01 Network Attacks and Defense Strategies Flashcards
Threat Sources
List each threat source
- Natural: Floods, fires, power failure
- Unintentional: unskilled admin, accidents, lazy/untrained employee
- Intentional
Define Threat Actor
Individual or group that breaks into the system to achieve a specific goal.
List types of Threat Actors
- Hacktivist: Promotes political agenda
- Cyber Terrorist: motivated by religious or political beliefs.
- Suicide Hacker: aims to bring down infrastructure for a “cause”. Not deterred by jail time.
- State Sponsored Hacker: employed by gov to hack other gov.
- Script kiddies: unskilled hacker who use tools made by real hackers.
- Industrial Spies: Attack companies for commercial purpose.
- Insider Threat: Threat that originates from people within org.
Vulnerability
Existing weaknesses in assets that can be exploited.
Which TCP/IP Protocols are inherently insecure?
HTTP (Hyper Text Transfer Protocol) FTP (File Transfer Protocol) ICMP (Internet Control Message Protocol) SNMP (Simple Network Management Protocol) SMTP (Simple Mail Transfer Protocol)
What is IIS?
Internet Information Services
List the Network Security Vulnerabilities of a Configuration:
- User account Vuln: sending user/pass over unencrypted network.
- System Account Vuln: Setting weak passwords for user accounts.
- Internet Services Misconfig: Misconfig of services such as Apache, IIS, enabling JavaScript, FTP.
- Default Password Settings
- Network Device Misconfig: Improper setup of network devices such as routers.
List the Network Security Vulnerabilities of a Security Policy:
- Unwritten Policy
- Lack of Continuity: in implementing & enforcing the policy
- Politics: challenges for implementation of a consistent security policy.
- Lack of awareness: of the security policy
What is Risk?
The potential loss or damage that can occur when there is a threat to an asset in presence of an exploitable vulnerability.
What formula represents Risk?
Risk = Asset + Threat + Vulnerability
What is an ATTACK?
An action initiated for exploiting vulnerabilities to actualize a threat.
What formula represents an ATTACK?
Attack = motive (goal) + Method (TTPs) + vulnerability
Define TTP’s
Tactics, techniques, & Procedures.
What is a MOTIVE?
Originates from the notion that the target system stores or processes something of value.
What techniques can attackers use in the recon phase to obtain information?
- Social Engineering
- Port Scanning
- DNS footprinting
- Ping Sweeping
What Network information is obtained from recon?
- Domain Names
- Internal Domain Names
- Network Blocks
- IP addresses of reachable systems
- Rogue/private websites
- open ports
- versions of OS
- Running TCP & UDP services
- Access Control Mechanisms & Access Control Locations (ACM/ACL)
- Network Protocols
- VPN Points
- Running Firewalls
- Analog/digital #’s
- Authentication mechanisms
- System Enumeration
What is a network sniffing attack?
is a process of monitoring & capturing all data packets passing through a network.
Man-in-the-Middle Attack
- Intruder deploys a station between client & server
- The TCP connection is split into 2 connections: 1. Client to attack connection 2. attacker to server connection.
- Enables intruder to read, modify & insert fraudulent data into the TCP connection.
TCP
Transmission Control Protocol
Password Attack
Attacker uses techniques such as: -brute force, -social engineering -Spoofing -Phishing -Malware -Sniffing -Keylogging to crack or obtain the password
Privilege Escalation Attack
Attacker gains access to a network using a non admin account, and escalates privileges to become admin.
The attacker exploits design flaws, programming errors, bugs, and configuration oversight in the OS or app to gain admin access.
2 Types of Privilege Escalation:
- Vertical privilege escalation: shifting from a user account to an account with higher privileges.
- Horizontal privilege escalation: Shifting from one user account to another with same privileges.
DNS Poisoning Attack
- Manipulation of IP addresses in the DNS cache
- A corrupt DNS redirects user requests to a malicious website/resource.
ARP
Address Resolution Protocol
ARP Poisoning Attack
ARP spoofing/poisoning involves sending a large # of forged entries to the target machines ARP cache.
DHCP
Dynamic Host Configuration Protocol
-Assigns valid IP addresses to host systems out of pre-assigned DHCP pool
DHCP Starvation Attack
- Process of inundating DHCP servers with fake DHCP requests and using up all available IP addresses
- This results in a DoS attack where the DHCP server cannot issue new IP addresses to genuine host requests.
- New clients cannot obtain access to the network resulting in a DHCP starvation attack.
DHCP DORA
DISCOVER, OFFER, REQUEST, ACKNOWLEDGE
-Stands for the message flows between the client and server.
How does a DHCP server assign IP addresses to clients?
Dynamically
DNS Spoofing Attack
- Attacker places a rogue DHCP server between the client and the real DHCP server.
- When a client sends a request, the rogue DHCP server intercepts the coms and acts as a DHCP server by replying with a fake IP address.
- This results in the client being diverted to the attackers system
MAC Spoofing Attack
- Launched by sniffing a network for MAC addresses of clients using a switch port, and re-using one of those addresses.
- By intercepting the network traffic, the attacker replicates a legitimate users MAC address to receive all the traffic intended for the specific user.
- Mac spoofing enables an attacker to gain access to the network by faking the identity of another user already on the network.
Network based DoS Attack:
Attacker floods the network with large amounts of traffic, exhausting the victims connection resources.
Types of DoS Attacks:
- TCP SYN Flooding
- UDP Flooding
- ICMP Smurf Flooding
- Intermittent flooding
UDP
User Datagram Protocol
DDoS Attack
- multitude of compromised systems attack a single target
- Causes financial loss and damage to reputation