Domain 1: Threats, Attacks, and Vulnerabilities (24%) Flashcards
(96 cards)
*1.5 Actors and threats
White Hat (CompTIA: Authorized) ethical hackers, Penetration Testers
Non-malicious hackers who attempt to break into a company’s systems at their request
*1.5 Actors and threats
Black Hat (CompTIA: Unauthorized)
Malicious hackers who break into computer systems and networks without authorization or permission
*1.5 Actors and threats
Gray Hats (CompTIA: Semi-authorized)
Hackers without any affiliation to a company that attempts to break into a company’s network and risk breaking the law
*1.5 Actors and threats
Script kiddies
Have limited skill and only run other people’s exploits and tools
*1.5 Actors and threats
Hacktivists
Hackers who are driven by a cause like social change, political agendas, or terrorism.
ex: Anonymous
*1.5 Actors and threats
Advanced Persistent Threats (APT)
Highly trained and funded groups of hackers (often by nation-states) with covert and open-source intelligence at their disposal.
*1.5 Threat intelligence sources
Proprietary source
Proprietary is threat intelligence that comes as a commercial service offering, where you’re going to pay for access to these updates and research based on a subscription fee.
Note: Not as useful because these commercial services are just repackaging of information that’s available in free public registries.
*1.5 Threat intelligence sources
Closed-source
closed-source data is data that’s derived from the provider’s own research and analysis efforts, such as data from honeynets as they operate, plus information that’s mined
from their other customer systems, suitably anonymized-(to remove information that shows which particular person/entity something relates to).
example: FireEye
*1.5 Threat intelligence sources
Open-source
Open-source is data that’s available for use without a subscription, and this may include threat feeds similar to commercial providers, and it can contain reputation lists, and malware signature databases.
example: US-CERT, UK’s NCSC, AT&T Security (OTX), MISP, VirusTotal, Samphaus, SANS ISC Suspicious Domains.
*1.5 Threat intelligence sources
Open-source intelligence (OSINT)
Methods of obtaining information about a person or organization through public records, websites, and social media
example: Google, Facebook, enumeration scans. Public records, websites, and social media.
*1.7 Threat Hunting
A cybersecurity technique designed to detect the presence of threats that have not been discovered by normal security monitoring. it is proactive, not reactive like incident response.
*1.2 Malware
Malware
malicious software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.
examples: viruses, worms, trojan horses, ransomware, spyware, rootkits, spam.
*1.2 Malware
Virus
Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed (10 types: Boot sector, Macro, Program, Miltipartite, Encrypted, Polymorphic, Metamorphic, Stealth, Armored, Hoax).
Remember: It needs user interaction like installing a program or opening a file
*1.2 Malware
Worms
Malicious software, like a virus, but able to replicate itself without user interaction. Doesn’t need you to do anything.
Example: A user receives an attachment to an e-mail or an instant message that contains a malicious worm. When the attachment is opened, the worm infects the user’s computer and then replicates itself by sending copies of the same e-mail or instant message to everyone in the user’s address book.
*1.2 Malware
Trojans
Trojan horses are a piece of malicious software that is disguised as a piece of harmless or desirable software that when downloaded it can conquer your computer and may open gates for other programs.
Note: Trojans are usually downloaded through e-mail attachments, websites, and instant messages. They are usually disguised as popular programs such as games, pictures, or music.
*1.2 Malware
Remote Access Trojan (RAT)
A trojan that provides the attacker with remote control of a victim machine.
Note: The ultimate backdoor that provides administrative control of a device (Prof. Messer).
*1.2 Malware
Ransomware
malware that restricts access to a victim’s computer or their files until a ransom is received.(locks your computer)
*1.2 Malware
Spyware
Software that secretly gathers information about the user without their consent. Hint: may include a keylogger.
Note: Adware is a type of spyware that displays ads based on what it spied on you.
*1.2 Malware
Rootkit
Software designed to gain administrative level control over a system without detection.
Note: DLL injections and driver manipulation = Rootkit
*1.1 Spam
the abuse of electronic messaging systems, most commonly through email.
-social media
-broadcast media
*1.1 Spim
abuse of instant messaging systems.
-texting
-instant messaging
What is a Threat Vector?
The method used by an attacker to access a victim’s machine
*1.1 What is a Watering hole attack?
When malware is placed on a website (watering hole) that you know your potential victims will access.
Example: A watering hole is a place where animals need to get water, a predator waits by the watering hole waiting for one of the animals to be careless. (malware is placed in a watering hole for animals to get).
*1.2 Malware
Botnet
A collection of compromised computers under the control of a master node