Podcast
Questions and Answers
In the context of an attack lifecycle, what is the primary goal of the 'Establish Foothold' stage?
In the context of an attack lifecycle, what is the primary goal of the 'Establish Foothold' stage?
- To escalate privileges to domain administrator level.
- To perform internal reconnaissance and map network shares.
- To gain initial access to a system within the network.
- To ensure persistent remote access to a compromised system. (correct)
An attacker successfully uses a SQL injection attack. According to the text, which stage of the attack lifecycle does this correspond to?
An attacker successfully uses a SQL injection attack. According to the text, which stage of the attack lifecycle does this correspond to?
- Maintain Presence
- Initial Compromise (correct)
- Complete Mission
- Escalate Privileges
During an investigation, analysts discover multiple backdoor variants from different families on a compromised system. Which attack lifecycle stage were the attackers most likely focusing on?
During an investigation, analysts discover multiple backdoor variants from different families on a compromised system. Which attack lifecycle stage were the attackers most likely focusing on?
- Escalate Privileges
- Maintain Presence (correct)
- Internal Reconnaissance
- Move Laterally
An attacker pivots from JMPSRV to MAIL to gain internet access. What attack lifecycle stage leverages compromised systems to access other restricted assets in a network?
An attacker pivots from JMPSRV to MAIL to gain internet access. What attack lifecycle stage leverages compromised systems to access other restricted assets in a network?
An attacker dumps password hashes and cracks domain administrator credentials. What attack lifecycle stage do these actions represent?
An attacker dumps password hashes and cracks domain administrator credentials. What attack lifecycle stage do these actions represent?
Which type of control is exemplified by the use of security policies that dictate how employees handle sensitive data?
Which type of control is exemplified by the use of security policies that dictate how employees handle sensitive data?
A company decides to implement a system that automatically redirects network traffic away from a server experiencing a denial-of-service attack. This measure is an example of which type of control?
A company decides to implement a system that automatically redirects network traffic away from a server experiencing a denial-of-service attack. This measure is an example of which type of control?
A security team discovers that an attacker has been attempting to exploit a vulnerability in their web application. They immediately deploy a patch to fix the vulnerability. Which type of harm management are they employing?
A security team discovers that an attacker has been attempting to exploit a vulnerability in their web application. They immediately deploy a patch to fix the vulnerability. Which type of harm management are they employing?
In 'Case Study #1', what initial vulnerability did the attacker exploit to gain access to the small business unit's systems?
In 'Case Study #1', what initial vulnerability did the attacker exploit to gain access to the small business unit's systems?
Using multiple layers of security controls to protect against a single threat is known as what?
Using multiple layers of security controls to protect against a single threat is known as what?
Following the initial SQL injection in 'Case Study #1', what action did the attacker take to ensure continued access to the corporate environment?
Following the initial SQL injection in 'Case Study #1', what action did the attacker take to ensure continued access to the corporate environment?
Which of the following is an example of a technical control?
Which of the following is an example of a technical control?
In 'Case Study #1', what was the primary purpose of the keystroke-logging malware installed by the attacker?
In 'Case Study #1', what was the primary purpose of the keystroke-logging malware installed by the attacker?
Which capability was NOT attributed to the BKDOOR malware?
Which capability was NOT attributed to the BKDOOR malware?
What security measure did the attacker bypass to access sensitive financial data?
What security measure did the attacker bypass to access sensitive financial data?
How did the attacker initially attempt to gain a foothold in the targeted network?
How did the attacker initially attempt to gain a foothold in the targeted network?
What was the significance of the jump server (JMPSRV) in the attacker's strategy?
What was the significance of the jump server (JMPSRV) in the attacker's strategy?
Which encryption algorithm did the BKDOOR malware use to protect its command-and-control communications?
Which encryption algorithm did the BKDOOR malware use to protect its command-and-control communications?
What type of data was the attacker primarily interested in stealing from the financial environment?
What type of data was the attacker primarily interested in stealing from the financial environment?
Which of the following scenarios represents a compromise of integrity in a computer system?
