<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://www.smithnet.org.uk/wiki/index.php?action=history&amp;feed=atom&amp;title=Threats%2C_Attacks%2C_Vulnerabilities</id>
	<title>Threats, Attacks, Vulnerabilities - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.smithnet.org.uk/wiki/index.php?action=history&amp;feed=atom&amp;title=Threats%2C_Attacks%2C_Vulnerabilities"/>
	<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;action=history"/>
	<updated>2026-04-11T02:18:12Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;diff=630&amp;oldid=prev</id>
		<title>NickPGSmith: 2 revisions imported</title>
		<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;diff=630&amp;oldid=prev"/>
		<updated>2024-05-08T04:53:43Z</updated>

		<summary type="html">&lt;p&gt;2 revisions imported&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en-GB&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 04:53, 8 May 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-notice&quot; lang=&quot;en-GB&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>NickPGSmith</name></author>
	</entry>
	<entry>
		<id>https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;diff=629&amp;oldid=prev</id>
		<title>NickPGSmith: 1 revision imported</title>
		<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;diff=629&amp;oldid=prev"/>
		<updated>2023-02-17T21:02:13Z</updated>

		<summary type="html">&lt;p&gt;1 revision imported&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en-GB&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:02, 17 February 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-notice&quot; lang=&quot;en-GB&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>NickPGSmith</name></author>
	</entry>
	<entry>
		<id>https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;diff=628&amp;oldid=prev</id>
		<title>NickPGSmith: /* Vulnerability impact */</title>
		<link rel="alternate" type="text/html" href="https://www.smithnet.org.uk/wiki/index.php?title=Threats,_Attacks,_Vulnerabilities&amp;diff=628&amp;oldid=prev"/>
		<updated>2021-12-31T14:37:31Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Vulnerability impact&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Malware ==&lt;br /&gt;
&lt;br /&gt;
=== Comparing viruses, worms and trojans ===&lt;br /&gt;
&lt;br /&gt;
* Virus: need user interaction&lt;br /&gt;
* Worm: no user interaction&lt;br /&gt;
** RTM Worm (1988), 10% affected&lt;br /&gt;
* Trojan horse: disguised actions&lt;br /&gt;
** RAT (Remote Access Trojan)&lt;br /&gt;
&lt;br /&gt;
=== Malware payloads ===&lt;br /&gt;
&lt;br /&gt;
* Adware: Change search engine, popups, etc&lt;br /&gt;
* Spyware: Gathers info, eg keyloggers&lt;br /&gt;
* Ransomware: Encrypt disk, eg wannacry&lt;br /&gt;
* Crypto malware: mines cryptocurrency&lt;br /&gt;
&lt;br /&gt;
=== Understanding backdoors and logic bombs ===&lt;br /&gt;
&lt;br /&gt;
* Backdor: workaround access eg hardcoded accounts, defaults, unknown access channels&lt;br /&gt;
* Logic bomb: eg date/time, file contents, API call&lt;br /&gt;
&lt;br /&gt;
=== Looking at advanced malware ===&lt;br /&gt;
&lt;br /&gt;
* Root kits: escalate privileges&lt;br /&gt;
* File-less viruses: in memory only, eg Office Macros, JavaScript code, Registry&lt;br /&gt;
* Botnets: communicate though IRC, Twitter, peer-peer (Command and Control)&lt;br /&gt;
&lt;br /&gt;
=== Understanding botnets ===&lt;br /&gt;
&lt;br /&gt;
=== Malicious script execution ===&lt;br /&gt;
