what every attack has in common
5 phases of an attack
It is also important to note that this is an iterative process or what some like to call a “shampoo process.” If you ever read the instructions on a bottle of shampoo, they say, “wash, rinse, repeat.” The example applies here because as soon as you gain access to an organizations system, other systems become visible. Perhaps from the internet, you were only able to observe three public IP addresses. As soon as you gain access to one of those, 20 more become visible to you. Meaning your very next step is to move back to recon, scanning, and so on to repeat the process on the newly visible targets.
Cyber Kill Chain
Robots.txt
Google dorks
Social engineering
- direct and indirect
Spearpishing, vishing, social engineering - physical
Vishing
* Another form of social engineering that is gaining in popularity is sometimes referred to as vishing. It is essentially phishing via telephone. One common vishing scenario that is making its way around the country is listed on the slide. Another is that you get a call at 3 a.m. after checking into a hotel room. The “girl at the front desk” says there is a problem with your credit card. You either have to give them new credit card information or leave the hotel immediately with the police officers she has waiting with her at the front desk
Social Engineering : Physical
* Social engineering will also often defeat physical security. “Tailgating” through a secure door is often extremely easy to do, especially if you appear to belong. Masquerading as service technicians, UPS delivery people, or pizza delivery people, and the list continues
* Dumpster diving is not social engineering; it is a social engineer’s gold mine. Successful dumpster diving often yields information valuable to the social engineer. Think about the value of the company phone directory. In his younger days, Keven Mitnick had the name, position, and office phone number of almost all PacBell managers memorized. If someone were to call you and say, “Hi, I work for John Smith, director of marketing. You can call him at 123-7895 to verify that. He wanted me to find out …” You check the company phone book and find that the information provided is indeed accurate.
Social engineering: prevention
Spoofing
- IP address spoofing
- ARP cache poisining
- Email address falsification
- picture on page 110
The man-in-the-middle
ARP cache poisining
- picture on page 112
Water hole attack
Drive-by download
- picture on page 114
moving laterally, pivoting, island hopping
Buffer overflow
- picture on page 115
Denial of service
SYN flooding
Distributed denial of service
Domain attacks (DNS)
Keystroke capture