CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Tuesday, September 16, 2025

Threat Hunting Explained: From Hypothesis to Response

 Threat Hunting

Threat hunting is a proactive cybersecurity approach that aims to detect and mitigate threats that evade traditional security defenses. Unlike reactive methods that respond to alerts, threat hunting involves actively searching for signs of malicious activity within an organization's systems and networks before an alert is triggered.

Core Concepts of Threat Hunting
1. Proactive Investigation
Threat hunters assume that adversaries are already inside the network and look for indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) that may signal a breach.

2. Hypothesis-Driven
Hunts often begin with a hypothesis based on threat intelligence, past incidents, or behavioral anomalies. For example:
“What if an attacker is using PowerShell to move laterally across our network?”

3. Data-Driven Analysis
Threat hunters analyze large volumes of data from sources like:
  • Endpoint Detection and Response (EDR)
  • Security Information and Event Management (SIEM)
  • Network traffic logs
  • User behavior analytics
4. Use of Threat Intelligence
External and internal threat intelligence feeds help hunters understand attacker behavior and anticipate future actions.

5. Detection and Response
Once a threat is identified, hunters work with incident response teams to contain and remediate the threat, and update detection rules to prevent recurrence.

Threat Hunting Process
1. Preparation
  • Define scope and objectives.
  • Gather relevant data sources
  • Establish baseline behaviors
2. Hypothesis Creation
  • Based on threat intelligence, known attack patterns, or anomalies
3. Investigation
  • Query logs and data
  • Use tools like YARA, Sigma, or custom scripts
  • Look for patterns, anomalies, and suspicious behavior
4. Validation
  • Confirm whether findings are malicious or benign
  • Correlate with other data sources
5. Response
  • Contain and eradicate threats
  • Document findings
  • Update detection mechanisms
6. Feedback Loop
  • Improve future hunts
  • Refine hypotheses and detection rules
Tools Commonly Used in Threat Hunting
  • SIEM platforms (e.g., Splunk, QRadar, ELK Stack)
  • EDR solutions (e.g., CrowdStrike, SentinelOne)
  • Threat intelligence platforms (e.g., MISP, Recorded Future)
  • Scripting languages (e.g., Python, PowerShell)
  • MITRE ATT&CK Framework – for mapping adversary behavior
Types of Threat Hunting
1. Structured Hunting
  • Based on known TTPs and frameworks like MITRE ATT&CK.
2. Unstructured Hunting
  • Based on anomalies or intuition, often exploratory.
3. Situational Hunting
  • Triggered by specific events or intelligence (e.g., a new vulnerability or breach in a similar organization).
Benefits of Threat Hunting
  • Detects advanced persistent threats (APTs)
  • Reduces dwell time (how long attackers stay undetected)
  • Improves overall security posture
  • Enhances incident response capabilities
  • Strengthens detection rules and automation

Monday, September 15, 2025

U6 Enterprise by Ubiquiti: Tri-Band Wi-Fi 6E for High-Density Networks

 Ubiquiti U6 Enterprise Wireless Access Point

Ubiquiti UniFi U6 Enterprise Review
Overview
The U6 Enterprise is Ubiquiti’s flagship Wi-Fi 6E access point designed for high-performance environments. It supports tri-band connectivity (2.4 GHz, 5 GHz, and 6 GHz), making it ideal for dense client environments, modern homes, and enterprise setups.

