Cloud, Mobile, and IoT Security
In this chapter from CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition, you will learn about different attacks against cloud, mobile, and IoT implementations.
This chapter covers the following topics related to Objective 3.4 (Given a scenario, research attack vectors and perform attacks on cloud technologies.) and Objective 3.5 (Explain common attacks and vulnerabilities against specialized systems.) of the CompTIA PenTest+ PT0-002 certification exam:
Researching attack vectors and performing attacks on cloud technologies
Explaining common attacks and vulnerabilities against specialized systems
The adoption of cloud technology and cloud services has revolutionized how organizations develop, host, and deploy applications and store data. In addition, mobile devices and Internet of Things (IoT) devices communicate using a diverse set of protocols and technologies. Mobile and IoT devices also often communicate with applications hosted in the cloud. All these technologies and architectures increase the attack surface and introduce a variety of cybersecurity risks. In this chapter, you will learn about different attacks against cloud, mobile, and IoT implementations.
“Do I Know This Already?” Quiz
The “Do I Know This Already?” quiz allows you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 7-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Q&A Sections.”
Table 7-1 “Do I Know This Already?” Section-to-Question Mapping
Foundation Topics Section |
Questions |
Researching Attack Vectors and Performing Attacks on Cloud Technologies |
1–5 |
Explaining Common Attacks and Vulnerabilities Against Specialized Systems |
6–10 |
Which of the following is the process of gathering and stealing valid usernames, passwords, tokens, PINs, and other types of credentials through infrastructure breaches?
Password cracking
Key reauthentication attack
Crypto downgrade attack
Credential harvesting
You were tasked with performing a penetration assessment of a cloud-hosted application. After compromising the osantos user account, you were then able to access functions or content reserved for another user, ccleveland. Which of the following best describes this type of attack?
Cloud lateral movement
VM escape
Sandbox escape
Horizontal privilege escalation
Which of the following are potential ways to detect account takeover attacks? (Choose all that apply.)
Analyzing failed attempts
Looking for abnormal OAuth, SAML, or OpenID Connect connections
Monitoring for abnormal file sharing and downloading
All of these answers are correct.
When performing a cloud-based penetration test, you noticed that a software developer included sensitive information in user startup scripts. Through which of the following could these user startup scripts be accessed and allow cloud-based instances to be launched with potential malicious configurations?
Block storage
Lambda
Metadata services
None of these answers are correct.
Which of the following is an example of a vulnerability that could allow an attacker to launch a side-channel attack in a cloud infrastructure?
Heartbleed
DNS cache poisoning
Spectre
None of these answers are correct.
Which of the following is a mandatory access control mechanism describing the resources that a mobile app can and can’t access?
Container
IPC
Sandbox
None of these answers are correct.
Which of the following are vulnerabilities that could affect a mobile device? (Choose all that apply.)
Insecure storage vulnerabilities
Vulnerabilities affecting biometrics integrations
Certificate pinning
All of these answers are correct.
Which of the following is a tool that can be used to find vulnerabilities in Android implementations and attack the underlying operating system?
Drozer
Nmap
Nikto
MobSF
Which of the following is an automated mobile application and malware analysis framework?
Postman
Bettercap
MobSF
Ettercap
Which of the following management interface implementations can be leveraged by an attacker to obtain direct access to a system’s motherboard and other hardware?
IPMC implants
UEFI bus
BIOS
IPMI baseboard management controller