0% found this document useful (0 votes)
106 views25 pages

Critical Knowledge: Summary Notes

This document provides an overview of common cyber threats and attacks. It discusses the CIA triad of confidentiality, integrity and availability. Various threat actors are covered such as nation states, cyber criminals, competitors and hacktivists. Specific attacks like zero-day vulnerabilities, social engineering, denial of service attacks, SYN floods, smurf/fraggle attacks and buffer overflows are explained. Countermeasures for many of these attacks are also outlined.

Uploaded by

E.G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views25 pages

Critical Knowledge: Summary Notes

This document provides an overview of common cyber threats and attacks. It discusses the CIA triad of confidentiality, integrity and availability. Various threat actors are covered such as nation states, cyber criminals, competitors and hacktivists. Specific attacks like zero-day vulnerabilities, social engineering, denial of service attacks, SYN floods, smurf/fraggle attacks and buffer overflows are explained. Countermeasures for many of these attacks are also outlined.

Uploaded by

E.G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Critical Knowledge ™

SUMMARY NOTES

UNIT 2:
THREATS & ATTACKS
2.1 CIA, Risk and Threats

CIA Triad

• Confidentiality – Keeping secret things secret, limiting access to information,


maintaining privacy
• Integrity – Ensuring data doesn’t change in unexpected ways, preventing
unauthorized users from manipulating data
• Availability – Ensuring resources are available when needed; access ≠ availability

Threats Overview

• Risk Cycle

Assets

Safeguards Threats

Risk Vulnerabilities

Exposure

• As a security practitioner, the best way you can protect your organization is to focus
on vulnerabilities

Threat Actors and Vectors

Threat Actors – Who is behind cyberattacks?


• Nation State Actors – most sophisticated, government sponsored, have access to
vast resources

• Cyber Criminals – financially motivated, sophisticated, seeking PII and access to


financial accounts

• Competitors – financially motivated, seeking competitive advantage and trade


secrets

• Hacktivists – response to perceived injustice, vigilantism, focused on political action

• Script Kiddies – novice hackers, use hackers’ sophisticated code, can cause damage

• Insider Threats – unique threat, within organization, recruited by nation states and
competitors

Zero-Day Vulnerability Overview

Zero-Day – previously unknown vulnerabilities that are still “in the wild” and operate in new,
unique ways

• Unaddressed vulnerabilities mean unaddressed risk


• Have long detection times (according to Symantec, an average of 312 days to
discovery)
• Few opportunities to prevent or detect these attacks
• Zero-day detection technologies (expensive) can help mitigate risk

Spectre/Meltdown

• Long-term existing flaws created security vulnerabilities on certain Intel processors


which allowed attackers to gain kernel access
• Gave unauthorized access to program data, including passwords, emails, and text
files
• This vulnerability was unaddressed for decades

Sony Pictures Data Breach of 2014

• Combination of social engineering and a zero-day exploit


2.2 Social Engineering

Social Engineering Overview

• Focuses on human weakness, designed to manipulate people to give out sensitive


information
• Reasons for effectiveness:
o Authority – an attacker pretends to be a superior requesting information
o Trust – building trust over time, impersonating a trusted person
o Urgency – requests an immediate response for action

Phishing Attacks

• Phishing is the most common (and effective) form of social engineering with many
variations;
o Phishing – mass emails designed to mimic legitimate sources (e.g.
password reset requests, HR requests, accounting information, etc.)
o Spear-Phishing – custom phishing attacks tailored to high-powered
targets (e.g. the Podesta email leaks)
o Whaling – phishing that targets upper management/C-suite executives
o Vishing – phone- or voice/VoIP-based phishing
o Smishing – SMS/text-based phishing campaigns

Social Engineering Techniques

• Social manipulation is used to gain physical access or to acquire sensitive or


personally indefinable information (PII)

o Tailgating – following a person to gain unauthorized access (e.g. asking


someone to open a door to a restricted area)
o Shoulder surfing – looking over someone’s shoulder to see their screen
o Dumpster diving – finding sensitive information in corporate garbage

