Cisco !#&? be a network ninja


To the top Chapter 2.2.1 Chapter 2.2.2 Chapter 2.2.3 Chapter 2.2.4 Chapter 2.2.5 Chapter 2.2.6 Chapter 2.2.7 Chapter 2.2.8 Chapter 2.2.9 Chapter 2.2.10 Chapter 2.2.11

Introduction to Cybersecurity

One course of Cisco's "Skills for all"

On completing this course, you will be able to:

Module 2 - Attacks, Concepts and Techniques

Welcome to this module, which will explore the different methods that cybercriminals use to launch an attack

Understanding what these are and how they work is the best way to protect ourselves. So, let’s make sure you know what you’re up against.

Chapter 2.2 - Methods of Infiltration

2.2.1 Social Engineering

Social engineering is the manipulation of people into performing actions or divulging confidential information. Social engineers often rely on people’s willingness to be helpful, but they also prey on their weaknesses. For example, an attacker will call an authorized employee with an urgent problem that requires immediate network access and appeal to the employee’s vanity or greed or invoke authority by using name-dropping techniques in order to gain this access.

Pretexting

This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data.

For example, pretending to need a person’s personal or financial data in order to confirm their identity.

Tailgating

This is when an attacker quickly follows an authorized person into a secure, physical location.

Something for something (quid pro quo)

This is when an attacker requests personal information from a person in exchange for something, like a free gift.

2.2.2 Denial-of-Service

Denial-of-Service (DoS) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some sort of interruption of network service to users, devices or applications.

Overwhelming quantity of traffic

This is when a network, host or application is sent an enormous amount of data at a rate which it cannot handle. This causes a slowdown in transmission or response, or the device or service to crash.

Maliciously formatted packets

A packet is a collection of data that flows between a source and a receiver computer or application over a network, such as the Internet. When a maliciously formatted packet is sent, the receiver will be unable to handle it.

For example, if an attacker forwards packets containing errors or improperly formatted packets that cannot be identified by an application, this will cause the receiving device to run very slowly or crash.

DoS attacks are considered a major risk because they can easily interrupt communication and cause significant loss of time and money.

2.2.3 Distributed DoS

A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple, coordinated sources. For example:

  • An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems.
  • The zombie computers will constantly scan and infect more hosts, creating more and more zombies.
  • When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.

Distributed DoS

2.2.4 Botnet

A bot computer is typically infected by visiting an unsafe website or opening an infected email attachment or infected media file. A botnet is a group of bots, connected through the Internet, that can be controlled by a malicious individual or group. It can have tens of thousands, or even hundreds of thousands, of bots that are typically controlled through a command and control server.

These bots can be activated to distribute malware, launch DDoS attacks, distribute spam email, or execute brute-force password attacks. Cybercriminals will often rent out botnets to third parties for nefarious purposes.

Many organizations. like Cisco, force network activities through botnet traffic filters to identify any botnet locations.

Botnet

  1. Infected bots try to communicate with a command and control host on the Internet.
  2. The Cisco Firewall botnet filter is a feature that detects traffic coming from devices infected with the malicious botnet code.
  3. The cloud-based Cisco Security Intelligence Operations (SIO) service pushes down updated filters to the firewall that match traffic from new known botnets.
  4. Alerts go out to Cisco’s internal security team to notify them about the infected devices that are generating malicious traffic so that they can prevent, mitigate and remedy these.

2.2.5 On-Path Attacks

On-path attackers intercept or modify communications between two devices, such as a web browser and a web server, either to collect information from or to impersonate one of the devices.

This type of attack is also referred to as a man-in-the-middle or man-in-the-mobile attack.

A MitM attack happens when a cybercriminal takes control of a device without the user’s knowledge. With this level of access, an attacker can intercept and capture user information before it is sent to its intended destination. These types of attacks are often used to steal financial information.

There are many types of malware that possess MitM attack capabilities.

A variation of man-in-middle, MitMo is a type of attack used to take control over a user’s mobile device. When infected, the mobile device is instructed to exfiltrate user-sensitive information and send it to the attackers. ZeuS is one example of a malware package with MitMo capabilities. It allows attackers to quietly capture two-step verification SMS messages that are sent to users.

There are a lot of ways for cybercriminals to infiltrate your systems and networks, but it’s important that you know what these are.

2.2.6 SEO Poisoning

You’ve probably heard of search engine optimization or SEO which, in simple terms, is about improving an organization’s website so that it gains greater visibility in search engine results.

So what do you think SEO poisoning might be?

Search engines such as Google work by presenting a list of web pages to users based on their search query. These web pages are ranked according to the relevancy of their content.

