Lec05 Vunerability and Attacks
Lec05 Vunerability and Attacks
AND ATTACKS
Vulnerability
Types of Vulnerabilities
Exposure
Common Vulnerabilities & Exposures
Attacks
TCP/IP attacks
Application attacks
DoS and DDoS
1.Vulnerability- lỗ hổng
3
SMTP(gửi email)
use of applications or services that can be
successfully attacked by brute force methods
Ex: use of 54 bits key for encryption
In order to have a strong handle on data
security issues that may potentially
impact your business, it is imperative to
understand the relationships of three
components:
Threat
Vulnerability
Risk
What is threat?
A threat refers to a new or newly discovered incident
that has the potential to harm a system or your
company overall. There are three main types of threats:
Natural threats, such as floods, hurricanes, or
tornadoes
Unintentional threats, like an employee
A vulnerability refers to
a known weakness of an asset (resource)
that can be exploited by one or more
attackers. In other words, it is a known
issue that allows an attack to succeed.
For example, when a team member resigns and
you forget to disable their access to external
accounts, change logins, or remove their names
from company credit cards, this leaves your
business open to both intentional and
unintentional threats.
Risk
Risk is defined as the potential for loss
or damage when a threat exploits a
vulnerability. Examples of risk include:
Financial losses-rủi ro tài chính
Loss of privacy-mất quyền riêng tư
Damage to your reputation-ảnh hưởng danh
tiếng
Legal implications- hệ quả pháp lí
Even loss of life-nguy hiểm tính mạng
4. CVE
13
Organization Name
CERT CA-96.06.cgi_example_code
ISS http-cgi-phf
Bugtraq PHF Attacks – Fun and games for the whole family
CERIAS http_escshellcmd
L-3 #180 HTTP Server CGI example code compromises http server
After CVE:
15
One Common Language
Description Name
ToolTalk (rpc.ttdbserverd) CVE-1999-0003
buffer overflow
Buffer overflow in in qpopper CVE-1999-0006
Vulnerability
Types of Vulnerabilities
Exposure
Threats, Vulnerability and Risk
Common Vulnerabilities & Exposures
Attacks << You are here
TCP/IP attacks
Application attacks
DoS and DDoS
Security Flaws in IP
The IP addresses are changed by the
originating host
Address spoofing
Using source address for authentication
r-utilities (rlogin, rsh, rhosts etc..)
2.1.1.1 C Can A claim it is B to the
•
server S?
•ARP Spoofing
Internet
Internet Can C claim it is B to the
•
1.1.1.3 S server S?
•Source Routing
A 1.1.1.1 1.1.1.2 B
Ping Flood
Use fake IP of
victim Internet
Internet
Attacking System
Broadcast
Broadcast
Enabled
Enabled
Network
Network
Victim System
Routing Attacks-tấn công
định tuyến
Distance Vector Routing
Announce 0 distance to all other nodes
Blackholetraffic
Eavesdrop
I’m fine
I’m fine
attacker
legimate users
Application Layer Attacks
Code Exploits
Use of poor coding practices left
uncaught by testing
Defense
Motivation Lockouts –
temporary and
Gain access to
permanent
system, faster Complex passwords
than brute force
Web Attacks: Source
Viewing
Method Detection
Read source code None
for valuable
information
Defense
Motivation None
Find passwords or
commented out
URL
Web Attacks: URL
Modification
Method Detection
Manipulating URL to Check website
find pages not URL logs
normally accessible
Motivation
Gain access to
Defense
normally private Add access
directories or pages requirements
Web Attacks: Post Data
Method Detection
Change post data None
to get desired
results
Defense
Motivation Verify post data
Change on receiving end
information being
sent in your favor
Web Attacks: Database
Attack
Method Detection
Sending Check database
dangerous for strange
queries to records
database
Defense
Motivation Filter database
Denial of service queries
Backdoors
Bypass normal means of authentication
Hidden from casual inspection
Installed separately or integrated into
software
Worms & Virus: File
Infectors
Method Detection
Infects Virus scan or
executables by strange computer
inserting itself behavior
into them
Motivation
Defense
Antivirus, being
Damage files and
cautious on the
spread internet
Worms & Virus: Boot-sector
virus
Method Detection
Replaces boot Virus scan or
loader, and strange computer
spreads to hard behavior
drive and floppies
Motivation Defense
Damage files and Antivirus, being
spread cautious on the
internet
Worms & Virus: Companion
Virus
Method Detection
Locates executables Virus scan or
and mimics names, strange computer
changing the behavior
extensions
Motivation Defense
Damage files and Antivirus, being
spread
cautious on the
internet
Worms & Virus: Macro Virus
Method Detection
Infects
documents, Virus
scan or
when document is strange computer
accessed, macro behavior
executes in
application
Defense
Motivation Antivirus,
being
Damage files and cautious on the
spread internet
Worms & Virus: Worms
Method Detection
Replicates Virus scan or
strange computer
behavior
Motivation Defense
Variable Antivirus, being
motivations cautious on the
internet
Logic Bomb
Method Detection
A logic bomb is a Strangecomputer
piece of code behavior
intentionally inserted
into a software system
that will set off a
malicious function
when specified
conditions are met
e.x: Time bomb
Defense
Keep and monitor
Motivation logs
Monitor computer
Revenge,
synchronized attack, systems closely
securing get away
Buffer Overflow
Method Detection
Passtoo much Logs
information to the
buffer with poor
checking
Defense
Check input size
Motivation before copying to
Modifyto buffer
information and/or Guard return address
execute arbitrary against overwrite
code Invalidate stack to
execute instructions
Phishing
Method Detection
Request Careful
information from a examination of
mass audience, requests for
collect response information
from a fake site
Motivation Defense
Gainimportant Distribute
on a
information need to know basis
Phishing: Example
Bots & Zombies
Method Detection
Installed by virus or Network analysis
worm, allow remote Virus scans
unreserved access to Notice unusual
the system behavior
A node in DDOS
attack
Defense
Install security
Motivation patches and be
Gain access to careful what you
additional resources, download
hiding your identity
Spyware, Adware, and Malware
Method Detection
Installedeither Network analysis
willingly by the user Abnormal computer
via ActiveX or as behavior
part of a virus
package
Defense
Virus
/ adware /
Motivation spyware / malware
Gain information scans
about the user
Serve users
advertisements
Hardware Keyloggers
Method Detection
Attachit to a Checkphysical
computer connections
Record your typing
Defense
Cameras and
Motivation guards
Record user names,
passwords, and other
private information
Social Engineering
Manipulate the weakest link of
cybersecurity
– the user – to gain access to otherwise
prohibited resources
• Consume bandwidth
– UDP floods
– ICMP floods
Denial of Service – tấn công
từ chối dịch vụ
Crashing the victim
Ping-of-Death
TCP options (unused, or used incorrectly)
Attacker
Handler Handler
Victim
Distributed DoS
The handlers are usually very high
volume servers
Easy to hide the attack packets
The agents are usually home users with
DSL/Cable
Already infected and the agent installed
Very difficult to track down the attacker
Tutorial
Vulnerability scanning using Nmap
Web vulnerability scanning using
Acunetix
Google hacking