Uploaded by Anthony Debs

study viewer

advertisement
Professor Messer’s
SY0-601 CompTIA
Security+ Course Notes
James “Professor” Messer
hƩp://www.ProfessorMesser.com
Professor Messer’s SY0-601 CompTIA Security+ Course Notes
WriƩen by James “Professor” Messer
Copyright © 2020 by Messer Studios, LLC
hƩp://www.ProfessorMesser.com
All rights reserved. No part of this book may be reproduced or transmiƩed in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any informaƟon storage and retrieval
system, without wriƩen permission from the publisher.
First EdiƟon: November 2020
This is version 1.05
Trademark Acknowledgments
All product names and trademarks are the property of their respecƟve owners,
and are in no way associated or aĸliated with Messer Studios, LLC.
“Professor Messer” is a registered trademark of Messer Studios LLC.
“CompTIA” and “Security+” are registered trademarks of CompTIA, Inc.
Warning and Disclaimer
This book is designed to provide informaƟon about the CompTIA SY0-601 Security+ cerƟĮcaƟon exam.
However, there may be typographical and/or content errors. Therefore, this book should serve only as a
general guide and not as the ulƟmate source of subject informaƟon. The author shall have no liability or
responsibility to any person or enƟty regarding any loss or damage incurred, or alleged to have incurred,
directly or indirectly, by the informaƟon contained in this book.
Contents
1.0 - AƩacks, Threats, and VulnerabiliƟes
1.1 - Phishing
1.1 - ImpersonaƟon
1.1 - Dumpster Diving
1.1 - Shoulder SurĮng
1.1 - Hoaxes
1.1 - Watering Hole AƩacks
1.1 - Spam
1.1 - InŇuence Campaigns
1.1 - Other Social Engineering AƩacks
1.1 - Principles of Social Engineering
1.2 - An Overview of Malware
1.2 - Viruses and Worms
1.2 - Ransomware and Crypto-malware
1.2 - Trojans and RATs
1.2 - Rootkits
1.2 - Spyware
1.2 - Bots and Botnets
1.2 - Logic Bombs
1.2 - Password AƩacks
1.2 - Physical AƩacks
1.2 - Adversarial ArƟĮcial Intelligence
1.2 - Supply Chain AƩacks
1.2 - Cloud-based vs. On-Premises AƩacks
1.2 - Cryptographic AƩacks
1.3 - Privilege escalaƟon
1.3 - Cross-site ScripƟng
1.3 - InjecƟon AƩacks
1.3 - Buīer OverŇows
1.3 - Replay AƩacks
1.3 - Request Forgeries
1.3 - Driver ManipulaƟon
1.3 - SSL Stripping
1.3 - Race CondiƟons
1.3 - Other ApplicaƟon AƩacks
1.4 - Rogue Access Points and Evil Twins
1.4 - Bluejacking and BluesnarĮng
1.4 - Wireless DisassociaƟon AƩacks
1.4 - Wireless Jamming
1.4 - RFID and NFC AƩacks
1.4 - Randomizing Cryptography
1.4 - On-Path AƩacks
1.4 - MAC Flooding and Cloning
1.4 - DNS AƩacks
1.4 - Denial of Service
1
1
1
2
2
3
3
3
4
4
5
5
6
7
7
8
8
8
9
9
10
11
11
12
12
12
13
13
14
14
15
16
17
17
18
19
19
19
20
20
20
21
21
21
22
1.4 - Malicious Scripts
1.5 - Threat Actors
1.5 - AƩack Vectors
1.5 - Threat Intelligence
1.5 - Threat Research
1.6 - Vulnerability Types
1.6 - Third-party Risks
1.6 - Vulnerability Impacts
1.7 - Threat HunƟng
1.7 - Vulnerability Scans
1.7 - Security InformaƟon and Event Management
1.8 - PenetraƟon TesƟng
1.8 - Reconnaissance
1.8 - Security Teams
2.0 - Architecture and Design
