Module 2
Module 2
Another group, called the Cisco Product Security Incident Response Team
(PSIRT), is responsible for investigating and mitigating potential
vulnerabilities in Cisco products. The figure displays a sample Cisco Security
Advisories page which lists these vulnerabilities in real time and provides
network administrators with information to help mitigate them.
2.1.4 Vectors of Network Attacks
An attack vector is a path by which a threat actor can gain access to a
server, host, or network. Attack vectors originate from inside or outside the
corporate network, as shown in the figure. For example, threat actors may
target a network through the internet, to disrupt network operations and
create a denial of service (DoS) attack.
External and Internal Threats
Note: A DoS attack occurs when a network device or application is
incapacitated and no longer capable of supporting requests from legitimate
users.
An internal user, such as an employee, can accidentally or intentionally:
Steal and copy confidential data to removable media, email, messaging
software, and other media.
Compromise internal servers or network infrastructure devices.
Disconnect a critical network connection and cause a network outage.
Connect an infected USB drive into a corporate computer system.
Internal threats have the potential to cause greater damage than external
threats because internal users have direct access to the building and its
infrastructure devices. Employees may also have knowledge of the
corporate network, its resources, and its confidential data.
Network security professionals must implement tools and apply techniques
for mitigating both external and internal threats.
2.1.5 Data Loss
Data is likely to be an organization’s most valuable asset. Organizational
data can include research and development data, sales data, financial data,
human resource and legal data, employee data, contractor data, and
customer data.
Data loss, or data exfiltration, is when data is intentionally or unintentionally
lost, stolen, or leaked to the outside world. The data loss can result in:
Brand damage and loss of reputation
Loss of competitive advantage
Loss of customers
Loss of revenue
Litigation/legal action that results in fines and civil penalties
Significant cost and effort to notify affected parties and recover from
the breach
Network security professionals must protect the organization’s data. Various
Data Loss Prevention (DLP) controls must be implemented that combine
strategic, operational, and tactical measures.
Common data loss vectors are displayed below.
Select the headings to find out more.
Email/Social Networking
The most common vector for data loss includes instant messaging software
and social media sites. For instance, intercepted email or IM messages could
be captured and reveal confidential information.
Unencrypted Devices
A stolen corporate laptop typically contains confidential organizational data.
If the data is not stored using an encryption algorithm, then the thief can
retrieve valuable confidential data.
Cloud Storage Devices
Saving data to the cloud has many potential benefits. However, sensitive
data can be lost if access to the cloud is compromised due to weak security
settings.
Removable Media
One risk is that an employee could perform an unauthorized transfer of data
to a USB drive. Another risk is that a USB drive containing valuable
corporate data could be lost.
Hard Copy
Corporate data should be disposed of thoroughly. For example, confidential
data should be shredded when no longer required. Otherwise, a thief could
retrieve discarded reports and gain valuable information.
Improper Access Control
Passwords are the first line of defense. Stolen passwords or weak passwords
which have been compromised can provide an attacker easy access to
corporate data.
Packet Tracer - Investigate a Threat Landscape
Objectives
Part 1: Investigate a Network Configuration Vulnerability
Part 2: Investigate a Phishing Malware Vulnerability
Part 3: Investigate a Wireless Network and DNS Vulnerability
Background / Scenario
The threat landscape consists of all the vulnerabilities that can be exploited
by threat actors. Every cybersecurity incident involves the exploitation of
vulnerabilities by different types of threat actors. Some threat actors want
money, others want to be famous, and yet others want to destroy
information and infrastructure.
In this activity, you will investigate three vulnerabilities that can be
exploited by threat actors.
Note: In this activity, both the Data Center and ISP/Telco sites are locked.
Instructions
Part 1: Investigate a Network Configuration Vulnerability
Sometimes network security vulnerabilities can happen by accident. For
example, forgetting to update server or host software may expose known
vulnerabilities that could easily be mitigated with a simple update. Similarly,
vulnerabilities may be introduced when a network device is not configured
properly, or a device is defective. In this part, you will explore a vulnerability
that results from a device that is not properly configured with security best
practices.
Step 1: Use a guest network to gain access to other devices on the
network.
a. In Greenville, locate Smartphone 3 just outside of
the Home location.
Mary is the owner of this smartphone. She is a friend of Bob who lives in the
house.Mary is studying to eventually get a job in cybersecurity defense and
is familiar with network penetration testing. She noticed that a guest
wireless network is open and accessible by anyone. She connected to the
guest network and used Nmap to run a scan, which can identify and
discover details about all the active devices. One of the devices appears to
be a webcam. Its IP address is 192.168.100.101.
b. Click Smartphone 3, and then click Command Prompt. Enter the
command ping 192.168.100.101. After one or two #Request timed
out# messages, the remaining pings should be successful.
