Cyber Ops Associate Course
Course Goal
- Prepare learners for Cisco 200-201 certification.
- Focus on Cisco Cyber Security Operation Fundamentals (CBROPS).
Module 14: Common Threats and Attacks
- Overview of malware, common attacks, reconnaissance, access, social engineering, service buffer overflows, and evasion.
Malware
- Definition: Software designed to disrupt or damage.
Types of Malware
-
Viruses:
- Spreads by copying itself into another program.
- Commonly spread via email and removable media.
- Can be harmless or harmful.
-
Trojan Horses:
- Appears legitimate but contains malicious code.
- Can provide remote access or create a backdoor.
- Types include remote access, proxy, key logger, and destructive trojans.
-
Worms:
- Replicate themselves and exploit networks.
- Do not need a host program.
- Example: Code Red worm infected over 300,000 servers within 20 hours.
- Consists of vulnerability, propagation mechanism, and payload.
Other Malware Forms
- Ransomware: Denies access to resources until a ransom is paid.
- Scareware, Adware, Spyware, Rootkits.
- Phishing: Attempts to deceive for information.
Indicators of Malware Infection
- Strange desktop behavior.
- Antivirus and firewalls turned off.
- Slow system performance.
- Unauthorized email sending.
- Modified or deleted files.
Network Attacks
- Categories: Reconnaissance, access, denial of service (DoS).
Reconnaissance Attacks
- Information gathering (passive or active).
- Techniques include ping sweep, nmap scan, vulnerability scanning.
Access Attacks
- Password attacks: Methods to gain critical passwords.
- Spoofing attacks: Pretend to be someone else for information.
Social Engineering
- Phishing, Spear Phishing, Pre-texting, Spamming.
- Quid Pro Quo, Baiting, Impersonation, Tailgating, Shoulder Surfing, Dumpster Diving.
Denial of Service (DoS) Attacks
- DoS: Overloads victim with traffic.
- DDoS: Distributed DoS using botnets (zombies and bots).
- Buffer Overflow: Overloads a system's buffers to exploit vulnerabilities.
Evasion Techniques
- Encryption and Tunneling: Hide or scramble payloads.
- Resource Exhaustion: Overload host's security detection.
- Traffic Fragmentation: Split payloads to avoid detection.
- Protocol Level Misinterpretation: Trick firewalls into ignoring packets.
- Traffic Substitution and Insertion, Pivoting, Rootkits, Proxies.
Conclusion
- Discussed malware types, network attacks, and evasion techniques.
- Encouragement to ask questions and discuss for better retention.
Contact the instructor if you have any questions or need further explanation on any topics discussed.