0% found this document useful (0 votes)
32 views29 pages

Chapter 2 Types of Attack

Uploaded by

2023801962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views29 pages

Chapter 2 Types of Attack

Uploaded by

2023801962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

ITT320 INTRO TO

COMPUTER SECURITY

Chapter 2 : Types of Attack


Zulazeze Sahri, UiTM
Objectives

• Describe the most common computer and network attacks


• Explain how these attacks are executed
• Malware
• Denial of Service attacks
• Cyber Stalking, Fraud and Abuse
• Phishing
• Man-in-the-Middle Attack / Session Hacking
• SQL Injection / XSS Attacks
• Zero-Day-Exploit
• Buffer Overflow
Introduction to Cyber Attacks
Cyber attack hits businesses everyday. Hence, there are two
types of businesses, those that have been attacked and those
who don’t yet been hacked.

Cybercrime has increased every year as attacker try to take


advantages to the system vulnerabilities that the companies
do not aware.

Therefore, we need to keep in mind with the existing of


cyber attack and threats, keep the vulnerability management
in place and know how to defend our system.
Malware

Malware is the term refers to Malicious Software, that breaches computer and network
through vulnerabilities, user click dangerous email attachment and links, and install risky
software.

• Once you have been infected, Malware can do the following:


– Block access to files, folders and key components of network
– Installs other or additional harmful software (Backdoor)
– Taking control of your machine
– Monitor your actions and keystroke
– Gain confidential data and send to the attacker’s home base
– Disrupt certain system components and make system failure
Malware - Viruses
• There are number types of Malware :

Viruses – a program that self-replicates, growth and rapidly spread and infected the entire network.

 Most common threats to network, infected, copying itself and becoming part of the another
program

 Example of Viruses
• Ransomware
• Fake Windows Updates / AV
• Gameover Zeus
• Rombertik
• And More..
Malware-Worm

Program that able to self-replicate and can spread copies for themselves
(Modified)
Virus vs Worm – Worm operate more independently; virus depends on a host
program to spread itself.

Characteristic of Worm :
 Standalone software
 Do not require human intervention (execute) to run the attack and propagate
 Fast spread by exploit a vulnerability on the target system
 Advanced worm – encryption, wipers, and ransomware technologies to harm
target
Malware-Trojan

Trojan Horses
Program that looks benign, but has malicious intent

The Trojan may cause:


 Download harmful software
 Install a key logger or other spyware
 Delete files
 Open a backdoor for hacker to use
Malware-Trojan

Example of the latest Trojan for 2020:


Malware-How to

Viruses Propagate in two ways:


 Scanning computer for network connections
 Reading e-mail address book and sending to all

Protecting Against Virus Attacks:


 Always use virus scanner software
 Do not open unknown attachments
 Establish a code word with friends and colleagues
 Do not believe security alerts sent to you
 keep current with all OS and application updates and patches
Others …

Brainstorm – Take 5 and Find-Out


SQL Injection
Cyber Stalking, Fraud
and Abuse XSS

Phishing ? OWASP TOP 10 VUL

Man-In-The-Middle-Attack Spyware

Zero Day Attack Rootkit


Denial of Services

One of most common and simplest forms of


attack.

Based on the premise that all computers have


operational limitations

Utilizes the ping utility to execute the attack


Denial of Services

 Denial of Service (DoS) in action –to prevent


legitimate access to your system / website /
network ( one attacker )

 Distributed Denial of Service (DDoS) –


Launched from multiple attackers / Zombies / bots
Multi-national / Gigabytes of data sent
Denial of Services

Types of DoS:
 SYN Flood
 Smurf Attack
 The Ping of Death
 Distributed Reflection Denial of Service
Denial of Services
SYN Flood

A form of denial-of-service attack in which an attacker


sends a succession of SYN requests to a target's system
in an attempt to consume enough server resources to Normal Handshake
make the system unresponsive to legitimate traffic

Takes advantage of the TCP handshake process

3-way TCP handshake:


1. The client requests a connection by sending a SYN (synchronize) message to the server. SYN Flood
2. The server acknowledges this request by sending SYN-ACK back to the client.
3. The client responds with an ACK, and the connection is established.
Denial of Services
SYN Flood
A properly configured firewall can prevent the SYN flood attack.

