Web attacks

45
Attacks and Vulnerabili Vulnerabili ties ties

Transcript of Web attacks

Page 1: Web attacks

Attacks andVulnerabilitiesVulnerabilities

Page 2: Web attacks

Topics of Discussion

• ReconnaissanceGain information about a system

• VulnerabilitiesAttributes of a system that can be maliciously

exploited• Attacks

Procedures to exploit vulnerabilities

Reference 1

Page 3: Web attacks

Topics of Discussion

Reconnaissance – War Dialing– War Driving– Port Scanning– Probing– Packet Sniffing

Page 4: Web attacks

War Dialing (Reconnaissance)

• MethodDial a range of phone

numbers searching for modem

• MotivationLocate potential targets

• DetectionDetection impossible

outside of the telephony infrastructure

• DefenseDisconnect unessential

modems from outgoing phone lines

Reference 2

Page 5: Web attacks

War Driving (Reconnaissance)

• MethodSurveillance of wireless

signals in a region

• MotivationFind wireless traffic

• DetectionCan only be detected by

physical surveillance

• DefenseLimit geographic access to

wireless signal

Reference 3

Page 6: Web attacks

Port Scanning (Reconnaissance)

• MethodSend out a SYN packet,

check for response

• MotivationFind potential targets

• DetectionTraffic analysis

• DefenseClose/silence ports

Reference 4

Page 7: Web attacks

Probing (Reconnaissance)

• MethodSend packets to ports

• MotivationFind specific port

information

• DetectionTraffic analysis

• DefenseClose/silence ports

Page 8: Web attacks

Packet Sniffing (Reconnaissance)

• MethodCapture and analyze

packets traveling across a network interface

• MotivationGain access to information

traveling on the network

• DetectionNone

• DefenseUse encryption to

minimize cleartext on the network

Reference 5

Page 9: Web attacks

Topics of Discussion

Vulnerabilities– Backdoors– Code Exploits– Eavesdropping– Indirect Attacks– Social Engineering

Page 10: Web attacks

Backdoors (Vulnerabilities)

• Bypass normal means of authentication• Hidden from casual inspection• Installed separately or integrated into

software

Reference 6

Page 11: Web attacks

Code Exploits (Vulnerabilities)

• Use of poor coding practices left uncaught by testing

• Defense: In depth unit and integration testing

Page 12: Web attacks

Eavesdropping (Vulnerability)

• Data transmitted without encryption can be captured and read by parties other than the sender and receiver

• Defense: Use of strong cryptography to minimize cleartext on the network

Page 13: Web attacks

Indirect Attacks (Vulnerabilities)

• Internet users’ machines can be infected with zombies and made to perform attacks

• The puppet master is left undetected

• Defense: Train internet users to prevent zombies and penalize zombie owners

Page 14: Web attacks

Social Engineering (Vulnerability)

• Manipulate the weakest link of cybersecurity – the user – to gain access to otherwise prohibited resources

• Defense: Train personnel to resist the tactics of software engineering

Reference 7

Page 15: Web attacks

Topics of DiscussionAttacks

– Password Cracks– Web Attacks– Physical Attacks– Worms & Viruses– Logic Bomb– Buffer Overflow– Phishing– Bots, and Zombies– Spyware, Adware, and Malware– Hardware Keyloggers– Eavesdropping & Playback attacks– DDoS

Page 16: Web attacks

Password Cracks: Brute Force

• MethodTrying all combinations of

legal symbols as username/password pairs

• MotivationGain access to system

• DetectionFrequent attempts to

authenticate

• DefenseLockouts – temporary and

permanent

Reference 8

Page 17: Web attacks

Password Cracks: Dictionary Attack

• MethodTrying all entries in a

collection of strings

• MotivationGain access to system,

faster than brute force

• DetectionFrequent attempts to

authenticate

• Defense– Lockouts – temporary

and permanent – Complex passwords

Reference 8

Page 18: Web attacks

Password Cracks: Hybrid Attack

• MethodTrying all entries in a collection

of strings adding numbers and symbols concatenating them with each other and or numbers

