Ethical Hacking Associate Information Security Threats Attacks
Ethical Hacking Associate Information Security Threats Attacks
Module 04 Page 169 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
Use strong encryption mechanisms such as WPA2, AES 256, etc. for broadband networks
to withstand against eavesdroppi ng
Ensure that the software and protocols are up-to-date and scan the machines thoroughly to
detect any anomalous behavior
Block all inbound packets originating from the service ports to block the traffic from
reflection servers
SC'
Copyti%hta hy Ail Rithts Re Aetl, is Strictlw Pmhibited.
DOS Countermeasures
Implementing defensive mechanisms in appropriate places and following proper measures
allows the heightening of organizational network security. Below is a list of countermeasures
for combatting DoS/DDoS attacks:
Use strong encryption mechanisms such as WPA2 and AES 256 for broadband
networks to withstand against eavesdropping
Ensure that the software and protocols are up-to-date and scan the machines
thoroughly to detect any anomalous behavior
Update kernel to the latest release and disable unused and insecure services
Block all inbound packets originating from the service ports to block the traffic from
reflection servers
Enable TCP SYN cookie protection
Prevent the transmission of the fraudulently addressed packets at ISP level
Implement cognitive radios in the physical layer to handle the jamming and
scrambling attacks
Configure the firewall to deny external ICMP traffic access
Secure the remote administration and connectivity testing
Perform the thorough input validation
Data processed by the attacker should be stopped from being executed
Prevent use of unnecessary functions such as gets and strcpy
Module 04 Page 170 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
hy Ail SC'
Copyti%hta Rithts Re Aetl, is Strictlw Pmhibited.
Module 04 Page 171 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
dangerous because they can quickly consume the largest hosts on the Internet, rendering
them useless. The impact of DDoS includes loss of goodwill, disabled network, financial loss,
and disabled organizations.
How Distributed Denial-of-Service Attacks Work?
In a DDoS attack, many applications pound the target browser or network with fake exterior
requests that make the system, network, browser, or site slow, useless, and disabled or
unavailable.
The attacker initiates the DDoS attack by sending a command to the zombie agents. These
zombie agents send a connection request to a large number of reflector systems with the
spoofed IP address of the victim. The reflector systems see these requests as coming from
the victim's machine instead of the zombie agents due to spoofing of source IP address.
Hence, they send the requested information (response to connection request) to the victim.
The victim's machine is flooded with unsolicited responses from several reflector computers
at once. This either may reduce the performance or may cause the victim's machine to shut
down completely.
Module 04 Page 172 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
by
CODynghtN Rikhts is
Module 04 Page 173 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
Countermeasures
Server
10.0.0.23
Attacker
192.168.0.5
Genuine
172.16.0.6
IP Spoofing
IP spoofing is the technique used by attackers to gain access to a network by sending
messages to a computer with an IP address indicating that the message is coming from a
trusted host. An attacker is engaged in IP spoofing by finding an IP address of a trusted host
and then modifying the packet headers so that it appears that the packets are coming from
that host.
Routers forward packets through the Internet using the "destination IP" address, but they
ignore the "source IP" address used by the destination machine when it responds back to the
source. These attacks exploit applications that use IP addresses based on authentication. The
countermeasures for IP spoofing are:
Identifying the spoofed IP packets and then finding them from the original source.
Use routers, host-based methods, and administrative controls for identifying the
spoofed IP packets. IP packets can be found by implementing special traceback
equipment or traceback features in routers.
Do not depend on address-based authentication.
Restrict access to the system's configuration information.
Encrypt all the network's traffic.
Implement router filters to restrict access to packets if the source address is available
inside it. This is also called as ingress filtering.
Implement filters to restrict packets that leave from your network if the source
address is available outside it.
Use random initial sequence numbers.
Module 04 Page 174 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
In this type of attack attackers intrude Victim Web Server into an existing connection to intercept
the exchanged data and inject false information
The web server and victim both receive manipulated
data
Countermeasures
Use encryption Even if an attacker gets access to the
data, he won't be able to interpret it
O Use Hashed Message Authentication
Codes. The code can identify manipulateddata
Attacker
Ail SC'
Module 04 Page 175 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
SC'
Copyti%hta hy Ail Rithts Re Aetl, is Strictlw Pmhibited.
Module 04 Page 176 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
SC'
Copyti%hta hy Ail Rithts Re Aetl, is Strictlw Pmhibited.
Module 04 Page 177 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
Module 04 Page 178 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
Competitors
Victim
Ail SC'
Copyti%hta hy Rithts Re Aetl, is Strictlw Pmhibited.
Corporate Espionage
Organizational attacks are mainly operations that one organization initiates against another.
They are used to acquire confidential information that may give the attacker a business or
competitive advantage. Some of the attacks are to sabotage the organization's network by
destroying the data or by DOS attack.
These attacks depend on the attacker finding and exploiting access to the organization's
network, such as an unsecured connection between an organization's intranet and a public
network such as the Internet. Once the attacker gets access to the network, he can gain
access to the corporate or organizational trade secrets or other intellectual property stored
on the organization's network.
Module 04 Page 179 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
u
e
Accidental breach occurs when authorized users are unintentionally granted permission to
access the restricted resources
e
user placed in a
Wrong group
Module 04 Page 180 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Associate
Information Security Threats and Attacks
e SC'
Copyti%hta hy Ail Rithts Re Aetl, is Strictlw Pmhibited.
Internal threats originate from individuals who have authorized access to the
network or have an account on a server
External threats are threats from outside the organization, who have no legitimate rights to corporate
systems or information
Malware is a malicious software that damages or disables computer systems and gives limited or full
control of the systems to the malware creator for the purpose of theft or fraud
Social engineering is the act of obtaining unauthorized access to a network by manipulating the
authorized users into revealing their passwords and accessing information
Attackers use password cracking techniques to gain unauthorized access to the vulnerable system
Scanning is a process of identifying the systems, open ports, and services running in a network
TCP session hijacking occurs when a hacker takes over a TCP session between two machines
SC'
Module 04 Page 181 Ethical Hacking Associate Copyright O by EC•CounC" All Rights Reserved. Reproduction is Strictly Prohibited.