2.1 - ConĮguraƟon Management
2.1 - ProtecƟng Data
2.1 - Data Loss PrevenƟon
2.1 - Managing Security
2.1 - Site Resiliency
2.1 - Honeypots and DecepƟon
2.2 - Cloud Models
2.2 - Edge and Fog CompuƟng
2.2 - Designing the Cloud
2.2 - Infrastructure as Code
2.2 - VirtualizaƟon Security
2.3 - Secure Deployments
2.3 - Provisioning and Deprovisioning
2.3 - Secure Coding Techniques
2.3 - SoŌware Diversity
2.3 - AutomaƟon and ScripƟng
2.4 - AuthenƟcaƟon Methods
2.4 - Biometrics
2.4 - MulƟ-factor AuthenƟcaƟon
2.5 - Disk Redundancy
2.5 - Network Redundancy
2.5 - Power Redundancy
2.5 - ReplicaƟon
2.5 - Backup Types
2.5 - Resiliency
2.6 - Embedded Systems
2.6 - Embedded Systems CommunicaƟon
2.6 - Embedded Systems Constraints
2.7 - Physical Security Controls
2.7 - Secure Areas
23
23
24
25
26
27
28
29
30
30
31
32
32
33
33
33
34
35
35
36
37
37
38
39
40
41
41
42
42
43
44
44
45
46
47
47
47
48
48
49
50
51
52
52
54
2.7 - Secure Data DestrucƟon
2.8 - Cryptography Concepts
2.8 - Symmetric and Asymmetric Cryptography
2.8 - Hashing and Digital Signatures
2.8 - Cryptographic Keys
2.8 - Steganography
2.8 - Quantum CompuƟng
2.8 - Stream and Block Ciphers
2.8 - Blockchain Technology
2.8 - Cryptography Use Cases
2.8 - Cryptography LimitaƟons
3.0 - ImplementaƟon
3.1 - Secure Protocols
3.2 - Endpoint ProtecƟon
3.2 - Boot Integrity
3.2 - Database Security
3.2 - ApplicaƟon Security
3.2 - ApplicaƟon Hardening
3.3 - Load Balancing
3.3 - Network SegmentaƟon
3.3 - Virtual Private Networks
3.3 - Port Security
3.3 - Secure Networking
3.3 - Firewalls
3.3 - Network Access Control
3.3 - Proxies
3.3 - Intrusion PrevenƟon
3.3 - Other Network Appliances
3.4 - Wireless Cryptography
3.4 - Wireless AuthenƟcaƟon Methods
3.4 - Wireless AuthenƟcaƟon Protocols
3.4 - Installing Wireless Networks
3.5 - Mobile Networks
3.5 - Mobile Device Management
3.5 - Mobile Device Security
3.5 - Mobile Device Enforcement
3.5 - Mobile Deployment Models
3.6 - Cloud Security Controls
3.6 - Securing Cloud Storage
3.6 - Securing Cloud Networks
3.6 - Securing Compute Clouds
3.6 - Cloud Security SoluƟons
3.7 - IdenƟty Controls
3.7 - Account Types
3.7 - Account Policies
55
55
56
57
58
59
59
60
61
62
63
63
63
65
65
66
67
68
69
69
70
73
74
75
76
76
77
78
79
79
80
81
82
83
84
85
86
86
87
87
88
88
89
89
90
3.8 - AuthenƟcaƟon Management
3.8 - PAP and CHAP
3.8 - IdenƟty and Access Services
3.8 - Federated IdenƟƟes
3.8 - Access Control
3.9 - Public Key Infrastructure
3.9 - CerƟĮcates
3.9 - CerƟĮcate Formats
3.9 - CerƟĮcate Concepts
4.0 - OperaƟons and Incident Response
4.1 - Reconnaissance Tools
4.1 - File ManipulaƟon Tools
4.1 - Shell and Script Environments
4.1 - Packet Tools
4.1 - Forensic Tools
4.2 - Incident Response Process
4.2 - Incident Response Planning
4.2 - AƩack Frameworks
4.3 - Vulnerability Scan Output
4.3 - SIEM Dashboards
4.3 - Log Įles
4.3 - Log Management
4.4 - Endpoint Security ConĮguraƟon
4.4 - Security ConĮguraƟons
4.5 - Digital Forensics
4.5 - Forensics Data AcquisiƟon
4.5 - On-Premises vs. Cloud Forensics
4.5 - Managing Evidence
5.0 - Governance, Risk, and Compliance
