Network Attacks - 2.4

Denial of Service (DoS)

  • An attack aimed at overwhelming a service to cause it to fail and become unavailable.
  • Typically malicious, but it can also occur accidentally in a non-malicious way, such as when a legitimate service experiences a surge in traffic.
  • Does not need to be complicated; it can be generally defined as any event causing a service to become unavailable due to resource exhaustion.

Distributed Denial of Service (DDoS)

  • An asymmetric attack that uses a large amount of distributed resources (often compromised devices) from across the globe to target systems, overwhelming them with traffic and rendering their services unavailable.
  • Amplification/Reflection: An attack method where a small input results in a disproportionately large output, e.g., sending a small query to a misconfigured system that generates a large response, amplifying the attack's impact.

Domain Name System (DNS) Attack

  • Attacks aimed at redirecting traffic to a malicious site or stealing information by tampering with the Domain Name System (DNS).
  • Modifying DNS records to point to a malicious IP address, effectively redirecting users to fake websites.
  • Modifying client host files to point to a malicious IP address, which can trick a computer into connecting to a malicious site instead of the intended one.
  • DNS Cache Poisoning: This attack involves inserting false DNS entries into a DNS server's cache, causing users to be redirected to malicious sites.
  • Domain hijacking: Gaining unauthorized access to a domain's management account, allowing the attacker to alter DNS settings or transfer ownership.
  • URL hijacking: Also known as typosquatting, where attackers register domain names similar to popular sites, exploiting users's typing errors to redirect them to malicious sites.

Wireless Attacks

Wi-Fi

  • DoS-based attacks aim to disrupt Wi-Fi networks by interfering with access point management frames, causing network disruption.
    • 802.11 - An older Wi-Fi standard that, depending on the specific version (e.g., 802.11a, 802.11b, etc.), may have weaker security measures compared to modern standards.
    • 802.11ac - A more recent Wi-Fi standard that includes stronger encryption and security features, offering better protection against attacks.
  • The term "In the Clear" refers to data transmitted over a network without encryption, making it vulnerable to interception and eavesdropping.

Radio Frequency (RF)

  • DoS attacks aimed at denying communication over a large area by jamming the radio frequency spectrum with interference, often referred to as "noise." This can disrupt wireless communication by preventing devices from successfully transmitting or receiving signals.

On-path Attack

  • A malicious actor intercepts communication between two parties on the internet, monitoring or altering the data exchanged between them. This attack was previously known as a man-in-the-middle (MITM) attack.
  • The attacker can steal or manipulate data between parties or collect it for future attacks, such as credential replay.
  • Typically, this type of attack is difficult to detect because it often goes unnoticed by the victim(s).

Credential Replay

  • The act of taking captured credentials (e.g., from an on-path attack) and reusing them to gain unauthorized access to systems, effectively impersonating the legitimate user.
  • Examples:
    • Pass the Hash: An attack where the attacker captures the hash of a password and uses it to authenticate without needing the actual password.
    • Session (ID) Hijacking: An attack where the attacker steals a valid session ID and uses it to gain unauthorized access to a system or application.

Malicious Code

See Section 2.4: Malware Attacks