Cyber Attacks with Mitigation
Cyber Attacks with Mitigation
Brute-Force Attack:
o Lock accounts after multiple failed login attempts (e.g., 5 attempts within 10
minutes).
o Use SIEM solutions (e.g., Microsoft Sentinel) to track multiple failed login
attempts from the same IP.
o Allow logins only from trusted IP addresses (especially for admin accounts).
o Report the attack to security teams and monitor for follow-up attempts.
o Even if an attacker guesses the password, they cannot access the account
without an additional factor like OTP, biometrics, or a security key.
o Monitor logs for multiple failed login attempts from the same IP.
• Strong Password Policies – Require long, complex passwords that do not appear in
common wordlists.
• Multi-Factor Authentication (MFA) – Prevents unauthorized access even if a
password is guessed.
• Account Lockout & Rate Limiting – Temporarily locks accounts or slows down login
attempts after multiple failures.
• Password Blacklisting – Restricts users from setting commonly used passwords.
• CAPTCHA on Login Attempts – Prevents automated tools from brute-forcing
passwords.
• IP Blocking & Geo-Fencing – Blocks repeated failed login attempts from suspicious
IPs or regions.
• Use Passkeys or Biometric Authentication – Eliminates reliance on passwords.
Rainbow Attack:
Attack Description:
Instead of requiring plaintext passwords, the attacker directly passes the hash to
authenticate into systems that accept NTLM or Kerberos authentication.
Scanning Attacks:
Attack Description:
Attack Description:
A sniffing attack occurs when an attacker captures network traffic to eavesdrop on sensitive
information such as usernames, passwords, emails, or financial data. This is done using
packet-sniffing tools like:
Sniffing attacks are especially dangerous in unencrypted networks, such as public Wi-Fi or
poorly secured enterprise networks.
Spoofing Attack:
Attack Description:
Phishing Attack:
Attack Description:
Attack Description:
Attack Description:
• A SYN Flood attack is a type of Denial-of-Service (DoS) attack that exploits the TCP
three-way handshake process.
• The attacker sends a large number of SYN (synchronize) requests to a target server
but never completes the handshake by sending the ACK (acknowledge) response.
This keeps the server waiting, consuming resources, and eventually making the
service unavailable.
Attack Process:
Attack Description:
ARP (Address Resolution Protocol) Poisoning, also known as ARP Spoofing, is a Man-in-the-
Middle (MitM) attack where an attacker sends fake ARP replies on a local network to
associate their MAC address with the IP address of another device (e.g., a router or
gateway).
Attack Process:
2. Victims update their ARP cache with the attacker's MAC address for a critical IP (e.g.,
the default gateway).
4. Attacker can sniff sensitive data or use the connection for further exploitation.
Attack Description:
o Ensures browsers only connect to the website over HTTPS, preventing SSL
stripping attacks.
o Use Intrusion Detection Systems (IDS) like Snort or Suricata to detect unusual
patterns.
o Deploy SIEM tools (Microsoft Sentinel, Splunk, QRadar) for real-time alerts.
Attack Description:
• DNS poisoning (also known as DNS spoofing) occurs when an attacker manipulates
DNS records to redirect users to malicious websites instead of legitimate ones.
• This can lead to phishing, malware infections, and data theft.
How DNS Poisoning Works:
1. Compromising a DNS Cache – The attacker injects false DNS entries into a caching
DNS resolver, causing users to be redirected to malicious sites.
2. Intercepting DNS Queries – The attacker manipulates DNS responses to trick users
into visiting fraudulent sites.
3. Modifying Hosts Files – Some malware modifies the local hosts file to override
legitimate DNS lookups.
o Restrict unauthorized DNS traffic and block external DNS resolvers within
corporate networks.
5. Monitor DNS Logs & Use SIEM for Threat Detection
o Detect unusual DNS requests (e.g., rapid lookups for random domains).
o Ensure systems are using trusted DNS resolvers instead of rogue DNS servers.
Attack Description:
o The infected system encodes data (e.g., commands, credentials) into DNS
queries.
o Look for unusually large DNS queries or high query rates to uncommon
domains.
o Log all DNS queries using Windows DNS logs, Cisco Umbrella, or Google Cloud
DNS.
o Configure endpoints and servers to use trusted internal DNS servers only.
o Use security tools like Infoblox, Palo Alto DNS Security, or Cisco Umbrella to
filter malicious domains.
o Restrict external DNS traffic and enforce strict outbound access controls.
Mitigation Techniques:
Fileless Attack & Mitigation:
• A Fileless Attack is a type of cyberattack that does not require installing traditional
malware files.
• Instead, it leverages built-in tools (like PowerShell, WMI, and macros) to execute
malicious code directly in memory, making it harder to detect.
SQL Injection Attack:
SQL Injection (SQLi) is a web attack where an attacker injects malicious SQL queries into
input fields to manipulate a database, steal sensitive data, or bypass authentication.
Mitigation Techniques:
XSS Attack:
Cross-Site Scripting (XSS) is a web vulnerability where an attacker injects malicious scripts
(JavaScript, HTML, etc.) into a website to steal user data, hijack sessions, or deface
webpages.
By sanitizing inputs, encoding outputs, and restricting script execution, XSS attacks can be
effectively prevented.
CSRF Attack:
Cross-Site Request Forgery (CSRF) is an attack where an attacker tricks a user into
unknowingly executing unauthorized actions on a trusted website where they are
authenticated. This can result in changing account settings, making transactions, or
modifying data without the user’s consent.
Mitigation Techniques:
Broken Access Control occurs when attackers exploit improper authorization mechanisms to
access, modify, or delete data they shouldn't have permission for. This can lead to data leaks,
privilege escalation, or unauthorized system modifications.
Mitigation Techniques: