Essential Knowledge
The OSI Reference Model
  
    
      | Layer | 
      Description | 
      Technologies | 
      Data Unit | 
    
  
  
    
      | 1 | 
      Physical | 
      USB, Bluetooth | 
      Bit | 
    
    
      | 2 | 
      Data Link | 
      ARP, PPP | 
      Frame | 
    
    
      | 3 | 
      Network | 
      IP | 
      Packet | 
    
    
      | 4 | 
      Transport | 
      TCP | 
      Segment | 
    
    
      | 5 | 
      Session | 
      X255, SCP | 
      Data | 
    
    
      | 6 | 
      Presentation | 
      AFP, MIME | 
      Data | 
    
    
      | 7 | 
      Application | 
      FTP, HTTP, SMTP | 
      Data | 
    
  
TCP/IP Model
  
    
      | Layer | 
      Description | 
      OSI Layer Equivalent | 
    
  
  
    
      | 1 | 
      Network Access | 
      1, 2 | 
    
    
      | 2 | 
      Internet | 
      3 | 
    
    
      | 3 | 
      Transport | 
      4 | 
    
    
      | 4 | 
      Application | 
      5-7 | 
    
  
TCP Handshake
SYN -> SYN-ACK -> ACK
ARP
  - Resolves IP address to physical address
 
Network Security Zones
  - Internet - uncontrollable
 
  - Internet DMZ - controlled buffer network
 
  - Production Network Zone - very restricted; controls direct access from uncontrolled zones; has no users
 
  - Intranet Zone - controlled; has little to no heavy restrictions
 
  - Management Network Zone - might find VLANs and IPSEC; highly secured; strict policies
 
Vulnerabilities
  - Common Vulnerability Scoring System (CVSS) - places numerical score based on severity
 
  - National Vulnerability Database (NVD) - US government repository of vulnerabilities
 
Vulnerability Categories
  - Misconfiguration - improperly configuring a service or application
 
  - Default installation - failure to change settings in an application that come by default
 
  - Buffer overflow - code execution flaw
 
  - Missing patches -  systems that have not been patched
 
  - Design flaws - flaws inherent to system design such as encryption and data validation
 
  - Operating System Flaws - flaws specific to each OS
 
  - Default passwords - leaving default passwords that come with system/application
 
  - Nessus
 
  - Qualys
 
  - GFI Languard
 
  - Nikto
 
  - OpenVAS
 
  - Retina CS
 
Terms to Know
  - Hack value - perceived value or worth of a target as seen by the attacker
 
  - Zero-day attack - attack that occurs before a vendor knows or is able to patch a flaw
 
  - Doxing - searching for and publishing information about an individual usually with a malicious intent
 
  - Enterprise Information Security Architecture (EISA) - process that determines how systems work within an organization
 
  - Incident management - deals with specific incidents to mitigate the attack
 
Threat Modeling
  - Identify security objectives
 
  - Application Overview
 
  - Decompose application
 
  - Identify threats
 
  - Identify vulnerabilities
 
Risk Management
Types of  Security Controls
  
    
      | Description | 
      Examples | 
    
  
  
    
      | Physical | 
      Guards, lights, cameras | 
    
    
      | Technical | 
      Encryption, smart cards, access control lists | 
    
    
      | Administrative | 
      Training awareness, policies | 
    
  
  
    
      | Description | 
      Examples | 
    
  
  
    
      | Preventative | 
      authentication, alarm bells | 
    
    
      | Detective | 
      audits, backups | 
    
    
      | Corrective | 
      restore operations | 
    
  
Business Analysis
  - 
    
Business Impact Analysis (BIA)
    
      - Maximum Tolerable Downtime (MTD)
 
    
   
  - 
    
Business Continuity Plan (BCP)
    
      - Disaster Recovery Plan (DRP)
 
    
   
  - 
    
Annualized Loss Expectancy (ALE)
    