Key Features
  • Wi-Fi 6E Support: Adds the 6 GHz band for faster speeds and reduced interference.
  • Tri-Band AXE11000: Offers up to 4,800 Mbps on both 5 GHz and 6 GHz bands, and 600 Mbps on 2.4 GHz.
  • 2.5Gbps PoE+ Port: Enables multi-gig connectivity, ideal for high-speed networks.
  • Compact Design: Despite its power, it’s smaller than many competitors like the NETGEAR WAX630E.
  • No Power Adapter: Requires PoE+ or PoE++ injector or switch; no traditional power port.
Additional Features:
  • Wireless Meshing
  • Band Steering
  • 802.11v BSS Transition Management
  • 802.11r Fast Roaming
  • 802.11k Radio Resource Management (RRM)
  • Advanced Radio Management
  • Passpoint (Hotspot 2.0)
  • Captive Hotspot Portal
  • Custom Branding Landing Page
  • Voucher Authentication
  • Payment-Based Authentication
  • External Portal Server Support
  • Password Authentication
  • Guest Network Isolation
  • Private Pre-Shared Key (PPSK)
  • WiFi Speed Limiting
  • Client Device Isolation
  • WiFi Schedules
  • RADIUS over TLS (RadSec)
  • Dynamic RADIUS-assigned VLAN
Performance
  • Speed: Users report consistent speeds between 700–900 Mbps near the AP and 400–600 Mbps in farther rooms.
  • Bandwidth Distribution: Handles multiple devices better than the U6-LR, evenly distributing bandwidth across clients.
  • Coverage: Rated for up to 1,500 ft, slightly more than the U6-Lite. However, some users noted weaker coverage compared to the U6-LR in fringe areas.
  • MIMO:
    • 6 GHz            4 x 4 (DL/UL MU-MIMO)
    • 5 GHz            4 x 4 (DL/UL MU-MIMO)
    • 2.4 GHz        2 x 2 (DL/UL MU-MIMO)
Setup & Management
  • UniFi Controller Required for Full Features: While it can operate standalone, full functionality (mesh, SSIDs, analytics) requires a UniFi controller or app.
  • Mobile App Setup: Easy setup via Bluetooth or network detection. No web UI for standalone use.
  • Privacy Considerations: Requires a Ubiquiti account for remote management, which may raise privacy concerns.
Pros
  • Excellent performance with Wi-Fi 6E
  • Multi-gig PoE port for high-speed backhaul
  • Great for dense environments with many devices
  • Compact and well-built
  • No subscription required for controller use
Cons
  • No included PoE injector or power adapter
  • Coverage may be slightly less than U6-LR in some setups
  • No web UI for standalone configuration
Ideal Use Cases
  • Enterprise Networks: Offices with high client density
  • Modern Homes: Especially those with gigabit internet and many smart devices
  • Apartments: Where the 6 GHz band can avoid congested RF environments
Final Verdict
The Ubiquiti U6 Enterprise is a top-tier access point for users ready to embrace Wi-Fi 6E and multi-gig networking. While it’s priced higher and lacks some convenience features (like a power adapter), its performance, scalability, and future-proofing make it a compelling choice for both prosumers and businesses.

Out-of-Band Management Explained: Key Concepts, Benefits, and Use Cases

 OOB Out-of-Band Management

Out-of-band management (OOBM) is a method used in IT and network administration to remotely monitor, manage, and troubleshoot systems independently of the primary network connection. It’s beneficial when the main network is down or the system is unresponsive.

Here’s a detailed breakdown:

1. What Is Out-of-Band Management?
Out-of-band management refers to the use of a dedicated management channel that operates separately from the standard data network. This allows administrators to access and control devices even if the operating system is down or the network is unreachable.

2. Key Components
  • Dedicated Management Port: Most enterprise-grade hardware (servers, switches, routers) includes a separate port for OOBM, such as:
    • IPMI (Intelligent Platform Management Interface)
    • iLO (Integrated Lights-Out by HP)
    • DRAC (Dell Remote Access Controller)
    • Cisco's Console Ports
  • Management Network: A separate network infrastructure used solely for management traffic. It’s isolated from the production network for security and reliability.
  • Remote Access Tools: These include SSH, serial console access, or web interfaces that connect through the management port.
3. How It Works
  • The OOBM interface is powered independently of the main system (often via a Baseboard Management Controller or BMC).
  • Admins can:
    • Power cycle the device
    • View system logs
    • Access BIOS/UEFI
    • Mount remote media for OS installation
    • Troubleshoot hardware issues
Even if the OS is crashed or the network is misconfigured, OOBM remains accessible.

4. Benefits
  • Resilience: Access systems during outages or failures.
  • Security: Isolated from the main network, reducing attack surface.
  • Efficiency: Reduces the need for physical presence at data centers.
  • Control: Full hardware-level access, including power and boot settings.
5. Use Cases
  • Data Centers: Managing thousands of servers remotely.
  • Branch Offices: Troubleshooting routers or switches without sending technicians.
  • Disaster Recovery: Accessing systems during major outages.
6. Comparison with In-Band Management



Friday, September 12, 2025

NIST SP 800-207: A Comprehensive Guide to Zero Trust Architecture

 NIST SP 800-207 Zero Trust Architecture

NIST Special Publication 800-207, titled "Zero Trust Architecture (ZTA)", is a foundational cybersecurity framework published by the National Institute of Standards and Technology (NIST) in August 2020. It redefines how organizations should approach security in a world where traditional network perimeters are no longer sufficient.

