Main Solved Compile PDF
Main Solved Compile PDF
2) LUCIFER
3) confusion , diffusion
4) Digital Signature
5) Jeffersen Wheel
6) Enigma
Abbreviations
i) Rivest, Shamir, and Adleman
4. What is Reconnaissance?
5. Steps of MD5?
6. What happens if a router is under attack? What are the considerations to take to avoid/Defend?
7. Differentiate between Transport and Tunnel mode and Draw their packet diagrams.
2018 - 2019
Q1) Definition: Cryptography
Cryptanalysis
Q2) The primary objective of using cryptography is to provide the following four fundamental
information security services
b) List out the two methods of operations in authentication header (AH) and encapsulating
security payload ESP.
c) What is the role of a compression function in a hash function? What is the difference between
weak and strong collision resistance.
d)Describe the MDS message digest algorithm with block diagram?
e) explain briefly how transport and tunnel mode operates on AH packets for IPV4?f
f) Consider an automated teller machine (atm) in which users provide a personal identification
number (pin) and a card for account access. Give examples of confidentiality, integrity, and
availability requirements associated with the system and, in each case, indicate the degree of
importance of the requirement.
j) What if router becomes attack target? Highlight some router security considerations
OR
j) What are the candidate best practice to avoid header manipulation and fragmentation attack?
(g) For each of the following assets, assign a low, moderate, or high impact level for the loss of
confidentiality, availability, and integrity, respectively. Justify youranswers.
I) List and briefly define categories of passive and active security attacks. (2 points)
OR
Active attacks
List and briefly defines the categories of of security services.
Q) Define the reconnaissance attempt and identify how we protect themselves from the kind of
attack?
Attack vector is a method used by attackers to obtain local or remote networks and computers. This is a term used in
the information security industry to describe the path of an attacker (or malware). It allows hackers to access
computers or network servers to deliver payloads or malicious results.
Types of Attack Vector
Insider Threats
Insider threat is the potential for an insider to use their authorized access or understanding of an organization to harm
that organization. This harm can include malicious, complacent, or unintentional acts that negatively affect the
integrity, confidentiality, and availability of the organization, its data, personnel, or facilities.
Man-in-the-Middle Attacks
Man-in-the-middle Attack (MITM) is a long-standing network intrusion method, and it still has a wide development
space. For example, SMB session hijacking, DNS spoofing, and other attacks are typical MITM attacks.
Ransomware
Ransomware is malware designed to deny a user or organization access to files on their computer. By encrypting
these files and demanding a ransom payment for the decryption key, cyberattacks place organizations in a position
where paying the ransom is the easiest and cheapest way to regain access to their files.
Phishing
Phishing is a criminal scam that attempts to obtain sensitive personal information such as user names, passwords,
and credit card details from electronic communications by posing as reputable corporate media.
Brute Force Attack
Brute force attacks are trial-and-error methods most commonly used to crack passwords and encryption keys. Brute
force attacks do not employ intelligence strategies, but simply try to use different combinations of characters until the
right combination is found.
Distributed Denial of Service (DDoS)
Distributed denial of service attacks can attack many computers at the same time so that the target of the attack
cannot be used normally.
SQL Injections
SQL injection is a security vulnerability that occurs at the application and database levels. In short, SQL instructions
are injected into the input string, and character checking is neglected in a poorly designed program.
Cross-Site Scripting
An XSS attack (cross-site scripting) is a security vulnerability attack on a web application that allows a malicious user
to inject code into a web page so that other users are affected when viewing the web page. These attacks usually
include HTML as well as user-side scripting languages.
Session Hijacking
Session hijacking is an attack method that obtains the Session ID of a user and uses the Session ID to log in to the
target account. In this case, the attacker uses the valid Session of the target account.
Here end hosts do IPsec encapsulation of their own IPsec gateways provide service to other hosts in peer-
data; hence IPsec needs to implemented on each end- to-peer tunnels; hence the end-hosts don’t need IPsec.
hosts
Used in securing communication from one device to Used to tunnel traffic from one site to another
another.
It is good for ESP host-to-host traffic It is good for VPNs, gateway-to-gateway security.
Provides protection primarily to upper layer protocols Provides protection to entire IP packet
AH in transport mode authenticates the IP payload and AH in tunnel mode authenticates the entire inner IP
selected portions of IP header. packet and selected portions of the outer IP header.
ESP in transport mode encrypts and optionally ESP in tunnel mode encrypts and optionally
authenticates the IP payload but not the IP header. authenticates the entire inner IP packet, including the
inner IP header.
An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en
route to the target. The fabrication attack is performed by generating false routing messages by an attacker which
make it difficult to detect since the messages are received as legitimate routing packets from malicious
devices.
Tunnel mode protects internal routing information by encrypting the original packet's IP header by creating a new IP
header on top of it. This allows tunnel mode to protect against traffic analysis, since attackers can only determine
the tunnel endpoints.
c.
4. What is Reconnaissance?
Reconnaissance is the information-gathering stage of ethical hacking, where you collect data about the target
system. This data can include anything from network infrastructure to employee contact details. The goal of
reconnaissance is to identify as many potential attack vectors as possible.
5. Steps of MD5?
The following five steps are performed to compute the message digest of the
message
As we all know that MD5 produces an output of 128-bit hash value. This encryption of input of any size into hash values
Padding means adding extra bits to the original message. So in MD5 original message is padded such that its
length in bits is congruent to 448 modulo 512. Padding is done such that the total bits are 64 less, being a
Padding is done even if the length of the original message is already congruent to 448 modulo 512. In padding
bits, the only first bit is 1, and the rest of the bits are 0.
Word A 01 23 45 67
Word B 89 Ab Cd Ef
Word C Fe Dc Ba 98
Word D 76 54 32 10
Step 4: Processing message in 16-word block
MD5 uses the auxiliary functions, which take the input as three 32-bit numbers and produce 32-bit output. These
The content of four buffers are mixed with the input using this auxiliary buffer, and 16 rounds are performed using 16
basic operations.
Output-
After all, rounds have performed, the buffer A, B, C, D contains the MD5 output starting with lower bit A and ending with
higher bit D.
6. What happens if a router is under attack? What are the considerations to take to avoid/Defend?
Cryptanalysis is the art of trying to decrypt the encrypted messages without the use of the
key that was used to encrypt the messages. Cryptanalysis uses mathematical analysis &
algorithms to decipher the ciphers.
Q2) The primary objective of using cryptography is to provide the following four fundamental
information security services
Confidentiality can be achieved through numerous means starting from physical securing to the
use of mathematical algorithms for data encryption.
Integrity: It is security service that deals with identifying any alteration to the data. the
information cannot be altered in storage or transit between sender and intended receiver
without the alteration being detected
Non-repudiation: It is a security service that ensures that an entity cannot refuse the
ownership of a previous commitment or an action. It is an assurance that the original creator
of the data cannot deny the creation or transmission of the said data to a recipient or third
party. For example, once an order is placed electronically, a purchaser cannot deny the
purchase order, if non-repudiation service was enabled in this transaction.
Authentication/Digital Signatures:
Authentication is any process through which one proves and verifies certain information.
Sometimes one may want to verify the origin of a document, the identity of the sender, and
the document was sent or signed and so on. A digital signature is a cryptographic means
through which many of these may be verified. It is typically created through the use of a hash
function and a private signing function (algorithms that create encrypted characters containing
specific information about a document and its private keys).
Encryption/Decryption in email:
Email encryption is a method of securing the content of emails from anyone outside of the
email conversation looking to obtain a participant’s information. In its encrypted form, an email
is no longer readable by a human. Each person with an email address has a pair of keys
associated with that email address, and these keys are required in order to encrypt or decrypt
an email. One of the keys is known as a “public key”, and is stored on a keyserver where it is
tied to your name and email address and can be accessed by anyone. Email encryption works
by employing public key cryptography. The other key is your “private key”, which is not shared
publicly with anyone.
Cash Withdrawal
The banks are doing something to ensure that the cash withdrawal from your ATM remains
a safe procedure. This type of encryption is called HSM, or Hardware Security Module
encryption. This method protects the privacy of your PIN, as well as that of other sensitive
information that’s stored on your credit or debit card. In essence, HSM encryption makes
sure that the cybercriminals can’t intercept your PIN during the network data exchange, i.e.
your interaction with the ATM.
Secrecy in Storage
Secrecy in storage is usually maintained by a one-key system where the user provides the key
to the computer at the beginning of a session, and the system then takes care of encryption
and decryption throughout the course of normal use. As an example, many hardware devices
are available for personal computers to automatically encrypt all information stored on disk.
When the computer is turned on, the user must supply a key to the encryption hardware. The
information cannot be read meaningfully without this key, so even if the disk is stolen, the
information on it will not be useable.
