Podcast
Questions and Answers
Why is securing server-side web applications often considered more difficult than protecting other systems?
Why is securing server-side web applications often considered more difficult than protecting other systems?
- Server-side applications are rarely updated, leaving them vulnerable to known exploits.
- Server-side applications are inherently more complex and have a larger attack surface.
- Traditional network security devices cannot always block web application attacks. (correct)
- Client-side vulnerabilities are easier to exploit than server-side vulnerabilities.
What is a zero-day attack?
What is a zero-day attack?
- An attack that occurs on the zero hour of a specific day.
- An attack that exploits vulnerabilities that have been known for zero days.
- An attack that exploits previously unknown vulnerabilities. (correct)
- An attack that requires zero privileges to execute.
In a networked computer system, where can application attacks be directed?
In a networked computer system, where can application attacks be directed?
- At the server, the client, or both. (correct)
- Only at the client.
- Only at networking devices.
- Only at the server.
Which of the following is a key characteristic that distinguishes web application attacks from traditional network attacks?
Which of the following is a key characteristic that distinguishes web application attacks from traditional network attacks?
Which of the following best describes the primary difference between a web application attack and a client-side attack?
Which of the following best describes the primary difference between a web application attack and a client-side attack?
An attacker embeds a zero-pixel Iframe into a compromised website. What is the primary purpose of this technique?
An attacker embeds a zero-pixel Iframe into a compromised website. What is the primary purpose of this technique?
How does an attacker typically gain access to a web server's operating system in a drive-by download attack?
How does an attacker typically gain access to a web server's operating system in a drive-by download attack?
Which security vulnerability is exploited when an attacker injects malicious XML tags and data into a web application's database?
Which security vulnerability is exploited when an attacker injects malicious XML tags and data into a web application's database?
What is the primary goal of an XPath injection attack?
What is the primary goal of an XPath injection attack?
Which of the following HTTP headers is most likely to be manipulated in a client-side attack to potentially mislead a web server?
Which of the following HTTP headers is most likely to be manipulated in a client-side attack to potentially mislead a web server?
What is the main characteristic of client-side attacks?
What is the main characteristic of client-side attacks?
How does header manipulation facilitate client-side attacks?
How does header manipulation facilitate client-side attacks?
What is the primary function of add-ons or extensions in web browsers?
What is the primary function of add-ons or extensions in web browsers?
How can attackers exploit ActiveX to perform malicious attacks?
How can attackers exploit ActiveX to perform malicious attacks?
Why do attackers prioritize targeting networks?
Why do attackers prioritize targeting networks?
Which of the following is the main objective of a Denial of Service (DoS) attack?
Which of the following is the main objective of a Denial of Service (DoS) attack?
What makes Distributed Denial of Service (DDoS) attacks more potent than traditional DoS attacks?
What makes Distributed Denial of Service (DDoS) attacks more potent than traditional DoS attacks?
What occurs during a ping flood attack, and what is its impact on the targeted server?
What occurs during a ping flood attack, and what is its impact on the targeted server?
Which of the following actions can malicious add-ons perform on a web browser?
Which of the following actions can malicious add-ons perform on a web browser?
Which of the following is NOT a type of networking-based attack?
Which of the following is NOT a type of networking-based attack?
Which HTTP header field, when manipulated, allows an attacker to potentially inject SQL commands into a database?
Which HTTP header field, when manipulated, allows an attacker to potentially inject SQL commands into a database?
What type of cookie is stored in a computer's RAM and is automatically deleted when the web browser is closed?
What type of cookie is stored in a computer's RAM and is automatically deleted when the web browser is closed?
A website sets a cookie that remains on a user’s hard drive even after the browser is closed. What type of cookie is this?
A website sets a cookie that remains on a user’s hard drive even after the browser is closed. What type of cookie is this?
Which of the following best describes the primary risk associated with first-party cookies?
Which of the following best describes the primary risk associated with first-party cookies?