Social Engineering Countermeasures

• Countermeasures:
o Mantraps prevent tailgating
o Screen protectors prevent shoulder surfing
o Secure shredding prevents dumpster diving
o Educating employees on known attack methods helps prevent all forms of
social engineering
2.3 DoS Attacks

DoS Attack Overview

DoS – Denial of Service attack

• Designed to force resources and victims offline by overloading servers with traffic,
disrupting services, or preventing normal online operations
• Does not attempt to steal or manipulate data
• Harms availability
• Attack source is a single machine

DDoS – Distributed Denial of Service attack

• Similar to a DoS attack, but uses multiple machines or “botnets” to flood a target
resource with traffic
• Botnets are robotic networks of infected machines that an attacker controls via a
Command and Control (C&C or C2) server
• Self-propagating malware turns the victim’s machine into a tool (bot) to launch
attacks without the user’s knowledge

TCP and UDP Overview

TCP – Operates at the Transport Layer

• Connection oriented
• Reliable, allows for retransmission
• Ensures against packet loss
• Commonly used for email (SMTP) or file transfer (FTP)
• Slower than UDP

UDP – Operates at the Transport Layer

• Connectionless
• Unreliable, doesn’t allow for retransmission
• Cannot ensure against packet loss
• Commonly used for broadcast (one → many) media streaming and voice streaming
• Faster than TCP

TCP Three-Way-Handshake

The three-way handshake is what makes TCP reliable. The final step, ACK, means
guaranteed packet delivery.

• Step One (SYN) – the initiating computer sends a packet with the SYN flag, indicating
the desire to create a connection (“Hey, do you want to talk?”)
• Step Two (SYN/ACK) – the receiving host acknowledges receiving the packet and
responds, indicating a willingness to create a connection by sending back a packet
with both the SYN and ACK flags (“I got your message, yes I want to talk!”)
• Step Three (ACK) – the original host acknowledges the connection process is
complete by sending a final packet with the ACK flag set (“OK, I got your message,
let’s talk!”)
• The application only begins to transfer data after the handshake is complete

SYN Flood Attack

A type of denial-of-service (DoS) attack in which an attacker sends a succession of SYN


requests to a system to consume enough server resources to offline the system

• A malicious client spoofs the source IP address in the SYN, causing the server to send
the SYN-ACK to a falsified IP address
• The ACK is never received because the false IP "thinks" that it never sent a SYN
• The connections are now “half-open” and gradually consume more server resources
• This eventually renders the server unresponsive, preventing legitimate access

Countermeasures

• Filtering traffic
• Reducing the SYN-RECEIVED timer
• Recycling the oldest half-open TCP connection
• Enabling SYN cache and SYN cookies
• Configuring firewalls and proxies

Smurf and Fraggle Attacks

Internet Control Messaging Protocol (ICMP) – Used for network troubleshooting,


determining error messages, and evaluating overall network health. PING and TRACEROUTE
are common tools used within this protocol

Ping – software utility used to test the reachability of a host on a network

• Ping measures the round-trip time for messages sent from the host to a destination
computer that are “echoed” back to the source
• Echo request packets are sent to the target host and wait for an ICMP echo reply
• The utility reports errors, packet loss, and a statistical summary of the results

ICMP Broadcast Address – IP address that forwards a copy of the message to all hosts on
the network

Smurf Attack

• Type of DoS attack that sends large numbers of ICMP echo requests to an ICMP
broadcast address
• This request gets forwarded to all hosts on the network
• The attacker then spoofs the victim’s source IP
• The hosts then respond with an echo reply
• These replies, or "echoes," are then sent back to the spoofed source IP (setting up an
infinite loop), flooding the victim’s computer with traffic and eventually offlining it

Fraggle Attack
• Fraggle attacks work exactly the same as smurf attacks, but exploit the UDP protocol
rather than the ICMP protocol

Countermeasures

• Make sure to block directed broadcast traffic coming into the network
• Configure hosts and routers not to respond to ICMP echo requests

MTU – Maximum Transmission Unit – largest single data packet that can be communicated
in a single network layer transaction

Fragmentation – fragmentation is used when data packets must be broken down into
smaller pieces to accommodate the MTU

Teardrop Attack

A type of DoS attack in which an attacker sends fragmented packets to a target machine

• The attacker exploits the fragment offset field in the IP header to produce corrupted
fragments which are then delivered to the target machine
• The target machine cannot reassemble these packets
• The packets overlap one another, eventually crashing the target

Countermeasures

• Modern networking devices (routers or secure proxies) can be employed to inspect


incoming packets for violations of fragmentation rules

Buffer Overflow Attack

Takes advantage of a coding error where a program. While writing data to a buffer, overruns
the buffer's boundary and overwrites adjacent memory locations. This can be exploited to
alter the execution path of the application. The resulting malicious extra data contains code
used to gain unauthorized access.

• Buffer – An allocation in memory designed to hold a finite amount of data in memory


• Buffer Overflow – occurs when executing code requires more memory than is
allocated by the buffer. By exceeding the buffer limit, malicious code can be
executed.

Example – Morris Worm

• One of the earliest computer worms distributed via the internet (1988)
• It was the first felony conviction in the United States under the 1986 Computer Fraud
and Abuse Act
• It functioned by exploiting known vulnerabilities in Unix sendmail, finger, and
rsh/rexec, as well as weak passwords

DNS/NTP Amplification Attacks

DNS – DDoS attack that leverages open DNS resolvers to overwhelm a target with an
amplified amount of traffic

• Attacker sends UDP packets with spoofed IP addresses to a DNS recursor. The
spoofed address on the packets points to the real IP address of the victim.
• The UDP packets make a request to a DNS resolver using an “ANY” query in order to
receive a large response
• After receiving the requests, the DNS resolver sends a large response to the spoofed
IP address.
• The IP address of the target receives the response and becomes overwhelmed with
traffic, resulting in a denial of service.

NTP (Network Time Protocol) – exploits an NTP server to overwhelm a targeted server with
an amplified amount of UDP traffic

• The attacker uses a botnet to send UDP packets with spoofed IP addresses to a NTP
server that has its “monlist” command enabled (command used to monitor which
hosts have connected).
• The spoofed IP address on the packets points to the real IP address of the victim.
• Each UDP packet makes a request to the NTP server using its monlist command,
resulting in a large response.
• The server then responds to the spoofed address with the resulting data – a very
large amount of packets.
• The IP address of the target receives the response and becomes overwhelmed with
traffic, resulting in a denial-of-service.

DDoS Attacks – Famous example is the Mirai malware attack on DNS infrastructure in 2016

• Mirai infection on Dyn servers (major DNS service provider) brought down major
websites like GitHub, Twitter, Reddit, Netflix, and Airbnb
• Mirai targeted consumer IoT devices, like IP cameras and home routers
• Connected via ports 22 and 23 (Telnet)
• Used a dictionary attack (password guessing)
• After infection, Mirai would kill Telnet, SSH, and HTTP processes, preventing
legitimate users from accessing to the device
• Infected devices were used to launch various DDoS attacks such as SYN floods, HTTP
floods, and GRE floods

DoS/DDoS Attack Countermeasures Summary

• General DoS/DDoS – use filtering to verify source IP address


• Smurf/Fraggle – Disable directed broadcast and block ICMP at the firewall level
• Teardrop – update older systems, employ security devices to automatically drop
malformed packets
• NTP Amplification – disable monlist requests
• DNS Amplification – correct server configuration to ignore ANY queries
• Buffer Overflow – practice secure coding, use vulnerability scanning tools, strive to
use coding languages that do not require direct access to memory, include canary
words to protect direct memory
• SYN Flood – use a flood guard, often used on routers and firewalls that drops
connections from dangerous (half-open) traffic patterns
2.4 Spoofing Attacks

Spoofing Overview and IP Spoofing

Spoofing – unauthorized access using a false identity

• Methods – IP, MAC address, credentials, SSIDs, email


• Types – IP spoofing, DNS spoofing, ARP spoofing

Internet Protocol (IP) Overview

• Uses TCP/IP protocol, packet headers provide crucial information


• Two versions: IPv4 and IPv6
• Vulnerabilities – Authentication is limited to IP, IP host, and MAC address; header
fields can be forged

