refers to any software that is designed to harm, disrupt or damage computer systems.
Malware
refers to any software that is designed to harm, disrupt or damage computer systems.
SOCIAL ENGINEERING
refers to the use of deception or manipulation to trick individuals into disclosing sensitive information or performing actions.
Denial of Service (DoS)
a type of network attack that is relatively simple to carry out, even by an unskilled attacker.
On Path Attacks
On-path attackers intercept or modify communications between two devices, such as a web browser and a web server, either to collect information from or to impersonate one of the devices.
On Path Attacks
This type of attack is also referred to as a man-in-the-middle or man-in-the-mobile attack.
SEO poisoning is a technique used by threat actors to increase the prominence of their malicious websites, making them look more authentic to consumers.
SEO poisoning tricks the human mind by assuming the top hits are the most credible and is very effective when people fail to look closely at their search results.
SEO
Search engine optimization or SEO is about improving an organization’s website so that it gains greater visibility in search engine results.
Password Attacks
involve attempting to crack or guess passwords to gain unauthorized access to a system.
Physical attacks
Involve physically accessing a system or device to steal or damage information.
Insider threats involve attacks by individuals with authorized access to an organization's information systems who misuse their privileges to steal or damage information.
Insider threats can be intentional or unintentional.
Advanced Persistent Threats (APTs)
Attackers also achieve infiltration through advanced persistent threats (APTs) — a multi-phase, long term, stealthy and advanced operation against a specific target.
Advanced Persistent Threats (APTs)
Its main purpose is to deploy customized malware on one or more of the target’s systems and remain there undetected.
THREAT ACTORS
refers to an individual or group that poses a threat to the confidentiality, integrity, or availability of a system or data.
Threat actors can be classified based on their motivations, skills, and resources.
Penetration Testing or pentesting, is a way of testing the areas of weaknesses in systems by using various malicious techniques.
Penetration testing is a technique used in ethical hacking
PENETRATION TESTING LEVELS
Black box testing
Gray box testing
White box testing
Reconnaissance
Black box testing is the least time-consuming and the least expensive.
Gray box testing is a combination of black box and white box testing.
White box testing is the most time-consuming and the most expensive
Reconnaissance is the first stage in the Cyber Kill Chain and involves researching potential targets before carrying out any penetration testing.
Pentesting Phases
Planning
Discovery
Attack
Reporting
Planning - establishes the rules of engagement for conducting the test.
Discovery - Conducting reconnaissance on the target to gain information
Attack - At this phase, you seek to gain access or penetrate the system using the information gathered in the previous phase.
Reporting - At this phase, the tester delivers to the organization detailed documentation that includes the vulnerabilities identified, actions taken and the results.
Vulnerabilities are any kind of software or hardware defect.
A program written to take advantage of a known vulnerability is referred to as an Exploit.
The TCP/IP model creates a set of rules that allows us all to take a computer (or mobile
device) out of the box, plug in all the right cables, turn it on, and connect to and use the network.
The TCP/IP model both defines and references a large collection of protocols that allow
computers to communicate.
Cybercriminals - are individuals or groups who use technology to commit crimes, such as stealing sensitive data, holding data for ransom, or conducting financial fraud. They are motivated by financial gain.
Hacktivists - are individuals or groups who use hacking techniques to promote a political or social agenda. They may target government organizations, corporations, or other entities they see as oppressive or unjust.
State-sponsored attackers - are individuals or groups who are backed by a government and conduct cyber attacks against other nations or organizations. They may seek to steal sensitive data, disrupt critical infrastructure, or conduct espionage.
Insiders - are individuals within an organization who have authorized access to sensitive data and systems. They may intentionally or unintentionally cause harm to the organization, such as stealing data or leaking information.
Script Kiddies - are individuals who have limited technical skills but use automated tools to launch attacks against vulnerable systems. They are often motivated by the thrill of causing damage or disrupting systems.
Terrorists - may use cyber attacks as part of their overall strategy to cause harm to their targets. They may seek to disrupt critical infrastructure or steal sensitive data.