ComputerandNetworkSecurity2
ComputerandNetworkSecurity2
Relational Database: A table of data with rows and columns, where SQLi Attack Avenues:
a primary key uniquely identifies rows, and foreign keys link tables.
• User Input: Malicious inputs in data fields.
Primary Key: Uniquely identifies a row in a table using one or more • Server Variables: Exploits HTTP/network headers.
columns. • Second-Order Injection: Uses data already in the database.
• Cookies: Alters cookies to manipulate queries.
Foreign Key: Links one table to attributes in another table.
• Physical Input: Malicious input outside web requests.
View/Virtual Table: The result of a query returning specific rows and Types of SQLi Attacks:
columns, often for security purposes.
• Inband Attacks: Same channel for injection and data retrieval
The retrieved data are presented directly in application Web
page.
Inference Detection:
Security Considerations:
• Tier 1: Basic, no redundancy, 99.671% uptime. Auto-rooter: Hacker tools to remotely break into systems.
• Tier 2: Some redundancy, 99.741% uptime. Backdoor (Trapdoor): Mechanisms bypassing security checks to
• Tier 3: Planned maintenance without disruption, 99.982% allow unauthorized access.
uptime.
Downloader: Installs additional malicious items on compromised
• Tier 4: Fully redundant, 99.995% uptime.
systems.
CHAPTER 6 Drive-by Download: Code exploiting browser vulnerabilities to attack
Malware: a program that is inserted into a system with the intent of systems when viewing compromised sites.
compromising the confidentiality,integrity,availability of victim’s
Exploits: Code targeting specific vulnerabilities.
data,app or OS
Flooder (DoS Client): Generates high data volumes to carry out
Advanced Persistent Threat (APT): Long-term, targeted attacks on
denial-of-service (DoS) attacks.
business or political entities using various intrusion technologies and
malware, often state-sponsored. Differ from other types of attack by Keylogger: Captures keystrokes on a compromised system.
Logic Bomb: Code triggered by predefined conditions to execute ----Virus Phases---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ----
unauthorized actions.
Dormant Phase: Virus remains idle until triggered.
Macro Virus: Virus using macro/scripting code, typically embedded in Propagation Phase: Virus replicates into other programs or disk
documents. areas.
Mobile Code: Software that runs identically across different platforms. Triggering Phase: Virus activates based on specific events.
Execution Phase: Virus performs its intended function.
Rootkit: Hacker tools for maintaining root-level access after breaking
into a system. ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ----
Spammer Program: Sends large volumes of unwanted email. ----Virus Classifications by TARGET ---- ---- ---- ---- ---- ---- ----
Spyware: Collects and transmits sensitive information by monitoring Macro Virus: Attaches to documents and uses macro programming
system activity. to execute and propagate.
Trojan Horse: Program appearing useful but contains hidden File Infector: Infects executable files.
malicious functions. Boot Sector Infector: Infects a disk's boot record, spreading during
system boot.
Virus: Malware that replicates itself into other executable code,
Multipartite Virus: Infects files in multiple ways.
infecting systems.
Worm: Independent malware that propagates across networks by ----Virus Classifications by STRATEGY---- ---- ---- ---- ---- ---- ----
exploiting vulnerabilities. Encrypted Virus: Uses encryption to hide its code.
Stealth Virus: Designed to avoid detection by antivirus software.
Zombie (Bot): Infected machine used to launch attacks as part of a Polymorphic Virus: Mutates with every infection.
botnet. Metamorphic Virus: Rewrites itself with each iteration, altering both
behavior and appearance.
Virus: Infects programs by modifying them to include a copy of itself,
spreads through networks, and executes secretly when the host Worm: Self-replicating program that seeks to infect multiple
program runs. Specific to operating system and hardware machines, often exploiting software vulnerabilities.
Spread Mechanisms: Network connections, shared media, email,
----Virus Components---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ----
remote execution, and file sharing.
Infection Mechanism: Means by which a virus spreads or
propagates.(infection vector) ---------------------------------------------------------------------------------------
Trigger: Event or condition that activates the virus payload.(logic Target Discovery: Scanning for vulnerable systems using random,
bomb) hit-list, topological, or local subnet methods.
Payload: Effect of the virus, which may be harmful or benign.
Scanning (or Fingerprinting) First function in the propagation phase Email Worm: Spreads through email attachments or messages.
for a network worm. Searches for other systems to infect Network Worm: Propagates through network vulnerabilities.
File Worm: Infects shared files or removable media.
Random: compromised host probes random addresses in the IP Mobile Worm: Targets smartphones via Bluetooth or MMS.
address space using a different seed. This produces a high volume of
Internet traffic which may cause generalized disruption even before Drive-By-Download: Exploits browser and plugin vulnerabilities to
the actual attack is launched. download and install malware when a user views a malicious
webpage. Malware does not propagate like worms; it spreads when
Hit-List Attacker precompiles a list of vulnerable machines users visit infected websites.
delegating portions of the list to infected hosts for faster and stealthier
scanning Watering-Hole Attack: A targeted attack where attackers
compromise websites likely visited by their victims. The malicious
Topological Finds new targets using information from already
code activates only for specific systems, increasing stealth.
infected machines
Malvertising: Places malware in online ads without compromising the
Local Subnet Targets systems within the same local network as an
hosting site. Attackers dynamically generate malicious code in ads,
infected host by exploiting the subnet structure bypassing firewalls
targeting specific users and systems, making detection difficult.
------------------------------------------------------------------------------------
Clickjacking: UI redress attack where attackers trick users into
Morris Worm: The first significant worm infection released by Robert clicking unintended buttons or links, often using transparent layers.
Morris in 1988, targeting UNIX systems. It attempted to crack local This can hijack keystrokes or perform unauthorized actions.
password files for login credentials, exploited a bug in the finger
Social Engineering: Manipulating users to compromise their own
protocol to locate remote users, and utilized a trapdoor in the debug
systems, often via phishing, spam, or Trojan horses.
option of the mail-handling process. Successful attacks
communicated with the operating system command interpreter,
sending a bootstrap program to replicate the worm.
Master: Highly skilled hackers capable of discovering new Intrusion Behavior Phases: Includes target acquisition, initial
vulnerabilities and creating powerful attack tools. Some are employed access,
by state-sponsored organizations. Their attacks are extremely difficult
privilege escalation, information exploitation, maintaining access, and
to defend against.
covering tracks.
Remote Root Compromise: Unauthorized access to a system with
Security Intrusion: Unauthorized bypassing of a system's security
root-level privileges.
mechanisms.
Web Server Defacement: Altering a web server's content to display
Intrusion Detection: Hardware/software systems analyzing activity
unauthorized material.
within a network or system to identify potential intrusions.
Guessing/Cracking Passwords: Attempting to gain access by
Intrusion Detection System (IDS): Includes sensors to collect data,
deciphering user passwords.
analyzers to detect intrusions, and a user interface for control. Types
Copying Databases: Stealing databases containing sensitive include host-based (HIDS), network-based (NIDS), and distributed or
information like credit card details. hybrid systems.
Unauthorized Data Access: Viewing sensitive data without IDS Requirements: Must run continuously, resist faults, avoid system
authorization. overhead, adapt to changes, and scale for large networks.