Chapter 2 Types of Attack
Chapter 2 Types of Attack
COMPUTER SECURITY
Malware is the term refers to Malicious Software, that breaches computer and network
through vulnerabilities, user click dangerous email attachment and links, and install risky
software.
Viruses – a program that self-replicates, growth and rapidly spread and infected the entire network.
Most common threats to network, infected, copying itself and becoming part of the another
program
Example of Viruses
• Ransomware
• Fake Windows Updates / AV
• Gameover Zeus
• Rombertik
• And More..
Malware-Worm
Program that able to self-replicate and can spread copies for themselves
(Modified)
Virus vs Worm – Worm operate more independently; virus depends on a host
program to spread itself.
Characteristic of Worm :
Standalone software
Do not require human intervention (execute) to run the attack and propagate
Fast spread by exploit a vulnerability on the target system
Advanced worm – encryption, wipers, and ransomware technologies to harm
target
Malware-Trojan
Trojan Horses
Program that looks benign, but has malicious intent
Man-In-The-Middle-Attack Spyware
Types of DoS:
SYN Flood
Smurf Attack
The Ping of Death
Distributed Reflection Denial of Service
Denial of Services
SYN Flood
https://youtu.be/sLbihU82x7s
Denial of Services
Smurf Attack
The attacker first sends an ICMP echo request packet
to the intermediary’s IP broadcast addresses.
The intermediary’s network will receive this request
packet and will send an ICMP echo reply packet back
and cause the network congested and outages
How to attack?
1. Sends a large number of ICMP ECHO Request or
ping packets to the victim.
2. The victim responds with ICMP Echo Reply packets
3. Both the victim’s incoming and outgoing bandwith
are used
Example : ping x.x.x.x –l 64000 –w 0 -t
Denial of Services
The Ping of Death
Two Types of PoD:
UDP Flood
Variation to the PoD that targets open ports
Faster due to no acknowledgements required
Sends packets to random ports
If enough are sent, the target computer shuts down
TCP Flood
Another name for the ping flood
Denial of Services
The Ping of Death
How to mitigates ?
Ensure that systems are patched and up to date
Most current operating systems automatically drop
oversized packets
Denial of Services
Distributed Reflection Denial of Services
Mitigation ?
Configure routers to not forward broadcast
How to attack
packet
Denial of Services
DoS Tools
Tools are downloadable from the Internet
Ease of access facilitates widespread use
Most prevalent:
Low Orbit Ion Cannon – TCP, UDP, HTTP Flooding
XOIC
3 Modes : Send Message, Execute Brief Test,
DoS Attack
put in the target URL or IP address and then
begin the attack.
Tribal Flood Network (TFN2K)
Used in UDP, ICMP, and TCP SYN Flood
attacks
Denial of Services
How to Defend Against DoS Attack
Impact to Victims
Transfer money, buy item
Indeintity theft,
How to defend ?
Change password and demanding ransom
Large Scale – can get access to company Single Sign Encryption is the only way to combat this type
of attack – Use https to encrypt all session
On (SSO) applications traffics
Summary
Most common network attacks:
Session hacking
Virus and Trojan horse attacks
Denial of Service/Distributed Denial of
Service
Buffer overflow
Explanation of how these attacks take place
has been outlined
Summary
Basic defenses against these types of attacks
Virus protection software
Router configuration
Smart e-mail policies and procedures
Monitor network traffic
Maintain a current patch policy to keep
systems
up to date with security patches
Prevent Denial of Service attacks
Use of Proxy servers
Established policies on maintenance
Keep systems up to date with latest patches
Summary
Defend against Trojan horse and virus
attacks:
Have an established policy for email
attachments
and downloading software
Do not open unknown attachments
Strictly monitor software downloads and what
can be
downloaded
Defend against buffer overflow attacks
Routinely update systems
Keep security patches up to date