Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
28 views
CS 1.2
take this legal book notes
Uploaded by
vedantkale362
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CS 1.2 (1) For Later
Download
Save
Save CS 1.2 (1) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
28 views
CS 1.2
take this legal book notes
Uploaded by
vedantkale362
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CS 1.2 (1) For Later
Carousel Previous
Carousel Next
Save
Save CS 1.2 (1) For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 11
Search
Fullscreen
attacks and Malware upon completion of this chapter, you will be able to: Describe various types of computer and Netw: + Desc m ork a includi Describe the different types of malicious software var eviee viruses, worms, Trojan horses, and logic bombs Explain how social engineering can be used ce tiere and networks as a means to gain access to + Explain the importance of auditing and what should be audited — — = that exist, including while hackers and viruses receive the most att these forms of attack), they are not the only methods for attacking computer systems and networks. This chapter addresses the many differen ways computers nnd denna come under attack on a daily basis. Bach type of attack threatens at least one of the duce security requirements mentioned in Chapter 1—confidentiality, integrity, and avail, ability (the CIA of security). Attacks are thus attempts by unauthorized individuals to access of modify information, to deceive the system so that an unauthorized individest can take over an authorized session, or to disrupt service 10 authorized uccis ention in the news (due to the volume of Attacking Computer Systems and Networks Froma high-level standpoint, attacks on computer systems and networks can be grouped into two broad categories: attacks on specific software (such as an application or the oper- ating system itself) and attacks oma specific protocol or service. Attacks on a specific appli- ation or operating system are generally possible because of either an oversight in the code (and possibly in the testing of that code) or because of a flaw or bug in the code (again indicating a lack of thorough testing). Attacks on specific protocols or services are attempts to either take advantage of a specific feature of the protocol or service or to use the protocol or service ina manner for which it was not intended. In addition, the target of an atiacker can be of two types: targets of opportunity where the attacker is attempting to find any machine that is susceptible to a specific vulnerability, and defined targets where the attacker wants to gain access to a very specific target and must attempt to find avulner- ability that exists in that target. ‘The remainder of this section discusses the various forms of attacks that security professionals need to be aware of.Donlal-of-Service Attacks Denlabot Service (DOS) attacks can exploit a kievn vulnerability in a specific 4 Calon oF aperating system. o they tay attack features (or weaknesses) in specific toca at servires Hn this fenin of attack, the attacker re attempting to den tren access either ty specific information or {0 the computer system of ne The purpose of such an attack can be fo sitniply prevent access to the tanger *ystern op sd can be used in conjunction with other actions in order to gain Unauthorized oa campater at network Lor example, a SYN Mlooding aoe, tay be ured 1 femporanily prevent service toa systenn in order to tale advantage of a trusted relation? ship that exists between that aystem and another SYN flooding yan example ofa DOS attack that takes advantage networks were designed to function, and it can be used to illustrate the basic Principles of any DOS attack SYN Nooding utilizes the TCP three-way handshake that is usey to tablish a connection between two systems. Under normed Circumstances, the first ye, nacnds a SYN packet to the system it wishes to communicate with, The second system will tespond with a SYN/ACK if it is able to aceept the request. When the initial system receives the SYN/ACK from the second system, it responds with an ACK packet, ang communication can then proceed, This process is shown in Figure 15.1" pli bro. Y authorized HHoTy ityel¢ of the way tCpyip NOTE A SYN/ACK ic really a combination of the SYN packet sent to the = first system, combined with an ACK packet acknowledging the first system's Inia SYN flooding attack, the attacker sends fake communication Tequests to the tar- Beted system. Each of these requests will be answered by the target system, which then wails for the third part of the handshake. Since the requests are fake (a nonexistent IP address is used in the requests, so the target system is responding to a system that does. exist), the target will wait for responses that will nevercome ve shown in Figure 15.2 Ihe target system will drop these connections after a specific time-out period, but if the attacker sends requests faster than the time-out period eliminates them, the system will Miy be filled with requests. The number of connections» system can suppor is fi nite, so when more requests come in than can be Processed, the system will soon be re- Serving all its connections for fake requests. Atthis point, any further requests are simply