CH 2 - Network Security Threats
CH 2 - Network Security Threats
Network Security
Threats
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com.
Learning Objective and Key Concepts
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Recognize the impact that ▪ Hackers and their motivations
malicious exploits and attacks have
▪ The hacking process
on network security.
▪ Hardware failures, physical threats,
accidents, and other disasters
▪ Common types of malware
▪ Social engineering practices and
their impact on network security
efforts
Hackers and Their Motivation
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Thrill Hobby Challenge Peer pressure
Attack perceived
Power Financial gain
social injustice
Hackers and Their Motivation (Cont.)
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Opportunistic: Timid; not likely to initiate an attack but will take
advantage if the right opportunity presents itself
Professional: Criminals whose sole career objective is to
compromise IT infrastructures
Favorite Targets of Hackers
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Easy assets Unique targets Easy targets
Complex infrastructures
Control of networks
Threats from Internet Personnel and External Entities
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Have physical access to the facility
▪ Insider threats
▪ Have logical access to the network
▪ Disgruntled employees who
▪ Address employee threats in your believe they have been wronged
security policy, network design, by the organization
infrastructure deployment, and ▪ Can include contract workers
ongoing system and security ▪ External threats
management ▪ Hackers
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-1 Internal and external hackers.
Internal and External Hackers
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-2 Five phases of hacking.
The Hacking Process
Reconnaissance
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ The act of inspecting or exploring
▪ Also called footprinting, discovery,
research, and information gathering
Examples:
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Examining search engine contents; reviewing the organization’s website
▪ Investigating the background of personnel
▪ Performing location mapping
▪ Auditing financial records or reviewing public filings
▪ Reviewing court cases and other public records
▪ Querying whois, domain registrations, and public IP assignments
▪ Eavesdropping on email and other conversations
▪ Visiting a physical location for the organization
Scanning
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
reconnaissance and to discover
new details
▪ Aimed at discovering live and
active systems
▪ Can include wardialing, wardriving,
ping sweeps, and port scanning
▪ Often referred to as probing: The
hacker sends packets to elicit
responses
FIGURE 2-2 Five phases of hacking.
▪ Is detectable
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-3 Basic TCP and
UDP port scanning.
Basic TCP and UDP Port Scanning
Enumeration
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Hackers’ process of discovering
sufficient details about a target to
learn if a vulnerability exists that
they can successfully attack
▪ Probe open and closed ports of a
target
▪ Open ports have services running
behind them
FIGURE 2-2 Five phases of hacking.
▪ Banner grabbing is probing
services to obtain information
A Banner Grabbed from a Web Server
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-4 A banner
grabbed from a web server.
Courtesy of Zenmap.
Attacking
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Successful attack
▪ May take seconds
▪ Move to post-attack activities
▪ Failed attack
▪ Modify approach and relaunch
attack
▪ Return to enumeration results to
select a new point of assault
▪ Move to fallback attacks FIGURE 2-2 Five phases of hacking.
Post-Attack Activities
Depositing
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Privilege
additional hacker
escalation
tools
Creating a re-
Pilfering data entry point
(backdoor)
Removing
evidence of the
hack FIGURE 2-2 Five phases of hacking.
Common IT Infrastructure Threats
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Hardware failures and other physical threats
Natural disasters
Accidents
Hardware Failures and Other Physical Threats
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Common cause of downtime
▪ Preparation is the best defense
▪ Perform consistent periodic backups
▪ Conduct general cleaning and maintenance
▪ Keep spare parts on hand
▪ Replace equipment before it fails
▪ Solid-state drives (SDDs) eliminate many problems associated with hard disk
drives but at a greater initial cost for the hardware
Hardware Failures and Other Physical Threats (Cont.)
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Static electricity
Too much heat Frayed wires
discharge (SED)
Intentional
Moisture electromagnetic Theft
interference (IEMI)
Natural Disasters
Weather events
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
• Understand types of weather events common to your area
Precautions
• Special insurance
• Structural reinforcements
• Lightning protection
• Surge protectors
• Bilge pumps
Best protection
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Tripping over cables ▪ Backups, configuration
documentation, and training
▪ Pulling out the wrong power cord or
cable ▪ Adjustments to worker activities
▪ Tripping the building’s circuit ▪ Training employees what to do in
breaker the event of an accident or
emergency
▪ Setting off the water sprinklers
▪ Knocking over a computer
▪ Turning off a system prematurely
▪ Installing the wrong driver
Malicious Code (Malware)
Effects of malware
Distribution methods
change
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Email
Malicious websites Poor system performance
File transfer Pop-up ads
Flaws in software System becomes a “bot” or
“zombie”
Common Types of Malware
Keystroke
Viruses and Spyware and
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Trojan horses loggers
worms adware
(“keyloggers”)
Trapdoors and
Rootkits Logic bombs Dialer
backdoors
▪ Highly targeted
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Targeting intelligence often gleaned
from other types of attacks
▪ Phishing
▪ Social engineering
▪ Occurrence has increased
dramatically but represents a small
percentage of attacks
Fast Growth and Overuse
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
A slightly slower growth Failure to address
rate to build network security issues in a period
security concurrently with of explosive growth is
expansion of the more likely to result in
organization is more likely catastrophic failure
to provide sustained
growth and longevity
Wireless Versus Wired
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Wireless networks allow for remote attacks
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Listening in on communications
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-6 Eavesdropping on an existing session between client
and server.
