Time
4 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:01
hi and welcome to Module One
00:04
and this module. We're gonna talk about the threat landscape, and essentially, what the threat landscape is is. It's a combination of all of those vulnerabilities in those risks out there to our infrastructure. All of the things that could go wrong in the infrastructure as faras, the security is concerned
00:22
whenever we talk about the threat landscape, it's important that we start off by talking about the attack surface, and the attack surface is its conceptual. You can visualize the attack surface as a plane, and on that plane is everything in our infrastructure that's vulnerable to attack.
00:39
We're talking about all of the systems in the environment. So all of the PCs and the laptops and databases and servers and even badge readers and videoconferencing systems Basically, any technology system that's attached to our environment is on this attack surface.
00:59
We're also talking about all of the networks that link all of those systems together, the routers and switches on all of the other network components behind the scenes.
01:07
Also on that surface is the people, and a lot of times we forget about the people as being a part of the attack surface, but it's a very big part of it.
01:15
People are human beings, human beings make mistakes, and a lot of times they're taken advantage of to gain access to an environment.
01:25
And finally, on that serve attack surface is all of the processes. All of those things that we do that regulate our people and technology. We could have the best tech in the world and the best people in the world. But if we have a broken process, someone confined a gap in that process and can exploit it to gain information they shouldn't have.
01:46
The word vulnerability simply means open to attack or damage.
01:51
And when we talk about vulnerabilities, weaken really break it down into three different groups. There's software vulnerabilities, configuration vulnerabilities and hardware vulnerabilities
02:02
to start out by talking about software vulnerabilities and buy software vulnerability. We're talking about the flaws in the way the application code is actually written. We're talking about the the code level itself. The way the code is written were just bugs in the way it's written that allow Attackers to do things that they shouldn't be able to dio.
02:23
Now, when it comes to software vulnerabilities, there is a non profit organization called AWAS, but stands for open Web application Security Project. And they made it maintain a top 10 list of the top 10 most common software vulnerabilities.
02:39
A few examples air here. This isn't the whole top 10 list. This is just a few examples. You know there's injection where
02:46
code allows a user to inject something that they shouldn't be able to. There's broken authentication management. Maybe the system doesn't request credentials. Or maybe it requests credentials in A in a way that's not very safer away. It shouldn't
03:00
or there's even sensitive data exposure. Maybe there's a flaw in the way the code written that allows somebody to gain access to some data that they shouldn't have.
03:09
We'll take a look at an example of one of the injections. Now, this is just one example. So weaken sort of get an idea of how software vulnerabilities work, the one we're gonna talk about a sequel injection. But before we can talk about sequel injection, we need to talk about how a normal sequel query works.
03:27
So we've got this situation where we've got our in user Bob over here on the left and Bob wants to,
03:32
uh, interact with a form out there on the Web. You know, maybe he's logged into, you know, some application, and he wants to pull his own profile information from that application. So Bob
03:45
sends a request. He types his name in the form in the field in the form and says, You know, give me my data. The form is like says what data do you want in? Bob puts his name in there and says, Give me my data.
03:55
The application passes that back to the database, and the database says Okay, well, that's a valid request. So I'm gonna hand back Bob's data, and the application passes Bob's data to him.
04:05
Pretty straightforward. Bob put his name on the form. Bob's data came back
04:11
in the case of a sequel injection.
04:14
Instead of Bob requesting his name in the form, Bob's gonna inject some code in the form,
04:19
and now this is not actual code. This is just a visual representation, but Bob can inject some code in the form, and maybe this code is in the form of a sequel query.
04:30
And if the applications not ridden properly, if it's a vulnerability in the application. It may not realize that what Bob entered into the fields not actually his name but a but a sequel query, and it simply passes it back to the sequel database and says, Hey,
04:44
in this case, Bob's sequel, Query says, Hey, give me everyone's data.
04:49
