DFS40083 - Chapter3 - Network Attacks & Protecting The Network
DFS40083 - Chapter3 - Network Attacks & Protecting The Network
OUTSCOMES
Display technique TCP/IP vulnerabilities
enable network attacks.
Vulnerability &
Threat Exploit Risk
Attack Surface
▪ Potential danger to an ▪ Weakness in a system or its ▪ Mechanism used to ▪ Likelihood that a threat
asset such as data or the design that could be leverage a vulnerability will exploit a
network. exploited by a threat. to compromise an vulnerability of an asset
Threat
▪ Attack surface describes asset. and result in an
different points where an ▪ Remote – works over undesirable
attacker could get into a the network. consequence.
system and could get to the ▪ Local – threat actor has
data (Example – operating user or administrative
system without security access to the end
patches) system
W H I T E H AT H AC K E RS
vs G R E Y H AT H AC K E RS
B L AC K H AT H AC K E RS
Script Kiddies
Inexperienced hackers running existing tools and exploits, to cause harm, but typically not for profit.
State-Sponsored
White or black hats who steal government secrets, gather intelligence, and sabotage networks.
Cybercriminals
Hacktivists
Grey hats who rally and protest against political and social ideas.
Vulnerability Broker
Discover exploits and report them to vendors, sometimes for prizes or rewards
Cybercriminals
• Money-motivated threat actors.
• Buy, sell, and trade exploits, and
private information and
intellectual property.
• Steal from consumers, small
businesses, as well as large
enterprises and industries.
Cybersecurity Tasks
• Develop good cybersecurity
awareness.
• Report cybercrime to authorities.
• Be aware of potential threats in
email and web
• Guard important information from
theft.
• Organizations must take action
and protect their
assets, users, and customers.
• Develop cybersecurity tasks and
implement those tasks on a
reoccurring basis.
Cyber Threat Indicators
• Each attack has unique
identifiable attributes that are
known as cyber threat indicators
or simply attack indicators.
• U.S. Department of Homeland
Security (DHS) and United States
Computer Emergency Readiness
Team (US-CERT) use the
Automated Indicator Sharing (AIS)
system that enables sharing of
verified attack indicators with
public and private sector
organizations
Threat Actor Tools:
Introduction of Attack Tools
• Attackers use tools to exploit a vulnerability.
• Sophistication of attack tools and technical knowledge to conduct
attacks has changed since 1985.
Evolution of Security Tools
• Common Penetration Testing Tools
• Password crackers - guesses to crack the password and access the system.
• Wireless hacking tools - hack into a wireless network to detect security vulnerabilities.
• Network scanning and hacking tools - probe network devices, servers, and hosts for
open ports.
• Packet crafting tools - probe and test a firewall’s robustness using specially crafted
forged packets.
• Packet sniffers - capture and analyze packets within traditional Ethernet LANs or WLANs.
• Rootkit detectors - directory and file integrity checker used by white hats to detect
installed root kits.
• Fuzzers - attempts to discover a computer system’s security vulnerabilities.
• Forensic tools - sniff out any trace of evidence existing in a particular computer system.
• Debugger tools - reverse engineer binary files when writing exploits or malware analysis.
• Hacking operating systems - designed operating systems preloaded with tools and
technologies optimized for hacking.
• Encryption tools - use algorithm schemes to encode the data to prevent unauthorized
access to the encrypted data.
• Vulnerability exploitation tools - determine whether a remote host is vulnerable to a
security attack.
• Vulnerability scanners - scan a network or system to identify open ports.
Categories of Attacks
• Common Categories of Network Attacks
• Eavesdropping - capture and listen to network traffic.
• Data modification - alter the captured data in the packet without the
knowledge of the sender or receiver.
• IP address spoofing - constructs an IP packet that appears to originate
from a valid address inside the corporate intranet.
• Password-based - uses the stolen valid accounts to obtain lists of other
users and network information.
• Denial-of-Service - prevents normal use of a computer or network by
valid users.
• Man-in-the-Middle - hackers position themselves between a source and
destination to monitor, capture and control communication.
• Compromised-Key - gain access to a secured communication without
the sender or receiver being aware of the attack by obtaining the secret
key.
• Sniffer - an application or device that can read, monitor, and capture
network data exchanges and read network packets.
3.2 DISPLAY THE VARIOUS TYPES OF
THREATS AND ATTACKS
Short for malicious software or
malicious code
M A LWA R E
Specifically designed to damage,
disrupt, steal or inflict illegitimate
action on data
Malware:
Trojan Horses
• Malicious code that is designed to
look legitimate.