• Malware is most commonly acquired through clicking on email attachments and email
links.
• Spyware/adware gathers information about you. It can record keystrokes and, as
such, can potentially be very dangerous, revealing everything you do on your
computer. • Another well-known threat, not covered by your firewall, is SPAM. Dealing
with SPAM can seriously affect your productivity and, as SPAM often contains viruses
and phishing emails, it is also a direct security threat.
• Phishing is about fake emails trying to extract sensitive information, such as your bank
passwords or credit card details and a variation of this is pharming, where the criminal
sets up a fake web site which looks like one you normally use, typically a banking site.
Once you enter your details, the criminal is able to plunder your account.
Active Attack is dangerous for Integrity as well as Passive Attack is dangerous for
Availability. Confidentiality.
System Resources can be changed in active System Resources are not changed in
attack. passive attack.
Q7) will the AES replace triple DES and DES?
Each of cryptographic algorithms has weakness points and strength points. We select
the cryptographic algorithm based on the demands of the application that will be used.
From the experiment results and the comparison, If confidentiality and integrity are major
factors, AES algorithm can be selected. If the demand of the application is the network
bandwidth, the DES is the best option. We can consider that blowfish and AES
algorithms are used to prevent the application from guessing attacks and it can be
applied on top of all the internet protocols that are based on IPv4 and IPv6 Q8) the
differences between hashing and encryption:
Encryption is a two-way function where Hashing is a one-way function where a
information is scrambled using an encryption key unique message digest is generated from an
and unscrambled later using a decryption key. input file or a string of text. No keys are used.
The resultant encrypted string is of a variable The resultant hashed string is of a fixed
length. length.
Purpose of encryption is to transmit data securely The objective of using hashing is to verify
(i.e., protect data confidentiality) data (i.e., protect data integrity)
The original message can always be retrieved by Output can’t be reverted to the original
using the appropriate decryption key. message.
• Confidentiality (encryption)—ensuring that the data has not been read enroute.
As we all know to help in the security of a network the Internet community has done lot of
work and developed application-specific security mechanisms in numerous application areas,
including electronic mail (Privacy Enhanced Mail, Pretty Good Privacy [PGP]), network
management (Simple Network Management Protocol Version 3[SNMPv3]), Web access
(Secure HTTP, Secure Sockets Layer [SSL]), and others.
Q10)
Secure Socket Layer (SSL) provide security to the data that is transferred between web
browser and server. SSL encrypt the link between a web server and a browser which ensures
that all data passed between them remain private and free from attack. Secure Socket Layer
Protocols:
• SSL record protocol
• Handshake protocol
• Change-cipher spec protocol
• Alert protocol
•
SSL Record Protocol:
SSL Record provide two services to SSL connection.
• Confidentiality
• Message Integrity
In SSL Record Protocol application data is divided into fragments. The fragment is
compressed and then encrypted MAC (Message Authentication Code) generated by
algorithms like SHA (Secure Hash Protocol) and MD5 (Message Digest) is appended. After
that encryption of the data is done and in last SSL header is appended to the data. Types
of Encryption:
Asymmetric Encryption — This encryption process involves two different keys. One
key encrypts (public key) while the other key (private key) decrypts. This encryption is
the foundation for public key infrastructure (PKI), which is the trust model on which
SSL/TLS is based.
Symmetric Encryption — This type of encryption uses the same key to both encrypt and
decrypt a message. Because there’s only one key involved, it’s a faster type of encryption that
requires less processing power to compute.
In the SSL/TLS handshake process, the secret key is shared using asymmetric encryption.
Once the key has been exchanged the browser and server communicates using the symmetric
session key that is passed along.
Asymmetric encryption is considered to be stronger and more secure owing to its one-way
nature.
• MD4 and MD5 — MD4 was created in 1990 by Ronal Rivest. However, using this
algorithm gives rise to a series of security concerns. MD5 was created as its successor;
while its security is slightly improved, MD5 is also known to suffer from vulnerabilities.
Salts are added typically to protect password hashes (as a preventive measure against
brute force attacks). While using weak hashing functions such as MD5, salting is a must
and so is ensuring the salt remains uncompromised.
• SHA (Security Hashing Algorithm) — There are three different SHA algorithms: SHA
0, SHA-1, and SHA-2. With SHA-1 being deprecated, SHA-2 is used in most SSL/TLS cipher
suites. SHA-256 or above is the recommendation for security critical applications.