5.1 - Security Controls
5.2 - Security RegulaƟons and Standards
5.2 - Security Frameworks
5.2 - Secure ConĮguraƟons
5.3 - Personnel Security
5.3 - Third-party Risk Management
5.3 - Managing Data
5.3 - CredenƟal Policies
5.3 - OrganizaƟonal Policies
5.4 - Risk Management Types
5.4 - Risk Analysis
5.4 - Business Impact Analysis
5.5 - Privacy and Data Breaches
5.5 - Data ClassiĮcaƟons
5.5 - Enhancing privacy
5.5 - Data Roles and ResponsibiliƟes
91
91
92
93
93
94
95
96
97
98
98
99
100
100
101
101
103
104
104
105
105
106
107
107
108
109
110
111
111
111
112
112
113
114
115
116
116
117
117
118
119
119
120
120
121
IntroducƟon
InformaƟon technology security is a signiĮcant concern for every IT specialist. Our systems are under
constant aƩack, and the next generaƟon of security professionals will be at the forefront of keeping our
criƟcal informaƟon safe.
CompTIA’s Security+ exam tests you on the speciĮcs of network security, vulnerabiliƟes and threats,
cryptography, and much more. I’ve created these Course Notes to help you through the details that you need
to know for the exam. Best of luck with your studies!
- Professor Messer
The CompTIA Security+ cerƟĮcaƟon
To earn the Security+ cerƟĮcaƟon, you must pass a single SY0-601 cerƟĮcaƟon exam. The exam is 90 minutes
in duraƟon and includes both mulƟple choice quesƟons and performance-based quesƟons. Performancebased quesƟons can include Įll-in-the-blank, matching, sorƟng, and simulated operaƟonal environments.
You will need to be very familiar with the exam topics to have the best possible exam results.
Here’s the breakdown of each technology secƟon and the percentage of each topic on the SY0-601 exam:
SecƟon 1.0 - AƩacks, Threats, and VulnerabiliƟes - 24%
SecƟon 2.0 - Architecture and Design - 21%
SecƟon 3.0 - ImplementaƟon - 25%
SecƟon 4.0 - OperaƟons and Incident Response - 16%
SecƟon 5.0 - Governance, Risk, and Compliance - 14%
CompTIA provides a detailed set of exam objecƟves that provide a list of everything you need to know before
you take your exam. You can Įnd a link to the exam objecƟves here:
hƩps://professormesser.com/objecƟves/
How to use this book
Once you’re comfortable with all of the secƟons in the oĸcial CompTIA SY0-601 exam objecƟves, you can
use these notes as a consolidated summary of the most important topics. These Course Notes follow the
same format and numbering scheme as the exam objecƟves, so it should be easy to cross reference these
notes with the Professor Messer video series and all of your other study materials. The CompTIA Security+
video training series can be found on the Professor Messer website at hƩps://ProfessorMesser.com.
Professor Messer’s
CompTIA Security+
SY0-601 Course Notes
hƩp://www.ProfessorMesser.com
1.1 - Phishing
Phishing
• Social engineering with a touch of spooĮng
– OŌen delivered by email, text, etc.
– Very remarkable when well done
• Don’t be fooled
– Check the URL
• Usually there’s something not quite right
– Spelling, fonts, graphics
Tricks and misdirecƟon
• How are they so successful?
