Module 7
Module 7
Architecture
Module 7 – Application/Network Attacks
• Markup language 3
• Method for adding annotations
to text
• HTML
Markup • Uses tags surrounded by
brackets
Language • Instructs browser to display text
HTML and in specific format
XML • XML
• Carries data instead of indicating
how to display it
• No predefined set of tags
• Users define their own tags
4
XML
Code
5
XML attack
• Similar to SQL injection attack
• Attacker discovers Web site that does not filter
XML user data
Injection • Injects XML tags and data into the database
(cont’d.)
Xpath injection
• Specific type of XML injection attack
• Attempts to exploit XML Path Language
queries
6
Client-side attacks
target vulnerabilities
Client-Side in client applications
Attacks
• Client initiates connection
with server, which could
result in an attack
8
Header manipulation
Client-Side
Attacks • HTTP header contains fields that
characterize data being transmitted
(cont’d.) • Attacker’s short program can allow
modification
11
First-party cookie
Session cookie
Persistent cookie
• Recorded on computer’s hard drive
Client-Side • Does not expire when browser closes
Attacks
(cont’d.) Secure cookie
• Used only when browser visits server
over secure connection
• Always encrypted
14
Flash cookie
Session hijacking
Review Networking
OSI Model
Network Packet
19
20
21
• Denial of Service (DoS)
• Attempts to prevent system from
performing normal functions
Network • Ping flood attack
Attacks • Ping utility used to send large
number of echo request
messages
• Overwhelms Web server
22
• Denial of Service (DoS)
• Attempts to prevent system from
performing normal functions
Network • Smurf attack
• Ping request with originating
Attacks address changed
• Appears as if target computer
is asking for response from all
computers on the network
23
24
25
DOS Attack
26
27
Man-in-the-middle
• Interception of legitimate communication
• Forging a fictitious response to the sender
• Passive attack records transmitted data
Interception • Active attack alters contents of transmission
before sending to recipient
Replay attacks
• Similar to passive man-in-the-middle attack
29
30
Populating the ARP Table
31
32
• ARP poisoning
• Attacker modifies MAC address in
the victims ARP cache to point to
attacker’s computer
ARP
Poisoning
Poisoning (cont’d.)
ATTACKS FROM ARP POISONING
34
DNS poisoning
• Privilege escalation
• Exploiting software vulnerability
to gain access to restricted data
Attacks on • Lower privilege user accesses
functions restricted to higher
Access Rights privilege users
• User with restricted privilege
accesses different restricted
privilege of a similar user
37
• Transitive access
• Attack involving a third
party to gain access
Attacks on rights
Access Rights • Has to do with whose
(cont’d.) credentials should be
used when accessing
services
• Different users have
different access rights
38 2024-07-02 vcc.ca