Explain the basics of being safe online, including what cybersecurity is and its potential impact.
Explain the most common cyber threats, attacks and vulnerabilities.
Explain how organizations can protect their operations against these attacks.
Access various information and resources to explore the different career options in cybersecurity.
Module 2 - Attacks, Concepts and Techniques
Welcome to this module, which will explore the different methods that cybercriminals use to launch an
attack
Understanding what these are and how they work is the best way to protect ourselves. So, let’s make sure
you know what you’re up against.
Chapter 2.2 - Methods of Infiltration
2.2.1 Social Engineering
Social engineering is the manipulation of people into performing actions or divulging confidential
information. Social engineers often rely on people’s willingness to be helpful, but they also prey
on their weaknesses. For example, an attacker will call an authorized employee with an urgent
problem that requires immediate network access and appeal to the employee’s vanity or greed or
invoke authority by using name-dropping techniques in order to gain this access.
2.2.2 Denial-of-Service
Denial-of-Service (DoS) attacks are a type of network attack that is relatively simple to carry out,
even by an unskilled attacker. A DoS attack results in some sort of interruption of network service
to users, devices or applications.
DoS attacks are considered a major risk because they can easily interrupt communication and cause
significant loss of time and money.
2.2.3 Distributed DoS
A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple, coordinated
sources. For example:
An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by
handler systems.
The zombie computers will constantly scan and infect more hosts, creating more and more zombies.
When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out
a DDoS attack.
2.2.4 Botnet
A bot computer is typically infected by visiting an unsafe website or opening an infected email
attachment or infected media file. A botnet is a group of bots, connected through the Internet, that
can be controlled by a malicious individual or group. It can have tens of thousands, or even
hundreds of thousands, of bots that are typically controlled through a command and control server.
These bots can be activated to distribute malware, launch DDoS attacks, distribute spam email, or
execute brute-force password attacks. Cybercriminals will often rent out botnets to third parties
for nefarious purposes.
Many organizations. like Cisco, force network activities through botnet traffic filters to identify
any botnet locations.
2.2.5 On-Path Attacks
On-path attackers intercept or modify communications between two devices, such as a web browser and
a web server, either to collect information from or to impersonate one of the devices.
This type of attack is also referred to as a man-in-the-middle or man-in-the-mobile attack.
There are a lot of ways for cybercriminals to infiltrate your systems and networks, but it’s
important that you know what these are.
2.2.6 SEO Poisoning
You’ve probably heard of search engine optimization or SEO which, in simple terms, is about
improving an organization’s website so that it gains greater visibility in search engine results.
So what do you think SEO poisoning might be?
2.2.7 Wi-Fi Password Cracking
You’re enjoying your lunch in the canteen when a colleague approaches you. They seem distressed.
They explain that they can’t seem to connect to the public Wi-Fi on their phone and ask if you have
the private Wi-Fi password to hand so that they can check that their phone is working.
How would you respond?
This colleague could be carrying out a social engineering attack, manipulating you to provide the
password used to protect the organization’s private wireless network. You can never be too careful –
and, for answering correctly, you’ve earned some defender points. Well done!
Hackers have other techniques up their sleeves. Some use brute-force attacks, testing possible
password combinations to try and guess a password. Others are able to identify unencrypted passwords
by listening in and capturing packets sent on the network. This is called network sniffing. If the
password is encrypted, they may still be able to reveal it using a password cracking tool.
2.2.8 Password Attacks
Entering a username and password is one of the most popular forms of authenticating to a web site.
Therefore, uncovering your password is an easy way for cybercriminals to gain access to your most
valuable information.
It looks as if the hackers are trying everything to crack @Apollo’s private Wi-Fi password. We have
to make sure that the password is strong enough to withstand their attack!
Take a look at the following passwords. Click the numbers to put them in the correct order according
to how long you think it would take an attacker to crack each one using brute-force, where 1 is the
shortest amount of time and 4, the highest.
Password
H$1gh#7iD@3
K4km9n2R
3trawberry
Footprinting through the network to find ways to intrude gives you a chance to gather the
information you need to plan a simulated attack.
Scanning a target allows you to identify potential exploitable weaknesses.
You will need to gain access to a network to exploit any vulnerabilities and simulate an
attack.
Maintaining access , without being detected, means that you can gather further
information on a
target’s vulnerabilities.
Your findings will be reported to the organization so that security improvements can be
made.
2.2.10 Advanced Persistent Threats
Attackers also achieve infiltration through advanced persistent threats (APTs) — a multi-phase, long
term, stealthy and advanced operation against a specific target. For these reasons, an individual
attacker often lacks the skill set, resources or persistence to perform APTs.
Due to the complexity and the skill level required to carry out such an attack, an APT is usually
well-funded and typically targets organizations or nations for business or political reasons.
Its main purpose is to deploy customized malware on one or more of the target’s systems and remain
there undetected.
2.2.11 It’s Over to You...
Phew! That’s a lot to take in and hackers certainly have a lot of tools at their disposal. It is
important that you know what these are so that you can protect yourself and @Apollo.
You think back to some of the suspicious activities that you’ve seen recently in the organization.
Based on what you have learned in this topic, what type of attack could each of these scenarios be?
Take your time with this one. You have a chance to earn some much-needed defender points.
Select the correct answer from the dropdowns.
On your way into the office, a person whom you have never seen before asks you to hold the
door — they forgot their access card
You have started getting an error message when accessing your computer: ‘Your connection was
interrupted. A network change was detected.’
You searched for @Apollo’s website on Google, but when you clicked on the top result, you
were redirected to a page advertising antivirus software