Ciampa CompTIASec+ 7e PPT Mod08
Ciampa CompTIASec+ 7e PPT Mod08
Ciampa CompTIASec+ 7e PPT Mod08
to Network Security
Fundamentals, 7th Edition
Module 8: Networking Threats,
Assessments, and Defenses
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. A
ll Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in
Module Objectives
By the end of this module, you should be able to:
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Attacks on Networks
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Interception Attacks (1 of 5)
• Man-in-the-Middle (MITM)
• In an MITM, a threat actor is positioned in a communication between two parties
• The goal of an MITM attack is to eavesdrop on the conversation or impersonate one of
the parties
• A typical MITM attack has two phases:
• The first phase is intercepting the traffic
• The second phase is to decrypt the transmissions
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Interception Attacks (2 of 5)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Interception Attacks (3 of 5)
• Session Replay
• A replay attack makes a copy of a legitimate transmission before sending it to the
recipient
• Attacker uses the copy at a later time
• Example: capturing logon credentials
• Threat actors use several techniques for stealing an active session ID:
• Network attacks (hijacks and altered communication between two users)
• Endpoint attacks (cross-site scripting, Trojans, and malicious JavaScript coding)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Interception Attacks (4 of 5)
• Man-in-the-Browser (MITB)
• A man-in-the-browser (MITB) attack intercepts communication between parties to steal
or manipulate the data
• It occurs between a browser and the underlying computer
• A MITB attack usually begins with a Trojan infecting the computer and installing an
“extension” into the browser configuration
• When the browser is launched the extension is activated
• Extension waits for a specific webpage in which a user enters information such as
account number and password for a financial institution
• When users click “Submit” the extension captures all the data from the fields on the form
• May even modify some of the data
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Interception Attacks (5 of 5)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 2 Attacks (1 of 2)
• The OSI reference model separates networking steps into a series of seven layers
• Within each layer, different networking tasks are performed that cooperate with the tasks
in the layers immediately above and below it
• Layer 2, the Data Link Layer, is responsible for dividing the data into packets
• A compromise at Layer 2 can affect the entire communication
• Address Resolution Protocol Poisoning
• If the IP address for a device is known but the MAC address is not, the sending computer
sends an Address Resolution Protocol (ARP) packet to determine the MAC address
• MAC addresses are stored in an ARP cache for future reference
• ARP poisoning
• Relies upon MAC spoofing, which is imitating another computer by means of
changing the MAC address
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layer 2 Attacks (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
DNS Attacks (1 of 3)
• Domain Name System (DNS) is a hierarchical name system for matching computer names
and IP addresses
• A DNS-based attack substitutes a DNS address so that the computer is silently
redirected to a different device
• A successful DNS attack has two consequences:
• URL redirection
• Domain reputation
• Attacks using DNS include DNS poisoning and DNS hijacking
• DNS Poisoning
• DNS poisoning modifies a local lookup table on a device to point to a different domain
• Two locations for DNS poisoning
• Local host table
• External DNS server
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
DNS Attacks (2 of 3)
• DNS Hijacking
• DNS hijacking is intended to infect an external DNS server with IP addresses that point
to malicious sites
• DNS hijacking has the advantage of redirecting all users accessing the server
• Attackers attempt to exploit a protocol flaw and convince the authentic DNS server to
accept fraudulent DNS entries sent from the attackers’ DNS server
• If the DNS server does not correctly validate DNS responses to ensure they have come
from an authoritative source, it stores the fraudulent entries locally and serves them to
users
• Spreading them to other DNS servers
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
DNS Attacks (3 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Distributed Denial of Service Attack
• A denial of service (DoS) attack is a deliberate attempt to prevent authorized users from
accessing a system by overwhelming it with requests
• Most DoS attacks today are distributed denial of service (DDoS)
• Using hundreds or thousands of devices flooding the server with requests
• The devices participating in a DDoS attack are infected and controlled by threat actors so
that users are completely unaware that their endpoints are part of a DDoS attack
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Malicious Coding and Scripting Attacks (1 of 3)
• Some network attacks come from malicious software code and scripts
• These attacks use PowerShell, Visual Basic for Applications, the coding language Python,
and the Linux/UNIX Bash
• PowerShell is a task automation and configuration management framework from Microsoft
• Administrative tasks are performed by cmdlets, which are specialized .NET classes that
implement a specific operation
• PowerShell allows attackers to inject code from the PowerShell environment into other
processes without first storing any malicious code on the hard disk
• Commands can then be executed while bypassing security protections and leave no
evidence behind
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Malicious Coding and Scripting Attacks (2 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Malicious Coding and Scripting Attacks (3 of 3)
• Python
• Python is a popular programming language that can run on several OS platforms
• There are several best practices to follow when using Python so that the code does not
contain vulnerabilities:
• Use the latest version of Python
• Stay current on vulnerabilities within Python
• Be care when formatting strings in Python
• Download only vetted Python libraries
• Bash
• Bash is the command language interpreter for the Linux/UNIX OS
• Bash scripting is using Bash to create a script
• Exploits have taken advantage of vulnerabilities in Bash
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1
In which type of attack is the threat actor positioned between two parties and alters the
transmission to eavesdrop or impersonate one of the parties?
a. MITB
b. MAC cloning
c. MITM
d. Session replay
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1: Answer
In which type of attack is the threat actor positioned between two parties and alters the
transmission to eavesdrop or impersonate one of the parties?