&lt;br /&gt;
== Understanding Attackers ==&lt;br /&gt;
&lt;br /&gt;
* Script kiddies&lt;br /&gt;
* Hacktivist - motivation&lt;br /&gt;
* Organised crime&lt;br /&gt;
* Nation states - APTs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* White Hats: work with targets&amp;#039; permission&lt;br /&gt;
* Back Hats: no permission&lt;br /&gt;
* Grey Hats: illegal, but with good intent&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Insider threat: principle of least privilege&lt;br /&gt;
** 2 person check for critical operations&lt;br /&gt;
** mandatory vacations for critical staff (fraud uncovering)&lt;br /&gt;
* Shadow IT&lt;br /&gt;
* Attack Vectors: Email, social media, USB, chip in cable, network jack, skimmmers, cloud servers, physical access (including supply chain), Wifi&lt;br /&gt;
&lt;br /&gt;
=== Cybersecurity Adversaries ===&lt;br /&gt;
&lt;br /&gt;
=== Preventing insider threats ===&lt;br /&gt;
&lt;br /&gt;
=== Attack vectors ===&lt;br /&gt;
&lt;br /&gt;
=== Zero days and the advanced persistent threat ===&lt;br /&gt;
&lt;br /&gt;
== Threat Intelligence ==&lt;br /&gt;
&lt;br /&gt;
=== Threat Intelligence ===&lt;br /&gt;
&lt;br /&gt;
Open Source intelligence: security websites, vulnerability DBs, media, codebases, etc&lt;br /&gt;
Closed Source intelligence: proprietary info&lt;br /&gt;
* Timelines&lt;br /&gt;
* Accuracy&lt;br /&gt;
* Reliability&lt;br /&gt;
&lt;br /&gt;
Threat indicators: IP, file patterns, etc&lt;br /&gt;
&lt;br /&gt;
* Cyberobservable expression CybOX - Schema&lt;br /&gt;
* Structured Threat Information Expression (STIX) - Language format&lt;br /&gt;
* Trusted Automated Exchange of Indicator of Information (TAXI) - Info exchange&lt;br /&gt;
&lt;br /&gt;
Cybox &amp;gt; STIX &amp;gt; TAXI&lt;br /&gt;
&lt;br /&gt;
* Open IOC - Mandient Framework&lt;br /&gt;
* Functions supported by intellegence&lt;br /&gt;
** Incident Response&lt;br /&gt;
** Vulnerability Management&lt;br /&gt;
** Risk Management&lt;br /&gt;
** Security Engineering&lt;br /&gt;
** Detection and Monitoring&lt;br /&gt;
&lt;br /&gt;
=== Intelligence sharing ===&lt;br /&gt;
&lt;br /&gt;
Information sharing &amp;amp; analysis centres&lt;br /&gt;
* Safe way for competitors to collaborate&lt;br /&gt;
* Each industry has at least one ISAC&lt;br /&gt;
&lt;br /&gt;
=== Threat research ===&lt;br /&gt;
&lt;br /&gt;
* Reputational threat research&lt;br /&gt;
** previous actors, IP, email, domains, etc&lt;br /&gt;
* Behavioural research&lt;br /&gt;
** identify behaviour that resemble activity of past threats&lt;br /&gt;
* Vendor websites, cybersecurity jouranals, academic journals, RFC docs, local industry groups, social media, etc&lt;br /&gt;
&lt;br /&gt;
=== Identifying threats ===&lt;br /&gt;
&lt;br /&gt;
Modelling: structured approach should be used:&lt;br /&gt;
* Asset focused&lt;br /&gt;
* Threat focused&lt;br /&gt;
* Service focused eg API review&lt;br /&gt;
&lt;br /&gt;
=== Automating threat intelligence ===&lt;br /&gt;
&lt;br /&gt;
eg&lt;br /&gt;
* Blacklisting IPs from feeds&lt;br /&gt;
* Incident Response could be partially automated eg IDS attack &amp;gt; workflow for customer geolocaton, logs, etc&lt;br /&gt;
&lt;br /&gt;
Security Orchestration, Automation and Response (SOAR)&lt;br /&gt;
* Machine learning allows automated creation of file diagnostics&lt;br /&gt;
&lt;br /&gt;
=== Threat hunting ===&lt;br /&gt;
&lt;br /&gt;
Cannot prevent all threats: &amp;quot;assumption of compromise&amp;quot;&lt;br /&gt;
