Attacks in OSI Model.
Attacks in OSI Model.
Layer 1 - Physical
Many methods are used to further the attack chain. Bad actors have been known to take
temporary positions or join a cleaning crew to get inside a facility. Conference rooms, public
areas, and even parking areas where a WiFi signal is available are other locations where a
cybercriminal posing as legitimate personnel can access the premises.
Tampering with devices and cables: A malicious actor may physically cut cables,
unplug devices, or connect skimming devices to a network cable in order to steal
sensitive information.
Traffic eavesdropping: Accesses traffic through WiFi exploiting WPA2 or other
vulnerabilities to acquire passwords, or by connecting to an Ethernet port on your
network. Passive Ethernet tap devices are widely available, cost around $40, don’t
require power, and look just like a section of a cable when the wires in fact connect to
a monitoring port. This makes them both a particularly appealing tool for
cybercriminals and an especially difficult one to detect for security teams.
The physical layer is the foundation of your network architecture, so a cyber attack on this
layer can be incredibly damaging to the rest of your operations. Limiting access to your
server rooms and Ethernet ports in public areas, and minimizing “WiFi signal leakage” are
obvious places to start. If this layer is compromised, protections at the device level can
prevent exploitation coming from the network from intruders with physical access to the
network.
MAC spoofing: There are two methods in this kind of attack. The first is adding an
inline switch that routes data to the wrong MAC address. The second is changing the
MAC address of a device to steal its network identity.
ARP spoofing: Address Resolution Protocol opens communication to other devices on
a network without requesting authentication from an unverified source. ARP requests
are sent to connect a device to an attacker’s computer.
VLAN hopping: With access to one VLAN, an intruder can switch (by imitating a
trunking switch) or double tag (by connecting to an 802.1Q port) to other VLANs
hopping across networks to acquire new targets.
DHCP spoofing: Set an attacking device as the DNS server or main gateway to respond
to DHCP requests, which then intercepts network traffic.
Rogue access points: An access point is added on a network without the network
owner’s permission and uses it to intercept data. A common example would be a
cybercriminal creating an access point on an open network, like a hotspot in a coffee
shop or airport, with the same or a similar name. If a user is fooled into logging into a
rogue access point, the attacker can intercept passwords, gain access to data, or take
control of the entire PC without the owner knowing. This attack is a form of what is
also know as a “Twin Towers” technique.
Layer 3 - Network
The only way to prevent DDoS attacks is to cloak the device so that the devices are not
discoverable by bad actors and to prevent abnormal traffic from filtering into your network
by installing packet sniffers which can analyze incoming packets and compare them against
a baseline. The other attacks below are generally against network devices and not the
endpoints themselves, so the attacks are difficult to detect or prevent using operating
system-based agents.
Layer 4 - Transport
Preventing lateral movement is one of the most efficient and cost-effective ways to
secure your entire network. If one device is impacted by ransomware, it can be easily
restored and the ransom on a single device doesn’t break the bank. But if that
ransomware spreads across your entire network, the effort and cost of restoring all of
your devices can quickly become insurmountable. Attackers know this and will adjust
their ransom amount based on the number of devices they are able to access.
If an attacker is only able to access one or two devices, their ability to achieve their
ultimate objective is diminished greatly, and they are more likely to abandon further
attacks due to the time and effort required.
Layer 5 - Session
A key function of protecting this layer are Identity & Access Management (IAM)
platforms like Okta, BeyondTrust, and CyberArk, as well as passwordless technologies
like HYPR, Trusona, and Auth0.
Layer 6 - Presentation
Setting up proper input validation protocols is one way to prevent attacks on the
presentation layer. In fact, the easiest way to ward off these attacks is by ensuring
your applications are coded properly from the get-go since most attacks on Layer
6 are the result of poorly written, vulnerable applications.
Cracking encryption: Encryption cracking bypasses encryption to access
protected information.
Layer 7 – Application
Browser and email protections are common for both consumer and enterprise security. Web
Application Firewalls (WAF), API security solutions, and other application protections are
a complicated mix of technologies far too extensive to be covered here.