Mary informs Bob that the network is very vulnerable to attack. Someone
could take control of the webcam, for example, and watch video from inside
the house. Bob invites Mary to come in, investigate the issue, and propose a
solution.
Step 2: Explore the Home network to identify the vulnerability.
a. Click Home. Knowing that home routers typically control home
wireless networks, Mary heads straight for the home office and sits
behind the desk. She will use the Home Office PC to connect to the
router. But first she needs to determine the IP address.
b. Click Home Office PC > Desktop tab > Command Prompt, and
then enter the command ipconfig.
The default gateway is the IP address for the Home Wireless Router.
What is the IP address?
Answer Area
Show Answer
c. Next, Mary uses the Web Browser to connect to the Home
Wireless Router. Close the Command Prompt and click Web
Browser. Enter the default gateway IP address.
d. Bob does not have the documentation for the router nor does he
know the login credentials. Mary looks up the router model on the
internet and discovers that the default credentials use admin for both
the username and password. Login to Home Wireless Router.
e. Click Wireless. Review the Basic Wireless Settings for each of the
three radios that are part of the wireless router.
Which of the radios are active?
Answer Area
Show Answer
What are the SSIDs that are assigned to these radios?
Answer Area
Show Answer
f. Click the Wireless Security submenu.
Is security activated for each of the radios? Are passphrases set?
Answer Area
Show Answer
g. Mary was able to access the network from outside without logging in;
therefore, she investigates further. Click the Guest
Network submenu and investigate the settings.
Is the Guest network active? If so, on which radio?
Answer Area
Show Answer
A wireless Guest network should only provide access to the internet for
guests. It should not permit guests to access the devices on local network
inside the house. In this case, guests can access the local network. This
indicates that the home router is misconfigured.
What would you propose Bob do to secure this network?
Answer Area
Show Answer
Part 2: Investigate a Phishing Malware Vulnerability
Phishing is a type of social engineering attack where a threat actor disguises
themself as being a legitimate, trusted source in order to trick you into
installing malware on your device, or share personal or financial information.
Phishing attacks typically come through emails or phone calls. Unlike other
network vulnerabilities, the primary vulnerability in phishing attacks is the
users of the network. For this reason, an important defense against phishing
is training users on how to prevent phishing exploits.
In this part, you will simulate and investigate a phishing attack.
Note: This activity is for demonstration purposes only. Writing and sending
phishing email messages is unethical and is considered a criminal attack in
most jurisdictions.
Step 1: Pose as a threat actor and create a phishing email.
a. Navigate to the Cafe network
b. Click the Cafe Hacker Laptop > Desktop tab > Email.
c. Click Compose.
Use your imagination to write a phishing email. Your objective is to persuade
the user to copy and paste a URL from your email message into their
browser. Include the link pix.example.com in the email. You can look for
example phishing emails online to see how threat actors write this type of
email.
Note: Links in phishing emails are typically active or #hot# links. All the
victim has to do is click it. However, Packet Tracer does not support the use
of active links inside the email client.
d. Send your email to three people inside the Branch Office network.
Their email addresses are as follows:
[email protected]
[email protected]
[email protected]
Step 2: Open the emails received from the threat actor.
a. Navigate to the Branch Office.
b. Click one of the devices, either PC-BR1, Laptop BR-1, or Laptop
BR-2.
c. Click Desktop tab > Email, and then click Receive. You should
receive the email that you just sent.
Note: Packet Tracer may take up to a minute to converge. You may need to
click Receive several times if the email is not successfully retrieved.
d. Optional: Go to the other victim devices, open their Email client, and
click Receive to verify that they also received your phishing email.
Step 3: Pose as a victim and follow the phishing instructions.
a. Read the email and copy the website address.
b. Close the Mail Browser window, and then click Web Browser.
c. Paste the URL into the URL field, and then Go.
Note: Packet Tracer may take up to a minute to converge. You can
click Fast Forward Time (Alt+D) to speed up the process.
What happened when the webpage loaded?
Answer Area
Show Answer
What is this type of attack called?
Answer Area
Show Answer
In a real world situation, this email is typically spread by a virus that
automatically sends malicious emails to all the addresses in your contact
list.
Describe the damage this type of attack can cause within an organization?
Answer Area
Show Answer
Employees should be trained how to identify phishing emails and the actions
that should be taken to prevent damage from them. In addition,
organizations can configure firewalls, intrusion prevention systems, and
other security devices and software, to block phishing emails before
entering the network. Some businesses subscribe to services that compile
and maintain lists of malicious websites. The security devices in the
organization can then uses these lists to automatically update filters for
blocking malicious traffic.