Besides regular cookies, what other client-side storage mechanism can websites use to store data, with a larger storage capacity?
Besides regular cookies, what other client-side storage mechanism can websites use to store data, with a larger storage capacity?
What is a session token used for in web applications, and how do attackers typically try to obtain it?
What is a session token used for in web applications, and how do attackers typically try to obtain it?
An attacker modifies the 'Referer' field in an HTTP request. What is the most likely reason for doing so?
An attacker modifies the 'Referer' field in an HTTP request. What is the most likely reason for doing so?
Which attack involves an attacker attempting to impersonate a legitimate user by stealing or guessing the user’s session token?
Which attack involves an attacker attempting to impersonate a legitimate user by stealing or guessing the user’s session token?
In a Smurf attack, what is the primary technique used to direct responses towards the victim?
In a Smurf attack, what is the primary technique used to direct responses towards the victim?
How does a SYN flood attack exploit the process of initiating a session between a client and a server?
How does a SYN flood attack exploit the process of initiating a session between a client and a server?
What is the key difference between a passive and an active Man-in-the-Middle attack?
What is the key difference between a passive and an active Man-in-the-Middle attack?
In the context of replay attacks, what is the attacker's primary goal when capturing and retransmitting network communications?
In the context of replay attacks, what is the attacker's primary goal when capturing and retransmitting network communications?
What are the two main criteria that a website must meet to be vulnerable to an XSS attack?
What are the two main criteria that a website must meet to be vulnerable to an XSS attack?
In the context of SQL injection, what is the primary goal of an attacker when exploiting a 'forgotten password' feature?
In the context of SQL injection, what is the primary goal of an attacker when exploiting a 'forgotten password' feature?
Which type of DoS attack involves an attacker overwhelming a victim's system by exploiting the transmission of Internet Control Message Protocol (ICMP) echo requests?
Which type of DoS attack involves an attacker overwhelming a victim's system by exploiting the transmission of Internet Control Message Protocol (ICMP) echo requests?
Why is proper input validation crucial in preventing server-side web application attacks?
Why is proper input validation crucial in preventing server-side web application attacks?
What is the most significant risk associated with a successful replay attack that captures logon credentials?
What is the most significant risk associated with a successful replay attack that captures logon credentials?
What is the key difference between HTML and XML in the context of web development and data handling?
What is the key difference between HTML and XML in the context of web development and data handling?
Which of the following attack types primarily aims to deceive network devices into sending responses to an unintended target?
Which of the following attack types primarily aims to deceive network devices into sending responses to an unintended target?
In what scenario would a replay attack be most effective in establishing a trust relationship between an attacker and a server?
In what scenario would a replay attack be most effective in establishing a trust relationship between an attacker and a server?
An attacker injects the following SQL code into an email field: ' OR 'a'='a
. What is the likely outcome of this injection?
An attacker injects the following SQL code into an email field: ' OR 'a'='a
. What is the likely outcome of this injection?
A web application accepts XML data to process user profiles. An attacker injects malicious XML code. What type of server-side attack is this?
A web application accepts XML data to process user profiles. An attacker injects malicious XML code. What type of server-side attack is this?
How can developers mitigate the risk of SQL injection vulnerabilities in web applications?
How can developers mitigate the risk of SQL injection vulnerabilities in web applications?
When a victim visits a website that has been injected with malicious JavaScript through an XSS attack, what is the immediate risk?
When a victim visits a website that has been injected with malicious JavaScript through an XSS attack, what is the immediate risk?
Flashcards
Server-Side Web Application Attacks
Server-Side Web Application Attacks
Attacks targeting user inputs to web applications.
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Injecting malicious scripts into websites to target clients.
XSS Attack Requirements
XSS Attack Requirements
Requires a website to accept unvalidated user input and use it in a response.
SQL Injection
SQL Injection
Signup and view all the flashcards
SQL (Structured Query Language)
SQL (Structured Query Language)
Signup and view all the flashcards
SQL Injection Example
SQL Injection Example
Signup and view all the flashcards
XML Definition
XML Definition
Signup and view all the flashcards
XML Purpose
XML Purpose
Signup and view all the flashcards
Application Attacks
Application Attacks
Signup and view all the flashcards
Network Security Device Limitations
Network Security Device Limitations
Signup and view all the flashcards
HTTP Traffic Inspection
HTTP Traffic Inspection
Signup and view all the flashcards
Zero-Day Attack
Zero-Day Attack
Signup and view all the flashcards
Client-Side Attacks
Client-Side Attacks
Signup and view all the flashcards
Networking-Based Attacks
Networking-Based Attacks
Signup and view all the flashcards
Overflow Attacks
Overflow Attacks
Signup and view all the flashcards
Plug-in
Plug-in
Signup and view all the flashcards
Add-ons or Extensions
Add-ons or Extensions
Signup and view all the flashcards
Malicious Add-ons
Malicious Add-ons
Signup and view all the flashcards
ActiveX
ActiveX
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS)
Signup and view all the flashcards
Ping flood attack
Ping flood attack
Signup and view all the flashcards
Referer Field
Referer Field
Signup and view all the flashcards
XML Injection Attack
XML Injection Attack
Signup and view all the flashcards
Response Splitting
Response Splitting
Signup and view all the flashcards
XPath Injection
XPath Injection
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Client-Side Application Attacks
Client-Side Application Attacks
Signup and view all the flashcards
Drive-by Download
Drive-by Download
Signup and view all the flashcards
First-Party Cookie
First-Party Cookie
Signup and view all the flashcards
Compromised Web Server (Drive-by Download)
Compromised Web Server (Drive-by Download)
Signup and view all the flashcards
Third-Party Cookie
Third-Party Cookie
Signup and view all the flashcards
Session Cookie
Session Cookie
Signup and view all the flashcards
Zero Pixel Iframe
Zero Pixel Iframe
Signup and view all the flashcards
Header Manipulation
Header Manipulation
Signup and view all the flashcards
Persistent Cookie
Persistent Cookie
Signup and view all the flashcards
HTTP Header Manipulation Examples
HTTP Header Manipulation Examples
Signup and view all the flashcards
Session Hijacking
Session Hijacking
Signup and view all the flashcards
Smurf Attack
Smurf Attack
Signup and view all the flashcards
Smurf Attack Mechanism
Smurf Attack Mechanism
Signup and view all the flashcards
SYN Flood Attack
SYN Flood Attack
Signup and view all the flashcards
SYN Flood Attack Process
SYN Flood Attack Process
Signup and view all the flashcards
Interception Attacks
Interception Attacks
Signup and view all the flashcards
Man-in-the-Middle Attack
Man-in-the-Middle Attack
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Replay Attack - Trust Exploitation
Replay Attack - Trust Exploitation
Signup and view all the flashcards
Study Notes
- The session discusses application and networking-based attacks in cyber security.
- Instructor will spend 2 - 2.30 hours for the slides, leaving 1.30 - 2.00 hours including submission for lab work.
Application Attacks
- Attacks on networked computer system applications can target the server, client, or both
Server-Side Web Application Attacks
- Securing server-side web applications is often more difficult than securing other systems
- Traditional network security devices cannot always block web application attacks.
- Many network security devices ignore the HTTP traffic content.
- Zero-day attack exploits previously unknown vulnerabilities.
- Victims have little time to prepare for or defend against it.
- Many attacks target input that applications accept from users.
- Common web application attacks are:
- Cross-site scripting
- SQL injection
- XML injection.
Cross-Site Scripting (XSS)
- XSS involves injecting scripts into a Web application server to target clients.
- When a victim visits an injected website
- Malicious instructions are sent to their browser.
- Some XSS attacks are designed to steal information retained by the browser.
