w08 Lec AttacksAndVulnerabilities v01 Notes
w08 Lec AttacksAndVulnerabilities v01 Notes
Information systems usually include computers, networks and the Internet (“cyberspace”). Information security includes
computer security, network security and cyber security. There are differences, but often the terms are used interchangeably.
Many definitions and concepts in these slides are from NIST, especially:
An Introduction to Information Security, NIST SP 800‐12, 2017 by Nieles, Dempsey
and Pillitteri.
https://csrc.nist.gov/publications/detail/sp/800‐12/rev‐1/final
Also see the NIST Computer Security Resource Centre Glossary:
https://csrc.nist.gov/glossary
The next slides will define confidentiality, integrity and availability (CIA) and give the
STRIDE model. We will not cover AAA = Authentication, Authorisation and Accounting in
any depth, as aspects are covered in other models.
Availability is making sure the information system is available to the intended users as
expected. If the system goes down (users cannot access), then that is a compromise of
the availability protection.
One of the critiques of CIA Triad is it doesn’t capture other important aspects like AAA or
the importance of people and processes. Hence other models developed, like STRIDE
and McCumber Cube.
McCumber Cube
• Expands CIA to also consider …
• Information States
• Data at rest, e.g. stored on disk
• Data in transit, e.g. sent across network
• Processing, e.g. operations by CPU
• Safeguards
• Policy and practices: processes to improve InfoSec
• Human factors: the role of people in InfoSec
• Technology: software and hardware solutions for InfoSec
• 27 possible combinations, e.g.
• What processes used to provide confidentiality of data at rest?
• What technology used to provide integrity of data in transit?
The idea of the McCumber Cube is to use it as a model for identifying the measures
(safeguards) needed to provide InfoSec.
An organisation will consider the measures they have from the perspective of processes,
people and technology.
‐ Processes are normally documented as policies or practices, e.g. a password policy
defines the process for creating new users, and limiting the structure of passwords.
‐ The role of people is referred to as “human factors”. Example of measures may include
user training and awareness campaigns.
‐ Technology is hardware or software to implement a measure.
To use the McCumber Cube an organisation would consider all 3x3x3 = 27 combinations
in the cube. Some may require multiple measures.
STRIDE
• Spoofing of identity (authentication)
• Tampering with data (integrity)
• Repudiation (non-repudiation)
• Information disclosure (confidentiality)
• Denial of service (availability)
• Elevation of privilege (authorization)
Threats may take advantage of vulnerabilities which lead to incidents. Incidents then
may have some negative impact (on the user/organisation).
This slides, and the next few slides, give examples of adversarial threat sources and non‐
adversarial threat sources. They are only selected examples: there may be others.
Vulnerability Resources
Vulnerability Resources
• Organisations track vulnerabilities, attacks and solutions
• Governments: ACSC Alerts & Advisories (AU), CISA (US), CNCERT/CC (CN),
CERT-EU (EU), CERT-In (IN), FIRST (intl)
• Not-for-profits and industry orgs: AUSCERT, OWASP, MITRE CVE, NIST
NVD, MITRE ATT&CK, …
• Companies: many are CVE Number Authorities (CNA) reporting CVEs
The example CVE‐2023‐23397 was used as it was the a recent advisory from ACSC at
time of writing (https://www.cyber.gov.au/acsc/view‐all‐content/alerts/high‐severity‐
vulnerability‐present‐microsoft‐outlook‐windows). It is titled Follow the links and
explore the details shown by:
CVE: https://cve.mitre.org/cgi‐bin/cvename.cgi?name=CVE‐2023‐23397
Microsoft: https://msrc.microsoft.com/update‐guide/vulnerability/CVE‐2023‐23397
NVD: https://nvd.nist.gov/vuln/detail/CVE‐2023‐23397
And take note that it references CWE‐294:
https://cwe.mitre.org/data/definitions/294.html
OWASP https://owasp.org/
• Non-profit organisation for promoting software security (especially
web applications)
• Tutorials, cheat sheets, Top 10, methodologies, APIs, code libraries, testing
software, forums, …
• OWASP Top 10 https://owasp.org/Top10/
• Critical web application security risks
Network Attacks
Network Attacks
• Most information systems involve communications across a
computer network
• Network security is therefore important part of information security
and cyber security
• Focus on packets being delivered between source and destination
• Not consider: compromise of source/destination computers; social
engineering; malware; …
The diagram is a simple view of a network path. Consider you using a web browser on
your computer at home and web browsing to some web server. The circles represent
routers. You have a home router, and a link to your ISP. Your ISP then connects to other
ISPs (x and y in this case, but could be any number of ISPs). Finally the operator of the
web server has a router on their network.
When web browsing, packets are sent between your web browser to web server,
traversing the routers and links in between. At what points could someone see the
packets between your browser and the web server?
The diagram illustrates location where attacks may potentially occur with regards to
network security. In short, an attack may take place at any point between the source and
destination. Therefore we often talk about “end‐to‐end" security, where the security
mechanisms must apply across the entire path. It is usually not sufficient to secure just
one segment of the path, because the attack may take place on the other (unsecured)
segment.
You have already used “tcpdump” as a tool to capture (“see”) packets, however that was
on your own computer. Tcpdump and similar tools can be run on links/devices through
the network.
In the following we will look at the general types of attacks that an attacker can perform
on our network packets.
The following slides present 6 general types of network attacks. To demonstrate we will
use the model as shown here. We assume user A and B are communicating over the
Internet. An attacker C can intercept any communications between A and B, and
optionally modify communications.
In the following slides the examples link to techniques from MITRE ATT&CK and/or
MITRE CWE. Explore those links to see further detailed examples of attacks.
Disclosure Attack
• Attacker intercepts message and reads the contents (when they are
not authorized to)
Masquerade Attack
• Attacker sends message to user B pretending to be user A
Replay Attack
• Attacker intercepts message and later re-sends that message to B
Modification Attack
• Attacker intercepts message and modifies the message before it
reaches user B