free security awareness guide - comptia

33
0 FREE Security Awareness Guide Get 7 simple security hacks that you can use today. bit.ly/SecurityAwarenessGuide

Upload: others

Post on 11-Jan-2022

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FREE Security Awareness Guide - CompTIA

0

FREE Security Awareness GuideGet 7 simple security hacks that you can use today.

bit.ly/SecurityAwarenessGuide

Page 2: FREE Security Awareness Guide - CompTIA

1. Differences between threats and vulnerabilities2. Pen testing do’s and don’ts3. Metasploit introduction through the Armitage GUI4. Information gathering and scanning5. Playing with auxiliary modules like ARP, DNS and DHCP attacks6. Browser drive-by attack (application-based attack)7. Remote exploit demo (application-based attack)8. Payloads using the Meterpreter9. Metasploit automation

Ethical Hacking Using a Weaponized Operating System

1Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 3: FREE Security Awareness Guide - CompTIA

2Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Page 4: FREE Security Awareness Guide - CompTIA

3Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Page 5: FREE Security Awareness Guide - CompTIA

4Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Page 6: FREE Security Awareness Guide - CompTIA

5Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Page 7: FREE Security Awareness Guide - CompTIA

6Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Page 8: FREE Security Awareness Guide - CompTIA

7Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Page 9: FREE Security Awareness Guide - CompTIA

8Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Page 10: FREE Security Awareness Guide - CompTIA

9Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Page 11: FREE Security Awareness Guide - CompTIA

10Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Unlocked door

Page 12: FREE Security Awareness Guide - CompTIA

11Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Unlocked door

Page 13: FREE Security Awareness Guide - CompTIA

12Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Unlocked door

Untrained user

Page 14: FREE Security Awareness Guide - CompTIA

13Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Unlocked door

Untrained user Untrained user

Page 15: FREE Security Awareness Guide - CompTIA

14Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Threat VulnerabilityOR

End of life operating system

Ransomware

Unneeded running service

Hacker

Unlocked door

Untrained user Untrained user

Flaw or Gap Actor

Page 16: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Get WRITTEN authorization

15Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 17: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Get WRITTEN authorizationGet contact information

16Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 18: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Define the Scope and timing

Get WRITTEN authorizationGet contact information

17Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 19: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Review Threats and VulnerabilitiesDefine the Scope and timing

Get WRITTEN authorizationGet contact information

18Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 20: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Review Threats and VulnerabilitiesDefine the Scope and timing

Get WRITTEN authorizationGet contact information

Test public cloud environments

19Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 21: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Review Threats and VulnerabilitiesDefine the Scope and timing

Get WRITTEN authorizationGet contact information

Test public cloud environmentsUse payloads that cause damage

20Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 22: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Review Threats and VulnerabilitiesDefine the Scope and timing

Get WRITTEN authorizationGet contact information

Test public cloud environmentsUse payloads that cause damageChange configurations

21Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 23: FREE Security Awareness Guide - CompTIA

Pen testingDo’s Don’ts

Review Threats and VulnerabilitiesDefine the Scope and timing

Get WRITTEN authorizationGet contact information

Test public cloud environmentsUse payloads that cause damageChange configurationsPractice in production

22Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 24: FREE Security Awareness Guide - CompTIA

WARNING

Don’t test anyone’s network unless youGet WRITTEN authorization!

Everything you see here has an IDS signatureand will trigger an alert!

23Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 25: FREE Security Awareness Guide - CompTIA

Environment

24Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Page 26: FREE Security Awareness Guide - CompTIA

Armitage

25Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

• Live GUI Review

Page 27: FREE Security Awareness Guide - CompTIA

Information Gathering

26Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

• NMAP Again? Nah• Let’s learn Info Gathering through protocols and HPING3• TTLs• Packet ID

Page 28: FREE Security Awareness Guide - CompTIA

EternalBlue

27Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

• Leaked by Shadow Brokers April 2017. Fixed by Microsoft in May• The vulnerability is tracked by CVE-2017-0144 • The exploit targets the Microsoft Server Message Block (SMB) protocol• Used by WannaCry• Let’s play with it! • I become the threat

Page 29: FREE Security Awareness Guide - CompTIA

ARP

28Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

• Address Resolution Protocol (ARP)• RFC 826 from 1982 https://tools.ietf.org/html/rfc826• Layer 2 of the OSI• Used to find the hardware address or Media Access Control (MAC) address• ARP cache• MAC looks like 11-22-33-44-55-66• First 3 octets are the OUI

• Mitigation: Dynamic ARP inspection• On supported cisco devices: IP ARP INSPECTION VLAN 100

Page 30: FREE Security Awareness Guide - CompTIA

DHCP

29Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

• Dynamic Host Configuration Protocol (DHCP)• First implemented in the Bootstrap Protocol BOOTP in 1985 RFC 951• Last updated in 1997 with RFC 2131 https://tools.ietf.org/html/rfc2131• Layer 7 of the OSI• Uses Broadcast• DHCP Relays turn broadcast into unicast to remote DHCP servers• Mitigation: DHCP Snooping• On supported cisco devices: DHCP SNOOPING VLAN 100

Page 31: FREE Security Awareness Guide - CompTIA

DNS

30Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

• Domain Name System (DNS)• First implemented in RFC 882 in 1983• Last updated in 1997 with RFC 2181 https://tools.ietf.org/html/rfc2181• Layer 7 of the OSI• Hierarchical and decentralized

Page 32: FREE Security Awareness Guide - CompTIA

Question & Answer

31Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org

Ask your questions in the Q&A chat box!

Page 33: FREE Security Awareness Guide - CompTIA

32Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org