Attack Vectors
a way for attackers to enter a network or system
MQTT Backend vulnerability
It did not require authentication so hackers could get in
ABB ChargerSync vulnerability
Bypass of PIN Code Provisioning.
File Access and Data leakage
- Unauthenticated OCPP Access
Security By Design
Anticipating malicious behaviour and attacks during the design
Dev Life: Requirement Analysis (1)
Find the info to be stored and if it is going to be protected.
Dev Life: Design (2)
Consider access control and lock down each entry point
Dev Life: Implementation (3)
Set up any new HW or SQ as well as coding new SW.
Dev Life: TEsting (4)
Test the security of your app using correct, incorrect and malicious inputs/actions
Dev Life: Install and maintain (5/6)
Think about upgrades and software end of life etc
How to prevent password cracking?
functions in stack memory
During the buffer overflow the return address is overwritten
Shellcode with buffer overflow
Hacker would want to overwrie data with shellcode with a return address pointing to the start of it - the payload.
Buffer overflow protections
Shellcode
Injected code in buffer overflow which can achieve goal for hacker.H
Heartbleed attack
NOT APACHE
Affected OpenSSL (via TLS)
Overread. Hackers could read more data than intended by asking for a return value longer than the test message they sent.
XSS Cross Site Scripting
Attacker injects malicious code into web pages to gain info.
PHP, JS, VBScript etc
Defence measures for software design
Secure coding best practices