VPN screen scraper = app that allows an attacker to capture what is on the user’s display (abernathy?)
Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose.
SDN (Software Defined Network) –> physical separation of network control plane from fwd plane (decisions are taken remote, not on the hardware)
VSAN (Virtual Storage Area Network) –> sw-defined storage that allows pooling of storage capabilities & instant/automatic provisioning of VM storage.
Noise –> interference introduced to the cables, distorts the signal –> problems
Attenuation –> weakening of the signal as it travels down the cable
Crosstalk –> wires in parallel –> signals interfere w/ each other & distort the signal
Eavesdropping –> fiber optic is the safest !
Network attacks
non-blind spoofing –> attacker in the same subnet, sniffs the seq/ack numbers and hijacks the session
blind spoofing –> pkts sent to victim to obtain a sampling of seq numbers & generate a valid seq number for the attack (works on older systems)
MITM –> intercepts legitimate traffic between 2, attacker controls info flow & can alter comm
Remote access
- Caller ID –> dial in & auth, server checks if incoming number is correct
- callback –> dial in & auth, server hangs up and calls back to a predefined number
MAC flooding –> overflow the MAC table w/ many entries, transforming the device into a hub-like device
ARP poisoning –> within VLAN, fools routers into learning false MAC addr; then pose as that device and do MITM
ICMP attacks
Ping of Death –> send oversized packets, victim’s OS becomes unstable
Smurf –> ICMP echo request –> sent to the broadcast on victim’s behalf (faked) –> all devices in the network answer –> DDoS
Fraggle –> uses UDP, echo & chargen packets, DDoS like smurf
ICMP redirect –> alter the routing table of the host that receives the message using ICMP redirect packets (type 5, used to specify better routing paths)
ping scanning –> pings every IP address to see if it’s alive
LAND - LAN Denial –> DoS, malformed IP src/dst/port = same
Teardrop –> DoS, several large overlapping IP fragments sent –> reassembly = crash
DNS attacks
DNS cache poisoning –> attacker attempts to refresh/update the record when it expires w/ a fake address (on the DNS server’s cache)
pharming –> redirect a website’s traffic to a fake site (by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software)
DoS –> attack the DNS server
DDoS –> DoS from several devices
DNSSEC –> stronger auth mechanism, digital signatures to validate the source of DNS messages
URL hiding –> embed URL in web pages/email (text ok, hyperlink fake)
domain grabbing –> idividuals register a domain name of a well-known company before the company does it
cybersquatting –> domains registered to hold them hostage (sell them to the “right owner”)
Email attacks
email spoofing –> fake the headers to look like it comes from somebody else
phishing –> convince the stupid user to click a link in a unsolicited email (social eng)
spear phishing –> phishing targeted to specific persons
whaling –> important person in the company
spam –> mass email
teardrop –> fragmentation attack, malformed fragments of the packet are sent, @reassembly the victim crashes
session hijacking –> attacker places himself in the middle of an active conversation
IP addr spoofing –> impersonate another IP addr
zero day –> previously unknwon sec vuln
Bluetooth
operates in 2.4 GHz, uses FHSS and AFH (Adaptive Freq Hopping) - switches congested channels, low power
uses a weak encryption cipher, E0; has 128-bit key, is vulnerable
- buffer overflow
- bluejacking (unsolicited msg are sent)
- BlueBug attacks (can overtake phone, send SMS, download/modify data)
bluejacking | send unsolicited msg over Bluetooth |
Red Fang | find non-discoverable Bluetooth devices |
bluesnarfing | theft of data via Bluetooth |
layer | proto |
---|---|
7 - application | HTTP, FTP, TFTP, DHCP, DNS, SMTP, POP3. telnet, SSH |
6 - presentation | GIF, JPEG, MPEG |
5 - session | PAP, RPC |
4 - transport | UDP, TCP |
3 - network | IP, RIP, OSPF |
2 - data link | ethernet, frame relay, token ring, PPP, CDP |
1 - physical |
Firewalls
type | descr |
---|---|
static pkt filtering | (aka screening routers) examines msg headers - src/dst/port; LAYER 3 |
app-level gateway | (aka proxy) copies pkt from netw to another; change src/dst addr; based on content LAYER 7 |
circuit-level gateway | establish comm sessions btw trusted partners; based on circuit, not content; LAYER 5 |
stateful inspection | (aka dynamic) evaluate state/context of connection; LAYER 3+4 |
deep pkt inspection (DPI) | filter the payload, can block domains, malware, spam from payload; LAYER 7 |
NG firewalls | MFD - multifunction device: IDS, IPS, NAT, VPN, antivir, etc |
TRICKS
HTTPS encrypts @ layer 4, using SSL/TLS; the entire HTTPS message; S-HTTP - never widely used, encrypts only data @ layer 7