Section 14: Network Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

64 Terms

1
New cards

Denial of Service (DoS) Attack

  • Occurs when one machine overwhelms a victim system with continuous service requests

  • Leads to resource exhaustion, causing the victim system to crash

2
New cards

Types of DoS Attacks (2)

  • TCP SYN Flood

  • SMURF Attack (ICMP Flood)

3
New cards

TCP SYN Flood

  • Involves initiating multiple TCP sessions but not completing them

  • TCP Handshake

    • In a normal scenario, involves SYN, SYN/ACK, and ACK packets

  • Attack Process

    • Attacker sends SYN packets

    • Victim reserves resources

    • Attacker ignores subsequent SYN/ACK packets

    • Leads to half-open connections and resource exhaustion

  • Attacker often spoofs source IP during TCP handshake to flood the server

4
New cards

SMURF Attack (ICMP Flood)

  • Utilizes ICMP traffic instead of TCP traffic

  • Attacker sends ping to subnet broadcast address with a spoofed source IP

    • Causes all devices on the subnet to respond to the victim server

  • Attack can be intensified by sending multiple requests to different subnets, leading to resource exhaustion

5
New cards

Distributed Denial of Service (DDoS) Attack

  • Involves multiple machines simultaneously overwhelming a single server

  • Botnet

    • Collection of compromised computers under the control of a Command and Control(C2) server

  • Zombie

    • Individually compromised computers within a botnet

  • C2 server controls all zombies, allowing coordinated attacks

6
New cards

Preventing DDoS Attacks

  • Cloud Challenge

    • Cloud-based resources can horizontally scale to handle increased demand

  • Cost Consideration

    • Despite scaling, organizations may face substantial costs for illegitimate traffic during DDoS attacks

  • Prevention Importance

    • Emphasizes the need to implement preventive measures to avoid financial and operational consequences

7
New cards

MAC Flooding

  • A network attack technique aimed at compromising a switch’s security by overflowing its MAC table

  • Normal Switch Operation

    • Utilizes MAC tables to associate MAC addresses with switchports for efficient data forwarding

  • Execution of MAC Flooding

    • Attackers use specialized tools to flood the switch with random MAC addresses, forcing it into fail-safe mode

8
New cards

MAC Flooding Attack Implications

  • Data Snooping

    • Attackers are enabled to capture sensitive data by forcing the switch into hub mode

  • Disruption of Services

    • Network performance is degraded and may lead to DoS Attacks

  • Bypassing Security Measures

    • MAC flooding allows attackers to circumvent MAC address filtering and gain unauthorized network access

9
New cards

MAC Flooding Detection and Prevention

  • Implement anomaly-based intrusion detection systems (IDS)

  • Employ network monitoring tools

  • Configure port security

  • Set MAC address limits per switchport

  • Use VLANs to segregate network traffic and limit the impact of MAC flooding attacks

10
New cards

Address Resolution Protocol (ARP)

  • Used to map IP addresses to MAC addresses on a local area network

11
New cards

ARP Spoofing

  • Occurs when an attacker sends falsified ARP messages, linking their MAC address with a legitimate IP

  • Goals are to intercept, modify, or stop data-in-transmit, and initiate on-path attacks

12
New cards

ARP Poisoning

  • Corrupts ARP cache by associating attackers’ MAC with IP addresses of LAN devices

  • Enables:

    • Alteration of network traffic flow

    • Interception

    • Session hijacking

    • DoS attacks

13
New cards

Difference between ARP Spoofing and ARP Poisoning

  • ARP Spoofing - Targets single host’s traffic

    • More targeted attack

  • ARP Poisoning - Affects all hosts in a LAN

14
New cards

Motivations for ARP Attacks (3)

  • Data Interception

  • On-Path Attack

  • Network Disruption

15
New cards

Techniques for ARP Attacks

  • Scanning network for IP-MAC pairs and sending fake ARP responses

  • Conducting ARP poisoning via ARP flood

16
New cards

ARP Attack Detection and Prevention

  • Use ARP monitoring tools to detect unusual ARP traffic patterns

  • Alert network administrators

  • Configure intrusion detection systems to identify ARP spoofing or poisoning activities

  • Implement preventive measures

    • Static ARP entries

      • Manually inputting ARP mappings to prevent spoofing

      • Impractical for large networks

    • Dynamic ARP inspection

      • Switches inspect ARP packets, dropping suspicious mappings based on trusted MAC-IP pairs

    • Network segmentation

      • Limits the scope of ARP attack

    • VPNs or encryption technologies

      • Safeguard data against alterations

17
New cards

Virtual Local Area Network (VLAN)

  • Segregates broadcast domains at Layer 2 of the OSI model, enhancing network security

  • Commonly utilized in intranets and local area networks to partition and secure network segments

18
New cards

VLAN Hopping

  • Exploits misconfigurations to gain unauthorized access to different VLANs

19
New cards

Double Tagging

  • Attacker exploits trunk port vulnerabilities to direct traffic to another VLAN

    • Inner tag

      • Contains the true destination

    • Outer tag

      • Denotes the native VLAN

20
New cards

Purpose of VLAN Hopping

  • Blind Attacks

    • Commands are sent to the victim, but the attacker or pen tester does not get to see any of the responses

  • DoS or Stress Testing

    • Does not always require response data, facilitating various attack scenarios

21
New cards

Double Tagging Prevention Measures

  • Change the default configuration of the native VLAN from VLAN ID 1 to another identifier

  • Avoid adding user devices to the native VLAN

22
New cards

Switch Spoofing

  • Attackers use Dynamic Trunking Protocol (DTP) to negotiate trunk ports

  • Disabling dynamic switch port modes helps prevent switch spoofing attacks

23
New cards

MAC Table Overflow Attack

  • Overloading CAM tables can cause switches to act like hubs, exposing traffic from other VLANs

  • Flood the switch’s CAM table with MAC addresses to induce this behavior

24
New cards

Domain Name System (DNS)

  • Fundamental internet component translating domain names to IP addresses

25
New cards

DNS Attack Types (5)

  • DNS Cache Poisoning

  • DNS Amplification Attacks

  • DNS Tunneling

  • Domain Hijacking

  • DNS Zone Transfer Attacks

26
New cards

DNS Cache Poisoning

  • Corrupting DNS resolver cache with false information to redirect traffic

  • Mitigations:

    • Utilize Domain Name System Security Extension (DNSSEC) to add a digital signature

    • Implement secure network configurations and firewalls

27
New cards

DNS Amplification Attacks

  • Overwhelm target system with DNS response traffic

  • Mitigation:

    • Limit size of DNS responses

    • Rate limit DNS response traffic

28
New cards

DNS Tunneling

  • Involves using the DNS protocol to encapsulate non-DNS traffic (such as HTTP or SSH, over port 53) to attempt to bypass firewall rules

  • Can be used for command and control or data exfiltration

  • Mitigation:

    • Involves regular monitoring of DNS logs to analyze for any signs of unusual patterns of behavior

29
New cards

Domain Hijacking

  • Unauthorized change of domain registration

  • Can lead to redirection to malicious websites

  • Mitigations:

    • Conduct regular updates

    • Ensure that registration account information is secure

    • Use domain registry lock services

30
New cards

DNS Zone Transfer Attacks

  • Pretend to be authorized system to get entire DNS zone data

  • Expose sensitive network infrastructure information

31
New cards

On-path Attack

  • An attack where the penetration tester places their workstation between two hosts to capture, monitor, and relay communications

  • Captures authorization packets, allowing the attacker to taker over the authorized session between client and server

32
New cards

Methods of On-Path Attack (4)

  • ARP Poisoning

  • DNS Poisoning

  • Rogue Wireless Access Point

  • Rogue Hub/Switch

33
New cards

Replay Attack

  • Occurs when an attacker captures valid data and repeats it either immediately or with a delay

  • Example

    • Capturing authentication handshake to gain access to network resources

34
New cards

Relay Attack

  • An attack where the attacker becomes a proxy between two hosts, intercepting and potentially modifying communications

  • Example

    • Modifying transaction details in online banking to divert funds

35
New cards

Challenges with Encryption

  • SSL/TLS Encryption poses difficulty in intercepting and cracking communications

  • Techniques to overcome challenges with encryptions:

    • SSL Stripping

      • Redirecting HTTPS requests to HTTP to capture unencrypted data

    • Downgrade Attack

      • An attack that persuades client or server to adopt lower security modes

      • Convinces systems to abandon higher security modes in favor of lower ones

      • Example

        • Allowing encryption at lower levels (E.g. SSL 2.0) to facilitate easier interception

  • Not limited to SSL/TLS

    • Applicable to any encryption or protection mechanism like WIFI, VPNs, etc.

36
New cards

Rouge Devices

  • Unauthorized devices or services on a network that allows unauthorized individuals to connect to that network

  • Identified by MAC address and IP address

  • Use digital certificates for authentication and encryption (IPsec, HTTPS) to authorize devices

37
New cards

Rouge System Detection

  • Process of identifying and removing machines on the network that not supposed to be there

38
New cards

Types of Rogue Systems (7)

  • Network Taps

  • Wireless Access Points (WAPs)

  • Servers

  • Wired and Wireless Clients

  • Software

  • Virtual Machines

  • Smart Appliances

39
New cards

Rogue Systems: Network Taps

  • Physical device that is attached to cabling to record packets passing over the network segment

40
New cards

Rogue Systems: Wireless Access Points (WAPs)

  • Devices that can be connected to the network and extend the physical network into the wireless spectrum

  • Types of Rogue Access Points

    • Connected to a network

      • Allows adversaries to convert radio signals into physical network access

    • Evil Twin

      • Attacker sets up own access point with his own internet connection, masquerading as legitimate network

  • Scanning airwaves to identify and remove rogue devices is crucial

  • Tools like Wi-Fi Pineapple enable easy creation of rogue access points, posing significant threats to unsuspecting users

41
New cards

Rogue Systems: Servers

  • Set up as honeypots to harvest data

42
New cards

Rogue Systems: Wired and Wireless Clients

  • Personal devices connected to network

  • Bring Your Own Device Policy

    • Personal devices are not considered as rogue devices unless they are used to do things that are unauthorized

43
New cards

Rogue Systems: Unauthorized Software

  • Installed without permission

44
New cards

Rogue Systems: Virtual Machines

  • Created within highly virtualized environments

45
New cards

Rogue Systems: Smart Appliances

  • Vulnerabilities in internet-connected devices

46
New cards

Rogue Device Detection and Removal

  • Visual inspection

    • Checking ports and switches for rogue devices

  • Network Mapping and Host Discovery

    • Use enumeration scanners to identify hosts

  • Wireless Monitoring

    • Detect unknown SSIDs within range

  • Packet Sniffing and Traffic Flows

    • Identify unauthorized protocols and peer-to-peer communication

  • NAC and Intrusion Detection

    • Use automated network scanning for prevention and detection

47
New cards

Rogue Device Mitigation

  • Use digital certificates and encryption for authentication

  • Perform regular inventories to detect additional or rogue devices

  • Implement network access control (NAC) and intrusion detection systems (IDS) for automated scanning and defense

48
New cards

Social Engineering

  • Any attempt to manipulate users into revealing confidential information or performing actions detrimental to the user or system security

  • Focus

    • Exploiting human vulnerabilities to bypass technical controls

49
New cards

Types of Social Engineering Attacks (6)

  • Phishing

  • Tailgating

  • Piggybacking

  • Shoulder surfing

  • Eavesdropping

  • Dumpster diving

50
New cards

Phishing

  • Sending deceptive emails to trick users into revealing sensitive information

  • Example

    • Fake PayPal email requesting account information

  • Effectiveness

    • High, even with obvious signs of phishing

  • Variants

    • Phishing - most broad type, does not target any particular person

    • Spear phishing - more targeted form

    • Whaling - targets key executives

51
New cards

Tailgating

  • Unauthorized entry into secure areas by following an authorized person

  • Prevention

    • Train employees to shut doors behind them

52
New cards

Piggybacking

  • Gaining entry to a secure area with an employee’s consent

  • Example

    • Asking someone to hold the door open with hands full

53
New cards

Shoulder surfing

  • Gaining authentication information by direct observation

  • Example

    • Watching someone type their password

54
New cards

Eavesdropping

  • Listening in on conversations to gather sensitive information

  • Example

    • Overhearing business discussions to gain insights

55
New cards

Dumpster Diving

  • Scavenging for personal or confidential information in trash or recycling

  • Prevention

    • Shred paperwork before disposal or use locked trash cans

56
New cards

Malware

  • Short-hand for malicious software

  • Designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent

57
New cards

Malware Types (6)

  • Virus

  • Worm

  • Trojan Horse

  • Ransomware

  • Spyware

  • Rootkit

58
New cards

Virus

  • Malicious code that infects a computer when run

59
New cards

Worm

  • Self-replicating malware that spreads without user interaction

  • Exploits security vulnerabilities in OS, protocols, or applications

  • Notable Examples

    • Nimda (2001) - infected the entire internet in 22 minutes

    • Conficker (2009) - infected 9-15 million machines, creating a botnet

60
New cards

Trojan Horse

  • Malware disguised as legitimate software

  • Remote Access Trojan (RAT)

    • A common type of Trojan that provides the attacker with remote control of a victim’s system

61
New cards

Ransomware

  • Malware that restricts access until a ransom is paid

  • Encrypts files or changes passwords, demanding payment for access

  • Notable example

    • SamSam (2018) - cost Atlanta over $17 million to fix

62
New cards

Spyware

  • Malware that gathers information without consent

  • Types

    • Adware - for advertising

    • Keylogger - captures keystrokes

63
New cards

Rootkit

  • Malware that gains administrative control without detection

  • Difficult to detect, often requires booting from an external device

64
New cards

Malware Prevention and Best Practices

  • Always check files for malware before downloading or installing

  • Keep software up to date to patch vulnerabilities

  • Use reputable antivirus software and firewalls

  • Educate users about safe browsing and downloading practices