Top Banner
Attacks and Vulnerabili Vulnerabili ties ties
45

Web attacks

Apr 13, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Web attacks

Attacks andVulnerabilitiesVulnerabilities

Page 2: Web attacks

Topics of Discussion

• ReconnaissanceGain information about a system

• VulnerabilitiesAttributes of a system that can be maliciously

exploited• Attacks

Procedures to exploit vulnerabilities

Reference 1

Page 3: Web attacks

Topics of Discussion

Reconnaissance – War Dialing– War Driving– Port Scanning– Probing– Packet Sniffing

Page 4: Web attacks

War Dialing (Reconnaissance)

• MethodDial a range of phone

numbers searching for modem

• MotivationLocate potential targets

• DetectionDetection impossible

outside of the telephony infrastructure

• DefenseDisconnect unessential

modems from outgoing phone lines

Reference 2

Page 5: Web attacks

War Driving (Reconnaissance)

• MethodSurveillance of wireless

signals in a region

• MotivationFind wireless traffic

• DetectionCan only be detected by

physical surveillance

• DefenseLimit geographic access to

wireless signal

Reference 3

Page 6: Web attacks

Port Scanning (Reconnaissance)

• MethodSend out a SYN packet,

check for response

• MotivationFind potential targets

• DetectionTraffic analysis

• DefenseClose/silence ports

Reference 4

Page 7: Web attacks

Probing (Reconnaissance)

• MethodSend packets to ports

• MotivationFind specific port

information

• DetectionTraffic analysis

• DefenseClose/silence ports

Page 8: Web attacks

Packet Sniffing (Reconnaissance)

• MethodCapture and analyze

packets traveling across a network interface

• MotivationGain access to information

traveling on the network

• DetectionNone

• DefenseUse encryption to

minimize cleartext on the network

Reference 5

Page 9: Web attacks

Topics of Discussion

Vulnerabilities– Backdoors– Code Exploits– Eavesdropping– Indirect Attacks– Social Engineering

Page 10: Web attacks

Backdoors (Vulnerabilities)

• Bypass normal means of authentication• Hidden from casual inspection• Installed separately or integrated into

software

Reference 6

Page 11: Web attacks

Code Exploits (Vulnerabilities)

• Use of poor coding practices left uncaught by testing

• Defense: In depth unit and integration testing

Page 12: Web attacks

Eavesdropping (Vulnerability)

• Data transmitted without encryption can be captured and read by parties other than the sender and receiver

• Defense: Use of strong cryptography to minimize cleartext on the network

Page 13: Web attacks

Indirect Attacks (Vulnerabilities)

• Internet users’ machines can be infected with zombies and made to perform attacks

• The puppet master is left undetected

• Defense: Train internet users to prevent zombies and penalize zombie owners

Page 14: Web attacks

Social Engineering (Vulnerability)

• Manipulate the weakest link of cybersecurity – the user – to gain access to otherwise prohibited resources

• Defense: Train personnel to resist the tactics of software engineering

Reference 7

Page 15: Web attacks

Topics of DiscussionAttacks

– Password Cracks– Web Attacks– Physical Attacks– Worms & Viruses– Logic Bomb– Buffer Overflow– Phishing– Bots, and Zombies– Spyware, Adware, and Malware– Hardware Keyloggers– Eavesdropping & Playback attacks– DDoS

Page 16: Web attacks

Password Cracks: Brute Force

• MethodTrying all combinations of

legal symbols as username/password pairs

• MotivationGain access to system

• DetectionFrequent attempts to

authenticate

• DefenseLockouts – temporary and

permanent

Reference 8

Page 17: Web attacks

Password Cracks: Dictionary Attack

• MethodTrying all entries in a

collection of strings

• MotivationGain access to system,

faster than brute force

• DetectionFrequent attempts to

authenticate

• Defense– Lockouts – temporary

and permanent – Complex passwords

Reference 8

Page 18: Web attacks

Password Cracks: Hybrid Attack

• MethodTrying all entries in a collection

of strings adding numbers and symbols concatenating them with each other and or numbers