IP Spoofing

IP Spoofing – Falsifies the source address to bypass firewalls, gather sensitive information,
and stage further attacks

• Can be used to craft MITM, session hijacking, and DoS attacks


• Security Risks – bypasses authentication mechanisms
• Countermeasures – Use packet filtering, drop packets with source mismatch,
eliminate trust relationships, implement IPv6, implement IPSec, use encryption, and
monitor network traffic

DNS Spoofing

DNS Spoofing – Intercepts a legitimate DNS request by spoofing a DNS server’s IP address

• Security Risks – DNS protocol was not designed to be secure, only resolves domain
names to IP addresses, and lacks encryption
• Spoofed DNS servers are used to intercept traffic while still resolving the address,
leaving the victim unaware of the threat
o This type of attack is often employed to steal data
• Cache Poisoning – replacing the DNS cache with incorrect mapping,
o Attacker responds to DNS query with fake IP address
o Fake address redirects the target to a malicious site, then forwards the query
to a legitimate site

Spoofing Countermeasures

• Resolve DNS queries to local servers


• Block DNS requests to external servers
• Implement DNSSEC
• Use solutions such as DNS firewall, passive DNS, and IDS/IPS software such as
SNORT
• Set short TTL (allows for cache clearing and detects spoofing attempts), and clear all
local machines and network settings
2.5 Injection Attacks
Injection Attack Overview

• Most users interact with databases through web applications


• Attackers inject malicious code or script to gain access to backend databases
• The most common attack locations are input fields, such as URLs or web forms
• Malicious inputs are passed by the web application to the backend database
• Attacker bypasses authentication to steal or modify data

Open Web Application Security Project (OWASP)

A non-profit organization that publishes research and guidelines for web application
security

• Publishes Top Ten list of application security risks


• Injection attacks routinely make the list

Cross-Site Scripting (XSS) Attacks

An injection attack where malicious scripts are injected into trusted websites

• XSS attacks occur when an attacker uses a web application to send malicious code,
usually a browser-side script, to an unsuspecting end user
• XSS script can access sensitive information, such as session cookies and tokens
• XSS script can also deface websites and redirect users to malicious sites
• Top 10 OWASP attack, very common security vulnerability

XSS Types

• Reflected Input – occurs when custom script (such as HTML) can be run in a standard
input field (name, address, etc.) to execute malicious code
o Non-persistent (not saved on the server)
o Web application passes malicious input to backend/client
• Persistent Input – occurs when the data provided by the attacker is saved by the
server, and then permanently displayed on "normal" pages
o More dangerous than reflected input and can do more damage

Example – In 2018, British Airways lost the personal information of 380,000 customers,
including credit card payment information, via a XSS attack

• Attack injected malicious script into online payment forms in vulnerable web apps
• Worked similar to a credit card skimmer
• Once the customer clicked the “submission” button, the captured information was
forwarded to the attacker’s server

Email Header Injection Attack

• Also known as an SMTP injection


• Common injection attack that occurs in email headers
• Attackers abuse input fields by spoofing email addresses (source or destination)
• This can then be used to pass on bad information or redirect field input information
to a site that the attacker controls

LDAP Injection Attack

• Lightweight Directory Access Protocol (LDAP) – queries a central repository of


authentication information, and is used to store authentication information across
multiple devices (used as part of SSO)
• LDAP attack finds sensitive user information and/or modifies information in the
LDAP data stores
• Malicious LDAP queries are used to escalate privileges, bypass authentication, or
steal sensitive user data

SQL Injection Attack

• Malicious input that allows attacker to manipulate SQL database


• Allows attacker to bypass authentication, modify data, and drop database tables
• By creating true conditions in fields, authentication can be bypassed

Injection Attack Countermeasures

Input Validation

• Blacklisting – block known risky characters


• Whitelisting – only allow certain kinds of characters/inputs
• Data Sanitization – takes input as plaintext, meaning raw data is never read as
code/commands

Error Handling

• Keep error information generic to avoid giving specific information to attackers

Permissions

• Implement principle of least privilege and limit access of web applications to prevent
escalation of privileges
2.6 Session Hijacking
Session Hijacking Overview

• Exploitation of a valid session to bypass authentication


• Session ID – unique identifier assigned for each session
• Hijacking can occur at both the network level and application level

Process

• Attacker takes over valid session


• Attacker establishes a separate session
• Web server continues communication with attacker

Security Risks

• Hijacked sessions can be used to launch other attacks


• Spoofing / Theft of sensitive information

Methods

• Physical Access – stealing files with session ID info


• Guessing – looking for session IDs
• Brute force – most resource-intensive way to guess session IDs
• Interception – tricking the victim into thinking the attacker is the real server
• Cookies – using existing web cookies to access a web session (user has not properly
disconnected)
Active vs Passive

• Active – Tearing down the connection while in progress


o Attacker interacts with victim or target
o Man in the middle (MiTM) is a classic example
• Passive – Use of sniffers
o Attacker does not interact with victim or target
o Eavesdrops to steal info that is used to create a later session

Application Level

• Exploits HTTP user sessions, new unauthorized sessions, web application


vulnerabilities
• Types of Attacks – sniffing, prediction, session fixation

Network Level

• Captures TCP/UDP session packets, no need for session modification, focused on


protocol and data flow
• Types of Attacks – TCP/IP hijacking, UDP hijacking

o TCP/IP – Victim sends data packet > server responds with SEQ# and ACK# >
Attacker predicts SEQ# and connects with server
o UDP – Victim sends UDP request > server sends UDP response > attacker
forges a reply to the victim (MITM type; simpler attack than TCP/IP)
MiTM Attack

• An attacker positions himself between a user and an application, either to eavesdrop


or to impersonate one of the parties
• Versatile, simple, and often used as a precursor to more sophisticated attacks

Process

• Communication between A&B


• Attack inserts between communication
• Breaks session between A&B and creates two sessions
• Attacker intercepts all traffic between A&B

Methods

• ARP poisoning
• Exploitation of vulnerabilities in various protocols: ICMP, DNS, DHCP, SSL, and
wireless
• MiTM attacks can be used for spoofing, altering data, hijacking, or eavesdropping
• Often part of more complex attacks used to steal sensitive information or conduct
illicit transfers

Countermeasures

• Encryption and authentication

Sequence Number Guessing

• Predicts the sequence number that identifies the packets in a TCP connection, which
can be used to counterfeit packets

Process

• User connects with server


• Attacker sniffs the session
• Attacker predicts SEQ#
• Attacker then injects commands into the session and floods the target
• Intercepting valid user and desynchronizing the session
• Server continues communicating with the attacker

Countermeasures

• Proper router / firewall configuration


• Drop or block packets that originate from outside the network

ARP Overview

Address Resolution Protocol


• Used to map IP addresses (logical) of machines to their MAC addresses (physical)
• ARP cache – Lists the ARP entries saved to the device
• Allows network devices to discover each other
• Works with DNS to allow interoperability

ARP Poisoning Attack

• A technique by which an attacker sends (spoofed) ARP messages onto a local area
network
• ARP spoofing and ARP poisoning are two parts of a single attack
• ARP spoofing – forging ARP packets to link an attacker’s MAC address with the IP
address of a legitimate computer or server on the network

o ARP request for MAC address is sent


o Real response is sent
o Attacker sends forged ARP response packet with attacker’s MAC address
o Forged ARP response is received
• ARP Poisoning
o Attacker crafts forged ARP responses
o Attacker floods target device (switch) with forged packets
o Switch’s ARP table is overwritten with the attacker’s MAC address
o Once ARP table is flooded, switch is set to forwarding mode
o Attacker can now intercept all ARP data

Cross-Site Request Forgery (CSRF) Attack

• Forces user to execute unwanted actions on a web application in which they’re


authenticated
• CSRF attacks focus on website data stored in user’s browser

Process

• User logs into a trusted site (i.e. bank)


