CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
2. Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
PC Hardware
Network Administration
IT Project Management
Network Design
User Training
IT Troubleshooting
Qualifications Summary
Education
M.B.A., IT Management, Western Governor’s University
B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
3. Page 3
– Sniffer and password attacks.
– Social engineering attacks.
PACE-IT.
5. Page 5
Quite often, an attacker
(hacker) will use a sniffer
type attack in order to
determine what type of
attack to use on a network.
Sniffer attacks use specialized software to examine the network
for vulnerabilities. That software may conduct a port scan—
looking for either open or vulnerable ports that can be exploited.
Or, the software may be used to examine network packets in
order to determine what applications, protocols, and services are
in use on the network.
A common port scanning attack is the XMAS scan. With the
XMAS scan, each packet sent by the scanner has three of the six
possible flags set (so it is lit up like a Christmas tree) in order to
keep the scan from being discovered.
A summary of types of attacks II.
6. Page 6
Unfortunately, end user
passwords often present an
attacker with an easy entry
into the network.
Even when network administers try to create a
strong password policy, end users often attempt to
create easy to remember passwords. Usually, if the
password is easy to remember, it is easy to crack.
In studies conducted on passwords, some of the
most common include: 12345678, password, qwerty
and letmein. These do not represent much of a
challenge to the hacker. Attackers also have other
tools that they can use in a password attack.
A summary of types of attacks II.
7. Page 7
– Types of password attacks.
» Dictionary attack: the attacker uses a specialized
software that contains a list of the most popular
usernames and a list of all of the words in a language.
• The program runs through all of the possible
combinations in an attempt to find one that works.
» Brute force attack: an attacker uses a password
cracking application that mathematically calculates every
possible password combination.
• Takes a large amount of computing power and time in
order to be successful.
• A rainbow table may speed up the process. It contains
a list of all of the possible characters and combinations
that can be used to create a password.
» Hybrid attack: uses a combination of the dictionary
attack and the brute force attack.
» Birthday attack: an attempt to duplicate a hashed value
that is used to authenticate a user or system.
• The attacker uses a program that hashes data in an
effort to recreate a known hashed value; if enough data
is input, eventually the hashed value will be duplicated.
A summary of types of attacks II.
9. Page 9
– Phishing attack.
» The hacker typically casts out a broad net of emails that appear
to be from a trusted source (e.g., a well known bank or Google)
that requests that the user click on a hyperlink.
• The hyperlink connects to a malicious website and, when the
user inputs his or her credentials (as requested), the attacker
then steals the user’s credentials.
» Spear phishing attacks are similar to phishing attacks, but
more directed.
• The hacker’s email appears to come from an even more
trusted source (e.g., from management or a trusted
coworker).
– Pharming attack.
» The attacker uses DNS poisoning to redirect traffic from
legitimate sites to a different or malicious site.
– Vishing.
» Using the telephone to perform a phishing attack.
• The attacker impersonates a trusted source (or attempts to
impersonate a trusted source).
A summary of types of attacks II.
10. Page 10
A summary of types of attacks II.
Hackers will often use a sniffer type attack when attempting to determine
what other type of attack will work against a network. Sniffer attacks can
scan networks for open ports and vulnerabilities. A common port scanning
attack is the XMAS scan. Passwords often represent a vulnerability to
network security. Hackers may use dictionary, brute force, or hybrid attacks
in an attempt to crack passwords. Birthday attacks attempt to duplicate a
hashed value that is used for authentication.
Topic
Sniffer and password attacks.
Summary
Over the years, social engineering attacks have proven to be a successful
avenue for hackers to use. Some of the methods used for social
engineering attacks include: phishing, spear phishing, pharming, and
vishing.
Social engineering attacks.
12. This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.