Security+ Cheat Sheet
Security+ Cheat Sheet
Malware Delivery
Treat Vector vs Attack Vector
- Software, Messaging and Media
> Emails, FTP, P2P/torrent file downloads
> Removable Media
- Typosquatting
- Exploit kit
- Botnets and Zombies
> Also used for DDOS or financial gain
- Active Interception (MITM)
- Privilege Escalation
- Backdoor
> Authentication bypass mechanisms built into the program itself
- Logic Bombs
> Triggers malware on certain condition(date, OS type etc)
Malware Prevention / Troubleshooting
Common Symptoms : Slow computer speed, crashes, incorrect home page, popups
Common Prevention
> Antivirus : Regular updates and scans
Detects : worms, viruses and Trojans
Does not detect : Botnet activity, rootkits, logic bombs
> Firewalls and Regular OS updates
> Separation of OS and data
> Hardware + Software based firewall (e.g. router + Windows Firewall)
> Encryption for confidentiality (Windows EFS)
Common Steps to Malware Removal
1. Identify Symptoms
2. Quarantine infected system / drive to clean machine
3. Disable System Restore
4. Remediate affected system
> Update AV / Scan and removal
5. Schedule scans and run update
6. Enable system restore and set new restore point
7. Educate end user
Worms and Trojans
> Antivirus, Regular maintenance and vigilance
Spyware
> Antivirus, browser security settings, remove unnecessary application
> End user education
Rootkits
> Antivirus, Rootkit detectors (USB bootable OS)
> Use UEFI over BIOS (GPT over MBR)
> Wipe the entire drive & reinstall OS
Spam
> Spam filter, whitelisting/blacklisting, close open mail relays
Chapter 3 : Computer Systems Security Part 2
Security Applications
- Personal Firewalls (Host based firewalls)
> Windows Firewall
> ZoneAlarm
> Packet Filter and IP Firewall (Mac OSX)
> iptables (Linux)
- IDS (Intrusion Detection System)
Host Based : Loaded onto individual machine
Analyzes and monitors that one machine state
Can interpret encrypted traffic
Network Based : Either loaded onto a machine or standalone device
Monitors every packet going through network interface
Monitors multiple devices, less expensive
Cannot monitor what happens in an OS
Monitoring Types – Statistical Anomaly vs Signature
> Statistical Anomaly
Establishes baseline and compares current performance
> Signature
Network traffic analyzed to find predetermined patterns
HIDS examples
> Trend Micro OSSEC (freeware)
> Verisys (Commercial, Windows)
> Tripwire (Commercial)
* Make sure to protect HIDS database with encryption and access control
- Popup Blockers
Ad filtering & Content filtering
- DLP (Data Loss Prevention)
Monitors data in use / in motion / at rest
Prevents unauthorized use and leakage of data
Types of DLP
> Endpoint DLP : Runs on single machine, software based
> Network DLP : Software/hardware, installed on network perimeter
> Storage DLP : Installed in data centers/server rooms
Securing Computer Hardware and Peripherals
Examples of peripherals: USB flash drives, SATA external HDD, optical disks
Securing BIOS
- Flashing (Updating) BIOS firmware
- BIOS password
- Configure BIOS Boot order
- Secure boot (disables unsigned device drivers, UEFI)
* UEFI and Root of Trust, secure/measured boot, attestation
Securing Storage Devices
- Removable Storage
> Typically prohibits all removable storage besides specific ones
> Removable Media Controls
USB Lockdown (BIOS), limit USB use, malware scans, audits
- NAS (Network Attached Storage)
> Built for high availability (no downtime)
> Commonly implemented as RAID array (levels depend on situation)
> Use encryption, authentication, secure logging etc
- Whole Disk Encryption
> Requires either self encrypting or full disk encryption SW
> Windows BitLocker requirements
1) TPM or External USB key with encrypted keys
2) Hard drive with 2 volumes(1 for boot, 1 to be encrypted)
> Double Encryption – BitLocker + EFS
- HSM (Hardware Security Modules)
Vs TPM
TPM handles key storage with limited cryptographic function
HSM handles mainly quick crypto functions with key storage
Found in USB attachment or network attached device
Securing Wireless Peripherals
- Force devices to use AES or WPA2 encryption for data transmission