While many legitimate companies specialize in optimizing websites to better position them, attackers take advantage of popular search terms and use SEO to push malicious sites higher up the ranks of search results. This technique is called SEO poisoning.

The most common goal of SEO poisoning is to increase traffic to malicious sites that may host malware or attempt social engineering.

2.2.7 Wi-Fi Password Cracking

You’re enjoying your lunch in the canteen when a colleague approaches you. They seem distressed.

They explain that they can’t seem to connect to the public Wi-Fi on their phone and ask if you have the private Wi-Fi password to hand so that they can check that their phone is working.

How would you respond?

This colleague could be carrying out a social engineering attack, manipulating you to provide the password used to protect the organization’s private wireless network. You can never be too careful – and, for answering correctly, you’ve earned some defender points. Well done!

Hackers have other techniques up their sleeves. Some use brute-force attacks, testing possible password combinations to try and guess a password. Others are able to identify unencrypted passwords by listening in and capturing packets sent on the network. This is called network sniffing. If the password is encrypted, they may still be able to reveal it using a password cracking tool.

2.2.8 Password Attacks

Entering a username and password is one of the most popular forms of authenticating to a web site. Therefore, uncovering your password is an easy way for cybercriminals to gain access to your most valuable information.

Password spraying

This technique attempts to gain access to a system by ‘spraying’ a few commonly used passwords across a large number of accounts. For example, a cybercriminal uses 'Password123' with many usernames before trying again with a second commonly-used password, such as ‘qwerty‘.

This technique allows the perpetrator to remain undetected as they avoid frequent account lockouts.

Dictionary attacks

A hacker systematically tries every word in a dictionary or a list of commonly used words as a password in an attempt to break into a password-protected account.

Brute-force attacks

The simplest and most commonly used way of gaining access to a password-protected site, brute-force attacks see an attacker using all possible combinations of letters, numbers and symbols in the password space until they get it right.

Rainbow attacks

Passwords in a computer system are not stored as plain text, but as hashed values (numerical values that uniquely identify data). A rainbow table is a large dictionary of precomputed hashes and the passwords from which they were calculated.

Unlike a brute-force attack that has to calculate each hash, a rainbow attack compares the hash of a password with those stored in the rainbow table. When an attacker finds a match, they identify the password used to create the hash.

Traffic interception

Plain text or unencrypted passwords can be easily read by other humans and machines by intercepting communications.

If you store a password in clear, readable text, anyone who has access to your account or device, whether authorized or unauthorized, can read it.

2.2.9 Cracking Times

It looks as if the hackers are trying everything to crack @Apollo’s private Wi-Fi password. We have to make sure that the password is strong enough to withstand their attack!

Take a look at the following passwords. Click the numbers to put them in the correct order according to how long you think it would take an attacker to crack each one using brute-force, where 1 is the shortest amount of time and 4, the highest.

Password

H$1gh#7iD@3

K4km9n2R

3trawberry

  1. Footprinting through the network to find ways to intrude gives you a chance to gather the information you need to plan a simulated attack.
  2. Scanning a target allows you to identify potential exploitable weaknesses.
  3. You will need to gain access to a network to exploit any vulnerabilities and simulate an attack.
  4. Maintaining access , without being detected, means that you can gather further information on a target’s vulnerabilities.
  5. Your findings will be reported to the organization so that security improvements can be made.

2.2.10 Advanced Persistent Threats

Attackers also achieve infiltration through advanced persistent threats (APTs) — a multi-phase, long term, stealthy and advanced operation against a specific target. For these reasons, an individual attacker often lacks the skill set, resources or persistence to perform APTs.

APT (Advanced Persistent Threats)

Due to the complexity and the skill level required to carry out such an attack, an APT is usually well-funded and typically targets organizations or nations for business or political reasons.

Its main purpose is to deploy customized malware on one or more of the target’s systems and remain there undetected.

2.2.11 It’s Over to You...

Phew! That’s a lot to take in and hackers certainly have a lot of tools at their disposal. It is important that you know what these are so that you can protect yourself and @Apollo.

You think back to some of the suspicious activities that you’ve seen recently in the organization. Based on what you have learned in this topic, what type of attack could each of these scenarios be? Take your time with this one. You have a chance to earn some much-needed defender points.

Select the correct answer from the dropdowns.

On your way into the office, a person whom you have never seen before asks you to hold the door — they forgot their access card

You have started getting an error message when accessing your computer: ‘Your connection was interrupted. A network change was detected.’

You searched for @Apollo’s website on Google, but when you clicked on the top result, you were redirected to a page advertising antivirus software

Skills for all