• Tiger — This is a faster and improved 192-bit hashing function that was developed by
Ross Anderson and Eli Biham in 1996. Tiger doesn’t suffer from the known
vulnerabilities of MD5 and SHA-0/SHA-1. In the Tiger2 variant, the message is padded
with a hexadecimal value of 0x80 instead of 0x01 as in Tiger. The two variants are
otherwise identical.
• Brute force attack– this type of attack uses algorithms that try to guess all the possible
logical combinations of the plaintext which are then ciphered and compared against the
original cipher.
• Dictionary attack– this type of attack uses a wordlist in order to find a match of either
the plaintext or key. It is mostly used when trying to crack encrypted passwords.
• Rainbow table attack– this type of attack compares the cipher text against
pre-computed hashes to find matches.
a)What are two different uses of public-key cryptography related to key distribution?
The public key of the recipient can be used to encrypt the message, which is in turn decrypted using a
private key. Secondly, public key cryptography is used as digital signatures.
A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and
algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much
used in modern cryptography. The main alternative method is the block cipher in which a key and
algorithm are applied to blocks of data rather than individual bits in a stream. Stream cipher is also known
as state cipher.
d) List out the two methods of operations in authentication header (AH) and encapsulating
security payload ESP.
e) What is the role of a compression function in a hash function? What is the difference between
weak and strong collision resistance.
B) A compression function takes a fixed length input and returns a shorter, fixed-length output. ...
Theblocks are then processed sequentially, taking as input the result of the hash so far and the current
message block, with the final output being the hash value for the message.
e)explain briefly how transport and tunnel mode operates on AH packets for IPV4?
The manner in which the original IP packet is modified depends on the encapsulation mode used. There
are two encapsulation modes used by AH and ESP, transport and tunnel.
Transport mode encapsulation retains the original IP header. Therefore, when transport mode is used,
the IP header reflects the original source and destination of the packet. Transport is most often used in a
host-to-host scenario, where the data endpoints and the security endpoints are the same. A transport
mode encapsulated datagram is routed, or transported, in the same manner as the original packet.
Figure 1 shows an IPv4 packet that is encapsulated using AH in transport mode:
Figure 1. IPv4 packet encapsulated using AH in transport mode
Tunnel mode encapsulation builds a new IP header containing the source and destination address of the
security endpoints. When tunnel mode is used, the outer IP header reflects the source and destination of
the security endpoints, which might or might not be the same as the original source and destination IP
address of the data connection. The choice of transport or tunnel mode depends on the structure of the
network and relies heavily on logical connections between the endpoints. Tunnel mode is required if one
of the IKE peers is a security gateway that is applying IPSec on behalf of another host or hosts. A
datagram that is encapsulated in tunnel mode is routed, or tunneled, through the security gateways, with
the possibility that the secure IPSec packet will not flow through the same network path as the original
datagram. To successfully encapsulate and send an outbound packet, the route table must contain a
route that can be used to reach the security gateway, as well as a route that can be used to reach the
data endpoint. If policy-based routing is being used on a TCP/IP stack where IP security is active, it is
important to understand how the two functions interact. For more information, see Considerations for
using policy-based routing with IP security.
Figure 5 shows an IPv4 packet that is encapsulated using AH in tunnel mode:
Figure 5. IPv4 packet encapsulated using AH in tunnel mode
f) Consider an automated teller machine (atm) in which users provide a personal identification number
(pin) and a card for account access. Give examples of confidentiality, integrity, and availability
requirements associated with the system and, in each case, indicate the degree of importance of the
requirement.
Confidentiality:To access debit or credit cards one must enter a security password which is available
only to authorized users and aimed at further enhancing the level of security. While securing the PIN of
a respective card it is the responsibility of end user to ensure they use a strong pin. Banks also need to
ensure privacy whenever a communication is happening in between ATM and bank server to prevent
hacking. The entire transaction needs to be properly secured so to avoid any kind of harm or hackers
cracking the card pins and accessing (Ajaykumar & Kumar, 2013).
Proper encryption of PIN ensures that high level of confidentiality is maintained while lack of attention
towards the same could lead to breach of data or customers information. Moreover, the policy related to
changing PIN after regular intervals will help boost the customers and keep data and information secure.
Integrity:Use of advanced, efficient technology and proper optimization & Collaboration of ATMs is
necessary to ensure their integrity is maintained and customers information is secure. Both in case of
withdraw and deposit, systems must be updated chronologically with authentic data and does not affect
the customer account in any manner. Withdrawals of money should reflect as debits on the account,
deposit of funds would result in credit of account.
