
- The spann ing tree control prot ocol
• Send information to everyone at once
- One frame or packet, r eceived by everyone
- Every device must exam ine t he broadcast
• If a BPDU fram e is seen on a PortFast confi gured
interface (i.e., a w orkstation), shut dow n the interface
- This shou ldn' t happen - Workstations don't send BPDUs
• Li mited scope - The broadcast domain
DHCP Snooping
• Routing upd at es, ARP request s - Can add up quickly
• Ma licious softw are or a bad NIC
- Not alw ays normal traffic
• IP t racking on a layer 2 device (sw itch)
- The switch is a DHCP fir ew all
- Trusted: Routers, sw itches, DHCP servers
- Unt rusted : Ot her computers, unofficial DHCP servers
• Not used in I Pv6
- Focus on mu lticast
Broadcast storm control
• The switch can cont rol broadcasts
- Limit the number of broadcasts per second
• Can often be used to control multicast and unknow n
unicast traffi c
- Tight security posture
• Manage by specific values or by percentage
- Or the change over norma l traffic patterns
Loop prot ection
• Connect tw o switches to each other
- They'll send traffic back and fort h forever
- There's no "counting" mechan ism at the MAC layer
• Th is is an easy w ay t o bring dow n a netw ork
- And somew hat difficult to t roubleshoot
- Relatively easy t o resolve
© 2020 Messer Studios, LLC
• Switch w atches for DHCP conversations
- Adds a list of untrusted devices to a table
• Filters invalid IP and DHCP information
- Static IP addr esses
- Devices acting as DHCP servers
- Ot her invalid t raffic patterns
MAC filte ring
• M edia Access Control
- The " hardware" addr ess
• Li mit access through t he physical hardw are address
- Keeps the neighbors out
- Additional administration wit h visitors
• Easy to find w orking MAC add resses through w ireless
LAN analysis
- MAC add resses can be spoofed
- Free open-source softw are
• Security through obscurity
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 73
https://ProfessorMesser.com
3.3 - Secure Networking
Domain Name Resolution
• DNS had no security in the original design
- Relatively easy to poison a DNS
• DNSSEC
- Domain Name System Security Extensions
• Validate DNS responses
- Origin authentication
- Data integrity
• Public key cryptography
- DNS records are signed w ith a trusted third party
- Signed DNS records are published in DNS
1Pv6 security is different
• More IP addr ess space
- More difficult to IP/port scan (but not impossible)
- The tools already support 1Pv6
• No need for NAT
- NAT is not a security feature
• Some attacks disappear
- No ARP, so no ARP spoofing
• New attacks w ill appear
- For example, Neighbor Cache Exhaustion
• IPsec built in/ IPsec ready
Using a DNS for security
• Stop end users from visiting dangerous sites
- The DNS resolves to a sinkhole address
Taps and port mirrors
• Intercept network t raffic
- Send a copy to a packet captur e device
• A query to a know n-malicious addr ess can identify
infected systems
- And prevent further exploitation
• Physical taps
- Disconnect the link, put a tap in the middle
- Can be an active or passive tap
• Content filtering
- Prevent DNS queries to unw anted or
suspicious sites
• Port mirror
- Port redirection, SPAN (Sw itched Port ANalyzer)
- Softw are-based tap
- Limited functionality, but can w ork w ell in a pinch
Out-of-band management
• The netw ork isn't available
- Or the device isn't accessible from the netw ork
• Most devices have a separate management interface
- Usually a serial connection/ USB
• Connect a modem
- Dial-in to manage the device
• Console router/ comm server
- Out-of-band access for multiple devices
- Connect to the console router, then choose
w here you w ant to go
The need for QoS
• Many different devices
- Desktop, laptop, VoIP phone, mobile devices
• Many different applications
- Mission critical applications, streaming video,
stream ing audio
• Differ ent apps have different netw ork requirements
- Voice is real-time
- Recorded streaming video has a buffer
- Database application is interactive
• Some applications are "more important" than others
- Voice traffic needs to have priority over YouTube
QoS (Quality of Service)
• Prioritize traffic performance
- Voice over IP t raffic has priority over w eb-browsing
- Prioritize by maximum bandwidth, t raffic rate,
VLAN, etc.
• Quality of Service
- Describes the process of controlling traffic flows
• Many different methods
- Across many different topologies
© 2020 Messer Studios, LLC
Monitoring services
• Constant cybersecurity monitoring
- Ongoing security checks
- A staff of cybersecurity experts at a
Security Operations Center (SoC)
• Identify threats
- A broad range of threats across many different
organizations
• Respond to events
- Faster response time
• Mainta in compliance
- Someone else ensur es PCI DSS, HIPAA compliance, etc.
FIM (File Integrity Monitoring)
• Some files change all the time
- Some files should NEVER change
• Monitor important operating system and application files
- Identify w hen changes occur
• W indow s - SFC (System File Checker)
• Linux - Tripw ire
• Many host-based IPS options
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 74
https://ProfessorMesser.com
3.3 - Firewalls
The universal security control
• Standa rd issue
- Home, office, and in your operating system
• Cont rol the flow of network traffi c
- Everything passes t hrough the firew all
• Corporat e control of outbound and inbound dat a
- Sensitive materials
• Cont rol of ina ppropriate content
- Not safe for w ork, parental controls
NG FWs
• Netw ork-based Firewalls
- Control t raffi c fl ow s based on the application
- M icrosoft SQL Server, Twitter, YouTube
• Intrusion Pr evention Systems
- Identify t he application
- Apply application-specific vulnerability signat ures
to the t raffic
• Protection against evil
- Anti-virus, anti-ma lware
• Content fil tering
- URL fil ters
- Control w ebsite t raffic by category
Network-based firewalls
• Filter t raffic by port num ber or application
- Traditional vs. NG FW firew alls
Web application firewall (WAF)
• Not like a "norma l" firew all
- Appli es rules t o HTTP/HTTPS conversations
• Encrypt t raffic - VPN betw een sites
• Allow or deny based on expected input
- Unexpected input is a common method of
exploiting an application
• Most fir ew alls can be layer 3 devices (routers)
- Oft en sits on the ingress/ egress of t he netw ork
- Network Address
- Translation (NAT) functionalit y
- Authenticate dynamic routing communication
Stateless firewall
• Does not keep t rack of traffi c fl ow s
- Each packet is individua lly exam ined, r egardless
of past history
- Traffic sent out side of an active session w ill
t raverse a stat eless firew all
Stateful firewall
• Stateful firew alls remember the "state" of t he session
- Everything within a valid fl ow is allow ed
UTM / All-in-one security appliance
• Unifi ed Threat Management (UTM ) /
• Web security gatew ay
• URL filter / Cont ent inspection
• Ma lw are inspection
• Spam fil ter
• CSU/ DSU
• Router, Swit ch
• Firew all
• IDS/I PS
• Bandw idth shaper
• VPN endpoint
Next-generation firewall (NG FW)
• The OSI Application Layer
- All data in every packet
• Can be called different names
- Appl ication layer gat eway
- Stat eful multi layer inspection
- Deep packet inspection
• Requires some advanced decodes
- Every packet must be analyzed and categorized
before a security decision is determined
© 2020 Messer Studios, LLC
• SQL inj ection
- Add your ow n commands t o an application's
SQL query
• A major focus of Payment Card Industry
- Data Security Standa rd (PCI DSS)
Firew all rule s
• Access cont rol lists (ACLs)
- Allow or disallow traffic based on tuples
- Groupings of categories
- Source IP, Destination IP, port number, time of day,
appl ication, etc.
• A logical path
- Usua lly top-to-bottom
• Can be very general or very specific
- Specific rules are usua lly at the t op
• Im plicit deny
- Most firew alls include a deny at the bottom
- Even if you didn't put one
Firew all characteristics
• Open-sou rce vs. proprietary
- Open-source provides traditiona l firew all functiona lity
- Propriet ary feat ures include application control and
high-speed ha rd w are
• Hardw are vs. softw are
- Pu rpose-built hardw are provides efficient and
fl exible connectivity options
- Software-based firewalls can be installed
almost anyw here
• Appliance vs. host-based vs. virtual
- Appliances provide the fastest through put
- Host-based firew alls ar e application-a ware and
can view non-encrypt ed data
- Virt ual fir ew alls provide valuable East/ West
net w ork secu rity
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 75
https://ProfessorMesser.com
3.3 - Network Access Control
Edge vs. access control
• Cont rol at t he edge
- Your Internet link
- Managed primarily th rough firew all rules
- Firew all rules rarely change
Healt h checks/posture assessment
• Persistent agent s
- Permanently installed onto a system
- Periodic updates may be requ ired
• Dissolvable agents
- No installation is r equ ired
- Runs during the post ure assessment
- Terminates w hen no longer req uired
• Access control
- Control from w herever you are - Inside or outside
- Access ca n be based on many rules
- By user, group, location, application, etc.
- Access ca n be easily revoked or changed
- Change your security posture at any time
• Agentless NAC
- Integrated w ith Active Directory
- Checks are made during login and logoff
- Can't be sched uled
Posture assessment
• You can' t t rust everyone's comput er
- BYOD (Bring You r Ow n Device)
- Malware infections/ missing anti-malw are
- Unauthorized applications
Failing your assessment
• What happens w hen a post ure
assessment fails?
- Too dangerous t o allow access
• Before connecting to t he netw ork, perform a health check
- Is it a t rusted device?
- Is it running anti-virus? Which one? Is it updated ?
- Are the corporate applications instal led?
- Is it a mobile device?
- Is the disk encrypted?
- The type of device doesn' t matter - W indow s, Mac,
Linux, iOS, Android
• Quarantine netw ork, notify adm inistrators
- Just enough network access t o fi x the issue
• Once resolved, t ry again
- M ay requ ire additiona l fixes
3.3 - Proxies
Proxies
• Sits betw een t he users and the external net w ork
• Receives the user requests an d sends the re quest
on their behalf (t he proxy)
• Useful for caching information, access control,
URL filtering, content scanning
• Applications may need to know
how t o use the proxy (explicit )
Application proxies
• One of the simplest " proxies" is NAT
• A netw ork-level proxy
• Most proxies in use are application proxies
• The proxy understands the w ay t he application w orks
• A proxy may on ly know one application
• HTTP
• Many proxies are multipu rpose proxies
• HTTP, HTTPS, FTP, etc.
• Some proxies are invisible (transparent)
'\
~~
I
1
I
I
I
Forward Proxy
• An " int ernal proxy"
• Common ly used to
protect and cont rol
user access
t o the Internet
Internet
User
'
Proxy
' ------------- ----------------- -/
/
w w w. example .com
Internal Netwo rk
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 76
https://ProfessorMesser.com
3.3 - Proxies (continued)
Reverse Proxy
• Inbound traffic from
the Internet to your
internal service
Proxy
Web Server
',www.example.com
______________________________ _
;
/
Internal Network
Open Proxy
• A third-party,
uncontrolled proxy
• Can be a signifi cant
security concern
• Often used to
circumvent existing
security controls
Internet
Internet
Proxy
www.example.com
3.3 - Intrusion Prevention
NIDS and NIPS
• Intrusion Detection System /
- Intrusion Prevention System
- Watch netw ork traffic
lnline monitoring
• IDS/I P$ sits physically inline
- All t raffic passes through the IDS/I P$
• Intrusions
- Exploits against operating systems,
applications, etc.
- Buffer overflow s, cross-site scripting, other
vulnerabilities
• Detection vs. Prevention
- Detection - Alarm or alert
- Prevention - Stop it before it gets into
the netw ork
Passive monitoring
• Examine a copy of t he t raffic
- Port mi rror (SPAN), netw ork tap
In-band response
• Mal icious t raffic is immediately identified
- Dropped at the IPS
- Does not proceed through the netw ork
Identification technologies
• Signature-based
- Look for a perfect match
• Anomaly-based
- Build a baseline of w hat's " normal"
• Behavior-based
- Observe and report
• Heuristics
- Use artificial intelligence to identify
• No w ay to block (pr event) t raffic
Out-of-band-response
• When malicious traffic is identified,
- IPS sends TCP RST (reset) frames
- After-the-fact
- Limited UDP r esponse available
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page
n
https://ProfessorMesser.com
3.3 - Intrusion Prevention (continued)
Passive monitoring
Network traffic is sent from client to
server through the netw
·
.....
•
lnUne monltodng
0
~
Acopyof
the traffic is
sent to the IDS/ IPS
The in line IPS can allow
or deny t raffic in real-time
Network t raffic is sent
from the Internet to
the core switch, which passes
through the IPS
Internet
•
Sw itch
IPS
Firewa ll
Core Switch
3.3 - Other Network Appliances
Hardware Security Module (HSM )
• High-end cryptographic ha rd wa re
- Plug-i n card or separate hardware device
• Key backup
- Secu red storage
• Cryptographic accelerat ors
- Offload that CPU overhead
from other devices
• Sensors
- Intrusion prevention systems, firew all logs,
authentication logs, w eb server access logs, dat abase
transaction logs, email logs
• Coll ectors
- Proprietary consoles (IPS, firew all),
- SI EM consoles, syslog servers
- Many SIEMs include a correlation engine t o
compare diverse sensor data
• Used in large environments
Clusters, red undant power
Jump server
• Access secure network zones
- Provides an access mechan ism
to a protected network
Private Network
• Highly-secu red device
- Hardened and monit ored
• SSH/ Tunnel / VPN t o
the jum p server
- RDP, SSH, or jump from there
• A sign ificant security concern
- Com prom ise t o the
jump server is
a sign ificant breach
Sensors and collectors
• Aggregate information from netw ork devices
- Built-i n sensors, sepa rat e devices
- Integrated into sw itches, routers, servers, firew alls, etc.
•
App lication Server
Client
Jump Server
W eb Server
Database Se rve r
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 78
https://ProfessorMesser.com
3.4 - Wireless Cryptography
Securing a wireless network
• An organization's wi reless netw ork can contain confidential
information
- Not everyone is allow ed access
• GCMP security services
- Data confidentiality w ith AES
- Message Integrity Check (M IC) with
- Galois Message Authentication Code (GMAC)
• Authenticate the users before granting access
- Who gets access to the wireless network?
- Username, passw ord, multi-factor authentication
• Ensure that all communication is confidential
- Encrypt the w ireless data
The WPA2 PSK problem
• WPA2 has a PSK brute-force problem
- Listen to the four-w ay handshake
- Some methods can derive the PSK hash w ithout
the handshake
- Capture the hash
• W ith the hash, attackers can brute force the
pre-shared key (PSK)
• Verify the integrity of al l communication
- The received data should be identical to the
original sent data
- A message integrity check (M IC}
Wireless encryption
• All wireless computers are radio t ransmitters and receivers
- Anyone can listen in
• Solution: Encrypt the data - Everyone has an encryption key
• Only people with the right key can t ransmit and listen
- WPA2 and WPA3
WPA2 and CCMP
• W i-Fi Protected Access II (WPA2)
- WPA2 certification began in 2004
• CCMP block cipher mode
- Counter Mode with Cipher Block Chaining
- Message Authentication Code Protocol, or
- Counter/ CBC-MAC Protocol
• CCMP security services
- Data confidentiality w ith AES
- Message Integrity Check (M IC) with CBC-MAC
WPA3 and GCMP
• W i-Fi Protected Access 3 (WPA3) - Introduced in 2018
• GCMP block cipher mode
- Galois/ Counter Mode Protocol
- A stronger encryption than WPA2
• This has become easier as technology improves
- A w eak PSK is easier to brute force
- GPU processing speeds
- Cloud-based passw ord cracking
• Once you have the PSK, you have everyone's
wireless key
- There's no forward secrecy
SAE
• WPA3 changes the PSK authentication process
- Includes mutual authentication
- Creates a shared session key w ithout sending that
key across the network
- No more four-w ay handshakes, no hashes,
no brute force attacks
- Adds perfect forward secrecy
• Simultaneous Authentication of Equals (SAE)
- A Diffie-Hellman derived key exchange w ith an
authentication component
- Everyone uses a different session key, even with
the same PSK
- An IEEE standard - the dragonfly handshake
3.4 - Wireless Authentication Methods
Wireless authentication methods
• Gain access to a w ireless netw ork
- Mobile users
- Temporary users
• Credentials
- Shared passw ord / pre-shared key (PSK}
- Centralized authentication (802.lX}
• Configuration
- Part of the wireless netw ork connection
- Prompted during the connection process
• WPA3-Personal / WPA3-PSK
-WPA3 w ith a pre-shared key
- Everyone uses the same key
- Unique WPA3 session key is derived from the PSK using SAE
(Si mu lta neous Authentication of Eq ua Is)
• WPA3-Enterprise / WPA3-802.1X
-Authenticates users individually with an
authentication server (i.e., RADIUS}
Captive Portal
• Authentication to a network - Common on wireless netw orks
Wireless security modes
• Configure the authentication on your w ireless
access point / w ireless router
• Access table r ecognizes a lack of authentication
- Redirects your w eb access to a captive portal page
• Open System
- No passw ord is r equired
• Once proper authentication is provided, the
w eb session continues
- Until the captive portal removes your access
© 2020 Messer Studios, LLC
• Username / passw ord - And additional authentication factors
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 79
https://ProfessorMesser.com
3.4 - Wireless Authentication Methods (continued)
Using WPS
• W i-Fi Protected Setup
- Originally called Wi-Fi Simple Config
The WPS hack
• December 2011 - WPS has a design fl aw
- It w as built w rong from the beginning
• Allow s "easy" setup of a mobile device
- A passphrase can be complicated to a novice
• PIN is an eight-digit number
- Really seven digits and a checksum
- Seven digits, 10,000,000 possible combinations
• The WPS process validates each half of the PIN
- First half, 4 digits . Second half, 3 digits.