The sequel database says, OK, well, I've got a valid request from a trusted entity, which is the application itself, not from Bob. So I'm gonna go ahead and pass that back and in the application simply passes that back to Bob's. And now Bob's got everybody's data because he injected a query into the form and the application allowed him to do that.
05:10
Another example of sequel injection could be the same situation, you know, instead of this time the code that Bob injects into the form instead of it being a sequel query. Maybe it's a command that deletes the entire sequel database, and now the database is gone.
05:25
That's an example of sequel injection. As I said, that's just one example of one type of software vulnerability. We could spend months and months talking about the different types of vulnerabilities, but I wanted to give one example so that you can have some context as we go through this course.
05:42
So how do we mitigate vulnerabilities in software? Well, the best way to do it is by regular patching.
05:48
There are the software vendors out there are constantly reviewing their software internally. There's also a lot of companies that have bug bounty programs where they actually will pay people just random people out there on the Internet. If they find a bug in a piece of software,
06:05
vendors will pay them for that because they use that information that didn't create a patch that they can
06:10
pass on to the general public and and mitigate that vulnerability. So regular patching this critical
06:15
also regular scanning.
06:17
You know, not only should we just patch when the when the vendor tells us to patch, but we should be scanning the environment. There's a number of scanners out there, both commercial and open source that allow you to scan an environment, and it gives you a nice report on You know what the environment looks like. We're the vulnerabilities exists, and you can use that to help prioritize how you patch.
06:40
And this is a big one, too. You know you need to sunset your end of life applications and what I mean by that is get rid of them. Ah, lot of organizations have these applications that maybe there a revenue generating applications, so they're really important. But the vendor stopped supporting it. You haven't updated the application, and forever
06:58
the vendor stops supporting that version of the application so that as vulnerabilities, Air found
07:02
that software vendor is not going to continue to put out regular patches. So, yes, this
07:08
application may be making money for your organization. But the longer you go with that end of life application, the more vulnerabilities that pile up and the more exploits that are developed against that vulnerability and your risk starts toe exponentially increase.
07:21
So when you have an application out there and it's it's end of life, you should either upgraded to the latest version but create a plan to upgrade to the latest version or creative. If in cases where the vendor went out of business and it doesn't exist anymore, you need to create a plan to get rid of it altogether and replace it with a new application.
07:40
Keeping up to date is critical when you're talking about mitigating software vulnerabilities.
07:47
The software vulnerabilities air scored, according to AH, system, known a CBS s, which stands for the common vulnerabilities scoring system.
07:56
And essentially, it's a system that it's, ah, industrywide system that gives a scored. It attempts to score the criticality of the vulnerability so we can prioritize it. And it uses a lot of different methods to do that. There's a lot of artifacts that it looks at for vulnerability. For example, what's the attack vector? Is this something that could be attacked
08:16
via the network? Or do you have to have physical access to the device?
08:18
Doesn't require user interaction or not. Right? All of those types of things go into the CVS s score, and that scores a mechanism that can be used to prioritise vulnerabilities in environment.
08:35
Si ve is another common term, and that stands for common vulnerabilities and exposure. A lot of times, you hear the two together
08:43
Si ve is just a way to identify the vulnerability itself. It's a unique identify or so in this case we've got C V E 2019 16 701 right and looks like some kind of vulnerability, and PF sense there's hundreds of thousands of these si ves out there. But
09:00
a si ve is just a way to identify the vulnerability so that you can link
09:03
mitigation actions and it could be referenced by lots of different products. Whenever they identify a vulnerability, they'll they'll put the vulnerability i d. So you know what you're talking about. There's usually links you can you can click to understand what you need to do to mitigate those vulnerabilities.
09:20
So see, ve is the identification and CVS s is the scoring system.

Up Next

Infrastructure Security

This course will cover the concepts needed to identify and prevent threats across an enterprise environment. The course content will cover the practical application of security principles, models, and technology covered in previous courses.

Instructed By

Instructor Profile Image
Scott Russ
Security Architect at Nerdery
Instructor