What Is Zero Trust?
Zero Trust (ZT) is a security philosophy that assumes no user, device, or system should be trusted by default, regardless of whether it is inside or outside the network perimeter. Every access request must be:
  • Explicitly verified
  • Continuously validated
  • Contextually evaluated
This model is a response to modern threats, remote work, BYOD (Bring Your Own Device), and cloud computing.

Core Principles of NIST SP 800-207
NIST outlines seven core tenets of Zero Trust:
1. All data sources and computing services are considered resources.
2. All communication is secured, regardless of network location.
3 Access is granted per session, not permanently.
4 Dynamic policy decisions are based on identity, device posture, and context.
5. Authentication and authorization are enforced before access is granted.
6. Continuous monitoring of asset integrity and security posture.
7. Logging and telemetry are essential for trust evaluation and policy updates.

Key Components of Zero Trust Architecture

NIST SP 800-207 defines a modular architecture with these core components:
Policy Engine (PE): Makes access decisions using identity, risk scores, and telemetry.
Policy Administrator (PA): Enforces decisions by issuing session credentials.
Policy Enforcement Point (PEP): Applies access control near the resource.
These components work together to ensure that access is granular, dynamic, and revocable.

Zero Trust Workflow

A typical ZTA access flow looks like this:
1. Subject (user/device) requests access.
2. PEP intercepts the request.
3. PA consults the PE to evaluate the request.
4. If approved, access is granted only for that session.

This model minimizes the "implicit trust zone" and reduces lateral movement risk.

Deployment Models

NIST SP 800-207 outlines three reference architectures:
1. Enhanced Identity Governance (EIG): Uses IdPs, MFA, and SSO for app-level control.
2. Microsegmentation: Isolates workloads using SDN or host-based agents.
3. Software-Defined Perimeter (SDP): Builds encrypted tunnels between users and services.

Most organizations adopt a hybrid approach tailored to their infrastructure and maturity level.

Implementation Strategy

NIST recommends a phased approach:
1. Asset Discovery
2. Define Trust Zones
3. Model Policies
4. Pilot in a Small Environment
5. Monitor, Adjust, and Expand

This ensures low disruption and high visibility during rollout.

Real-World Threat Mitigation

ZTA helps mitigate:
  • Lateral movement via microsegmentation
  • Credential theft with MFA and session expiration
  • Insider threats through least privilege and behavioral monitoring
  • Supply chain attacks with software attestation and signed artifacts
Compliance and Alignment

SP 800-207 aligns with:
  • NIST 800-53 Rev. 5
  • CMMC 2.0
  • ISO/IEC 27001
  • CIS Controls v8
  • Executive Order 14028
This makes it a strong foundation for both security and regulatory compliance.

Spanning Tree Priority Values: What They Are and Why They Matter

 Spanning Tree Priority Values

In the context of Spanning Tree Protocol (STP), priority values play a crucial role in determining the Root Bridge and the overall topology of a loop-free network. Here's a detailed explanation:

What Are Spanning Priority Values?
Spanning priority values are part of the Bridge ID, which is used to elect the Root Bridge in a network running STP. The Bridge ID consists of:
  • Bridge Priority (2 bytes)
  • MAC Address (6 bytes)
Together, they form an 8-byte identifier unique to each switch.

Role in Root Bridge Election
STP uses the Bridge ID to elect the Root Bridge, which is the central switch in the spanning tree topology. The election process works as follows:
  • Lowest Bridge ID wins.
  • If multiple switches have the same priority, the one with the lowest MAC address becomes the Root Bridge.
By default, the bridge priority is set to 32768 on most switches. You can manually configure it to influence which switch becomes the Root Bridge.

Priority Value Range and Configuration
  • Range: 0 to 65535
  • Lower value = higher priority
  • Common practice:
    • Set Root Primary to a lower priority (e.g., 24576)
    • Set Root Secondary to a slightly higher priority (e.g., 28672)
This ensures predictable Root Bridge selection and failover behavior.

Commands to Set Priority (Cisco Example)

1 spanning-tree vlan 1 root primary
2 spanning-tree vlan 1 root secondary
3

These commands automatically adjust the priority to ensure the switch becomes the Root Bridge (or backup) for the specified VLAN.

Why It Matters
Properly setting spanning priority values:
  • Prevents suboptimal paths
  • Ensures network stability
  • Helps in redundancy planning
If left to default, STP might elect a less optimal switch as the Root Bridge, leading to inefficient traffic flow.

