Lec 07,08 - Security Attacks
Lec 07,08 - Security Attacks
Types of Attacks
Passive Attacks
Active Attacks
Attacks
Passive Attacks
Masquerade
Masquerade takes place when one entity pretends
to be an another entity.
* These images are copied from the textbook (Cryptography and Network Security, by William Stallings).
4
Replay
Involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
5
Modification of message
Means that some portion of a legitimate message is altered.
6
Denial of service
7
Anatomy of an attack
Attacker
Some one outside your network perimeter who is trying to
break in
Regular user has an inside view, so overwhelming majority
originate from inside
Collecting information
Probing the network
Launching an attack
Collecting information
XYZ is the user that wants to attack your network.
Question: Where to start?
In order to get it he has to do some investigative work
about your network.
The first thing it can do is to run the “whois” query.
Live and authoritative
Whois
Query to the interNIC.
It maintains the publicly accessible database of all
registered domains
Can be searched with simple query “whois
domainname”
“Whois pugc.edu.pk”
The organizational domain name
The organizational location
The organization’s administrative contact
The phone no and fax number for the administrator
A valid subnet address within the organization
Organization domain name
It is important because anyone can use it to collect
further information
Any host associated with this name will be an extra
information
www.pugc.edu.pk
mail.pugc.eud.pk