Site icon TheCyberThrone

CEH V13 Detailed Notes Part VII

Advertisements

Introduction

Module 19: Cloud Computing – Securing the Virtual Sky

Cloud platforms have become the core of modern IT, offering scalability, agility, and global access — but they also introduce new attack surfaces.
This module explores how attackers target cloud infrastructures, misconfigurations, APIs, and identity systems.
Learners study cloud service models (IaaS, PaaS, SaaS), key threats like insecure storage and privilege escalation, and defensive practices such as shared responsibility, encryption, and zero-trust access.

Module 20: Cryptography – Guarding Data Through Mathematics

Cryptography is the science that ensures data confidentiality, integrity, and authenticity.
This module covers encryption algorithms, hashing, digital signatures, and key management principles essential to cybersecurity.
Learners gain an understanding of how encryption is applied in real-world systems — from securing communications to protecting passwords and verifying identities — and how attackers attempt to break or misuse it.

Module 19: Cloud Computing

1. Purpose and Importance

Cloud computing underpins modern digital transformation — powering SaaS, data centers, and hybrid infrastructures.
For ethical hackers, understanding cloud vulnerabilities, attack surfaces, and defensive architectures is vital.
This module explores how cloud environments differ from traditional IT systems and how attackers exploit those differences.

2. Core Concepts of Cloud Computing

Definition

Cloud computing delivers on-demand network access to a shared pool of configurable computing resources — servers, storage, applications, and services — that can be rapidly provisioned and released.

Five Key Characteristics (NIST Definition)

  1. On-demand self-service – users provision resources automatically.
  2. Broad network access – accessible from anywhere via internet protocols.
  3. Resource pooling – shared physical and virtual resources.
  4. Rapid elasticity – scale resources dynamically.
  5. Measured service – usage is metered for billing and management.

3. Cloud Service Models

IaaS (Infrastructure as a Service) Provides virtualized compute, storage, and networking resources. AWS EC2, Google Compute Engine, Azure VM

PaaS (Platform as a Service) Developers build apps without managing servers or OS. Google App Engine, Azure App Service

SaaS (Software as a Service) End-users access hosted software online. Salesforce, Microsoft 365, Gmail

Security responsibility increases as you move from SaaS → PaaS → IaaS.

4. Cloud Deployment Models

  1. Public Cloud – shared infrastructure managed by a provider (e.g., AWS, Azure).
  2. Private Cloud – dedicated infrastructure for one organization (on-prem or hosted).
  3. Hybrid Cloud – mix of public and private, enabling workload portability.
  4. Community Cloud – shared among organizations with common concerns.

5. The Shared Responsibility Model

Security in the cloud is a shared duty:

Failure to understand this split often leads to misconfiguration-based breaches.

6. Cloud Architecture Components

7. Cloud Attack Surfaces and Threat Vectors

Primary Attack Surfaces

Common Threats

  1. Data breaches – theft from misconfigured buckets or APIs.
  2. Insecure APIs – exposed endpoints or unvalidated inputs.
  3. Misconfiguration – open S3 buckets, public VM ports, weak IAM policies.
  4. Insider threats – abuse of privileged access or leaked credentials.
  5. Account hijacking – stolen cloud credentials or tokens.
  6. Insecure interfaces & weak authentication – reused passwords, poor MFA adoption.
  7. Denial of Service (DoS) – resource exhaustion to impact availability.
  8. Supply chain & dependency attacks – compromised SDKs, images, or containers.
  9. Shadow IT – unapproved use of cloud apps without central governance.
  10. Data loss & regulatory exposure – unencrypted or misplaced backups.

8. Common Cloud Vulnerabilities (and Why They Exist)

9. Cloud Attack Techniques (Conceptual)

1. Reconnaissance

2. Credential and Token Theft

3. Exploiting Weak Configurations

4. Lateral Movement

5. Abuse of Cloud Resources

6. Privilege Escalation

7. Data Exfiltration

10. Cloud Security Controls (Defense-in-Depth)

A. Identity and Access Management (IAM)

B. Network Security

C. Data Protection

D. Logging and Monitoring

E. Vulnerability Management

F. Configuration Management

G. Incident Response in Cloud

11. Virtualization and Hypervisor Security

12. Cloud Forensics and Legal Considerations

13. Cloud Governance and Risk Management

14. Cloud Security Best Practices

15. Emerging Trends and Challenges

16. Incident Response Flow for Cloud Environments (Conceptual)

  1. Detection: Cloud logs, alerts, or anomaly monitoring.
  2. Containment: Isolate affected resources (VMs, buckets).
  3. Eradication: Remove malicious components or roles.
  4. Recovery: Rebuild from trusted images or backups.
  5. Post-Incident: Review configuration baselines, rotate credentials, and strengthen policies.

