Day 1
Day 1
Day 1
Fundamentals
Security+ اإلعداد لشهادة
Hemaya.org.sa
@HemayaGroup
1.
Security 101
Hemaya.org.sa @HemayaGroup
2
Nothing is ever completely or
truly secure. There is always a
way around or through any
security precaution that we
construct.
3
The Basics of Cyber Security
◎ Information security (or cyber security or digital security):
Is the act of protecting data and information systems from
unauthorized access, unlawful modification and disruption,
disclosure, corruption, and destruction
◎ Unauthorized access:
Access to computer resources and data without consent of
the owner. It might include approaching the system,
communicating, storing and retrieving data.
◎ Malicious software:
Known as malware, this includes computer viruses, worms,
Trojan horses, spyware, rootkits, adware, ransomware.
◎ Anti-malware software:
Anti-malware protects a computer from the various forms
of malware and, if necessary, detects and removes them.
4
The CIA of Computer Security
5
The AAA of Computer Security:
Authentication Authorization Accounting
6
Part 1 . Threats,
Attacks
Malware types
Hemaya.org.sa @HemayaGroup
7
MALWARE:
Malware refers to software that has been designed for
some nefarious purpose
• Gather information
• Participate in a group
• Show you advertising
• Encrypt your data
• Destroy your data or machine!
• And many other possibilities….
8
Malware types
◎ Viruses
◎ Ransomware
◎ Worms
◎ Trojan Horse
◎ Rootkit
◎ Keylogger
◎ Adware/Spyware
◎ Botnet
◎ Logic Bomb
◎ Crypto Miner
9
Viruses
10
Types of Viruses
• Polymorphic:
• Change its code using encryption key
• Each copy looks different after each use
• Changes are designed not to affect the
functionality
• Armored:
• Tricking the Antivirus into thinking that it is
located in a different place from where it
actually resides.
• Boot sector:
• Loads into the first sector of the hard drive;
when the computer boots, the virus then
loads into memory
11
Ransomware:
A malware that restrict access to a computer
and demands that a ransom be paid.
12
13
Protecting against ransomware
ExamAlert
Ransomware is unique, in that the attacker directly demands payment,
often through cryptocurrencies. The amount requested often is relatively
low, to ensure a higher likelihood of payment.
14
Worm
ExamAlert
Viruses are executed by some type of action, such as running a program.
Worms act like a virus but also have the ability to travel without human action.
15
Trojan Horse
ExamAlert
Trojans trick users by disguising their true intent to deliver a malicious
payload. When executed, a remote access Trojan provides a remotely
accessible backdoor for an attacker to covertly monitor the system or easily
gain entry.
16
Rootkit
17
Finding and Removing rootkits
ExamAlert
Rootkits can be included as part of software packages, can be
installed through an unpatched vulnerability, or can be
downloaded and installed by users.
18
Keylogger
* There are also hardware keylogger but need physical access to install.
19
Adware
• Pop-ups
• May be included with other software
• May cause performance issues
• Many spies on personal information
• Can be harmful sometimes.
20
Spyware
21
Bots and Botnet
22
Logic Bomb
23
Crypto Miner
24
Backdoor
25
Time for some questions and break
26
Part 1 . Threats,
Attacks
Attacks Types
Hemaya.org.sa @HemayaGroup
27
Social Engineering
ExamAlert
the best defense against social engineering
is ongoing user awareness and education.
28
Principles of Social Engineering
(Reasons for Effectiveness)
• Authority:
I’m calling from the help desk/office of the CEO/police.
• Intimidation
There will be bad things if you don’t help
• Consensus / social proof
Your co-worker Jill did this for me last week
• Scarcity/ Urgency
Act quickly, don’t think
• Familiarity / liking
Someone you know, we have common friends
• Trust
I’m from IT, and I’m here to help
29
Phishing Attacks
Exam Alert
Phishing combines technical deceit with the
elements of traditional social engineering. Be sure
to know the variants of phishing attacks.
30
Phishing types
Spear phishing:
This is a targeted version of phishing. Whereas phishing often
Involves mass emailing, spear phishing might go after a specific
individual.
Whaling:
Whaling is identical to spear phishing, except for the size of the fish.
Whaling employs spear phishing tactics but goes after high-profile
targets such as an executive within a company.
Vishing:
This attack is also known as voice phishing. The attacker uses fake
caller ID to appear as a trusted organization and attempts to get
the individual to enter account details via the phone.
Smishing:
Also known as SMS phishing, this attack uses phishing methods
through text messaging.
31
The big phish
32
Tailgating (Piggybacking)
33
Impersonation
34
Dumpster Diving
35
Shoulder Surfing
36
Hoaxes
37
Watering Hole Attacks
38
APPLICATION/SERVICE ATTACKS
• Denial-of-service (DoS) :
In a DoS attack, the attacker attempts to deny authorized
users access to the computer system or network itself. This
can be accomplished by crashing the system—taking it
offline—or by sending so many requests that the machine is
overwhelmed.