– Digital slight of hand - it fools the best of us
• Typosquaƫng
– A type of URL hijacking - hƩps://professormessor.com
– Prepending: hƩps://pprofessormesser.com
• PretexƟng
– Lying to get informaƟon
– AƩacker is a character in a situaƟon they create
– Hi, we’re calling from Visa regarding an automated
payment to your uƟlity service…
Pharming
• Redirect a legit website to a bogus site
– Poisoned DNS server or client vulnerabiliƟes
• Combine pharming with phishing
– Pharming - Harvest large groups of people
– Phishing - Collect access credenƟals
• Diĸcult for anƟ-malware soŌware to stop
– Everything appears legiƟmate to the user
Phishing with diīerent bait
• Vishing (Voice phishing) is done
over the phone or voicemail
– Caller ID spooĮng is common
– Fake security checks or bank updates
• Smishing (SMS phishing) is done by text message
– SpooĮng is a problem here as well
– Forwards links or asks for personal informaƟon
• VariaƟons on a theme
– The fake check scam, phone veriĮcaƟon code scam,
– Boss/CEO scam, advance-fee scam
– Some great summaries on
hƩps://reddit.com/r/Scams
Finding the best spot to phish
• Reconnaissance
– Gather informaƟon on the vicƟm
• Background informaƟon
– Lead generaƟon sites
– LinkedIn, TwiƩer, Facebook, Instagram
– Corporate web site
• AƩacker builds a believable pretext
– Where you work
– Where you bank
– Recent Įnancial transacƟons
– Family and friends
Spear phishing
• Targeted phishing with inside informaƟon
– Makes the aƩack more believable
• Spear phishing the CEO is “whaling”
– Targeted phishing with the possibility of a large catch
– The CFO (Chief Financial Oĸcer) is commonly speared
• These execuƟves have direct access to
the corporate bank account
– The aƩackers would love to have those credenƟals
1.1 - ImpersonaƟon
The pretext
• Before the aƩack, the trap is set
– There’s an actor and a story
• “Hello sir, my name is Wendy and I’m from MicrosoŌ
Windows. This is an urgent check up call for your
computer as we have found several problems with it.”
• Voice mail: “This is an enforcement acƟon executed by
the US Treasury intending your serious aƩenƟon.”
• “CongratulaƟons on your excellent payment history! You
now qualify for 0% interest rates on all of your credit
card accounts.”
© 2020 Messer Studios, LLC
ImpersonaƟon
• AƩackers pretend to be someone they aren’t
– Halloween for the fraudsters
• Use some of those details from reconnaissance
– You can trust me, I’m with your help desk
• AƩack the vicƟm as someone higher in rank
– Oĸce of the Vice President for Scamming
• Throw tons of technical details around
– Catastrophic feedback due to the
depolarizaƟon of the diīerenƟal magnetometer
• Be a buddy
– How about those Cubs?
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 1
Ʃp
Profe orMe er.com
1.1 - ImpersonaƟon (conƟnued)
EliciƟng informaƟon
• ExtracƟng informaƟon from the vicƟm
– The vicƟm doesn’t even realize this is happening
– Hacking the human
• OŌen seen with vishing (Voice Phishing)
– Can be easier to get this informaƟon over the phone
• These are well-documented psychological techniques
– They can’t just ask, “So, what’s your password?”
IdenƟty fraud
• Your idenƟty can be used by others
– Keep your personal informaƟon safe!
• Credit card fraud
– Open an account in your name, or use your credit card informaƟon
• Bank fraud
– AƩacker gains access to your account or opens a new account
• Loan fraud
– Your informaƟon is used for a loan or lease
• Government beneĮts fraud
– AƩacker obtains beneĮts on your behalf
Protect against impersonaƟon
• Never volunteer informaƟon
– My password is 12345
• Don’t disclose personal details
– The bad guys are tricky
• Always verify before revealing info
– Call back, verify through 3rd parƟes
• VeriĮcaƟon should be encouraged
– Especially if your organizaƟon owns
valuable informaƟon
1.1 - Dumpster Diving
Dumpster diving
• Mobile garbage bin
– United States brand name “Dumpster”
– Similar to a rubbish skip
• Important informaƟon thrown out with the trash
– Thanks for bagging your garbage for me!
• Gather details that can be used for a diīerent aƩack
– Impersonate names, use phone numbers
• Timing is important
– Just aŌer end of month, end of quarter
– Based on pickup schedule
Is it legal to dive in a dumpster?
• I am not a lawyer.
– In the United States, it’s legal
– Unless there’s a local restricƟon
• If it’s in the trash, it’s open season
– Nobody owns it
• Dumpsters on private property or “No Trespassing”
signs may be restricted
– You can’t break the law to get to the rubbish
• QuesƟons? Talk to a legal professional.
