Coconote
AI notes
AI voice & video notes
Try for free
💻
CISSP Cyber Attacks and Countermeasures
Jul 5, 2024
CISSP Exam and Cyber Attacks Lecture Notes
Overview
CISSP exam expects familiarity with various cyber attacks:
Cryptanalytic attacks
Mobile and wireless attacks
Access control attacks
Malicious code and application attacks
Familiarity with countermeasures and prevention
Discussion on post-quantum cryptography and quantum-resistant algorithms
Series includes 8 core lessons and supplemental lessons
This is video number seven in the supplemental series
Cryptanalytic Attacks
Brute Force Attack
Attempts trial and error to find the correct cryptographic key
More effective with higher compute power and rainbow tables
Countermeasures: cryptographic salts, CAPTCHA, throttling login attempts, IP block list
Birthday Attack
Focuses on finding collisions in hash functions
Countermeasure: using hashing functions that output long hash values
Replay Attack
Reuses authentication requests to gain unauthorized access
Countermeasure: use date timestamps
Meet in the Middle Attack
Targets protocols using two rounds of encryption
Example: caused retirement of 2DES
Man in the Middle Attack
Attacker intercepts communication between two parties
Common through unsecured Wi-Fi
Countermeasures: secure Wi-Fi, VPNs, HTTPS, MFA
Known Plaintext Attack
Attacker has both encrypted and plain messages
Chosen Ciphertext Attack
Attacker can decrypt portions of the ciphertext
Chosen Plaintext Attack
Attacker can encrypt plaintext and analyze resulting ciphertext
Ciphertext Only Attack
Attacker has access only to ciphertext
Frequency Analysis
Uses frequency of letters to identify underlying text
Defense: using secure algorithms like WPA2 instead of WEP
Mobile and Wireless Attacks
Bluejacking
Annoying attack sending unsolicited messages over Bluetooth
Bluesnarfing
Data theft via Bluetooth
Bluebugging
Creates backdoor access via Bluetooth
Countermeasures: long PINs, disable discovery mode, use two-factor authentication
Network Attacks
Denial of Service (DoS)
Resource consumption attack to interrupt service
Distributed Denial of Service (DDoS)
Utilizes multiple systems to launch attack
Countermeasures: firewalls, routers, IDS, disable broadcast packets, update patches
Common Denial of Service Attacks
SYN Flood
: disrupts TCP three-way handshake
Smurf Attack
: uses amplification network for response packets
Ping of Death
: sends oversized ping packets
Teardrop Attack
: sends fragmented packets to crash target
Fraggle Attack
: sends spoofed UDP traffic
Land Attack
: source and destination IPs are the same
Botnets
Collection of compromised devices
Controlled by bot herders
TCP Three-Way Handshake Explained
Involved in many network attacks
SYN -> SYN/ACK -> ACK
to establish connection
Impersonation/Masquerading
Pretending to be someone else to gain unauthorized access
Countermeasures: one-time pads, token authentication systems, encrypted traffic, user training
Modification Attack
Altering captured packets
ARP Spoofing
: sending malicious ARP packets
Countermeasures: packet filtering, ARP spoofing software, SSL/TLS
DNS Attacks
DNS Poisoning
Alters DNS mappings
DNS Spoofing
Sends false DNS replies to requester
Countermeasures: verify DNS changes, restrict zone transfers, log DNS activities
Homograph Attacks
Use similar characters to create phony domains
Countermeasures: update browsers, ICANN policies
Access Control Attacks
Dictionary and Brute Force Attacks
Attempts to guess passwords
Countermeasures: complex and long passwords, account lockout policies
Spoofed Logon Screens
Fake logon screens to capture credentials
Sniffer Attacks
Use of packet sniffers to capture data
Countermeasure: encrypting data in transit
Social Engineering Attacks
Convincing someone to provide information or perform actions
Phishing
: tricking users via email
Spear Phishing
: targets specific users
Whaling
: targets high-level executives
Vishing
: uses VOIP technology
Countermeasures: security awareness training, filtering suspect emails
Aggregation Attacks
Combining non-sensitive information to deduce sensitive data
Kerberos
Authentication protocol used in Active Directory
Susceptible to replay attacks
Countermeasures: robust password policies, secure endpoints
Malicious Code and Application Attacks
Buffer Overflow
Exceeds buffer capacity causing a crash
Countermeasure: input validation
Back Door
Undocumented command sequence
Countermeasures: code review, firewalls, anti-malware
Time-of-Check to Time-of-Use
Timing vulnerability
Countermeasures: file locking, transaction management
Root Kit
Escalation of privileges
Countermeasures: patches, anti-malware
Cross-Site Scripting (XSS)
Injection of scripts into websites
Countermeasure: input validation
Cross-Site Request Forgery (CSRF)
Exploits user trust
Countermeasure: secure tokens, checking URL referrers
SQL Injection
Using unexpected input to access backend databases
Countermeasures: input validation, prepared statements
Computer Viruses
Types:
Multipart
: Uses multiple propagation techniques
Stealth
: Hides by tampering with OS
Polymorphic
: Modifies its own code
Encrypted
: Uses cryptographic techniques
Hoaxes
: Not a virus, but a nuisance
Logic Bombs
: Lays dormant until triggered
Trojan Horses
: Seem harmless but carry malicious payloads
Ransomware
: Encrypts files until a ransom is paid
Zero-Day Exploit
: Uses unknown vulnerabilities
Post-Quantum Cryptography
Symmetric (Shared Key) Cryptography
Holds up well against quantum attacks, e.g., doubling key length
Asymmetric (Public Key) Cryptography
More susceptible due to Shore’s algorithm breaking factoring and discrete logarithm problems
Lattice-Based Cryptography
Promising for quantum resistance
Key for post-quantum public key algorithms
Conclusion
Like and subscribe for more videos
Check out the free 50-question practice quiz and official study guide
Review this information to help prepare for exam day
📄
Full transcript