Attacks
Types of Security Attacks
Passive Attack
They are having the nature of eavesdropping or monitoring of transmitting channel or packet sniffing
- Release of Message Content
- Traffic analysis used by intruder to gain the information
Active Attack
Involves some modification of data stream or creation of false stream
- Masquerade
- Replay
- Modification
- Repudiation
- Denial of Service
Return to Libc Attack (Buffer/Heap overflow attack)
It is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by an address of a subroutine that is already present in the process' executable memory, bypassing the NX bit feature (if present) and ridding the attacker of the need to inject their own code.- Modify the return address to point to some function already residing in memory. (This works because single stack is shared by all functions of a process (library or user program)). Smashing the Stack for Fun and Profit by Aleph One
MITM Attack (Meet in the Middle Attack)
MITM attack attempts to find a value using both of the range (ciphertext) and domain (plaintext) of the composition of several functions (or block cipher) such that forward mapping through the first functions is the same as backward mapping (inverse image) through the last functions, quite literally meeting in the middle of the composed function. The Multidimensional MITM (MD-MITM) uses a combination of several simultaneous MITM-attacks as described above, where the meeting happens in the multiple positions in the composed function. Man in the Middle & Needham--Schroeder Protocol - Computerphile
Return Oriented Programming
A technique by which an attacker can induce arbitrary behavior in a program whose control flow he has diverted - without injecting any code. A return-oriented programs chains together short instruction sequences already present in a program's address space, each of which ends in a "return" instruction.
DNS Hijacking
Advertise malicious ip address for a DNS name
Where a different ip address is broadcasted for the DNS name, that is pointing to malicious attacker.
SQL Injection
Linwood_Cole\' OR 1=1;#
\'admin;--
Types of SQL Injection
In-Band SQL Injection
- In-band SQLi occurs when the attacker uses the same communication channel to both launch the attack and gather the result of the attack
- Retrieved data is presented directly in the application web page
- Easier to exploit than other categories of SQLi
- Two common types of in-band SQLi
- Error-based SQLi
- Union-based SQLi
Error-Based SQLi
Error-based SQLi is an in-band SQLi technique that forces the database to generate an error, giving the attacker information upon which to refine their injection
Union-Based SQLi
Union-based SQLi is an in-band SQLi technique that leverages the UNION SQL operator to combine the results of two queries into a single result set
Inferential (Blind) SQL Injection
- SQLi vulnerability where there is no actual transfer of data via the web application
- Just as dangerous as in-band SQL injection
- Attacker able to recontrust the information by sending particular requests and observing the resulting behavior of the DB server
- Takes longer to exploit than in-band SQL injection
- Two common types of blind SQLi
- Boolean-based SQLi
- Time-based SQLi
Boolean-based Blind SQLi
Boolean-based SQLi is a blind SQLi technique that uses Boolean conditions to return a different result depending on whether the query returns a TRUE or FALSE result
Time-based Blind SQLi
- Time-based SQLi is a blind SQLi technique that relies on the database pausing for a specified amount of time, then returning the results, indicating a successful SQL query execution
- Example Query
If the first character of the administrator's hashed password is an 'a', wait for 10 seconds
- response takes 10 seconds -> first letter is 'a'
- response doesn't take 10 seconds -> first letter is not 'a'