Chapter 2: Application and Network Attacks Flashcards

1
Q

Web Application Attacks

A

Issues: Web application attacks target content of HTTP traffic which is typically ignored by traditional network security devices.
Most web traffic is based on HTTP so the option to block HTTP is not available since it would prevent access to and from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Web Attacks

A

Cross-Site Scripting (XSS)
Injects scripts into a Web application server that will then direct attacks at the clients.
It does not attempt to maliciously attack a Web application server to steal content or deface it.
Uses the server as a platform to launch attacks on other computers that access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cross-Site Scripting (XSS)

A

How does it work?
Web browsers will execute any code sent from a Web site in the form of JavaScript, Hypertext Markup Language(HTML) and proprietary conent (Adobe Flash).
Web site must accept user input without validating it.
Must use that input in a response without encoding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross-Site Scripting (XSS)

A

Persistent attack:
Mallory posts a message with malicious payload to a social network.
When Bob reads the message, Mallory’s XSS steals Bob’s cookie.
Mallory can now hijack Bob’s session and impersonate Bob.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL Injection

A

Targets SQL servers by injecting commands.
Structured Query Language (SQL)
Used to view and manipulate data that is stored in a relational database.
Happens when input is not filtered
Example:
Option to recover or reset a forgotten password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XML Injection

A

Extensible Markup Language (XML)
Designed to carry data instead of indicating how to display it. (HTML displays).
XML does not have predefined set of tags
Similar to a SQL injection since it attacks a Web site that does not filter user data.
Allows us to manipulate XML tags and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command Injection/Directory Traversal

A

Users that access a server are typically held at the root directory.
Users can sometimes access directories and files beneath the root(in this case root means default) directory but cannot access other parallel or higher level directories
Example: IIS C:\Inetpub\wwwroot
Linux /var/www

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Command Injection/Directory Traversal II

A

Directory Traversal: Takes advantage of vulnerability in the Web application program or the Web server software so that the user can move from the root directory to other restricted directories.
Once they get into a different directory they may be able to inject commands to execute on the server.
Example:
https://www.server.net/dynamic.asp?view=display.html
This example is calling for a specific file, by modifying the URL we can delve deeper and possibly gain access to other documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client-Side Attacks

A

Considered client-side as opposed to web based attacks which are server side.
What does this mean though?
Attacks that are exploiting services
Targets vulnerabilities in client applications that interact with a compromised server or process malicious data.
Attackers identify a vulnerable Web server then inject content by exploiting the server through vulnerable scripting applications. (usually written in JavaScript).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Header Manipulation

A

HTTP Header: Part of an HTTP packet that is composed of fields that contain the different characteristics of the data being transmitted.
Header fields are the field name, a colon, and the field value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cookies and Attachments

A

First-party cookie: Created from the Web site that a user is currently viewing. Whenever the user returns to the site, that cookie would be used by the site to view the user’s preferences and better customize the browsing experience.
Third-party cookie: Attempting to place additional cookies on the local hard drive. Often come from third parties that advertise on the site and want to record the user’s preferences.(Tailored advertising).
Session cookie: Stored in RAM, instead of on the hard drive, and only lasts for the duration of visiting the Web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cookies and Attachments ll

A

Persistent cookie: Opposite of a session cookie, also known as a tracking cookie.
Secure cookie: Only used when a browser is visiting a server using a secure connection. Cookie is always encrypted when transmitting from the client browser to the Web server.
Flash cookie: (Adobe Flash) Also known as local shared objects(LSO’s). Significantly different from regular cookies. Can’t be deleted through the browsers normal settings. Larger than normal cookies, can reinstate regular cookies that a user has deleted or blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Session Hijacking

A

User accessing a secure Web application can be verified to prevent an attacker from “Jumping In” to the interaction and ordering items that could be charged to the victim but are sent to another address.
This is known as a session token. It is comprised of a random string assigned to the users specific session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Session Hijacking ll

A

What is it?
When an attacker attempts to impersonate the user by using the victim’s session token.
How is it done?
The attacker can eavesdrop on the transmission and steal the session token.
The attacker can steal the session token cookie from the victim’s computer and use it to impersonate the victim.
The attacker can attempt to guess the session token. Session token’s aren’t always random, so an attacker could accumulate session tokens to aid guessing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious Add-ons

A

ActiveX: Widely used add-ons for Windows computers
A method to make programs interactive using a set of rules and controls
Security concerns:
No internal controls to prevent them from reading from or writing to the local hard drive
Control is registered only once per computer. If multiple users on one computer it can affect all users.
Does not rely on IE, can be installed and executed independently. Third party application may not provide security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Buffer Overflow Attacks

A

Occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
This extra data overflows into the adjacent memory locations and under certain conditions may cause the computer to stop functioning.
How does it work:
Changing the “return address” to point to another area in the data memory area that contains the attacker’s malware code instead.

17
Q

Network Attacks

A

Next Subject

18
Q

Denial of Service (DoS)

A

Attempts to prevent a system from performing its normal functions.
Deliberate attempt to prevent authorized users from accessing the system.
Low Orbit Ion Cannon is a DoS tool

19
Q

Denial of Service ll

A

Common types of DoS Attacks:

Sends an ICMP echo request message to a host, host then responds with an ICMP echo response message.
This happens by sending a large number of echo requests

20
Q

Denial of Service lll

A

Smurf Attacks: An attacker broadcasts a ping request to all computers on the network but changes the address from which the request came.

21
Q

Denial of Service llll

A

SYN flood attack: Takes advantage of the procedures for initiating a session.

22
Q

Interception

A

Next Subject

23
Q

Man-In-The-Middle

A

Makes it appear that two computers are communicating with each other, when actually they are sending and receiving data with a computer between them.
Can be Active or Passive:

24
Q

Replay

A

Similar to a passive man-in-the-middle attack.

Makes a copy of the transmission immediately, then sends it onward.

25
Q

Poisoning

A

Next Subject

26
Q

ARP Poisoning

A

TCP/IP requires that logical IP addresses be assigned to each host on a network.
LAN uses the MAC to send packets, in order for a host using TCP/IP on an Ethernet network to find the MAC address of another device based on the IP address, it uses ARP (Address Resolution Protocol).
A table matching MAC to IP addresses
Stored in the ARP cache for future reference.
Other devices that hear the ARP reply will also cache the info

27
Q

ARP Poisoning ll

A

Attack can modify the MAC address in the ARP cache

This means that they can point a corresponding IP address to a different computer.

28
Q

DNS Poisoning

A

Substitutes DNS addresses so that the computer is automatically redirected to another device.

29
Q

DNS Poisoning ll

A

Process:
Attacker sends a request to a valid DNS server asking it to resolve a fake site
DNS server asks the responsible name server which is the attackers server for the address
Attackers server sends the address for that DNS record but all of its false records as well.
Requests to the DNS server are now corrupted