   
User Behavior Analysis (UBA) - tracking users and extrapolating data in light of malicious activity
CIA Triad
  - Confidentiality - passwords, encryption
 
  - Integrity - hashing, digital signatures
 
  - Availability - anti-dos solutions
 
Bit flipping is an example of an integrity attack.  The outcome is not to gain information - it is to obscure the data from the actual user.
Confidentiality != authentication - MAC address spoofing is an authentication attack
  - Routinely called “Common Criteria” (CC)
 
  - Evaluation Assurance Level (EAL) - goes from level 1 - 7
 
  - Target of Evaluation - the system that is being tested
 
  - Security Target (ST) - document describing the TOE and security requirements
 
  - Protection Profile (PP) - security requirements that are specific to the type of device being tested
 
Access Control Types
  - Mandatory (MAC) - access is set by an administrator
 
  - Discretionary (DAC) - allows users to give access to resources that they own and control
 
Security Policies
  - Access Control - what resources are protected and who can access them
 
  - Information Security - what can systems be used for
 
  - Information Protection - defines data sensitivity levels
 
  - Password - all things about passwords (how long, characters required, etc.)
 
  - E-Mail - proper and allowable use of email systems
 
  - Information Audit - defines the framework used for auditing
 
Policy Categorizations
  - Promiscuous - wide open
 
  - Permissive - blocks only known dangerous things
 
  - Prudent - blocks most and only allows things for business purposes
 
  - Paranoid - locks everything down
 
Standards - mandatory rules to achieve consistency
Baselines - provide the minimum security necessary
Guidelines - flexible or recommended actions
Procedures - step by step instructions
Script Kiddie - uneducated in security methods, but uses tools that are freely available to perform malicious activities
Phreaker - manipulates telephone systems
The Hats
  - White Hat - ethical hackers
 
  - Black Hat - hackers that seek to perform malicious activities
 
  - Gray Hat - hackers that perform good or bad activities but do not have the permission of the organization they are hacking against
 
Hacktivist - someone who hacks for a cause
Suicide Hackers - do not case about any impunity to themselves; hack to get the job done
Cyberterrorist - motivated by religious or political beliefs to create fear or disruption
State-Sponsored Hacker - hacker that is hired by a government
Attack Types
  - Operating System (OS) - attacks targeting OS flaws or security issues inside such as guest accounts or default passwords
 
  - Application Level - attacks on programming code and software logic
 
  - Shrink-Wrap Code - attack takes advantage of built-in code or scripts
 
  - Misconfiguration - attack takes advantage of systems that are misconfigured due to improper configuration or default configuration
 
Infowar - the use of offensive and defensive techniques to create an advantage
Hacking Phases
  - Reconnaissance  - gathering evidence about targets
 
  - Scanning & Enumeration - obtaining more in-depth information about targets
 
  - Gaining Access - attacks are leveled in order to gain access to a system
 
  - Maintaining Access - items put in place to ensure future access
 
  - Covering Tracks - steps taken to conceal success and intrusion
 
Types of Reconnaissance
  - Passive - gathering information about the target without their knowledge
 
  - Active - uses tools and techniques that may or may not be discovered
 
Security Incident and Event Management (SIEM)
  - Functions related to a security operations center (SOC)
    
      - Identifying
 
      - Monitoring
 
      - Recording
 
      - Auditing
 
      - Analyzing
 
    
   
Ethical hacker - employs tools that hackers use with a customer’s permission; always obtains an agreement from the client with specific objectives before any testing is done
Cracker - uses tools for personal gain or destructive purposes
Penetration Test
  - Clearly defined, full scale test of security controls
 
  - Phases
    
      - Preparation - contracts and team determined
 
      - Assessment - all hacking phases (reconnaissance, scanning, attacks, etc.)
 
      - Post-Assessment - reports & conclusions
 
    
   
  - Types
    
      - Black Box - done without any knowledge of the system or network
 
      - White Box - complete knowledge of the system
 
      - Gray Box - has some knowledge of the system and/or network
 
    
   
Law Categories
  - Criminal - laws that protect public safety and usually have jail time attached
 
  - Civil - private rights and remedies
 
  - Common - laws that are based on societal customs
 
Laws and Standards
  - OSSTM Compliance - “Open Source Security Testing Methodology Manual” maintained by ISECOM , defines three types of compliance
    
      - Legislative - Deals with goverment regulations (Such as SOX and HIPAA)
 
      - Contractual - Deals with industry / group requirement (Such as PCI DSS)
 
      - Standards based - Deals with practices that must be followed by members of a given group/organization (Such as ITIL ,ISO and OSSTMM itself)
 
    
   
  - OSSTM Controls
    
      - OSSTM Class A - Interactive Controls
        
          - Authentication -  Provides for identification and authorization based on credentials
 
          - Indemnification - Provided contractual protection against loss or damages
 
          - Subjugation - Ensures that interactions occur according to processes defined by the asset owner
 
          - Continuity -  Maintains interactivity with assets if corruption of failure ccours
 
          - Resilience - Protects assets from corruption and failure
 
        
       
      - OSSTM Class B  - Process Controls
        
          - Non-repudiation - Prevents participants from denying its actions
 
          - Confidentiality - Ensures that only participants know of an asset
 
          - Privacy - Ensures that only participants have access to the asset
 
          - Integrity - Ensures that only participants know when assets and processes change
 
          - Alarm  - Notifies participants when interactions occur
 
        
       
    
   
  - 
    
ISO 27001 - Security standard based on the British BS7799 standard, focuses on secuirty governance
   
  - 
    
NIST-800-53 -  Catalogs security and privacy controls for federal information systems, created to help implementation of FISMA
   
  - 
    
ISO 27002 AND 17799 - Based on BS799 but focuses on security objectives and provides security controls based on industry best pratice
   
  - 
    
FISMA - “Federal Information Security Modernization Ac Of 2002” A law updated in 2004 to codify the authority of the Department of Homeland Security with regard to implementation of information security policies
   
  - 
    
FITARA - “Federal Information Technology Acquisition Reform Act” A 2013 bill that was intended to change the framework that determines how the US GOV purchases technology
   
  - 
    
HIPAA - “Health Insurance Portability and Accountability Act” a law that set’s privacy standards to pro
tect patient medical records and health information shared between doctors, hospitals and insurance providers
   
  - 
    
PCI-DSS  - “Payment Card Industry Data Security Standard” Standard for organizations handling Credit Cards, ATM cards and other POS cards
   
  - 
    
COBIT - “Control Object for Information and Related Technology” IT Governance framework and toolset , created by ISACA and ITGI
   
  - 
    
SOX - “Sarbanes-Oxley Act” Law that requires publicly traded companies to submit to independent audits and to properly disclose finical information
   
  - 
    
GLBA - “U.S Gramm-Leach-Bliley Act” Law that protects the confidentiality and integrity of personal information that is collected by financial institutions.
   
  - 
    
CSIRT - “Computer Security Incident Response Team” CSIRT provided a single point of contact when reporting computer security incidents
   
  - ITIL - “Information Technology Infrastructure Library” - An operational framework developed in the ’80s that standardizes IT management procedures
 
Controls
  - Directive - Also known as procedural controls because they deal with company procedures such as security policies, operations plans, and guidelines.
 
  - Deterrent - Controls that are used to dissuade potential attackers, such as signs that warn possible attackers about the alarm system and monitoring in place.
 
  - Preventive  - Controls used to stop potential attacks by preventing users from performing specific actions, such as encryption and authentication
 
  - Compensating - Controls used to supplement directive controls, such as administrator reviewing logs files for violations of company policy
 
  - Detective -  Controls used to monitor and alert on malicious or unauthorized activity , such as IDS’s and CCTV feeds monitored in real life
 
  - Corrective - Controls used to repair damage caused by malicious events. Such as AntiVirus software and IPS (IPS being both a detective and corrective control)
 
  - Recovery