Active Scanning and Exploit Public-Facing Application

Cybrary
Course

Threat actors will often perform Active Scanning to learn the landscape of a victim's network and plan their next steps. One of those next steps could be exploiting vulnerable public-facing applications to gain access and pursue their end-goals. Master the skills to detect and mitigate these techniques and secure your network.

Time
1 hour 25 minutes
Difficulty
Intermediate
CEU/CPE
1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: Prophet Spider Introduction
Campaign Overview
10m
Module 2: Active Scanning and Exploit Public Application

2.1What is Active Scanning?

15m

2.2What is Exploit Public Application?

15m

2.3Detection, Validation, and Mitigation (Lab)

45m
Course Description

By performing reconnaissance through active scanning, threat actors can gain a lot of useful informatoin about your organization and network. They may find open websites and database and make a plan to attack them. Next, they move on to exploit known vulnerabilities in public-facing applications. The flaws they take advantage of could affect your databases, services, or management protocols. Sometimes threat actors like Prophet Spider will gain access to your system and then sell that access to other bad actors, such as ransomware gangs.

It is vitally important to learn how to detect and mitigate these types of techniques to protect your organization.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from accomplishing the tactics of Reconnaissance and Initial Access in your environment today.

Instructed By
Chris Daywalt
Chris Daywalt
Security Freelancer
Instructor
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Active Scanning and Exploit Public-Facing Application Certificate of Completion