39
DoS Attacks:
• SYN flood :
40
DoS Attacks:
• Smurf/smurfing:
The attacker sends (ICMP) ping packets to the broadcast address of the
network, replacing the original source address in the ping packets with the
source address of the victim.
• Fraggle attack :
The same as Smurf but uses User Datagram Protocol UDP
41
DoS Attacks:
• Ping flood:
A ping flood attempts to block service or reduce activity
on a host by sending ping requests directly to the victim.
A variation of this type of attack is the ping of death, in
which the packet size is too large (more than 32 bytes)
and the system does not know how to handle the packets.
42
DoS Attacks:
• The Teardrop:
Packet fragments are sent in a jumbled and confused
order. When the receiving device attempts to
reassemble them, but won’t know how to handle the
request. Older versions of operating systems will
simply just crash when this occurs.
• Land attack:
Packet sent to the victim system with the same source
and destination IP address
43
Distributed Denial-of-Service
(DDoS)
DoS attacks are conducted using a single
attacking system. A DoS attack employing
multiple attacking systems is known as
a distributed denial-of-service
(DDoS) attack.
44
Man-in-the-Middle
An attacker intercepts traffic and then tricks
the parties at both ends into believing that they
are communicating with each other
ExamAlert
A man-in-the-middle attack takes place when a
computer intercepts traffic and either eavesdrops on the
traffic or alters it.
45
Man-in-the-Browser
A Trojan Horse or similar malware to gain
important information from users of
websites, especially banking and credit
card information
46
ARP Poisoning
Every hardware has MAC address that must be
associated with an IP address. Address Resolution
Protocol (ARP), which operates at Layer 2 (data link
layer) of the OSI model, associates MAC addresses
to IP addresses. ARP is a simple lower-layer
protocol that consists of requests and replies
without validation.
47
Buffer Overflow
In a buffer overflow, the input buffer that is used to hold program input is
overwritten with data that is larger than the buffer can hold.
48
Injection
When user input is used without input validation, Injection
flaws allow attackers to relay malicious code through an
application to another system.
49
Cross-Site Scripting (XSS)
The cause of the XSS is weak user input
validation. If input is not validated properly,
an attacker can include a script in their
input cause unwanted action on user’s
browser.
51
Privilege Escalation
Privilege escalation is the result of actions that allows
an adversary to obtain a higher level of permissions
on a system or network.
• Exploit a vulnerability
• Gain higher-level access to a system
From normal user to an admin
• Higher-level access means more capabilities
52
DNS Poisoning (Spoofing)
An attack that exploits vulnerabilities in the domain
name system (DNS) to divert Internet traffic away
from legitimate servers and towards fake ones.
53
Zero Day
An attack to exploit computer application vulnerabilities that are
unknown to others or even the software developer and not
patched yet.
Exam Alert
Effective security policies, training, and mitigating controls are
more effective, even compared to the most aggressive patch-
management strategies, when it comes to zero-day exploits.
54
Hijacking Attacks
Hijacking is a form of attack where the attacker
hijacks a user’s experience, typically after the
exchange of credentials.
• Session Hijacking :
An attacker uses source-routed IP packets to insert
commands into an active communication
55
Hijacking and Related Attacks
• Clickjacking:
You’re clicking on a button but you’re actually
clicking on something else (hidden button or
object).
56
Driver Manipulation
57
WIRELESS ATTACKS
58
Replay Attack
EXAM TIP
The best method for defending against replay attacks is
through the use of good encryption
59
Rogue access points
Access point that has been added to one's network
without one's knowledge.
Evil Twins
Access point that looks and acts just like a
legitimate AP and entices the end-user to connect
to our access point.
60
Jamming
Jamming is a form of denial of service that
specifically targets the radio spectrum aspect of
wireless.
WPS
Wi-Fi Protected Setup (WPS) is a network security
standard that was created to provide users with an
easy method of configuring wireless networks
61
Bluejacking
Sending of unauthorized messages to another
Bluetooth device
Bluesnarfing
Instead of sending an unsolicited message to the
victim’s phone, the attacker copies off the victim’s
information
62
RFID
Radio frequency identification (RFID) tags are used in a wide range
of use cases. From tracking devices to keys
RFID Attacks:
◉ Data capture
◉ View communication
◉ Spoof the reader
◉ Write your own data to the tag
63
Cryptographic Attacks
The basic intention of an attacker is to break a
cryptosystem and to find the plaintext from the
ciphertext.
Brute Force
The password-cracking program attempts all
possible password combinations.
64
Dictionary
A password-cracking program that uses a list of dictionary
words to try to guess the password
Hybrid Attack
Dictionary Attack method as well as brute force attack
65
Rainbow Tables
66
Known Plaintext/Ciphertext
67
Downgrade
• Example :
Intercepting web traffic and redirecting the user from the
secure, HTTPS version of a website to an unencrypted
HTTP version.
68
Time for some questions and break
69
OSI Model
70