Protect your rubbish
• Secure your garbage
– Fence and a lock
• Shred your documents
– This will only go so far
– Governments burn the good stuī
• Go look at your trash
– What’s in there?
1.1 - Shoulder SurĮng
Shoulder surĮng
• You have access to important informaƟon
– Many people want to see
– Curiosity, industrial espionage, compeƟƟve advantage
• This is surprisingly easy
– Airports / Flights
– Hallway-facing monitors
– Coīee shops
• Surf from afar
– Binoculars / Telescopes
– Easy in the big city
– Webcam monitoring
© 2020 Messer Studios, LLC
• PrevenƟng shoulder surĮng
• Control your input
– Be aware of your surroundings
• Use privacy Įlters
– It’s amazing how well they work
• Keep your monitor out of sight
– Away from windows and hallways
• Don’t sit in front of me on your Ňight
– I can’t help myself
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 2
Ʃp
Profe orMe er.com
1.1 - Hoaxes
Computer hoaxes
• A threat that doesn’t actually exist
– But they seem like they COULD be real
• SƟll oŌen consume lots of resources
– Forwarded email messages, printed memorandums, wasted Ɵme
• OŌen an email
– Or Facebook wall post, or tweet, or...
• Some hoaxes will take your money
– But not through electronic means
• A hoax about a virus can waste as much Ɵme as a regular virus
De-hoaxing
• It’s the Internet. Believe no one.
– Consider the source
• Cross reference
– hƩp://www.hoax-slayer.net
– hƩp://www.snopes.com
• Spam Įlters can help
– There are so many other ways...
• If it sounds too good to be true...
– So many sad stories
1.1 - Watering Hole AƩacks
Watering Hole AƩack
• What if your network was really secure?
– You didn’t even plug in that USB key
from the parking lot
• The aƩackers can’t get in
– Not responding to phishing emails
– Not opening any email aƩachments
• Have the mountain come to you
– Go where the mountain hangs out
– The watering hole
– This requires a bit of research
ExecuƟng the watering hole aƩack
• Determine which website the vicƟm group uses
– Educated guess - Local coīee or sandwich shop
– Industry-related sites
• Infect one of these third-party sites
– Site vulnerability
– Email aƩachments
• Infect all visitors
– But you’re just looking for speciĮc vicƟms
– Now you’re in!
Because that’s where the money is
• January 2017
• Polish Financial Supervision Authority, NaƟonal Banking
and Stock Commission of Mexico, State-owned
bank in Uruguay
– The watering hole was suĸciently poisoned
• VisiƟng the site would download malicious JavaScript Įles
– But only to IP addresses matching banks and
other Įnancial insƟtuƟons
• Did the aƩack work?
– We sƟll don’t know
Watching the watering hole
• Defense-in-depth
– Layered defense
– It’s never one thing
• Firewalls and IPS
– Stop the network traĸc before things get bad
• AnƟ-virus / AnƟ-malware signature updates
– The Polish Financial Supervision Authority aƩack code
was recognized and stopped by generic signatures in
Symantec’s anƟ-virus soŌware
1.1 - Spam
Spam
• Unsolicited messages
– Email, forums, etc.
