Threats, Vulnerabilities, and Incident Response
Threats, Vulnerabilities, and Incident Response
Response
Username: cyberadmin
Password: @UdacityLearning#1
As a security professional, your job will consist of answering the following questions on a
regular basis:
● [THREATS] What are the greatest cyber threats I should be concerned about?
● [VULNERABILITIES] How can I find and fix security issues that cyber threat actors
may take advantage of?
● [INCIDENT RESPONSE] If I am faced with a security incident or potential breach,
how can I respond?
Stakeholders
When it comes to threats, vulnerabilities, and incident response, there are a variety of
stakeholders involved both within the company and outside of the company. Examples of
key stakeholders include:
● Management
● Security Professionals
● IT Support
● Human Resources
● Legal Teams
● External Groups (e.g. law enforcement)
Do's and Don'ts
Identifying threats, finding and fixing vulnerabilities, and preparing to respond to incidents
are ongoing tasks that are relevant every day when working in a cyber security team. Here
are key do's and don'ts to remember as you acquire these useful skillsets:
Do's
● Use the skills you learn to proactively identify business threats
● Conduct approved vulnerability tests
● Lawfully respond to and investigate incidents
● Uphold the highest moral standards as a security professional
Dont's
● Abuse the skills you learn by conducting unauthorized security testing against
systems or assets in personal or professional settings
Threats have been around for as long as human beings have been on this earth, and much
longer. For example:
● Millions of years ago, meteors were a detrimental threat to dinosaurs.
● Thousands of years ago, wildcats were a detrimental threat to cavemen and
cavewomen.
● Hundreds of years ago, thieves were a detrimental threat to banks.
● Today, digital threats can be detrimental to human beings when not adequately
addressed.
The bottomline is that threats are constantly evolving, and adapting is a never-ending
process.
Assessing Threats
Cyber security is ultimately about managing and prioritizing risks. A standard risk
management process involves three key steps:
● Identifying
● Assessing
● Mitigating risks
Identifying risks involves understanding the threats the company faces. Threat assessment
sets the foundation and is one of the first required steps in the risk management process.
Threats
In life, you deal with identifying and prioritizing hundreds of threats every single day.
It's a basic human instinct we all have.
I leave for work in the morning and locking my front door is a security control that I
use to keep bad things out. But let's say I accidentally left my back window open
Contrary to what most people believe, the window being open is not a threat, this is a
vulnerability. It's a gap in my home system.
But just because a window is open doesn't mean there's a breach just yet. There
would need to be someone or something ready to take advantage of the window
being open, and in other words, exploits the gap in order to make this an issue.
• Attack surface: The set of points on the boundary of a system, a system element,
or an environment where an attacker can try to enter, cause an effect on, or extract
data from, that system, system element, or environment
Threat and Attack Types
A threat can be intentional, unintentional, or otherwise a circumstance, capability,
action, or event. Understanding the various threat types is fundamental as this is
how you begin to brainstorm and identify threats that may apply to the company.
Remember the example of the window that someone left open, a thief planning to
climb it’s intentional, a snake seeking shelter could be a unintentional threat. If it
starts thunder storming and water drenches you new computer that happens to be
sitting on the desk next to the window it’s a circumstance threat
Unintentional Threats
Natural Disasters
• Fire
• Flood
• Earthquake
• Lightning
• Landslide or Mudslide
• Tornados or Severe Windstorms
• Hurricanes, Typhoons, and Tropical Depressions
• Tsunami
• Electrostatic Discharge (ESD)
• Dust Contamination
Human Error
• Social engineering victims
• Security unaware employees (sharing a password, leaving a computer unattended,
etc.)
Threat Actors and Motivations
Behind every attack is a human being with a reason. Understanding the culprit and
their motivation can help security professionals better defend against attacks.
Remember that in threat assessment, a lot of the work is hypothesizing and building
theories based on research. There are a lot of variables and sometimes unclear
answers, and that’s okay. Also, some threat actors try to use obvious motivations as
smoke screens for a hidden agenda.
Analyze
During the analysis phase, you’ll gather detail and information about the threats
you’ve identified and understand how they might apply to your organization. Typical
activities included in this phase are:
● Threat Intelligence Gathering: Threat information that has been aggregated,
transformed, analyzed, interpreted, or enriched to provide the necessary
context for decision-making processes.
● Threat Profiling and Modeling: Analytical insights into trends, technologies,
or tactics of an adversarial nature affecting information systems security.
● Threat Scenario Development: A set of discrete threat events, associated
with a specific threat source or multiple threat sources, partially ordered in
time.
Prioritize
During the final step of prioritization, you consider the variables that matter to the
company to determine the most significant threats. Typical activities included in this
phase are impact assessment and application of context. As you prioritize the threats
based on impact and additional context, you may ask questions like:
● What’s the likelihood that this threat will impact our business?
● How can this threat impact the business?
● What controls are in place to mitigate the impact, if any?
Introduction to MITRE Cyber Prep Framework
The MITRE Cyber Prep 2.0 framework is a threat-oriented approach that allows an
organization to define and articulate its threat assumptions, and to develop
organization-appropriate, tailored strategic elements. The framework focuses on
advanced threats. This can serve as a basis for profiling threats. The framework
considers threats based on 3 main characteristics: Intent, Target, and Capabilities.
Intent
● Goal: At what scope or in what arena do the adversary operate? Depending
on their goals, an adversary can operate against a subset of the
organization’s systems (e.g., its external-facing services); the organization’s
operations; the organization’s associates (customers, users, or partners); the
organization’s critical infrastructure or industry sector; or the nation. Example
goals here are tied back to the threat actors and motivations learned in this
lesson.
● Consequence: How much of an impact would successful achievement of
adversary goals have? How much disruption would adversary activities
cause?
● Limited or near-term: Will have little or no impact on critical mission
operations. Consequences can be handled within an operational planning or
funding cycle (e.g., within a business quarter) or within the duration of a
mission operation.
● Extensive or mid-term: Will have a significant impact on critical mission
operations, the organization, or its associates. Consequences require
remediation or mitigation efforts that extend across operational planning or
funding cycles.
● Severe or long-term: Will have an extremely significant, potentially
catastrophic impact on mission operations, the organization, or its associates.
Consequences are of duration or extent that must be considered by strategic
planning.
● Timeframe: In what timeframe does the adversary operate? Will the
adversary’s activities be periodic or episodic, or will the adversary commit to a
sustained effort against the organization?
Target
Expanding on the goal of the attack, who or what is the target? The organization
might also consider whether it could be an indirect target. Which of our customers or
partners could be high-value targets for an adversary?
Capability
What are the likely capabilities and resources of the adversary? Are they minimal,
causing the adversary to employ existing, known, malware? Or are they significant,
allowing the adversary the benefit of being able to create their own malware, threat
vectors, and possibly introduce vulnerabilities into the organization?
A Threat Profile Notes look like this:
Holly potentially associated with Threat Group Leviathan
https://attack.mitre.org/groups/
Lockheed Martin as the “kill chain” now used across the industry as a standard
(https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
)
MITRE's attack framework is created to document common tactics, techniques, and
procedures threats used against various enterprise systems.
https://attack.mitre.org
https://attack.mitre.org/mitigations/M1013/
Understanding Testing Methods and Tools
This process of identifying gaps is a foundational part of the overall vulnerability
management process.
Scope: Determine, conceptually what you want to test. For example, you can target
a certain data center looking for a specific set of issues, a specific application, or
other reasons.
Identify: Pinpoint the specific host, network, application, or other resource targets.
Here you may identify specific IP addresses or URLs for example.
Scan: Configure and run the scan or test against the identified target. Here you are
using various tools and methods, such as vulnerability scanning software, to find the
issues.
Host and network vulnerability scans are used to find vulnerabilities on servers,
desktops, mobile devices, etc. within a network. Active vulnerability scanning is used
for traffic and actions to identify vulnerabilities. Passive scanning listens on the
system and identifies issues in server and client software.
Application vulnerability scans target security within code and its operation. The
dynamic application scans test functionality while the program is executing
operations, while static scans test functionality without running any code.
Penetration testing is another level of actively trying to see if you can essentially
break security. Penetration tests can target networks, hosts, people, and physical
assets. When you make major changes to network configurations such as firewalls
and routing changes...mistakes can happen that allow intruders in. Here you should
recommend conducting a penetration test to discover those issues before the bad
guys do.
Vulnerability Scanning
Nessus, the tools used in this class, for example, is an open-source scanner that
uses the Common Vulnerabilities and Exposures (CVE) model to find issues and
efficiently conduct further research and analysis on the findings.
To run a scan, you'll need to identify the target you want to scan and establish what
kinds of security issues you are seeking to find. There are also other factors to take
into consideration such as what type of results report you'd like to see or what ports
you want to include in the test. There are hundreds of configurations that can be
changed to fine-tune a scan and the options will vary from scanning tool to scanning
tool.
Scan walkthrough here
Penetration Testing
Penetration testing, also known as pen testing, is a method of vulnerability discovery
where ethical hackers target a resource to determine whether vulnerabilities can be
exploited to compromise an environment or asset.
● White box testing: A test methodology that assumes explicit and substantial
knowledge of the internal structure and implementation detail of the
assessment object.
● Black box testing: A test methodology that assumes no knowledge of the
internal structure and implementation detail of the assessment object.
● Gray box testing: A test methodology that assumes some knowledge of the
internal structure and implementation detail of the assessment object.
• Brute Force Attack - The attacker tries every possible password combination until
one works.
• Dictionary password attack – The attacker uses a dictionary list of common user
passwords in a hashed format, and compares it to a password hash list "stolen" from
a system. For example the MD5 hash for password123 is
482c811da5d5b4bc6d497ffa98491e38. If that string is found in the system password
file, it means that a user has their password set to "password123".
• Social engineering password - Attackers who pretend to be employees try to get
access to systems information by asking other employees for their usernames and
passwords. Once they successfully get the credentials from the employees, they'll try
to use the information to gain access to the company's systems.
Example Command
To crack a password using a dictionary attack type, for example, you may specify
this command -m 0 -a 0 hash.txt file.txt which translates into the following
arguments:
● Hash type: - m 0
● Attack mode: -a 0
● Hash file: hash.txt
● Dictionary file: file.dict
Translated example of command: -m 0 -a 0 hash.txt file.dict
● -m 0 represents the hash type MD5
● -a 0 represents to dictionary attack mode
● -hash.txt and secret.dict represent the target files
https://hashcat.net/hashcat/
The syntax for additional hash types can be found here:
https://hashcat.net/wiki/doku.php?id=example_hashes
If you’d like to learn more about HashCAT, here’s a good intro video
https://www.youtube.com/watch?v=EfqJCKWtGiU
The bottom line is that planning a penetration test at the right time and with the right
rules is important. In between, leverage vulnerability scanning and manual testing to
continue finding issues with less potential impact.
Additional Resource
Most Popular Tool for Penetration Testing Metasploit:
https://metasploit.help.rapid7.com/docs
There are some cases in which penetration testing works well, such as to
periodically check for security gaps or testing security after major network changes.
However, there are also times when penetration testing may not be the best answer,
or extra precautions should be taken
Without a standard, the same vulnerability could be defined as critical in one place,
while its medium severity in another place. CVSS was created to address this.
This can help companies accurately evaluate and prioritize findings within their
vulnerability management processes.
If we are using Nessus tool and it finds a vulnerability we can see more information
and details in the right
Prioritizing Findings
Once the false positives are gone and you have a clean list you must focus on.
Prior steps to group findings into remediation categories based on variables like:
● Severity level
● Budget
● Time and effort to remediate
● Cost-benefit analysis
● Regulatory requirements
General tips for prioritizing findings:
● Severity: The higher the severity level, the more urgent it may be to fix the
issue. For example, “critical” severity issues generally should be prioritized
before those rated at “high” severity.
● Cost-benefit analysis: The cost to fix the vulnerability should not be more
than the potential negative impact of the vulnerability exposure.
● Corporate considerations: Unique factors, such as regulatory compliance
implications must be taken into account. For example, if failing to fix a
vulnerability will lead the company to fail an audit or land in legal trouble the
team may choose to prioritize fixing those findings.
