CISSP - Malicious Code and Application Attacks
CISSP - Malicious Code and Application Attacks
Application
Attacks
chapter 21 Review
Rashid
24/09/21
© Rashid Siddiqui
Malware -
Malicious software
📟
WHERE
⇐i•ñ •ñ••
Like
biological virus
, computer virus ~ DOES COME ¥08 ,☒
,
CODE
has two main fxn Propagation MALICIOUS from ?
•• $2
sn .
Payload Execution
Virus
propagation techniques These viruses attack the
Macro viruses virus into memory before loading the OS from the
to execute them
attempts
contained
Companion viruses self executable
files .
Take
filenames of legitimate
files ( similar filenames)
Macro Viruses
Exploits Macros .
,
.
, ,
Virus
Technologies
Multi
patriate viruses stealth viruses Polymorphic viruses Encrypted
viruses
fool Av that
everything from one
system to from detection
is
fine .
another
© Rashid Siddiqui
Trojan Horses A software
program
that
appears benevolent but
carries malicious
a behind the scene
payload .
Remote Access
RATS -
Trojans opens
backdoor into a
system .
User
might consent
spyware -
monitors action and 1-✗
important information to remote
systems to install ,
but they
Adware -
Potentially unwanted
Programs ( PHP) takes adv
of 3rd Party plugins ( web .
Browser)user do not wish to
Malicious
scripts Taking advantage of existing automation and
scripts
File less malware Run entirely in memory ,
do not create
any file / log on disk hence undetected
,
Zero -
Day vulnerability
Delay b/w discov of a slowness in
applying
new malicious code and updates
issuance Patches
of
Malware Prevention Eradication Disinfects the affected file and restore the machine
signature Heuristic
Based Mechanism
System
Endpoint Detection and
Response Analyse endpoint memory filesystem
,
and network actvt
HEBA -
User and Entity Behavior Analysis internet .
other incident
Integration c-
response mechanism
© Rashid Siddiqui
Application Attacks
A
specific example of Injection Vulnerabilities
Code Injection Attack
SQL Injection Blind code
injection Attacks
Attack
Timing based
Sol
Injection Any env that inserts
web
application that tests whether to code
injection attacks
the
application
i
is
interpreting
injected code
before attempting LDAP injection XML
injection DLL injection
to
carry out an attack
Input validation , input escaping and defensive coding
are essential to eliminate these threats .
Command
Injection attacks →
Application code reaches back to the OS
to execute level
a command ,
causing 0s
changes
.
© Rashid Siddiqui
Authorisation Vulnerabilities
Exploiting
Insecure Direct Object Reference authorisation
Lack of specific for object access
-
Directory Traversal -
A mis
configuration /vulnerability cñ allows users to
navigate the
File Inclusion -
Next level
of Directory Traversal Attack - File inclusion attack actually
execute the code contained within a
file - File Inclusion vain is
perform HTML
injection .
input .
Remediate
using input by
some ✗ SS attack work
CSRFIXSRF SSRF
cross - site server-side
Tricking a user
Tricking a server
© Rashid Siddiqui
✗ SS attack exploits the TRUST that a user has in a website to execute
Reasonable assumption -
users are often logged into many different websites
at the same time .
Session Communication
Hijacking Interception and session takeover
authorised
and
assuming identity of the user .
Authentication
Making Attacker as Using Cookie Remediate
using
replay authentication
a server
capturing Data anti
- -
technique
.
Cookie
a-
-
Expiry within
I reasonable time .
#
Application Security Controls
Meta characters
Input validation -
Input Blacklisting -
Parameter Pollution -
depends on
defects in web
platforms that don't
© Rashid Siddiqui
handle multiple copies of the same
parameter properly
Web Application Firewalls -
Works at
application layer of 051 Model
Does validation
input -
White
listing / Blacklisting
Database Security
Parameterised Queries Sal statement
Developer prepares a
,
and then
into
allows user
input to be
passed that statement
protects Applications as carefully defined variables that do not allow
Attacks codes
against Injection the insertion of
template
'
=
Obfuscation and
camouflage
Data minimization Tokenization
Hashing
collect only data Replaces Pll c- a
Replace sensitive
needed
unique identifier information c- salted hash
Code Security
Code
Signing Digitally signing the code as a
proof of code 's
authorship
legitimacy and
integrity .
Version control ,
promotes code reuse help avoid the
problem
-
of dead code
© Rashid Siddiqui
Integrity measurement
using cryptographic
hash to verify code release
Application Resilience
Scalability Elasticity
Vertical
scaling scaling UP Automatic
Provisioning
-
-
-
Capability of incremental
addition common features of
of resources
Cloud
Platforms
Secure
Coding Practices
stored securely
Error information
handling use minimum necessary for the user
to understand the
problem
Hard coded credentials → Take care in not
storing credentials CT can
backdoor
fxn as a
the Code
Memory Management
Pointer De
referencing Null
pointer exception can
provide an attacker access to
debugging information ,
that may be used
for
Mag allow an attacker to reconnaissance of the
application 's
security
bypass security controls
© Rashid Siddiqui