Moreover, a section or committee should be incorporated to handle queries of customers which are
related with mismatch of account due to use of ATM.
Availability:The frequency of ATM should enhance depending upon the demand of the customers and
further should be frequently updated with cash to provide accurate services. While ATM which is out of
service could lead to customer dissatisfaction, that of ATM with accuracy in services could attract more
and more customers.
j) What if router becomes attack target? Highlight some router security considerations
Routers provide an important role in network communications supporting the exchange of information.
Router attacks can take advantage of vulnerabilities in protocols, inconsistencies in router software and
weak authentication. Attacks can occur in the form of distributed denial of service and brute force attacks.
While they are occurring, attacks impact network services and business operations
● Change factory default passwords in your router to strong and unique credentials.
● Switch on two-factor authentication for even more log-in protection, if offered.
● Check regularly for firmware updates and apply them as soon as they’re available. This may
require you to visit the manufacturer’s website from time-to-time.
● Use WPA2 on your routers for encrypted Wi-Fi.
● Disable UPnP and any remote management features.
● Set up a guest network for your devices, which isolates harm guests can cause, as well as
hackers’ efforts.
● Put the router in middle of house if possible, so the signal is not unduly extended to hackers
who may be lurking in parked cars outside.
● Invest in security for your entire home network from a reputable provider like Trend Micro.
OR
j) What are the candidate best practice to avoid header manipulation and fragmentation attack?
You can minimize the risk of an IP fragmentation attack by employing one of these methods:
1. Inspect incoming packets using a router, a secured proxy server, firewalls, or intrusion detection systems;
2. Make sure that your OS is up to date and has all the latest security patches installed;
3. You can block fragmented IP packets by cutting your connection with anyone who sends them. However,
some benign connections (e.g., mobile devices) use fragmented packets, so disabling them might cause
disruptions for your traffic.
(g) For each of the following assets, assign a low, moderate, or high impact level for the loss of
confidentiality, availability, and integrity, respectively. Justify youranswers.
ANSWER:
(a) Organization managing public information on its web server:
Confidentiality:
Web server contains the public information. So everyone can access that information.
So there is no confidentiality is provided.
So impact of confidentiality level is low
Integrity:
Server maintains public information. So there may be anyone can modify that is either authorized user or
intruder.
So impact of integrity level is moderate.
Availability:
Confidentiality:
Web server contains the sensitive information. If any of data loss is occurred then it gives high loss.
So impact of the confidentiality level is high.
Integrity:
Server maintains private information. If any modifications occurred it gives huge loss
So impact of integrity level is high.
Availability:
Web server contains only routine information not privacy related information. So everyone can access
that information.
So there is no confidentiality is provided.
So impact of confidentiality level is low
Integrity:
Server maintains routine information. If data loss is occured , it is not a big issue.
So impact of integrity level is low.
Availability:
The two types of passive attacks are: Release of message, this is where the attacker listens to the data
stream and then share the confidential information. Traffic analysis, this involves analysis of the traffic
and observe the time taken and the size of the message being sent and received.
The types of active security attacks are as follows: Masquerade, this involves the attacker to impersonate
the sender of the message. Replay, this is where the data are captured and then retransmit in view of
creating an unauthorised effect. Modification of messages – in this case the message is are modified or
delayed or the sequence of the message is reordered in view of creating an unauthorised effect. Denial
of service, this is where the attacker prevents the authorised person to use the infrastructure in an
authorised manner by disabling the network.
OR
Active attacks: An Active attack attempts to alter system resources or effect their operations. Active
attack involve some modification of the data stream or creation of false statement. Types of active attacks
are as following:
1. Masquerade –
Masquerade attack takes place when one entity pretends to be different entity. A Masquerade
attack involves one of the other form of active attacks.
2. Modification of messages –
It means that some portion of a message is altered or that message is delayed or reordered
to produce an unauthorised effect. For example, a message meaning “Allow JOHN to read
confidential file X” is modified as “Allow Smith to read confidential file X”.
3. Repudiation –
This attack is done by either sender or receiver. The sender or receiver can deny later that
he/she has send or receive a message. For example, customer ask his Bank “To transfer an
amount to someone” and later on the sender(customer) deny that he had made such a
request. This is repudiation.
