01 Network Attacks and Defense Strategies Flashcards
(88 cards)
Threat Sources
List each threat source
- Natural: Floods, fires, power failure
- Unintentional: unskilled admin, accidents, lazy/untrained employee
- Intentional
Define Threat Actor
Individual or group that breaks into the system to achieve a specific goal.
List types of Threat Actors
- Hacktivist: Promotes political agenda
- Cyber Terrorist: motivated by religious or political beliefs.
- Suicide Hacker: aims to bring down infrastructure for a “cause”. Not deterred by jail time.
- State Sponsored Hacker: employed by gov to hack other gov.
- Script kiddies: unskilled hacker who use tools made by real hackers.
- Industrial Spies: Attack companies for commercial purpose.
- Insider Threat: Threat that originates from people within org.
Vulnerability
Existing weaknesses in assets that can be exploited.
Which TCP/IP Protocols are inherently insecure?
HTTP (Hyper Text Transfer Protocol) FTP (File Transfer Protocol) ICMP (Internet Control Message Protocol) SNMP (Simple Network Management Protocol) SMTP (Simple Mail Transfer Protocol)
What is IIS?
Internet Information Services
List the Network Security Vulnerabilities of a Configuration:
- User account Vuln: sending user/pass over unencrypted network.
- System Account Vuln: Setting weak passwords for user accounts.
- Internet Services Misconfig: Misconfig of services such as Apache, IIS, enabling JavaScript, FTP.
- Default Password Settings
- Network Device Misconfig: Improper setup of network devices such as routers.
List the Network Security Vulnerabilities of a Security Policy:
- Unwritten Policy
- Lack of Continuity: in implementing & enforcing the policy
- Politics: challenges for implementation of a consistent security policy.
- Lack of awareness: of the security policy
What is Risk?
The potential loss or damage that can occur when there is a threat to an asset in presence of an exploitable vulnerability.
What formula represents Risk?
Risk = Asset + Threat + Vulnerability
What is an ATTACK?
An action initiated for exploiting vulnerabilities to actualize a threat.
What formula represents an ATTACK?
Attack = motive (goal) + Method (TTPs) + vulnerability
Define TTP’s
Tactics, techniques, & Procedures.
What is a MOTIVE?
Originates from the notion that the target system stores or processes something of value.
What techniques can attackers use in the recon phase to obtain information?
- Social Engineering
- Port Scanning
- DNS footprinting
- Ping Sweeping
What Network information is obtained from recon?
- Domain Names
- Internal Domain Names
- Network Blocks
- IP addresses of reachable systems
- Rogue/private websites
- open ports
- versions of OS
- Running TCP & UDP services
- Access Control Mechanisms & Access Control Locations (ACM/ACL)
- Network Protocols
- VPN Points
- Running Firewalls
- Analog/digital #’s
- Authentication mechanisms
- System Enumeration
What is a network sniffing attack?
is a process of monitoring & capturing all data packets passing through a network.
Man-in-the-Middle Attack
- Intruder deploys a station between client & server
- The TCP connection is split into 2 connections: 1. Client to attack connection 2. attacker to server connection.
- Enables intruder to read, modify & insert fraudulent data into the TCP connection.
TCP
Transmission Control Protocol
Password Attack
Attacker uses techniques such as: -brute force, -social engineering -Spoofing -Phishing -Malware -Sniffing -Keylogging to crack or obtain the password
Privilege Escalation Attack
Attacker gains access to a network using a non admin account, and escalates privileges to become admin.
The attacker exploits design flaws, programming errors, bugs, and configuration oversight in the OS or app to gain admin access.
2 Types of Privilege Escalation:
- Vertical privilege escalation: shifting from a user account to an account with higher privileges.
- Horizontal privilege escalation: Shifting from one user account to another with same privileges.
DNS Poisoning Attack
- Manipulation of IP addresses in the DNS cache
- A corrupt DNS redirects user requests to a malicious website/resource.
ARP
Address Resolution Protocol