InfoSecRevision (2)
InfoSecRevision (2)
Introduction to
Information Security
MIDTERM THEORY
[email protected]
WEEK 1
Implementation
• Encrypting sensitive data and only providing key to those who need access
• Information classification labeling (Top Secret, restricted )
• Access controls over systems (ACLs)
• Encrypting credit card transactions on eCommerce systems
Breach
• Misconfigured file shares – (everyone READ)
• Capturing personal data on a hidden web site directory
• Leaving your bag on the train or bus
Integrity
Protecting accuracy, completeness and consistency of information, Protecting
information from unauthorized modification.
Implementation
Breach
Implementation
ISO27001
ISO2700x Series of standards stem from both Information Security and Risk
Management worlds, it is necessary to merge concepts from both fields in order
to properly address the Information Security Risks.
ISO31000
The ISO31000 international standard is for general risk management, including the
principles and guidelines for managing risk
WEEK 2
• Internal context: These contexts define the supporting assets and their
main vulnerabilities
Malware kits are available online (freeware & paid subscription) they can
create viruses, phishing attacks, etc.
Internal context
• Bring your own device (BYOD)
• Cloud computing: makes it necessary to define exactly in which country
data is stored
• Social Networks: users are prone to leak a variety of information through
them
• Recognition in a global cause
Zero-day
It’s a term given to attacks that are unknown, so from day zero once the
organization becomes aware of the breach, there’s a count of days until its
resolved.
Ethical Hacking
Ethical hacking involves all hacking techniques and it aims at a larger project by
breaching more than one target system including several different techniques.
It is performed by a company or individual to help identify potential threats on a
computer or network. The ethical hacker attempts to bypass the system's security
to search for any weak points that could be exploited by malicious hackers. This
information is then used by the organization to improve the system security and
minimize any potential attacks.
Risk management
Factors for Mitigating Threats: Size, finances, reputation, market position, data
sensitivity.
WEEK 3
Attacker Objectives
Approach
A structured approach is the typical methodology, there are several phased
approaches.
The timescale is non-specific as it takes time to access and gather the correct
information to avoid detection.
Legal compliance
Contracts should include clauses for non-disclosure and limited liability.
Ensure that scope tests are accurate.
Establish fail-safe procedures before conducting the testing.
Do not use Fear, Uncertainty or Doubt to sell services.
Stay updated on current legal issues.
Other threats
They include: physical threats, natural events, internal criminal activity, and
malware.
Malware
Ethical hacking improves security, identifies vulnerabilities, and controls malware.
There are various tools that create viruses, the object now will be to sample these
tools using automated and manual methods to create viruses.
WEEK 4
Testing Rules
Testing rules are a set of agreed-upon rules between parties involved in testing.
They define limitations and boundaries of the testing environment.
The rules specify which systems or parts of the network can be used for
operational purposes during the test.
Agreements on the test scope and rules may require legal documentation.
Each client may prioritize either the test scope or the rules based on their specific
requirements.
Deviating from the agreed rules or test scope can lead to system downtime,
financial and reputational damage, and potential legal consequences.
Test awareness
Two types of tests can take place: announced or unannounced.
Announced tests are pre-planned and IT departments are given notice of intent
to conduct the test.
Gathering information (network and host)
For gathering information Google is a useful tool to gather info about a company
or organization. It can return information on the main domain (your target) as
well as other services they provide.
Google Advanced Search and using operators can also return useful results.
You can use other methods to gather more information about an organization.
There several methods, these can include:
• Maps (e.g. Google Maps or Google Earth)
• Social Networking (e.g. Facebook, Twitter, LinkedIn)
• Physical searching (e.g. searching in trash)
• Social Engineering (e.g. Faking entry to a building)
Ensure that it is legal!
Lookup (network-tools.com)
The Lookup will give you an IP address.
You can then perform a whois with various tools to find out more.
Scanning
Scanning a target environment can create an inventory of possible machines to
attack. It also allows the evaluation of those systems to find vulnerabilities.
The purpose of scanning is to learn more about the target by interacting with
them to find possible vulnerabilities which minimizes the risk of being detected.
This is achieved by determining:
• Network addresses of live hosts (servers and clients), firewalls, routers,
switches, etc.
• Network topology of target environment.
• Operating system types.
• Open ports and network services
Network Scanning
There are several techniques which are used, including:
• Network sweeping
• Network mapping
• Port scanning
• OS fingerprinting
• Version scanning
• Vulnerability scanning
Network Mapping
Network mapping is the process of identifying and listing all hosts, servers, or
clients within a network.
Nmap is a commonly used network mapping tool with various scanning
techniques.
