Security Threats & Vulnerabilities Module 2
Security Threats & Vulnerabilities Module 2
Cracking Process:
• Weak Initialization Vectors (IVs): WEP uses a 24-bit IV, which is relatively short. This
makes it easier for attackers to predict and break the encryption after capturing
enough packets.
• Tools for Cracking: Tools like Aircrack-ng and Kismet are commonly used to crack
WEP. These tools exploit the weakness in the IV to break the encryption and gain
access to the network.
Countermeasures:
• Avoid WEP: Replace WEP with WPA2 (Wi-Fi Protected Access 2) or WPA3 encryption,
which are much more secure.
• Longer Keys: Use encryption methods with longer key lengths and more robust
protocols like AES.
3. Denial of Service (DoS) Attacks
Definition: A Denial of Service attack occurs when an attacker disrupts the normal functioning
of a network by overwhelming it with traffic, rendering the service unavailable to legitimate
users.
Types of DoS Attacks:
• Flooding Attacks: Overloading a network or a system with excessive requests, causing
it to slow down or crash. Examples include SYN flood, Ping of Death, and UDP flood
attacks.
• Jamming Attacks in Wireless Networks: Wireless DoS attacks target the radio
frequency spectrum, where the attacker sends interference signals to disrupt the
communication between devices.
• Rogue Device Injection: Attackers can inject rogue devices that flood the network,
making it unresponsive to legitimate devices.
Impact:
• Loss of Service: Critical services can become unavailable, leading to operational
disruption.
• Security Breach: DoS attacks can be a diversion for other malicious activities, such as
data exfiltration or network infiltration.
Mitigation:
• Rate Limiting: Implement mechanisms to limit the number of requests a server can
handle at any given time.
• Intrusion Detection Systems (IDS): Use IDS to detect abnormal network traffic
patterns that could indicate a DoS attack.
• Redundancy: Build redundancy into network infrastructure to ensure availability even
under attack.
4. Network Attacks
Definition: Network attacks target the underlying infrastructure of a network, such as routers,
switches, and the protocols that govern how data is transmitted between devices.
Mitigation:
• Use of Secure Protocols: Employ secure protocols like HTTPS, SSH, and IPSec to
prevent MITM attacks.
• Static ARP Tables: Configure static ARP tables to avoid ARP poisoning.
• DNSSEC: Deploy Domain Name System Security Extensions (DNSSEC) to protect
against DNS poisoning.
5. Fault Attacks
Definition: Fault attacks are a category of physical attacks that involve introducing errors or
faults into a system to force it to behave incorrectly, exposing its vulnerabilities.
Examples:
• Voltage Faults: Manipulating the voltage supplied to a system to cause computation
errors.
Impact:
• Fault attacks can lead to unauthorized access to encryption keys or leakage of sensitive
information. They are often used in conjunction with cryptographic attacks.
Mitigation:
• Error Detection: Implement error-detection codes that can identify and correct faults
in computation.
• Robust Hardware Design: Use tamper-resistant hardware to mitigate the risk of fault
attacks.
6. Side-Channel Attacks
Definition: Side-channel attacks exploit physical emanations from a system, such as power
consumption, electromagnetic emissions, or timing behavior, to extract sensitive information
like cryptographic keys.
Types:
• Power Analysis: Measuring fluctuations in power consumption to uncover
information about the cryptographic operations being performed.
• Timing Attacks: Observing the time it takes a system to perform operations, such as
encryption, to deduce secret information.
• Electromagnetic (EM) Analysis: Intercepting electromagnetic signals emitted by a
device to gain insights into its operations.
Impact:
• Leakage of Sensitive Information: These attacks can lead to the compromise of
cryptographic keys and other confidential data.
Mitigation:
• Noise Injection: Adding artificial noise to power consumption or timing operations to
obscure side-channel data.
• Constant-Time Algorithms: Implement cryptographic algorithms that execute in
constant time to prevent timing attacks.