IP Flooding
TCP Attacks
Denial of Service (DoS)
SUID Vulnerabilities
What happens if you can modify $PATH for a SUID program?
You can make a program with higher privileges execute your own program with those high privileges. (And the program that you write can do something malicious with high privileges)
File Descriptor Vulnerabilities
Example:
1)SUID program opens a file only readable by root. 2)Program forks a user-controlled, unprivileged process. 3)Child will inherit the open file descriptor!
Close file descriptors to defend against this
Cross-Site Scripting (XSS)
Reflected XSS
1) Attacker includes code in malicious link.
2) Attacker tricks victim into clicking on the link.
3) Code is reflected & run on the visited page.
Stored XSS
1) Attacker submits code to server.
2) Server persists code to storage.
3) Victim accesses page that includes and runs stored code.
Cross-Site Request Forgery (CSRF)
Confused Deputy Problem & CSRF
XSS vs CSRF
In XSS, client trust in the server is violated.
In CSRF, server trust in the client is violated.
Black Hats
Bad guys.
Break into systems for fun/profit
White Hats
Good guys.
Ethical Hackers
Try to protect systems, advance security
Gray Hats
“Chaotic good” guys, often good intent, but legal/ethical trouble.
Break things first, then ask questions.
Virus
Worms
Trojans
Rootkits
Botnets
Domain Generation Algorithms (DGA)
Botnet Defenses
Ransomware
Advanced Persistent Threats (APT)