• Session cookie is stored
• Attacker creates malicious website
• Malicious code is saved
• “Valid request” (controlled by attacker) is sent to trusted site (bank)
• Transfer of funds is complete

Countermeasures

• Identify code vulnerabilities – session cookies, unique identifiers, business logic,


HTTP request validation
• Assure that each form or link contains a unique ID, authenticate each unique ID, and
force termination

Session Hijacking Countermeasures

Detection Methods

• Manual – packet analysis, identifying suspicious or abnormal traffic


• Automatic – IDS (intrusion detection system) and IPS (intrusion prevention system)

Encryption

• Use SSH and HTTPS


• Encrypt data in transit (especially proprietary or sensitive data)
• Use long and random session keys

Authentication

• Implement strong authentication (e.g. Kerberos)


• Generate session ID after authentication
• RE-AUTHENTICATE
• Set a logout time

Operations

• Update and patch all devices


• Configure gateway devices to prevent spoofing and use IPS / IDS
• Do not use vulnerable network devices such as hubs

Judgment

• Properly train staff to avoid human error


2.7 Malware Types

Malware Overview

Malware – malicious software installed with or without the user’s knowledge, used to cause
damage, bypass authentication, and steal assets

• Logic Bombs – malicious code hidden in programs that execute when certain
conditions are met (e.g. Sony BMG CD malware)
o Often installed by insiders

• Backdoor – a method to gain accessing via bypassing authentication and normal


security procedures
o Backdoors can be installed for legitimate reasons by programmers to conduct
maintenance/debugging or to accelerate workflows
o Backdoors allow for administrative privileges with no authentication

Virus Overview

Virus – malicious code that attaches itself to legitimate applications to cause harm; spreads
through user actions

Virus Types

• Master Boot Record – instructs host machine to boot virus before OS, which targets
executables
• Multipartite – 1+ propagation techniques
• Stealth – Intercepts requests
• Polymorphic – Code mutates but algorithm remains the same
• Encrypted – new key for each file, antivirus scanners cannot detect
• Cluster – modifies directory table, points users to virus code instead of normal
programs
• Metamorphic – similar to polymorphic virus, but virus rewrites itself completely
• Cavity – overwrites the host file while maintaining original file size

Trojan Overview

Trojans

• Malware that is often disguised as legitimate software


• Used to gain unauthorized access, delete/replace critical files, disable firewalls,
generate fake traffic, create backdoors, etc.
• Requires human interaction to propagate

Trojan Types

• Command Shell – remote control of CS


• Defacement – view, edit, replace images
• Botnet – used to create and propagate bots
• FTP – opens FTP ports
• Remote Access – controls GUI access
• E-banking – most commonly used by criminals to intercept account info
• Destructive – used to format drives and make OS inoperable
• Mobile – targets mobile devices, often used as part of botnets
• IoT – often used for botnets to carry out DDoS attacks
• Security Software Disabler – used to disable firewalls, antivirus, etc.

Worms Overview

• Standalone malware that replicates itself in order to spread to other computers


• Worms differ from viruses in that they do not require human interaction to propagate
• Worms are designed purely for destructive purposes, i.e. payload damage
• Take advantage of transport systems to replicate and spread

Stuxnet case study

• Alleged joint US/Israeli cyberweapon discovered in 2010


• Targeted SCADA systems and PLCs used to control industrial machinery
• Destroyed centrifuges at the Natanz nuclear facility in Iran
• Spread initially via infected USB (to clear airgapped facilities)
• Upon finding vulnerable PLCs, Stuxnet would automatically update itself
• After infecting host PLCs, Stuxnet would force a change in the centrifuge speed
• Infected PLCs would send back false feedback
• Centrifuges would burn out and become inoperable while monitoring systems
showed no abnormal conditions

Ransomware Overview

Malware that encrypts computer system or data until a ransom is paid

• Attacker holds decryption key


• Often spread via a Trojan or delivered by email
• Payload is run, encrypting the victim’s data
• Message is sent to victim (ransom note)

