Unit - II
Unit - II
WHAT IS OWASP?
The Open Web Application Security Project, or OWASP, is an international non-profit organization
dedicated to web application security. One of OWASP’s core principles is that all of their materials be
freely available and easily accessible on their website, making it possible for anyone to improve their
own web application security. The materials they offer include documentation, tools, videos, and
forums. Perhaps their best-known project is the OWASP Top 10.
What is the OWASP Top 10?
The OWASP Top 10 is a regularly-updated report outlining security concerns for web application
security, focusing on the 10 most critical risks. The report is put together by a team of security experts
from all over the world. OWASP refers to the Top 10 as an ‘awareness document’ and they
recommend that all companies incorporate the report into their processes in order to minimize and/or
mitigate security risks.
SECURITY BREACH
A security breach is any incident that results in unauthorized access to computer data, applications,
networks or devices. It results in information being accessed without authorization. Typically, it
occurs when an intruder is able to bypass security mechanisms.
Technically, there's a distinction between a security breach and a data breach. A security breach is
effectively a break-in, whereas a data breach is defined as the cybercriminal getting away with
information. Imagine a burglar; the security breach is when he climbs through the window, and the
data breach is when he grabs your pocketbook or laptop and takes it away.
Confidential information has immense value. It's often sold on the dark web; for example, names and
credit card numbers can be bought, and then used for the purposes of identity theft or fraud. It's not
surprising that security breaches can cost companies huge amounts of money. On average, the bill is
nearly $4m for major corporations.
It's also important to distinguish the security breach definition from the definition of a security
incident. An incident might involve a malware infection, DDOS attack or an employee leaving a
laptop in a taxi, but if they don't result in access to the network or loss of data, they would not count
as a security breach.
Examples of a security breach
When a major organization has a security breach, it always hits the headlines. Security breach
examples include the following:
Equifax - in 2017, a website application vulnerability caused the company to lose the personal
details of 145 million Americans. This included their names, SSNs, and drivers' license
numbers. The attacks were made over a three-month period from May to July, but the security
breach wasn't announced until September.
Yahoo - 3 billion user accounts were compromised in 2013 after a phishing attempt gave
hackers access to the network.
eBay saw a major breach in 2014. Though PayPal users' credit card information was not at
risk, many customers' passwords were compromised. The company acted quickly to email its
users and ask them to change their passwords in order to remain secure.
Dating site Ashley Madison, which marketed itself to married people wishing to have affairs,
was hacked in 2015. The hackers went on to leak a huge number of customer details via the
internet. Extortionists began to target customers whose names were leaked; unconfirmed
reports have linked a number of suicides to exposure by the data breach.
Facebook saw internal software flaws lead to the loss of 29 million users' personal data in
2018. This was a particularly embarrassing security breach since the compromised accounts
included that of company CEO Mark Zuckerberg.
Marriott Hotels announced a security and data breach affecting up to 500 million customers'
records in 2018. However, its guest reservations system had been hacked in 2016 - the breach
wasn't discovered until two years later.
Perhaps most embarrassing of all, being a cybersecurity firm doesn't make you immune
- Czech company Avast disclosed a security breach in 2019 when a hacker managed to
compromise an employee's VPN credentials. This breach didn't threaten customer details but
was instead aimed at inserting malware into Avast's products.
A decade or so ago, many companies tried to keep news of security breaches secret in order not to
destroy consumer confidence. However, this is becoming increasingly rare. In the EU, the GDPR
(General Data Protection Regulations) require companies to notify the relevant authorities of a breach
and any individuals whose personal data might be at risk. By January 2020, GDPR had been in effect
for just 18 months, and already, over 160,000 separate data breach notifications had been made - over
250 a day.
Types of security breaches
There are a number of types of security breaches depending on how access has been gained to the
system:
An exploit attacks a system vulnerability, such as an out of date operating system. Legacy
systems which haven't been updated, for instance, in businesses where outdated and versions
of Microsoft Windows that are no longer supported are being used, are particularly vulnerable
to exploits.
Weak passwords can be cracked or guessed. Even now, some people are still using the
password 'password', and 'pa$$word' is not much more secure.
Malware attacks, such as phishing emails can be used to gain entry. It only takes one
employee to click on a link in a phishing email to allow malicious software to start spreading
throughout the network.
Drive-by downloads use viruses or malware delivered through a compromised or spoofed
website.
Social engineering can also be used to gain access. For instance, an intruder phones an
employee claiming to be from the company's IT helpdesk and asks for the password in order
to 'fix' the computer.
In the security breach examples we mentioned above, a number of different techniques were used to
gain access to networks — Yahoo suffered a phishing attack, while Facebook was hacked by an
exploit.