• Often found attached to online
games.
• Non-replicating type of malware.
• Exploits the privileges of the user
that runs the malware.
• Can cause immediate damage,
provide remote access to the
system, or access through a back
door.
Malware:
Trojan Horses Classification
• Remote-access Trojan horse - Enables
unauthorized remote access.
• Data-sending Trojan horse - Provides the
threat actor with sensitive data, such as
passwords.
• Destructive Trojan horse - Corrupts or deletes
files.
• Proxy Trojan horse - Will use the victim's
computer as the source device to launch
attacks and perform other illegal activities.
• FTP Trojan horse - Enables unauthorized file
transfer services on end devices.
• Security software disabler Trojan horse - Stops
antivirus programs or firewalls from
functioning.
• DoS Trojan horse - Slows or halts network
activity.
Malware:
Worms
• Executes arbitrary code and installs itself
in the memory of the infected device.
• Automatically replicates itself and
spreads across the network from system
to system.
Initial Code Red Worm Infection – 658 servers
• Components of a worm attack include
an exploiting vulnerability, delivering a
malicious payload, and self-propagation.
• Virus requires a host program to run,
worms can run by themselves.
TYPES OF
NETWORK Access
ATTACKS
Denial of Service
Common Network Attacks:
Reconnaissance Attacks
• Also known as information gathering,
reconnaissance attacks perform
unauthorized discovery and mapping of
systems, services, or vulnerabilities.
• Analogous to a thief surveying a
neighborhood by going door-to-door
pretending to sell something.
• Called host profiling when directed at an
endpoint.
• Recon attacks precede intrusive access
attacks or DoS attack and employ the
use of widely available tools.
Common Network Attacks:
Sample Reconnaissance Attacks
• Techniques used by threat actors:
• Perform an information query of a target - Threat
actor is looking for initial information about a target.
Tools: Google search, public information from DNS
registries using dig, nslookup, and whois.
• Initiate a ping sweep of the target networks - Threat
actor initiates a ping sweep of the target networks
revealed by the previous DNS queries to identify
target network addresses. Identifies which IP
addresses are active and creation of logical
topology.
• Initiate a port scan of active IP addresses - Threat
actor initiates port scans on hosts identified by the
ping sweep to determine which ports or services are
available. Port scanning tools such as Nmap,
SuperScan, Angry IP Scanner, and NetScan Tools
initiate connections to the target hosts by scanning
for ports that are open on the target computers.
Common Network Attacks:
Access Attacks
• Access attacks exploit vulnerabilities in
authentication services, FTP services, and web
services to retrieve data, gain access to systems,
or to escalate access privileges
• There are at least three reasons that threat actors
would use access attacks on networks or systems:
• To retrieve data
• To gain access to systems
• To escalate access privileges
Common Network Attacks:
Types of Access Attacks
• Password attack - Attempt to discover critical system passwords using phishing
attacks, dictionary attacks, brute-force attacks, network sniffing, or using social
engineering techniques.
• Pass-the-hash - Has access to the user’s machine and uses malware to gain
access to the stored password hashes. The threat actor then uses the hashes to
authenticate to other remote servers or devices.
• Trust exploitation - Use a trusted host to gain access to network resources.
• Port redirection - Uses a compromised system as a base for attacks against other
targets.
• Man-in-the-middle attack - Threat actor is positioned in between two legitimate
entities in order to read, modify, or redirect the data that passes between the
two parties.
• IP, MAC, DHCP Spoofing - One device attempts to pose as another by falsifying
address data.
Common Network Attacks:
Types of Access Attacks
Common Network Attacks:
Social Engineering Attacks
• Type of access attack that attempts to manipulate individuals into performing actions or
divulging confidential information needed to access a network. Examples of social engineering
attacks include:
• Pretexting - Calls an individual and lies to them in an attempt to gain access to
privileged data. Pretends to need personal or financial data in order to confirm the
identity of the recipient.
• Spam - Use spam email to trick a user into clicking an infected link, or downloading an
infected file.
• Phishing - Common version is the threat actor sends enticing custom-targeted spam
email to individuals with the hope the target user clicks on a link or downloads
malicious code.
• Something for Something (Quid pro quo) - Requests personal information from a party
in exchange for something like a free gift.
• Tailgating - Follows an authorized person with a corporate badge into a badge-secure
location.
• Baiting - Threat actor leaves a malware-infected physical device, such as a USB flash
drive in a public location such as a corporate washroom. The finder finds the device
and inserts it into their computer.
• Visual hacking – Physically observes the victim entering credentials such as a
workstation login, an ATM PIN, or the combination on a physical lock. Also known as
“shoulder surfing”.
