Threat modelling
Thinking how an adversary would attack a system
White box Testing
Full info shared with testers. Confirms efficacy of internal assessment
BlackBox texting
No info shared with testers about internals.
Identifies ways to access internal IT assets
Attack steps
Passive Recon
GAther info without any engagement with victim
Active Recon
Maltego
Open source intel and graphical link analysis tool
Protection against reconaissance
Scanning
Find entry points and obtain a network map w/ vulnerabilities etc
Scanning example info
Scanning techniques
Ping/ping sweep
FInd out if a machine is alive (sweep = scanning several)
Sweeps can be blocked
Banner Grabbing
Provides details of OS and running apps on a server on a log in message
Firewall enumeration
Used to find what is allowed and what is denied
Firewalk
A network auditing tool that detects misconfigurations
NIDS
Network Intrusion Detection System
Detect scans for particular firewall ports
DNS Enumeration
Locating all DNS servers and records.
For admins this helps maintain control of location of physical servers within a network
Hackers can try to “poison” DNS records to go to them
Port scanning mechanic using TCP/UDP
Send TCP or UDP to all ports and see responses
Port scan uses
Gaining Access
Exploiting one or more vulnerabilities
Main vulnerabilities
Attack Surface
A network might include: services and apps, auth, management sys, remote access
Web app: inputs, queries HTTP components, functions
Access Vector
How the hacker uses a attack surface to access.
Local: physical access
Remote: Remote Procedure Call for example
Privilege Escalation
Taking advantage of flaws to grant elevated access to system/network