* Now searching for those compromises&lt;br /&gt;
* Need to think like an adversary&lt;br /&gt;
&lt;br /&gt;
Establish a hypothesis and look for indicators of compromise -&amp;gt; containment/eradication/recovery&lt;br /&gt;
&lt;br /&gt;
TTPs - Tactics, Techniques, Procedures&lt;br /&gt;
&lt;br /&gt;
== Social Engineering Attacks ==&lt;br /&gt;
&lt;br /&gt;
=== Social engineering ===&lt;br /&gt;
&lt;br /&gt;
Psychological attacks to gain info&lt;br /&gt;
* Authority - defer to authority&lt;br /&gt;
* Intimidation - scare people&lt;br /&gt;
* Consensus/social proof - herd mentality&lt;br /&gt;
* Scarcity - act quickly or miss an opportunity&lt;br /&gt;
* Urgency - time is running out&lt;br /&gt;
* Familiarity/liking - flattery/fake relationships&lt;br /&gt;
&lt;br /&gt;
Education is the solution&lt;br /&gt;
&lt;br /&gt;
=== Impersonation attacks ===&lt;br /&gt;
&lt;br /&gt;
* Spam&lt;br /&gt;
** phishing, trick users to share information&lt;br /&gt;
* Prepending info on email&lt;br /&gt;
* Spear phishing - target a small number&lt;br /&gt;
** Whaling - target executives eg subpoenas&lt;br /&gt;
* Pharming - setup false websites&lt;br /&gt;
* Vishing - voice phishing&lt;br /&gt;
* Smishing / SPIM - SMS/IM often uses spoofing, faking an identity&lt;br /&gt;
&lt;br /&gt;
=== Identifying fraud and pretexting ===&lt;br /&gt;
&lt;br /&gt;
Pretexting - impersonate a customer while contacting an organisation&lt;br /&gt;
* eg convince phone company to switch phone number to his -&amp;gt; reset bank details with this number&lt;br /&gt;
&lt;br /&gt;
=== Watering hole attacks ===&lt;br /&gt;
&lt;br /&gt;
Websites that spread malware - users must trust websites, at least to some extent&lt;br /&gt;
Users are conditioned to bypass security&lt;br /&gt;
Attacker uses a compromised popular website -&amp;gt; infected system calls home&lt;br /&gt;
&lt;br /&gt;
=== Physical social engineering ===&lt;br /&gt;
&lt;br /&gt;
* Shoulder surfing&lt;br /&gt;
* Dumpster diving&lt;br /&gt;
* Tailgating&lt;br /&gt;
&lt;br /&gt;
== Common Attacks ==&lt;br /&gt;
&lt;br /&gt;
=== Password attacks ===&lt;br /&gt;
&lt;br /&gt;
* Brute force&lt;br /&gt;
* Dictionary attacks&lt;br /&gt;
* Hybrid attacks&lt;br /&gt;
* Rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
=== Password spraying and credential stuffing ===&lt;br /&gt;
&lt;br /&gt;
Uses common password list and attempt to use them against one account&lt;br /&gt;
&lt;br /&gt;
=== Adversarial artificial intelligence ===&lt;br /&gt;
&lt;br /&gt;
Machine Learning:&lt;br /&gt;
* Descriptive analytics (eg what % female)&lt;br /&gt;
* Predictive analytics (eg model to predict future customer behaviour)&lt;br /&gt;
&lt;br /&gt;
Aversarial AI: Injected tainted training data - Tesla speed sign example)&lt;br /&gt;
&lt;br /&gt;
== Understanding Vulnerability Types ==&lt;br /&gt;
&lt;br /&gt;
=== Vulnerability impact ===&lt;br /&gt;
&lt;br /&gt;
Confidentiality:&lt;br /&gt;
* Disclosure attacks: data breach&lt;br /&gt;
Integrity:&lt;br /&gt;
* Unauthorised changes&lt;br /&gt;
Availability:&lt;br /&gt;
* Authorised individuals can&amp;#039;t access resources: DoS attacks&lt;br /&gt;
&lt;br /&gt;
Risks:&lt;br /&gt;
* Financial&lt;br /&gt;
* Reputational&lt;br /&gt;
* Strategic&lt;br /&gt;
* Operational&lt;br /&gt;
* Compliance (eg HIPAA)&lt;br /&gt;
&lt;br /&gt;
=== Supply chain vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
End of Life Cycle:&lt;br /&gt;
* End of sale&lt;br /&gt;
* End of Support (all or some support stopped)&lt;br /&gt;
* End of Life (now updates at all)&lt;br /&gt;
&lt;br /&gt;
Vendors can just fail to provide proper support, especially in embedded systems&lt;br /&gt;
&lt;br /&gt;
=== Configuration vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
eg default accounts&lt;br /&gt;
&lt;br /&gt;
Cryptographic vulnerabilities&lt;br /&gt;
* Key management&lt;br /&gt;
* Certificate management&lt;br /&gt;
&lt;br /&gt;
Patch management (OS, Apps, Finance)&lt;br /&gt;
&lt;br /&gt;
Account management (eg execute permissions)&lt;br /&gt;
* Use principle of least privilege&lt;br /&gt;
&lt;br /&gt;
=== Architectural vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
Incorporate security early on, no a bolt-on extra&lt;br /&gt;
&lt;br /&gt;
System sprawl: new devices get turned on but old devices are not decomissioned&lt;br /&gt;
&lt;br /&gt;
== Vulnerability Scanning ==&lt;br /&gt;
&lt;br /&gt;
=== What is vulnerability management? ===&lt;br /&gt;
&lt;br /&gt;
Detects, remediates and reports vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Why manage?&lt;br /&gt;
* Maintain security&lt;br /&gt;
* Comply with corp policy&lt;br /&gt;
* Comply with regulations&lt;br /&gt;
** PCI/DSS: anyone who handles credit card data: quarterly scans internasal and external, repeat scans after large changes, use approved vendor, remediate and rescan until you achieve a clean report&lt;br /&gt;
** FISMA for US government employers: follow NIST guidelines, regular scans, analyse the results, remediate legitimate vulnerabilities, share with other agencies&lt;br /&gt;
&lt;br /&gt;
Tests:&lt;br /&gt;
* Network scans&lt;br /&gt;
* Application scans&lt;br /&gt;
* Web application scans (eg SQL/CSS)&lt;br /&gt;
&lt;br /&gt;
=== Identifying scan targets ===&lt;br /&gt;
&lt;br /&gt;
Asset Inventory provides a starting point&lt;br /&gt;
Nessus and Qualis may discover assets&lt;br /&gt;
&lt;br /&gt;
* Impact &amp;gt; what is the highest level of data classification handled?&lt;br /&gt;
* Likelihood &amp;gt; What is the network exposure? (is it behind a firewall? What services are running?)&lt;br /&gt;
* How critical is the system?&lt;br /&gt;
&lt;br /&gt;
=== Scan configuration ===&lt;br /&gt;
&lt;br /&gt;
Nessus&lt;br /&gt;
* configure pings, port scanning, scan sensitivity: default  &amp;quot;normal&amp;quot; sensitivity&lt;br /&gt;
* &amp;quot;Enable safe checks&amp;quot;&lt;br /&gt;
* Rate limits can be configured&lt;br /&gt;
* Choose default plugins&lt;br /&gt;
&lt;br /&gt;
=== Scan perspective ===&lt;br /&gt;
&lt;br /&gt;
Network location:&lt;br /&gt;
* Consider scanning inside network/Internet/DMZ&lt;br /&gt;
* All are valid and answer different questions&lt;br /&gt;
&lt;br /&gt;
Firewall and IDS/IPS and segmentation impacts scan results&lt;br /&gt;
&lt;br /&gt;
Agent-based scans: install a security agent on each target&lt;br /&gt;
&lt;br /&gt;
Credentialed scanning: mix scan perspectives&lt;br /&gt;
&lt;br /&gt;
=== SCAP (Security Content Automation Protocol) ===&lt;br /&gt;
&lt;br /&gt;
Confusing terminology, so provide a consistent language that describes items:&lt;br /&gt;
* CVSS (Common Vulnerability Scoring System)&lt;br /&gt;
* CCE (Common Configuration Enumeration)&lt;br /&gt;
* CPE (Common Platform Enumeration)&lt;br /&gt;
* CVE (Common Vulnerability and Exposures)&lt;br /&gt;
* EXXDF *Extensible Configuration Checklist Format)&lt;br /&gt;