Though we've been talking about security breaches as they affect major organizations, the same
security breaches apply to individuals' computers and other devices. You're probably less likely to be
hacked using an exploit, but many computer users have been affected by malware, whether
downloaded as part of a software package or introduced to the computer via a phishing attack. Weak
passwords and use of public Wi-Fi networks can lead to internet communications being compromised.
What to do if you experience a security breach
As a customer of a major company, if you learn that it has had a security breach, or if you find out that
your own computer has been compromised, then you need to act quickly to ensure your safety.
Remember that a security breach on one account could mean that other accounts are also at risk,
especially if they share passwords or if you regularly make transactions between them.
If a breach could involve your financial information, notify any banks and financial
institutions with which you have accounts.
Change the passwords on all your accounts. If there are security questions and answers or
PIN codes attached to the account, you should change these too.
You might consider a credit freeze. This stops anyone using your data for identity theft and
borrowing in your name.
Check your credit report to ensure you know if anyone is applying for debt using your
details.
Try to find out exactly what data might have been stolen. That will give you an idea of the
severity of the situation. For instance, if tax details and SSNs have been stolen, you'll need to
act fast to ensure your identity isn't stolen. This is more serious than simply losing your credit
card details.
Don'trespond directly to requests from a company to give them personal data after a
data breach; it could be a social engineering attack. Take the time to read the news, check the
company's website, or even phone their customer service line to check if the requests are
legitimate.
Be on your guard for other types of social engineering attacks. For instance, a criminal
who has accessed a hotel's accounts, even without financial data, could ring customers asking
for feedback on their recent stay. At the end of the call, having established a relationship of
trust, the criminal could offer a refund of parking charges and ask for the customer's card
number in order to make the payment. Most customers probably wouldn't think twice about
providing those details if the call is convincing.
Monitor your accounts for signs of any new activity. If you see transactions that you don't
recognize, address them immediately.
Logical Bomb:
A logical bomb is a destructive program that performs an activity when a certain action has occurred.
These are hidden in programming code. Executes only when a specific condition is met, e.g.
Jerusalem.
Script Virus:
Commonly found script viruses are written using the Visual Basic Scripting Edition (VBS) and the
JavaScript programming language.
Trojan / Backdoor:
Trojan Horse is a destructive program. It usually pretends as computer games or application software.
If executed, the computer system will be damaged. Trojan Horse usually comes with monitoring tools
and key loggers. These are active only when specific events are alive. These are hidden with packers,
crypters and wrappers.< Hence, difficult to detect through antivirus. These can use manual removal or
firewall precaution.
RootKits:
Collection of tools that allow an attacker to take control of a system.
Can be used to hide evidence of an attacker’s presence and give them backdoor access.
Can contain log cleaners to remove traces of attacker.
Can be divided as:
– Application or file rootkits: replaces binaries in Linux system
– Kernel: targets kernel of OS and is known as a loadable kernel module (LKM)
Gains control of infected m/c by:
– DLL injection: by injecting malicious DLL (dynamic link library)
– Direct kernel object manipulation: modify kernel structures and directly target trusted part
of OS
– Hooking: changing applicant’s execution flow
Advanced Persistent Threat:
Created by well funded, organized groups, nation-state actors, etc. Desire to compromise government
and commercial entities, e.g. Flame: used for reconnaissance and information gathering of system.
Spyware and Adware:
Normally gets installed along with free software downloads. Spies on the end-user, attempts to
redirect the user to specific sites. Main tasks: Behavioral surveillance and advertising with pop up ads
Slows down the system.
Brute force attacks are based on trial and error. Attackers may continuously try to gain access to your
organization until one attack works. This could be by attacking weak passwords or encryption,
phishing emails, or sending infected email attachments containing a type of malware.
10. Distributed Denial of Service (DDoS)
DDoS attacks are cyber attacks against networked resources like data centers, servers, websites, or
web applications and can limit the availability of a computer system. The attacker floods the network
resource with messages which cause it to slow down or even crash, making it inaccessible to users.
Potential mitigations include CDNs and proxies.
11. SQL Injections
SQL stands for a structured query language, a programming language used to communicate with
databases. Many of the servers that store sensitive data use SQL to manage the data in their database.
An SQL injection uses malicious SQL to get the server to expose information it otherwise wouldn't.
This is a huge cyber risk if the database stores customer information, credit card numbers, credentials,
or other personally identifiable information (PII).
12. Trojans
Trojan horses are malware that misleads users by pretending to be a legitimate program and are often
spread via infected email attachments or fake malicious software.
13. Cross-Site Scripting (XSS)
XSS attacks involve injecting malicious code into a website but the website itself is not being
attacked, rather it aims to impact the website's visitors. A common way attackers can deploy cross-site
scripting attacks is by injecting malicious code into a comment e.g. embedding a link to malicious
JavaScript in a blog post's comment section.