- First half, 10,000 possibilities,
second half, 1,000 possibil ities
• It takes about four hours to go t hrough all of t hem
- Most devices never considered a lockout function
- Brute force lockout features are now the norm
• Differ ent w ays to connect
- PIN configured on access point must be entered
on t he mobile device
- Push a button on the access point
- Near-field communication - Bring the mobile device close to the access point
3.4 - Wireless Authentication Protocols
Wireless authentication
• We've cr eated many authentication methods
through t he years
- A network administrator has many choices
EAP-FAST
• EAP Flexible Authentication via Secure Tunneling
- Authentication server (AS) and supplicant shar e a
protected access credential (PAC) (shared secret)
• Use a username and passw ord
- Other factors can be included
• Supplicant receives the PAC
• Supplicant and AS mutually authenticate and
negotiate a Transport Layer Security (TLS) tunnel
• Commonly used on w ireless netw orks
- Also w orks on w ired netw orks
EAP
• Extensible Authentication Protocol (EAP)
- An authentication framework
• Many different w ays to authenticate based on
RFC standards
- Manufactur ers can build their ow n EAP methods
• EAP integrates w ith 802 .lX
- Prevents access to the netw ork until t he
authentication succeeds
IEEE 802.lX
• IEEE 802.lX
- Port-based Netw ork Access Control (NAC)
- You don't get access to t he netw ork until you
authenticate
• Used in conjunction with an access database
- RADIUS, LDAP, TACACS+
IEEE 802.lX and EAP
• Supplicant
-The client
• Authenticator
- The device that provides access
• Authentication server
- Validates the cl ient credentials
© 2020 Messer Studios, LLC
• User authentication occurs over the TLS tunnel
• Need a RADIUS server
- Provides t he authentication database and
EAP-FAST services
PEAP
• Protected Extensible Authentication Protocol
- Protected EAP
- Created by Cisco, M icrosoft, and RSA Security
• Also encapsulates EAP in a TLS tunnel
- AS uses a digital certi fi cate instead of a PAC
- Client doesn't use a certificate
• User authenticates with MSCHAPv2
- Authenticates to M icrosoft's MS-CHAPv2 databases
• User can also authenticate w ith a GTC
- Generic Token Card, hardw are token generator
EAP-TLS
• EAP Transport Layer Security
- Strong security, wide adoption
- Support from most of the industry
• Requires digital certificates on t he AS and
all other devices
- AS and supplicant exchange certificates for
mutual authentication
- TLS tunnel is then bui lt for t he user
authentication process
• Relatively complex implementation
- Need a public key infrastructure (PKI)
- Must deploy and manage certi fi cates to
all wireless clients
- Not all devices can support t he use of digital certificates
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page so
https://ProfessorMesser.com
3.4 - Wireless Authentication Protocols (continued)
EAP-TTLS
• EAP Tunneled Transport Layer Securit y
- Support other aut hentication prot ocols
in a TLS tunnel
RADIUS Federation
• Use RADIUS w ith federation
- M em bers of one organization can authenticate to
t he netw ork of another organization
- Use their normal cred entia ls
• Requires a digital certificate on the AS
- Does not req uire digital certificates on every device
- Builds a TLS tunnel using this digital certificate
• Use 802.lX as the aut hentication method
- And RAD IUS on t he backend - EAP t o authenticate
• Use any authentication method inside t he TLS t unnel
- Ot her EAPs
- MSCHAPv2
- Anything else
• Driven by eduroam (education roaming)
- Educat ors can use t heir norma l authentication
w hen visiting a differ ent campus
- https://www.eduroam.org/
3.4 - Installing Wireless Networks
Site surveys
• Determine existing wireless landsca pe
- Sample the existing w ireless spectrum
Channel selection and overlaps
• Overlapping channels
- Frequency conflicts - use non-overlapping channels
- Automatic or manua l confi gurations
• Identify existing access points
- You may not cont rol all of t hem
Access point placement
• M inima l overlap
- Maxim ize coverage, minimize the number
of access points
• Work around existing freq uencies
- Layout and plan for interference
• Pl an for ongoing sit e surveys
- Things will cert ainly change
• Avoid interference
- Electronic devices (microw aves)
- Bu ilding materials
- Thi rd-party wireless net w orks
• Heat maps - Identify w ireless signal strengt hs
Wireless survey tools
• Signal coverage
• Potential interference
• Built-in tools
• 3rd-party t ools
• Spectrum analyzer
• Signa l control
- Place APs w here the users are
- Avoid excessive signal distance
W ireless infrastructure security
• W ireless controllers
- Centralized management of w ireless access point s
- Manage system confi guration and performance
Wireless packet analysis
• W ireless net w orks are incr edibly easy to mon itor
- Everyone " hears" everyth ing
• Securing wireless controllers
- Control access to management console
- Use strong encryption w ith HTTPS
- Automatic logout after no activity
• You have to be quiet
- You can't hear the network if you' re busy t ransmitting
• Some net w ork drivers w on't capture w ireless information
- You'll need specialized adapters/ chipset s and drivers
• View wireless-specifi c information
- Signal-to-noise ratio, channel information, etc.
• Securing access points
- Use strong passw ord s
- Update to the latest firmw are
• Try it you rself ! - https://www.wireshark.org
2.4 GHz Spectrum for 802.11 - North America
IEEE Channel !
1
6
11
20 MHZ _ _ _
2~12 MHZ
24S2 MHZ
-
Avail able channels
-
New channels added in April 2014
~
Previously indoor channels, usable outdoors aftet April 2014
-
Ftequenciei not available Sor 802.11
5 GHz Spectrum for 802.11 - North America
IEEE Channel If
36
5150 MHz
40
44
48
52
55
60
UNIJ.Z
UNll-1
S250 M HZ
© 2020 Messer Studios, LLC
~
68
5350 MHz
72
75
80
~
SS
92
95
100
104
10!
112
115
120
124
UN11·2
5" 70MHZ
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 81
128
132
13,5
1'-0
14"
149
153
157
161
165
169
173
177
UNIJ.3
5 72:S MHZ
SS2SMH!
5925 MHz
https://ProfessorMesser.com
3.5 - Mobile Networks
Point-to-point
• One-t o-one connection
- Conversation betw een t w o devices
Near field communication {NFC)
• Tw o-w ay w ireless communication
- Builds on RFID
• Connections betw een buildings
- Point-to-point network links
• Payment systems
- Google w allet, Apple Pay
• Bootstrap for ot her w ireless
- NFC helps with Bluet ooth pairing
• W i-Fi repeaters
- Extend t he length of an existing netw ork
Point-to-multipoint
• One of the most popular communication methods
802.11 w ireless
• Does not imply full connectivity betw een nodes
Cellular networks
• Mobile devices
- " Cell" phones
• Access token, identity "card"
- Short range wit h encryption su pport
NFC security concerns
• Remote captur e
- It 's a w ireless net w ork
- 10 meters for active devices
• Freq uency jamm ing - Denial of service
• Sepa rate land int o "cells"
- Antenna coverages a cell w ith certain frequencies
• Relay / Replay attack - Man in the middle
• Security concerns
- Traffic monitoring
- Location t racking
- Worldwide access to a mobile device
IR (Infrared)
• Included on many smartphones, tablets, and sma rtw atches
- Not rea lly used much for printing
Wi-Fi
• Local netw ork access
- Local secu rity problems
• File t ransfers are possible
• Same security concerns as other W i-Fi devices
• Data capture
- Encrypt you r dat a!
• On-pat h attack
- Modify and/ or monit or data
• Denial of service
- Freq uency interfer ence
• Control your entertainment center
- Almost exclusively IR
• Other phones can be used to control you r IR devices
USB (Universal Serial Bus)
• Physical connectivity to your mobile device
- USB to your computer
- USB, Lightning, or proprietary on you r phone
• Physical access is alw ays a concern
- May be easier to gain access than over a remote
connection
Bluetooth
• High speed commun ication over short dista nces
- PAN (Personal Ar ea Net w ork)
• Connects our mobile devices
- Smartphones, tethering, headsets and
headphones, hea lth monit ors, automobile and
phone integration, smartw atches,
external speakers
RFID (Radio-frequency identification)
• It's everyw here
- Access badges
- Inventory/ Assembly li ne tracking
- Pet/ An imal identification
- Anything that needs to be t racked
• Radar technology
- Radio energy t ransmitted to the tag
- RF pow ers t he tag, ID is t ra nsmitted back
- Bidirectional communication
- Some tag formats can be active/ pow ered
© 2020 Messer Studios, LLC
• Loss of RFC device control - St olen/lost phone
• A locked device is relatively secure
- Al w ays auto-lock
• Mobile phones can also exfiltrate
- Phone can appear to be a USB storage device
Global Positioning System (GPS)
• Created by the U.S. Department of Defense
- Over 30 satellites curr ently in orbit
• Precise navigation
- Need to see at least 4 satellites
• Determines location based on tim ing differences
- Longitude, latitude, altitude
• Mobile device location services and geotracking
- Maps, directions
- Determine physica l location based on GPS,
- W iFi, and cellular tow ers
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 82
https://ProfessorMesser.com
3.5 - Mobile Device Management
Mobile Device Management {MOM)
• Manage company-ow ned and user-ow ned mobile devices
- BYOD - Bring You r Ow n Device
• Centra lized management of t he mobil e devices
- Specialized functionalit y
• Set policies on apps, data, camera, etc.
- Control the remote device
- The entire device or a " partition"
• Manage access control
- Force screen locks and PINs on these single user devices
Application management
• Managing mobile apps are a chal lenge
- Mobil e devices install apps constantly
• Not all applications are secu re
- And some are malicious
- Android malwar e is a rapidly grow ing secu rity concern
• Manage application use through allow lists
- On ly approved applications can be installed
- Managed th rough the MOM
• A management challenge
- New applications must be checked and added
Content management
• Mobile Content Management (MCM )
- Secu re access t o data, protect data from outsiders
• File sharing and viewing
- On-sit e content (M icrosoft Sha repoint, file servers)
- Cloud-based storage (Box, Office 365)
• Dat a sent from the mobile device
- DLP (Data Loss Prevention) pr events copy/paste of
sensitive dat a
- Ensure data is encrypted on the mobile device
• Managed from the mobile device manager (M DM )
Remote wipe
• Remove all data from you r mobile device
- Even if you have no idea w here it is
- Oft en managed from t he MDM
• Connect and w ipe from the w eb
- Nuke it from anyw her e
• Need t o plan for this
- Configure your mobi le device now
• Always have a backu p
- Your data can be removed at any time
- As you are w al king out t he door
Geo location
• Precise tracking details - Tracks within feet
Geofencing
• Some MDMs allow for geofencing
- Restrict or allow feat ures w hen the device is in a
particular area
• Cameras
- M ight only w ork w hen outside t he office
• Aut hentication
- Only allow logins w hen the device is locat ed in a
particular area
Screen lock
• All mobile devices can be locked
- Keep people out of your data
• Simple passcode or strong passcode
- Numbers vs. Alphanumeric
• Fail too many times?
- Erase t he phone
• Define a lockout policy
- Create aggressive lockout timers
- Completely lock the phone
Push notification services
• Information appears on the mobile device screen
- The notification is "pushed" to you r device
• No user intervention
- Receive notifi cations from one app w hen using a
completely different app
• Control of displayed notifications can be
managed from the M DM
- Or notifications can be pushed from the MDM
Passwords and PINs
• The universal help desk call
- I need to r eset my passw ord
• Mobile devices use multiple aut hentication methods
- Passw ord/ passphrase, PINs, patterns
• Recovery process can be initiated from the MDM
- Passw ord reset option is provided on the
mobile device
- " What is the name of your favorite car maiden
cat 's color?"
• MDM also has fu ll control
- Completely remove all securit y controls
- Not t he defau lt or best practice
Biometrics
• You are the authentication fact or
- Fingerprint , face
• Can be used for good (or bad)
- Find you r phone, find you
• May not be the most secure aut hentication factor
- Usefu l in some environments
- Completely forbidden in others
• Most phones provide an option to disable
- Limits functiona lity of t he phones
• Availability is managed through the M DM
- Organization determines the security of the device
• May be managed by the MDM
• Can be managed per-app
- Some apps requ ire additiona l biometric
aut hentication
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 83
https://ProfessorMesser.com
3.5 - Mobile Device Management {continued)
Context-aware authentication
• Who needs 2FA?
- The attackers can get around anything
• Authentication can be contextual
- If it w alks li ke a duck...
• Combine multiple contexts
- Where you norma lly login {IP address
- Where you norma lly frequent (GPS information)
- Other devices that may be
pai red (Bluetooth, etc.)
• And others
- An emerging technology
- Another w ay to keep data safe
Containerization
• Difficult to separate personal from business
- Especially wh en the device is BYOD
- Ow ned by the employee
• Easy to manage offboarding
- Only the company information is deleted
- Personal data is retained
- Keep your pictures, video, music, email, etc.
Full device encryption
• Scramble all of the data on the mobile device
- Even if you lose it, the contents are safe
• Devices han dle this in different w ays
- Strongest/stronger/strong?
• Encryption isn't trivial
- Uses a lot of CPU cycles
- Complex integration between hardware
and software
• Don't lose or forget your password!
- There's no recovery
- Often backed up on the MDM
• Separate enterprise mobile apps and data
- Create a virtual "container" for company data
- A contained area - limit data sharing
- Storage segmentation keeps data separate
3.5 - Mobile Device Security
MicroSD HSM
SEAndroid
• Shrink the PCI Express
- Hardware Security Module - Now in a microSD card form
• Security Enhancements for Android
- SELinux (Secu rity-Enhanced Linux)
in the Android OS
- Supports access control security policies
• Provides security services
- Encryption, key generation, digital signatures,
authentication
• Secure storage
- Protect private keys - Cryptocurrency storage
Unified Endpoint Management (UEM)
• Manage mobile and non-mobile devices
- An evolution of the Mobile Device Manager (M DM)
• End users use different types of devices
- Their use has blended together
• Applications can be used across different platforms
- Work on a laptop and a smartphone
• All of these devices can be used from anywhere
- User's don't stay in one place
Mobile Application Management (MAM)
• Provision, update, and remove apps
- Keep everyone running at the correct version
• A project from the US National Security Agency (NSA)
- Based on the NSA's SE Linux
• Addresses a broad scope of system security
- Kernel, userspace, and policy configuration
• Enabled by default with Android version 4.3
- July 2013
- Protect privileged Android system daemons
- Prevent malicious activity
• Change from Discretionary Access Control (DAC) to
Mandatory Access Control (MAC}
- Move from user-assigned control to object labels
and minimum user access
- Isolates and sandboxes Android apps
• Centralized policy configuration
- Manage Android deployments
• Create an enterprise app catalog
- Users can choose and install the apps they need
• Monitor application use
- Apps used on a device, devices with unauthorized apps
• Remotely wipe application data
- Securely manage remote data
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 84
https://ProfessorMesser.com
3.5 - Mobile Device Enforcement
Third-party app stores
• Centralized app clea ringhouses
- Apple App Stor e
- Google Play
• Not all applications are secu re
- Vulnerabilities, data leakage
• Not all applications are appropriate for business use
- Games, instant messaging, et c.
• MDM can allow or deny app store use.
Rooting/ jail breaking
• Mobile devices are pu rpose-built systems
- You don't need access to the operating system
• Gaining access - Android - Rooting/ Apple iOS Jailbreaking
• Instal l custom firmw are
- Replaces t he existing operating system
• Uncont rolled access
- Circumvent secu rity feat ures, sideload apps wit hout
using an app store
- The MDM becomes relatively useless
Carrier unlocking
• Most phones are locked to a ca rrier
- You can't use an AT&T phone on Veri zon
- Contract w ith a carrier subsidizes the cost of the phone
• You can unlock the phone
- If you r carrier allow s it
- A carrier lock may be illega l in your country
• Security revolves around connectivity
- Moving to anot her carrier can circumvent the M DM
- Preventing a SIM unlock may not be possible on a
persona l device
Firmware OTA updates
• The operating system of a mobile device is
const antly changing - Similar to a desktop computer
• Updates ar e provided over the air (OTA)
- No cable required
• Security pat ches or entire operating system updates
- Sign ificant changes wit hout connecting the device
• Th is may not be a good thing
-The MDM can manage w hat OTA updates are allow ed
Camera use
• Cameras are controversial
- They' re not alw ays a good t hing
- Corporate espionage, inappropriate use
• Almost im possible to control on the device
- No good w ay to ensure the camera w on't be used
• Camera use can be controlled by the MDM
- Al w ays disabled
- Enabled except for certain locations (gee-fencing)
SMS/ MMS
• Short Message Service / Multimedia Messaging Service
- Text messages, video, audio
© 2020 Messer Studios, LLC
• Control of data can be a concern
- Outboun d dat a leaks, financial disclosu re s
- Inbound notifications, phishing attempt s
• MDM can enable or disa ble SMS/MMS
- Or only allow during certa in timeframes or locations
External media
• Store data onto external or removable drives
- SD flash memory or USS/ light ning drives
• Transfer data from flash
- Connect t o a com puter to r etrieve
• This is very easy to do
- Limit dat a w ritten to r emova ble drives
- Or prevent the use of them from t he MDM
USB OTG
• USB On-The-Go - Connect devices di rectly together
- No computer require d, only a cable
• The mobil e device can be bot h a host and a device
- Read from an external device, t hen act as
a storage device it self
- No need for a th ird-pa rty storage device
• A USB 2.0 standard - Commonly seen on Android devices
• Ext remely convenient
- From a secu rit y perspective, it 's t oo convenient
Recording microphone
• Audio r ecordings
- Ther e are microphones on every mobile device
• Useful for meetings and note taking
- A st andard for col lege classes
• A legal liabilit y
- Every state has different laws
- Every situation is different
• Disable or gee-fence - Manage from the MDM
Geotagging / GPS tagging
• Your phone know s w here you are
- Location Services, GPS
• Adds your location t o document metadat a
- Longitude, latitude - Photos, videos, etc.
• Every document may contain geotagged information
- You can track a user quit e easily
• This may cause securit y concerns
- Take pictu re, upload t o social media
W iFi Direct /ad hoc
• We' re so used to access point s
- SSID configurations
• The w ireless stan dard includes an ad hoc mode
- Connect wireless devices directly
- W ithout an access point
• Wi Fi Direct simplifi es t he process
- Easily connect many devices toget her
- Common to see in home devices
• Simplicity can aid vu lnerabi lities
- Invisible access t o im portant devices
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 85
https://ProfessorMesser.com
3.5 - Mobile Device Enforcement (continued)
Hotspot/tethering
• Turn your phone into a Wi Fi hotspot
- Your ow n personal wireless rout er
- Extend t he cellular dat a net w ork t o all of you r devices
• Dependent on phone type and provider
- May require additional charges and data costs
Paym ent methods
• Send sma ll amounts of data wirelessly over
a limited ar ea (NFC)
- Bu ilt into your phone
- Payment systems, t ransportation, in-person
information exchange
• May provide inadvert ent access t o an internal network
- Ensure proper securit y / passcode
• A few different standa rd s
- Apple Pay, Android Pay, Samsung Pay
• Bypassing primary authentication w ould allow payment
- Use proper secu rity - or disable completely
3.5 - Mobile Deployment Models
BYOD
• Bring Your Ow n Device / Bring Your Ow n Technology
• Em ployee ow ns t he device
- Need to meet t he company's requirement s
• Diffi cu lt to secure
- It 's bot h a home device and a w ork device
- How is dat a prot ected?
- W hat ha ppens to the dat a w hen a device is
sold or t raded in?
COPE
• Corporat e ow ned, personally enabled
- Com pany buys t he device
- Used as bot h a corporate device and a personal device
• Organization keeps full cont rol of t he device
- Similar to com pany-ow ned laptops and desktops
• Information is protected using corporate policies
- Information can be deleted at any time
• CYOD - Choose Your Ow n Device
- Similar to COPE, but with t he user's choice of device
Corporate owned
• The company ow ns t he device
- And cont rols t he content on t he device
• The device is not for personal use
- You'll need to buy you r ow n device for home
• Very specifi c secu rity requirements
- Not able to m ix business w ith home use
VDI/VMI
• Virt ua l Desktop Infrastructu re / Virtual Mobile
Infrastructu re
- The apps are separated from the mobile device
- The data is separated from the mobile device
• Data is stor ed securely, centralized
• Physica l device loss - Risk is minim ized
• Cent ralized app development
- Write for a single VM I platform
• Applications are managed centrally
- No need to update all mobile devices
3.6 - Cloud Security Controls
HA across zones
• Availabilit y zones (AZ)
- Isolated locations wit hin a cloud r egion (geographica l location)
- AZ common ly spans across mu ltiple regions
- Each AZ has independent pow er, HVAC, and net w orki ng
Secret s management
• Cloud com puting includes many secrets
- API keys, passw ords, certi fi cates
• Build applications to be highly ava ilable (HA)
- Run as active/ standby or active/ active
- Appl ication recognizes an outage and moves t o the ot her AZ
• Authorize access to the secrets
- Limit access to the secr et service
• Manage an access control policy
- Limit users to only necessary secrets
• Use load balancers t o provide seamless HA
- Users don' t experience any application issues
Resource policies
• Identit y and access management (1AM )
- Who gets access, w hat t hey get access to
• Ma p job functions to roles
- Com bine users int o grou ps
• Provide access to cloud resources
- Set granular pol icies - Grou p, IP addr ess, dat e and time
• Centralize user accounts, synchronize across all platforms
© 2020 Messer Studios, LLC
• This can quickly become overw helming
- Diffi cult to manage and protect
• Provide an audit t rail
- Know exactly w ho accesses secrets and w hen
Integration and auditing
• Integrate securit y across multi ple platforms
- Different operating systems and appli cations
• Consolidat e log storage and reporting
- Cloud-based Securit y Information and Event
Management (SIEM)
• Auditing - Va lidate the security controls
- Verify compliance wit h fi nancial and user data
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 86
https://ProfessorMesser.com
3.6 - Securing Cloud Storage
Cloud storage
• Data is on a publ ic cloud
- But may not be public data
• Access can be limited
- And protected
• Data may be required in different geographical locations
- A backup is alw ays required
• Availability is alw ays important
- Data is available as the cloud changes?
Encryption
• Cloud data is more accessible than non-cloud data
- More access by more people
Permissions
• A significant cloud storage concern
- One permission mistake can cause a data br each
- Accentur e, Uber, US Department of Defense
• Key management is critical
• Public access
- Should not usually be the default
• Many different options
- Identity and Access Management (1AM)
- Bucket policies
- Globally blocking public access
- Don't put data in the cloud unless it r eally
needs to be there
• Server-side encryption
- Encrypt the data in the cloud
- Data is encrypted w hen stored on disk
• Client-side encryption
- Data is already encrypted w hen it's sent to the cloud
- Performed by the application
Replication
• Copy data from one place to another
- Real-time data duplication in multiple locations
• Disaster recovery, high availability
- Plan for problems
- Maintain uptime if an outage occurs
- Hot site for disaster recovery
• Data analysis
-Analytics, big data analysis
• Backups
- Constant duplication of data
3.6 - Securing Cloud Networks
Cloud Networks
• Connect cloud components
- Connectivity w ithin the cloud
- Connectivity from outside the cloud
• Users communicate to the cloud
- From the public Internet
- Over a VPN tunnel
• Cloud devices communicate betw een each other
- Cloud-based netw ork
- East/w est and north/south communication
- No external traffic flow s
Virtual networks
• A cloud contains virtual devices
- Servers, databases, storage devices
• Virtual sw itches, virtual routers
- Build the netw ork from the cloud console
- The same configurations as a physical device
• The netw ork changes w ith the rest of the infrastructure
-On-demand
- Rapid elasticity
Public and private subnets
• Private cloud
- All internal IP addr esses
- Connect to the private cloud over a VPN
- No access from the Internet
• Public cloud
- External IP addresses
- Connect to the cloud from anyw here
• Hybri d cloud
- Combine internal cloud resources w ith external
- May combine both public and private subnets
Segmentation
• The cloud contains separate VPCs, containers,
and microservices
-Application segmentation is almost guaranteed
• Separation is a security opportunity
- Data is separate from the application
-Add security systems betw een application
components
• Virtualized security technologies
- Web Application Firew all (WAF)
- Next-Generation Firew al l (NGFW)
• Intrusion Prevention System {IPS)
API inspection and integration
• M icroservice architecture is the
underlying application engine
-A significant security concern
• AP I calls can include risk
-Attempts to access critical data
- Geographic origin
- Unusual API calls
• AP I monitoring
- View specific API queries
- Monitor incoming and outgoing data
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 87
https://ProfessorMesser.com
3.6 - Securing Compute Clouds
Compute cloud instances
• The laaS component for the cloud computing
environment
- Amazon Elastic Compute Cloud (EC2)
- Google Compute Engine (GCE}
- Microsoft Azure Virtual Machines
• Manage computing resources
- Launch a VM or container
- Allocate additional r esources
- Disable/ remove a VM or container
Security groups
• A firew all for compute instances
- Control inbound and outbound t raffic flow s
• Layer 4 port number
-TCP or UDP port
• Layer 3 address
- Individual addresses
- CIDR block notation
- 1Pv4 or 1Pv6
Dynamic resource allocation
• Provision resources w hen they are needed
- Based on demand - Provisioned automatically
• Scale up and dow n
- Allocate compute resources w here and
w hen they are needed
- Rapid elasticity
- Pay for only w hat's used
• Ongoing monitoring
- If CPU utilization hits a particular threshold, provision
a new application instance
Instance awareness
• Granular security controls
- Identify and manage very specific data flows
- Each instance of a data flow is different
• Define and set policies
- Allow uploads to the corporate box.com file shar e
• Corporate file shares can contain PI I
• Any department can upload to the
corporate file share
- Deny certain uploads to a personal box.com file share
• Allow graphics files
• Deny any spreadsheet
• Deny files containing credit card numbers
• Quarantine the file and send an alert
Virtual private cloud endpoints
• M icroservice architectur e is the
VPC gateway endpoints
- Allow private cloud subnets to communicate to other
cloud services
• Keep private resources private
- Internet connectivity not r equired
• Add an endpoint to connect VPC resources
Container security
• Containers have simi lar security concerns as any other
application deployment method
- Bugs, insufficient security controls, misconfigurations
• Use container-specific operating systems
- A minimalist OS designed for containers
• Group container types on the same host
- The same purpose, sensitivity, and thr eat posture
- Limit the scope of any intrusion
3.6 - Cloud Security Solutions
Cloud access security broker (CASB)
• Clients are at w ork, data is in the cloud
- How do you keep everything secure?
- The organization already has w ell-defined
security policies
• How do you make your security policies
w ork in the cloud?
- Integrate a CASB
- Implemented as client softw are, local security
appliances, or cloud-based security solutions
Application security
• Secure cloud-based applications
- Complexity increases in the cloud
• Application misconfigurations
- One of the most common security issues
- Especially cloud storage
• Authorization and access
- Controls should be strong enough for access
from anyw here
• API security - Attackers w ill try to exploit interfaces and APls
• Visibility
- Determine w hat apps are in use
- Are they authorized to use the apps?
Next-Gen Secure Web Gateway (SWG)
• Protect users and devices
- Regardless of location and activity
• Compliance
-Are users complying with HIPAA? PCI?
• Go beyond URLs and GET r equests
- Examine the application API
- Dropbox for personal use or corporate use?
• Examine JSON strings and API requests
-Allow or disallow certain activities
• Threat pr evention
- Allow access by authorized users, prevent attacks
• Data security
- Ensure that all data transfers are encrypted
- Protect the transfer of PII with OLP
© 2020 Messer Studios, LLC
• Instance-awar e security
-A development instance is different than production
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 88
https://ProfessorMesser.com
3.6 - Cloud Security Solutions (continued)
Firewalls in the cloud
• Control traffic fl ows in the cloud
- Inside the cloud and external fl ows
• Cost
- Relatively inexpensive compared to appliances
- Virtual firewalls
- Host-based firew alls
• Segmentation
- Betw een microservices, VMs, or VPCs
• OSI layers
- Layer 4 (TCP/UDP), Layer 7 (Application)
Security controls
• Cloud-native security controls
- Integrated and supported by the cloud provider
- Many configu ration options
- Security is part of the infrastructure
- No additional costs
• Third-party solutions
- Support across multiple cloud providers
- Single pane of glass
- Extend policies outside the scope of the cloud provider
- More extensive reporting
3. 7 - Identity Controls
• Requires an existing public-key infrastructure (PKI)
- The Certificate Authorit y (CA) is the t rusted entity
- The CA digitally signs the certificates
Identity provider {ldP)
• Who are you?
- A service needs to vouch for you
- Authentication as a Service
• A list of entities
- Users and devices
• Commonly used by SSO applications or an
authentication process
- Cloud-based services need to know w ho you are
• Uses standard authentication methods
- SAML, OAuth, Open ID Connect, etc.
Attributes
• An identifier or property of an entity
- Provides identification
• Personal attributes
- Name, email addr ess, phone number, Employee ID
• Other attributes
- Department name, job title, mail stop
• One or more attributes can be used for identification
- Combin e them for more detail
Certificates
• Digital certificate - Assigned to a person or device
Tokens and cards
• Smart card
- Integrates with devices - may require a PIN
• USB token - Certificate is on the USB device
SSH keys
• Secure Shell (SSH) - Secur e term inal communication
• Use a key instead of username and password
- Public/private keys - Critica l for automation
• Key management is critical
- Centralize, control, and audit key use
• SSH key managers - Open source, Commercial
SSH key-based authentication
• Create a public/private key pair
- ssh-keygen
• Copy the public key to the SSH server
-ssh-copy-id user@host
• Try it out
- ssh user@host
- No passw ord prompt !
• Binds the identity of the certificate own er to a
public and private key
- Encrypt data, create digital signatures
3.7 -Account Types
User accounts
• An account on a computer associated w ith a
specific person
- The computer associates the user with a specific
identification number
• Storage and files can be private to that user
- Even if another person is using the same
computer
• No pri vileged access to the operating system
- Specifically not allow ed on a user account
• This is the account type most people w ill use
- Your user community
© 2020 Messer Studios, LLC
Shared and generic accounts
• Shared account
- Used by more than one person
- Guest login, anonymous login
• Very difficu lt to create an audit t rail
- No w ay to know exactly who w as w orking
- Difficult to determine the proper privileges
• Passw ord management becomes difficult
- Passw ord changes re quire notifying everyone
- Difficult to remember so many password changes
- Just w rite it dow n on this yellow sticky paper
• Best practice : Don't use these accounts
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 89
https://ProfessorMesser.com
3. 7 - Account Types (continued)
Guest accounts
• Access to a computer for guests
- No access to change settings, modify applications,
view other user's files, and mor e
- Usually no passw ord
• Th is brings sign ificant security chal lenges
- Access t o the userspace is one step closer to an exploit
• Must be controlled
- Not the defa ult - Removed from W indow s 10 build 10159
Serv ice accounts
• Used exclusively by services running on a computer
- No interactive/ user access (ideally)
- Web server, dat abase server, etc.
• Access can be defi ned for a specifi c service
- Web server right s and permissions will be different than
a dat abase server
• Commonly use usernames and passw ords
- You' ll need to det ermine the best policy for
passw ord updates
Privileged accounts
• Elevated access t o one or more systems
- Administrator, Root
• Com plete access to t he system
- Often used t o manage hardware, drivers, and
softw are install ation
• This account shou ld not be used for normal
administration
- User accounts should be used
• Needs t o be high ly secur ed
- St rong passw ord s, 2FA
- Scheduled passw ord changes
3.7 -Account Policies
Account policies
• Cont rol access to an account
- It 's mor e than j ust username and passw ord
- Det ermine w hat policies are best for an organ ization
• The authentication process
- Passw ord policies, authentication factor policies,
ot her considerations
• Perm issions after login - Another li ne of defense
Perform routine audits
• Is everyth ing following the policy?
- You have t o police yourself
• It's amazing how quickly things can change
- Make sure the routine is scheduled
• Certain actions can be automatically identified
- Consider a tool for log analysis
Auditing
• Perm ission auditing
- Does everyone have the correct perm issions?
- Some Adm inistrators don' t need to be there
- Schedu led r ecertification
• Usage auditing - How are your resou rces used?
- Are your systems and applications secure?
Password complexity and length
• Make your passw ord st rong - Resist brute-force attack
Account lockout and disablement
• Too many incorrect passw ords will cause a lockout
- Prevent s on line brute force attacks
- This shou ld be normal for most user accounts
- This can cause big issues for service accounts
• You might w ant t his
• Disabli ng account s
- Part of the normal change process
- You don't w ant t o delet e accounts
• At least not initially
• May contain important decryption keys
Location-based policies
• Netw ork location
- Identify based on IP subnet
- Can be difficult with mobile devices
• Geolocation - determ ine a user's location
- GPS - mobile devices, very accurate
- 802.11 w ireless, less accu rate
- IP addr ess, not very accu rate
• Geofencing
- Automatical ly allow or restrict access w hen t he
user is in a particular location
- Don't all ow t his app t o run un less you're near the
office
• Increase passw ord entropy
- No single w ords, no obvious passw ords
• What 's the name of you r dog?
- Mix upper and low er case and use special characters
• Don't r eplace a o w ith a 0, t with a 7
• Stronger passw ords are at least 8 characters
- Consider a phrase or set of w ord s
• Geotagging
- Add location metadata to a document or file
- Latitude and longit ude, distance, time stamps
• Location-based access rules
- Your IP address is associat ed w ith an IP block in Russia
- We don't have an offi ce in Russia
- You w ere in Colorado Springs an hou r ago
- Perm ission not grant ed
• Prevent passw ord reuse
- System r emem bers passw ord hist ory, requires
un iq ue passwords
• Time-based access rules
- Nobody needs to access the lab at 3 AM
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 90
https://ProfessorMesser.com
3.8 - Authentication Management
• Versatile memory
- Storage keys, hardware configuration information
Password keys
• Hardware-based authentication
- Something you have
• Passw ord protected
- No dictionary attacks
• Helps prevent unauthorized logins and
account takeovers
- The key must be present to login
Hardware Security Module (HSM)
• High-end cryptographic hardware
- Plug-in card or separate hardware device
• Doesn't replace other factors
- Passwords are still important
• Key backup
- Secured storage
• Cryptographic accelerators
- Offload that CPU overhead from other devices
Password vaults
• Password managers
- All passwords in one location
- A database of credentials
• Used in large environments
- Clusters, redundant pow ers
• Secure storage
- All credentials are encrypted
- Cloud-based synchronization options
Knowledge-based authentication (KBA)
• Use personal knowledge as an authentication factor
- Something you know
• Create unique passwords
- Passwords are not the same across sites
• Static KBA
- Pre-configured shared secrets
- Often used with account recovery
- What was the make and model of you r first car?
• Personal and enterprise options
- Corporate access
Trusted Platform Module (TPM)
• A specification for cryptographic functions
- Hardware to help w ith all of this encryption stuff
• Dynam ic KBA
- Questions are based on an identity verification service
-What was your street number w hen you lived in
Pembroke Pines, Florida?
• Cryptographic processor
- Random number generator, key generators
• Persistent memory
- Comes with unique keys burned in
during production
3.8 - PAP and CHAP
PAP (Password Authentication Protocol)
• A basic authentication method
- Used in legacy operating systems
- Rare to see singularly used
CHAP
• Challenge-Handshake Authentication Protocol
- Encrypted challenge sent over the network
• PAP is in the clear
- Weak authentication scheme
- Non-encrypted password exchange
- We didn't require encryption on ana log dialup lines
- The application would need to provide any encryption
• Three-way handshake
-After link is established, server sends a challenge
- Client responds w ith a password hash calculated
from the challenge and the password
- Server compares received hash w ith stored hash
• Challenge-Response continues
- Occurs periodically during the connection
- User never know s it happens
PAP (Password Authentication Protocol) - Authentication process
Username is james, password is passwordlll
"""""" ["james
passwordlll
......
That's great! You're in.
Ci
V
Username: james
Password: passwordlll
PAP
Client
Server
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 91
https://ProfessorMesser.com
3.8 - PAP and CHAP (continued)
MS-CHAP
• M icrosoft's implementation of CHAP
- Used commonly on Microsoft's
- Point-to-Point Tunneling Protocol (PPTP)
- M S-CHAP v2 is the more recent version
• Security issues related to t he use of DES
- Relatively easy to brute force the 256 possible keys to
decrypt the NTLM hash
- Don't use MS-CHAP !
- Consider L2TP, IPsec, 802.lX or some other secure
authentication method
A
V
Jamts
l
Challenge response:
d b3fc40e6439d4d972870252ccc11f99
A
V
Server looks up the credentials
and sends a challenge to the user
I'd like to login, username is james
puswordl ll
~
~
15472a309ie;s;;~:f!!~;d45c7af9ad -
A
V
Login request is
sent to t he server
Client
Username: j ames
(J
He re's your challenge message:
15472a309fe22789efa522d45c7af9ad
Chall enge response:
db3fc40e6439d4d972870252ccc11f99
pa sswordlll +
15472a309fe22789efa522d45c7af9ad
CHA P
Serve r
A
V
User combines the password and
challenge to create a response
Password: password l l l
l
Expected challenge response:
d b3fc40e6439d4d972870252ccc11f99
Server compares t he user's response
wit h a locally created response
3.8 - Identity and Access Services
RADIUS (Remote Authentication Dial-in User Service)
• One of the more common AAA protocols
- Supported on a w ide variety of platforms and devices
- Not j ust for dial-in
• Centralize authentication for users
- Routers, switches, firew alls, server authentication,
remote VPN access, 802.lX netw ork access
• RADIUS services available on almost any server OS
TACACS
• Terminal Access Controller
- Access-Control System
- Remote authentication protocol
- Created to control access to dial-up lines to ARPANET
• XTACACS (Extended TACACS)
- A Cisco-created (proprietary) version of TACACS
- Additional support for accounting and aud iting
• TACACS+
- The latest version of TACACS, not backwards
compatible
- More authentication requests and response codes
- Released as an open standard in 1993
Kerberos
• Netw ork authentication protocol
- Authenticate once, t rusted by t he system
- No need to re-authenticate to everything
- Mutual authentication - the cl ient and the server
- Protect against on-path or replay attacks
SSO with Kerberos
• Authenticate one time
- Lots of backend ticketing
- Cryptographic tickets
• No constant username and passw ord input!
- Save time
• Only w orks wit h Kerberos
- Not everything is Kerberos-friendly
• There are many other SSO methods
- Smart-cards, SAML, etc.
RADIUS, TACACS+, or Kerberos?
• Three differ ent w ays to communicate to an
authentication server
- More t han a simple login process
• Often determined by what is at hand
- VPN concentrator can talk to a RADIUS server
- We have a RADIUS server
• TACACS+
- Probably a Cisco device
• Kerberos
- Probably a M icrosoft network
IEEE 802.lX
• IEEE 802.lX
- Port-based Netw ork Access Control (NAC)
- You don' t get access to the netw ork until you
authenticate
• Standa rd since the 1980s
- Developed by t he Massachusetts Institute of
Technology (M IT)
• EAP integrates with 802.lX
- Extensible Authentication Protocol
- 802.lX pr events access to the netw ork until t he
authentication succeeds
• M icrosoft starting using Kerberos in W indow s 2000
- Based on Kerberos 5.0 open standard
- Compatible with other operating systems and devices
• Used in conj unction w ith an access database
- RAD IUS, LDAP, TACACS+
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes - Page 92
https://ProfessorMesser.com
3.8 - Federated Identities
Federation
• Provide network access to others
- Not j ust employees - Partners, suppliers, customers, etc.
- Provides SSO and more
OAuth
• Authorization framew ork
- Determin es what r esources a user w ill be
able to access
• Third-parties can establish a federated network
- Authenticate and authori ze between the tw o
organizations
- Login with your Facebook credentials
• The thi rd-parties must establish a t rust r elationship
- And the degree of the trust
• Created by Twitter, Google, and many others
- Significant industry support
Security Assertion Markup Language (SAML)
• Open standard for authentication and authorization
- You can authenticate through a th ird-party to ga in access
- One standard does it all, sort of
• Not an authentication protocol
- Open lD Connect handles the single sign-on
authentication
- OAuth provides authorization
betw een applications
• Relatively popular
- Used by Tw itter, Google, Face book,
- Linkedln, and more
• Not origin ally designed for mobile apps
- This has been SAM L's largest roadblock
3.8 - Access Control
Access control
• Authori zation
- The process of ensuring only authorized
rights are exercised
• Policy enforcement
- The process of determ ining rights
• Policy definition
• Users receive rights based on
- Access Control models
- Different busin ess needs or mission requirements
Mandatory Access Control (MAC)
• The operating system limits the operation on an object
- Based on security clearance levels
• Every object gets a label
- Confidential, secret, top secr et, etc.
• Labeling of objects uses predefined rules
- The administ rator decides w ho gets access to
w hat security level
- Users cannot change these settings
Discretionary Access Control (DAC)
• Used in most operating systems
- A fami liar access control model
• In Windows, use Groups to provide role-based
access control
- You ar e in shipping and receiving, so you can
use the shipping softw are
- You ar e the manager, so you can review shipping logs
Attribute-based access control (ABAC)
• Users can have complex relationships to
applications and data
-Access may be based on many different criteria
• ABAC can consider many parameters
-A " next generation" authorization model
- Aw ar e of context
• Combine and eva luate multiple parameters
- Resource information, IP address, time of day, desired
action, r elationship to the data, etc.
Rule-based access control
• Generic term for follow ing rules
- Conditions other than w ho you ar e
• Access is determin ed through system-enforced rules
- System administrators, not users
• The rule is associated w ith the object
- System checks the ACLs for that object
• You create a spreadsheet
- As the own er, you control w ho has access
- You can modify access at any time
• Rule examples
- Lab netw ork access is only available bet w een 9 and 5
- Only Ch rome browsers may complete this w eb form
• Very fl exible access control
- And very w eak security
File system security
• Store fil es and access them
- Hard drive, SSDs, flash drives, DVDs, part of most OSs
Role-based access control (RBAC)
• You have a role in your organization
- Manager, director, team lead, proj ect manager
• Administrators provide access based on the role
of the user
- Rights are gained implicitly instead of explicitly
• Accessing information
- Access control list
- Group/ user rights and perm issions
- Can be centrally admin ister ed and/ or users can
manage files they ow n
• The fil e system handles encryption and decryption
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 93
https://ProfessorMesser.com
3.8 - Access Control (continued)
Conditional access
• Diffi cu lt to apply old methods of authentication to new
methods of w orking
- Mobil e w orkforce, many different devices,
constantly changing cloud
• Conditions
- Employee or partner, location, type of
application accessed, device
• Cont rols
- Allow or block, require M FA, provide li mit ed access,
req uire passw ord re set
• Administrat ors can build complex access rules
- Com plet e cont rol over dat a access
Privileged access management (PAM )
• Managing superuser access
- Administrator and Root
- You don't w ant t his in t he w rong hands
• Stor e privileged accounts in a digita l vault
- Access is only granted from t he vau lt by re quest
- These privil eges are t empora ry
• PAM advant ages
- Centralized passw ord management
- Enables automation
- Manage access for each user
- Extensive tracking and auditing
3.9 - Public Key Infrastructure
Public Key Infrastructure (PKI)
• Policies, proced ur es, ha rd w are, softwar e, people
- Digital certificates: create, distribute, manage,
store, revoke
• Th is is a big, big, endeavor
- Lots of planning
• Also refers to t he bindi ng of public keys to people
or devices
- The certi ficate aut hority
- It 's all about trust
The key management lifecycle
• Key generation
- Create a key w ith the r equested str engt h using
the proper cipher
• Certifi cate generation
- Allocate a key t o a user
• Distribution
- Make t he key available to the user
• Storage
- Secu rely store and protect against unauthori zed use
• Revocation
- Manage keys that have been compromised
• Expiration
- A certificate may only have a certain "shelf life"
Digit al certificates
• A public key certificate
- Binds a publ ic key w ith a digit al signatu re
- And ot her deta ils about the key holder
• A digit al signatu re adds t rust
- PKI uses Certificate Authority for add itional t rust
- Web of Trust adds ot her users for additional trust
• Certifi cate creation can be built int o the OS
- Part of W indow s Domain services
- 3rd-pa rty Linux options
Commercial certificate authorities
• Built-in to you r brow ser
- Any brow ser
• Purchase your w eb site certifi cate
- It wi ll be t rusted by everyone's brow ser
• Create a key pair, send the public key to t he CA
to be signed
- A certificate signing r equest (CSR)
• May provide different levels of trust and
additional fe atures
- Add a new " tag" to your w eb sit e
Priva te certificate aut horiti es
• You are your ow n CA
- Build it in-house
- Your devices must trust the internal CA
• Needed for medium-to-large organ izations
- Many w eb servers and privacy requ irement s
• Implement as part of you r overall com puting strategy
- W indow s Certificate Services, OpenCA
PKI trust relationships
• Single CA
- Everyone receives their certificates from one authorit y
• Hierarchica l
- Single CA issues certs to intermediate CAs
- Distributes the certificate management load
- Easier to deal w ith t he revocation of an intermediate
CA t han t he root CA
Registration authority (RA)
• The entity re questing the certificate needs t o be verified
- The RA identifies and authenticates t he requester
• Approval or rejection
- The foun dation of t rust in t his model
• Also responsible for revocations
- Administratively revoked or by request
• Manages renewals and re -key requests
- Maintains certificates for curr ent cert holders
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 94
https://ProfessorMesser.com
3.9 - Public Key Infrastructure (continued)
Important certificate attributes
• Common Name (CN)
- The FQDN (Fu lly Qualified
- Domain Name) for the certifi cate
• Subject alternative name
- Additional host names for the cert
- Common on w eb servers
- professormesser.com and www.professormesser.com
• Expiration
- Limit exposure to compromise
- 398 day browser lim it (13 months)
Key revocation
• Certifi cate Revocation List (CRL)
- Maintained by the Certificate Authority (CA)
• Many different reasons
- Changes all the time
• April 2014 - CVE-2014-0160
- Heartbleed
- OpenSSL flaw put the private key of affected
web servers at risk
- OpenSSL w as patched, every w eb server
certificate w as replaced
- Older certificates w ere moved to the CRL
Getting revocation details to the browser
• OCSP (On li ne Certificate Status Protocol)
- The browser can check certificate revocation
• Messages usua lly sent to an OCSP responder via HTTP
- Easy to support over Internet links
• Not all browsers/apps support OCSP
- Early Internet Explorer versions did not
support OCSP
- Some support OCSP, but don't bother checking
3.9 - Certificates
Web server SSL certificates
• Domain validation certifi cate (DV)
- Owner of the certificate has some control over
a DNS domain
Root certificate
• The public key certificate that identifies the root CA
(Certi ficate Authority)
- Everything starts w ith this certificate
• Extended va lidation certificate (EV)
- Additional checks have verified the certifi cate
owner's identity
- Browsers used to show a green name on the
address bar
- Promoting the use of SSL is now outdated
• The root certificate issues other certificates
- Intermediate CA certificates
- Any other certificates
• Subject Alternative Name (SAN)
- Extension to an X.509 certificate
- Lists additional identification information
- Allow s a certificate to support many
different domains
• Wildcard domain
- Certificates are based on the name of the server
-A wildcard doma in will apply to all server names
in a domain
- * .professormesser.com
Code signing certificate
• Developers can provide a level of trust
- Applications can be signed by the developer
• This is a very im portant certificate
- Take all securit y precautions
- Access to the root certificate allow s for the
creation of any trusted certificate
Self-signed certificates
• Internal certificates don't need to be signed by
a public CA
- Your company is the only one going to use it
- No need to purchase trust for devices that already
trust you
• Build your ow n CA
- Issue you r ow n certificates signed by your own CA
• Install the CA certificate/trusted chain on all devices
- They'll now trust any certificates signed by
your internal CA
- Works exactly like a certifi cate you purchased
• The user's operating system w ill examine
the signat ure
- Checks the developer signature
- Validates that the softw are has not been modified
• Is it from a trusted entity?
- The user w ill have the opportunit y to stop the
application execution
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 95
https://ProfessorMesser.com
3.9 - Certificates (continued)
Machine and computer certificates
• You have to manage many devices
- Often devices that you'll never physically see
• Digital signatures
- Use your private key to digitally sign an email
- Non-repudiation, integrity
• How can you truly authenticate a device?
- Put a certificate on the device that you signed
User certificates
• Associate a certificate w ith a user
- A pow erful electronic " id card"
• Other business processes rely on the certificate
- Access to the remote access
- VPN from authorized devices
- Management softwar e can validate the end device
Email certificates
• Use cryptography in an emai l platform
- You'll need public key cryptography
• Use as an additional authentication factor
- limit access without the certificate
• Integrate onto smart cards
- Use as both a physical and digital access card
• Encrypting emails
- Use a recipient's public key to encrypt
• Receiving encrypted emai ls
- Use your private key to decrypt
3.9 - Certificate Formats
Certificate file formats
• X.509 digital certificates
- The structure of the certification is standardized
- The format of the actual certificate file can take
many different forms
• There are many certificate file formats
- You can convert betw een many of the formats
- Use openssl or a similar application to view the
certificate contents
DER (Distinguished Encoding Rules)
• Format designed to transfer syntax for data structures
- A very specific encoding format
- Perfect for an X.509 certificate
• Binary format
- Not human-readable
• A common format
- Used across many platforms
- Often used w ith Java certificates
PEM (Privacy-Enhanced Mail)
•Avery common format
- BASE64 encoded DER certificate
- General ly the format provided by CAs
- Supported on many different platforms
• ASCII format
- Letters and numbers
- Easy to email, readable
PKCS #12
• Public Key Cryptography Standards #12
- Personal Information Exchange Syntax Standard
- Developed by RSA Security, now an RFC standard
© 2020 Messer Studios, LLC
• Container format for many certificates
- Store many X.509 certificates in a single
.p12 or .pfx file
- Often used to transfer a private and public key pa ir
- The container can be passw ord protected
• Extended from Microsoft's .pfx format
- Personal Information Exchange (PFX)
- The t wo standards are very similar
- Often refer enced interchangeably
CER (Certificate)
• Primarily a Window s X.509 file extension
- Can be encoded as binary DER format or as the
ASCII PEM format
• Usually contains a public key
- Private keys w ould be t ransferred in the
.pfx file format
• Common format for W indow s certificates
- Look for the .cer extension
PKCS #7
• Public Key Cryptography Standards #7
• Cryptographic Message Syntax Standard
-Associated with the .p7b file
• Stor ed in ASCI I format
- Human-readable
• Contains certificates and chain certificates
- Private keys are not included in a .p7b file
• W ide platform support
- Microsoft W indow s
- Java Tomcat
Professor Messer's CompTIA SY<HiOl Security+ Course Notes· Page 96
https://ProfessorMesser.com
3.9 - Certificates (continued)
Email certificates
• Use cryptography in an emai l platform
- You' ll need public key cryptography
User certificates
• Encrypting emails
- Use a recipient's public key to encrypt
• Receiving encrypted emai ls
- Use your private key to decrypt
• Digital signatures
- Use your private key to digitally sign an email
- Non-repudiation, integrity
• Use as an additional authentication factor
- limit access without the certificate
• Associate a certificate w ith a user
- A pow erful electronic " id card"
• Integrate onto smart cards
- Use as both a physical and digital access card
3.9 - Certificate Concepts
Online and offline CAs
• A compromised certificate authority
- A very, very bad thing
- No certificates issued by that CA can be t rusted
Key escrow
• Someone else holds your decryption keys
- Your private keys are in the hands
of a 3rd-party
• Distribute the load
- Then take the root CA offiine and protect it
• This can be a legitimate business arrangement
-A business might need access to employee
information
- Government agencies may need to decrypt
partner data
OCSP stapling
• Online Certificate Status Protocol
- Provides scalability for OCSP checks
• The CA is responsible for responding to all
client OCSP r equests
- This does not scale w ell
• Instead, have the certificate holder verify their ow n status
- Status information is stored on the certificate holder's server
• OCSP status is "stapled" into the SSL/TLS handshake
- Digitally signed by the CA
Pinning
• You' re communicating over TLS/SSL to a server
- How do you really know it 's a legitimate server?
• " Pin" the expected certificate or public key to an application
- Compiled in the app or added at first run
• If the expected certificate or public key doesn' t match, the
application can decide w hat to do
- Shut dow n, show a message
It's all about the process
• Need clear process and procedures
- Keys ar e incredibly important pieces of
information
• You must be able to trust your 3rd-party
- Access to the keys is at the control of the
3rd-party
• Carefully controlled conditions
- Legal proceedings and court orders
Certificate chaining
• Chain of t rust
- List all of the certs betw een the server
and the root CA
• The cha in starts w ith the SSL certificate
- And ends w ith the Root CA certificate
PKI trust relationships
• Single CA
- Everyone receives their certificates from one authority
• Any certificate betw een the SSL certificate
and the root certificate is a chain certificate
- Or intermediate certificate
• Hierarchical
- Single CA issues certs to intermediate CAs
• The w eb server needs to be configured with
the proper chain
- Or the end user may receive an error
• Mesh
- Cross-certifying CAs - Doesn't scale w ell
• Web-of-trust
- Alternative to t raditional PKI
• Mutual Authentication
- Server authenticates to the client and the client
authenticates to the server
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 97
https://ProfessorMesser.com
4.1 - Reconnaissance Tools
traceroute
• Determin e the route a packet takes to a destination
- Map the entire path
• tracert (Windows) or traceroute (POSIX)
• Written by Mike Muuss in 1983
- The sound made by sonar
- Not an acronym for Packet INternet Groper
- A backronym
• Takes advantage of ICMP Time to live Exceeded error
message
- The time in TTL r efers to hops, not seconds or minutes
- TTL=l is the first router, TTL=2 is the second router,
etc.
pathping
• Not all devices will r eply with
ICMP Time Exceeded messages
- Some firew alls filter ICMP
- ICMP is low -priority for many devices
• Second phase
- Measu re round trip time and packet loss at each hop
• Combine ping and traceroute
- Included with Window s NT and later
• First phase runs a traceroute
- Bui ld a map
hping
nslookup and dig
• TCP/IP packet assembler/analyzer
-A ping that can send almost anything
• Lookup information from DNS servers
- Canonical names, IP addresses, cache timers, etc.
• Ping a device
- ICMP, TCP, UDP
• nslookup
-#hping3 --destport 80 10.1.10.1
-Both Windows and POSIX-based
- Lookup names and IP addr esses
- Deprecated (use dig instead)
• dig or DiG (Doma in Information Groper)
- More advanced domain information
- Probably your first choice
- Instal l in Windows : https://professormesser.link/
digwin
ipconfig and ifconfig
• Send crafted frames
- Modify all IP, TCP, UDP, and ICMP values
• A pow erful tool
- It's easy to accidentally flood and DoS
- Be careful !
netstat
• Network statistics
- Many different operating systems
• Most of you r troubleshooting starts w ith your IP address
- Ping your local router/gateway
• Determin e TCP/ IP and network adapter information
- And some add itional IP deta ils
• netstat -a
• ipconfig - Windows TCP/IP configuration
• ifconfig - Linux interface configuration
•netstat -n
Nmap
• Netw ork ma pper
- Find and learn more about network devices
• Port scan
- Find devices and identify open ports
• Operating system scan
- Discover the OS without logging in to a device
netcat
• Service scan
- What service is available on a device?
Name, version, deta ils
• Additional scripts
- Nmap Scripting Engine (NSE)
• Extend capabilities, vulnera bility scans
ping
• Test reachability
- Determine round-trip time
- Uses Internet Control Message Protocol (ICMP)
• One of you r primary troubleshooting tools
- Can you ping the host?
- Show all active connections
•netstat -b
- Show bina ries
- Do not resolve names
• "Read" or "write" to the netw ork
- Open a port and send or receive some traffic
• Many different functions
- Listen on a port number
- Transfer data
- Scan ports and send data to a port
• Become a backdoor
- Run a shell from a remote device
• Other alternatives and OSes - Neat
IP scanners
• Search a network for IP addresses
- Locate active devices
-Avoid doing w ork on an IP address that isn't there
• Many different techn iques
- ARP (if on the local subnet)
- ICMP reque sts (ping)
-TCP ACK
- ICMP timestamp req uests
• A re sponse means more recon can be done
- Keep gathering information - Nmap, hping, etc.
© 2020 Messer Studios, LLC
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 98
https://ProfessorMesse r.com
4.1 - Reconnaissance Tools (continued)
Address Resolution Protocol
• Determine a MAC address based on an IP address
- You need the hardw are address to communicate
• Another tool that can cause problems
- Brute force, server scanning, etc
- M ake sure you know what you're doing
• arp -a
scanless
- View local ARP table
• Run port scans from a different host
- Port scan proxy
route
• View the device's routing table
- Find out wh ich w ay the packets will go
• Windows : route print
• M any different services
- Choose the option for scan origination
- You r IP is hidden as the scan source
• Linux and macOS: netstat -r
dnsenum
• Enumerate DNS information
- Find host names
• View host information from DNS servers
- M any services and hosts are listed in DNS
• Find host names in Google
- More hosts can probably be found in the index
curl
• Client URL
- Retrieve data using a URL
- Uniform Resource Locator
- Web pages, FTP, emails, databases, etc.
• Grab the raw data
- Search
- Parse
-Automate
Nessus
• Industry leader in vu lnerabil ity scanning
- Extensive support
- Free and commercial options
• Identify known vulnerabilities
- Find systems before they can be exploited
theHarvester
• Gather OSINT
- Open-Source Intelligence
• Scrape information from Google or Bing
- Find associated IP addresses
• List of people from Linkedln
- Names and titles
• Find PGP keys by email domain
- A list of email contacts
• Extensive reporting
- A checklist of issues
- Filter out the false positives
Cuckoo
• A sandbox for malware
- Test a fil e in a safe environment
• A virtualized environment
- Windows, Linux, macOS, Android
• Track and trace
-API calls, net w ork traffic, memory analysis
- Traffic captures
- Screens hots
• DNS brute force
- Find those unknown hosts; vpn, chat, mail, partner, etc.
snlper
• Combine many recon tools into a single framework
- dnsenum, metasploit, nmap, theHarvester, and much more
• Both non-intrusive and very intrusive scanning options
- You choose the volume
4.1 - File Manipulation Tools
head
cat
• View the first part of a file
- The head, or beginning, of the file
• Concatenate
- Link together in a series
- head [ OP'l'ION] ... [FILE] ...
• Use -n to specify the number of li nes
- head -n 5 sys log
tail
-cat filel.txt file2.txt > both.txt
grep
• Find text in a file
- Search through many files at a time
[FILE]
• Use -n to specify the number of li nes
- tail -n 5 sys log
© 2020 Messer Studios, LLC
-cat filel.txt file2.txt
• Copy a file/ files to another file
• View the last part of a fil e
- The tail, or end, or the file
-tail [OP'l'ION] -
• Copy a file/ files to the screen
•grep PA'l''l'ERN [FILE]
-grep failed auth.log
Professor Messer's CompTIA SY<HiOl Security+ Course Notes · Page 99
https://ProfessorMesser.com
4.1 - File Manipulation Tools (continued)
chmod
logger
• Change mode of a file system object
- r=read, w =w rite, x=execute
- Can also use octal notation
- Set for the file ow ner (u), the group(g),
others(o), or all(a)
• Add entries to the system log
- syslog
• Adding to the local syslog file
- chmod mode P'ILE
- chmod 7 44 script. sh
•chmod 744 first.txt
-logger "'l'his information is added to syslog"
• Useful for including information in a local or remote syslog file
- Include as part of an automation script
- Log an important event
- User; read, w rite execute
- Group; read only
- Other; rea d only
•chmod a-w first.txt
- All users, no w riting to first.txt
•chmod u+x script.sh
- The own er of script.sh can execute the file
4.1 - Shell and Script Environments
SSH {Secure Shell)
• Encrypted console communication - tcp/22
• Looks and acts the same as Telnet
Windows PowerShell
• Command line for system administrators
- .psl fil e extension
- Included w ith Windows 8/8.1 and 10
• Extend command-lin e functions
- Uses cmdlets (comman d-lets)
- Pow erShell scripts and functions
- Standalone executables
• Automate and integrate
- System administration
- Active Domain admin istration
Python
• General-purpose scripting language
- .py file extension
• Popular in many technologies
- Broad appeal and support
OpenSSL
• A toolkit and crypto library for SSL/TLS
- Bui ld certificates, manage SSL/TLS communication
• Create X.509 certificates
- Manage certificate signing req uests (CSRs) and
certificate revocation lists (CRLs)
• Message digests
- Support for many hashing protocols
• Encryption and Decryption
- SSL/TLS for services
•Muchmore
4.1 - Packet Tools
Tcpreplay
• A suite of packet replay utilities
- Replay and edit packet captur es
- Open source
• Test security devices
- Check IPS signat ures and firewall rules
• Test and tune IP Flow/NetFlow devices
- Send hundreds of thousands of traffic flow s
per second
• Eva luate the performance of security devices
- Test throughput and flows per second
Wireshark
• Graphical packet analyzer
- Get into the details
• Gathers frames on the netw ork
- Or in the air
• Sometimes built into the device
- View traffic patterns
- Identify unknow n traffic
- Verify packet filtering and securit y controls
• Extensive decodes
- View the application t raffic
tcpdump
• Capture packets from the command line
- Display packets on the screen
- W rite packets to a file
© 2020 Messer Studios, LLC
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 100
https://ProfessorMesser.com
4.1 - Forensic Tools
dd
• A reference to the DD command in
- IBM mainframe JCL (Job Control Language)
- Data Definition (ASCII to EBCD IC converter)
• Create a bit-by-bit copy of a drive
- Used by many for ensics tools
• Create a disk image
-dd if=/dev /sda of=/ tmp/sda-image.img
• Restore from an image
-dd if=/tmp /sda-image.img of=/ dev/sda
memdump
• Copy information in system memory to the standard
output stream
- Everything that happens is in memory
- Many third-party tools can read a memory dump
• Copy to another host across t he netw ork
- Use netcat, stunnel, openssl, etc.
Winhex
• A universal hexadecimal editor for W indow s OS
• Edit disks, files, RAM
- Includes data r ecovery features
• Disk cloning
- Drive replication
• Secure w ipe
- Hard drive cleaning
•Much more
- A full-featured forensics tool
Autopsy
• Perform digital forensics of hard drives, smart phones
- View and recover data from storage devices
• Extract many different data types
- Dow nloaded fil es
- Brow ser history and cache
- Email messages
- Databases
- Much mor e
Exploitation frameworks
• A pre-built toolkit for exploitations
- Build custom attacks
-Add more tools as vulnerabilities are found
- Incr easingly pow erful utilities
• Metasploit
-Attack know n vulnerabil ities
• The Social-Engineer Toolkit (SET)
- Spear phishing, Infectious media generator
Password crackers
• The keys to the kingdom
- Find the passw ords
• Online cracking
- Try username/ passw ord combinations
• Offline cracking
- Brute force a hash file
FTK imager
• AccessData for ensic drive imaging tool
- Includes file utilities and read-only image mounting
- W indow s executable
• W idely supported in many forensics tools
- Third-party analysis
• Support for many different fil e systems and full disk
encryption methods
- Investigator still needs the passw ord
• Can also import other image formats
- dd, Ghost, Expert Witness, etc.
• Limitations
- Passw ord complexity/ strength (entropy)
- Hashing method and CPU pow er
- Graphics processors are useful hardw are tools
Data sanitization
• Completely remove data
- No usable information r emains
• Many different use cases
- Clean a hard drive for future use
- Permanently delete a single file
• A one-w ay t rip
- Once it 's gone, it's really gone
- No recovery w ith forensics tools
4.2 - Incident Response Process
Security incidents
• User clicks an email attachment and executes malw are
- Malware then communicates w ith external servers
• DDoS
- Botnet attack
• Confidential information is stolen
- Thief w ants money or it goes public
• User installs peer-to-peer softw are and allow s externa l
access to internal servers
© 2020 Messer Studios, LLC
Roles and responsibilities
• Incident response team
- Specialized group, t rained and tested
• IT security management
- Corporate support
• Compliance officers
- Intricate knowledge of compliance rules
• Technical staff
- Your team in the trenches
• User community
- They see everything
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 101
https://ProfessorMesser.com
4.2 - Incident Response Process (continued)
NIST SPS00-61
• National Institute of Standards and Technology
- NIST Special Publication 800-61 Rev. 2
- Computer Security Incident
- Handling Guide
• The incident response lifecycle:
- Preparation
- Detection and Analysis
- Containment, Eradication, and Recovery
- Post-incident Activity
Preparing for an incident
• Communication methods
- Phones and contact information
• Incident handling hardware and softw are
- Laptops, r emovable media, for ensic softw are,
digital cameras, etc.
• Incident analysis resources
- Documentation, netw ork diagrams, baselines,
critical file hash values
• Incident mitigation softw are
- Clean OS and application images
• Policies needed for incident handli ng
- Everyone know s w hat to do
The challenge of detection
• Many different detection sources
- Different levels of detail, different levels of perception
• A large amount of "volume"
- Attacks ar e incoming all the time
- How do you identify the legitimate threats?
• Incidents ar e almost alw ays complex
- Extensive know ledge needed
Incident precursors
• An incident might occur in the future
- This is your heads-up
• Web server log
- Vulnerability scanner in use
• Exploit announcement
- Monthly M icrosoft patch release,
- Adobe Flash update
• Direct threats
- A hacking group doesn't like you
• Sandboxes
- An isolated operating system
- Run malware and analyze the results
- Clean out the sandbox w hen done
• Isolation can be sometimes be problematic
- Malwar e or infections can monitor connectivity
- When connectivity is lost, everything could be
deleted/ encrypted/ damaged
Recovery after an incident
• Get things back to normal
- Remove the bad, keep the good
• Eradicate the bug
- Remove malwar e
- Disable breached user accounts
- Fix vulnerabilities
• Recover the system
- Restore from backups
- Rebuild from scratch
- Replace compromised files
- Tighten dow n the perimeter
Reconstitution
• A phased approach
- It 's difficult to fix everything at once
• Recovery may take months
- Large-scale incidents require a large amount of w ork
• The plan should be efficient
- Start w ith quick, high-value security changes
• Patches, firew all policy changes
- Later phases involve much " heavier lifting"
• Infrastructure changes, large-scale security
rol louts
Lessons learned
• Learn and improve
- No system is perfect
• Post-incident meeting
- Invite everyone affected by the incident
• Don't w ait too long
- Memories fade over time
- Some recommendations can be applied to the
next event
Incident indicators
• An attack is underw ay
- Or an exploit is successful
• Buffer overflow attempt
- Identified by an intrusion detection/ prevention system
• Anti-virus softw are identifies malw are
- Deletes from OS and notifies administrator
• Host-based monitor detects a configu ration change
- Constantly monitors system files
• Netw ork t raffic flow s deviate from the norm
- Requires constant monitoring
© 2020 Messer Studios, LLC
Isolation and containment
• Generally a bad idea to let th ings run their course
-An incident can spread quickly
- It 's your fault at that point
Answer the tough questions
• What happened, exactly?
- Timestamp of the events
• How did your incident plans w ork?
- Did the process operate successfully?
• What w ould you do differently next time?
- Retrospective view s provide context
• Which indicators w ould you w atch next time?
- Different pr ecursors may give you better alerts
Professo, Messer's CompTIA SY0--601 Security+ Course Notes ·
Page 102
https://ProfessorMesser.com
4.2 - Incident Response Planning
Exercise
• Test you rselves before an act ua l event
- Schedu led updat e sessions (annual, sem i-annual, etc. )
Communication plan
• Get your contact list t ogether
- There are a lot of people in the loop
• Use w el l-defined ru les of engagement
- Do not t ouch the production systems
• Very specifi c scena rio
- Limited time to run the event
• Eval uate response
- Document and discuss
Tabletop exercises
• Performing a fu ll-scale disaster drill can be costly
- And time consuming
• Many of t he logistics can be determined through
analysis
- You don't physically have to go t hrough a
disaster or drill
• Corporate / Organ ization
- CIO / Head of Information Secu rity / Internal
Response Teams
• Internal non-IT
- Human resou rces, public affa irs, lega l department
• External contacts
- System ow ner, law enforcement
- US-CERT (for U.S. Government agencies)
• Get key players together for a t abletop exercise
- Talk t hrough a simu lat ed disaster
Walkthrough
• Include responders
- A step beyond a tabletop exercise
- Many moving parts
• Test processes and procedu re s before an event
- Walk through each step
- Involve all groups
- Reference act ual response materials
• Identifi es act ual faults or m issing steps
- The w alkth rough appli es the concepts from the
tabletop exercise
Simulation
• Test w ith a simu lat ed event
- Ph ish ing attack, passw ord r equests, data breaches
• Going phishing
- Create a phishing email attack
- Send to your actual user communit y
- See w ho bites
• Test int ernal securit y
- Did the phishing get past the fi lter?
• Test the users
- Who clicked?
- Additional trai ning may be requ ired
Stakeholder management
• Keeping an good ongoing relationship w ith
customers of IT
- These can be internal or external customers
- An incident response will requ ire teamw ork
- W it hout the stakeholder, IT w ou ld not exist
• Most of th is happens pri or t o an incident
- Ongoing communication and meetings
- Exercises should include the cust omers
• Continues after the incident
- Prepare for t he next event
© 2020 Messer Studios, LLC
Disaster recovery plan
• If a disaster happens, IT should be rea dy
- Part of business continuity planning
- Keep t he organization up and running
• Disasters are many and varied
- Nat ural disasters
- Technology or system failures
- Human-created disasters
• A comprehensive plan
- Recovery location
- Data recovery method
- Appl ication rest oration
- IT team and employee availability
Continuity of operations planning (COOP)
• Not everyth ing goes accordi ng to plan
• Disasters can cause a disru ption to t he norm
• We rely on ou r com puter systems
• Technology is pervasive
• There needs to be an alternative
• Manua l transactions
• Paper r eceipts
• Phone calls for transaction approvals
• These must be documented and tested before
a problem occurs
Incident response team
• Receives, review s, and r esponds
- A predefined group of professionals
• Determine w hat type of events re quire a response
- A virus infection? Ransom w are? DDoS?
• May or may not be part of the organizational structur e
- Pu ll ed t ogether on an as-needed basis
• Focuses on incident handling
- Incident response, incident ana lysis, incident reporting
Retention policies
• Backup your data
- How much and w here? Copies, versions of copies,
lifecycl e of data, purging old dat a
• Regu lat ory compl iance
- A certain amount of data backup may be required
• Operational needs
- Accidenta l deletion, disaster recovery
• Differ entiate by type and application
- Recover t he data you need w hen you need it
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 103
https://ProfessorMesser.com
4.2 -Attack Frameworks
Attacks and responses
• A constantly moving chessboa rd
- The rules ar e also constantly changing
• Response and intelligence teams need assistance
- Gather and maintain ongoing reconnaissance
• Understand attacks
- Many different vectors
• Assess the risk in an organization
- Determine if a risk exists
- Use appropriate mitigation
MITRE ATT&CK framework
• The M ITRE corporation
- US not-for-profit based in Massachusetts and Virginia
- Supports several U.S. government agencies
• The M ITRE ATT&CK framew ork
- https :// attack.mitre.org/
• Determine the actions of an attacker
- Identify point of intrusion
- Understand methods used to move around
- Identify pot ential security t echniques t o
block future attacks
Diamond Model of Intru sion Analysis
• Designed by the intelligence commun ity
- https ://apps.dtic.mil/docs/ citations/ ADA586960
- Guide analysts to help understand intrusions
- Integrates w ell w ith other framew orks
• Apply scientific principles to int rusion analysis
- Measurement, testability, and repeata bilit y
- Appears simple, but is r ema rkably complex
• An adversary deploys a ca pability over some
infrastructure against a victim
- Use the model to analyze and fill in the details
Adversary
Victim
Cyber Kill Chain
• Seven phases of a cyber attack
- A milit ary concept
4.3 - Vulnerability Scan Output
Identify vulnerability
• The scanner looks for everyt hing
- Well, not _everyth ing_
- The signatu re s are the key
Dealing with false positives
• False positives
- A vulnerabil ity is identifi ed t hat doesn' t really exist
• Th is is different than a low -severity vulnerability
- It 's real, but it may not be you r highest pri orit y
• False negatives
- A vulnerabil ity exists, but you didn't detect it
• Update to the latest signatu res
- If you don't know about it, you can't see it
• Work wit h the vulnerability det ection manufact urer
- They may need to update t heir signatures
for your environment
• The vulnerabilities can be cross-referenced on line
- Almost all scanners give you a place to go
- National Vu lnerability Database: http://nvd.nist.gov/
- Microsoft Securit y Bulletins:
- https :// docs. microsoft.com/ en-us/ security-u pdat es/
• Some vulnerabilities cannot be defin itively identified
- You' ll have to check manually to see if a
system is vu lnerable
- But the scanner gives you a heads-up
Vulnerability scan results
• Lack of security controls
- No firewall
- No anti-virus
- No anti-spyw are
• M isconfi gu rations
- Open shares
- Guest access
• Real vulnerabilities
- Especially new er ones
- Occasional ly the old ones
... . .
.......
Scan o1
...... lltS...
• M,_
I ,_.
. ... 0 --
--
---
-
004....,._._,
ac: ....
1-.-i••--
MH 1,1w,,1t..._.1
w-r, ~
........
,o;f'lllllfM~"'-1>•
~----w..-e,1,,
s.. -... ...........
© 2020 Messer Studios, LLC
--
Professo, Messer's CompTIA SYo-601 Security+ Course Notes - Page 104
...
...
_,._
""'
.....
.....
~
,....
u,,_
...,.•~IW
....._.,.,
,,,,,,,
1-
(; ·-·...·---.
https://ProfessorMesser.com
4.3 - SIEM Dashboards
SIEM
• Security Information and Event Management
- Logging of security events and information
• Security alerts
- Real-time information
• Log aggregation and long-term storage
- Usually includes advanced reporting fe atures
• Dat a corr elation
- Link diverse data t ypes
• Forensic analysis
- Gather details after an event
Getting the data
• Sensors and logs
- Operating systems
- Infrastructure devices
- NetFlow sensors
• Sensitivity settings
- Easy to be overwhelmed with data
- Some information is unnecessary
- Informational, Warning, Urgent
Viewing the data
• Trends
- Identify changes over time
- Easily view constant attack metrics
• Alerts
- Identify a security event
- View raw data
- Visualize t he log information
• Correlation
- Com bine and com pare
- View data in different w ays
4.3 - Log files
Network log fil es
• Swit ches, routers, access points, VPN concentrat ors
- And ot her infrastructu re devices
Web log files
• Web server access
- IP address, w eb page URL
• Netw ork changes
- Routing updates
- Authentication issues
- Network security issues
System log files
• Operating system information
- Extensive logs
- File system information
- Authentication details
• Can also include security event s
- Mon itoring apps
- Brute force, fi le changes
• May r equ ire fil tering
- Don't forw ard everyt hing
• Access errors
- Unauthori zed or non-existent folders/files
• Exploit attempts
- Attempt t o access fil es containing know n
vulnera bil ities
• Server activity
- Sta rtup an d shutdow n notices
- Restart messages
DNS log file s
• View lookup req uests
- And ot her DNS queries
• IP address of the req uest
- The request FQDN or IP
• Identify queries to know n bad URLs
- Malwar e sit es, know n command
and control domains
Application log file s
• Specific t o the application
- Information va ries w idely
• W indow s - Event View er/ Application Log
• Li nux/ macOS - /var/log
• Parse the log detai ls on t he SIEM
- Filter out unneeded info
Security log files
• Detailed securit y-related information
- Blocked and al low ed t raffic fl ows
- Exploit attempts
- Blocked URL categories
- DNS sinkhole t raffi c
• Security devices
- IPS, firew all, proxy
• Critica l security information
- Documentation of every t raffi c fl ow
- Summary of attack info
- Correlate wit h other logs
© 2020 Messer Studios, LLC
• Block or modify know n bad r equests
at t he DNS server
- Log the results
- Report on ma lw are activit y
Authentication log fil es
• Know w ho logged in (or didn't)
- Account names
- Source IP addr ess
- Aut hentication method
- Success and fail ure reports
• Identify multiple fa ilures
- Potentia l brute force attacks
• Correlate wit h other events
- File transfers
- Aut hentications t o other devices
- Application installation
Professa< Messer's CompTIA SYo-601 Security+ Course Notes· Page 105
https://ProfessorMesser.com
4.3 - Log files (continued)
Dump files
• Stor e all cont ents of memory into a diagnostic file
- Developers can use this info
• Easy to create from the
- W indow s Task Manager
- Right-dick, Create dump file
• Some applications have t heir ow n dump file process
- Contact the appropriate support team for
additional details
VoIP and Call Manager logs
• View inbound and outbound cal l info
- Endpoint details, gatew ay communication
• Security information
- Authentications, audit t rail
• SIP t raffic logs
- Session Initiation Protocol
- Call setup, management, and teardow n
- Inbound and outbound calls
- Alert on unusual num bers or country codes
4.3 - Log Management
Syslog
• Standard for message logging
- Diverse systems creat e a consolidat ed log
NetFlow
• Gather t raffic statistics from all traffi c flow s
- Shared commun ication bet w een devices
• Usually a central logging receiver
- Integrated into t he SIEM (Security Information and
Event M anager)
• Each log entry is labeled
- Facilit y code (program that created the log) and
severity level
• Syslog daemon options
- Rsyslog -" Rocket-fast System for log processing"
- syslog-ng - A popular syslog daemon w ith add itional
filtering and storage options
- NXLog - Collection from many diverse log types
• NetFlow
- Standard coll ection method
- Many products and options
• Probe and col lector
- Probe w at ches netw ork communication
- Summary record s are sent to t he coll ector
Journalctl
• Li nux has a lot of logs
- The OS, daemons, applications, etc.
• System logs are stored in a binary format
- Optimized for st orage an d queries
- Can't rea d them with a text editor
• Journalctl provides a method for querying the system
journa l
- Search and fil ter
- View as plain text
Bandwidth monitors
• The fundam ental netw ork statistic
- Percentage of net work use over time
• Many different w ays to gather t his met ric
- SNMP, NetFlow, sFlow, IPFIX prot ocol analysis,
softw are agent
• Identify fundamental issues
- Nothing w orks properly if bandw idth is highly utilized
Metadat a
• M etadata
- Data t hat describes other data sources
• Email
- Header details, sending servers, destination addr ess
• Mobile - Type of phone, GPS location,
• Usually a separate reporting app
- Closely tied t o the coll ector
IPFIX
• IP Flow Information Export
- A new er, NetFlow -based sta ndard
- Evolved from NetFlow v9
• Flexib le data support
- Templates are used to describe the data
sFlow
• sFlow (Sampled Flow)
- On ly a portion of the actual netw ork traffic
- So, technica lly not a flow
• Usually em bedded in the infrastructure
- Sw itches, routers
- Sampling usua lly occurs in hardw are/ASICs
• Relatively accurate statistics
- Useful information rega rd ing video str eam ing and
high-t raffi c applications
Protocol analyzer output
• Solve complex application issues
- Get int o the details
• Gathers packets on the net w ork
- Or in the air
- Sometimes built int o the device
• View detai led t raffic information
- Identify unknow n traffic
- Verify packet filt ering an d secu rity controls
- View a plain-language descri ption of the
application dat a
• Web - Operating system, brow ser type, IP address
• Files - Name, addr ess, phone number, tit le
© 2020 Messer Studios, LLC
Professo, Messer's CompTIA SYo-601 Security+ Course Notes ·
Page 106
https://ProfessorMesser.com
4.4 - Endpoint Security Configuration
The endpoint
• The end user device
- Desktop PC, laptop, t ablet, phone, etc.
• Many w ays to exploit a system
- OS vu lnerability, malwar e,
user intervention
• Security team has t o cover all of the bases
- Recogn ize and react t o any
ma Iicious activity
Application approved/ deny lists
• Any application can be dangerous
- Vulnerabilities, trojan horses, malware
- Secu rity poli cy can control app execution
• Approved list
- Nothing runs un less it's approved
- Very re strictive
Exa mples of application approval lists
• Decisions are made in the operating system
- Often bui lt-in to the operating
system management
- Application hash
• Only allow s applications wit h this
unique identifi er
• Certificate
- Allow digit ally signed apps from
certa in publishers
• Path
- Only run applications in these folders
• Network zone
- The apps can on ly run from th is netw ork zone
• Blacklist/ deny list
- Nothing on the " bad list" can be executed
- Anti-virus, anti-ma lware
• Quarantine
- Anything suspicious can be moved to a safe area
4.4 - Security Configurations
Configuration changes
• Firew all rules
- Manage application flow s
- Block dangerous applications
• Mobile Device Manager (MOM)
- Enable or disable phone and t ablet functionality
- Rega rdl ess of physica l location
• Dat a loss Pr evention (OLP)
- Block transfer of persona lly identifi able information
(PII ) or sensitive dat a
- Credit card numbers, social security numbers, etc.
• Content fi lter/URL fil ter
- limit access t o untrusted w ebsit es
- Block know n malicious sites
- large blacklists are used to sha re suspicious sit e URls
• Updating or revoking certifi cates
- Manage device certifi cates to verify trust
- Revoking a certifi cate effectively removes access
Isolation
• Administratively isolate a com prom ised device from
everyth ing else
- Prevent the spread of malicious softw are
- Prevent remote access or C2 (Command and Control)
• Netw ork isolation
- Isolate to a remediation VLAN
- No communication to other devices
• Process isolation
- limit appl ication execution
- Prevent ma li cious activity but allow device
management
© 2020 Messer Studios, LLC
Containment
• Application containment
- Run each application in its ow n sandbox
- lim it interaction w ith the host operating system
and ot her applications
- Ransom w are w ould have no method of infection
• Contain the spread of a mu lti-device security
event, i.e., ransomw are
- Disa ble adm inistrative shares
- Disa ble remote management
- Disa ble local account access and change local
administrator passw ord
Segmentation
• Separate the netw ork
- Pr event unauthorized movement
- lim it t he scope of a breach
SOAR
• Securit y Orchestration, Automation, and Response
- Integrate th ird-part y tools and data sources
- Make security teams more effective
• Run books
- linear checklist of steps to perform
- Step-by-step approach to automation
- Reset a passw ord, create a w ebsite certificate,
back up application data
• Playbooks
- Conditional steps to follow ; a broad process
- Investigat e a data breach, recover
from ransomw are
Professo, Messer's CompTIA SYo-601 Security+ Course Notes ·
Page 107
https://ProfessorMesser.com
4.5 - Digital Forensics
Digital forensics
• Collect and protect information relating to an intrusion
- Many different data sources and protection
mechanisms
• RFC 3227 - Guideli nes for
- Evidence Collection and Arch iving
- A good set of best practices
• Standard digital forensic process
- Acqu isition, analysis, and reporting
• Must be detail oriented
- Take extensive notes
Legal hold
• A legal technique to preserve relevant information
- Prepare for impending litigation
- In itiated by legal counsel
• Hold notification
- Records custodians are instructed to preserve data
• Separate repository for electronically stored
information (ESI)
- Many different data sources and types
- Unique w orkflow and retention requirements
• Ongoing preservation
- Once notified, there's an ongoing obligation to
preserve data
Capture video
• A moving record of the event
- Gathers information external to the computer
and network
• Captures the status of the screen and other
volatile information
- Today's mobi le video devices are remarkable
• Don't forget security cameras and your phone
• The video content must also be archived
- May have some of the most important record
of information
Admissibility
• Not all data can be used in a court of law
- Different rules in different ju risdictions
• Legal authorization
- Search and seizure of information
• Procedures and tools
- The correct tools used the correct w ay
• Laboratories
- Proper scientific principles used to analyze
the evidence
• Technical and academic qualifications
- Competence and qualifications of experts
Chain of custody
• Control evidence
- Maintain integrity
Event logs
• System logs
- Documents important operating system and
application events
• Export and store for future reference
- Filter and parse
• Log store
- Linux: /var/log
- W indow s: Event View er
•
0
•
r~i_
---·
·
~
l~
,-s'~~....
.
.
,
_
_.
_
,
.
.
.
.
,
~~ ,-to~-- ---------~
a·-.... z...
,~.-,~
,-i.,·-__
__
...
fk~--tv.
Os...
'1tr-
...
U,.._t_
, ...... s.-
..,.,.~ •..,~
, __ s -
'1~
1-1~~
(.I•-~
·,.,-...-
, ..... s.'--.,._
~
1~.ast,w
'~0S'I""'
1~~'""
....,_.,,..,,..
~
~~M
ff
Mfl"
4),1 •
..iol
1
"
. ...
.,l ~u,p,,
t W20ll)~1N
~&n',ll'W,
,
--...... -.....
..,---
......
-
_,.....,.....__,.., l.,,,..,.
,_
.....
~
t~.c:!IM
t.o•c..p"'~
( ~ c . . . w..
Interviews
• Who might have seen th is?
- You w on't know until you ask
• Interview and document
- These folks might not be around later
• Not al l w itness statements are 100% accurate
- Humans are fallible
Reports
• Document the findings
- For Internal use, legal proceedings, etc.
• Summary information
- Overview of the security event
• Detailed explanation of data acquisition
- Step-by-step method of the process
• Everyone w ho contacts the evidence
- Use hashes
- Avoid tampering
© 2020 Messer Studios, LLC
• Label and catalog everything
- Digitally tag all items for ongoing documentation
- Seal and store
Recording time offsets
• The time zone determines how the time is displayed
- Document the local device settings
• Different file systems store timestamps differently
- FAT: Time is stored in local time
- NTFS: Time is stored in GMT
• Record the time offset from the operating system
- The W indow s Registry
- Many different va lues (daylight saving time,
time change information, etc.)
• The findings
- An analysis of the data
• Conclusion
- Professional results, given the analysis
Professa< Messer's CompTIA SYo-601 Security+ Course Notes· Page 108
https://ProfessorMesser.com
4.5 - Forensics Data Acquisition
CPU registers, CPU cache
Router table, ARP cache, process table, kernel statistics, memory
Temporary file systems
Disk
Remote logging and monitoring data
Physica l configuration, network topology
Archival media
Order of volatility
• How long does data stick around?
- Some media is much mor e volati le than ot hers
- Gather dat a in order from the most volatile to
less volatile
Disk
• Copy everything on a storage drive
- Hard drive, SSD, fl ash drive
• Drive image prepa ration
- Pow er dow n to prevent changes
- Remove storage drive
• Connect to imaging device
- W it h w rite-protection
• Core operating system
- Executable files and libraries
- Can be com pared later to know n-good files
- Usually ca ptured w ith a drive image
• Other OS data
- Logged in users
- Open ports
- Processes currently running
- Attached device list
• Forensic clone
- Bit-for-bit copy
- Preserve all data (even t he "deleted" data)
Random access memory (RAM)
• A difficult target t o capture
- Changes constantly
- Capturing data changes t he data
• M emory dum p
- Grab everyt hing in active RAM
- Many t hird-party tools
• Important data
- Browsing history
- Clipboa rd information
- Encryption keys
- Command history
Device
• Mobile devices and tablets
- A more cha ll enging forensics task
• Capture data
- Use an existing backup file
- Transfer image over USB
• Data
- Phone ca lls
- Contact information
- Text messages
- Email data
- Images and movies
Firmware
• Ext ract the device firmw are
- Rootkit s and exploit ed hardw are device
- A reprogrammed firmw are or ROM
Swap/ pagefile
• Used by different operating systems
- Slightly different usage in each
• A place to store RAM w hen memory is depleted
- There's a lot more space on the storage drive
- Transfer pages of RAM to a storage drive
• Can also cont ain portions of an application
- Page out portions that aren't in use
• Cont ains data sim ilar to a RAM dump
- Anything active on the system
© 2020 Messer Studios, LLC
Operating system
• OS files and dat a
- May have been modifi ed
• Specific to the platform
- Firmw are implementations vary w idely
• Attacker gains access to t he device
- Maintains access through OS updates
• Data discovery
- Exploit data
- Firmw are functiona lity
- Real-time data
Professo, Messer's CompTIA SYo-601 Security+ Course Notes· Page 109
https://ProfessorMesser.com
4.5 - Forensics Data Acquisition (continued)
Snapshot
• Generally associated with virtual machines (VMs)
- A point-in-time system image
• Incremental betw een snapshots
- Original image is the full backup
- Each snapshot is incr emented from the last
- Restoring requires the original and all snapshots
• Contains all files and information about a VM
- Similar to a system image
- Operating system, applications, user data, etc.
Cache
• Stor e data for use later
- Often used to incr ease performance
- Many different caches (CPU, disk, Internet, etc.)
• Can contain specialized data
- CPU cache is very short-term instruction storage
• Some data may never be used
- Erased after a specified timeframe or w hen the cache is full
- Browser caches are often long-lived
• Data
- URL locations
- Browser page components (text, images)
Network
• Gather information about and from the network
- Netw ork connections, packet captures
• Inbound and outbound sessions
- OS and application traffic
• Packet data
- Capture raw netw ork data
- May include long-term packet captures
• Third-party packet captures
- Firew alls, IPS, etc.