Securing Mobile Devices
General Security
- Keep phone number secure and do not respond to unsolicited calls
- Update mobile device OS
- Complex password and limit downloads to device
Malware
- Install & update mobile device AV
- Take use of built in security features
- Avoid following links, don’t store information on device
- Don’t post info on social media
Botnet Activity
- Follow anti-malware procedures
- Avoid rooting / jailbreaking phones
SIM Cloning
- A cloned SIM redirects all calls and texts to its own device
- Able to hijack messages intended for original SIM card owner
Wireless Attacks
- Bluejacking
- Bluesnarfing
Theft
- Full device encryption(FDE)
- Set up GPS tracking
- Remote lock & Remote wipe technology
Mobile Application
- Mobile key management : use Third party software (Verisign)
- Application whitelisting / blacklisting
- Strong SMS application and endpoint security
- Mobile payment : avoid public networks, user education
- Geotagging : Disable GPS depending on situation
- BYOD concerns
> Storage Segmentation : divide corporate vs private data storage
> Mobile Device Management systems for corporations
Chapter 4 : OS Hardening and Virtualization
OS Hardening
Motivation : Out of the box OS is vulnerable by default,
Need to customize settings to make it more secure
Concept of Least Functionality
- Restrict and remove any functionality not required for operation
- NIST CM-7 control procedures
- Target features
> Applications
> Ports
> Services (daemons)
- Consider backwards compatibility when removing obsolete applications
- SCCM (System Center Configuration Manager) for multiple machines
- Application blacklisting / whitelisting
- Service configuration commands
> Windows : services.msc, net stop, sc stop
> Linux : /etc/init.d/<service> stop, service <service> stop etc
> OSX : kill command
Update, Patches, Hotfixes
- TOS (Trusted Operating System)
: Certified OS considered secure by gov standards
- Update Categories
> Security Update : Product specific, security related
> Critical Update : critical, non security related bug fix
> Service Pack : Cumulative set of updates, now discontinued
> Windows Update : Noncritical fixes, new features and updates
> Driver Update : Beware driver shimming / refactoring
- Hotfixes and patches are now used interchangeably
* Disable automatic updates to synchronize versions and updates
Patch Management
- Process of planning, testing, implementing and auditing patches
> Planning : Deciding which patches are required
Checking Compatibility
Plan how the patch will be tested / deployed
> Testing : Test the patch on one machine / small system
> Implement : Patch deployment to all machines
Use SCCM or other centralized management system
> Auditing : Confirm patch is live on system
Check for any failures or changes due to the patch
Group Policies, Security Templates, Configuration Baselines
Group Policy : Used in Windows to set group configurations
* gpedit.msc
Hardening File Systems and Hard Drives
a) Use a secure file system
> NTFS for Windows, allows encryption, ACLs, logging
Use chkdsk and convert commands
> ext4 for Linux
Use fdisk –l or df –T
b) Hide important files (System files, personal etc)
c) Manage hard drives
> Delete temp files
> Periodically verify system files integrity
> Defrag hard drives
> Backup data
> Restore points
> Whole disk encryption
> Separate OS system and personal data
Virtualization
Virtualization : Creation of virtual machines housed in an OS
VM(Virtual Machines) and VDE(Virtual Desktop Environment)
- Pros
> Flexible and portable
> Safe testing of malware in a controlled environment
- Cons
> Resource intensive
> Vulnerable to hardware failures
VM Categories
1. System virtual machine : Runs an entire OS
2. Process virtual machine : Runs a single application (browser)
* Virtualization ↔ Emulation ↔ Simulation
* Virtual Appliance ↔ Image ↔ Virtual Machine
Other forms of virtualization
> VPN (Virtual Private Network)
> VDI (Virtual Desktop Infrastructure)
> VLAN (Virtual Local Area Network)
Hypervisor (Virtual Machine Manager)
- Allows multiple virtual OS to run concurrently
Type 1 vs Type 2 Hypervisor
- Type 1 - Native