17. Exam Focus and Key Takeaways

18. Memory Hooks

“CLOUD SAFE” mnemonic:

Module 20: Cryptography

1. Introduction to Cryptography

Definition:
Cryptography is the science of securing information by transforming it into an unreadable format to ensure confidentiality, integrity, authenticity, and non-repudiation.

It is derived from the Greek words:

Modern cryptography underpins secure communications, online transactions, digital signatures, and data protection.

2. Objectives of Cryptography (The CIAAN Model)

  1. Confidentiality – Prevent unauthorized disclosure of information.
  2. Integrity – Ensure data is not altered during transmission or storage.
  3. Authentication – Verify the sender or source identity.
  4. Authorization – Ensure the recipient has permission to access data.
  5. Non-Repudiation – Prevent denial of a sent or received message.

3. Basic Cryptographic Concepts

Plaintext

Original, readable data or message before encryption.

Ciphertext

Encrypted output of plaintext after encryption.

Key

A secret value used to encrypt or decrypt information.

Algorithm (Cipher)

A mathematical process or formula used for encryption and decryption.

Keyspace

All possible key combinations an algorithm can produce — larger keyspace = stronger encryption.

Cryptanalysis

The art of breaking cryptography (finding weaknesses or discovering the key).

4. Types of Cryptography

A. Symmetric Key Cryptography (Secret Key)

Examples:

Advantages:

B. Asymmetric Key Cryptography (Public Key)

Examples:

Use Cases:

C. Hash Functions (Message Digests)

Examples:

Key Concept:
Even a small change in input → drastically different hash (Avalanche effect).

5. Encryption Algorithms in Detail

1. DES (Data Encryption Standard)

2. 3DES (Triple DES)

3. AES (Advanced Encryption Standard)

AES Advantages:

4. RC4

5. Blowfish / Twofish

6. Asymmetric Algorithms

RSA (Rivest–Shamir–Adleman)

ECC (Elliptic Curve Cryptography)

Diffie–Hellman (DH)

ElGamal

7. Hashing Algorithms (Integrity Protection)

Algorithm Output Size Usage Status MD5 128-bit Checksums Broken SHA-1 160-bit Legacy digital signatures Broken SHA-2 256/512-bit TLS, SSL, IPSec Secure SHA-3 (Keccak) Variable Future standard Secure RIPEMD-160 160-bit European standard Secure

Purpose: Validate data integrity (e.g., verifying downloads, password storage).

8. Digital Signatures

Purpose:
Provide authentication, integrity, and non-repudiation.

Process:

  1. Message hashed → message digest created.
  2. Digest encrypted with sender’s private key → digital signature.
  3. Receiver decrypts signature using sender’s public key → verifies hash match.

Standards:

9. Public Key Infrastructure (PKI)

Definition:

A framework managing digital certificates and encryption keys across users and devices.

Core Components:

Lifecycle:

  1. Certificate request → 2. Issuance → 3. Use → 4. Renewal/Revocation → 5. Expiration.

10. Steganography

Detection:
Steganalysis tools identify abnormal patterns, file size anomalies, or altered headers.

11. Cryptographic Attacks

1. Brute-Force Attack

Trying every possible key combination — mitigated by large keyspaces.

2. Dictionary Attack

Uses precomputed wordlists to guess keys or passwords.

3. Rainbow Table Attack

Uses precomputed hash tables to crack hashed passwords — mitigated by salting.

4. Birthday Attack

Exploits hash collisions — affects weak hash functions like MD5 and SHA-1.

5. Replay Attack

Intercepts and reuses encrypted packets — prevented by timestamps and nonces.

6. Side-Channel Attack

Exploits physical implementation leaks (power, timing, EM radiation).

7. Chosen-Plaintext and Ciphertext Attacks

Attacker controls input/output pairs to deduce key — mitigated with strong algorithms.

8. Man-in-the-Middle (MITM)

Intercepts key exchange — countered by mutual authentication (certificates).

12. Cryptography in Real-World Security

A. SSL/TLS

B. VPNs

C. Email Encryption

D. Disk Encryption

E. Blockchain

13. Cryptography Key Management

14. Legal and Ethical Considerations

15. Best Practices for Cryptographic Security

  1. Always use current, standardized algorithms (AES, SHA-2, RSA 2048+).
  2. Never develop custom encryption algorithms for production.
  3. Implement end-to-end encryption for sensitive communications.
  4. Apply perfect forward secrecy (PFS) to prevent key reuse.
  5. Salt and hash passwords before storing them.
  6. Use strong entropy sources for key generation.
  7. Periodically audit and update certificates and cryptographic libraries.

16. Emerging Cryptography Trends

17. Exam Focus Summary (Key Takeaways)

18. Memory Hook

“HIDE SAFE” mnemonic for crypto principles:

Exit mobile version