Tuesday, September 9, 2025

NIST SP 800-61r2: A Retrospective on a Pivotal Incident Response Framework

 NIST SP 800-61r2

NIST Special Publication 800-61 Revision 2 (SP 800-61r2), titled Computer Security Incident Handling Guide, is a foundational document published by the National Institute of Standards and Technology (NIST) to help organizations develop and implement effective incident response capabilities. Although it was officially withdrawn in April 2025 and replaced by Revision 3, Revision 2 remains widely referenced and influential 1.

Here’s a detailed breakdown of its contents and guidance:

Purpose and Scope
SP 800-61r2 provides guidelines for incident handling and response, aiming to help organizations:
  • Detect and analyze security incidents.
  • Contain, eradicate, and recover from incidents.
  • Improve incident response capabilities over time.
It is platform-agnostic, meaning it applies regardless of the hardware, operating system, or application.

Structure of the Document

The guide is divided into four major sections:
1. Introduction
  • Defines what constitutes a security incident.
  • Emphasizes the importance of incident response in minimizing damage and recovery time.
  • Encourages proactive planning and continuous improvement.
2. Incident Response Life Cycle

This is the core of the guide, outlining a four-phase lifecycle:
  • Preparation
    • Establish policies, procedures, and tools.
    • Train staff and conduct exercises.
    • Set up communication channels and legal protocols.
  • Detection and Analysis
    • Monitor systems for signs of incidents.
    • Use logs, intrusion detection systems (IDS), and other tools.
    • Classify and prioritize incidents based on impact.
  • Containment, Eradication, and Recovery
    • Short-term and long-term containment strategies.
    • Remove malicious components and restore systems.
    • Validate system integrity before returning to production.
  • Post-Incident Activity
    • Conduct lessons-learned meetings.
    • Update policies and procedures.
    • Improve defenses based on findings.
3. Organizing an Incident Response Capability
  • Discusses team structure (centralized vs. distributed).
  • Covers staffing, training, and resource allocation.
  • Addresses legal and regulatory considerations.
4. Handling Specific Incidents
  • Provides examples of incident types:
    • Network-based attacks
    • Malware infections
    • Insider threats
  • Offers tailored response strategies for each.
Key Principles and Recommendations
  • Incident classification: Not all events are incidents; proper classification is crucial.
  • Evidence handling: Maintain integrity for legal and forensic purposes.
  • Communication: Internal and external communication plans are vital.
  • Metrics and reporting: Track performance and report incidents to stakeholders.
Strengths and Limitations

Strengths:
  • Comprehensive and practical.
  • Adaptable to various organizational sizes and sectors.
  • Encourages continuous improvement.
Limitations:
  • Lacks detailed guidance on emerging threats like ransomware and APTs.
  • Could benefit from a more risk-based approach

NIST SP 800-115: A Technical Guide to Security Testing and Assessment

 NIST SP 800-115

NIST SP 800-115, titled "Technical Guide to Information Security Testing and Assessment", is a foundational document published by the National Institute of Standards and Technology (NIST). It provides a structured yet flexible framework for conducting technical security assessments, including penetration testing, vulnerability scanning, and security reviews.

Purpose of NIST SP 800-115
The guide helps organizations:
  • Plan and execute security testing and assessments
  • Analyze findings
  • Develop mitigation strategies. It is not a comprehensive testing program but rather a framework of best practices for conducting technical security evaluations.
Core Components of the Framework
NIST SP 800-115 outlines a four-phase process for penetration testing and security assessments:

1. Planning Phase
  • Define scope and objectives
  • Establish rules of engagement
  • Address legal and ethical considerations
  • Finalize documentation and consent
2. Discovery Phase
  • Information Gathering: Collect data on systems, IPs, ports, and services
  • Vulnerability Analysis: Compare findings against known vulnerabilities (e.g., NVD)
3. Attack Phase
  • Gaining Access: Exploit vulnerabilities to access systems
  • Privilege Escalation: Attempt to gain deeper control
  • Data Compromise: Explore what sensitive data can be accessed
  • Persistence Simulation: Leave behind artifacts to demonstrate impact
4. Reporting Phase
  • Summarize findings
  • Provide actionable recommendations
  • Prioritize remediation efforts
Techniques Covered

The guide includes a wide range of testing techniques:
  • Documentation Review
  • Log Analysis
  • System Configuration Review
  • Network Sniffing
  • File Integrity Checking
  • Password Cracking
  • Social Engineering
  • Wireless Scanning
  • Vulnerability Validation
Benefits of Using NIST SP 800-115
  • Ensures consistency and quality in security assessments
  • Helps meet compliance and audit requirements
  • Provides a common language for security professionals
  • Supports risk-based decision-making