From the course: Cisco CCNP SCOR Security (350-701) Cert Prep: 3 Endpoint Protection and Secure Access
Unlock this course with a free trial
Join today to access over 22,600 courses taught by industry experts.
HTTPS
- [Instructor] Another method that attackers use for data exfiltration is HTTP or HTTPS. There are a few different ways that this can be accomplished, but the main variation we see for this is by using a backdoor. A backdoor is a type of attack that gives a threat actor unauthorized access to a system. Backdoors have been linked to many well known attacks against the retail industry, such as the attack on the Target Corporation a few years back. Typically, these are created by malware that gets installed onto a device, which can create unauthorized access to the device over the public internet in various ways, such as opening a port to public internet. The main goal of a backdoor is to be discreet. That is to say, backdoors are most successful when they are able to be in place for long periods of time without the user being aware. The longer the attacker has access, the more data they can potentially exfiltrate. With backdoor access in place, attackers may use HTTP to transmit data…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Guest services6m 48s
-
(Locked)
Profiling7m 32s
-
(Locked)
BYOD policies5m 52s
-
802.1X11m 11s
-
(Locked)
MAB4m 56s
-
(Locked)
WebAuth7m 43s
-
(Locked)
DNS tunneling3m 15s
-
(Locked)
HTTPS3m 50s
-
(Locked)
Email3m 12s
-
(Locked)
File transfer protocols3m 54s
-
(Locked)
ICMP4m 8s
-
(Locked)
NTP3m 34s
-
Cisco Stealthwatch6m 58s
-
(Locked)
Cisco Stealthwatch cloud5m 53s
-
(Locked)
Cisco pxGrid4m 10s
-
(Locked)
Cisco CTA and ETA6m 23s
-
(Locked)
Cisco AnyConnect Network Visibility Module (NVM)3m 26s
-
(Locked)
-