Summary

These notes cover various aspects of cybersecurity, including different types of attacks like social engineering, spear phishing, and wireless attacks. They also describe different types of malicious software and how to protect against them, plus how to prevent security breaches.

Full Transcript

Chapter 6 The art of social engineering comes from: Understanding Practicing Trusting your gut when to excute attack. Social engineering strategies: Assumptions Preparation Keep it simple stupid Don\'t get caught Don\'t lie Social engineering tactics: Like likes like Personality types...

Chapter 6 The art of social engineering comes from: Understanding Practicing Trusting your gut when to excute attack. Social engineering strategies: Assumptions Preparation Keep it simple stupid Don\'t get caught Don\'t lie Social engineering tactics: Like likes like Personality types Friendly Worker bees Suspicious Road blocks Authorities Events Tell me what i know Inside information Name dropping The most effective approaches: Authority Supplications Sympathy Sex appeal Greedy Two approaches to encourage someone: Threaten then Entice them Some of the spear phishing methods: Email Phone calls Text massage Walkie talkie The ultimate goal os spear fishing: To compromise the target computer Obtain the user credentials to applications Three methods to meet this ultimate goals: A phishing website to grap credentials Client side exploits Custom Trojan backdoor Using a website as part of spear phishing: Copying an existing website Directing the target to the fake site Chapter 7 Information gather to wireless recon: Target organization policy on remote workers. Anything from public resources Home address History of address Office locations Luncheon places Phases of wireless attacks: Wireless recon Attack wireless access point Attack wireless clients Certain feature when choosing the right wireless network card: Wireless standard supported Antena supported Connection types Power Chipset type Three wireless tools to perform wireless recon: Kismet Airodumps Android apps Four major wireless vanerabilites: Cracking WEP Offline brute forcing WPA preshared keys Active brute forcing of WIFi Multiple wireless vendor vulnerability Chapter 8 Examples of malware: Trojan horse Virus Worms Ransomware Ways a malware can get to the system: Removable devices Attachment Fake programs Untrusted sites and free software Techniques used to distribute malware: Black hat search engine Spearfishing sites Comprised legitimate websites How hackers use trojans: Create backdoor to gain remote access Generate fake traffic to create dos Record screenshot, audio, video of victim pc. Download Spyware and adware and malicious files Use victim machine to spam emails How to infection systems using a Trojan Create a new Trojan packet using Trojan horse construction kit. Create a dropper Create wrapper Propagate the Trojan Execute the dropper Excute the damage routine Wrappers steps: A wrapper binds a Trojan EXE with innocent looking applications The two programs are wrapped together as a single file When the user runs the wrapped EXE it installs the torjan in the background Evade anti-virus Techniques: Break the Trojan into multiple pieces and zip them as single file. Always write your own Trojan and embed it into an app. Change Trojan syntax Change the content of the Trojan using her editor. Never use Trojans downloaded from the web. Viruses are generally transmitted through: File downloads Injected flash drives Email attachment Virus charactersites: Inflict other programs Alters data Transform itself Corrupts files and programs Encrypt itself Self replication Stages of Virus life: Design Replication Launch Detection Incorporation Elimination Why flooding people Create viruses: Financial benefit Play prank Vandalism Cyber terrorism Research projects How does a computer get infected by virus: Downloading files without checking the source Opening infect email attachment Installing pirated software Not updating new versions of plug ins Not running the latest anti-virus How to detect trojans: Scan for suspicious files and folders Scan for suspicious network activities Scan for suspicious windows services Scan for suspicious device drivers Run Trojan scanner to detect trojans Trojan counter measures: Avoid opening mail attachment from unknown senders. Avoid accepting programs transferred by instant messaging. Avoid downloading from untrusted sources. Install patches and security updates Scan cds and DVD with anti-virus before using. Backdoor countermeasures: Most anti virus products can Scan and detect Backdoor programs. Educate users not install applications from untrusted sites. Use Anti virus tools to detect Backdoor. Virus and worms countermeasure: Install anti-virus that detect and remove the infection. Avoid opening attachment from unknown sender Update the anti-virus software regulary Pay attention to the instructions before downloading Schedule regular scans for all drives Chapter 9 Information obtained through sniffing: Telnet password Router configuration Ftp passwords Web traffic Email traffic Passive sniffing: means sniffing through a hub on a hub the traffic sent to all ports Active sniffing: is used to sniff a switch based network Active sniffing Techniques: Mac flooding DNS poisoning ARP poisoning Protocols vulnerable to sniffing: HTTP. Data Clear text Telnet and rlogin. Keystrokes POP. Password and data clear text IMAP. Password and data clear text SMTP and NNTP. Password and data clear text FTP. Password and data clear text types of wire tapping: Active wiretapping: monitors, records, alters and also inject something into the communication. Passive wiretapping: only monitors and records the traffic. How to defend against sniffing: Use https instead of http Use switch instead of hub Use SFTP instead of FTP Use VPN and one time passwords Retrieve mac address directly for NIC instead of OS. Chapter 10 Footprint module: Ip Range Names pace Employees Scanning module: Target assessment Identified systems Identified services Enumeration module: Intrusive probing User lists Security flaws Types of password attacks: Non electronic Attack Active online Attack Passive online Attack Offline attack Password guessing; Find a valid user Create a list of possible passwords Rank passwords from high to low probability Key in each password until the correct one discoverd How to defend against password cracking: Do not share passwords Do not use the same password during password change Do not use a password that can be found in a dictionary Set the password change policy to 30 days Do no use the default password Types of privilege escalation: Vertical privilege escalation: refers to gaining higher privileges than the existing Horizontal privilege escalation: refers to acquiring the same level of privileges that already has been granted. How to defend against privilege escalation: Use encryption technique Implement multi factor authentication Patch the system regulary How to defend against keyloggers: Use popup blocker Install anti-virus programs Install good firewall Delete phishing mails Avoid opening junk email How to defend against spywarr: Install anti-spyware Enhance the security level of the computer Regularly check the task manager report Be cautious about suspicious emails Use a firewall Techniques to cover tracks: Disable auditing Clearing logs Manipulating logs

Use Quizgecko on...
Browser
Browser