14. Network Attack Phases Flashcards

1
Q

Classic model phases of compromise

A
Reconnaissance
Exploitation
Reinforcement
Consolidation
Pillage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sophisticated attacks will also

A

Come from a variety of IPs/locations
Be spread over a considerable period of time
Not all attacks will use all five phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reconnaissance

A
Attacker scopes out network looking for
 - services
 - vulnerabilities
 - connectivity methods
Options;
 - port scan
 - banner grabbing
 - DNS brute forcing
 - Google
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port scan

A

One to one
- trivial or difficult to spot depending on speed of scan
One to many
- trivial or difficult to spot depending on speed of scan
Many to one
- difficult to spot, most likely coordinated from a botnet; each client may test a different port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPv6 Port Scan

A

Less feasible because;
- 128 bits of IPv6 address space is considerably bigger than 32 bits of IPv4
- IPV6 subnets to which hosts attach will by default have 64 bits of host address space.
- traditional methods of remote TCP or UDP port scanning to discover open or running services on a host - less computationally feasible because - larger search space in the subnet
- can be reduced in two ways
1. if an admin numbers their hosts in a predictable way [prefix]::1 upwards
2. In case of statelessly autoconfiguring hosts, the host part of the address takes a well-known format including Ethernet vendor prefix and fffe stuffing
In 2nd case, search space less to 24bits (one probe per sec = takes 194 days)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Comparison IPv4 IPv6 port scanning

to see if a particular open service is running on a host in that subnet

A

IPv4 - 8bits reserved for host addressing
Attacker probe 256 addresses
One probe per second; may take 5 mins to complete

IPv6 - 64 bits reserved for host addressing
Attacker probe 2^64 addresses
One probe per second; may take 5 billion years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mitigating reduction of space in IPv6 host addressing

A
  1. Use IPv6 Privacy extensions - hosts in network only ever connect to external sites using their temporary privacy address
    Even if scanned, risk is reduced
  2. Admin to configure DHCPv6 so that first addresses allocated from pool begine much higher in address space than [prefix]::1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Banner grabbing

A

Services give away their version, normally in the form of a banner
- might be a part of a port scan by tools such as nmap
Apache 2.2.24+ fixes some cross-site scripting issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS brute force

A

Attempts to enumerate DNS hostnames by brute force guessing of common subdomains
Take commonly used system / service / server names and try them against the target domain
- get a list of potential targets
Often not detected - won’t trigger an IDS if not watching DNS traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use Google

A
Detecting vulerabilities with google (without tripping IDS)
eg find vulnerable wiki installation using gg search options
 - to look on Janet domains
site:ac.uk
 - to look for a specific wiki name
inurl:twiki
or combine
site:ac.uk inurl:twiki
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Detecting reconnaissance

A

Attackers sniffing around for attack avenues? How to detect?
Can’t
Traffic may look normal
Too much ‘background’ noise
Unless very rapid scans from a single or small no of sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exploitation

A

After detecting poss attack path
Try to exploit, to gain level of contro over system;
- remote command execution
- buffer overflow
- SQL injection (poss if input filtering is not robust)
- Cross-site scripting (XSS) attack (insert malicious code into content of site - poss if server doesn’t check the input from a user that is reuses)
- brute force (eg pw dictionary attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Detecting exploitation

A

Primary tool - IDS/IPS
- can block if observe a known attack
a 0-day attack wont have corresponding signature so not detected (attackers tend to save 0-day for prime targets)
Prudent to scan own network for known vulnerabilities, to detect & address them before exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reinforcement

A
Attacker may
Retrieve tools
 - wget from another compromised system
Escalate privileges
 - exploit a kernel vulnerability
Install rootkit
 - to allow back door in later
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detecting reinforcement

A

Network flow tools
Session statistics
Extrusion detection (web server connecting to an FTP server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consolidation

A

Attacker returns later via some covert channel or backdoor

  • perhaps irc
  • backdoor may be clear text or encrypted
  • may be long time after exploitation that attacker abuses the compromised system
17
Q

Detecting consolidation

A

Network flow or session data

  • look for protocol anomalies
  • poss the back door is encrypted
  • may need to look at full packet captures
18
Q

Pillage

A

Attacker may:

  • Steal
  • Damage
  • Attack other systems
  • DoS, DDoS
19
Q

Pillage detection

A

network flow data is valuable

traffic accounting tools

20
Q

Summary of phases

A

Five phases - NSM Tools:

Reconnaissance - Portscan, netflow

Exploitation - IDS signatures

Reinforcement - Netflow / extrusion

Consolidation - Pcap, netflow

Pillage - Netflow, mrtg

21
Q

NSM

A

Network Security Monitoring

22
Q

portscan

A

A port scanner is a software application designed to probe a server or host for open ports.

23
Q

netflow

A

Netflow is a feature that was introduced on Cisco routers that give the ability to collect IP network traffic as it enters or exits an interface. By analyzing the data that is provided by Netflow a network administrator can determine things such as the source and destination of the traffic, class of service, and the cause of congestion. Netflow consists of three components: flow caching, Flow Collector, and Data Analyzer.

24
Q

IDS signatures

A

A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats.

25
Q

extrusion

A

Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful attempts to use the resources of a computer system to compromise other systems.
eg web server contacting an FTP server

26
Q

pcap

A

pcap (packet capture) consists of an application programming interface (API) for capturing network traffic.

27
Q

mrtg

A

free software for monitoring and measuring the traffic load on network links. It allows the user to see traffic load on a network over time in graphical form.