Hijack and Replay Attacks
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Occur when a hacker uses a ▪ Also known as playback attacks
network sniffer to watch a
▪ The hacker uses a network sniffer
communications session to learn its
to capture network traffic
parameters
▪ The hacker retransmits that traffic
▪ The hacker disconnects one of the
back onto the network at a later
session’s hosts, impersonates the
time
offline system, and injects crafted
packets into the communication ▪ Goal is to gain interactive or
stream session access to a system
▪ The hacker then takes over the
session of the offline host
Replay Attacks Collect Authentication Packets, and Then
Retransmit the Packets at a Later Time
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-7 Replay attacks collect authentication packets, and then
retransmit the packets at a later time.
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Cross-site scripting
Rogue device
insertion
(XSS)
SQL injection
IDS insertion
Insertion Attacks
Fragmentation Attacks
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Occur when many different network links connect to construct a global
infrastructure
▪ Overlapping
▪ Can cause full or partial overwriting of datagram components, creating new
datagrams out of parts of previous datagrams
▪ Overrun
▪ Can result in excessively large datagrams
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Buffer
▪ Memory-based attacks
• An area of memory designated to ▪ Typically a result of poor
receive input
programming
▪ Can result in code injection
Buffer overflow
▪ Used for crashing systems
• An attack against poor
programming techniques and lack
of quality control
Session Hijacking, Spoofing, and Man-in-the-Middle
Attacks
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Man-in-the-middle
Session hijacking Spoofing attacks
(MitM) attacks
▪ Hacker takes over the connection after a client authenticates with a server
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Attacker does not directly learn credentials of the client
▪ May employ DNS spoofing, poisoning, ARP spoofing, ICMP redirects, and
rogue Dynamic Host Configuration Protocol (DHCP) to alter the route or
pathway of a session
▪ Hosts that use TCP/IP without encryption are vulnerable to session hijacking
▪ Encryption = only true protection against session hijacking
Session Hijacking Steals a Connection from a Client
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-8 Session hijacking steals a connection from a client.
Spoofing Attacks
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Email addresses, Media Access Control (MAC) addresses, and IP addresses
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-9 Spoofing of a client’s MAC address
by a hacker’s computer.
Man-in-the-Middle Attacks
▪ ARP spoofing
▪ Address Resolution Protocol (ARP)
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ A nonauthenticating broadcast query service that requests the MAC address from a
system using a specific IP
▪ MAC spoofing
▪ The hacker’s computer uses a server’s MAC address and receives traffic instead of
the intended server once the server is flooded
▪ DNS poisoning
▪ The hacker compromises a Domain Name System (DNS) server and plants false
FQDN-to-IP mapping records
▪ The DNS source then feeds subsequent user queries false data
Man-in-the-Middle Attacks (Cont.)
▪ DNS spoofing
▪ A nonauthenticating query service requests the resolution of a FQDN into its related
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
IP address, allowing false DNS responses to be sent
▪ ICMP redirect
▪ Causes a host to alter its routing table
▪ Proxy manipulation
▪ The hacker reconfigures a client’s proxy configuration
▪ Rogue DHCP
▪ A false DHCP server that can provide IP address configuration leases for a unique
subnet and define the default gateway, because the hacker’s computer acts as a
MitM router/proxy
Man-in-the-Middle Attacks (Cont.)
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
access point that can fool users into connecting, which then serves as a MitM proxy
Man-in-the-Middle Attacks Fool Clients into Initiating
Sessions with the Hacker Instead of the Target Server
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-10 Man-in-the-middle attacks fool clients into initiating sessions with
the hacker instead of the target server.
Cover Channels
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Covert channel information transfer
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-11 Slack space is the unused portion of the last cluster only partially
consumed by a stored file.
Network and Resource Availability Threats
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Availability attacks are a fallback option when hackers can’t locate a
vulnerability to exploit
▪ Availability attacks
▪ Denial of service (DoS)
▪ Prevents legitimate access or use of a resource to delay or interrupt business
▪ Can involve exploitation of a flaw or traffic generation
▪ Distributed denial of service (DDoS)
▪ Attacks through massive distributed processing and sourcing
▪ Foundations are agents, bots, or zombies, which are malicious code implanted on victim
systems across the Internet
Denial of Service Flooding Attack Against a Client
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-12 Denial of service flooding attack against a client.
Distributed Denial of Service Flooding Attack Against a
Primary Target
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
FIGURE 2-13 Distributed denial of service
flooding attack against a primary target.
Hacker Tools
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ Operating system utilities
▪ Commercial applications
▪ Custom code
▪ More
▪ Whitelisting is the best defense
▪ Whitelisting restrictions
▪ A whitelisting system incorporates a list of
approved software executables for use
▪ Applications not on the list are blocked
Social Engineering
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
security
▪ Humans are primary targets
▪ People are weakest link and can be tricked or fooled
▪ Techniques include impersonating a position of authority,
asking favors, offering social validation, and creating urgency
▪ Gaining access to inside information is often the first element
of a social engineering attack
▪ Other techniques include dumpster diving, reconnaissance,
and cold calling
▪ The best defense is user training and awareness
Summary
Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
▪ The hacking process
▪ Hardware failures, physical threats, accidents, and other disasters
▪ Common types of malware
▪ Social engineering practices and their impact on network security efforts