• MotivationGain access to system, faster

than brute force, more likely than just dictionary attack

• DetectionFrequent attempts to

authenticate

• DefenseLockouts – temporary and

permanent

Reference 8

Page 19: Web attacks

Password Cracks: l0phtcrack

• MethodGain access to operating

system’s hash table and perform cracking remotely

• MotivationGain access to system,

cracking elsewhere – no lockouts

• DetectionDetecting reading of hash

table

• DefenseLimit access to system

Reference 8

Page 20: Web attacks

Web Attacks: Source Viewing

• MethodRead source code for

valuable information

• MotivationFind passwords or

commented out URL

• DetectionNone

• DefenseNone

Page 21: Web attacks

Web Attacks: URL Modification

• MethodManipulating URL to find

pages not normally accessible

• MotivationGain access to normally

private directories or pages

• DetectionCheck website URL logs

• DefenseAdd access requirements

Page 22: Web attacks

Web Attacks: Post Data

• MethodChange post data to get

desired results

• MotivationChange information being

sent in your favor

• DetectionNone

• DefenseVerify post data on

receiving end

Page 23: Web attacks

Web Attacks: Database Attack

• MethodSending dangerous queries

to database

• MotivationDenial of service

• DetectionCheck database for strange

records

• DefenseFilter database queries

Reference 9

Page 24: Web attacks

Web Attacks: Database Insertion

• MethodForm multiple queries to a

database through forms

• MotivationInsert information into a

table that might be unsafe

• DetectionCheck database logs

• DefenseFilter database queries,

make them quotesafe

Reference 9

Page 25: Web attacks

Web Attacks: Meta Data

• MethodUse meta characters to

make malicious input

• MotivationPossibly reveal script or

other useful information

• DetectionWebsite logs

• DefenseFilter input of meta

characters

Reference 10

Page 26: Web attacks

Physical Attack: Damage

• MethodAttack the computer with

an axe

• MotivationDisable the computer

• DetectionVideo Camera

• DefenseLocked doors and placed

security guards

Page 27: Web attacks

Physical Attack: Disconnect

• MethodInterrupt connection

between two elements of the network

• MotivationDisable the network

• DetectionPings

• DefenseLocked doors and placed

security guards

Page 28: Web attacks

Physical Attack: Reroute

• MethodPass network signal

through additional devices

• MotivationMonitor traffic or spoof a

portion of the network

• DetectionCamera

• DefenseLocked doors and placed

security guards

Page 29: Web attacks

Physical Attack: Spoof MAC & IP

• MethodIdentify MAC address of

target and replicate

• MotivationDeny target from receiving

traffic

• DetectionMonitoring ARP requests

and checking logs

• DefenseNone as of now

Page 30: Web attacks

Worms & Virus: File Infectors

• MethodInfects executables by

inserting itself into them

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 31: Web attacks

Worms & Virus: Partition-sector Infectors

• Method– Moves partition sector– Replaces with self– On boot executes and

calls original information

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 32: Web attacks

Worms & Virus: Boot-sector virus

• MethodReplaces boot loader, and

spreads to hard drive and floppies

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 33: Web attacks

Worms & Virus: Companion Virus

• MethodLocates executables and

mimics names, changing the extensions

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 34: Web attacks

Worms & Virus: Macro Virus

• MethodInfects documents, when

document is accessed, macro executes in application

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 35: Web attacks

Worms & Virus: Worms

• MethodReplicates

• MotivationVariable motivations

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 11

Page 36: Web attacks

Logic Bomb

• MethodDiscreetly install “time bomb”

and prevent detonation if necessary

• MotivationRevenge, synchronized attack,

securing get away

• DetectionStrange computer behavior

• Defense– Keep and monitor logs– Monitor computer systems

closely

Page 37: Web attacks

Buffer Overflow

• MethodPass too much information to

the buffer with poor checking

• MotivationModify to information and/or

execute arbitrary code

• DetectionLogs

• Defense– Check input size before

copying to buffer– Guard return address against

overwrite– Invalidate stack to execute

instructions

Reference 12 & 13

Page 38: Web attacks

Phishing

• MethodRequest information from a

mass audience, collect response from the gullible

• MotivationGain important information

• DetectionCareful examination of requests

for information

• DefenseDistribute on a need to know

basis

Page 39: Web attacks

Bots & Zombies

• MethodInstalled by virus or worm, allow

remote unreserved access to the system

• MotivationGain access to additional

resources, hiding your identity

• Detection– Network analysis– Virus scans– Notice unusual behavior

• DefenseInstall security patches and be

careful what you download

Page 40: Web attacks

Spyware, Adware, and Malware

• MethodInstalled either willingly by the

user via ActiveX or as part of a virus package

• Motivation– Gain information about the

user– Serve users advertisements

• Detection– Network analysis– Abnormal computer behavior

• DefenseVirus / adware / spyware /

malware scans

Page 41: Web attacks

Hardware Keyloggers

• MethodAttach it to a computer

• MotivationRecord user names,

passwords, and other private information

• DetectionCheck physical connections

• DefenseCameras and guards

Page 42: Web attacks

Eavesdropping

• Method– Record packets to the

network– Attempt to decrypt encrypted

packets

• MotivationGain access to user data

• DetectionNone

• DefenseStrong cryptography

Page 43: Web attacks

Playback Attack

• Method– Record packets to the

network– Resend packets without

decryption

• MotivationMimic legitimate commands

• DetectionNetwork analysis

• DefenseTime stamps

Page 44: Web attacks

DDoS: CPU attack

• MethodSend data that requires

cryptography to process

• MotivationOccupy the CPU preventing

normal operations

• DetectionNetwork analysis

• DefenseNone

Reference 14

Page 45: Web attacks

DDoS: Memory attack

• MethodSend data that requires the

allocation of memory

• MotivationTake up resources, crashing the

server when they are exhausted

• DetectionNetwork analysis

• DefenseNone

Reference 14