SOCExperts - NetworkBasedAttacks 210725 204653
SOCExperts - NetworkBasedAttacks 210725 204653
Network-based attacks are attacks designed to compromise network security by either eavesdropping on or intercepting and
manipulating network traffic. These may be active attacks, wherein the hacker manipulates network activity in real-time; or
passive attacks, wherein the attacker sees network activity but does not attempt to modify it.
5. Smurf Attack
7. Spoofing
DOS Attack
making it inaccessible to its intended users. DOS attacks accomplish this by flooding the
targeted system. Usually DDOS are result of multiple compromised systems (called Botnet’s)
2. These networks consist of computers and other devices (such as IOT devices)which have been infected with malware,
allowing them to be controlled remotely by an attacker. These individual devices are referred to as bots (or zombies),
3. Once a botnet has been established, the attacker is able to direct an attack by sending remote instructions to each bot.
4. When a victim’s server or network is targeted by the botnet, each bot sends requests to the target’s IP address, potentially
causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic. Because each bot
is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.
How Botnet are used in DDOS
1. Attackers can use flaws or malware to install C2 software on user’s systems to create a botnet
2. Once the botnet is ready, the attackers send the start command to all their botnet nodes.
3. The botnet will then send its programmed requests to the target server
4. If the attack makes it past the outer defenses, it quickly overwhelms most systems.
5. It usually causes service outages, and in some cases, crashes the server.
Ping flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down
a victim’s computer by overwhelming it with ICMP echo requests, also known as pings.
The attack involves flooding the victim’s network with request packets, knowing that
Mitigations:
SYN Flood attack is a type of DOS attack where it exploits the normal TCP three-way handshake.
The attacker send huge connection requests (SYN) but never sends an acknowledge back to the sever. This will make the server
wait for certain time and hold the connection. This will consume all the concurrent connections on the target server making it
Mitigations:
server with Internet Control Message Protocol (ICMP) packets. By making requests with the spoofed IP address of
the targeted device to one or more computer networks, the computer networks then respond to the targeted server,
amplifying the initial attack traffic and potentially overwhelming the target, rendering it inaccessible.
Mitigations:
Man-in-the-Middle is an attack where the attacker secretly relays and possibly alters the communications between two parties
who believe that they are directly communicating with each other.
A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user
and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of
information is underway.
The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets
are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is
required.
Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or
information. Spoofing can happen through websites, emails, phone calls, texts, IP addresses and servers.
These attacks are carried out when someone(or something) try to introduce himself as another person (or another object), this
Usually, the main goal of spoofing is to access personal information, steal money, bypass network access controls or spread
malware through infected attachments or links. With every form of communication online, scammers will try to use spoofing to
Mitigations:
ARP (Address Resolution Protocol) translates between the physical address of an Internet device (MAC address – media access
control) and the IP address assigned to it on the local area network. An attacker who uses ARP spoofing tries to inject false
information onto the local area network to redirect connections to their device.
ARP poisoning is when an attacker sends falsified ARP messages over a local area network (LAN) to link an attacker's MAC
Mitigations:
Domain Name System (DNS) spoofing is a technique that tricks a user to a bogus website rather than the real one
the user intends to visit. The website will appear to be the real one and you may think you’re visiting a safe, trusted
website when you’re actually interacting with a fraudster. The attacker’s goal is to divert traffic from the real site or
Sniffing corresponds to theft or interception of data by capturing the network traffic when it flows through a
computer network.
A sniffing attack involves an attacker getting into the network data-stream and reading, monitoring or
capturing full packets of data flowing between a client and a server. A hacker intercepting a network
packet containing unencrypted information can cause severe damage to the organization or entity that
owns the data.
Data compromised may include sensitive information like account credentials, bank details, and different
kinds of Personally Identifiable Information (PII). Sniffing attacks can either be active (involving both data
access and manipulation) or passive (where the attacker only sees the information but does not actively
interfere in its transmission).
Examples of tools used for sniffing attacks are Wireshark, tcpdump, dSniff and Debookee.
Mitigations:
Visit the below link to know more about Password Sniffing using Wireshark
https://www.guru99.com/wireshark-passwords-sniffer.html