14. Session Hijacking
When you log into a service, it generally provides your computer with a session key or cookie so you
don't need to log in again. This cookie can be hijacked by an attacker who uses it to gain access to
sensitive information.
15. Man-in-the-Middle Attacks
Public Wi-Fi networks can be exploited to perform man-in-the-middle attacks and intercept traffic that
was supposed to go elsewhere, such as when you log into a secure system.
16. Third and Fourth-Party Vendors
The rise in outsourcing means that your vendors pose a huge cybersecurity risk to your customer's
data and your proprietary data. Some of the biggest data breaches were caused by third parties.
How Do Hackers Exploit Attack Vectors?
Hackers use multiple threat vectors to exploit vulnerable systems, attack devices and networks, and
steal data from individuals. There are two main types of hacker vector attacks: passive attacks and
active attacks.
Passive Attack
A passive attack occurs when an attacker monitors a system for open ports or vulnerabilities to gain or
gather information about their target. Passive attacks can be difficult to detect because they do not
involve altering data or system resources. Rather than cause damage to an organization’s systems, the
attacker threatens the confidentiality of their data.
Passive attack vectors include passive reconnaissance, which sees the attacker monitor an
organization’s systems for vulnerabilities without interacting with them through tools like session
capture, and active reconnaissance, where the attacker uses methods like port scans to engage with
target systems.
Active Attack
An active attack vector is one that sets out to disrupt or cause damage to an organization’s system
resources or affect their regular operations. This includes attackers launching attacks against system
vulnerabilities, such as denial-of-service (DoS) attacks, targeting users’ weak passwords, or through
malware and phishing attacks.
A common example of an active attack is a masquerade attack, in which an intruder pretends to be a
trusted user and steals login credentials to gain access privileges to system resources. Active attack
methods are often used by cyber criminals to gain the information they need to launch a wider
cyberattack against an organization.
A social engineering attack is a cybersecurity attack that relies on the psychological manipulation of
human behavior to disclose sensitive data, share credentials, grant access to a personal device or
otherwise compromise their digital security.
Social engineering attacks pose a great threat to cybersecurity since many attacks begin on a personal
level and rely on human error to advance the attack path. By invoking empathy, fear and urgency in
the victim, adversaries are often able to gain access to personal information or the endpoint itself. If
the device is connected to a corporate network or contains credentials for corporate accounts, this can
also provide adversaries with a pathway to enterprise-level attacks.
With cyber criminals devising ever-more manipulative methods for tricking people and employees,
organizations must stay ahead of the game. In this post, we will explore ten of the most common types
of social engineering attacks:
1. Phishing
2. Whaling
3. Baiting
4. Diversion Theft
5. Business Email Compromise (BEC)
6. Smishing
7. Quid Pro Quo
8. Pretexting
9. Honeytrap
10. Tailgating/Piggybacking
Pretexting. One party lies to another to gain access to privileged data. For example, a
pretexting scam could involve an attacker who pretends to need financial or personal data to
confirm the identity of the recipient.
Scareware. This involves tricking the victim into thinking their computer is infected with
malware or has inadvertently downloaded illegal content. The attacker then offers the victim a
solution that will fix the bogus problem; in reality, the victim is simply tricked into
downloading and installing the attacker's malware.
Watering hole. The attacker attempts to compromise a specific group of people by infecting
websites they are known to visit and trust with the goal of gaining network access.
Diversion theft. In this type of attack, social engineers trick a delivery or courier company
into going to the wrong pickup or drop-off location, thus intercepting the transaction.
Quid pro quo. This is an attack in which the social engineer pretends to provide something in
exchange for the target's information or assistance. For instance, a hacker calls a selection
of random numbers within an organization and pretends to be a technical support specialist
responding to a ticket. Eventually, the hacker will find someone with a legitimate tech issue
whom they will then pretend to help. Through this interaction, the hacker can have the target
type in the commands to launch malware or can collect password information.
Honey trap. In this attack, the social engineer pretends to be an attractive person to interact
with a person online, fake an online relationship and gather sensitive information through that
relationship.
Tailgating. Sometimes called piggybacking, tailgating is when a hacker walks into a secured
building by following someone with an authorized access card. This attack presumes the
person with legitimate access to the building is courteous enough to hold the door open for
the person behind them, assuming they are allowed to be there.
Rogue security software. This is a type of malware that tricks targets into paying for the fake
removal of malware.
Dumpster diving. This is a social engineering attack whereby a person searches a company's
trash to find information, such as passwords or access codes written on sticky notes or scraps
of paper, that could be used to infiltrate the organization's network.
Pharming. With this type of online fraud, a cybercriminal installs malicious code on a
computer or server that automatically directs the user to a fake website, where the user may
be tricked into providing personal information.