Attacks Flashcards
Attacks
Zero-day vulnerability
Zero-day vulnerability- vulnerability known before patch is available
Zero-day exploit
Zero-day exploit- refers to existence of exploit code for a vulnerability that has yet to be patched
Session hijacking
Session hijacking- seizing control of an existing network session
MITM
MITM (Man/monkey in the middle)- places attacker between the system and the victim
o Attacker spoofs (masquerades as endpoint), sniffing traffic, then inserts a malicious system into the middle
Virus
Virus- A piece of malicious code that often attaches onto executable code. Needs a host in which to live, and an action by the user to spread.
o Macro virus- macro language; eg MS Doc
o Boot sector virus- loads at startup
o Stealth virus- hides itself
o Polymorphic virus- changes its signature on infection
o Multipartite virus- spreads via multiple vectors
Worm
Worm- self propogate and spread without user interaction
Trojan Horse
Trojan Horse- provides user with a desired functionality as well as an unknown malicious functionality. It often provides a persistent backdoor access
Rootkits
Rootkits- designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer;
replaces portions of the kernel or OS;
user-mode rootkit operates in ring 3
DoS
DoS Denial of Service: The purpose of these attacks is to overwhelm a system and disrupt its availability
DDoS
DDoS Distributed Denial of Service: Characterized by the use of Control Machines (Handlers) and Zombies (Bots).
An attacker uploads software to the control machines, which in turn commandeer unsuspecting machines to perform an attack on the victim.
The idea is that if one machine initiating a denial of service attack, then having many machines perform the attack is better.
Land attack
LAND (Local Area Network Denial) attack is a DoS attack that consists of sending a special poison spoofed SYN packet where source and destination are the same to a computer, causing it to lock up.
SMURF
SMURF: A variation of the ICMP flood attack where Echo Requests with the intended victim’s spoofed source IP are broadcast to a computer network using an IP Broadcast address.
Counter Measures:- Disabled ICMP on perimeter systems.- Use packet filtering and stateful inspection
Syn Flood
Syn Flood: Type of attack that exploits the three way handshake of TCP (SYN, SYN-ACK, ACK). Layer 4 attack.
Stateful firewall is needed to prevent; Limit the allowed number of half-open; connections; Reduce amount of time before half-open connections are purged.
Fraggle
Fraggle: Similar to Smurf, but uses UDP instead of ICMP. Layer 4 attack.
Mitigate by blocking distributed broadcasts on routers
ICMP Flood
ICMP Flood: Large numbers of ICMP packets are sent to the target to consume resources.
Counter Measures: ICMP should be disabled across perimeter systems.
Teardrop
Teardrop Attack: The length and fragmentation offset fields of sequential IP packets are modified, causing the target system to become confused and crash.
Can also be used to let one fragment overlap another and change the TCP header which can be used to change the connection type from HTTP to Telnet, for example.
Counter measure: Employ filter device that performs virtual packet reassembly
Ping of death
Ping of death- malformed ICMP echo request that is larger than Maximum Transmission Unit (MTU) size of IP packet
Ping Flooding
Ping Flooding: Overwhelming a system with a multitude of pings.
Buffer Overflow
Buffer Overflow: Attacks that overwhelm a specific type of memory on a system’s buffers.
Is best avoided with input validation
Bonk
Bonk : Similar to the Teardrop attack. Manipulates how a PC reassembles a packet and allows it to accept a packet much too large
UDP Flood
UDP Flood: Large numbers of UDP packets are sent to the target to consume resources.
Counter Measures: Using a router to filter UDP and drop UDP traffic if UDP is not a required service.
DNS reflection
DNS reflection- (like smurf) leverages third party; directs many poorly configured DNS servers to query an attacker controlled DNS, causing the third-party DNS to cache large DNS records. Attacker then requests all large DNS query records be sent to the victim.
Steganography
Steganography: Attempts to conceal data by hiding it. Used by placing information in graphics, sound files or document headers
Password Cracking types
Password Cracking
o Dictionary attack- try common passwords
o Brute force- all combinations
o Hybrid attack- combination
o LanMan hashes- compromised MS hashing function
o Rainbow tables- matches hashes to passwords