Which of the following scenarios represents a compromise of integrity in a computer system?
How did the attacker configure the BKDOOR malware instances to communicate with the PROXY malware?
How did the attacker configure the BKDOOR malware instances to communicate with the PROXY malware?
What is the relationship between vulnerability, threat, and attack?
What is the relationship between vulnerability, threat, and attack?
What technique did the BKDOOR malware employ to maintain persistence on compromised systems?
What technique did the BKDOOR malware employ to maintain persistence on compromised systems?
An attacker requires method, opportunity, and motive to launch a successful attack. Which of the following scenarios demonstrates the removal of opportunity as a factor?
An attacker requires method, opportunity, and motive to launch a successful attack. Which of the following scenarios demonstrates the removal of opportunity as a factor?
Which of the following best describes the purpose of risk management in computer security?
Which of the following best describes the purpose of risk management in computer security?
Which of the following scenarios primarily demonstrates a violation of confidentiality?
Which of the following scenarios primarily demonstrates a violation of confidentiality?
Consider a scenario where a company's database is encrypted to protect sensitive information. Which security goal is most directly addressed by this measure?
Consider a scenario where a company's database is encrypted to protect sensitive information. Which security goal is most directly addressed by this measure?
A hospital uses a complex authentication system to allow doctors access to patient records from remote locations. Despite this, a doctor's account is compromised, and patient data is leaked. Which security principle was most likely poorly implemented or circumvented?
A hospital uses a complex authentication system to allow doctors access to patient records from remote locations. Despite this, a doctor's account is compromised, and patient data is leaked. Which security principle was most likely poorly implemented or circumvented?
A company implements redundant servers and backup power systems to ensure that its critical applications remain accessible even during outages. Which security goal is being primarily addressed?
A company implements redundant servers and backup power systems to ensure that its critical applications remain accessible even during outages. Which security goal is being primarily addressed?
Flashcards
Computer Security
Computer Security
Protection of computer assets (hardware, software, data) that you value.
Vulnerability
Vulnerability
A weakness in a system's design, implementation, or procedures that can be exploited.
Threat
Threat
Circumstances that COULD cause loss or harm to a computing system/asset.
Harm
Harm
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Control (Countermeasure)
Control (Countermeasure)
Signup and view all the flashcards
Preventative Control
Preventative Control
Signup and view all the flashcards
Deterrent Control
Deterrent Control
Signup and view all the flashcards
Deflective Control
Deflective Control
Signup and view all the flashcards
Mitigative Control
Mitigative Control
Signup and view all the flashcards
Detective Control
Detective Control
Signup and view all the flashcards
Physical Controls
Physical Controls
Signup and view all the flashcards
Procedural/Administrative Controls
Procedural/Administrative Controls
Signup and view all the flashcards
Initial Compromise
Initial Compromise
Signup and view all the flashcards
Establish Foothold
Establish Foothold
Signup and view all the flashcards
Escalate Privileges
Escalate Privileges
Signup and view all the flashcards
Internal Reconnaissance
Internal Reconnaissance
Signup and view all the flashcards
Move Laterally
Move Laterally
Signup and view all the flashcards
BKDOOR Malware
BKDOOR Malware
Signup and view all the flashcards
RC4 Algorithm
RC4 Algorithm
Signup and view all the flashcards
C2 Server
C2 Server
Signup and view all the flashcards
DLL Search Order Hijacking
DLL Search Order Hijacking
Signup and view all the flashcards
PROXY Malware
PROXY Malware
Signup and view all the flashcards
Jump Server (JMPSRV)
Jump Server (JMPSRV)
Signup and view all the flashcards
PCI Data
PCI Data
Signup and view all the flashcards
Attacker's Strategy
Attacker's Strategy
Signup and view all the flashcards
Study Notes
Introduction to Computer Security
- Computer security protects computer assets or systems that are valued.
- Security protection is required for hardware, software, and data contained in computer systems because they have value.
Key Concepts: Vulnerabilities, Threats, and Controls
- A vulnerability is a weakness that can be exploited to cause loss or harm in a system's procedures, design, or implementation.