WannaCry Case Study

• Cryptoworm that targeted Windows computers in 2017


• Propagation – spread through email attachments, self-spread after download
• Took advantage of Windows SMD (server message block)
• If no “kill swtich” domain, data was encrypted
• Ransom in bitcoin
• Used RSA and AES encryption

Spyware Overview

• Malware designed to steal internet usage data and sensitive information


• Passively monitors and collects data
• Hides processes, files, etc. from user
• Propagation – Drive-by-download, often via fake “antispyware” programs, Web
browser exploits, piggyback software, browser add-ons, cookies

Types of Spyware

• Keyloggers – record keystrokes to gain confidential information


• Legitimate uses – employee monitoring/safety monitoring for children
• Hardware – PC/BIOS, keyboard, external logger
• Software – Application, kernel, hypervisor, formjacking

Malware Countermeasures

• Update and maintain antivirus/antimalware solutions


• Maintain backups
• Conduct regular scans
• Harden systems
• Analyze baseline normal traffic
• Increase training and awareness
2.8 Authentication Attacks
Authentication and Replay Attacks

Allows attacker to guess a person’s user name, password, or cryptographic key by using an
automated process of trial and error

Key Terms

• Identity – Who you say you are


• Authentication – Validation of identity
• Authorization – Verification of clearance to access resources

Hashing – transforming a string of text into a usually shorter fixed-length value or key that
represents the original string

• Used to verify integrity of data


• One-way function: Sender > Hash Value > Receiver
• Used for password storage
• Salting: random data used as an additional input to a one-way function (hash) used
to safeguard passwords in storage

Replay Attacks – attack in which a valid data transmission is maliciously or fraudulently


repeated or delayed

• Resends and/or delays packets


• Bypasses authentication
• Reroutes communications
• Often used with financial data

Countermeasures

• Use of one-time passwords


• Multi-factor authentication
• Use of timestamps

Password Cracking Techniques

• Recovers passwords from data that have been stored in or transmitted by a


computer system

Methods

• Social Engineering – dumpster diving, shoulder surfing, reconnaissance


• Active attacks – Direct communication/interaction attacks
o Brute force
▪ Attempts all combinations to crack password
▪ Time- and resource-intensive
o Dictionary attacks
▪ Attempts a list of all possible passwords
▪ Mostly automated
▪ Used with a cracking application
▪ Translated to hashes
• Passive attacks – No direct communication/interaction: sniffing, MiTM, replay
attacks
• Offline attacks – Rainbow table attack
o Database of precomputed hashes
o Captures hashes of passwords and compares

Countermeasures

• Long, complex passwords


• Use alphabetical characters, numbers, and symbols
• Salt passwords

Cryptographic Attacks

• Key Terms
o Cipher – algorithm that encrypts the data
o Key – bit string used to decrypt data
o Plaintext – text readable by human eyes
o Ciphertext – text encrypted by the algorithm
• Process – Plaintext + Cipher + Key = Ciphertext
• Attack Types
o Known plaintext – by knowing the plaintext message and parts of the
ciphertext, the cryptographic key can be discovered
o Chosen ciphertext – attacker compares parts of the ciphertext and the
plaintext to discover the key
o Chosen plaintext – attacker creates a plaintext message, runs it through an
algorithm, then analyzes the result to discover the key

Countermeasures

• Implement strong cryptographic systems


• Use long keys
• Use one-time pads

Password Attack Countermeasures

• Use long passwords


• Salt passwords
• Password history control, i.e. mandate password rotation/changes
• Encrypt hashes
• Monitor logs
• Use multifactor authentication
• Keep systems updated and patched
2.9 Mobile, IoT, and Cloud Attacks
Attacks on Mobile Devices

Mobile devices (smartphones, smartwatches, tablets, etc.) represent a wide attack


surface for malicious actors

• Data leakage – Apps leak confidential data or other PII


• Insecure data storage – Apps and malware access mobile device storage
• Unsecure Wi-Fi – Allows attackers to sniff data, gain login credentials, etc.
• Poor Authentication/Authorization – Allows unauthorized access or escalation of
privileges
• Broken Cryptography – Apps use weak or easily crackable cryptography
• Insufficient Transport Protection – Lack of SSL/TLS implementation
• Improper Session Handling – Accidental sharing of tokens with attackers

