0% found this document useful (0 votes)
63 views

CCTC Networking

The document provides an overview of cybersecurity topics including the cyber kill chain, common attack types and examples, exploitation techniques, and post-exploitation activities. Key areas covered include reconnaissance, social engineering, denial of service attacks, injection attacks, shellcode, buffer overflows, privilege escalation, persistence, and data exfiltration techniques.

Uploaded by

milkah mwaura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

CCTC Networking

The document provides an overview of cybersecurity topics including the cyber kill chain, common attack types and examples, exploitation techniques, and post-exploitation activities. Key areas covered include reconnaissance, social engineering, denial of service attacks, injection attacks, shellcode, buffer overflows, privilege escalation, persistence, and data exfiltration techniques.

Uploaded by

milkah mwaura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CCTC Networking - Network Exploitation (KW) perfect solution latest

rated A+

Lockheed Martin Kill Chain (DCO)

✓ Reconnaissance
2. Weaponization
-----------------------------
3. Delivery
4. Exploitation
5. Installation
6. Command and Control
7. Actions on Objective

Cyber Methodology (OCO)

✓ Target Discovery
2. Fingerprinting / Enumeration
3. Port Scanning
4. Gaining Access
5. Privilege Escalation
6. Post Exploitation

Compromised Asset Characteristics

✓ Information Technology Assets: servers, network components, network diagrams

Critical Information Assets: proprietary information, intellectual property, processes and plans,
credentials, org chart

Access Controls (3 types)

✓ -Behavioral Analysis
-Context Awareness
-Multifactor Authenticaiton

Social Engineering Attack Examples

✓ -Phishing
-Whaling
-Watering hole
-Baiting
-Pretexting

DoS/DDoS Attack Examples

✓ -Ping Flood
-Ping of Death
-Syn Flood
-Smurf Attack

Injection Attack Examples

✓ -Web-based (SQL, XSS, FI)


-Code (SQL, XSS, OS, DE)
-Process (DLL, PE)

Network Infrastructure Based Attack Examples

✓ -Man in the middle


-Session hijacking
-Spoofing
-Buffer Overflow
-Bluetooth

Internal Exploitation

✓ Less common, more options


Harder to detect
Reaches more assets

External Exploitation

✓ Most common
Easily detected
Often guarded against

Shellcode

✓ a small piece of code used as the payload in the exploitation of a software vulnerability that
when executed spawns a shell. Used in buffer overflow attacks

Payload

✓ the part of the private user text which could also contain malware such as worms or viruses
which performs the malicious action

Buffer Overload

✓ Occurs when more data is put into a fixed-length buffer than the buffer can handle, and the
extra data holds instructions for malicious actions

NOP sled

✓ a hacker sends a large number of NOP instructions into the buffer, appending command code
instruction at the end.
*a string of x90 characters
Privilege Escalation

✓ Vertical or Horizontal
Methods:
-SAM file in windows
-/etc/passwd in linux
-sensitive info in shared folders
-weak permissions on processes

Persistence

✓ Allows for continued and future access to the exploited target by bypassing normal
requirements.

Methods to maintain persistence

✓ -Netcat
-Meterpreter
-Registry

Common protocols used to mask data exfil

✓ -HTTP/HTTPS
-FTP
-DNS

You might also like