Part 3: Investigate a Wireless Network and DNS Vulnerability
Your average network user tends to trust open Wi-Fi networks out in public
places. Using Wi-Fi instead cellular data services can provide faster data
rates and be more cost effective. However, threat actors can configure a
laptop with a Wi-Fi interface that can act as both a Wi-Fi access point and a
Wi-Fi client. This means that threat actors can create their own wireless
networks and broadcast a convincing SSID to potential victims in public
places. Threat actors use these rogue access points to create main-in-the-
middle attacks. In this attack, threat actors can capture and read all the
wireless traffic from devices that associate with the rogue access point,
potentially learning usernames, passwords, and other confidential
information.
In this part, you will investigate how a rogue access point can be used to
entice users to connect to a fake wireless network. When combined with
network services such as DHCP and DNS, users can become victims of
malicious website attacks through DNS hijacking.
Step 1: Connect to the threat actor’s wireless network.
a. Navigate to the Cafe. Notice the threat actor sitting in the corner.
b. Click the Hacker Backpack and investigate the contents. In his
backpack, he has a wireless router and a network sniffer. His goal is to
intercept user traffic and direct it to a malicious server.
c. Return to the Cafe and click the Cafe Customer laptop
> Desktop tab > PC Wireless application.
d. Click the Connect tab. You may need to click Refresh to see the list
of available wireless networks.
If you were in the Cafe, which wireless network would you chose to connect
to? Explain.
Answer Area
Show Answer
e. Click any of the Cafe_WI-FI_FAST network names and then
click Connect.
Step 2: Visit your favorite social media site.
a. Close the PC Wireless application and click Web Browser.
b. In the URL field, enter friends.example.com, and then click Go. This
website is a supposed to be a legitimate social network in this
simulation.
What happened?
Answer Area
Show Answer
What was the URL for the malware server that was used in the phishing
attack scenario? Is it the same?
Answer Area
Show Answer
Step 3: Investigate the source of the attack.
a. Close the Web Browser and click IP Configuration.
b. In the Cafe, click VPN Laptop > Desktop tab > IP Configuration.
c. Click Cafe Customer from your task bar to bring it back into view
and then arrange the two IP Configuration windows side by side.
Compare the values between the two devices.
What are the differences between the addresses of the two laptops?
Answer Area
Show Answer
d. Investigate the Cafe Hacker Laptop.
What is its IP address? Why is this significant?
Answer Area
Show Answer
On the Café Hacker Laptop, click the Services tab > DNS.
e. Locate the Name for the friends.example.com website. Note that
the IP address is the same IP address as is associated
with pix.example.com from the phishing attack earlier.
f. Under Services, click DHCP. Notice that the DNS server address
distributed to the hosts over DHCP is the same one assigned to Café
Customer.
What are the steps in this attack?
Answer Area
Show Answer
Summary
In this activity, we have looked at three different ways in which
vulnerabilities can lead to exploits. As an informed network user or
cybersecurity professional, it is your responsibility to think about the
different ways in which such vulnerabilities can be detected and mitigated
before a cyber attack occurs.End of document
Cybercriminals
Cybercriminal is a term for black hat hackers who are either self-employed
or working for large cybercrime organizations. Each year, cyber criminals
are responsible for stealing billions of dollars from consumers and
businesses.
State-sponsored
State-Sponsored hackers are threat actors who steal government secrets,
gather intelligence, and sabotage networks of foreign governments, terrorist
groups, and corporations. Most countries in the world participate to some
degree in state-sponsored hacking. Depending on a person’s perspective,
these are either white hat or black hat hackers.
2.2.4 Cybercriminals
Cybercriminals are threat actors who are motivated to make money using
any means necessary. While sometimes cybercriminals work independently,
they are more often financed and sponsored by criminal organizations. It is
estimated that globally, cybercriminals steal billions of dollars from
consumers and businesses every year.
Cybercriminals operate in an underground economy where they buy, sell,
and trade exploits and tools. They also buy and sell the personal information
and intellectual property that they steal from victims. Cybercriminals target
small businesses and consumers, as well as large enterprises and industries.
For instance, a user receives an email claiming they have won a big prize.
Clicking on the link in the email results in an attack. The IOC could include
the fact the user did not enter that contest, the IP address of the sender, the
email subject line, the URL to click, or an attachment to download, among
others.
Indicators of attack (IOA) focus more on the motivation behind an attack and
the potential means by which threat actors have, or will, compromise
vulnerabilities to gain access to assets. IOAs are concerned with the
strategies that are used by attackers. For this reason, rather than informing
response to a single threat, IOAs can help generate a proactive security
approach. This is because strategies can be reused in multiple contexts and
multiple attacks. Defending against a strategy can therefore prevent future
attacks that utilize the same, or similar strategy.