Chapter 2 - Access Control Attacks Flashcards
Access Control Attacks
Several methods can be used to attack a system’s access control mechanism as a means for gaining access to the system. Usually, the motivation for such an attack is to steal information, alter information, or gain access to functions. Persons who desire to launch an attack usually do not possess a working userid and password, so they must resort to an attack in order to access the desired information or function.
The types of attacks include:
- Buffer overflow
- Script injection
- Data remanence
- Denial of service
- Dumpster diving
- Eavesdropping
- Emanations
- Spoofing and masquerading
- Social engineering
- Phishing, spear phishing, and - whaling
- Pharming
- Password guessing
- Password cracking
Buffer overflow
A buffer overflow attack is an attempt to cause a malfunction of an application by sending more data to a program than it was designed to handle properly, causing the program to malfunction or abort. If a program does not properly check input data, a too-long input string can fill the input buffer and overwrite other memory locations in the program.
Script Injection
A script injection attack (also known as code injection) is similar to a buffer overflow attack. Script injection occurs when software programs do not parse input data for script commands, and they inadvertently execute the script commands in subsequent processing steps.
A common form of script injection is known as SQL injection, whereby specially crafted SQL statements can be inserted into an input field, causing the database server on the back end to execute the injected SQL statements.
Data Remanence
Data remanence refers to data that remains on a storage device, often unintentionally.
Data can remain on a device even after a user “removes” the data. This data can fall into the hands of others, sometimes to the detriment of the original owner of the data.
Denial of Service
An attack that disables a service or makes it unreachable to its users is a denial-of-service (DoS) attack. There are two primary ways of carrying out a DoS attack:
- Sending a flood of messages to a service that is so heavy that legitimate use of the service is all but impossible.
- Sending specially crafted messages that cause the application or service to malfunction or abort, making it unavailable for legitimate users.
Dumpster Diving
Some organizations are not careful about the printed matter that they discard. They throw documents containing sensitive information into recycling or trash bins. Someone who attempts to find discarded documents in the trash is dumpster diving.
Eavesdropping
Eavesdropping takes many forms, but the effect is the same: people who desire sensitive information will attempt to obtain it by observing communications:
- Network Sniffing
- Wireless Network sniffing
- Key logging
- Shoulder surfing
- Mobile calls and conversations in public spaces
Emanations
Computer and network hardware devices employ high-speed electronics that can emanate
electromagnetic radiation (EMR). Sometimes these emanations contain data that can be sensitive in nature. Three examples of EMR emanations are:
- Network cabling.
- Computer monitors
- Processor chips
Spoofing and Masquerading
An attack can be successful if the attacker pretends to be someone (or something) they are not. Weaknesses in the TCP/IP protocol make it fairly easy for a system to create messages that claim to be originating from any IP address. This spoofing can fool the target system into thinking that the messages are originating from a trusted system instead of from an untrusted system.
Social Engineering
Social engineering is a form of manipulation and psychological manipulation that cybercriminals and malicious actors use to deceive individuals or organizations into divulging confidential information, performing certain actions, or making security-related mistakes. It relies on human psychology and social interactions rather than technical exploits to achieve its goals.
Phishing
Phishing is a cyberattack technique in which malicious actors use deceptive tactics to trick individuals into revealing sensitive information, such as usernames, passwords, credit card numbers, or other personal data. Phishing attacks typically involve impersonating trusted entities or organizations, such as banks, government agencies, social media platforms, or reputable companies, to manipulate victims into taking actions that benefit the attackers.
Pharming
Pharming is a cyberattack technique that involves redirecting or manipulating the domain name system (DNS) or other means to lead users to a fraudulent website without their knowledge or consent. The goal of pharming attacks is to deceive users into visiting malicious websites that often mimic legitimate ones. Once on these fraudulent websites, victims may unwittingly provide sensitive information, such as login credentials, personal data, or financial information, to cybercriminals.
Password Guessing
Password guessing is a manual or automated technique in which an attacker attempts to log into a user’s account by trying different passwords until the correct one is discovered. This is often done by trying common or likely passwords based on the user’s information or patterns.
Password Cracking
Password cracking is the process of using automated tools and techniques to systematically test a large number of possible passwords in an attempt to guess the correct one. Unlike password guessing, which relies on the attacker’s knowledge, password cracking often involves dictionary attacks, brute force attacks, or other sophisticated methods.
Malicious Code
Malicious code, also known as malware, refers to any software or code intentionally designed and written with malicious intent to harm, compromise, or exploit computer systems, networks, or users’ devices. Malware is a broad category that encompasses various types of malicious software, and its purpose can range from stealing sensitive information to disrupting computer operations or even damaging hardware