Go4Expert

Go4Expert (http://www.go4expert.com/)
-   Ethical hacking Tips (http://www.go4expert.com/articles/ethical-hacking-tutorials/)
-   -   Types of Attacks (http://www.go4expert.com/articles/types-of-attacks-t7685/)

SpOonWiZaRd 3Dec2007 16:54

Types of Attacks
 
Well I wrote the article about viruses and said that I will write this article about the types of attacks and how to protect yourself against these attacks. There are alot of different attacks but I'm going to cover only these:
  • Eavesdropping
  • Snooping
  • Interception
  • Modification Attacks
  • Repudiation Attacks
  • Denial-of-service (DoS) Attacks
  • Distributed denial-of-service (DDoS) Attacks
  • Back door Attacks
  • Spoofing Attacks
  • Man-in-the-Middle Attacks
  • Replay Attacks
  • Password Guessing Attacks

Eavesdropping - This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.

Snooping - This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.

Interception - This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties.

Modification Attacks - This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks.

Repudiation Attacks - This makes data or information to appear to be invalid or misleading (Which can even be worse). For example, someone might access your email server and inflammatory information to others under the guise of one of your top managers. This information might prove embarrassing to your company and possibly do irreparable harm. This type of attack is fairly easy to accomplish because most email systems don't check outbound email for validity. Repudiation attacks like modification attacks usually begin as access attacks.

Denial-of-service Attacks - They prevent access to resources by users by users authorized to use those resources. An attacker may try to bring down an e-commerce website to prevent or deny usage by legitimate customers. DoS attacks are common on the internet, where they have hit large companies such as Amazon, Microsoft, and AT&T. These these attacks are often widely publicized in the media. Several types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. A DoS attack on a system crashes the operation system (a simple reboot may restore the server to normal operation). A common DoS attack is to open as many TCP sessions as possible; This type of attack is called TCP SYN flood DoS attack. Two of the most common are the ping of death and the buffer overflow attack. The ping of death operates by sending Internet control message protocol (ICMP) packets that are lrger than the system can handle. Buffer overflow attacks attempt to put more data into the buffer than it can handle. Code red, slapper and slammer are attacks that took advantage of buffer overflows, sPing is an example of ping of death.

Distributed Denial-of-service Attacks - This is similar to a DoS attack. This type of attack amplifies the concepts of DoS attacks by using multiple computer systems to conduct the attack against a single organization. These attacks exploit the inherent weaknesses of dedicated networks such as DSL and Cable. These permanently attached systems have little, if any, protection. The attacker can load an attack program onto dozens or even hundreds of computer systems that use DSL or Cable modems. The attack program lies dormant on these computers until they get attack signal from the master computer. This signal triggers these systems which launch an attack simultaneously on the target network or system.

Back door Attacks - This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.

Spoofing Attacks - This is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered as an access attack. The most popular spoofing attacks today are IP spoofing and DNS spoofing. The goal of IP spoofing is to make the data look like it came from a trusted host when it really didn't. With DNS spoofing, The DNS server is given information about a name server that it thinks is legitimate when it isn't. This can send users to a website other than the one they wanted to go to.

Man-in-the-Middle Attacks - This can be fairly sophisticated, This type of attack is also an access attack, but it can be used as the starting point of a modification attack. This involves placing a piece of software between a server and the user that neither the server administrators nor the user are aware of. This software intercepts data and then send the information to the server as if nothing is wrong. The server responds back to the software, thinking it's communicating with the legitimate client. The attacking software continues sending information to the server and so forth.

Replay Attacks - These are becoming quite common, This occur when information is captured over a network. Replay attacks are used for access or modification attacks. In a distributed environment, logon and password information is sent over the network between the client and the authentication system. The attacker can capture this information and replay it later. This can also occur security certificates from systems such as kerberos: The attacker resubmits the certificate, hoping to be validated by the authentication system, and circumvent any time sensitivity.

Password Guessing Attacks - This occur when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain passwords for an access or modification attack. There are two types of password guessing attacks:

- Brute-force attack: Attempt to guess a password until a successful guess occurs. This occurs over a long period. To make passwords more difficult to guess, they should be longer than two or three characters (Six should be the bare minimum), be complex and have password lockout policies.
- Dictionary attack: This uses a dictionary of common words to attempt to find the users password. Dictionary attacks can be automated, and several tools exist in the public domain to execute them.

Well, there you have it, the only way basically to prevent these types of attacks is to get a good firewall, anti-virus software, and a good Intrusion Detection System (IDS). Tell your firewall to drop ICMP packets, that will prevent ICMP flooding. I will write another article in which I will cover only TCP and UDP attacks such as:
  • Sniffing
  • Port Scanning
  • TCP Syn or TCP ACk Attack
  • TCP Sequence number attack
  • TCP Hijacking
  • ICMP Attacks
  • Smurf Attacks
  • ICMP Tunelling

Astalavista :D

Nadr 13Dec2007 22:43

Re: Types of Attacks
 
Good article. Keep 'em coming.

SpOonWiZaRd 14Dec2007 18:30

Re: Types of Attacks
 
Thanx, I will...

Izaan 17Dec2007 19:09

Re: Types of Attacks
 
Quote:

Originally Posted by SpOonWiZaRd
Thanx, I will...

Will wait for them. Really nice one.

shabbir 1Jan2008 20:17

Re: Types of Attacks
 
I have reported the article for Nominate your favorite article of the month for December 2007. Add your nominations as well.

Homerks 6Jan2008 00:03

Re: Types of Attacks
 
I am the computer guy (not really an expert) / co owner of a small business. Our employees work out of their homes with company supplied laptops and printer/fax machines. I am concerned about the following fax some of our employees received:


"In the event that your shortcut to terminal service
does not work, use the following method:

Click on START at the bottom left of your monitor
Click on ALL PROGRAMS
Slide over and up and click on ACCESSORIES
Slide over and click on REMOTER DESKTOP
CONNECTION
Type the following number including period into the
box
198.70.156.88
Click on the CONNECT button and sign in as usual.

Thanks

Julia Davis"

We do not use remote desktop connection. Is this some type of phishing or other attempt to invade our computers?

SpOonWiZaRd 16Jan2008 01:34

Re: Types of Attacks
 
That smells like TCP hijack, that attack might be used to sniff out more passwords, but get your local Technician to have a look at it, this sounds not good at all.

shabbir 20Jan2008 23:13

Re: Types of Attacks
 
Vote this article for Article of the month for December 2007

arvindsony 2Dec2008 22:24

Re: Types of Attacks
 
goooooooood one

reddyschintuo 3Dec2008 14:24

Re: Types of Attacks
 
cool :happy:and the last one is awesome even i guess many passwords but always go invalid :nonod:


All times are GMT +5.5. The time now is 06:41.