wk5 - Final

00:14:04
https://www.youtube.com/watch?v=VSKJvLj4la4

Summary

TLDRPrezentarea discută despre aspectele fundamentale ale controlului accesului, subliniind importanța kernel-ului ca interfață între aplicații și hardware. Se prezintă diverse metode de atac, cum ar fi atacurile prin inginerie socială și spoofing-ul DNS, și se discută despre cum Active Directory oferă un control granular asupra accesului utilizatorilor. De asemenea, se face o distincție între grupuri de lucru și Active Directory, reliefând avantajele sistemelor centralizate. Prevenirea atacurilor cibernetice este abordată prin utilizarea de parole puternice și firewalls-uri. Monitorizarea sistemului și identificarea vulnerabilităților sunt discutate ca parte esențială a sarcinilor unui administrator de sistem.

Takeaways

  • 🔒 Controlul accesului este esențial pentru securitate.
  • 💻 Kernel-ul leagă aplicațiile de hardware.
  • 📁 Active Directory oferă control granular.
  • 👥 Grupurile de lucru sunt peer-to-peer.
  • ⚠️ Ingineria socială poate compromite parolele.
  • 🔑 Parolele puternice reduc riscurile.
  • 🌐 Firewall-urile protejează rețeaua.
  • 📊 Monitorizarea sistemului este crucială.
  • 🏴‍☠️ DNS spoofing este o tehnică de atac.
  • 🔍 Identificarea vulnerabilităților este o sarcină continuă.

Timeline

  • 00:00:00 - 00:05:00

    Prezentarea discută despre controlul accesului, explicând rolul kernel-ului în legătura dintre stratul aplicației și stratul CPU-ului, evidențiind pericolele care pot apărea din utilizarea parolelor slabe, cum ar fi cele din lista RockYou. Se subliniază importanța autentificării în două etape pentru a proteja procesele user-owned și a preveni atacurile prin inginerie socială sau spoofing DNS. De asemenea, sunt explicate conceptele de Workgroup și Active Directory, accentuând diferențele cheie în gestionarea controlului accesului și scalabilitatea acestor structuri.

  • 00:05:00 - 00:14:04

    În continuare, se abordează suprafețele de atac Windows și măsurile de mitigare. Discuția include criptarea datelor și a comunicațiilor, utilizarea controlului accesului prin parole, autentificare și firewall-uri. De asemenea, se adâncește subiectul monitorizării sistemelor, stabilind obiective de securitate, compararea performanței cu o bază de referință și identificarea vulnerabilităților. Se menționează importanța monitorizării log-urilor și a analizării adreselor IP pentru a detecta activitățile suspecte.

Mind Map

Video Q&A

  • Ce este controlul accesului?

    Controlul accesului se referă la metodele de securitate utilizate pentru a restricționa accesul la resursele unui sistem.

  • Ce este un kernel?

    Kernel-ul este componenta centrală a unui sistem de operare care leagă aplicațiile de hardware.

  • Ce este Active Directory?

    Active Directory este un serviciu de gestionare a identităților utilizat pentru a controla accesul utilizatorilor la resurse într-o rețea.

  • Ce este un atac prin inginerie socială?

    Un atac prin inginerie socială implică manipularea utilizatorilor pentru a obține informații sensibile.

  • Cum poate fi prevenit un atac cibernetic?

    Prin utilizarea de parole puternice, autentificarea cu doi factori și firewalls-uri.

  • Care este diferența dintre grupuri de lucru și Active Directory?

    Grupurile de lucru sunt rețele de tip peer-to-peer, în timp ce Active Directory este un sistem centralizat de control al accesului.

  • Ce rol joacă un firewall într-un sistem?

    Firewall-urile protejează sistemul prin restricționarea accesului neautorizat la rețea.

  • Ce înseamnă 'Duel' în securitate?

    Duel se referă la un proces de autentificare bazat pe două verificări distincte.

  • Ce este spoofing DNS?

    Spoofing DNS este o tehnică prin care un atacator falsifică informațiile DNS pentru a redirecționa utilizatorii.

  • Cum se monitorizează un sistem pentru vulnerabilități?

    Prin stabilirea unui comportament normal ca bază și compararea cu informațiile de performanță.

View more video summaries

Get instant access to free YouTube video summaries powered by AI!
Subtitles
en
Auto Scroll:
  • 00:00:00
    okay we can take a look at the next
  • 00:00:02
    slide access control but before we do
  • 00:00:05
    there is a slide that precedes this Cel
  • 00:00:08
    mode now go to this YouTube video and it
  • 00:00:11
    has a very learned individual that goes
  • 00:00:14
    in the details into details about the
  • 00:00:17
    kernel mode and I do recommend everyone
  • 00:00:21
    watch it and let's take a look at Access
  • 00:00:23
    Control now with this Access Control let
  • 00:00:26
    me get the drawing tool we can actually
  • 00:00:28
    put the you know what the drawing tool
  • 00:00:31
    is like wasn't working correctly there
  • 00:00:33
    but okay so we can take the application
  • 00:00:35
    layer and then we have everything that
  • 00:00:39
    it goes on on the bottom layer such as
  • 00:00:42
    the CPU and I can just I can just uh put
  • 00:00:45
    in CPU just just to just to abbreviate
  • 00:00:48
    everything and the thing that holds
  • 00:00:51
    everything together the layer that
  • 00:00:53
    connects everything is the kernel so the
  • 00:00:55
    kernel is going to connect to the
  • 00:00:57
    application layer and the kernel is
  • 00:01:00
    going to connect to the CPU layer and
  • 00:01:02
    this is all based on the drawing and
  • 00:01:04
    this the kernel CPU memory and devices
  • 00:01:08
    so the devices would be all the
  • 00:01:10
    peripherals so the way I want you to
  • 00:01:12
    look at this slide is look at all these
  • 00:01:14
    possible things that can go wrong such
  • 00:01:17
    as you know John which can utilize the
  • 00:01:22
    rocku rocku is a text file you can
  • 00:01:25
    Google it that's been going around for
  • 00:01:28
    like the last 20 years it has all the
  • 00:01:30
    typical passwords if you have ever seen
  • 00:01:32
    the movie or the show The Office Michael
  • 00:01:35
    the manager his password I think was
  • 00:01:37
    password 123 or it was like 1
  • 00:01:41
    2345 I recall that there was U somebody
  • 00:01:45
    that that was a network manager and and
  • 00:01:47
    of course Michael was afraid that he was
  • 00:01:49
    some sort of a terrorist or or something
  • 00:01:52
    like that anyways we recall that it was
  • 00:01:55
    actually Michael that jeopardized the
  • 00:01:57
    networking or jeopardized everyone's
  • 00:01:58
    Network because it's password was easy
  • 00:02:00
    to guess I think it was as I said 1 2 3
  • 00:02:03
    4 5 that being said that would have been
  • 00:02:04
    one of the passwords that was in the
  • 00:02:07
    Rock You Tech so this program called
  • 00:02:10
    John actually references anything you
  • 00:02:13
    ask it to but it's generally going to be
  • 00:02:16
    referencing a file and Rocky was one of
  • 00:02:18
    those files that was out there that had
  • 00:02:21
    like literally every easy to guess
  • 00:02:23
    password that was out there L literally
  • 00:02:25
    had thousands of entries so John could
  • 00:02:28
    actually utilize a Brute Force attack to
  • 00:02:32
    get to this to get to this the whole
  • 00:02:34
    point of it is that you're trying to you
  • 00:02:36
    know invade one of those user owned
  • 00:02:40
    processes to try to get to the kernel
  • 00:02:42
    and ultimately get to the bottom layer
  • 00:02:45
    the peripherals the CPU and the and all
  • 00:02:47
    the RAM and everything another way to do
  • 00:02:50
    it is through social engineering and
  • 00:02:52
    then of course DNS spoofing and
  • 00:02:54
    hijacking and of course the one of the
  • 00:02:57
    remedies is to make sure that that your
  • 00:03:00
    that your account is US uses duel to
  • 00:03:04
    help protect it duel helps you define
  • 00:03:08
    you know it helps you Define identity
  • 00:03:12
    your to make sure that your identity is
  • 00:03:15
    is basically Yours by two things what
  • 00:03:18
    you have and what you are for example uh
  • 00:03:20
    you can have like an email that they
  • 00:03:23
    they email you a particular password to
  • 00:03:26
    or your cell phone that's been
  • 00:03:28
    pre-assigned and they can text you a
  • 00:03:31
    password on your cell phone and that's
  • 00:03:34
    that's a the Dual algorithm is something
  • 00:03:38
    that adds another layer of protection to
  • 00:03:42
    make sure that uh you weren't for
  • 00:03:45
    example social engineered now let's take
  • 00:03:47
    a look at and let me get out of get out
  • 00:03:50
    get out of here let's take a look at the
  • 00:03:52
    work groups and active
  • 00:03:54
    directory work group is a series of
  • 00:03:58
    independent PCS utilizing peer-to-peer
  • 00:04:01
    so for example in one land meaning
  • 00:04:04
    connected by a local switch you can have
  • 00:04:07
    a PC
  • 00:04:08
    laptop printer and a couple more PCS as
  • 00:04:12
    I said on the same land and this
  • 00:04:15
    supports individually attached storage
  • 00:04:19
    an example of a good work group in Linux
  • 00:04:21
    is Samba and then of course with Windows
  • 00:04:25
    you can hook up work groups there and
  • 00:04:28
    the scalability is very very low only 10
  • 00:04:31
    to 20 devices the whole point of a work
  • 00:04:34
    group is you can have printers and PCs
  • 00:04:38
    that or excuse me you can have printers
  • 00:04:40
    and fax machines and all a work group is
  • 00:04:44
    there to do is to potentially share
  • 00:04:47
    those uh the printer and file servers to
  • 00:04:51
    other people uh the other the other
  • 00:04:54
    aspect is active directory which is a
  • 00:04:58
    type of domain control controller an
  • 00:05:00
    active directory is actually a database
  • 00:05:04
    that you can have granular control so
  • 00:05:08
    for example if you have a user here I'll
  • 00:05:11
    represent that with a box and here you
  • 00:05:14
    can have a him the user connected to the
  • 00:05:17
    internet and on the Internet is is maybe
  • 00:05:20
    Facebook and you can manipulate the
  • 00:05:24
    packets going in and out of Facebook
  • 00:05:26
    such that you can have granular control
  • 00:05:29
    so for example your firewall can be set
  • 00:05:32
    up to maybe filter particular types of
  • 00:05:38
    traffic like low latency type traffic in
  • 00:05:42
    which it would block instant messages on
  • 00:05:45
    Facebook and ads so in other words the
  • 00:05:49
    worker or the I'm going to say client
  • 00:05:53
    can get on your company sponsored
  • 00:05:55
    Network he can get to his Facebook so he
  • 00:05:58
    can stay connected socially but you're
  • 00:06:00
    not going to allow him to engage in
  • 00:06:03
    instant messaging and you're going to be
  • 00:06:05
    able to prevent the ads because for the
  • 00:06:07
    sole purpose not necessarily of
  • 00:06:08
    controlling Behavior but for the sole
  • 00:06:11
    purpose of saving your company's
  • 00:06:13
    bandwidth because all of those instant
  • 00:06:15
    messages all those little ads eat up
  • 00:06:18
    bandwidth uh PCS in the active directory
  • 00:06:23
    directory and you know as I said domain
  • 00:06:26
    controller so I'll put DC here for in
  • 00:06:30
    controllers they are controlled by the
  • 00:06:33
    network administrator so you this would
  • 00:06:36
    be the client server type Network so the
  • 00:06:40
    control is centralized now with work
  • 00:06:43
    groups it is not client server it's
  • 00:06:45
    peer-to-peer so you have an individual I
  • 00:06:50
    guess decision about whether or not you
  • 00:06:51
    want to join in the group active
  • 00:06:53
    directory everyone is naturally part of
  • 00:06:57
    the group and although you should be in
  • 00:07:00
    the same land the scalability of actor
  • 00:07:02
    directory is such that it can scale
  • 00:07:05
    different autonomous systems completely
  • 00:07:08
    different IP addresses and when you when
  • 00:07:12
    you do that that's called a federation
  • 00:07:15
    so the scalability of domain controllers
  • 00:07:18
    and active directory is very high
  • 00:07:21
    another interesting fact about active
  • 00:07:24
    directory is the fact that you can
  • 00:07:28
    anyone
  • 00:07:30
    within the domain that the active
  • 00:07:32
    directory is connected to uh the
  • 00:07:34
    administrator can log into anybody's
  • 00:07:38
    computer when they are connected to
  • 00:07:40
    active directory so that is yet another
  • 00:07:43
    plus let's look at the next slide
  • 00:07:46
    Windows attack surfaces and mitigation
  • 00:07:49
    so a better way to look at this is here
  • 00:07:54
    where is the drawing tool right here
  • 00:07:56
    draw and we have our asset right here
  • 00:08:00
    whatever whatever it is and maybe it has
  • 00:08:03
    some IP so we start from the inside out
  • 00:08:08
    the data that resides on it I'll just
  • 00:08:11
    say it's a bunch of ones and zeros one
  • 00:08:14
    we'll just say 101 that is going to be
  • 00:08:18
    encrypted as it resides in this storage
  • 00:08:22
    and every piece of communication going
  • 00:08:25
    in or out will also be encrypted I'll
  • 00:08:29
    just say en NC for encrypted that makes
  • 00:08:33
    that makes doubly sure that even if
  • 00:08:36
    anybody EES drops on this data with wire
  • 00:08:39
    shark and you know they can because we
  • 00:08:41
    did a prior lab they're going to get a
  • 00:08:43
    bunch of garbage now to even leg have
  • 00:08:48
    legit you know access to whatever this
  • 00:08:52
    IP is this intellectual property it's
  • 00:08:54
    going to have access control so you're
  • 00:08:57
