Security+ Week 3
Security+ Week 3
SY0-701
Attention Attendees:
Remember to type your messages to all panellists and attendees
Course Structure
Week / Module 1
Introduction & Security Fundamentals
Week / Module 2
Compliance & Operational Security
Week / Module 3
Threats & Vulnerabilities
Week / Module 4
Application, Data & Host Security
Attention Attendees:
Remember to type your messages to all panellists and attendees
Lab Prep
Download Parrot Sec (Security Edition) from https://www.parrotsec.org/download/
I use VirtualBox, but there are other options.
Vulnerability Management
Device & OS Vulnerabilities
Operating System Vulnerabilities
Vulnerabilities in an OS can lead to significant problems when successfully exploited
• Microsoft Windows Client and Server
• Apple macOS
• Linux
• Android
• iOS
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vulnerability Types
• Legacy Systems
• End-of-Life (EOL) Systems
• Firmware Vulnerabilities
• Virtualization Vulnerabilities
• Application Vulnerabilities
Attention Attendees:
Remember to type your messages to all panellists and attendees
Zero-Day Vulnerabilities
• Previously unknown software or hardware flaws.
• Developers have "zero days" to fix once the vulnerability becomes known
• Traditional security measures like antivirus and firewalls are often ineffective
Attention Attendees:
Remember to type your messages to all panellists and attendees
Misconfiguration Vulnerabilities
Common cause of security vulnerabilities
• Default configurations
• Hardware/devices
• Software
• Cloud services
• Using search engine results to solve technical problems
Attention Attendees:
Remember to type your messages to all panellists and attendees
Cryptographic Vulnerabilities
Cryptography forms the backbone of secure communication
Attention Attendees:
Remember to type your messages to all panellists and attendees
Sideloading, Rooting, and Jailbreaking
Rooting and jailbreaking are methods used to gain elevated privileges on mobile devices
• Rooting - gaining root access or administrative privileges on an Android device
• Jailbreaking - gaining full access to an iOS device (iPhone or iPad)
• Sideloading - installing applications from sources other than the official app store
• F-Droid
• Android APK (Android Application Package) files
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vulnerability Management
Application and Cloud Vulnerabilities
Application Vulnerabilities
• Race Condition
• Time-of-check to time-of-use (TOCTOU)
• Memory Injection
• Buffer Overflow
• Type-Safe Programming Languages
• Malicious Update
When executed normally, a function will return control to the calling function. If the
code is vulnerable, an attacker can pass malicious data to the function, overflow the
stack, and run arbitrary code to gain a shell on the target system.
Attention Attendees:
Remember to type your messages to all panellists and attendees
Evaluation Scope
Attention Attendees:
Remember to type your messages to all panellists and attendees
Cloud-based Application Attacks
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vulnerability Management
Vulnerability Identification Methods
Vulnerability Scanning
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vulnerability Scanning (cont’d)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Threat Feeds
Attention Attendees:
Remember to type your messages to all panellists and attendees
Threat Feeds
Attention Attendees:
Remember to type your messages to all panellists and attendees
Deep and Dark Web
• Deep Web
• Any part of the World Wide Web that is not
indexed by a search engine
• Dark Net
• A network established as an overlay to
Internet infrastructure, such as The Onion
Router (TOR), Freenet, or I2P, that acts to
anonymize usage
• Dark Web
• Sites, content, and services accessible only
over a dark net
Using the TOR browser to view the AlphaBay market, now closed by law
enforcement. (Screenshot used with permission from Security Onion.)
Attention Attendees:
Remember to type your messages to all panellists and attendees
Other Vulnerability Assessment Methods
• Penetration Testing
• Unknown environment (previously black box) testing
• Known environment (previously white box) testing
• Partially known environment (previously gray box) testing
• Bug Bounties
• Auditing
Attention Attendees:
Remember to type your messages to all panellists and attendees
Vulnerability Management
Vulnerability Analysis and Remediation
Common Vulnerabilities and Exposures
Attention Attendees:
Remember to type your messages to all panellists and attendees
False Positives, False Negatives, and Log Review
• False Positive
• Scanner or another assessment tool
incorrectly identifies a vulnerability
• False Negatives
• Vulnerabilities that go undetected
in a scan
• Validate vulnerability reports by
examining logs
Attention Attendees:
Remember to type your messages to all panellists and attendees
Indicators of Malicious Activity
Malware Attack Indicators
Malware Classification
Attention Attendees:
Remember to type your messages to all panellists and attendees
Computer Viruses
Attention Attendees:
Remember to type your messages to all panellists and attendees
Computer Worms and Fileless Malware
• Ransomware
• Nuisance (lock out user by
replacing shell)
• Crypto-malware
• High impact ransomware (encrypt data
files or drives)
• Cryptomining/crypojacking
• Hijack resources to mine cryptocurrency
• Logic bombs
Attention Attendees:
Remember to type your messages to all panellists and attendees
TTPs and IoCs
Attention Attendees:
Remember to type your messages to all panellists and attendees
Indicators of Malicious Activity
Physical and Network Attack Indicators
Physical Attacks
• Brute force
• Physical denial of service
• Breaking into premises/cabinets
• Environmental
• RFID cloning and skimming
• Radio Frequency Identification (RFID) and Nearfield
Communications (NFC)
• Contactless cards, badges, and fobs
• Static tokens versus cryptoprocessors
Attention Attendees:
Remember to type your messages to all panellists and attendees
Network Attacks
Attention Attendees:
Remember to type your messages to all panellists and attendees
Distributed Denial of Service Attacks
Attention Attendees:
Remember to type your messages to all panellists and attendees
Domain Name System Attacks
Attention Attendees:
Remember to type your messages to all panellists and attendees
Wireless Attacks
Attention Attendees:
Remember to type your messages to all panellists and attendees
Password Attacks
Attention Attendees:
Remember to type your messages to all panellists and attendees
Lab
Vulnerability Scan
- Go to www.tenable.com/downloads/nessus
- Run sudo dpkg –i Nessus-10.7.4-ubuntu404_amd64.deb
- Run /bin/systemctl start nessusd.service
Social Engineering Toolkit
Questions
Attention Attendees:
Remember to type your messages to all panellists and attendees