Common Network Attacks:
Phishing Engineering Attacks
• Common social engineering technique that threat actors use to send emails that
appear to be from a legitimate organization (such as a bank). Variations include:
• Spear phishing - Targeted phishing attack tailored for a specific individual or
organization and is more likely to successfully deceive the target.
• Whaling – Similar to spear phishing but is focused on big targets such as top
executives of an organization.
• Pharming – Compromises domain name services by injecting entries into
local host files. Pharming also includes poisoning the DNS by compromising
the DHCP servers that specify DNS servers to their clients.
• Watering hole – Determines websites that a target group visits regularly and
attempts to compromise those websites by infecting them with malware that
can identify and target only members of the target group.
• Vishing – Phishing attack using voice and the phone system instead of email.
• Smishing – Phishing attack using SMS texting instead of email.
Lab Exercise – Social Engineering
Common Network Attacks:
Denial of Service Attacks
• Typically result in some sort of interruption of
service to users, devices, or applications.
• Can be caused by overwhelming a target
device with a large quantity of traffic or by
using maliciously formatted packets.
• A threat actor forwards packets containing
errors that cannot be identified by the
application, or forwards improperly
formatted packets.
Common Network Attacks:
DDoS Attacks
• DDoS Attacks
• Compromises many hosts
• Originates from multiple, coordinated sources
• DDoS terms:
• Zombies – Refers to a group of compromised hosts (i.e.,
agents). These hosts run malicious code referred to as robots
(i.e., bots).
• Bots – Bots are malware designed to infect a host and
communicate with a handler system. Bots can also log
keystrokes, gather passwords, capture and analyze packets,
and more.
• Botnet – Refers to a group of zombies infected using self-
propagating malware (i.e., bots) and are controlled by
handlers.
• Handlers – Refers to a master command-and-control server
controlling groups of zombies. The originator of a botnet can
remotely control the zombies.
• Botmaster – This is the threat actor in control of the botnet
and handlers.
Common Network Attacks:
Example DDoS Attacks
1. The threat actor builds or purchases a botnet of
zombie hosts.
2. Zombie computers continue to scan and infect
more targets to create more zombies.
3. When ready, the botmaster uses the handler
systems to make the botnet of zombies carry out the
DDoS attack on the chosen target.
Common Network Attacks:
Example DDoS Attacks
2.
1.
3.
Common Network Attacks:
Buffer Overflow Attacks
• The goal is to find a system memory-related flaw on a
server and exploit it.
• Exploiting the buffer memory by overwhelming it with
unexpected values usually renders the system inoperable.
• For example:
• Threat actor enters input that is larger than expected
by the application running on a server.
• The application accepts the large amount of input
and stores it in memory.
• It consumes the associated memory buffer and
potentially overwrites adjacent memory, eventually
corrupting the system and causing it to crash.
Common Network Attacks:
Evasion Methods
• Threat actors learned long ago that malware and
attack methods are most effective when they are
undetected.
• Some of the evasion methods used by threat actors
include encryption and tunneling, resource
exhaustion, traffic fragmentation, protocol-level
misinterpretation, traffic substitution, traffic insertion,
pivoting, and rootkits.
• New attack methods are constantly being
developed; therefore, network security personnel
must be aware of the latest attack methods in
order to detect them.
3.3 DISPLAY NETWORK TRAFFIC MONITORING
Introduction to Network Monitoring:
Network Security Topology
PROTOCOL
NetFlow SIEM SNMP
ANALYZERS
MITM Address
Attacks Spoofing
ICMP
Attacks
IP Vulnerabilities and Threats:
ICMP Attacks
• ICMP was developed to carry diagnostic messages
and to report error conditions when routes, hosts, and
ports are unavailable. ICMP messages are generated
by devices when a network error or outage occurs.
• Common ICMP messages of interest to threat actors
include:
• ICMP echo request and echo reply – This is used
to perform host verification and DoS attacks.
• ICMP unreachable – This is used to perform
network reconnaissance and scanning attacks.
• ICMP mask reply – This is used to map an internal
IP network.
• ICMP redirects – This is used to lure a target host
into sending all traffic through a compromised
device and create a MITM attack.
• ICMP router discovery – This is used to inject bogus
route entries into the routing table of a target
host.
IP Vulnerabilities and Threats:
DoS Attacks
• The goal of a Denial of Service (DoS) attack is
to prevent legitimate users from gaining
access to websites, email, online accounts,
and other services.
• There are two major sources of DoS attacks:
• Maliciously Formatted Packets – Threat
actors craft a maliciously formatted
packet and forward it to a susceptible
host, causing the host to crash or
become extremely slow.
• Overwhelming Quantity of Traffic – Threat
actors overwhelm a target network, host,
or application, causing them to crash or
become extremely slow.
• A distributed DoS (DDoS) attack combines
multiple DoS attacks.
IP Vulnerabilities and Threats:
Amplification and Reflection Attacks
• Threat actors often use amplification and
reflection techniques to create DoS
attacks. The example in the figure
illustrates how an amplification and
reflection technique called a Smurf attack
is used to overwhelm a target host:
• 1. Amplification - The threat actor forwards
ICMP echo request messages that contain
the source IP address of the victim to a
large number of hosts.
• 2. Reflection - These hosts all reply to the
spoofed IP address of the victim to
overwhelm it.
IP Vulnerabilities and Threats:
DDoS Attacks
• A DDoS attack is larger in magnitude than a DoS
attack because it originates from multiple,
coordinated sources. DDoS attacks introduced
new terms such as botnet, handler systems, and
zombie computers.
• A DDoS attack could proceed as follows:
1. The threat actor (botmaster) builds or purchases
the use of a botnet of zombie hosts. The
command-and-control (CnC) server
communicates with zombies over a covert
channel using IRC, P2P, DNS, HTTP, or HTTPS.
2. Zombie computers continue to scan and infect
more targets to create more zombies.
3. When ready, the botmaster uses the handler
systems to make the botnet of zombies carry out
the DDoS attack on the chosen target.
IP Vulnerabilities and Threats:
Address Spoofing Attacks
• occur when a threat actor creates packets with
false source IP address information to either hide
the identity of the sender or to pose as another
legitimate user. The attacker can then gain
access to otherwise inaccessible data or
circumvent security configurations.
TCP & UDP Vulnerabilities :
TCP
• TCP segment information appears immediately after
the IP header.
• TCP provides the following services:
• Reliable delivery
• Flow control
• Stateful communication
TCP & UDP Vulnerabilities :
TCP Attacks
• Although the TCP protocol is a connection-oriented
and reliable protocol, there are still vulnerabilities that
can be exploited.
• TCP attacks target expected protocol behaviors:
• TCP SYN flood attack
• TCP reset attack
• TCP session hijacking
TCP & UDP Vulnerabilities :
UDP and UDP Attacks
• UDP is a simple protocol that provides the basic transport layer functions. UDP is
commonly used by DNS, TFTP, NFS, and SNMP. It is also used with real-time applications
such as media streaming or VoIP. UDP is a connectionless transport layer protocol.
• By default, UDP is not protected by any encryption. The lack of encryption allows anyone
to look at the traffic, change it, and send it on to its destination.
• UDP protocol attacks target the lack of protocol behaviors (UDP):
• UDP checksum attack
• UDP flood attack
• UDP DoS attacks
3.5 DISPLAY COMMON NETWORK
APPLICATIONS AND SERVICES ARE VULNERABLE
TO ATTACK.
IP Services:
ARP Vulnerabilities
• Hosts broadcast an ARP Request to other hosts
on the segment to determine the MAC address
of a host with a particular IP address.
• All hosts on the subnet receive and process the
ARP Request.
• The host with the matching IP address in the ARP
Request sends an ARP Reply.
IP Services:
ARP Cache Poisoning
• ARP cache poisoning
attacks deliberately
poison the cache of
another computer with
spoofed IP address to
MAC address mappings.
IP Services:
DNS Attacks
DNS servers resolve names to IP addresses and are a major target of attackers. Some DNS
exploits are:
hijacked domains are used to create subdomains which are u sed to resolve to
malicious web sites
Malicious iFrame
an iFrame allows a page from a different domain to be opened inline within the
current page. The iFrame can be used to launch malicious code.
allows a web page to redirect and open in a different URL. Can be used to redirect to
malicious code.
Domain Shadowing
malicious web sites are created from subdomains created from a hijacked domain.
EMAIL
Email messages are accessed from many different devices that are often not protected
by the company’s firewall.
Attachment-based attacks
Email Spoofing
phishing attack where the message appears to come from a legitimate source.
Spam Email
Homoglyphs
phishing scheme where text characters (hyperlinks) look similar to real text and links.
WEB-EXPOSED DATABASED
Web applications commonly connect to a relational database. Because relational
databases often contain sensitive data, databases are a frequent target for attacks.
insecure server-side scripting where the input is not validated allows scripting
commands to be inserted into user generated forms fields, like web page
comments. This results in visitors being redirected to a malicious website
with malware code.