    going to have usernames and passwords
  • 00:09:00
    and you're going to have authentication
  • 00:09:03
    services that or authentication servers
  • 00:09:07
    uh outside of the chain of communication
  • 00:09:11
    that are is going to be doubly protected
  • 00:09:15
    as well and even Above This everything
  • 00:09:19
    will be protected by a firewall a
  • 00:09:22
    firewall is a specialized appliance that
  • 00:09:27
    uh that applies little rules to ensure
  • 00:09:30
    and basically it it will impose Access
  • 00:09:34
    Control lists to Ure that if you belong
  • 00:09:38
    here you can join in but if you don't
  • 00:09:42
    belong here then you cannot come in and
  • 00:09:46
    this occurs at the packet level and this
  • 00:09:49
    occurs inside the packet so we're
  • 00:09:52
    looking at quality of service issues so
  • 00:09:56
    if it won't necessarily be completely
  • 00:09:58
    filled filtered but it'll be as it may
  • 00:10:01
    be assigned a uh a priority such that if
  • 00:10:05
    there's a tie with a packet with a lower
  • 00:10:09
    priority your packet will win an example
  • 00:10:12
    of this is voice over IP VoIP which
  • 00:10:15
    stands for voice over IP if you're a
  • 00:10:17
    voice packet because it requires like
  • 00:10:20
    kind of like such care because it
  • 00:10:23
    requires low that has such high low
  • 00:10:25
    latency requirements that if the voice
  • 00:10:28
    packet
  • 00:10:29
    is ties with like an FTP packet file
  • 00:10:33
    transfer protocol The Voice packet will
  • 00:10:35
    for sure be process first because there
  • 00:10:39
    is a low latency requirement for that
  • 00:10:43
    protocol such that if there's any
  • 00:10:45
    minuscule Interruption then that call is
  • 00:10:48
    pretty much useless because of the way
  • 00:10:51
    voice packets go that being said that
  • 00:10:54
    firewall is to protect you and everyone
  • 00:10:57
    else in the system all right in terms of
  • 00:11:01
    actually installing the Windows Server
  • 00:11:04
    maintenance and actually I'm going to
  • 00:11:06
    put a line through here simply because
  • 00:11:09
    it doesn't have to be just Windows it
  • 00:11:11
    could be really any server because this
  • 00:11:14
    is a system admin class as syst system
  • 00:11:17
    admins you're going to be dealing with
  • 00:11:18
    different servers different types of
  • 00:11:20
    servers and the idea is you install the
  • 00:11:24
    operating system or app software because
  • 00:11:27
    you can take any old you know operating
  • 00:11:30
    system and install you know an
  • 00:11:32
    application on it or you can actually
  • 00:11:34
    install server software on it like for
  • 00:11:36
    example taking a Windows XP Windows 10
  • 00:11:40
    or Windows 11 and and activating the IIs
  • 00:11:44
    or installing a pat on it once you do
  • 00:11:46
    that guess what it is a web server if
  • 00:11:49
    you you so you go ahead and you install
  • 00:11:52
    the app or the operating system you
  • 00:11:55
    monitor the operation of the computer
  • 00:11:58
    system or of the app and then you make
  • 00:12:00
    any config changes to the system as
  • 00:12:04
    needed so for example if you install
  • 00:12:06
    Apache there is a log for Apache it
  • 00:12:10
    keeps track of anybody that has logged
  • 00:12:12
    in your system it keeps track of their
  • 00:12:14
    IP address so you can see if if your
  • 00:12:18
    computer was made vulnerable or
  • 00:12:19
    exploited you could see the last few
  • 00:12:22
    requests that were made you can look at
  • 00:12:24
    their IP addresses let's take a look at
  • 00:12:27
    system monitoring when it comes to
  • 00:12:29
    system monitoring you step one Define
  • 00:12:32
    security goals describe Behavior as a
  • 00:12:35
    baseline you can have sample performance
  • 00:12:38
    information and compare it with the
  • 00:12:40
    Baseline and Report any anomalies
  • 00:12:44
    finally we have the ability to identify
  • 00:12:48
    vulnerabilities so we we already went
  • 00:12:51
    over some vulnerabilities like for
  • 00:12:54
    example social engineering DNS spoofing
  • 00:12:57
    and hijacking so any a lot of servers
  • 00:13:01
    are vulnerable to some of the same
  • 00:13:04
    things so you can use some of the
  • 00:13:08
    research tools that you were provided
  • 00:13:11
    you there are websites that you can go
  • 00:13:13
    to to check out all possibilities to
  • 00:13:16
    check out the surface area
  • 00:13:19
    vulnerabilities that this object may
  • 00:13:22
    have
  • 00:13:23
    [Music]
  • 00:13:29
    wa
  • 00:13:32
    [Music]
  • 00:13:41
    [Music]
  • 00:14:02
    [Music]
Tags
  • control acces
  • kernel
  • Active Directory
  • grup de lucru
  • securitate
  • atac cibernetic
  • parole
  • firewall
  • monitorizare sistem
  • vulnerabilități