The basic defensive techniques are as follows:


 Micro Blocks -
 SYN Cookies
 RST Cookies
 Stack tweaking

https://youtu.be/sLbihU82x7s
Denial of Services
Smurf Attack
The attacker first sends an ICMP echo request packet
to the intermediary’s IP broadcast addresses.
The intermediary’s network will receive this request
packet and will send an ICMP echo reply packet back
and cause the network congested and outages

Very popular attack Utilizes the ICMP packet to execute


the attack

Graphic to the right illustrates this type of


attack
Denial of Services
The Ping of Death
Attacks machines that cannot handle
oversized packets  cause the victim’s system crash

How to attack?
1. Sends a large number of ICMP ECHO Request or
ping packets to the victim.
2. The victim responds with ICMP Echo Reply packets
3. Both the victim’s incoming and outgoing bandwith
are used
Example : ping x.x.x.x –l 64000 –w 0 -t
Denial of Services
The Ping of Death
Two Types of PoD:

UDP Flood
 Variation to the PoD that targets open ports
 Faster due to no acknowledgements required
 Sends packets to random ports
 If enough are sent, the target computer shuts down

TCP Flood
Another name for the ping flood
Denial of Services
The Ping of Death

How to mitigates ?
 Ensure that systems are patched and up to date
 Most current operating systems automatically drop
oversized packets
Denial of Services
Distributed Reflection Denial of Services

Special kind of DoS

 Uses Routers to execute the DoS attack


 Routers do not have to be compromised in
order to execute the attack

Mitigation ?
 Configure routers to not forward broadcast
How to attack
packet
Denial of Services
DoS Tools
 Tools are downloadable from the Internet
 Ease of access facilitates widespread use
 Most prevalent:
 Low Orbit Ion Cannon – TCP, UDP, HTTP Flooding
 XOIC
 3 Modes : Send Message, Execute Brief Test,
DoS Attack
 put in the target URL or IP address and then
begin the attack.
 Tribal Flood Network (TFN2K)
 Used in UDP, ICMP, and TCP SYN Flood
attacks
Denial of Services
How to Defend Against DoS Attack

 SYN, RST Cookies, Micro Blocks, etc.


 Need to understand how attack is perpetrated
 Configure firewall to disallow incoming protocols
or all traffic
 This may not be a practical solution
 Disable forwarding of directed IP broadcast
packets on routers
Denial of Services
How to Defend Against DoS Attack

 Maintain virus protection on all clients on your


network
 Maintain operating system patches
 Establish policies for downloading software
Buffer Overflow Attack
Defending Against Buffer Overflow Attacks

 More common than DoS a few years ago


 Still a very real threat
 Designed to put more information in the
buffer than it is meant to hold Extra Data will be loaded into memory
on the target machine
 Application design can reduce this threat
More difficult to execute How do they occur?
What do Script viruses have to do with
buffer overflows?
 The graphic illustrates what happens in a Read More at
Buffer overflow attack https://www.cloudflare.com/learning/secur
ity/threats/buffer-overflow/
IP Spoofing
Defending Against IP Spoofing

The creation of Internet Protocol (IP) packets which


have modified source address in order to hide the
identity of the sender or impersonate another
computer system or both.

 Used to gain unauthorized access to


How to defend ?
computers
 DDoS attacks will often utilize spoofing Packet filtering – examines incoming
packets and looks at their source header, if
don’t match with their origin, the packets
are rejected.
Session Hacking
Defending Against Session Hacking

 The hacker takes over a TCP session


 Most common is the “man-in-the-middle”
Can also be done if the hacker gains access
to the target machine

 Impact to Victims
 Transfer money, buy item
 Indeintity theft,
How to defend ?
 Change password and demanding ransom
 Large Scale – can get access to company Single Sign Encryption is the only way to combat this type
of attack – Use https to encrypt all session
On (SSO) applications traffics
Summary
Most common network attacks:
 Session hacking
 Virus and Trojan horse attacks
 Denial of Service/Distributed Denial of
Service
 Buffer overflow
 Explanation of how these attacks take place
has been outlined
Summary
Basic defenses against these types of attacks
 Virus protection software
 Router configuration
 Smart e-mail policies and procedures
 Monitor network traffic
 Maintain a current patch policy to keep
systems
up to date with security patches
Prevent Denial of Service attacks
 Use of Proxy servers
 Established policies on maintenance
 Keep systems up to date with latest patches
Summary
Defend against Trojan horse and virus
attacks:
 Have an established policy for email
attachments
and downloading software
 Do not open unknown attachments
 Strictly monitor software downloads and what
can be
downloaded
 Defend against buffer overflow attacks
 Routinely update systems
 Keep security patches up to date

You might also like