Port scanning is one technique used in network mapping, which involves scanning
for open ports on remote hosts. It provides information about which ports on
specific machines are actively listening.
Listener processes are the services provided by machines on the network.
Network mapping helps gain an understanding of the network's structure and the
devices connected to it.
False positives
Scanning tools can give you what is known as ‘false positives’
False positives are correct, or true, results that are, in fact, incorrect
E.g. the scanning tool may run a scan that returns 10 listening ports. After
investigation, you discover that only 9 of them are listening. Therefore, 1 port is a
false positive.
When scanning, it is important to try to make it as effective and insightful as
possible and with experience you will find your own method
Whilst scanning, run a sniffer
Running a sniffer at the same time as a scan allows you to monitor network
activity. E.g. displaying packet data on screen that you can monitor.
There are several tools you can use, a common tool in use is tcpdump
tcpdump
Tcpdump is a command-line-based sniffer that comes with most versions of Linux.
It allows you to analyse network traffic by capturing packets. It also allows basic
filtering of certain traffic
It is freeware and can sniff on various protocols (IP, TCP, UDP, ICMP)
Wireshark
Wireshark is the world’s foremost and widely-used network protocol analyser.
It is a free and open-source packet analyzer.
It’s used for network troubleshooting analysis, software and Communications
protocol development, and education.
WEEK 5
Nmap
Port scanning is useful but only indicates that something is listening.
Network mapping compliments port scanning and the Nmap tool includes this
feature in addition to:-
• Host discovery
• Operating System detection
• Version detection
• Scriptable interaction with the target
Nmap adopts techniques to identify host and network applications and services
after a port scan. It utilizes a technique called “fingerprinting”.
This technique is used when Nmap cannot identify an application.
The application fingerprint can then be submitted to the Nmap database.
Over time, the database grows and becomes more capable of identifying such
applications.
Summary
• Nmap is a powerful tool with both command line and GUI capability.
• It can be used for; port scanning, TCP and UDP scanning, operating system
and version identification, etc.
• You can also save the output of scans.
• It allows both a network and system administrator to determine what can
be seen from the outside i.e. by a potential attacker.
• They can then do something about this.
• Scans should be run frequently to see if there are any changes, particularly
after system upgrades.
• From an attacker’s point of view, it can be useful as it will give more
network mapping details & operating system versions) on the target
network.
WEEK 6
Gaining access
Once you have identified possible points to attack, access is required (commonly
known as ‘exploitation’).
Risks of exploitation
• service or system crashes
• compromised system stability
• integrity
• data exposure
Exploits can be categorized as server-side (attacking network services), client-side
(attacking client applications), or local privilege escalation (increasing attacker
privileges within the network).
Metasploit
It’s a free, open-source exploitation framework used for gaining access.
Metasploit uses exploits and payloads to take advantage of vulnerabilities and
execute desired actions on the target machine.
It can run on Linux, Mac OS, and Windows operating systems.
WEEK 7
Cryptography The art of creating and implementing secret codes and cypher.
It is one possible tool to bring appropriate countermeasures
Legitimate user
Legitimate users take advantage of cryptography to preserve the security of
information to be shared.
Encryption is the process of a legitimate user encoding information, with the help
of a secret (human-oriented) or key (machine-oriented). It helps protect
information, by preventing unauthorized parties from accessing it.
Encryption transforms the original information (plaintext) into an unintelligible
chain of signal elements (ciphertext)
Encryption doesn't prevent hacking but it prevents the hacker from reading the
data that is encrypted.
Encryption algorithm and key together, form an encryption scheme
Encryption scheme is carried by an encryption function, which is packaged in an
encryption tool.
Encryption methods
• Substitution: In this method, characters in the plaintext are replaced with
different characters. E.g. Caesar cipher.
• Transposition: The transposition method involves rearranging the characters of
the plaintext to form the ciphertext.
• Polyalphabetic: Uses multiple substitution alphabets. It replaces characters in
the plaintext based on position or other factors, enhancing security.
• Running Key: In the running key encryption, characters in both the message
and the key are converted to numeric values and added together.
Decryption is the process of a legitimate user decoding primarily encrypted
information, with the help of a secret or key.
Decryption transforms the ciphertext back to plaintext
Cryptanalysis is the art of deriving plaintext from ciphertext, without the use of a
secret or key.
One-way hash
Information is transformed into unreadable and cannot be decrypted.
Only comparisons between hashes can be performed.
e.g. password checking
Steganography:
The main disadvantage of traditional cryptography is that ciphered text is that It’s
recognised easily by : protocol analysis and statistical analysis.
Steganography is the technique of hiding information in another piece of
information. In any place where bits are left unused OR header can be expanded
artificially. Also it can be spreaded over multiple files.