– Spam over Instant Messaging (SPIM)
• Various content
– Commercial adverƟsing
– Non-commercial proselyƟzing
– Phishing aƩempts
• SigniĮcant technology issue
– Security concerns
– Resource uƟlizaƟon
– Storage costs
– Managing the spam
© 2020 Messer Studios, LLC
Mail gateways
• Unsolicited email
– Stop it at the gateway before it reaches the user
– On-site or cloud-based
IdenƟfying spam
• Allowed list
– Only receive email from trusted senders
• SMTP standards checking
– Block anything that doesn’t follow RFC standards
• rDNS - Reverse DNS
– Block email where the sender’s domain doesn’t match the IP
address
• Tarpiƫng
– IntenƟonally slow down the server conversaƟon
• Recipient Įltering
– Block all email not addressed to a valid recipient email address
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 3
Ʃp
Profe orMe er.com
1.1 - InŇuence Campaigns
Hacking public opinion
• InŇuence campaigns
– Sway public opinion on poliƟcal and social issues
• NaƟon-state actors
– Divide, distract, and persuade
• AdverƟsing is an opƟon
– Buy a voice for your opinion
• Enabled through Social media
– CreaƟng, sharing, liking
– AmpliĮcaƟon
Hybrid warfare
• Military strategy
– A broad descripƟon of the techniques
– Wage war non-tradiƟonally
• Not a new concept
– The Internet adds new methods
• Cyberwarfare
– AƩack an enƟty with technology
• InŇuence with a military spin
– InŇuencing foreign elecƟons
– “Fake news”
1.1 - Other Social Engineering AƩacks
TailgaƟng
• Use an authorized person to gain unauthorized
access to a building
– Not an accident
• Johnny Long / No Tech Hacking
– Blend in with clothing
– 3rd-party with a legiƟmate reason
– Temporarily take up smoking
– I sƟll prefer bringing doughnuts
• Once inside, there’s liƩle to stop you
– Most security stops at the border
Watching for tailgaƟng
• Policy for visitors
– You should be able to idenƟfy anyone
• One scan, one person
– A maƩer of policy or mechanically required
• Mantrap / Airlock
– You don’t have a choice
• Don’t be afraid to ask
– Who are you and why are you here?
© 2020 Messer Studios, LLC
Invoice scams
• Starts with a bit of spear phishing
– AƩacker knows who pays the bills
• AƩacker sends a fake invoice
– Domain renewal, toner cartridges, etc.
– From: address is a spoofed version of the CEO
• AccounƟng pays the invoice
– It was from the CEO, aŌer all
• Might also include a link to pay
– Now the aƩacker has payment details
CredenƟal harvesƟng
• Also called password harvesƟng
– AƩackers collect login credenƟals
• There are a lot of stored credenƟals on your computer
– The aƩacker would like those
– Chrome, Firefox, Outlook, Windows CredenƟal Manager, etc.
• User receives an email with a malicious MicrosoŌ Word doc
– Opening the document runs a macro
– The macro downloads credenƟal-harvesƟng malware
• User has no idea
– Everything happens in the background
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 4
Ʃp
Profe orMe er.com
1.1 - Principles of Social Engineering
EīecƟve social engineering
• Constantly changing
– You never know what they’ll use next
• May involve mulƟple people
– And mulƟple organizaƟons
– There are Ɵes connecƟng many organizaƟons
• May be in person or electronic
– Phone calls from aggressive “customers”
– Emailed funeral noƟĮcaƟons of a friend or associate
Social engineering principles
• Authority
– The social engineer is in charge
– I’m calling from the help desk/oĸce of the CEO/police
• InƟmidaƟon
– There will be bad things if you don’t help
– If you don’t help me, the payroll checks
won’t be processed
• Consensus / Social proof
– Convince based on what’s normally expected
– Your co-worker Jill did this for me last week
• Scarcity
– The situaƟon will not be this way for long
– Must make the change before Ɵme expires
• Urgency
– Works alongside scarcity
– Act quickly, don’t think
• Familiarity / Liking
– Someone you know, we have common friends
• Trust
– Someone who is safe
– I’m from IT, and I’m here to help
How I Lost My $50,000 TwiƩer Username
• Naoki Hiroshima - @N
– hƩps://professormesser.link/twiƩername
• AƩacker calls PayPal and uses social engineering to get
the last four digits of the credit card on Įle
• AƩacker calls GoDaddy and tells them he lost the card,
so he can’t properly validate. But he has the last four,
does that help?
