Into what broad categories can attacks be grouped?
Software and protocol/service.
social engineering
An attack against a user, typically involves some form of social interaction.
phishing
An attacker masquerades as a trusted entity to obtain sensitive information from users.
spear phishing
A phishing attempt that targets a specific group.
whaling
A phishing attempt at a high-value target.
vishing
A phishing attempt using voice communication technology.
tailgaiting
The tactic of following closely behind a person who has just used their own legitimate access to a building or room.
impersonation
An attacker assumes a role that is recognized by the target, and uses the target’s bias against their better judgement.
third-party authorization
Using previously obtain information (project, deadline, boss, etc.) an attacker arrives with:
watering hole attack
The method of infecting a target website with malware. These are complex and often the work of nation states.
list: 2 major social engineering principles
2. Most people seek to avoid confrontation.
list: at least 5 social engineering tools
Authority Intimidation Consensus Scarcity Familiarity Trust Urgency
describe: trust (social engineering)
An understanding of how something will act under specific conditions.
The whole objective of social engineering is not to force people to do things they would not do, but rather to give them a pathway that leads them to feel they are doing the correct thing in that moment.
DoS
Denial of Service. An attack to prevent access to a target system.
DDoS
Distributed Denial of Service. An attack that employs multiple attacking systems, typically a botnet.
man-in-the-middle
An attack that inserts itself between 2 legitimate communicators. All communication is routed through the attacker’s host.
session hijacking
A MitB attack. Information is stolen and allows the attacker to impersonate a legitimate session.
Example is a cross-site scripting attack, which tricks the user into executing code, resulting in cookie theft.
buffer overflow
The input buffer that is used to hold program input is overwritten with data that is larger than the buffer can hold.
They typically inherit the privilege level of the program being exploited.
list: root causes of buffer overflow
Poor programming practice and programming language weakness.
C was designed for space and performance. Many functions, like gets() are unsafe in that they permit operations such as unbounded string manipulation into fixed buffer locations.
SQL injection
A tactic of modifying input to result in an SQL statement. XML and LDAP injections are done in the same fashion.
XSS
Cross-site scripting. A common web attack method, wherein an attacker can include a script in their input, and have it rendered as part of the web process.
list: 3 types of XSS attacks
list: 4 ways to limit XSS attacks
XSRF
Cross-site request forgery. An attack that utilizes unintended behaviors that are proper in defined use, but are performed under circumstances outside authorized used.
An example of the confused deputy problem.
Performed against sites that have authenticated a user. The attack exploits the site’s trust in a previous authentication event.
By tricking a user’s browser to send an HTTP request to the target site, the trust is exploited.