Artifacts
• Digital items left behind
- Every contact leaves a trace
- May not be obvious to access
• Artifact locations
- Log information
- Flash memory
- Prefetch cache files
- Recycle Bin
- Brow ser bookmarks and logins
4.5 - On-Premises vs. Cloud Forensics
Forensics in the cloud
• Adding complexity to the digita l forensics process
- Cloud technologies
• Technical challenges
- Devices are not totally in your control
- There may be limited access
- Associate data with a specific user
• Legal issues
- Laws are different around the w orl d
- The rules may not be immediately obvious
Right to audit clauses
• Common to w ork with business partners
- Data sharing
- Outsourcing
• Cloud computing providers
- Can hold all of the data
- Manage Internet access
-Are they secure?
• Right-to-audit should be in the contract
- A legal agreement to have the option to perform
a security audit at any time
- Everyone agrees to the terms and conditions
- Ability to verify security before a br each occurs
© 2020 Messer Studios, LLC
Regulatory/jurisdiction
• Cloud computing technology appeared r elatively quickly
- The legal w orl d is scrambling to catch up
• Forensics professionals must know their legal rights
- Data in a different jurisdiction may be bound by very
different regulations
• Data stored in cloud may not be located in the same country
- Location of the data center may determine how data can
be treated
• Location of the data is critical
- Legal framew orks vary widely betw een countries
- Some countries don't allow electronic searches outside
of their borders
Data breach notification laws
• Notification law s
- If consumer data is breached, the consumer must be
informed
• Many data breach notification law s
- Vary w idely across countri es and localities
- If you' re in the cloud, you' re a global entity
• Notification requirements also vary
- Type of data breached
- Who gets notified
- How quickly
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 110
https://ProfessorMesser.com
4.5 - Managing Evidence
Integrity
• Hashing
- Cryptographic integrity verification
- A digital " fingerprint"
Data recovery
• Extract missing data without affecting the
integrity of the data
- Requires t rain ing and expertise
• Checksums
- Protects against accidental changes during transm ission
- A relatively simple integrity check
- Not designed to replace a hash
• Provenance
- Documentation of authenticity
- A cha in of custody for data handling
- Blockchain technology
• The r ecovery process can va ry
- Deleted files
- Hidden data
- Hardw are or softw are corruption
- Storage device is physically damaged
Preservation
• Handl ing evidence
- Isolate and protect the data
- Analyze the data later w ithout any alterations
• Manage the collection process
- Work from copies
- Manage the data collection from mobile devices
• Live collection has become an important skill
- Data may be encrypted or difficult to collect after
pow erin g dow n
• Follow best practices to ensure admissibil ity of
data in court
- What happens now affects the future
E-discovery
• Electronic discovery
- Collect, prepare, review, interpret, and produce
electronic documents
• E-discovery gathers data required by the legal process
- Does not generally involve analysis
- There's no consideration of intent
• Works together w ith digital forensics
- Thee-discovery process obtains a storage drive
- Data on the drive is smaller than expected
- Forensics experts determ ine that data w as deleted and
attempt to recover the data
Non-repudiation
• Proof of data integrity and the origin of the data
- The data is unchanged and really did come from the
sender
- Hashing the data
• Authentication that is genuin e w ith high confi dence
- The only person who could have sent the data is the
sender
• Message Authentication Code (MAC)
- The tw o parties can verify non-repudiation
• Digital Signature
- The non-repudiation can be publicly verified
Strategic intelligence/counterintelligence
• Strategic intelligence
-A focus on key threat activity for a domain
- Business sectors, geographical regions, countries
- Gather information from internal th reat reports,
third-party data sources, and other data in puts
- Determine the thr eat landscape based on the t r ends
• Strategic counterintelligence (Cl)
- Prevent hostile intelligence operations
- Discover and disrupt foreign intelligence threats
- Gather threat information on for eign intelligence
operations
5.1 - Security Controls
Security controls
• Security risks are out ther e
- Many different types to consider
• Assets are also varied
- Data, physical property, computer systems
• Prevent security events, minimize the im pact,
and limit the damage
- Security controls
Control categories
• Managerial controls
- Controls that address securit y design and implementation
- Security poli cies, standard operating procedures
• Operational controls
- Controls that are implemented by people
- Security guard s, aw areness programs
© 2020 Messer Studios, LLC
• Technical controls
- Controls implemented using systems
- Operating system controls
- Firew alls, anti-virus
Control types
• Preventive
- Physically control access
- Door lock
- Security guard
- Firew all
• Detective
- May not prevent access
- Identifies and records any intrusion attempt
- Motion detector, IDS/IPS
Professa< Messer's CompTIA SYo-601 Security+ Course Notes· Page 111
https://ProfessorMesser.com
5.1 - Security Controls (continued)
• Corrective
- Designed to mitigate damage
- IPS can block an attacker
- Backups can mitigate a ransom w are infection
- A backup site can provide options wh en a storm hits
• Deterrent
- May not directly pr event access
- Discourages an intrusion attempt
- Warning signs, login banner
• Compensating
- Doesn't prevent an attack
- Restores using other means
- Re-image or r estore from backup
- Hot site
- Backup pow er system
• Physica l
- Fences, locks, mantraps
- Real-w orld security
5.2 - Security Regulations and Standards
Compliance
• Compliance
- Meeting the standards of law s, policies, and regulations
• A healthy catalog of regulations and law s
- Across many aspects of business and life
- Many are industry-specific or situational
• Penalties
- Fines, incarceration, loss of employment
• Scope
- Covers national, territory, or state laws
- Domestic and internationa l requirements
GDPR - General Data Protection Regulation
• European Union regulation
- Data protection and privacy for individuals in the EU
- Name, address, photo, email address, bank details, posts
on social netw orking w ebsites, medical information,
a computer's IP address, etc.
• Controls export of personal data
- Users can decide wh ere t heir data goes
• Gives individuals control of their personal data
- A right to be forgotten
• Site privacy policy
- Details all of t he privacy rights for a user
PCIDSS
• Payment Card Industry
- Data Security Standard (PCI DSS)
-A standard for protecting credit cards
• Six control objectives
- Bui ld and maintain a secure netw ork and
systems
- Protect cardholder data
- Maintain a vulnerability management program
- Implement strong access control measures
- Regularly monitor and test networks
- Maintain an information security policy
5.2 - Security Frameworks
Security frameworks
• Secure your data.
- Wh ere do you start? W hat are t he best practices?
- If only there w as a book.
• Often a complex problem
- Unique organizational requirements
- Compliance and r egulatory r equirements
- Many different processes and tools are available
• Use a security framew ork
- Documented processes
- A guide for creating a security program
- Define tasks and prioritize proj ects
Center for Internet Security (CIS)
• Center for Internet Security
- Critical Security Controls for
- Effective Cyber Defense
- CIS CSC
• Improve cyber defenses
- Tw enty key actions (the critical security controls)
- Categorized for different organization sizes
• Designed for implementation - W ritten for IT professionals
- Includes practical and actionable tasks
© 2020 Messer Studios, LLC
NIST RMF
• National Institute of Standards and Technology
- Risk Management Framew ork (RMF)
- Mandatory for US federal agencies and
organizations that handle federal data
• Six step process
- Step 1: Categori ze - Define the environment
- Step 2: Select - Pick appropriate controls
- Step 3: Implement - Define proper implementation
- Step 4: Assess - Determine if controls are w orking
- Step 5: Authorize - Make a decision to
authorize a system
- Step 6: Monitor - Check for ongoing compliance
NIST CSF
• National Institute of Standards and Technology
- Cybersecurity Framew ork (CSF)
-A voluntary commercial framew ork
• Framew ork Core
- Identify, Protect, Detect, Respond, and Recover
• Framew ork Implementation Tiers
-An organization's view of cybersecurity risk and
processes to manage the risk
• Framew ork Profil e - The alignment of standards,
guidelines, and practices to the Framew ork Core
Professa< Messer's CompTIA SYo-601 Security+ Course Notes· Page 112
https://ProfessorMesser.com
5.2 - Security Frameworks {continued)
ISO/IEC frameworks
• International Organization for Standard ization/
- International Electrotechnical Commission
• 1SO/IEC 27001
- Standard for an Information Security
Management System (ISMS)
• 1SO/I EC 27002
- Code of practice for information security controls
• 1SO/I EC 27701
- Privacy Information Management Systems (PIMS)
• ISO 31000
- International standards for risk management practices
SSAE SOC 2 Type 1/11
• The American Institute of Certified Public Accountants
(AICPA) auditing standard Statement on Standards for
Attestation Engagements number 18 (SSAE 18)
• SOC 2 - Trust Services Criteria (security controls)
- Firew alls, intrusion detection, and
mu lti-factor authentication
• Type I audit
- Tests controls in place at a particular point in time
• Type II
- Tests controls over a period of at least six
consecutive months
Cloud Security Alliance (CSA)
• Security in cloud computing
- Not-for-profit organization
• Cloud Controls Matrix (CCM)
- Cloud-specific security controls
- Controls are mapped to standards, best practices,
and regulations
• Enterprise Arch itecture
- Methodology and tools
-Assess interna l IT groups and cloud providers
- Determine security capabilities
- Build a roadmap
5.2 - Secure Configurations
Secure configurations
• No system is secur e with the default configurations
- You need some guidelines to keep everything safe
• Hardening guides are specific to the softw are or platform
- Get feedback from the manufacturer or
Internet interest group
- They'll have the best details
• Other general-purpose guides are available on line
Web server hardening
• Access a server with your brow ser
- The fundamental server on the Internet
- Microsoft Internet Information Server,
Apache HTTP Server, et al.
• Huge potential for access issues
- Data leaks, server access
• Secure configuration
- Information leakage: Banner information, directory brow sing
- Perm issions: Run from a non-privileged account,
configure file permissions
- Configure SSL: Manage and install certificates
- Log files: Monitor access and error logs
Operating system hardening
• Many and varied - W indow s, Linux, iOS, Android, et al.
Application server
• Programming languages, runtime libraries, etc.
- Usually betw een the w eb server
and the database
- Middlew are
• Very specific functionality
- Disable all unnecessary services
• Operating system updates
- Security patches
• File permissions and access controls
- Limit rights to w hat's required
- Limit access from other devices
Network infrastructure devices
• Switches, routers, firew alls, IPS, etc.
- You never see them, but they' re alw ays there
• Purpose-built devices
- Embedded OS, lim ited OS access
• Configure authentication
- Don't use the defau lts
• Check w ith the manufacturer
- Security updates
- Not usually updated frequently
- Updates are usually important
• Updates
- Operating system updates/service packs,
security patches
• User accounts
- Minimum passw ord lengths and complexity
- Account limitations
• Netw ork access and security
- Limit netw ork access
• Monitor and secure
- Anti-virus, anti-ma lware
© 2020 Messer Studios, LLC
Professo, Messer's CompTIA SYo-601 Security+ Course Notes ·
Page 113
https://ProfessorMesser.com
5.3 - Personnel Security
Acceptable use policies (AUP)
• What is acceptable use of company assets?
- Deta il ed document ation
- May be documented in the Rules of Behavior
• Covers many topics
- Internet use, telephones, computers,
mobile devices, etc.
• Used by an organization t o lim it legal liability
- If someone is dismissed, these ar e the w elldocumented r easons w hy
Business policies
• Job rotation
- Keep people moving bet w een responsibil ities
- No one person maintains control for long periods
of time
• Mandat ory vacations
- Rotat e others through the job
- The longer the vacation, t he better chance
to identify fraud
- Especially important in high-securit y environments
• Sepa ration of duties
- Split know ledge
• No one person has all of the detai ls
• Half of a safe combination
- Dual control
• Tw o people must be present to perform
the business function
• Tw o keys open a safe (or launch a m issile)
• Clean desk policy
- When you leave, nothing is on your desk
- Limit the exposur e of sensitive data to th ird-parties
Least privilege
• Right s and permissions shou ld be set to
the bare minimum
- You only get exactly w hat's need ed t o complete
your obj ective
• All user accounts must be li mited
- Appl ications should run w ith minima l privileges
• Don't allow users to run with adm inistrative privil eges
- Limits the scope of ma licious behavior
Background checks
• Background checks
- Pre-em ployment screening
- Verify the applicant 's cla ims
- Discover criminal history, w orkers compensation
cla ims, etc.
- Legalities vary by count ry
• Adverse actions
- An action t hat den ies employment based on the
background check
- May require extensive documentation
- Can also include existing employees
© 2020 Messer Studios, LLC
Personnel security procedures
• NOA (Non-disclosure agreement)
- Confid ential ity agreement/ Legal contract
- Prevent s the use and dissemination of
confidential information
• Socia l media analysis
- Gather dat a from social media
- Facebook, Tw itter, Li nked ln, lnst agram
- Build a personal profile
- Another data point w hen making a hiring decision
On-boarding
• Bring a new person into t he organization
- New hires or transfers
• IT agreements need to be signed
- May be part of t he em ployee handbook or
a sepa rat e AUP
• Create account s
- Associate the user wit h the proper groups
and departments
• Provide req uired IT hardw are
- Laptops, ta blets, etc. - Preconfi gured and ready t o go
Off-boarding
• All good things ... (But you knew t his day w ould come)
• This process should be pre-planned
- You don't w ant to decide how to do things at th is point
• What happens t o the hardw are and the data?
• Account information is usually deactivated
- But not alw ays deleted
User training
• Gamifi cation
- Scor e point s, compet e wit h others, coll ect badges
• Capture t he fl ag (CTF)
- Securit y com petition
- Hack into a server to steal data (t he flag)
- Can involve highly t echnical simulations
- A practica l learning envi ronment
• Phishing simulation
- Send simulated phish ing ema ils
- Make vishing ca lls
- See w hich users are susceptible to phish ing attacks
wit hout being a victim of phishing
• Computer-based training (CBT)
- Automated pre-built training
- May inclu de video, audio, and Q&A
- Users al l receive the same t raining experience
Role-based security awa reness t raining
• Before providing access, t rain your users
- Detailed securit y re quirement s
• Specia lized tra ining
- Each user role has un ique security r esponsibilities
• Also applies to t hird-parties
- Cont ractors, partners, suppliers
• Detailed documentation and records
- Problems later can be severe for everyone
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 114
https://ProfessorMesser.com
5.3 - Third-party Risk Management
Vendors
• Every organization w orks with vendors
- Payroll, customer r elationship management,
email marketing, travel, raw materials
• Important company data is often shared
- May be required for cloud-based services
• Perform a risk assessment
- Categorize risk by vendor and manage the risk
• Use contracts for clear understanding
- Make sure everyone understands the expectations
- Use the contract to enforce a secure environment
Target credit card breach - November 2013
• Every point of sale termina l infected
- A third-party w as allow ed in through lapses in
security policy
• A vendor w as infected through an email attachment
- The vendor didn't have or follow a security policy for
their w orkstations
• Target didn't segment the vendor netw ork
from the corporate
- The attackers jumped from the vendor to the
Target netw ork
• The corporate netw ork was not segmented from
point of sale (POS} terminals
- Once on the inside, it w as r elatively easy to get to
your credit card numbers
- (110 million card numbers)
Supply chain
• The system involved w hen creating a product
- Involves organizations, people, activities, and resources
• Supply chain assessment
- Get a product or service from suppl ier to customer
- Evaluate coordination betw een groups
- Identify areas of improvement
- Assess the IT systems supporting the operation
- Document the business process changes
• New laptops arrive w ith bundled malwar e
- Lenovo, August 2014 through early 2015
- Superfish softw are added a self-signed root cert ( !)
- Allow ed for on-path attacks w hen brow sing any site
including over HTTPS
'
Business partners
• Much closer to your data than a vendor
- May require direct access
- May be a larger security concern than an outside hacker
• Often involves communication over a t rusted connection
- More difficult to identify mal icious activity
• Partner risk management should be included
- Requirements for best practices, data handling,
intellectual property
• Include additional security betw een partners
- Firew alls and traffic filters
© 2020 Messer Studios, LLC
Common agreements
• Service Level Agreement (SLA)
- Minimum terms for services provided
- Uptime, response time agreement, etc.
- Commonly used betw een customers and
service providers
• Memorandum of Understanding (MOU}
- Both sides agree on the contents
of the memorandum
- Usually includes statements of confidentiality
- Informal letter of intent; not a signed contract
• Measurement system analysis (MSA}
- Don't make decisions based on incorrect data !
- Used w ith quality management systems,
i.e., Six Sigma
- Assess the measurement process
- Calcu late measurement uncertainty
• Business Partnership Agreement (BPA)
- Going into business together
- Ow ner stake
- Financial contract
- Decision-making agreements
- Prepare for contingencies
Product support lifetime
• End of life (EOL)
- Manufactur er stops selling a product
- May continue supporting the product
- Important for security patches and updates
• End of service life (EOSL}
- Manufactur er stops selling a product
- Support is no longer available for the product
- No ongoing security patches or updates
- May have a premium-cost support option
• Technology EOSL is a significant concern
- Security patches are part of normal operation
Non-disclosure agreement (NDA)
• Confidentiality agreement betw een parties
- Information in the agreement should not
be disclosed
• Protects confidential information
- Trade secrets
- Business activities
- Anything else listed in the NOA
• Unilateral or bilateral (or multilateral)
- On-w ay NDA or mutual NDA
• Formal contract
- Signatures are usually required
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 115
https://P ro,essor
,
Messer.com
5.3 - Managing Data
Data governance
• Rules, processes, and accountabil ity associated with
an organization's data
- Data is used in the right w ays
• Data steward
- Manages the governance processes
- Responsible for data accuracy, privacy, and security
- Associates sensitivity labels to the data
- Ensures compliance with any applicable law s and
standards
• Formal rules for data
- Everyone must know and follow the processes
Data classification
• Identify data types
- Personal, public, r estricted, etc.