dropped (ignored), and legitimate users who warn ta connect to the target system will not be able to, Use of the system has thus been denied to them. Another simple DOS attack is the famous ping-of-death (POD), and it illustrates the other type of attack—one targeted at a specific application or operating system, as op- Posed to SYN flooding, which targets a protocol. jy the POD attack, the attacker sends a Figure 15-1 The top three-way handshakeAncachs an (mt beh aktenyy f \ SYNIACK Response to fakes Agere 12 ASYN Moodng DOS wack Internet Control Message Proto : AUKIS (which i8 {0 say, wens than oie ghoul not occur naturally (there iets a Gentain systems WeIE HOL Able to hy or crash. DOS attacks ate conducted using employing multiple attacking syst (DOS) attack, ‘The goal of a DOS hing, 1 Packet equal to, OF exce 65,546 bytes). Tis type of packet son fora ping packet to be larger than 64KB) dle this size af packet, and the system would hang tack asingle attacking system, A Denial of Service “ns x known as a distributed Denial-ofService ecifie service OF s 0 Attack is the same: to deny the use of oF access LO ats ed auiacks cuehay Cun autachs ere nade amour in 2000 with the highly Ina DDOSaitack, the method used to deny serviee ie erwwhelm the target wi fic from many diffe «Ito deny service is simply 10 overwhelm the tatge y oin many different systems, A network of attack agents (sometimes called zombies) is created by the attacker, and upon receiving the attack command from the at- tacker, the attack agents commence sending a specific type of trathie against the target. If : ie ng a specific type of traffic against the target. the attack network is large enough, even ordinary web traffic can quickly overwhelm the Jargest of sites, such as the ones targeted in 2000. . Creating @ DDOS network is nota simple task. The attack agents are not willing, agents—they are systems that have been compromised and on which the DDOS attack software has been installed. In order to compromise these agents, the attacker has to have gained unauthorized access to the system or tricked authorized users to TUN a Pro- gram that installed the attack software. The creation of the attack newwork may in factbe a multistep process in which the attacker first compromises a few systems that are then used as handlers or masters, and which in turn compromise other systems. Once the network has been created, the agents wait for an attack message that will include data on the specific target before launching the attack, One important aspect of a DDOS attack that should be mentioned is that with just a few messages to the agents, the attacker can. have a flood of messages sent against the targeted system. Figure 15-3 illustrates a DDOS network with agents and handlers. How can you stop or mitigate the effects of a DOS or DDOS attack? One important precaution is to ensure that you have applied the latest patches and upgrades to your systems and the applications running on them. Once a vulnerability is discovered, it does not take long before multiple exploits are written to take advantage of it. Generally, you will have a small window of opportunity in which to patch your system between the time a vulnerability is discovered and the time exploits become widely available.ute (Ds Network moneages Gi: +(e. Woseages a vice attacks, — Another approach involves changing the timeout option fortep attacks such as the SYN flooding attack, described previously, Cause unused connections are dropped more quickly, OF DOS attacks, much has been written about distuibuting, yo across several systems so that any athick against your system would ina eleta hosts in orderto be completely successful. While this is uc, if Lange camghe ree Works are created (with tens of thousands of zombies, for example) any fiviwenke matter how much the load is distributed, can be successfully attacked lin -aywect also involves an additional cost to your organization in order to establish thn uted environment, Addressing the problem in this manner is actually an atteinpi wenn igate the effect of the attack, as opposed to preventing, or stopping, an aac, In order to prevent a DDOS attack, you have to either he able to intercept or block the attack messages or keep the DDOS network from being established in the fist plac Tools have been developed that will scan your systems, searching for slecpiny ooh waiting for an attack signal, ‘The problem with this type of prevention appronh, hoes ever, is that it is not something you can do to prevent an attack on your network its something you can do to keep your network from being uscd to attack other neiworksor systems. You have to rely on the rest of the community to test their own systems in order to prevent attacks on yours. A final option you should consider that will address several forms of DOS and DDOS attacks is to block ICMP packets at your border, since many attacks rely on ICMP. Cate ful consideration should be given to this approach, because it will also prevent the use of some possibly useful troubleshooting tools. conn UE OWL Wotton Backdoors and Trapdoors Backdoors were originally (and sometimes still are) nothing more than methods use by sofiware developers to ensure that they could gait access to an application even i