Certified Ethical Hacker (CEHv13) Module 13 Hacking Web Servers

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

76 Terms

1
New cards

Web Server

A computer system that stores, processes, and delivers web pages to global clients via the Hypertext Transfer Protocol (HTTP)

2
New cards

Components of a Web Server

- Document Root

- Server Root (conf, logs, cgi-bin)

- Virtual Document Tree

- Virtual Hosting

- Web Proxy

3
New cards

Document Root

One of the root file directories of the web server that stores critical HTML files related to the web pages of a domain name

4
New cards

Server Root

The root directory for the web server configuration

5
New cards

Server Root Subdirectories

- conf

- logs

- cgi-bin

6
New cards

conf Directory

Server Root Subdirectory that contains the server configuration files

7
New cards

logs Directory

Server Root Subdirectory that contains the server logs

8
New cards

cgi-bin Directory

Server Root Subdirectory that contains common gateway interface (CGI) scripts or other server-side executables

9
New cards

Virtual Document Tree

Provides storage on a different machine or disk after the original disk becomes full

10
New cards

Virtual Hosting

Technique of hosting multiple domains or websites on the same server, allowing for the sharing of resources among various servers

11
New cards

Types of Virtual Hosting

- Name Based

- IP Based

- Port Based

12
New cards

Web Proxy

All requests from clients are passed on to the web server through the web proxies

13
New cards

Common Goals Behind Web Server Attacks

- Stealing credit-card details or other sensitive credentials using phishing techniques

- Integrating the server into a botnet to perform denial of service (DoS) or distributed DoS (DDoS) attacks

- Compromising a database

- Obtaining closed-source applications

- Hiding and redirecting traffic

- Escalating privileges

- For pure curiosity

- For completing a self-set intellectual challenge

- For damaging the target organization's reputation

14
New cards

Impact of Web Server Attacks

- Compromise of user accounts

- Website Defacement

- Root access to applications and server

- Secondary attacks from website

- Data tampering

- Data theft

- Damage of company reputation

15
New cards

Common Oversights for Web Server Security

- Failing to update the web server with the latest patches

- Using the same system administrator credentials everywhere

- Allowing unrestricted internal and outbound traffic

- Running unhardened applications and servers

- Providing complete error messages with server version information

- Using outdated SSL/TLS encryption algorithms

- Using third-party plugins in the web application

- Improper file and directory permissions

- Installing server with default settings

- Unnecessary services enabled, including content management and remote administration

- Security conflicts with the business' ease-of-use requirements

- Lack of proper security policy, procedures, and maintenance

- Improper authentication with external systems

- Default accounts with default or no passwords

- Unnecessary default, backup, or sample files

- Misconfigurations in the web server, OS, and networks

- Bugs in server software, OS, and web applications

- Misconfigured Secure Sockets Layer (SSL) certificates and encryption settings

- Administrative or debugging functions that are enabled or accessible on web servers

- Use of self-signed certificates and default certificates

- Not using a dedicated server for web services

- Granting excessive privileges to users or processes, or failing to implement the principle of least privilege.

16
New cards

Apache Web Server Architecture Components

- HTTP Client

- HTTP Server (Core)

- BMMTM Extensible Agent

- Application Server

17
New cards

HTTP Client

Browser or software that initiates requests to the web server

18
New cards

Apache HTTP Server (Core)

The core module handles HTTP(S) requests and responses

19
New cards

Apache HTTP Server (Core) Modules

- mod_auth

- mod_ssl

- mod_rewrite

- mod_proxy

20
New cards

Apache HTTP Server (Core) mod_auth Module

Manages user authentication

21
New cards

Apache HTTP Server (Core) mod_ssl Module

Provides SSL/TLS encryption to secure communication between the server and the clients

22
New cards

Apache HTTP Server (Core) mod_proxy Module

Functions as a proxy and gateway

23
New cards

Apache HTTP Server (Core) mod_rewrite Module

Enables URL rewriting, customized URLs, and redirection based on specified rules

24
New cards

Apache BMMTM Extensible Agent

Intercepts HTTP(S) requests and responses to gather detailed transaction data. It enhances monitoring and performance analysis by providing insights into the interactions between clients and servers.

25
New cards

Apache Application Server

Executes backend applications, processes data, and generates dynamic content, functioning separately from the web server that handles the HTTP requests

26
New cards

HTTP response splitting Vulnerability

Occurs when improperly validated input allows attackers to inject malicious headers into HTTP responses

27
New cards

mod_macro buffer over-read Vulnerability

Occurs when the mod_macro module improperly handles macro expansion, causing it to read beyond the buffer's end

28
New cards

DoS in HTTP/2 with initial window size 0 Vulnerability

Arises when an attacker sets the HTTP/2 initial window size to 0, which blocks the server from sending data

29
New cards

HTTP/2 stream memory not reclaimed right away on RST Vulnerability

Occurs when memory allocated for an HTTP/2 stream is not immediately freed upon receiving a stream reset (RST) frame.

30
New cards

DNS rebinding in import functionality Vulnerability

Occurs because of inadequate input validation in the import functionality of Apache Allura

31
New cards

Improper certificate validation Vulnerability

Arises from improper certificate validation in FTP_TLS connections of Apache Airflow

32
New cards

Internet Information Services (IIS)

A web server application developed by Microsoft, runs on a server and responds to browser requests. It supports HTTP, HTTP Secure (HTTPS), File Transfer Protocol (FTP), FTP Secure (FTPS), Simple Mail Transfer Protocol (SMTP), and Network News Transfer Protocol (NNTP).

33
New cards

Internet Information Services (IIS) Components

- Protocol listeners (known as HTTP.sys)

- World Wide Web Publishing Service (known as WWW service)

- Windows Process Activation Service (WAS)

34
New cards

IIS Trust boundary violation vulnerability

Results from inadequate separation of privilege boundaries

35
New cards

Nginx

A high-performance scalable web server, reverse proxy, and load balancer that operates on a master-worker architecture. It employs a single-threaded, event-driven, asynchronous, and non-blocking model to efficiently manage multiple connections.

36
New cards

Nginx Components

- Master Process

- Worker Process

- Proxy Cache (Cache Loader, Cache Manager)

- Web Server

- Application Server

- Memcache

37
New cards

Nginx Master Process

Responsible for reading and validating configuration files; creating, binding, and closing sockets; and managing worker processes. It performs administrative tasks and ensures that worker processes are properly configured and run efficiently.

38
New cards

Nginx Worker Process

Handle client requests by accepting connections, reading/writing data, and communicating with upstream servers

39
New cards

Nginx Proxy Cache

Stores copies of requested content, reduces backend server load, and speeds up response times by serving frequently accessed content directly from the cache memory. The Nginx cache quickly renders pages by retrieving them from the cache instead of the server.

40
New cards

Nginx Cache Loader

Loads cache metadata into memory at Nginx start-up, ensuring that the cache is ready to immediately serve requests. It scans the cache directories and initializes the in-memory cache structures.

41
New cards

Nginx Cache Manager

Periodically checks the cache for expired content and removes old or unused cache entries into free space

42
New cards

Nignx Web Server

Handles HTTP requests sent by clients, serving static content, and forwarding dynamic content requests to the application servers.

43
New cards

Nginx Application Server

Processes requests from clients by running server-side scripts or applications and delivers dynamic content to clients

44
New cards

Nginx Memcache

Serves as a caching layer that stores data in memory for the rapid retrieval of frequently accessed data

45
New cards

Domain Name System (DNS)

Resolves a domain name to its corresponding IP address

46
New cards

DNS server hijacking

The attacker compromises a DNS server and changes its mapping settings to redirect user's requests toward the attacker's rogue DNS server

47
New cards

Recursive DNS query

A method of requesting DNS mapping where the query goes through DNS servers recursively until it fails to find the specified domain name to IP address mapping

48
New cards

Recursive DNS Query Steps

Step 1: Users who desire to resolve a domain name to its corresponding IP address send a DNS query to the primary DNS server specified in its Transmission Control Protocol (TCP)/IP properties.

Steps 2-7: If the requested DNS mapping does not exist on the user's primary DNS server, the server forwards the request to the root server. The root server forwards the request to the .com namespace, where the user can find DNS mappings. This process repeats recursively until the DNS mapping is resolved.

Step 8: Ultimately, when the system finds the primary DNS server for the requested DNS mapping, it generates a cache for the IP address in the user's primary DNS server.

