Chapter 03 - Network Attacks - Handout
Chapter 03 - Network Attacks - Handout
Network-Based Attacks
Episode 3.01 - Exploit Resources and
Network Attacks
Objective 3.1 Given a scenario, research attack vectors and
perform network attacks
EXPLOIT RESOURCES
• Exploit database (DB)
- Maintained by Offensive Security
- CVE compliant archive of public exploits
- Useful for pentesters and security researchers
- https://www.exploit-db.com/
• Packet storm
- Global security resource
- Purpose is to provide a current repository of security
threat information
- https://packetstormsecurity.com/
NETWORK ATTACKS
• Exploit chaining
- Practice of combining exploits in a sequence that
increases the probability of success
- The idea is to incrementally compromise a system
- For example, compromise admin passwords first,
then use those passwords to access systems to carry
out attacks using elevated privileges
NETWORK ATTACKS
• Password attacks
- Password spraying
• Attempt to use lists of insecure passwords against many
accounts
- Brute force
• Trying all possible options to attempt to find a match
- Dictionary
• Attempting password alternative using a predefined list
of known or weak passwords
• Multiple sources exist to search for exploits
• Attacks on networks focus on different ways to
gain access
Episode 3.02 – NetworkBased Exploits
• Man-in-the-middle
Family of attacks where the
attacker intercepts
messages between a
sender and receiver
Attack may modify,
regenerate, or forward
intercepted messages
MAN-IN-THE-
MIDDLE EXPLOITS
• ARP spoofing
Similar to DNS poisoning,
but with local MAC
addresses
• Replay
• Relay
• SSL (Secure Sockets
Layer) stripping
• Downgrade
MAN-IN-THE-
MIDDLE EXPLOITS
• DoS (Denial of
Service)/stress test
• NAC (Network Access
Control) bypass
• VLAN (Virtual Local
Area Network)
hopping
• MITM attacker intercepts all traffic between
sender and receiver
• May be part of an attack chain
• Multiple MITM possibilities, including ARP
spoofing, pass the hash, replay attack
• Useful to bypass normal network security controls
Episode 3.05 – Labtainers Lab (TCP/IP
Attacks)
Objective 3.1 Given a scenario, research attack vectors and
perform network attacks
Lab Networking: tcpip
• Intro lab (TCP/IP attacks)
• No QR for this
Episode 3.06 – Labtainers Lab (ARP
Spoof Attack)
Objective 3.1 Given a scenario, research attack vectors and
perform network attacks
Lab Networking: arp-spoof
• Intro lab (arp-spoof attack)
• No QR for this
Episode 3.07 – Labtainers Lab (Local DNS
Attacks)
Objective 3.1 Given a scenario, research attack vectors and
perform network attacks
Lab Networking: local-dns
• Intro lab (Local DNS attacks)
• No QR for this
Episode 3.08 – Labtainers Lab (MACs and
Hash Functions)
Objective 3.1 Given a scenario, research attack vectors and
perform network attacks
Lab Crypto Labs: macs-hash
• Intro lab (MACs and Hash functions)
• More exploration than attacks
• No QR for this