– GoDaddy let the bad guy guess the Įrst
two digits of the card
– He was allowed to keep guessing unƟl he got it right
– Social engineering done really, really well
How to steal a $50,000 TwiƩer name
• AƩacker is now in control of every domain name
– And there were some good ones
• AƩacker extorts a swap
– Domain control for @N
– Owner agrees
• TwiƩer reviewed the case for a month
– Eventually restored access to @N
• How I Lost My $50,000 TwiƩer Username
– hƩps://professormesser.link/twiƩername
1.2 - An Overview of Malware
Malware
• Malicious soŌware
– These can be very bad
• Gather informaƟon
– Keystrokes
• ParƟcipate in a group
– Controlled over the ‘net
• Show you adverƟsing
– Big money
• Viruses and worms
– Encrypt your data
– Ruin your day
Malware Types and Methods
• Viruses
• Crypto-malware
• Ransomware
• Worms
• Trojan Horse
© 2020 Messer Studios, LLC
• Rootkit
• Keylogger
• Adware/Spyware
• Botnet
How you get malware
• These all work together
– A worm takes advantage of a vulnerability
– Installs malware that includes a remote access
backdoor
– Bot may be installed later
• Your computer must run a program
– Email link - Don’t click links
– Web page pop-up
– Drive-by download
– Worm
• Your computer is vulnerable
– OperaƟng system - Keep your OS updated!
– ApplicaƟons - Check with the publisher
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 5
Ʃp
Profe orMe er.com
1.2 - Viruses and Worms
Virus
• Malware that can reproduce itself
– It needs you to execute a program
• Reproduces through Įle systems or the network
– Just running a program can spread a virus
• May or may not cause problems
– Some viruses are invisible, some are annoying
• AnƟ-virus is very common
– Thousands of new viruses every week
– Is your signature Įle updated?
Virus types
• Program viruses
– It’s part of the applicaƟon
• Boot sector viruses
– Who needs an OS?
• Script viruses
– OperaƟng system and browser-based
• Macro viruses
– Common in MicrosoŌ Oĸce
Fileless virus
• A stealth aƩack
– Does a good job of avoiding anƟ-virus detecƟon
• Operates in memory
– But never installed in a Įle or applicaƟon
Fileless virus
infecƟon process
Worms
• Malware that self-replicates
– Doesn’t need you to do anything
– Uses the network as a transmission medium
– Self-propagates and spreads quickly
1
• Worms are preƩy bad things
– Can take over many systems very quickly
• Firewalls and IDS/IPS can miƟgate
many worm infestaƟons
– Doesn’t help much once the worm gets inside
2
Infected computer
searches for
vulnerable system
Vulnerable
computer
is exploited
3
© 2020 Messer Studios, LLC
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 6
Ʃp
Backdoor is
installed and
downloads worm
Profe orMe er.com
1.2 - Ransomware and Crypto-malware
Your data is valuable
• Personal data
– Family pictures and videos
– Important documents
• OrganizaƟon data
– Planning documents
– Employee personally idenƟĮable informaƟon (PII)
– Financial informaƟon
– Company private data
• How much is it worth?
– There’s a number
Ransomware
• The aƩackers want your money
– They’ll take your computer in the meanƟme
• May be a fake ransom
– Locks your computer “by the police”
• The ransom may be avoided
– A security professional may be able to remove
these kinds of malware
Crypto-malware
• A newer generaƟon of ransomware
– Your data is unavailable unƟl you provide cash
• Malware encrypts your data Įles
– Pictures, documents, music, movies, etc.
– Your OS remains available
– They want you running, but not working
• You must pay the bad guys to obtain the decrypƟon key
– Untraceable payment system
– An unfortunate use of public-key cryptography
ProtecƟng against ransomware
• Always have a backup
– An oŋine backup, ideally
• Keep your operaƟng system up to date
– Patch those vulnerabiliƟes
• Keep your applicaƟons up to date
– Security patches
• Keep your anƟ-virus/anƟ-malware signatures up to date
– New aƩacks every hour
• Keep everything up to date
1.2 - Trojans and RATs
Trojan horse
• Used by the Greeks to capture
– Troy from the Trojans
– A digital wooden horse
• SoŌware that pretends to be something else
– So it can conquer your computer
– Doesn’t really care much about replicaƟng
• Circumvents your exisƟng security
– AnƟ-virus may catch it when it runs
– The beƩer Trojans are built to avoid and disable AV
• Once it’s inside it has free reign
– And it may open the gates for other programs
PotenƟally Unwanted Program (PUP)
• IdenƟĮed by anƟ-virus/anƟ-malware
– PotenƟally undesirable soŌware
– OŌen installed along with other soŌware
• Overly aggressive browser toolbar
• A backup uƟlity that displays ads
• Browser search engine hijacker
Backdoors
• Why go through normal authenƟcaƟon methods?