> Runs directly on host hardware
> Flexible and efficient
> Strict hardware/software restrictions, less common
- Type 2 – Hosted
> One level removed from host hardware
> More available to most OS and hardware
> Resource intensive
Application Containerization
- Runs distributed applications w/o running an entire VM
- Efficient but less secure
Securing Virtual Machines
Generally equivalent to securing regular OS, but with little more work
1. Update virtual machine software (e.g. VirtualBox)
2. Be wary of VM-VM and VM-host network connections
3. Protect NAS and SAN from virtual hosts
4. Disable unnecessary USB and external ports on VMs
5. Alter boot priority for virtual BIOS
6. Limit and monitor VM resource usage to prevent DOS attacks
7. Protect raw virtual machine image
> Snapshots, Encryption, Access permission and signatures
Virtualization Sprawl : When there are too many VMs to manage at once
> Employ a VMLM (Virtual Machine Lifecycle Management) tool
Chapter 5 : Application Security
- Avoid newest versions and disable auto update (new versions are unstable)
Basic Methods
Cookies
Addons / Plugins
1. Outlook
2. Word
3. Excel
Mobile Applications
- Disable GPS
Server Applications
Secure Programming
- Waterfall
- Agile
- DevOps
- Threat Modeling
1. Least Privilege
2. Defense in Depth
5. Secure defaults
> white box, black box, gray box, stress testing, pentesting etc
> Reminder that both software and hardware has runtime errors
3. Input Validation
5. Fuzz Testing
1. Backdoors
> Updates usually remove these, job rotation, code cross checking
4. XSS / XSRF
6. Directory Traversal
7. Zero Days
Chapter 6 : Network Design Elements
Network Design
OSI Model
- Goals
- Overview
Network Devices
- Switch
> Translates MAC and MAC+IP into physical ports to route messages
> Attacks
- Router
> Various forms : SOHO, servers configures as routers, Cisco black box
> Defenses
1. Secure configurations
2. Firewalls
3. IPS
5. Content filtering
- Motivation
> Allow a large private address space mapped to a smaller public one
* Static NAT : Only one machine uses the router that does NAT
- Private IP
- Public IP
* IPv6 Vulnerability
> By default does not have internet access, but may connect to an
Internet proxy to do so
- Internet
> Must secure all transmission that happens over the internet
> Often placed in a separate LAN network from the rest of system
Subnetting
- Benefits
- Overview
VLAN(Virtual LAN)
1. Switch Spoofing
2. Double Tagging
Telephony
- Modems
VoIP
Cloud Computing
> Allows user to have access to software they don’t have on host
- Hybrid Cloud : Utilize both private and public depending on handled data
Cloud Security
2. Multifactor authentication
5. Programming standardization
6. Data protection
Server Defenses
1. File Servers
2. Network Controllers
3. Email Servers
> May run multiple services and ports, POP3, SMTP, IMAP, Outlook
> DDOS, overflow attacks, XSS, XSRF, remote code exec., backdoors
5. FTP Servers
TCP vs UDP
Port Ranges
Malicious Attacks
- Flood Attack
> Ping floods : Uses ICMP packets (disable ICMP to protect servers)
> SYN flood : sends large amount of TCP SYN packets to target
- Ping of Death
- Teardrop Attack
- Permanent DOS
- Fork bomb
DDOS
WWN spoofing : World Wide Names are unique identifiers to SAN (like MACs)
Session Hijacking
- Session Theft
- TCP/IP Hijacking
- Blind Hijacking
- Clickjacking
- MitM
> Infected browser modifies user input data when packets are sent
- Watering Hole
Replay Attacks
Defenses
Null Session
> When compromise detected delete and remake hosts file w/ read-only
Domain name kiting : Repeatedly reregistering domain name to use it for free
ARP Poisoning
Firewalls
- Types of Firewalls
1. Packet Filtering
2. Stateful Firewalls
3. Application Firewalls
Proxy Servers
Types of Proxies
Web Security Gateways : Active monitoring and filtering of user data streams
Honeypots / Honeynets
NIDS vs NIPS
Pros
Cons
Pros
Cons
Single point of failure, can bring down entire network if knocked out
Fail open/close
Protocol Analyzer
Wired Networks
Vulnerabilities
1. Default Accounts
2. Weak Passwords
3. Privilege Escalation
4. Backdoors
5. Network Attacks
Types of Cables
