Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate course.
00:04
In this lesson, I will be talking about ah, attack surface off PC
00:09
in particular. What are the components of a taxi for seven PC and what is the attack? Surface of PC is hardware,
00:18
so these are specific in security because they have huge attack surface.
00:27
So first thing we can attack NBC's bias. So bios is our would say heart off PC. It is basically and I will talk about it later. Is a kind of small operating system there runs B B low operating system of your PC because you can have ah,
00:47
BC mother board. Then
00:48
it can run Apple OS or Windows or Lennox, but the bias is still there, and there are some functions of buyers that are running all the time. Even when the operating system is run,
01:00
then the second thing we can see is attack. Surface of what can be attacked is a component firmer, especially hard drives. They have been in the past use of the as,
01:14
uh, place where some malicious software can be placed and then it can be used to extract data from PC.
01:23
Then we have process of firmer bugs. So,
01:29
uh, today processes have their own firmer, which is essentially helping the processor do some things. And also it is done in the non hard coded way but in soft, courted way because,
01:42
ah, it leaves a space for improvements off some functionalities of processes or
01:49
corrections of some mugs.
01:51
So they're part off. It's a internals process, er, operation that is regulated by a piece of code that can be changed.
02:00
And we have seen that these bugs have been exploited the bust.
02:05
Then we have a USB ports. Two USB ports are notorious for Ah, simple usage for, um
02:14
uh, for example, delivering Melber. Because when you plug a memory device in your US before to you, can them
02:23
simply execute something? Gilded urine can actually procedure. And then what happens is that you can move some malware inside the BC
02:34
Then we have bags in operating system and these bugs
02:42
are constant and that they exist in all operating systems that we have today.
02:47
And in the end, we have programs or applications that can be attacked by viruses or some kind of other Melber,
02:58
but the most important one that is happening all the time. Today
03:02
is attacks through email or fishing. Because people are. This is one of the most popular attacks today because it's cost virtually nothing. You just have to play some Alvear and email. You have to get hold off, um, e mailing list, and then you simply send it toe
03:23
zillion people hoping that some of them will simply click on the link or open the attachment. And then they are hooked. There
03:31
they get something installed, like some malware or some ransomware in particular, which is a very popular in past couple of years.
03:45
Um, and in the end, we can attack PC through browsing eso. There are sites on the Web which, if you open them, you can get infected so your PC can get infected. And I will talk about the reasons by a little bit later
04:04
on. And, uh, these things again, links to these sites are usually coming inside the phishing emails,
04:15
and so this is very connected toe fishing practice.
04:20
And for those who don't know, fishing is basically on and technique off cybercrime, in which you send an email on and toe huge number of recipients with some kind off malicious code embedded inside the body of the email or
04:40
in attachment to the email or in the link in the email.
04:43
And then you're hoping that simply somebody is going to be a nave enough to click on it.
04:49
So this is all about the attack surface of a PC. And now let's talk about the first thing that is on the list, which is a bias every PC today you buy has Yueh fei bios, and it is, uh,
05:05
that the BIOS is essentially a some kind of main gate baby between the OS and the harbor. The whole concept to you if I is, that it should create some kind off second layer between the harbor and the operating system so that you can essentially, um,
05:25
have ah operating system running on
05:28
pretty much any hardware.
05:30
This is still not the case, but this dispose the initial idea behind it. And also, there are a few things on a PC that operating system accesses by
05:44
excesses by by calling the bios features. So you're not accessing some harder directly, you're asking buyers. Can you give me this? Can you give me that
05:55
so bias are runs below the OS in the hierarchy structure of, ah, privilege er inside the PC,
06:04
and it connects his memory conexes hard driving conexes flash drives that connects its network. It connects it peripherals.
06:12
So, basically,
06:15
uh, it's, um,
06:16
I
06:17
it's only important when it comes to what it can do. So if you have, um, it has a higher privilege than operating existing. This is also important, and it's invisible. Tow anti Melber because it operates.
06:34
But when you boot the PC to reserves portion of the of your memory,
06:40
and then that memories no, not visible to operating system once the operating system boots. So
06:47
essentially you can do whatever you do and be not being able to be monitored from inside the operating system were anti virus or anti malware software works.
07:01
Uh, this is why bias Mulberry is potentially extremely dangerous.
07:10
Second thing that
07:11
is on the list off,
07:14
uh, off the attack surface is a component firmer. In the first case, it's, ah, hard drive firmer,
07:23
and we have cases off some
07:30
uses of this, like great fish, for example, which operates, basically that you get some kind of former Fleischer that gets deposited in system in what we shall away. So basically, in fact, PC.
07:44
Then it context. Common surfer gets the payload cold because it examines the device and sees what kind of hard drive you have. Because the code is different for different hard drives
07:55
and then payload co. Gets flushed. Two former off the hard drive,
08:00
and in that case, you have the situation in which somebody can basically do something with all the files you have on your hard drive. Somebody conspired to whatever you're doing.
08:13
This technique was developed, most likely, but some government agencies quite a long time ago and some 4 to 5 years ago. It has technology has leaked out in the terms off.
08:26
It's a commercial of a malware. So something that is out in the wild,
08:35
the second component of a PC that is also vulnerable. But I haven't seen so far. Any exploit of that is discreet graphic cards. What is being exploited? These are the drivers of graphic cards because they also had some security vulnerabilities.
08:54
And then we had the process of firmer box, which I mentioned that courses have their firmer and the most important ones that we knew about our specter and meltdown. Actually, they were the 1st 1 I think they were discovered in 2018.
09:13
And of course, more exploits have bean discovered every day. So these are essentially some some the bags in in former of the processor that allows people to use these bugs and
09:26
access your PC without having a burst mission.
09:31
So
09:31
in this video, I have been talking about the attack surface of PC, and the next lesson I'm just going to continue the same topic further.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor