Some Common Attack Vectors: Cyber Defense Overview
Some Common Attack Vectors: Cyber Defense Overview
John Franco
Electrical Engineering and Computer Science
Attack Vectors, Attack Surface, Threat Agents
Attack Vector:
A path or means by which an attacker can gain access to
a computer or network server in order to deliver a payload
or malicious outcome.
Attack vectors enable hackers to exploit system
vulnerabilities, including the human element. - techtarget.com
Attack Surface:
Points in a system or network that are exposed to attack
Threat Agent:
Individuals or groups that have an interest in executing an
attack. Knowing the likely threat agents allows an
organization to better protect its assets.
SQL Injection
Type:
attacker executes malicious SQL statements to control a web
application’s database server
attacker can bypass web app's authentication and have
complete access to a data base
History:
one of the oldest and most dangerous attacks
Operation:
SQL server directly includes user input within a SQL
statement
attacker alters, from outside, the query to bypass
authentication
SQL Injection
Example:
Server pseudocode for logging in a user in table users:
uname = request.POST['username']
passwd = request.POST['password']
sql = “SELECT id FROM users WHERE username=’” +
uname + “’ AND password=’” + passwd + “’”
database.execute(sql)
Note that attackers can also use XSS to defeat any automated
Cross Site Request Forgery (CSRF) defense the application
might employ.
Cross Site Scripting (XSS)
References:
Cross Site Request Forgery Cheat Sheet:
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet
Dali Lama website is/was a watering hole for you know who
http://www.pcmag.com/article2/0,2817,2423014,00.asp
Firesheep:
https://en.wikipedia.org/wiki/Firesheep
File Names
Type:
A user is fooled into executing a file that seems attractive or
benign but actually contains malware
Examples:
MS operating systems:
file.gif.exe
is seen as
file.gif
MS operating systems:
filefig.exe
appears as
fileexe.gif
if the unicode character U+202E is placed between file and
Fig in the first expression above
File Locations
Type:
A user runs malicious code thinking it is a trusted app
Example:
MS operating systems:
When an executable is called without a path, the OS first
looks in the current directory for that executable, then
looks elsewhere if it is not found.