- An XSS attack requires that a website:
- Accepts user input without validation.
- Uses this input in a response.
Types of Cross-Site Scripting (XSS)
- Reflected (Non-persistent)
- Script is executed on the victim side.
- Script is not stored on the server.
- Stored XSS (Persistent)
- Script is stored and executed on the server.
- Executed every time the malicious site is requested
- DOM (Document Object Model) XSS
- Client side attack, the script is not sent to the server.
- Legitimate server script is executed, followed by a malicious script
SQL Injection
- SQL injection targets SQL servers by injecting malicious commands.
- SQL (Structured Query Language) is used to manipulate data in relational databases.
- Example: Attacker enters incorrectly formatted email address in a “forgotten password” field.
- The response from the website lets the attacker know whether the input is being validated.
- Attackers enter statements, which are then processed by the database.
SELECT fieldlist FROM table WHERE field = 'whatever' or 'a'='a'
- This will display all user email addresses
SQL Injection Statement Examples
whatever' AND email IS NULL; --
Result = Determine names of different fields.whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
Result = Discover the table name.whatever' OR full_name LIKE '%Mia%
Result = Find specific users.whatever'; DROP TABLE members; --
Result = Erase the database table.whatever'; UPDATE members SET email = '[email protected]' WHERE email = '[email protected]';
Result = Mail password to attacker's email account.
XML Injection
- XML injection attacks are similar to SQL injection attacks
- The attacker discovers a Web site that does not filter user data and injects XML tags and data into the database.
- XPath injection is a specific type of XML injection attack that exploits XML Path Language queries built from user input.
Client Side Attacks
- Web application attacks are server-side attacks.
- Client-side attacks target vulnerabilities in client applications
- Client applications interact with a compromised server and/or process malicious data.
- The client initiates a connection with the server:
- Which could result in an attack
Drive-by download
- Client computer is compromised simply by viewing a Web page
- Attackers inject content into vulnerable web servers.
- gaining access to the server's operating system.
- Attackers craft zero-pixel iFrames (inline frames) to avoid visual detection.
- Code is embedded within the HTML main document.
- The client's browser downloads malicious script and computer downloads malware
HTTP Header manipulation
- HTTP header contains fields that characterize data being transmitted.
- Headers can originate from a Web browser.
- Browsers do not normally allow this.
- An attacker's short program can allow modification
HTTP Header Manipulation Examples
- Referer field: can be modified by the attacker to hide the fact it came from another side.
- Accept-language field: Attacker could inject a SQL command to modify this header.
- Response splitting: one of the most common header manipulation attacks
Cookies
- Cookies store user-specific information on the user's local computer.
- First-party cookie: created by the website the user is viewing
- Third-party cookie: site advertisers place a cookie to record user preferences
- Session cookie: stored in RAM and expires when the browser is closed.
- Persistent cookie: recorded on the computer's hard drive and does not expire when the browser closes, also called tracking cookies.
- Locally Shared Object (LSO): can store up to 100 KB of data, more complex than cookies, also called Flash cookies.
- Security & privacy risks
- First-party cookies may be stolen and used to impersonate the user.
- Used to tailor advertising and can be exploited by attackers
Attachments
- Files are coupled with email messages.
- Malicious attachments are commonly used to spread viruses, Trojans, and other malware.
Session Hijacking
- An attacker attempts to impersonate a user by stealing/guessing the session token
- A session token is a random string assigned to an interaction between a user and a web application
- Attacker can attempt to obtain the session token by:
- By using XSS or other attacks
- Eavesdropping on the transmission
- Guessing the session token
Malicious Add-ons
A plugin is a third party library that attaches to the web browser, and is embedded in a webpage.
- Add-ons/extensions add functionality to the web browser.
- Add-ons can:
- Create web browser toolbars.
- Change browser menus.
- Be aware of other tabs open in the same browser.
- Process loaded web page content.