Countermeasures

• Anti-malware software
• Multifactor authentication
• Secure gateways
• Limit use of third-party, non-vetted software

Attacks on IoT Devices

• Attack categories: Healthcare (sensors, measuring devices), industrial (controllers for


SCADA systems), personal (wearables, watches), home (smartlights, garage doors)
• Process – Devices use IoT gateways to communicate with cloud servers/internet
(usually via applications)
o This presents a very wide range of vulnerabilities to IoT devices
• Vulnerabilities – No account lockout mechanism, lack of two-factor authentication,
weak password rules, open UPnP ports, lack of privacy, lack of encryption via update
servers

Attacks

o Botnets – IoT devices (via a Trojan) can easily propagate botnets and quickly
overload targeted servers (DDoS)
o HVAC/ICS – Industrial control systems are especially susceptible, and once
cracked allow for privilege escalation
o Rolling Code – most modern keyfobs (automobiles) are IoT enabled
▪ RF signal sent to car via keyfob
▪ Attacker intercepts signal (using a jammer)
▪ By sniffing this signal attacker gains access to code 1
▪ Victim resends signal to car and attacker gains access to code 2
▪ Attacker forwards code 1, unlocking car, and saves code 2 for later date

Attacks on Cloud and Virtual Machines

• Cloud Overview – advantages of cloud services include reduced server costs,


increased efficiency, and redundancy
• Managed by cloud service provider (CSP)
• Unlike on-premises resources, which are managed by a company or organization,
cloud resources are shared

Cloud Service Types

• IaaS – (infrastructure as a service) usually a suite of services, VMs, different APIs


(Amazon EC2, Windows Skydrive)
• PaaS – (platform as a service) cloud service provides development tools,
configuration management suite, and deployment platforms (Google App Engine,
Azure)
• SaaS – (software as a service) a software provided on the cloud (i.e. google docs)

Cloud Categories

• Public – open to anyone


• Private – one to one, owned by company or corporation
• Community – more than one company/organization joined to achieve greater
services
• Hybrid – a combination of two or more of the above cloud types

Threats

• Data Breaches – Lost CSP data cannot be retrieved


• Insecure API – Can circumvent security policies enforced by your organization
• Shared Tech – Shared resources (i.e. GPU) can be exposed to attackers
• Unknown Risk Profile – Clients lack full ownership/control of backend hardware
• Hardware Failure – Damage to datacenters means irretrievable losses for clients
• Management Interface – Attackers can take advantage of vulnerabilities present
between clients and resources (via remote access)
• Authentication Attacks – Single point of failure to gain access to large amount of
company/organization resources

Attacks

• Social Engineering – obtaining login credentials to access resources managed by CSP


• Session Hijacking – XSS, net sniffing, session riding
• DNS Attacks – DNS cache poisoning, spoofing
• SQL Injection Attacks – Manipulation or erasure of confidential data
• Wrapping Attacks – Manipulation of XML format to gain unauthorized access
• Side Channel Attacks – Attacker runs parallel VM on target machine to gain
unauthorized access to data managed by CSP
• DoS/DDoS Attacks – Attempt to limit resources and disrupt availability to client

Countermeasures

• SLA (service level agreements) – a clear and defined SLA is crucial for cloud security
• Tailored services – security defined to your organizational needs
• DRP (disaster recovery plan) – clear outline to maintain business operations should a
datacenter go down in a disaster
• Data encryption – ensure that CSP provides encryption services
• Transport encryption – ensure CSP provides end-to-end security with data in transit
• Load Balancing – to prevent downtime from DDoS attacks
• Data Backups – should be part of DRP, and not wholly reliant upon CSP
• Strong Authentication – implement least privilege and need to know practices
• Robust Logging and Monitoring – ensure auditing capabilities are provided by CSP

You might also like