Threat Vectors and Attack Surfaces

Welcome to the Threat Vectors and Attack Surfaces practice lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Identifying threat vectors and attack surfaces is critical to network security. Understanding how to identify indicators of attack and vulnerable applications enables the administrator to apply mitigations and act proactively to protect the network environment.

In this module, you will identify potential attack surfaces and mitigate them.

Overview

Learning Outcomes:

In this module, you will complete the following exercises:

  • Exercise 1 - Open Service Ports
  • Exercise 2 - Default Credentials
  • Exercise 3 - Vulnerable Applications

After completing this module, you should be able to:

  • Discover unnecessary open ports.
  • Close unnecessary open ports.
  • Discover the Guest account.
  • Disable the Guest account.
  • Discover a recently installed application.
  • Simulate an attack on the vulnerable application.
  • Observe indicators of attack.

Exam Objectives:

The following exam objectives are covered in this module:

1.2 Summarize fundamental security concepts

  • Authentication, Authorization, and Accounting (AAA)

2.2 Explain common threat vectors and attack surfaces

  • Message-based
  • File-based
  • Vulnerable software
  • Unsupported systems and applications
  • Open service ports
  • Default credentials
  • Human vectors/social engineering

2.4 Given a scenario, analyze indicators of malicious activity

  • Indicators