Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
hello and welcome to P C Security Intermediate Course.
00:04
And in this lesson, I'm going to continue where I stopped in previous one explaining the
00:09
attack surface of a PC in particular. I'm going to talk about softer components off the taxi with BC,
00:17
and the first thing I'm going to talk are operating system bugs or
00:22
eyes that they're called exploits. So in creation off operating system, which have become very, very complex, we have a situation that sometimes some things are overlooked from a security perspective.
00:35
And then people find the way to exploit some of these bugs. Some of the bugs in the operating system have nothing to do with security. They just
00:46
make things don't work properly. But some of them are essentially what they're called security exploits. And for example, one of these very well known is has been exploited by Wanna cry
01:02
ransomware on bond. Wanna cry? Ransomware is using technique discovered by and say, which is basically exploiting Ah, bugger in ah Windows SNB in orderto
01:19
to gain access to the system and essentially encrypt all the files. And then you get the message like this,
01:26
which tells you that you have to
01:30
pay $300 in Cryptocurrency within three days or 600 within seven days in order to get the key that will are gonna help you on decrypt your files. So what's what's happening here? Is that
01:48
more and more exploits of the operating system
01:53
being discovered as we talk And
01:57
okay, maybe not every day, but every now and then, something pops up. Some of these things exist there, and pretty much nobody has discovered them. So when they were discovered in reporting to a braking system manufacturer, they're covered.
02:15
And although most of the bags are a or exploits there exist on the Windows operating system,
02:23
the main reason for that is not because the other operating systems are better written with more
02:29
care about security. It's important that Windows is D most ah, used operating system today when it comes to personal computers, and simply that the focus on on discovering these exploits is mostly on Windows.
02:47
Although Microsoft is doing very good job in correcting these things, they simply just pop up now and then.
02:55
So the next thing that is part off the attacks efforts of the PCR programs
03:02
and when it comes to programs. We have viruses, and the viruses are basically executed by
03:12
executing the infected file.
03:15
And then it spreads Tual other programs on your PC and in some cases that can even spread through the network.
03:24
Um,
03:27
also, we have so called downloader trojans, which can also spread through network Ah, and
03:37
in fact, other programs on other PCs as well
03:42
the third kind off attack, or that something that represents attack surface on a PC's article. Supply, train attacks
03:51
and supply chain attacks represent the situation in which you have, ah, legitimate update of a software or just the original version of the software that you installed. But it is inspected it some kind of malware,
04:04
the most famous attack of that kind that was recorded in recent histories so called non PATA attack in Ukraine
04:15
that has managed to infect more than 60,000 pieces within two hours.
04:20
And essentially what happened is that this this attack was targeting government infrastructure of Ukraine.
04:30
Um, it could happen a couple of years ago,
04:34
actually five
04:36
and ah, and the this attack essentially created. They created the malware that was spreading through memory of a PC, but it started from a software update off accounting software.
04:55
That, and the online payments after that was used by
05:00
pretty much every government entity in Ukraine. So it was software that was created local in Ukraine, and whoever spread the virus head the or malware had the access to the company that was manufacturing or programming that that software,
05:18
and in one update they simply installed the malware.
05:24
But the biggest threat you we have today and the biggest part of the attack surface of, Ah PC's email, particularly when it comes to fishing. So fishing, as I mentioned, is a technique in which user receives an email,
05:40
and in the female, there is ah, attachment or a link
05:45
attachment is infected with malaria. Link points to a malicious site,
05:49
and even body off on email can be filled with the virus or some kind of malware. The whole point about fishing is that although
06:06
in most of the cases when you receive a phishing email, you know that you shouldn't be receiving
06:13
that email. There are always some people who are they just don't care or they're so curious that they have to see what's going on there, and they open the email, and then they click on the link or they opened the attachment. So
06:27
these things happen all the time, and this is why fishing is working so well. And while phishing attacks are actually increasing into their volume
06:34
because there are always some people who simply don't think
06:38
about the consequences of what they are doing when they're open the phishing email
06:43
and directly linked to
06:46
ah, phishing email asses ah, attack surface. We have browsing as the browsers as a attack surface. So we have malicious sites that are essentially when you open, decides the HTML code in them
07:04
executes some kind of malware, and, uh, then you're
07:10
basically infected.
07:13
Um, the next thing on the list of firm
07:17
the attack surface on the PCR USB ports, and we're talking about infected memory sticks that simply execute to Mallory. At the moment you plug them in your USB port.
07:33
You can also have fast USB keyboards. They They're not actually keyboards, but they can execute a key sequence like being typed.
07:42
And there they have the shape of USB memory stick. So if when you stick them in,
07:47
they just execute some kind of pre defined, uh,
07:53
typing sequence. It happened so fast that you don't see it, but it can change the settings of your PC. For example, it can set the
08:01
ah bit locker passwords that encrypts your hard drive toe 80 or something like that. And then you have specialized hacking us bees that they're actually they're toe pack your PC,
08:16
and then you have because most more people are using by five, they connect
08:22
no WiFi wherever they can find one. And you have devices like this pineapple, which is essentially a malicious, malicious WiFi spot.
08:31
Eso if you log to it, it connects you to the Internet. But whoever is connected to that, the wise can monitor all the traffic day. They can have a key logger there, so whenever you type your password, they can get your password.
08:48
So in this video you have learned about the software components of PC attack surface and the next video. I'm going to talk about attack rectors on a PC

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor