Session 03
Session 03
Session 03
• HTML Injection.
• A vulnerability that occurs when an unauthorized user is able to control an input point and able to inject arbitrary
HTML code into a web application.
• Authentication-based Vulnerabilities.
• An attacker can bypass authentication in vulnerable systems by using several methods.
• Most common ways of authentication-based vulnerabilities in an affected system:
- Credential brute forcing
- Session hijacking
- Redirecting
- Exploiting default credentials
- Exploiting weak credentials
- Exploiting Kerberos vulnerabilities
SCOR Page 1
• Data classification is important when you’re deciding how to protect data.
• Integrity.
• Protecting the data from unauthorized alteration or revision.
• Often ensured through the use of a hash.
• Availability.
• Making systems and data ready for use when legitimate users need them at any time.
• Guaranteed by network hardening mechanisms and backup systems.
• The most common attack against availability is a denial-of-service (DoS) attack.
• DoS attack typically uses one system to perform a denial-of-service condition to a targeted system.
• DDoS attacks use multiple computers and network connections that can be geographically
dispersed (that is, distributed) to perform a denial-of-service condition against the victim.
• Direct DDoS attacks.
• When the source of the attack generates the packets, that are sent directly to the victim of the attack.
SCOR Page 2
•
• Reflected DDoS.
• Occurs when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the
sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended
victim.
• UDP is often used as the transport mechanism because it is more easily spoofed due to the lack of a three-way
handshake.
SCOR Page 3
• Botnet DDoS attack.
• Many attackers use botnets to launch DDoS attacks.
• A botnet is a collection of compromised machines that the attacker can manipulate from a command-and-control
(often referred to as a C2 or CnC) system.
SCOR Page 4
• Means that access not explicitly permitted is forbidden.
• Least privilege means granting subjects the minimum level of access required to perform their job.
• Mandatory Access Control (MAC)
• In a MAC model, access is controlled strictly by the administrator.
• The administrator is the one who sets all permissions.
• Users cannot set permissions themselves, even if they own the object.
• Discretionary Access Controls (DACs).
• Are defined by the owner of the object.
• A cybersecurity incident.
• An adverse event that threatens business security and/or disrupts service.
• False positive.
• A term that describes a situation in which a security device triggers an alarm but there is no malicious activity or
an actual attack taking place.
• False negatives.
• A term used to describe a network intrusion device’s inability to detect true security events under certain
circumstances.
• True positive.
• A successful identification of a security attack or a malicious event.
• True negative.
• When the intrusion detection device identifies an activity as acceptable behavior and the activity is actually
acceptable.
• Traditional IDS and IPS devices need to be tuned to avoid false positives and false negatives.
• Most common evasion techniques against traditional IDS and IPS devices:
• Fragmentation.
• When the attacker evades the IPS box by sending fragmented packets.
• Using low-bandwidth attacks.
• When the attacker uses techniques that use low bandwidth or a very small number of packets in order to evade the
system.
• Address spoofing/proxying.
• Using spoofed IP addresses or sources, as well as using intermediary systems such as proxies to evade inspection.
• Pattern change evasion.
• Attackers may use polymorphic techniques to create unique attack patterns.
• Encryption
• Attackers can use encryption to hide their communication and information.
SCOR Page 5
- This series reports on ITL research, guidelines, and outreach efforts in information system security and its
collaborative activities with industry, government, and academic organizations.
- Download from https://csrc.nist.gov/publications/sp800
• Special Publication (SP) 1800 series.
- This series focuses on cybersecurity practices and guidelines.
• NIST Internal or Interagency Reports (NISTIR).
- These reports focus on research findings, including background information for FIPS and SPs.
• ITL bulletins.
- Each bulletin presents an in-depth discussion of a single topic of significant interest to the information systems
community.
• International Organization for Standardization (ISO)
• ISO has developed more than 13,000 international standards on a variety of subjects.
• The ISO/IEC 27000 series (also known as the ISMS Family of Standards) comprises information security
standards published jointly by the ISO and IEC.
• The first 6 documents in the ISO/IEC 27000 series provide recommendations for "establishing, implementing,
operating, monitoring, reviewing, maintaining, and improving an Information Security Management System"
• ISO 27001: the specification for an Information Security Management System (ISMS).
• ISO 27002: describes the Code of Practice for information security management.
• ISO 27003: provides detailed implementation guidance.
• ISO 27004: outlines how an organization can monitor and measure security using metrics.
• ISO 27005: defines the high-level risk management approach recommended by ISO.
• ISO 27006: outlines the requirements for organizations that will measure ISO 27000 compliance for certification.
SCOR Page 6
• Cloud Computing Attacks.
• Session hijacking.
• This attack occurs when the attacker can sniff traffic and intercept traffic to take over a legitimate connection to a
cloud service.
• DNS attack.
• This form of attack tricks users into visiting a phishing site and giving up valid credentials.
• Cross-site scripting (XSS).
• Used to steal cookies that can be exploited to gain access as an authenticated user to a cloud-based service.
• SQL injection.
• This attack exploits vulnerable cloud-based applications that allow attackers to pass SQL commands to a database
for execution.
• Distributed denial-of-service (DDoS) attack.
• Man-in-the-middle cryptographic attack.
• Authentication attack.
• Fog computing.
• A concept of a distributed intelligence architecture designed to process data and events from IoT devices as close
to the source as possible.
• IoT devices typically communicate to the cloud via a fog-edge device or directly to the cloud.
• The fog-edge device then sends the required data to the cloud.
SCOR Page 7
• Numerous IoT devices are inexpensive devices with little to no security capabilities.
• IoT devices are typically constrained in memory and compute resources and do not support complex and evolving
security and encryption algorithms.
• Several IoT devices are deployed with no backup connectivity if the primary connection is lost.
• Physical protection is also another challenge, because any IoT device could be stolen, moved, or tampered with.
• Popular IoT protocols:
• Zigbee
• Bluetooth Low Energy (BLE) and Bluetooth Smart
• Z-Wave
• Long Range Wide Area Network (LoRaWAN)
• Wi-Fi
• Low Rate Wireless Personal Area Networks (LRWPAN) and IPv6 over Low Power Wireless Personal Area
Networks (6LoWPAN)
• Cellular Communication.
SCOR Page 8
• Reverse engineering tools, such as disassemblers and debuggers:
• IDA
• Binary Ninja
• Radare2
• Ghidra
• Hopper
• Wireless communication interfaces and tools:
• Ubertooth One (for Bluetooth hacking)
• Software-defined radio (SDR), such as HackRF and BladeRF, to perform assessments of Z-Wave and Zigbee
implementations.
SCOR Page 9