All the related info for the Domain 1 of the Cyber Security + CompTIA
Physical Attacks Examples
Tailgating
Shoulder Surfing
Dumpster diving
Target individual
Ear Dropping
Physical Smart cards
Malicious USB devices
Eliciting Information
Casual Conversating
Talking about ourselves.
Offering Advice.
Disagreement
Provocative statements.
Bracket
make vague statement
flattery
False Statement
Artificial Ignorance
Complaining
Phising
Give up personal info
Spear Phishing
Target Specific groups with Phishing
Whaling
Target top executives
Vishing
phishing over voice messages
Smishing
phishing over text
Spam
unsolicited email. aka irritant
Spim
Spam over messaging
Attract Vectors
Methods of attack
Example of Attract Vectors
Direct Access, Wireless, Emails, Supply Chain, Social Media, Cloud
Social Engineering Attacks
2 types, Physical Attacks | Virtual Attacks
Physical Attacks in Social Engineering
Tailgating, Shoulder Surfing, Dumpster diving, Eliciting Information
Virtual Attacks in Social Engineering
Phishing, Spear Phishing, Whaling, Vishing, Hoax, Watering Whole Attack
Hoax
intent is to frighten and mislead recipients and get them to do something with fear
watering whole attacks
Targets groups of users by infecting websites that they commonly visit
pharming
online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.
Shadow IT
good intended actions like using tool to make you job efficient but it will turn out bad cause it is not in the policies
Threat Intelligence Sources: Cyber-threat intelligence gathering examples
Open-Source Intelligence (OSINT)
Closed/proprietary
Vulnerability Databases
Public/Private info sharing
Dark Web
Indicators of compromise
Automated Indicators Sharing (AIS)
Structured Threat Information Expression(STIX)/Trusted Automated Exchange of Intelligence Infor (Taxii)
Predictive ANalysis
THreat Maps
File/code Repositories
Open Source Intelligence (OPINT)
Cyber-threat intelligence gathering free of charge.
Closed/Proprietary
Vendor-Specific threat intelligence limited to paying customers
Vulnerability Database
sources that shows known vulnerabilities.
Public/Private Information Sharing Center
Any group that shares Cyber intelligence in various forms
Dark Web
So yeah. You know it.
Indicator of Compromises
Pieces of forensic Data
Automated Indicator Sharing(AIS)
allows organizations to share and access real-time cyber threat intelligence and threat information without revealing sensitive detail about their networks and systems.
Trusted Automated Exchange of Intel Info Taxii
Standard how AIS share via services/ message Exchange
STIX
using TAXII and define the APi for AIS aka language for TAXII
Predictive Analysis
to make data-driven decisions based on heuristics and patterns from previous events
Threat maps
real time map of the computer security attacks
File/code Repositories
Code share like GitHub
Vendor’s Website
Vendors keep track the Vulnera
Vulnerability feed
security operations by providing data about security vulnerabilities and related cyber threat intelligence to reduce cyber risks and streamline investigation and response.
Conference
Network with experts
Academic Journal
Paper bout Cyber Attacks
request for comments RFC
specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
Local Groups
learn people from near you.
Threat Feed
Free/Paid delivery info about the important threats to you
TTP
Tactic, technique, procedures for hackers
Threat Hunting
Dynamic ways to find/hunt Cyber Threats inside of the network
Intelligence
Gov and industry gather’s, analyze and share info about threat of cyber kind
Threat Feed
Enables organi informed about indicators of compromise IOCs
Advisories/Bulletin
Gov/private share how to defend from cyber threats
Credential Scan
powerful and higher privilege's that a non credential scanner. Goal to find exploits that related to privilege's access
Non-Credentialed Scan
Scan for lower credentialed Scanner where attacker would easily find
Maneuver
org disguising its sys so hard to find them infor
Non-Intrusive Scan
Passive and merely Report vulnerabilities
Intrusive Scan
damageful cause it tries to exploit the vulnerability
Configuration Review
Config compliance Scanner
Network Scan
scan at computer/devices on yout network
Application Scanner
vulner for apps
Web App Scan
be like a search engine looking for vulera
Common Vulnera and Exposures CVS
list of publicly document disclosed vulnera
Common Vulnera Scoring System
over all score for the volunra
Secruity Infor Event Manager SIEM
a sys where all the collected data that real time monitor, analysis, correlations and notification of protentional attack
Security Orchesration Automation and Response
Centralized Aler/Responce automation with in specific threat by learning from ML AI and SIEM
SIEM functionalities
Log Collectors = collects info from syslog and servers
Log Aggregation = Correlate and aggregate events for future identifying attacks
Packer Capture = Packet capture and analysis in the local network
Data Inputs = Collects data from massive of data from various sources
User Entity Behavior Analysis = normal behaviors from a user
Sentiment Analysis = AI and ML to identify attacks
Security Monitoring = Real-time protection and event monitoring
Event Reporting = place that has all the essential for the function and report of event
AI
Does Smart Task combining ML and DL
ML
Subset of AI, algorithms that improves over time by experience and use of data
DL
Subfield of ML that function as Artificial Neural Networks
SOAR
de
Lateral movement
move to other devices after the initial access
pivoting
aka island hopping
Passive reconnaissance
Getting intel without interacting directly with target. Purpose is that target does not know being targeted
Passive Reconnaissance Examples
war driving
Drone
War flying
OSINT
Active Reconnaissance
get intel by directly interacting with target where target might notice for being target
Active Reconnaissance
ping Sweep
Tracert Analysis
Nmap
Extracting DNS info
Foot Printing
technique to gather info to use in for penetrations
Testing Teams
White team = judges
purple = process improvements by intermediary between blue and read teams