There are things that it doesn’t make sense to fix or that you can’t fix right away and
need a long-term plan. This is remediation strategy option matter as well.
Companies usually do not have the resources to address every finding right away. In
the remediation strategy, a final recommendation should be selected, documented,
and tracked for every vulnerability.
How you respond to attacks can make or break your company's reputation, financial
posture, compliance status, and more.
Preparation: involves building and training an incident response team. It also includes
gathering the right tools and resources to adequately respond to incidents. During
preparation, the organization works to mitigate risk and reduce the number of incidents that
may occur by implementing security controls as well.
Detection and analysis: This step is critical because in reality, it can take companies days,
months, and sometimes years to detect an incident. Based on the severity of the incident,
the organization can mitigate impact by containing and addressing the incident and
ultimately recovering from it.
Containment and Eradication and recovery: During this phase, sometimes it creates a
loop between containment and detection and analysis. For example, with the way malware
can spread quickly, you may find that as you remove it and work to recover in one area, it
gets discovered in another and the process starts again. After the incident is contained and
recovery is well underway or complete, the organization creates reports that include
information on the cause and financial impact of the incident, as well as lessons learned and
steps the company can take to avoid future incidence.
Internal team members
● Management
● Information Assurance
● IT Support:
● Legal Department
● Public Affairs and Media Relations
● Human Resources
● Business Continuity Planning
● Physical Security and Facilities Management
cyber security staff: The main planning in orchestration responsibility typically lies on this
team, for example, who manage the cyber security incident detection technology and other
resources.
The management team: establishes incident response policy, budget and staffing, which
are fundamental pieces in the incident response team process.
IT support: may also be needed during certain stages of incident handling. For example, to
change firewall rules in the middle of an incident.
Legal experts: can help, especially in an incident where there might be legal ramifications,
including evidence collection, prosecution of a suspect or other matters.
Digital forensics: experts are also another element here.
Public affairs: depending on the magnitude and impact of the incident, you might need it
and media relations resources to inform the media and by extension, the public.
HR: involvement if, for example, you're dealing with a malicious insider who needs to be
reprimanded or potentially terminated.
For example,
Internet service provider: if you're experiencing a denial of service incident where
you are being flooded with fake traffic, you may contact your ISP to block that traffic
and slow or stop the incident.
Law enforcement: if you're dealing with cyber terrorist, you may need to get law
enforcement or the FBI involved.
Vendor: if you're dealing with a this zero-day exploit you may work with your vendor
or your support team to address the issue.
there are trusted information sharing organizations that incident response teams
participate in so that they can learn from each other about the latest attack attempts
and trends. The incident response team should document all of this contact
information
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
Execise:
You just received an alert that a critical server on your network is receiving traffic
from various IP addresses and no longer has the capacity to handle the number of
requests coming through – they are almost ten times the amount of normal traffic.
Which actions relate to each phase of the incident response lifecycle?
Preparation
● Monitor networks for unusual activity daily
● Document your infrastructure
● Establish an inventory of your critical assets and processes
● Test DDoS response plan
● Implement an incident response policy that all employees must read
● Implement a security strategy
Detection and Analysis
● Confirm that a distributed denial-of-service attack is occurring
● Understand the logical flow of the DDoS attack and identify the infrastructure
components affected by it
● Review the logs of servers, routers, firewalls, applications, and other impacted
infrastructure
Containment, Eradication, and Recovery
● Throttle or block excessive traffic
● Contact ISP for support in blocking traffic
Post-Incident Activity
● Create a report summarizing the incident and challenges faced throughout
How do you know when you need to use the incident response plan?
The incident response plan usually gets activated when there is a credible indicator
of compromise or confirmed incident.
dormant accounts (cuentas inactivas)
Digital Forensics
Digital forensics enables security professionals to conduct investigations into
breaches whether from external or internal threat actors.
Digital forensics is the application of computer science and investigative procedures
involving the examination of digital evidence. The process includes collecting,
preserving, analyzing, and reporting on evidence. It’s relevant at all stages of the
incident response life cycle.
Which concept can best help determine if evidence has been tampered with?
tampered (manipulado)
Hashing