Comptia Security Plus Notes
Comptia Security Plus Notes
Comptia Security Plus Notes
Description: In this episode, we discuss the methods used by bad actors to deceptively
manipulate individuals into divulging confidential information through social engineering. We
will compare and contrast different types of social engineering techniques like phishing,
whaling, spam, spear phishing and more.
Principles of Security
Vulnerability
Threat
Attack
Social Engineering
o Phishing (Authority, Trust, Urgency)
Vishing
Smishing
Spear phishing
Whaling
o Spam
o Spam over Internet messaging (SPIM)
o Pharming
Redirection to a bogus site
DNS poisoning
Malware
o Watering hole attack
Usually starts with reconnaissance
Determine what website a target group frequent
Inject malicious code into the website
Targets get infected as they visit the website
o Credential harvesting
Scraping usernames and password from a website clone (Familiarity)
o Typo squatting
URL Hijacking
Physical Techniques
o Dumpster diving
o Shoulder surfing
o Tailgating
o Pretexting
Creating a fabricated scenario
Outliers
o Invoice scams
o Hoax
o Prepending
Most social engineering
o Impersonation (Urgency)
All social engineering
o Identity fraud
All social engineering
o Eliciting information
All social Engineering
Showname: Security+ (SY0-601) Topic: Threats, Attacks and Vulnerabilities Episode: Password
Attacks Learner Objectives: Given a scenario, analyze potential indicators to determine the
type of attack. Description: In this episode, the viewer will identify various types of password-
based attacks such as spraying, brute force, dictionary attacks, and rainbow tables.
Guessing
Password Attacks * Brute Force
Dictionary
Rainbow Tables
Spraying: And in a spraying attack is where you're like, for instance, let's say taking a single
password trying against multiple accounts,
Online Attacks
Offline Attacks
Tools
o hashcat
o Hydra
o John the Ripper
o PACK
o CeWL
o Statsprocessor
o Burp Suite
Topic: Threats, Attacks and Vulnerabilities
Episode: Application Attacks
Learner Objectives:
Given a scenario, analyze potential indicators associated with application attacks.
Description: In this episode, the viewer will analyze the characteristics of injection attacks.
Injections
o Been around for a long time
o Very dangerous
o Impact
Loss of data
Theft of Data
Corruption of data
DoS
Injections
o Structured query language (SQL)
o Lightweight directory access protocol (LDAP)
o Extensible markup language (XML) or XXE attack
o Dynamic link library (DLL)
Command Injection
o Inject commands into the web app that are then executed by the OS.
Episode: Vulnerabilties
Learner Objectives:
Description: In this episode, the viewer will identify situations that lead IT infrastructure
into vulnerable positions such as weak configurations, third-party risk, weak patch
management and legacy platforms.
Weak configurations
o Open permissions
o Unsecure root accounts
o Weak encryption
o Unsecure protocols
o Default settings
o Open ports and services
Third-party risks
o Increase risk for
Intellectual Property Theft
Identity/credential theft
Network Intrusion
Reputation damage (Think Target)
Lack of vendor support
Data storage/Data Breach/Data Theft
Cloud-based risk
o Vendor management
Problems
Compliance risk
Vendor Reputation
Lack of Visibility
Benefits
Screening
Risk Management
Compliance
o System integration
Social Networks (Facebook)
Delivery Systems (USPS,UPS,FedEx)
Online payment systems (Paypal)
Video streaming services (YT, Vimeo)
o Outsourced code development
Improper or weak patch management
o Firmware
Current Firmware 2.0.2.188405
CVE-2019-7579
o Operating system (OS)
o Applications
Legacy platforms
Zero-day
Description: In this episode, the viewer will identify what Open Source Intelligence is,
what it is used for as well as examples like Shodan, Censys and ICANN domain
lookups.
(SY0-601) Topic: Threats, Attacks and Vulnerabilities Episode: Threat Maps and Feeds
Learner Objectives:
Description: In this episode, the viewer will identify various components and attributes of
threat feeds as well as threat feeds. The viewer will identify examples of threat maps as
well as threat feeds.
Mitigating Threats
Threat Maps
o Real time or near real-time map of various attacks around the globe
Sources
o Kaspersky's Threat Map
o FireEye
o Fortinet
(Dan - How are the maps builts)
o Retrieving data from numerous sources
(Dan - could you show us an example?)
o Kaspersky's Threat Map
On-access scans - detection based on copy, run, access
operations
On-Demand Scan - detection based on user-based or manual
scans
Web Anti-virus Scans - html pages opening, downloading files
Mail Antivirus Scans - when objects appear in emails
Intrusion Detection Scans - network detection activity
Vulnerability Scans - vulnerability detection scans
Botnet Activity Scans
Kaspersky's Anti-spam - unwanted/suspicious emails detected by
Kaspersky's email filtering engine
Threat Feeds
o Real-time data streams of data providing information on potential cyber
threats and risks
Information Examples
o Domains with poor reputation
o Known Malware
o IP addresses known for malicious activity
o Machine readable data that can be feed into security information and
event management (SIEM systems).