– Just walk in the back door
• OŌen placed on your computer through malware
– Some malware soŌware can take advantage of
backdoors created by other malware
• Some soŌware includes a backdoor (oops)
– Old Linux kernel included a backdoor
– Bad soŌware can have a backdoor as part of the app
© 2020 Messer Studios, LLC
Remote Access Trojans (RATs)
• Remote AdministraƟon Tool
– The ulƟmate backdoor
– AdministraƟve control of a device
• Malware installs the server/service/host
– AƩacker connects with the client soŌware
• Control a device
– Key logging
– Screen recording /screenshots
– Copy Įles
– Embed more malware
ProtecƟng against Trojans and RATs
• Don’t run unknown soŌware
– Consider the consequences
• Keep anƟ-virus/anƟ-malware signatures updated
– There are always new aƩacks
• Always have a backup
– You may need to quickly recover
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 7
Ʃp
Profe orMe er.com
1.2 - Rootkits
Rootkits
• Originally a Unix technique
– The “root” in rootkit
• ModiĮes core system Įles
– Part of the kernel
• Can be invisible to the operaƟng system
– Won’t see it in Task Manager
• Also invisible to tradiƟonal anƟ-virus uƟliƟes
– If you can’t see it, you can’t stop it
Kernel drivers
• Zeus/Zbot malware
– Famous for cleaning out bank accounts
• Now combined with Necurs rootkit
– Necurs is a kernel-level driver
• Necurs makes sure you can’t delete Zbot
– Access denied
• Trying to stop the Windows process?
– Error terminaƟng process: Access denied
Finding and removing rootkits
• Look for the unusual
– AnƟ-malware scans
• Use a remover speciĮc to the rootkit
– Usually built aŌer the rootkit is discovered
• Secure boot with UEFI
– Security in the BIOS
1.2 - Spyware
Adware
• Your computer is one big adverƟsement
– Pop-ups with pop-ups
• May cause performance issues
– Especially over the network
• Installed accidentally
– May be included with other soŌware
• Be careful of soŌware that claims to remove adware
– Especially if you learned about it from a pop-up
Spyware
• Malware that spies on you
– AdverƟsing, idenƟty theŌ, aĸliate fraud
• Can trick you into installing
– Peer to peer, fake security soŌware
• Browser monitoring
– Capture surĮng habits
• Keyloggers - Capture every keystroke
– Send it back to the mother ship
Why is there so much adware and spyware?
• Money
– Your eyeballs are incredibly valuable
• Money
– Your computer Ɵme and bandwidth
is incredibly valuable
• Money
– Your bank account is incredibly valuable
– Yes, even your bank account
ProtecƟng against adware/spyware
• Maintain your anƟ-virus / anƟ-malware
– Always have the latest signatures
• Always know what you’re installing
– And watch your opƟons during the installaƟon
• Where’s your backup?
– You might need it someday
– Cleaning adware isn’t easy
• Run some scans - Malwarebytes
1.2 - Bots and Botnets
Bots (Robots)
• Once your machine is infected, it becomes a bot
– You may not even know
• How does it get on your computer?
– Trojan Horse (I just saw a funny video of you! Click here.) or...
– You run a program or click an ad you THOUGHT was legit,
but...
– OS or applicaƟon vulnerability
• A day in the life of a bot
– Sit around. Check in with the Command and Control (C&C)
server. Wait for instrucƟons.
© 2020 Messer Studios, LLC
Botnets
• A group of bots working together
– Nothing good can come from this
• Distributed Denial of service (DDoS)
– The power of many
• Relay spam, proxy network traĸc,
distributed compuƟng tasks
• Botnets are for sale
– Rent Ɵme from the botnet owner
– Not a long-term business proposiƟon
Professor Messer’s CompTIA SY0-601 Security+ Course Notes - Page 8
Ʃp
Profe orMe er.com
Download
Study collections