THM - Common Attacks
THM - Common Attacks
Social engineering involves cyberattacks targeting humans rather than systems, often
referred to as "People Hacking." Attackers use methods such as gaining small pieces of
information from social media to escalate access step-by-step to sensitive accounts like
banks. Examples include direct interaction or tricking people with malicious USBs or devices.
Staying Safe
Phishing
Phishing Overview
Phishing is a form of social engineering where attackers trick victims into visiting malicious
websites via emails, texts, or calls, often to steal sensitive information like login credentials or
install malware. It is categorized into three types:
Example Scenario:
An attacker sends a fake email claiming to be from "Amazon" about a suspicious purchase.
The victim clicks a link to a fake login page, enters credentials, and the attacker gains access
to their account.
Staying Safe
Malware is malicious software designed to harm or control systems, often used for data theft
or remote command and control (C2). Ransomware, a specialized malware type, encrypts
data and demands payment (usually in cryptocurrency) for decryption. Ransomware spreads
through vulnerabilities or social engineering, such as malicious email attachments or
exploitations of software flaws.
Delivery Methods
Phishing emails with malicious attachments (e.g., Word macros, .exe, .ps1 scripts).
Exploiting vulnerabilities in public-facing infrastructure like web servers.
Staying Safe
Passwords are essential for authentication but can be compromised by insecure practices
such as reusing passwords or using easily guessed ones. A strong password is crucial to
protecting accounts.
Strong Passwords
Weak Passwords
Short passwords or those with simple patterns (e.g., "Gareth2012!") are easy to guess.
Password reuse increases vulnerability to breaches.
Password Storage
Exposed Passwords
Password Attacks
Staying Safe
Multi-Factor Authentication and Password Managers
Multi-Factor Authentication (MFA)
MFA requires more than one authentication factor to log in, improving security. Common
factors include:
Password Managers
Password managers store and manage strong, unique passwords securely. Features include:
The Problem
Public WiFi is convenient but risky. Attackers can exploit it for man-in-the-middle attacks,
intercepting traffic or stealing credentials, especially on non-encrypted websites. Connecting
to any network also exposes your device to potential threats.
Solutions
Avoid Untrusted Networks: Use private networks or mobile hotspots when possible.
Use a VPN: VPNs encrypt traffic, making intercepted data unreadable. Paid VPNs like
ProtonVPN or Mullvad VPN provide better security than free options.
Backups
Backups Overview
Backups are crucial for protecting data, enabling recovery regardless of damage. They are
essential for both critical business data and personal files like photos.
Software Updates
Updates fix bugs, add features, and patch vulnerabilities. Regularly updating software,
especially operating systems, is critical for security. For example, the WannaCry ransomware
used the Eternal Blue vulnerability in Windows, which could have been prevented by applying
the MS17-010 patch. Deprecated software no longer receives updates (EOL) and should be
replaced or isolated to avoid exploitation.
Antivirus Updates
Antivirus software relies on up-to-date databases of malware signatures. Frequent updates
ensure it can detect and block the latest threats. Allow antivirus updates to maintain
effectiveness and avoid potential malware slipping through outdated defenses.