- Twisted pair
- Fiber optic
- Coax
2. Crosstalk
3. Data Emanation
4. Wiretapping
* Wiring Closets
Vulnerabilities
1. Administration Interface(Romming)
2. SSID Broadcasting
new device
4. Evil Twin
Should be disabled in all cases, can easily be brute forced and broken
7. Ad Hoc Networks
- Employ WAP built in firewall and NAT and MAC filtering if possible
2. IV attack
3. MAC Spoofing
4. Deauth
Bluetooth and NFC (Near Field Communicator) can also be an attack vector
RFID
Physical Security
2. Server Room
3. Door Access
4. Biometrics
1. Authentication Models
a) Username/Password
Authentication Server
a) EAP-MD5
b) EAP-TLS
c) EAP-TTLS
d) EAP-FAST
e) PEAP
3. VPN
* Split Tunneling
4. RADIUS vs TACACS+
RADIUS
EAP/802.1X compatible
TACACS+
Access Control Models : How admission to physical areas and computer systems are managed
- Each user is given clearance level and can only access files within level
1. Implicit Deny
2. Least Privilege
3. Separation of Duties
4. Job Rotation
1) Full Control
2) Modify
5) Read
6) Write
- Ctrl + Alt + Delete to log in, ensures users are using keyboard
Vs network connection
Policies
- Password Policies
3. Minimum pw length
4. Complexity requirements
Risk Assessment
2. Identify vulnerabilities
Active Scanning
Passive fingerprinting
Security Controls
Categorical
Definitive
Vulnerability Management
2. Create a baseline
3. Vulnerability prioritization
4. Mitigate vulnerability
5. Monitor environment
Penetration Testing
Race Conditions
Basic Methodologies
1. OSSTMM
Network Mapping
- Devices
- IP Address
- Role
- Connections
Vulnerability Scanning
Network Sniffing
Password Analysis
Monitoring Methodologies
Performance Baselining
Protocol Analyzer
a) Managed Devices
b) Agents
Conducting Audits
Manual Assessment
Vulnerability scans
Personnel Interviews
Overall Process
2. Create backups
4. Calculate risk
Auditing Files
Able to set auditing and logging for file, folder and user
Logging
Types of Data
a) Data in Use
b) Data at Rest
c) Data in Transit
Public and private keys are created for asymmetric key scheme
Steganography : Art of hiding information in various file formats, usually image files
Encryption Algorithms
DES/3DES
AES
128 bit block size, variable key length (128, 192, 256 bit)
RC
Currently up to RC6
Blowfish/Twofish
RSA
Used in TLS
Can also employ Ephemeral keys (EDH) for perfect forward secrecy
PGP
PRNG
Hashing Basics
MD5
SHA
LANMAN
NTLM/NTLMv2
Hashing Attacks
Birthday Attack
A system of trust that uses public key crypto to bind a certificate to an identity
Certificates
Digitally signed electronic documents that binds a public key with an entity
Mostly used for HTTPS connections, but can also be used for local encryption
- Domain Validation
- Organizational Validation
- Extended Validation
- Wildcard Certificates
Certificate Formats
1. PEM
2. P12/PFX
.pfx/.p12 extensions
Certificate Authorities
Key escrow
Web of Trust
Used by PGP
Security Protocols
Overview
S/MIME
SSL/TLS
Used for secure internet communication such as browser, VoIP, email etc
SSH
PPTP
L2TP
- with IPSec
IPSec
2. Authentication header
2 Modes of Implementation
1. Transport mode
2. Tunnel mode
Redundancy Planning
Redundant Power
Backup Generators
Types of Generators
b) Permanently Installed
c) Battery Inverter
Considerations
1. Price
4. Fuel Source
RAID Arrays
RAID Classification
a) Failure Resistant
b) Failure Tolerant
c) Disaster tolerant
Redundant Networking
Internet Connection
Redundant Servers
Failover clusters
Hot site – Complete replication of entire network, servers & phone lines
Redundant people
Data Backup
Tape Backup
1. Full backup
2. Incremental backup
3. Differential backup
Backup Schemes
1. 10 tape rotation
Snapshot backups
DR Planning
Types of Disasters
1. Fire
2. Flood
Things to Include
- Contact Info
- Recovery Plan
1. Pretexting
2. Malicious Insider
3. Diversion Theft
4. Phishing
- Spearphishing
- Whaling
5. Hoax
6. Shoulder Surfing
7. Eavesdropping
8. Dumpster Diving
9. Baiting
10. Piggybacking/tailgating
- employ mantraps
Facilities Security
Fire Suppression
a) Fire extinguishers
b) Sprinkler
Electronics safe
e) Shielding
HVAC shielding
Faraday cages
TEMPEST guidelines
Vehicles
Drones