Attacker exploits connectionless nature of UDP. attacker sends small packet that appears to originate from victim’s IP address to a vulnerable UDP. Server then sends a significantly larger package of info back to victim’s address.
Amplified DDoS Attack
Targets weakness within OS or installed application
Application Attack
Respond to DNS queries with spoofed replies
ARP Poisoning
Backdoor Virus
Botnet
Taking control of a device
Bluebugging
control or theft of data, Unauthorized access to information on a wireless device through Bluetooth connection, implies control or theft of data
Bluesnarfing
Sending unsolicited messages over Bluetooth without taking control
Bluejacking
Canonicalization Attack
Attacker exe shell commands on host via vulnerable web application (via input fields)
Command Injection
Attacker exe shell commands
Computer Worm
Malicious scripts inserted into websites and executed in the browser of any user viewing data, to stolen info or malicious redirection
Ex. User posts a comment on a blog. The website does not sanitize input
alert("XSS")Script is stored in the db
Anyone who views the comments page triggers the alert pop up
Cross Site Scripting
Is a type of web security attack where a malicious website tricks a user’s browser into performing actions on another website where the user is already logged in.
Cross-Site Request Forgery (CSRF)
Resource consumption and resource instability
Denial of Service
Attackers attempts of getting to the parent directory
- uptick in requests for files not listed on the site
- Sometimes uses canonicalization
Ex.
18:02:00 | 198.51.100.2 | /images/logo.png | 200
18:02:10 | 198.51.100.2 | /css/style.css | 200
18:02:15 | 198.51.100.2 | /api/products | 200
18:02:20 | 198.51.100.2 | /../../../etc/passwd | 404
18:02:25 | 198.51.100.2 | /images/../../../../etc/shadow | 404
Directory Traversal attack
large number of simultaneous connections are being attempted from various IP addresses towards the company’s web server.
several hundred concurrent connections are all being attempted within just a few seconds.
20:00:00 | 192.0.2.10 | 203.0.113.5 | 80 | TCP | Connection Attempt | 10000
20:00:01 | 192.0.2.11 | 203.0.113.5 | 80 | TCP | Connection Attempt | 10000
20:00:01 | 192.0.2.12 | 203.0.113.5 | 80 | TCP | Connection Attempt | 10000
20:00:01 | 192.0.2.13 | 203.0.113.5 | 80 | TCP | Connection Attempt | 10000
20:00:01 | 192.0.2.14 | 203.0.113.5 | 80 | TCP | Connection Attempt | 10000
Distributed Denial Of Service
Domain name system client cache poisoning
Traffic appears to be coming from another location that does not exist (to confuse company looking for an infection)
Domain name system (DNS) poisoning attack
Adowngrade attackmakes a server or client use a lower specification protocol with weaker ciphers and key lengths.
downgrade attack
Attacker attempts to get a copy of entire DNS zone data, all DNS records for a domain, by pretending to be an authorized system. This can expose sensitive information of a domain.
DNS Zone Transfer
Attempts to hijack ongoing authenticated session to perform an action without users consent
- Look un URL analysis and web server logs to detect
Forgery Attack
Multiple attempts from same source IP, same username, various complex and random passwords in short time
- Its a combo of dictionary words, with variations that include chars so they adhere to complexity requirements
15:32:00 | 203.0.113.7 | Admin | Authentication Attempt | admin1
15:32:01 | 203.0.113.7 | Admin | Authentication Attempt | Xyz@123
15:32:02 | 203.0.113.7 | Admin | Authentication Attempt | qwertyABCD!
15:32:02 | 203.0.113.7 | Admin | Authentication Attempt | 1Adm!nP@ss
15:32:03 | 203.0.113.7 | Admin | Authentication Attempt | $ecUr3P@55
Hybrid Password Attack
Exploits unsecure way in which the application processes requests and queries
- Common example attack attempts to cause the server to run OS shell commands and return the output to the browser
- Look un URL analysis and web server logs to detect
Injection Attack
After Clean Up, More Logins at Varying Times
Installed key logger compromised user accounts
KeyLogger