Sec3 - Common Attackes 2024
Sec3 - Common Attackes 2024
Attackers are creative and will attempt many different techniques to trick users
WHAT IS “ATTACK “
• Any attempt to :
• destroy, expose, alter, disable, steal or
breaking into the information
• breaking the systems.
• gain unauthorized access to or make
unauthorized use of an asset
• Spyware
• Wireshark
TYPES OF PASSIVE ATTACKS :
• Traffic Analysis
• The eavesdropper
• analyzes the traffic
• determines the location
• identifies communicating hosts
• observes the frequency and
length of exchanged messages. Obsetraffic
• Tools used rve pattern
• Spyware
• Wireshark
HOW TO AVOID ?
• Use Firewalls
• Use IPSec
• Use encryption
• Remove Cookies and don't allow
ACTIVE ATTACK
- Information is modified.
- Dangerous for Integrity as well as Availability.
- Attention is to be paid on detection.
- System is damaged.
- Victim gets informed in active attack.
- System Resources can be changed in active attack.
TYPES OF ACTIVE ATTACKS :
• Masquerade attack:
One entity (Person-Computer)
pretends to be different entity.
• Modification of messages
active attack:
Some portion of a message is altered
/ delayed or reordered to produce
an unauthorized effect.
Ex: “Allow Zaki and Aly to read
confidential file X”
TYPES OF ACTIVE ATTACKS :
• Repudiation
• The sender or receiver can deny
later that he/she has send or
receive a message.
• Denial of Service
• Prevents normal use of communication
facilities.
• The attacker may have a specific target.
• Example
• an entity may prevent all messages directed
to a particular destination.
• Another form of service denial is the
disruption of an entire network wither by
disabling the network or by overloading it by
messages so as to degrade performance
HOW TO AVOID ?
• Use Firewalls
• Use Antivirus
• Use IPS
INSIDER ATTACK
involves someone from the inside, such as a
disgruntled employee, attacking the network.
INSIDER THREATS
TYPES OF INSIDER ATTACKS :
IMPACT ON BUSINESS
Insider threats are a growing problem
• 60% of organizations had > 30 insider-related incidents per year
• Number of insider-related incidents increased by 47% in two years
• Companies spend an average of $755,760 on each insider-related
incident
Samsung & Apple
HOW TO AVOID ?
• Awareness
• Prevention “ Apply policy”
• Monitor “user and entity behavior analytics”
• Encourage workers to report any suspicious activity
CLOSE – IN ATTACK
A Close-in attack involves someone attempting to get
physically close to network components, data, and
systems in order to learn more about a network.
HOW TO AVOID ?
Phishing Types:
pages phishing
Email phishing
Vishing
Smishing
PHISHING TYPES: PAGES PHISHING
• A fake web page which looks exactly like a popular website
such ( facebook, twitter, Gmail , paypal , bank page ) to
persuade you to enter information identity such as username ,
passwords and credit cards details
• the hacker records the username and password and then tries
that information on the real site.
HOW DOES PHISHING WORK?
LAB
• HTTrack Web Site Copier tool
PHISHING TYPES: EMAIL PHISHING
• Sending a fake message to your email to persuade you to buy
something or engage to anything for a purpose taking your identity
information
• Encourage you clicking a malicious link or button
• CEO Fraud/Business Email Compromise
PHISHING TYPES: SPEAR PHISHING
A malicious emails sent to a specific
person. Attackers already have
some information about the victim:
His name, Place of employment, Job
title, Email address, and Specific
information about their job role.
PHISHING TYPES: WHALING PHISHING “BIG FISH”
• A deceptive email messages
targeting high-level decision makers
or high profile individuals within an
organization. Such individuals have
access to highly valuable information,
including trade secrets and
passwords to administrative company
accounts.
• Trick the executive into revealing
sensitive information and corporate
data.
PHISHING TYPES: ANGLER PHISHING
• Attacker uses social media to trick people. Fake URLs; cloned
websites, posts, and tweets; and instant messaging can all be
used to persuade people to divulge sensitive information or
download malware.
• Alternatively, criminals can use the data that people willingly post
on social media to create highly targeted attacks.
PHISHING TYPES: SMISHING AND VISHING
• SMISHING
• Attackers sending text messages
(the content of which is much the
same as with email phishing),
• Vishing
• Attackers use a telephone
conversation.
• phishing over the phone
IMPACT ON BUSINESS
• IP Spoofing Attack.
• MAC Spoofing Attack.
• Email Spoofing Attack.
• DHCP Spoofing Attack.
• Examples
• Vodafone calls .
LAB
• Use engage
packet builder tool
HOW TO AVOID ?
• End-to-end encryption
• VPNs
• Session ID monitors
• Delete cookies
• Strengthen internal policies
BUFFER OVERFLOW ATTACK
• Buffers are memory storage regions that
temporarily hold data while it is being
transferred from one location to another
• A buffer overflow (or buffer overrun) occurs
when the volume of data exceeds the storage
capacity of the memory buffer.
• Attackers exploit buffer overflow issues by
overwriting the memory of an application,
• this changes the execution path of the
program.
• Triggering a response that damages files
• Exposes private data
• the attacker gaining administrative access to
the system in a command prompt or shell
HOW TO AVOID ?
• Validation
• Use new programing languages
PASSWORD ATTACK
• a process of recovering passwords from data that has been
stored in or transmitted by a computer system.
https://passwordsgenerator.net/
HOW TO AVOID ?