something were to happen in the future to prevent normal access methods. An exampleid bea hard-coded pasa, went that administrators Gre sort of backed fund coded. it canine cess to the program in the Pan that sown renaneeteteed te gna The obvious protem with the term backdoor sy aige, Milltierahye Maker learn al Is that. since it is qsinstall after RAINING naan Mere come Attack ofthe backdoor, all systems to hase UTES access te, MONE accent and blocked Backdoors eqn the systeny, {nould they un software alate be inst ref) Common backdoors ine ges Ate Bain ae Te wenatel | ‘pateng ab fefet to programs that attack- Aaensute that they can continue acess method is discavered h individuals inadvertently. © anid Hack co Ore 08 these later in this chap- rifice, Both of these, if rGnningon san) LOU system —access that allows ation on the backdoor butra ather toe ta lower J Sloe your system, will allow ait them to perform any funcnen and they are established noty cess. Rootkits are generally gee © the operating system *alled a che tion ony cess ty POD Your system Ge : von aceese isthe rootkit, ‘nsure continued root ac- evel, closer to the actual kernel level of sniffing oup o| ms Serene cn stae wake UP the TCP/IP suite was desi . were designed. The abuce ° rt who connected to the newrorkened we ae feetnes sniffing programs, sores ‘his friendly assumption is illustrated by nework watfc A network sniffer j fe Teferred to as sniffers. —— r is a software or hard ji i passes through a network on chases natdweate device thats used to observe traffic as it traffic, orit can target a specific mace roadeast media. The device can be used to view alll tooking, for logins). Normally, ne voce service, of even string of characters (for example, is designed to ignore all traffic that is not dentate ee? COMPUTET to a NewWOrK, ignore this friendly agreementana nes Stine for that computer. Network sniffers for that computer Or ethers noche eee al alficon the newwork, whether destined all network traffic and not just its own is said t b Tee ee en S work sniffers are designed not j neerve gil UstHCtett Cou nttic cu J just to observe all traffic but to modify traffic as well. Network sniffers can be used by network administrators for monitoring network per- formance. They can be used to perform traffic analysis, for example, in order to deter- mine what type of traffic is most commonly carried on the network and to determine which segments are most active. They can also be used for network bandwidth analysis and to troubleshoot certain problems (such as duplicate MAC addresses). Network sniffers can also be used by attackers to gather information that can be used in penetration attempts. Information such as an authorized user's username and pass- word can be viewed and recorded for later use. The contents of e-mail messages can also be viewed as the messages travel across the network. It should be obvious that adminis- trators and security professionals will not want unauthorized nework sniffers on their networks because of the security and privacy concems they introduce. Fonunately, in der f caork eniffers to be most effective, they need to be on the internal network, which a ly means that the chances for outsiders to use them against you is ex- which general tremely limited. Attacks and Malware 399Figure 154 Network sniffers Usten to all howwork traffic toner worm 4 8 fe. of, I 5-5 . Attacker — Spoofing nothing more than making data look like it has come from a differen: Spoofing is source. This is possible in TCP/IP because of the friendly assumptions behind the cols. When the protocols were developed, it was assumed that individuals who had a cess to the network layer would be privileged users who could be trusted When a packet is sent from one system to another, it includes not only tion IP address and port but the source IP address as well. You are supposed to fill in the source with your own address, but there is nothing that stops you from filling in anotiver system’s address. This is one of the several forms of spoofing. the destina Spoofing E-mail E-mail spoofing is where you send a message with a From address different than your i own. This can be easily accomplished, and there are several different ways to do it and ist you in doing so. A’ very simple method often used to demon- programs that can assi strate how simple it is to spoof an e-mail‘address is to telnet to port 25 (the port assoc ated with e-mail) on a system. From there, you can fill in any address for the From and To sections of the message, whether or not the addresses are yours and whether they ac tually exist or not. ‘There are some simple ways to determine that an e-mail message was probably not sent by the source it claims to have been sent from, but most users do not question their e-mail and will accept where it appears to have come from. A variation on e-mail spoof ing, though it is not technically spoofing, is for the attacker to acquire a URL close to the ‘one they want to spoof so that e-mail sent from their system appears to have come from the official site unless you read the address carefully. For example, if attackers wanted 10spoof XYZ, Corporation, URL XYZ.Corp.com, Ay site would Not norm, same method can be, com, the attackers might gain access to the al receiving a message from the spoofed corporation a PPE IL be a spoof but would take it to be official. This of this is probably gaan has been, used to spoof web sites, The most famous exam P ie site for the White Lene hitehouse.com. The wwi.whitchouse.gov site is the official Site. In this case, noleeaey Be Wew.whitehiouse.com URL takes you 162 pornographic ment site, and it was me, ikely to take the pornographic site to be the official govern~ their spoofed site apct tended to be taken that way. I, however, the atlacers made viewer that they eee sitar to te oficial ne, they could eal convince many he official site. n individu ally suspe; IP Address Spoofi Thejway the ip, Protocol esi . sot 5 clude their own IP addrey designed to work is to have the originators of any IP packet in- there is nothing yee e85 the “From” portion of the packet. ‘While this is the intent, portion of the packer nents system from inserting a different address in the “From’ spoofed for seve he This is known as IP Address Spoofing, An IP address may be tucker sencls sera easons. In a specific DOS attack known 25 2 smurf attack, the at- the packet to all s fa packet to the broadcast address for a network, which distributes tacker to the broate ems on that network. In the smurf attack, the packet sent by the at- appears the, roadeast address isan echo request with the From address forged so that it recponse of another system (the target system) has made the echo request. The normal response of a system to an echo request isan echo reply, and itis used in the ping utility hese know if remote system is reachable and is responding, In the smurf attack, ‘quest is sent to all systems on the network, so all will respond with an echo reply to the target system, as shown in Figure 15-5. The attacker has sent one packet and has been able to generate as many as 254 responses aimed at the target. Should the attacker send several of these spoofed requests, or send them to several different networks, the target can quickly become overwhelmed with the volume of echo replies it receives. Figure 15-5 Spoofing used ina smurf DOS attack sie Spooted echo request / sent to (broadcast address Targeta) Spoofing and Trusted Relationships Spoofing can also take advantage of a trusted relationship between gysteme are configures! tn accept the authentication accomplished by ages dividual logged on to one orstem might not be forced t© go through an Oth I" Process again to access the other system An attacker can take advantage Athen, ment by sending a packet to one asstem that appears t0 have come fron thts tem Sinee the meted relationship 8 in place, the targeted system may p. za eT fe out authentication sentonce a packet is received. the system that ats be ing personated could interfere with the attack, since it would receiv for a request it never made The attac ker will often initially launch a DOS attach p t 2 SYN flooding attack) to temporarily take out the spoofed system for the perch Suh that the ateacker is exploiting the trusted relationship, Once the attack is com, of DOS attack on the spooted system would be terminated and possibly, apart PI veponsive system, the administrators for the systems may see 15.6 illustrates a spoofing attack thar include,
You might also like
All NL All The Day
PDF
No ratings yet
All NL All The Day
74 pages
Chapter 02 Types of Attacks
PDF
No ratings yet
Chapter 02 Types of Attacks
30 pages
Chapter 2 Types of Attack
PDF
No ratings yet
Chapter 2 Types of Attack
29 pages
Network Security: Presented By: Dr. Munam Ali Shah
PDF
No ratings yet
Network Security: Presented By: Dr. Munam Ali Shah
32 pages
Module19
PDF
No ratings yet
Module19
9 pages
An Ninh M NG
PDF
No ratings yet
An Ninh M NG
27 pages
DoS2
PDF
No ratings yet
DoS2
65 pages
Attacks and Malicious Software
PDF
No ratings yet
Attacks and Malicious Software
55 pages
A - J. Seminar Report
PDF
100% (1)
A - J. Seminar Report
22 pages
Network Attacks
PDF
No ratings yet
Network Attacks
35 pages
Dos Firewall
PDF
No ratings yet
Dos Firewall
11 pages
Ping of Death
PDF
100% (1)
Ping of Death
7 pages
Ethical Hacking and C T Countermeasures: MDL Xiv
PDF
No ratings yet
Ethical Hacking and C T Countermeasures: MDL Xiv
83 pages
Unit 9 DOS Attack
PDF
No ratings yet
Unit 9 DOS Attack
9 pages
Seminar Report Anubhab Das
PDF
No ratings yet
Seminar Report Anubhab Das
36 pages
PPT ch06
PDF
No ratings yet
PPT ch06
32 pages
DDoS Attack #pentesting guide
PDF
No ratings yet
DDoS Attack #pentesting guide
31 pages
DDoS Attacks
PDF
No ratings yet
DDoS Attacks
14 pages
M1 Types of Cyber Attacks
PDF
No ratings yet
M1 Types of Cyber Attacks
16 pages
What Is A DDoS Attack and How Can It Be Fended Off
PDF
No ratings yet
What Is A DDoS Attack and How Can It Be Fended Off
21 pages
CEHv10 Module 10 Denial-Of-Service
PDF
No ratings yet
CEHv10 Module 10 Denial-Of-Service
76 pages
DDOS Attack Report
PDF
No ratings yet
DDOS Attack Report
5 pages
220246-NIS Unit 1 Lecture 3
PDF
No ratings yet
220246-NIS Unit 1 Lecture 3
15 pages
Network and Information Security Course 6
PDF
No ratings yet
Network and Information Security Course 6
174 pages
Dos Rsr Report
PDF
No ratings yet
Dos Rsr Report
36 pages
DDOS
PDF
No ratings yet
DDOS
187 pages
Cyber 92
PDF
No ratings yet
Cyber 92
13 pages
E-Security: A Challenge!
PDF
No ratings yet
E-Security: A Challenge!
17 pages
6
PDF
No ratings yet
6
6 pages
Ch07 (Denial of Service Attacks)
PDF
No ratings yet
Ch07 (Denial of Service Attacks)
27 pages
Denial of Service and Prevention
PDF
No ratings yet
Denial of Service and Prevention
5 pages
Do S
PDF
No ratings yet
Do S
68 pages
Denial of Service
PDF
No ratings yet
Denial of Service
18 pages
Ddos 10
PDF
No ratings yet
Ddos 10
31 pages
DDOS Distributed Denial of Service Attack
PDF
No ratings yet
DDOS Distributed Denial of Service Attack
8 pages
Dos Attacked 3
PDF
No ratings yet
Dos Attacked 3
11 pages
What Is A Denial-Of-Service (Dos) Attack?
PDF
No ratings yet
What Is A Denial-Of-Service (Dos) Attack?
8 pages
contrast_pdf (2)
PDF
No ratings yet
contrast_pdf (2)
13 pages
Denial of Service
PDF
No ratings yet
Denial of Service
10 pages
DR - Feleke Assignment-Denial of Service
PDF
No ratings yet
DR - Feleke Assignment-Denial of Service
7 pages
Dos Attacks
PDF
No ratings yet
Dos Attacks
23 pages
DOS ATTACK Report
PDF
No ratings yet
DOS ATTACK Report
32 pages
Denial-of-Service Attacks
PDF
No ratings yet
Denial-of-Service Attacks
23 pages
Ethical_Hacking_Course_01-Mar-2025_07_0 15_3_2025, 9_18_34 am_Page 1-[1742014748026]
PDF
No ratings yet
Ethical_Hacking_Course_01-Mar-2025_07_0 15_3_2025, 9_18_34 am_Page 1-[1742014748026]
1 page
Running Head: Security Attack On Systems and Web Servers 1
PDF
No ratings yet
Running Head: Security Attack On Systems and Web Servers 1
8 pages
Running Head: Security Attack On Systems and Web Servers 1
PDF
No ratings yet
Running Head: Security Attack On Systems and Web Servers 1
6 pages
Week
PDF
No ratings yet
Week
37 pages
DOS ATTACKS.pdf
PDF
No ratings yet
DOS ATTACKS.pdf
14 pages
CEH v12 Lesson 10 - Denial of Services Techniq
PDF
100% (1)
CEH v12 Lesson 10 - Denial of Services Techniq
56 pages
Module 2 - Types of Attacks
PDF
No ratings yet
Module 2 - Types of Attacks
14 pages
Information Security Practical
PDF
67% (6)
Information Security Practical
21 pages
CH3
PDF
No ratings yet
CH3
31 pages
Dos Attacked
PDF
100% (2)
Dos Attacked
4 pages
Ijcet: International Journal of Computer Engineering & Technology (Ijcet)
PDF
No ratings yet
Ijcet: International Journal of Computer Engineering & Technology (Ijcet)
8 pages