49
New cards

DNS Amplification Attack

Attacker exploits recursive DNS to perform a DDoS attack

50
New cards

DNS Amplification Attack Steps

Step 1: The attacker instructs compromised hosts (bots) to make DNS queries in the network.

Step 2: All the compromised hosts spoof the victim's IP address and send DNS query requests to the primary DNS server configured in the victim's TCP/IP settings.

Steps 3-8: If the requested DNS mapping does not exist on the victim's primary DNS server, the server forwards the requests to the root server. The root server forwards the request to the .com or respective top-level domain (TLD) namespaces. This process repeats recursively until the victim's primary DNS server resolves the DNS mapping request.

Step 9: After the primary DNS server finds the DNS mapping for the victim's request, it sends a DNS mapping response to the victim's IP address. This response goes to the victim because bots use the victim's IP address. The replies to copious DNS mapping requests from the bots result in DDoS on the victim's DNS server.

51
New cards

Directory Traversal

The exploitation of HTTP through which attackers can access restricted directories and execute commands outside the web server's root directory by manipulating a Uniform Resource Locator (URL)

52
New cards

Website Defacement

Refers to unauthorized changes made to the content of a single web page or an entire website, resulting in changes to the visual appearance of the web page or website

53
New cards

HTTP response-splitting attack

A web-based attack in which the attacker tricks the server by injecting new lines into response headers, along with arbitrary code

54
New cards

Web cache poisoning attack

An attacker swaps cached content for a random URL with infected content

55
New cards

HTTP/2 continuation flood attack

Involves exploiting the handling mechanism of HTTP/2 CONTINUATION frames to exhaust the target Apache server causing a DoS Attack

56
New cards

Front jacking

An attacker injects or manipulates the front-end components of a web application, such as scripts or HTML elements, to hijack a user interface or user interactions

57
New cards

Web Server Password Cracking Techniques

- Guessing

- Brute Force Attack

- Dictionary Attack

- Hybrid Attack

58
New cards

Guessing Password Attack

Attacker guesses possible passwords either manually or by using automated tools provided with dictionaries

59
New cards

Dictionary Password Attack

Uses a predefined file containing various combinations of words, and an automated program enters these words one at a time to check if any of them are the password

60
New cards

Brute Force Password Attack

All possible character combinations are tested

61
New cards

Hybrid Password Attack

Uses both a dictionary attack and brute-force attack

62
New cards

DoS/DDoS attack

Involves flooding targets with copious fake requests so that the target stops functioning and becomes unavailable to legitimate users

63
New cards

Man-in-the-Middle (MITM) Attack

Allows an attacker to access sensitive information by intercepting and altering communications between an end user and web servers

64
New cards

Phishing Attack

Attackers perform a phishing attack by sending an email containing a malicious link and tricking the user into clicking it. Clicking the link will redirect the user to a fake website that appears similar to the legitimate website.

65
New cards

Web Server Attack Methodology Stages

1. Information Gathering

2. Web Server Footprinting

3. Website Mirroring

4. Vulnerability Scanning

5. Session Hijacking

6. Web Server Password Hacking

66
New cards

Website Mirroring

Method of copying a website and its content onto another server for offline browsing

67
New cards

robots.txt file

A website owner creates a robots.txt file to list the files or directories a web crawler should index for providing search results.

68
New cards

Network Segmnetation

Divides a network into different segments, each having its own hub or switch

69
New cards

Domain Name System Security Extensions (DNSSEC)

Adds an extra layer to DNS that prevents it from being hacked

70
New cards

Patch

A small piece of software designed to fix problems, security vulnerabilities, and bugs as well as improve the usability or performance of a computer program or its supporting data

71
New cards

Software Vulnerability

A weakness of a software program that makes it susceptible to malware attacks

72
New cards

Hotfix

A package used to address a critical defect in a live environment and contains a fix for a single issue

73
New cards

Patch Management

An area of systems management that involves acquiring, testing, and installing multiple patches (code changes) in an administered computer system

74
New cards

Patch Management Steps

1. Detect

2. Asses

3. Acquire

4. Test

5. Deploy

6. Maintain

75
New cards

Manual Patch Installation

The user downloads the patch from the vendor and installs it

76
New cards

Automatic Patch Installation

Applications use an auto update feature to update themselves