Answer: c. MITM
In a man-in-the-middle (MITM) attack, a threat actor is positioned between two parties
with the goal of eavesdropping or impersonating a party. In an MITM attack, the
transmission is altered whereas in a session replay attack, a copy is made of a
legitimate transmission for the purpose of replaying it later.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Tools for Assessment and Defense
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Reconnaissance and Discovery Tools
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Linux File Manipulation Tools
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Scripting Tools
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Packet Capture and Replay Tools (1 of 2)
• Collecting and analyzing data packets that cross a network can provide valuable information
• Packet analysis typically examines the entire contents of the packet, which can be used
extensively for security
• It can detect unusual behavior that could indicate the presence of malware, search for
unusual domains or IP address endpoints, and discover regular connections to a threat
actor’s command and control (C&C) server
• Wireshark is a popular GUI packet capture and analysis tool
• Tcpdump is a command-line packet analyzer
• Tcpreplay is a tool for editing packets and then “replaying” the packets back onto the
network to observe their behavior
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Packet Capture and Replay Tools (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 2
Which of the following is a GUI tool that it used to capture and analyze packets?
a. Tcpdump
b. PowerShell
c. Tcpreplay
d. Wireshark
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 2: Answer
Which of the following is a GUI tool that it used to capture and analyze packets?
Answer: d. Wireshark
Wireshark is a GUI packet capture and analysis tool. Tcpdump is a command-line
packet analyzer, Tcprelay is used to edit and replay packets, and PowerShell is a
scripting tool.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Physical Security Controls
• Physical security involves preventing a threat actor from physically accessing the network
• Physical security controls include:
• External perimeter defenses
• Internal physical security controls
• Computer hardware security
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
External Perimeter Defenses (1 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
External Perimeter Defenses (2 of 2)
• Personnel
• Human security guards who patrol and monitor restricted areas are most often used as
an active security defense
• In settings that require a higher level of protection, two security guards may be required
• Some guards are responsible for monitoring activity captured by video surveillance
cameras that transmit a signal to a specific and limited set of receivers called closed
circuit television (CCTV)
• Drones, also called unmanned aerial vehicles (UAVs), include cameras for monitoring
activity
• Robot sentries that patrol and use CCTV with object detection are increasingly being
used in public areas
• Sensors
• To supplement the work of security guards, sensors can be placed in strategic locations
to alert guards by generating an audible alarm of an unexpected or unusual action
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internal Physical Security Controls (1 of 5)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internal Physical Security Controls (2 of 5)
• Secure Areas
• A demilitarized zone (DMZ) in cybersecurity is an area that separates threat actors from
defenders
• A mantrap is designed as an air gap to separate a nonsecure area from a secured area
(see Figure 8-11 on the following slide)
• A mantrap device monitors and controls two interlocking doors to a vestibule
• Another area that must be secured is the data center that houses the on-premises
network, server, and storage equipment
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internal Physical Security Controls (3 of 5)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internal Physical Security Controls (4 of 5)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internal Physical Security Controls (5 of 5)
• Fire Suppression
• In a data center containing electronic equipment, using water or a handheld fire
extinguisher is not recommended because it can contaminate equipment
• Stationary fire suppression systems are integrated into the building’s infrastructure and
release fire suppressant
• Systems can be classified as:
▶
Dry chemical systems that disperse a fine, dry powder over the fire
▶
Clean agent systems that extinguish a fire by reducing heat, removing or
isolating oxygen, or inhibiting the chemical reaction
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Hardware Security (1 of 2)
• Computer hardware security is the physical security that involves protecting endpoint
hardware
• A cable lock can be inserted into the security slot of a portable device to secure the device
• For storage, a laptop can be placed in a safe or a vault
• These can be prewired for electrical power as well as wired network connections
• Computer systems, printers, and similar electronic devices emit electromagnetic fields,
which can result in interference (called electromagnetic interference or EMI)
• Electromagnetic spying can be defined as picking up electromagnetic fields and reading
data that is producing them
• A Faraday cage is a metallic enclosure that prevents entry or escape of an
electromagnetic field. A Faraday cage can prevent electromagnetic spying and remote
wiping of electronic devices.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Hardware Security (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 3
What can be used to secure electronic devices from electromagnetic spying and shield them
from EMI?
a. Demilitarized zone
b. PDS
c. Faraday cage
d. Mantrap
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 3: Answer
What can be used to secure electronic devices from electromagnetic spying and shield them
from EMI?
Answer: c. Faraday cage
A Faraday cage is a metallic enclosure that prevents the entry or escape of an
electromagnetic field.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Self-Assessment
For each objective, write two or three sentences explaining what you learned
about each of these objectives from reading the module and performing the
exercises.
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (1 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.