- Use and protect data efficiently
• Associate governance controls to the classification levels
- How the data class should be managed
• Data compliance
- Laws and regulations regarding certain types of data
- GDPR - General Data Protection Regulation
Data retention
• Keep files that change frequently for version control
- Fi les change often
- Keep at least a w eek, perhaps more
• Recover from virus infection
- Infection may not be identified immediately
- May need to r etain 30 days of backups
• Often legal r equirements for data retention
- Email storage may be required over years
- Some industries must legally store certain data types
- Different data types have different
storage requirements
- Corporate tax information, customer PII,
tape backups, etc.
5.3 - Credential Policies
Credential management
• All that stands betw een the outside w orld and
all of the data
- The data is everything
• Passw ords must not be embedded in the application
- Everything needs to reside on the server, not the client
• Communication across the netw ork should be encrypted
- Authentication traffic should be impossible to see
Personnel accounts
• An account on a computer associated w ith
a specific person
- The computer associates the user with a specific
identification number
• Storage and files can be private to that user
- Even if another person is using the same computer
• No privileged access to the operating system
- Specifically not allow ed on a user account
• This is the account type most people w ill use
- Your user community
Third-party accounts
• Access to external third-party systems
- Cloud platforms for payroll, enterprise resource
planning, etc.
• Third-party access to corporate systems
- Access can come from anyw here
• Add additional layers of security
- 2FA (tw o factor authentication)
- Audit the security posture of third-parties
• Don't allow account sharing
- All users should have their ow n account
© 2020 Messer Studios, LLC
Device accounts
• Access to devices
- Mobile devices
• Local security
- Device certificate
- Require screen locks and unlocking standards
- Manage through a Mobile Device Manager (MDM )
• Add additional security
- Geography-based
- Include additional authentication factors
- Associate a device with a user
Service accounts
• Used exclusively by services running on a computer
- No interactive/ user access (ideally}
- Web server, database server, etc.
• Access can be defined for a specific service
- Web server rights and permissions will be
different than a database server
• Commonly use usernames and passw ords
- You' ll need to determine the best policy for
passw ord updates
Administrator/root accounts
• Elevated access to one or more systems
- Super user access
• Complete access to the system
- Often used to manage hardw are, drivers, and
softw are installation
• This account should not be used for normal
administration
- User accounts should be used
• Needs to be highly secured
- Strong passw ords, 2FA
- Scheduled passw ord changes
Professo, Messer's CompTIA SYo-601 Security+ Course Notes ·
Page 116
https://ProfessorMesser.com
5.3 - Organizational Policies
Change management
• How to make a change
- Upgrade softw are, change fir ew all configuration,
modify sw itch ports
• One of the most common risks in the enterprise
- Occurs very frequently
• Often overlooked or ignored
- Did you feel that bite?
• Have clear policies
- Frequency, duration, installation process,
fallback procedures
• Sometimes extremely difficult to implement
- It 's hard to change corporate cultu re
Change control
• A formal process for managing change
- Avoid dow ntime, confusion, and mistakes
• Nothing changes w ithout the process
- Determine the scope of the change
- Analyze the risk associated with the change
- Create a plan
- Get end-user approval
- Present the proposal to the change control board
- Have a backout plan if the change doesn't w ork
- Document the changes
Asset management
• Identify and t rack computing assets
- Usually an automated process
• Respond faster to secu rity problem
- You know w ho, w hat, and w here
• Keep an eye on the most valuable assets
- Both hardwar e and data
• Track licenses
- You know exactly how many you'll need
• Verify that all devices ar e up to date
- Security patches, anti-malw are signature updates, etc.
5.4 - Risk Management Types
Risk assessment
• Identify assets that could be affected by an attack
- Define the risk associated w ith each asset
- Hardw are, customer data, intellectual property
• Identify threats
- Loss of data, disruption of services, etc.
• Determine the risk - High, medium, or low risk
• Assess the total risk to the organization
- Make future security plans
Risk assessments
• External threats
- Outside the organization
- Hacker groups, former employees
• Internal threats
- Employees and partners
- Disgruntled employees
• Legacy systems
- Outdated, older technologies
- May not be supported by the manufactur er
- May not have secu rity updates
- Depending on the age, may not be easily accessible
Risk assessments
• Intellectual Property {I P) theft
- Theft of ideas, inventions, and creative expressions
- Human error, hacking, employees with access, etc.
- Identify and protect IP
- Educate employees and incr ease security
• Softw are compliance/licensing
- Operational risk w ith too few licenses
- Financial risk w ith budgeting and over-allocated
licenses
- Legal risk if proper licensing is not follow ed
Risk management strategies
• Acceptance
-A business decision; w e'll take the risk !
• Risk-avoidance
- Stop participating in a high-risk activity
• Transference
- Buy some cybersecurity insurance
• Mitigation
- Decrease the risk level
- Invest in security systems
Multi-party risk
• Breaches involving multiple parties
- Often trusted business relationships
- Events often involve many different parties
• May 2019 • American Medical Collection Agency
- Provided debt collection for many differ ent
organizations
- Data breach disclosed personal information on 24
mil lion individuals
- Tw enty-th ree healthcare organizations affected by
this single br each
- A single breach can cause a ripple effect
© 2020 Messer Studios, LLC
Professa< Messer's CompTIA SYo-601 Security+ Course Notes - Page 117
https://ProfessorMesser.com
5.4 - Risk Analysis
• Know ledge is key
- Part of every employee's daily job role
- Part of the on boarding process for employees
and pa rtners
Evaluating ri sk
• Risk register
- Every project has a plan, but also has risk
- Identify and document the risk associated
w ith each step
- Apply possible solutions t o the identifi ed risks
- Mon itor t he results
• Maintaining aw areness
- Ongoing grou p discussions
- Pr esentations from law enforcement
- Attend security conferences and programs
• Risk matrix/ risk heat ma p
- View the result s of the risk assessment
- Visually identify risk based on color
- Com bines t he likelihood of an event wit h
the potential impact
- Assists w ith making st rategic decisions
Regulations that affect ri sk posture
• Many of them
- Regulations tend to regu lat e
Consequence
Almostcertain
I
~egllglble
Mtnor
M oderate
Major
1
2
3
4
s
Mode-rate
High
10
Extreme
Elllreme
1S
20
Elllreme
2S
High
12
E-
Ext,-
Hi1h
Hi&h
s
Catostrophlc
..,
4
Moderate
Ukely
4
High
8
l
3
Possible
Low
M oderoilte
3
6
9
12
Elllreme
15
2
Low
Moderate
Moderate
Unlikoly
2
4
6
High
8
High
10
1
Rare
Low
Lo w
Low
Moderat,
Moder-ate
I
2
3
4
s
0
.;
J<
::,
16
20
I
Audit ri sk model
• Inher ent risk
- Impact + Likelihood
- Risk that exists in t he absence of controls
- Some models inclu de the existing set of cont rols
• Residual risk
- Inherent risk+ control effectiveness
- Risk that exists after controls are considered
- Some models base it on including additional controls
• Risk appetite
- The amount of risk an organ ization is willing t o take
Risk control assessment
• Risk has been det erm ined
- Heat maps have been created
• Time to build cybersecurity req uirements
- Based on the identified risks
• Find the gap
- Often r equ ires a form al audit
- Self-assessments may be an option
• Build an d mainta in securit y systems based on the
requirements
- The organizational risk determ ines the proper
controls
• Det ermine if existing controls are compliant or noncompliant
- Make plans to bring everything int o compliance
Risk awareness
• A constantly changing battlefi eld
- New risks, emerging risks
- A nearly overw helming amount of information
- Difficult to manage a defense
© 2020 Messer Studios, LLC
• Regulations directly associated to cybersecurity
- Protection of personal information, disclosure of
information breaches
- Requires a minimum level of information securit y
• HIPAA - Health Insurance Portabilit y and
Account abil ity Act
- Privacy of patient records
- New storage requirement s, netw ork secu rity,
protect against threats
• GDPR - General Data Protection Regulation
- European Union data protection and privacy
- Personal dat a must be protected and managed
for privacy
Qualitative ri sk assessment
• Identify sign ifi cant risk fa ctors
- Ask opinions about t he sign ificance
- Display visually wit h t raffic light grid or
similar method
Quantitative risk assessment
• Likelihood
- Annua lized Rate of Occurrence (ARO}
- How likely is it t hat a hurricane w ill hit ?
In Montana? In Florida?
• SLE (Single Loss Expectancy)
- What is t he monetary loss if a single event occu rs?
- La ptop stolen (asset va lue or AV) = $1,000
• ALE (Annualized Loss Expectancy)
- ARO x SLE
- Seven laptops stolen a year (ARO} x
$1,000 (SLE) = $7,000
• The business impact can be more than monetary
- Quantitative vs. qualitative
Disaster types
• Environmental threat s
- Tornado, hurricane, earthquake, severe w eather
• Person-made th rea ts
- Human int ent, negligence, or error
- Arson, crime, civil disorder, fires, riots, et c.
• Internal and ext ernal
- Internal th reat s are from em ployees
- Ext ernal t hreats are from outside t he organization
Professo, Messer's CompTIA SYQ-601 Security+ Course Notes - Page 118
https://ProfessorMesser.com
5.4 - Business Impact Analysis
Recovery
• Recovery time objective (RTO}
- Get up and runn ing qu ickly
- Get back t o a particular service level
• Recovery point objective (RPO)
- How much data loss is acceptable?
- Bring t he system back on li ne; how far back
does dat a go?
• M ea n time to repair (MTTR)
- Time required t o fi x t he issue
• M ea n time betw een fai lur es (M TBF)
- Predict the time betw een out ages
Functional re covery plans
• Recover from an outage
- Step-by-step gu ide
• Contact information
- Someone is on-call
- Keep everyone up t o date
• Technical process
- Reference t he knowledge base
- Follow the internal processes
• Recover and test
- Confirm normal operation
Removing single points of failure
• A single event can ruin you r day
- Unless you make some plans
• Netw ork configuration
- Multiple devices (the "Noah's Ark" of networking)
• Facility/ Utilities
- Backu p pow er, multiple cooling devices
• People/ Location
- A good hurricane can disru pt personnel travel
• There's no practical w ay to remove all points of failure
- Money drives red undancy
Disast e r re covery plan (DRP)
• Detailed plan for r esuming operations after a disaster
- Appl ication, data center, building, campus, r egion, etc.
• Extensive planning prior to t he disaster
- Backu ps
- Off-site data replication
- Cloud alternatives
- Remote site
• Many th ird-pa rty options
- Physical locations
- Recovery services
Impact
• Life - The most important consideration
• Property - The risk to buildings and assets
• Safety - Some environments are too dangerous to w ork
• Finance - The resu lting fi nancial cost
• Reputation
- An event ca n cause status or character problems
Mission-essential functions
• If a hurricane blew through, w hat functions w ould be
essentia l to the organization?
- That 's w here you start your analysis
- These are broad business r equ irements
• What computing systems are r equ ired for these
mission-essential business functions?
- Identify t he critical systems
Site ri sk assessment
• All locations are a bit different
- Even t hose designed to be similar
• Recovery plans should consider unique environments
- Appl ications
- Personnel
- Equipment
- Work environment
5.5 - Privacy and Data Breaches
Information life cycle
• Creation and receipt
- Create data internally or receive data
from a third -party
• Distribution - Records are sorted an d stored
• Use
- Make business decisions, create products
and services
• Ma int enance
- Ongoing data retrieval and data transfers
• Disposition
- Arch iving or disposal of data
Consequences
• Reputation damage
- Opinion of the organ ization becomes negative
- Can have an impact on products or services
- Can impact stock price
© 2020 Messer Studios, LLC
• Identit y theft
- Com pany and/ or customers information
becomes public
- May require public disclosu re
- Credit monitoring costs
• Fines
- Uber
• Data breach in 2016 w asn't disclosed
• Uber paid the hackers $100,000 instead
• Lawsuit settlement w as $148 m il lion
- Equifax
• 2017 dat a breach
• Government fines w ere approximately $700 mi llion
• Intellectual Property (I P) t heft
- Stealing com pa ny secrets
- Can put an organization out of business
Professo, Messer's CompTIA SYo-601 Security+ Course Notes ·
Page 119
https://ProfessorMesser.com
5.5 - Privacy and Data Breaches {continued)
Notification
• Internal escalation process
- Breaches are often foun d by technicians
- Provide a process for making t hose findings know n
• Externa l esca lation process
- Know w hen t o ask for assistance from
externa l resources
- Secu rity experts can find and stop an active breach
• Public notifications and disclosu res
- Refer to security breach notification laws
- All 50 US states, EU, Austra lia, etc.
- Delays might be allow ed for criminal investigations
Privacy impact assessment (PIA)
• Almost everything can affect privacy
- New business relationships, product updates, w ebsite
feat ures, service offering
• Privacy risk needs to be identifi ed in each initiative
- How cou ld t he process compromise customer privacy?
• Advant ages
- Fix privacy issues before they become a problem
- Provides evidence of a focus on privacy
- Avoid data breach
- Show s the importance of privacy to everyone
Notices
• Terms of service
- Terms of use, terms and conditions (T&C}
- Legal agr eement bet w een service provider and user
- User must agree to the terms to use t he service
• Privacy notice, privacy policy
- May be require d by law
- Documents the handling of personal data
- May provide additional data options and
contact information
5.5 - Data Classifications
Labeling sensitive dat a
• Not all dat a has the same level of sensitivity
- License t ag numbers vs. health r ecords
• Differ ent levels require different securit y and handling
- Additional permissions
- A differ ent process t o view
- Restricted net w ork access
Dat a classifications
• Proprietary
- Data t hat is the property of an organ ization
- May also include trade secrets
- Oft en data un ique to an organization
• PII - Personally Identifiable Information
- Data t hat can be used t o identify an individua l
- Name, dat e of birth, mother's ma iden name,
biometric information
• PH I - Protected Healt h Information
- Health information associated w ith an individual
- Health status, health car e record s, payment s for
health care, and much more
• Public/ Unclassified
- No rest rictions on viewing t he data
• Private/ Classified / Restricted / Internal use only
- Restricted access, may require a non-disclosure
agreement (NDA)
• Sensitive - Int ellectual property, PII, PH I
• Confid ential - Very sensitive, must be approved to view
• Critica l - Data should alw ays be available
• Financial information
- Internal com pany fi nancial information
- Customer financial details
• Government data
- Open dat a
- Transfer bet w een government entities
- May be protected by law
• Cust omer data
- Data associat ed w ith customers
- May include user-specifi c det ails
- Legal handli ng re quirement s
5.5 - Enhancing privacy
Tokenization
• Replace sensitive data wit h a non-sensitive placeholder
- SSN 266-1 2-1 112 is now 691-61-8539
• Common w ith credit card processing
- Use a temporary t oken du ring payment
- An attacker captu ring the card numbers can't use
them later
• Th is isn't encryption or hashing
- The origina l data and token aren't
mathematically r elated
- No encryption overhead
© 2020 Messer Studios, LLC
Data minimization
• M inimal data collection
- On ly collect and reta in necessa ry data
• Included in many r egulations
- HIPAA has a " M inimum Necessa ry" ru le
- GDPR - " Persona l data shall be adequate, relevant
and not excessive in r elation t o the purpose or
purposes for w hich they are processed."
• Some information may not be re quired
- Do you need a telephone number or address?
• Internal dat a use should be lim ited
- On ly access data required for the t ask
Professa< Messer's CompTIA SYo-601 Security+ Course Notes· Page 120
https://ProfessorMesser.com
5.5 - Enhancing privacy (continued)
Anonymization
• Make it impossible to identify individual data
from a dataset
- Allow s for data use without privacy concerns
• Many different anonymization techniques
- Hashing, masking, etc.
• Convert from deta iled customer purchase data
- Remove name, address, change phone number
to ### ### ####
- Keep product name, quantity, total, and sale date
• Anonymization cannot be r eversed
- No w ay to associate the data to a user
• May only be hidden from view
- The data may still be intact in storage
- Control the view based on permissions
• Many different techniques
- Substituting, shuffling, encrypting, masking out, etc.
Pseudo-anonymization
• Pseudonymization
- Replace personal information w ith pseudonyms
- Often used to maintain statistical r elationships
• May be reversible
- Hide the personal data for dai ly use or in case of breach
- Convert it back for other processes
• Random replacement
- James Messer-> Jack O'Neill-> Sam Carter-> Daniel Jackson
Data masking
• Data obfuscation
- Hide some of the original data
• Consistent replacements
- James Messer is always converted to George Hammond
• Protects PI I
- And other sensitive data
5.5 - Data Roles and Responsibilities
Data responsibility
• High-level data relationships
- Organizational responsibilities, not alw ays technical
• Data ow ner
- Accountable for specific data, often a senior officer
- VP of Sales ow ns the customer relationship data
- Treasurer ow ns the financial information
Data roles
• Data controller
- Manages the purposes and means by w hich
personal data is processed
Additional data roles
• Data custod ian/stew ard
- Responsible for data accuracy, privacy, and security
-Associates sensitivity labels to the data
- Ensures compliance w ith any applicable laws
and standards
- Manages the access rights to the data
- Implements security controls
• Data protection officer (DPO)
- Responsible for the organization's data privacy
- Sets policies, implements processes and procedures
• Data processor
- Processes data on behalf of the data controller
- Often a third-party or different group
• Payroll controller and processor
- Payroll department (data controller) defines
payroll amounts and timeframes
- Payroll company (data processor) processes payroll
and stores employee information
© 2020 Messer Studios, LLC
Professo, Messer's CompTIA SYo-601 Security+ Course Notes ·
Page 121
https://ProfessorMesser.com
Continue your journey on
ProfessorMesser.com:
Professor Messer's Free
SY0-601 CompTIA Security+ Training Course
Monthly Security+ Study Group Live Streams
24 x 7 Live Chat
Professor Messer's
SY0-601 CompTIA Security+ Success Bundle
Voucher Discounts
Download