Professional Documents
Culture Documents
Security Fundamentals
VTOP
DC
VTOP
NAT
• Dynamically assigns an IP
address and other network
configuration parameters to
each device on a network
DNS
DNS
Godaddy – sibi.com
DNS
• How to Find the A Record (IP Address) of a Domain or Server
• How to Find the NS Records for a Domain
• How to Find the MX Records (Email Servers) for a Domain
• How to Perform a Reverse DNS Lookup
• How to Find the SOA Record of a Domain
• How to Find an Authoritative Response
• Reference: https://simpledns.plus/help/dns-record-types
Cyber crimes vs Cyber-attacks
• Cybercrime is a criminal activity done using computers and the
Internet.
A request B
172.18.12.101 20.10.201.13
reply
Src: 20.10.201.13
Dst: 172.18.12.101
Victim computer
141.10.2.10
Src: 20.10.201.13
Dst: 141.10.2.10
Volumetric DDoS – Amplification/Reflection
based
Volumetric DDoS - NTP Amplification/Reflection
Protocol based – SYN flood
Application layer DDoS - Http flood
Application layer DDoS - Slowloris
Tools for DDoS
• LOIC (Low Orbit Ion Canon)
• HULK (HTTP Unbearable Load King)
• R-U-Dead-Yet
• DDOSIM—Layer 7 DDOS Simulator.
• Tor's Hammer
• PyLoris
Tool for eavesdropping
• Wireshark
• Tcpdump – command line tool
Malware attack
• Locky
• Crypto
Drive by download attack
Phishing
Spear Phishing
UPX demo
How long it will take you to crack your password
Password attack
• Brute Force
• Dictionary
• Hybrid (Combination of both)
Man-in-the-middle (MitM) attack
Tools for MITM
• Bettercap
• Ettercap
• Wifiphisher
OWASP attack - XSS
XSS payload
• https://github.com/pgaijin66/XSS-
Payloads/blob/master/payload/payload.txt
OWASP attack – SQL Injection
Tools for SQL injection attack
• DSSS
• Sqlmap
Vulnerability Types
• Software Bugs • URL redirection to untrusted sites
• Weak passwords • Path traversal
• Software that is already infected • Missing authentication for critical
with virus function
• Missing data encryption • Unrestricted upload of dangerous file
• OS command injection types
• SQL injection • Dependence on untrusted inputs in a
security decision
• Buffer overflow
• Cross-site scripting and forgery
• Missing authorization
• Download of codes without integrity
• Use of broken algorithms checks
Adversary Types
• Hackers
• Vandals
• Cyber vandals operate by defacing a website (such as Wikipedia), creating
malware that damages electronic files or elements that interrupt its normal
utilization, or removing a disk drive to disable a computer system.
• Criminals
• Hacktivists (groups of criminals who unite to carry out cyber attacks in support
of political causes)
• Nation state actors
Attacks vs. Intrusion
• A cyber attack can maliciously disable computers, steal data, or use a
breached computer as a launch point for other attacks.
• Confidentiality
• Integrity
• Authenticity
• Availability
What are the different types of attacks which
affects security principles
Security Controls - Types
Physical controls : Fences, gates, guards, security badges and access cards,
biometric access controls, security lighting, CCTVs, surveillance cameras,
motion sensors, fire suppression, as well as environmental controls like
HVAC and humidity controls.