- A threat is a set of circumstances with the potential to cause loss or harm to a computing system.
- Potential harm to assets can be assessed by examining possible negative events and their causes.
- Risk management involves choosing threats to control and allocating resources for protection.
- Harm is the negative consequence of a threat becoming real and being actualized.
Cyber Attackers
- An attack on a system is perpetrated by a human exploiting a vulnerability.
- An attack can also be launched by another system.
- To be successful, a malicious attacker requires a method, an opportunity, and a motive.
- One can prevent the success of an attack if deny any of the method, the opportunity, and the motive from an attacker.
- Attackers include terrorists, hackers, organized crime members, and individuals.
Security Goals
- Confidentiality ensures only authorized parties can view an asset.
- Integrity ensures an asset is modified only by authorized parties.
- Availability ensures authorized parties can use an asset.
Controls
- It is possible to Control vulnerabilities by using a control or countermeasure as protection to prevent threats.
- Harm can be dealt with by preventing, deterring, deflecting, mitigating, detecting, or recovering from its effects.
Types of Security Controls
- Physical controls: use tangible means to stop or block an attack, such as fences, locks, guards, sprinklers, and fire extinguishers.
- Procedural or administrative controls: use commands or agreements to influence behavior, like laws, regulations, policies, procedures, guidelines, copyrights, patents, and contracts.
- Technical controls: counter threats with technology such as hardware and software, including passwords, access controls, network protocols, firewalls, intrusion detection systems, encryption, and network traffic flow regulators.
- Overlapping controls or defense in depth can be effective, even when there is more than one class of control.
Attack Lifecycle
- Common phases: initial comprise, establish foothold, escalate privileges, internal recon, move laterally, maintain presence, and complete mission.
Case Study #1: Show Me the Money
- In early January, an attacker exploited a SQL injection vulnerability on a web page hosted by WEB1.
- WEB1 was in a demilitarized zone (DMZ) for a small business unit.
- Exploiting the vulnerability allowed the attacker to execute commands on the backend DB1 database system.
- The attacker implanted a backdoor one week post internal access.
- The backdoor gave access to the corporate environment without the necessity to re-use SQL injection.
- The attacker extracted and cracked DB1's local administrator account's password hash to obtain local administrative access to the majority of the systems in the environment.
- The attacker installed keystroke-logging malware following reconnaissance efforts.
- By mid-February, 20 backdoors or more were put in place by the attacker.
- The BKDOOR malware family facilitated modification to evade antivirus detection, file control, Remote Desktop Protocol (RDP) tunneling, and network traffic proxying.
- The RC4 algorithm was used by the BKDOOR malware to encrypt command and control functions (C2) to a server outside the controlled environment of the victim, for use by the attacker.
- The BKDOOR malware maintained persistence via "DLL search order hijacking.”
- The second malware family, PROXY, proxied connections to a specified location.
- The attacker targeted usernames, passwords, network architecture data, and other IT data
- The attacker obtained data on how the company managed financial information to plan the next course of action.
- The attacker exfiltrated data using outbound FTP and transferred data to the backdoor's C2 server.
- Attackers discovered JMPSRV jump server in June, it is limited system used to give system administrators with access to sensitive segements handling all the financial information.
Initial Compromise
- The attacker used a SQL injection attack against a vulnerable database server.
Establish Foothold
- The attacker ensures remote access to a recently compromised system.
- Backdoor malware was established on a system within the internal environment.
Escalate Privileges
- The attacker used password hash dumping before cracking them for domain admin access.
Internal Reconnaissance
- The attackers manually explored local user directories.
Move Laterally
- The attacker leveraged RDP connections, mapped network shares, and interacted with backdoors.
Maintain Presence
- The attacker implanted different backdoor variants.
- Each family operates uniquely, evading single-point detection.
Complete Mission
- The the attacker stole the cardholder data.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore computer security fundamentals including vulnerabilities, threats, and controls. Learn how vulnerabilities can be exploited, threats can cause harm, and the role of risk management in protection. Understand the nature and actors involved in cyber attacks on computer systems.