Add-On Security Risks
- Attackers create malicious add-ons targeting a user's computer.
- Malicious add-ons can be written in Microsoft's ActiveX.
- ActiveX is a rules set for how applications under the Microsoft Windows OS should share info.
- Vulnerabilities in ActiveX can be exploited by attacker, to perform malicious attacks on a computer
Networking-Based Attacks
- Attackers place a high priority on targeting networks.
- Exploiting a single vulnerability may expose hundreds/thousands of devices to an attacker.
- Types of networking-based attacks:
- Denial of Service (DoS)
- Interception
- Poisoning
- Attacks on access rights
Denial of Service (DoS)
- DoS: A deliberate attempt to overwhelm a system, preventing authorized users from accessing it.
- Most DoS attacks today are Distributed Denial of Service (DDoS).
- Using hundreds/thousands of zombie computers in a botnet to flood a device with requests.
Ping Flood Attack
- Uses the 'ping' utility to send a large number of ICMP echo request messages.
- In a ping flood attack, multiple computers rapidly send a large number of ICMP echo requests.
- The server drops legitimate connections and refuses new connections.
Smurf Attack
- Tricks devices into responding to false requests to an unsuspecting victim.
- Attacker broadcasts a ping request to all computers.
- Address of the request is changed (called spoofing).
- It appears as if the victim's computer is asking for a response from all network computers.
- All computers send a response to the victim's computer causing it to be overwhelmed and crash, thus becoming unavailable to legitimate users.
SYN Flood Attack
- Takes advantage of procedures for initiating a session.
- In a SYN flood attack against a web server:
- An attacker sends SYN segments in IP packets.
- Attacker modifies the source address to unreachable computer addresses.
Interception
- Interception attacks are designed to intercept network communications.
- Man-in-the-Middle. Involves:
- Interception of legitimate communication
- Forging a fictitious response to the sender.
- Two computers are sending and receiving data
- A computer sits between them.
- Two types of attacks exist:
- Passive - data is captured and recorded before sending onward to the original recipient.
- Active - contents of the transmission are altered before they reach the recipient.
Replay attack
- Attacker copies a transmission before sending it to the original recipient and can:
- Use copy at a later time
- Example of capturing logon credentials
- More sophisticated replay attacks:
- Attacker captures a network device's message to a server.
- The attacker later sends the original, valid message to the server.
- Establishing a trust relationship between the attacker and the sever
Poisoning
- Introducing a substance to harm a system.
- Attacks inject "poison" into a normal network process to facilitate an attack.
- ARP poisoning
- DNS poisoning
ARP Poisoning
- The attacker modifies the MAC address in the ARP cache to redirect to a different computer
- Attacks from ARP Poisoning:
- Steal data by substituting her MAC address and steal data intended for another device.
- Prevent Internet access by substituting an invalid MAC address for the network gateway.
- Man-in-the-middle the device is set receive all communications by substituting her MAC address
- DoS attack the valid IP address is substituted for an invalid MAC address.
DNS Poisoning
- The current basis for name resolution to IP address is the Domain Name System.
- DNS poisoning substitutes DNS addresses to redirect a computer to another device.
- Two locations for DNS poisoning:
- Local host table
- External DNS server
Session 3 Summary
- Web application flaws are exploited through normal communication channels.
- Makes web apps more difficult to protect.
- Cross-site scripting (XSS) uses web sites that accept user input without validating it:
- The uses the server to launch attacks on computers that access it.
- Client side attacks target vulnerabilities in client applications.
- A client interacts with a compromised server.
- Session hijacking occurs when an attacker steals a session token and impersonates user.
- Buffer overflow attempts to compromise a computer by pushing data into inappropriate memory locations.
- DoS attempts to overwhelm a system so it cannot perform normal functions.
- In ARP and DNS poisoning valid addresses are replaced with fraudulent addresses.
- Access rights and privileges may also be exploited.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.