* OVAL (Open Vulnerability Assesment Language)&lt;br /&gt;
** describes testing procedures in a programmatic way&lt;br /&gt;
&lt;br /&gt;
=== CVSS (Common Vulnerability Scoring System) ===&lt;br /&gt;
&lt;br /&gt;
CVSS: 10 point scale:&lt;br /&gt;
* Attack vector&lt;br /&gt;
** Physical&lt;br /&gt;
** Local&lt;br /&gt;
** Adjacent Network&lt;br /&gt;
** Network&lt;br /&gt;
* Attack complexity&lt;br /&gt;
** High&lt;br /&gt;
** Low&lt;br /&gt;
* Privileges required&lt;br /&gt;
** High (admin)&lt;br /&gt;
** Low&lt;br /&gt;
** None&lt;br /&gt;
* User interaction (exploitability)&lt;br /&gt;
** Required (user needs to do something)&lt;br /&gt;
** None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Confidentiality&lt;br /&gt;
** None&lt;br /&gt;
** Low&lt;br /&gt;
** High (all is vulnerable)&lt;br /&gt;
* Integrity&lt;br /&gt;
** None&lt;br /&gt;
** Low&lt;br /&gt;
** High (all info could be modified)&lt;br /&gt;
* Availability&lt;br /&gt;
** None&lt;br /&gt;
** Low (performance degraded)&lt;br /&gt;
** High (system shutdown)&lt;br /&gt;
&lt;br /&gt;
* Scope&lt;br /&gt;
** Changed (vulnerabilities can affect other comments)&lt;br /&gt;
** Unchanged&lt;br /&gt;
&lt;br /&gt;
=== Analysing scan reports ===&lt;br /&gt;
&lt;br /&gt;
Prioritisation factors&lt;br /&gt;
* Severity of vulnerabilities&lt;br /&gt;
* System criticality&lt;br /&gt;
* Information sensitivity&lt;br /&gt;
* Remediation difficulty&lt;br /&gt;
* System exposure&lt;br /&gt;
&lt;br /&gt;
=== Correlating scan results ===&lt;br /&gt;
&lt;br /&gt;
Consult industry standard eg PCI/DDS:&lt;br /&gt;
* will fail if any systems has CVSS score of ⩾ 4.0&lt;br /&gt;
&lt;br /&gt;
Technical info CMDB, log repositories, others&lt;br /&gt;
Trend analysis look for changes over time, Eg if new web apps keep showing CVSS: Dev training or better libraries&lt;br /&gt;
&lt;br /&gt;
== Penetration Testing and Exercises ==&lt;br /&gt;
&lt;br /&gt;
=== Penetration testing ===&lt;br /&gt;
&lt;br /&gt;
Security professionals in roles of attackers&lt;br /&gt;
* test security controls by bypassing or defeating them&lt;br /&gt;
* define scope of systems (&amp;quot;Rules of engagement&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* White Box Test - with full knowledge like an internal attacker&lt;br /&gt;
* Black Box Test - with no knowledge like outsider&lt;br /&gt;
* Grey Box Test - with some knowlegde&lt;br /&gt;
&lt;br /&gt;
NIST recommend:&lt;br /&gt;
* Discovery Phase&lt;br /&gt;
* Attack Phase&lt;br /&gt;
** Gain Access &amp;gt; Elevate Privs &amp;gt; Browsing &amp;gt; Install tools&lt;br /&gt;
* Goto Discovery &lt;br /&gt;
&lt;br /&gt;
Pivot: after exploiting a system, pivot to another more secure system&lt;br /&gt;
&lt;br /&gt;
Clean up the traces of attack&lt;br /&gt;
* expensive/time consuming so use occasionally&lt;br /&gt;
&lt;br /&gt;
=== Bug bounty ===&lt;br /&gt;
&lt;br /&gt;
* Align attacker&amp;#039;s and organisation&amp;#039;s interests&lt;br /&gt;
* Can be self managed or fully managed by external vendor&lt;br /&gt;
&lt;br /&gt;
=== Cybersecurity exercises ===&lt;br /&gt;
&lt;br /&gt;
* Teams attacking (red) vs Securing systems (blue)&lt;br /&gt;
* White team: observe and judge&lt;br /&gt;
&lt;br /&gt;
Red and blue team results -&amp;gt; Purple Team&lt;br /&gt;
&lt;br /&gt;
* Capture the Flag exercises, usually in a sandbox&lt;/div&gt;</summary>
		<author><name>NickPGSmith</name></author>
	</entry>
</feed>