4. Replay –
It involves the passive capture of a message and its subsequent the transmission to produce
an authorized effect.
5. Denial of Service –
It prevents normal use of communication facilities. This attack may have a specific target. For
example, an entity may suppress all messages directed to a particular destination. Another
form of service denial is the disruption of an entire network wither by disabling the network or
by overloading it by messages so as to degrade performance.
Passive attacks: A Passive attack attempts to learn or make use of information from the system but
does not affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring
of transmission. The goal of the opponent is to obtain information is being transmitted. Types of Passive
attacks are as following:
1. The release of message content –
Telephonic conversation, an electronic mail message or a transferred file may contain
sensitive or confidential information. We would like to prevent an opponent from learning the
contents of these transmissions.
2. Traffic analysis –
Suppose that we had a way of masking (encryption) of information, so that the attacker even
if captured the message could not extract any information from the message.
The opponent could determine the location and identity of communicating host and could
observe the frequency and length of messages being exchanged. This information might be
useful in guessing the nature of the communication that was taking place.
Authentication: The assurance that the communicating entity is the one that it claims to be.
● Peer Entity Authentication: Used in association with a logical connection to provide confidence
in the identity of the entities connected.
● Data-Origin Authentication: In a connectionless transfer, provides assurance that the source of
received data is as claimed.
Q) Define the reconnaissance attempt and identify how we protect themselves from the kind of
attack?
ANSWER:
RECONNAISSANCE ATTEMPT:
Reconnaissance attacks are general knowledge gathering attacks. These attacks can happen in both
logical and physical approaches. Whether the information is gathered via probing the network or through
social engineering and physical surveillance, these attacks can be preventable as well. Some common
examples of reconnaissance attacks include packet sniffing, ping sweeping, port
scanning, phishing, social engineering and internet information queries. We can examine these further
by breaking them into the two categories of logical and physical.
Logical Reconnaissance refers to anything that is done in the digital spectrum and doesn’t require a
human on the other side to complete the reconnaissance attack. Ping sweeps and port scans, for
example, are two methods of discovering both if the system is there and what it is looking for on the
network. An example of a return on a port scan would be discovering that an IP address was listening on
port 443 for HTTPS traffic. That allows the hacker to know that they can attempt exploitation geared
towards HTTPS.
Additionally, here we see information queries over the internet. These are sometimes called who is
queries. All domains registered to independent companies belong to a domain provider somewhere, as
regulation of these domains must occur. The problem is like patenting a product name where company
A wants to use a specified domain and company B already owns that domain. These domain
management platforms handle the exchanges and maintenance of domain names from conception to
expiration. These domain hosting services typically offer a lot of information relative to an organization to
include points of contact and contact information. All of this makes the information gathering that much
easier when you contact a company having legitimate information of persons of interest.
Physical Reconnaissance crosses the lines of what a network admin has control of. There are elements
that will never be protected fully like locations as well as security elements like cameras, mantraps, door
locks or guards. However, these can play into physically securing a network.
For example, bank security may be limited in the ability to stop an extremely well-orchestrated heist
attempt to what that security team has prepared for, but the simple fact that a bank has security in place
creates the potential to deter most lower to mid-level criminals who would make the attempt. That is the
same idea that goes into most physical security measures for network protection. Reconnaissance, as
we have established, is the collection of information from any available sources. If the surveyor cannot
access the information easily, it can deter the collection altogether or force them into a more logical realm.
Either of these options from the surveyor would be beneficial to the network team, as it drives the
reconnaissance into a more controllable atmosphere.
Solution
For these kinds of attacks, there is really a limited effort that can be done, as some details and company
information absolutely need to be out there. However, through training and simple steps at the
developmental level, mitigation steps can be taken to prevent this from compounding into a bigger issue.
Try to limit the information posted about a company’s contact information. Edit banner returns for banner-
grabbing attacks so the information is limited to the attacker. If all the information for contacting the
network admin or company representative is required, be sure those personnel are trained up on how to
spot social engineering attacks. This training needs to be extended out to all employees, as anyone is a
risk of sharing company secrets if a social engineer is charismatic enough.
Additionally, a company can outsource red teams and pen testers. Doing so can greatly inform an
organization leader what shortcomings exist. Most red teams achieve access by any means necessary,
and this can truly highlight what an attacker is capable of. Be sure to also conduct audits of both the
logical information as well as the physical security in place. If badges are being used, check logs and be
sure personnel are following the guidelines of the access agreements.