• MotivationGain access to system, faster

than brute force, more likely than just dictionary attack

• DetectionFrequent attempts to

authenticate

• DefenseLockouts – temporary and

permanent

Reference 8

Page 19: Web attacks

Password Cracks: l0phtcrack

• MethodGain access to operating

system’s hash table and perform cracking remotely

• MotivationGain access to system,

cracking elsewhere – no lockouts

• DetectionDetecting reading of hash

table

• DefenseLimit access to system

Reference 8

Page 20: Web attacks

Web Attacks: Source Viewing

• MethodRead source code for

valuable information

• MotivationFind passwords or

commented out URL

• DetectionNone

• DefenseNone

Page 21: Web attacks

Web Attacks: URL Modification

• MethodManipulating URL to find

pages not normally accessible

• MotivationGain access to normally

private directories or pages

• DetectionCheck website URL logs

• DefenseAdd access requirements

Page 22: Web attacks

Web Attacks: Post Data

• MethodChange post data to get

desired results

• MotivationChange information being

sent in your favor

• DetectionNone

• DefenseVerify post data on

receiving end

Page 23: Web attacks

Web Attacks: Database Attack

• MethodSending dangerous queries

to database

• MotivationDenial of service

• DetectionCheck database for strange

records

• DefenseFilter database queries

Reference 9

Page 24: Web attacks

Web Attacks: Database Insertion

• MethodForm multiple queries to a

database through forms

• MotivationInsert information into a

table that might be unsafe

• DetectionCheck database logs

• DefenseFilter database queries,

make them quotesafe

Reference 9

Page 25: Web attacks

Web Attacks: Meta Data

• MethodUse meta characters to

make malicious input

• MotivationPossibly reveal script or

other useful information

• DetectionWebsite logs

• DefenseFilter input of meta

characters

Reference 10

Page 26: Web attacks

Physical Attack: Damage

• MethodAttack the computer with

an axe

• MotivationDisable the computer

• DetectionVideo Camera

• DefenseLocked doors and placed

security guards

Page 27: Web attacks

Physical Attack: Disconnect

• MethodInterrupt connection

between two elements of the network

• MotivationDisable the network

• DetectionPings

• DefenseLocked doors and placed

security guards

Page 28: Web attacks

Physical Attack: Reroute

• MethodPass network signal

through additional devices

• MotivationMonitor traffic or spoof a

portion of the network

• DetectionCamera

• DefenseLocked doors and placed

security guards

Page 29: Web attacks

Physical Attack: Spoof MAC & IP

• MethodIdentify MAC address of

target and replicate

• MotivationDeny target from receiving

traffic

• DetectionMonitoring ARP requests

and checking logs

• DefenseNone as of now

Page 30: Web attacks

Worms & Virus: File Infectors

• MethodInfects executables by

inserting itself into them

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 31: Web attacks

Worms & Virus: Partition-sector Infectors

• Method– Moves partition sector– Replaces with self– On boot executes and

calls original information

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 32: Web attacks

Worms & Virus: Boot-sector virus

• MethodReplaces boot loader, and

spreads to hard drive and floppies

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 33: Web attacks

Worms & Virus: Companion Virus

• MethodLocates executables and

mimics names, changing the extensions

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 34: Web attacks

Worms & Virus: Macro Virus

• MethodInfects documents, when

document is accessed, macro executes in application

• MotivationDamage files and spread

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 10

Page 35: Web attacks

Worms & Virus: Worms

• MethodReplicates

• MotivationVariable motivations

• DetectionVirus scan or strange

computer behavior

• DefenseAntivirus, being cautious

on the internet

Reference 11

Page 36: Web attacks

Logic Bomb

• MethodDiscreetly install “time bomb”

and prevent detonation if necessary

• MotivationRevenge, synchronized attack,

securing get away

• DetectionStrange computer behavior

• Defense– Keep and monitor logs– Monitor computer systems

closely

Page 37: Web attacks

Buffer Overflow

• MethodPass too much information to

the buffer with poor checking

• MotivationModify to information and/or

execute arbitrary code

• DetectionLogs

• Defense– Check input size before

copying to buffer– Guard return address against

overwrite– Invalidate stack to execute

instructions

Reference 12 & 13

Page 38: Web attacks

Phishing

• MethodRequest information from a

mass audience, collect response from the gullible

• MotivationGain important information

• DetectionCareful examination of requests

for information

• DefenseDistribute on a need to know

basis

Page 39: Web attacks

Bots & Zombies

• MethodInstalled by virus or worm, allow

remote unreserved access to the system

• MotivationGain access to additional

resources, hiding your identity

• Detection– Network analysis– Virus scans– Notice unusual behavior

• DefenseInstall security patches and be

careful what you download

Page 40: Web attacks

Spyware, Adware, and Malware

• MethodInstalled either willingly by the

user via ActiveX or as part of a virus package

• Motivation– Gain information about the

user– Serve users advertisements

• Detection– Network analysis– Abnormal computer behavior

• DefenseVirus / adware / spyware /

malware scans

Page 41: Web attacks

Hardware Keyloggers

• MethodAttach it to a computer

• MotivationRecord user names,

passwords, and other private information

• DetectionCheck physical connections

• DefenseCameras and guards

Page 42: Web attacks

Eavesdropping

• Method– Record packets to the

network– Attempt to decrypt encrypted

packets

• MotivationGain access to user data

• DetectionNone

• DefenseStrong cryptography

Page 43: Web attacks

Playback Attack

• Method– Record packets to the

network– Resend packets without

decryption

• MotivationMimic legitimate commands

• DetectionNetwork analysis

• DefenseTime stamps

Page 44: Web attacks

DDoS: CPU attack

• MethodSend data that requires

cryptography to process

• MotivationOccupy the CPU preventing

normal operations

• DetectionNetwork analysis

• DefenseNone

Reference 14

Page 45: Web attacks

DDoS: Memory attack

• MethodSend data that requires the

allocation of memory

• MotivationTake up resources, crashing the

server when they are exhausted

• DetectionNetwork analysis

• DefenseNone

Reference 14