CS Unit-2 VJ
CS Unit-2 VJ
• If the scanner has a poorly written test then scanner reports vulnerability
even if it does not exist on a system. It may produce a false positive.
• It wastes time as administrators must follow up to manually check the
vulnerability that is actually vulnerable or not.
Some of the free and very useful vulnerability scanners are:
• Netcat
• Socat
Zero-day Vulnerability
• Zero-day vulnerability refers to a
hole in software that is unknown
to the vendor.
• This security hole is then
exploited by hackers before the
vendor becomes aware and
hurries to fix it- this exploit is
called a zero day attack.
• Zero-day vulnerabilities are
particular dangerous because
they represent a gap in
knowledge between the attacker
and defender.
Common Vulnerabilities
Buffer Overflow:
• Description: Buffer overflow occurs when a program writes more data to a
block of memory, or buffer, than it was allocated for, leading to potential
code execution by an attacker.
• Prevention: Bounds checking, input validation, and using secure coding
practices.
Cont...
Security Misconfigurations:
• Description: Improperly configured settings, permissions, or default
configurations can expose sensitive information or provide unauthorized
access.
• Prevention: Regularly audit configurations, follow security best practices,
and minimize unnecessary services.
• Traffic Probe
• Vulnerability Probe
Traffic Probe
• Some services declare information about themselves without receiving
particular data from a client.
• But all services do not do that. However, lots of them will if you just ask.
• For example, a web service will not give response until it receives data from
the client.
• A valid HTTP request using the HEAD method will provide some useful
information like web server information, information about installed server
operating system etc. which can be useful to compromise the host.
• Traffic probes try to use valid requests. Because valid protocol messages are
less likely to crash or interrupt a service
• If a web server didn’t handle the HEAD method without crashing then the
chances of compromising increases. So this type of buggy service must need
to be fixed to lower the chances of compromising.
Vulnerability Probe
• Some security bugs cannot be identified without sending a payload that
exploits (using something to one’s own advantage) a suspected vulnerability.
• These types of probes are more accurate—they rely on direct observation not
only on port numbers or service banners.
• But they also carry more risk of interrupting the service, because the test
payload must be trying to either produce or take advantage of an error in the
service’s code.
• An easy-to-understand example of a vulnerability probe is an HTML injection
check for a web application.
• A snippet of HTML might look like <div id="search"><span
class="results">Results for ‘zombies'...</span>
• An attacker who exploits HTML injection vulnerability like this could steal data
from the user or damage the web site.
Cont…
Ø The hacker can take advantage of vulnerability to compromise the system or
network.
Ø The outcome may be to crash the software, causing a denial of service, or
retrieve data, like pulling usernames and passwords from a database, or
completely compromise the operating system by gaining root or
administrator access.
Ø Exploits take many shapes. It can be simple binary shellcode or clever bits of
text appended to URL parameters.
Ø Discovering vulnerability typically just means uncovering a software fault.
Ø Developing an exploit means taking advantage of that software fault to give
the attacker an advantage against the system.
TCP/IP Ports and Sockets
• A port number uses 16 bits and so can therefore have a value from 0 to
65535 decimal.