You are on page 1of 58

Security+ Guide to Network

Security Fundamentals,
Fifth Edition
Chapter 3
Application and Networking-Based
Attacks

Objectives
List and explain the different types of server-side
web application attacks
Define client-side attacks
Explain how overflow attacks works
List different types of networking-based attacks

Security+ Guide to Network Security Fundamentals, Fifth Edition

Conceptual Networked System


Network used to connect different clients and
servers together
Clients and servers run an operating system
Operating system controls applications
Applications manipulate data
Each represents an attack vector to exploit
Attacks on the applications in a networked
computer system can be directed toward the
server, the client, or both
Security+ Guide to Network Security Fundamentals, Fifth Edition

Conceptual Networked Computer


System (Figure 3-1)

Security+ Guide to Network Security Fundamentals, Fifth Edition

Server-Side Web Application Attacks


Content provided for users who are surfing the
Web is generated by a software application
running on a server
In providing web services to clients, web servers
also expose those same services to attackers
Important characteristic of server-side web
applications to create dynamic content based on
inputs from user

Security+ Guide to Network Security Fundamentals, Fifth Edition

Server-Side Web Application Process


Clients web browser makes a request using the
Hypertext Transport Protocol (HTTP) to a web server
Server may be connected to one or more web
application servers
Application servers run the specific web apps,
which in turn are directly connected to databases on
internal network
Information from databases retrieved and returned to
web server so dynamic information can be sent back
to the users web browser
Security+ Guide to Network Security Fundamentals, Fifth Edition

Server-Side Web Application


Infrastructure (Figure 3-2)

Security+ Guide to Network Security Fundamentals, Fifth Edition

Securing Web Applications


Securing server-side web applications often
considered more difficult than protecting other
systems
Traditional network security devices cannot always
block web application attacks because many
traditional network security devices ignore the
content of HTTP traffic, which is the vehicle of web
application attacks

Security+ Guide to Network Security Fundamentals, Fifth Edition

Zero Day Attacks


Many web application attacks (as well as other
application attacks) exploit previously unknown
vulnerabilities
Zero day attacks - Exploit previously unknown
vulnerabilities so victims have no time to prepare or
defend

Security+ Guide to Network Security Fundamentals, Fifth Edition

Common Application Attacks


Many server-side web application attacks target the
input that the applications accept from users
Common web application attacks:

Cross-site scripting
SQL injection
XML injection
Command injection/directory traversal

Security+ Guide to Network Security Fundamentals, Fifth Edition

10

Cross-Site Scripting
Not all attacks on websites are designed to steal
content or deface it
Some attacks use web server as a platform to
launch attacks on other computers that access it
Cross-site scripting (XSS) - Injects scripts into
web application server to direct attacks at
unsuspecting clients
Many web applications are designed to customize
content for user by taking what user enters and
then displaying that input back to user
Security+ Guide to Network Security Fundamentals, Fifth Edition

11

Customized Responses (Table 3-1)

Security+ Guide to Network Security Fundamentals, Fifth Edition

12

Cross-Site Scripting Platform


Cross-site scripting attacks occur when attacker
takes advantage of web applications that accept
user input without validation and then present back
to user
For example:
Input that the user enters for Name is not verified
Instead is automatically added to a code segment
that becomes part of an automated response
An attacker can use this vulnerability in XSS attack
by tricking valid website into feeding malicious script
to another users web browser to execute
Security+ Guide to Network Security Fundamentals, Fifth Edition

13

Bookmark Page That Accepts User


Input (Figure 3-3)

Security+ Guide to Network Security Fundamentals, Fifth Edition

14

Input Used In Response (Figure 3-4)

Security+ Guide to Network Security Fundamentals, Fifth Edition

15

SQL Injection
SQL (Structured Query Language) - Used to
manipulate data stored in relational database
SQL Injection - Targets SQL servers by
introducing malicious commands

Security+ Guide to Network Security Fundamentals, Fifth Edition

16

Forgotten Password Example


Forgotten password example:
Attacker enters incorrectly formatted e-mail address
Response lets attacker know whether input is being
validated
Attacker enters email field in SQL statement
Statement processed by the database
Example statement:
SELECT fieldlist FROM table WHERE field
= whatever or a=a
Result is all user email addresses will be displayed
Security+ Guide to Network Security Fundamentals, Fifth Edition

17

SQL Injection Statements (Table 3-2)

Security+ Guide to Network Security Fundamentals, Fifth Edition

18

XML (Extensible Markup Language)


Markup language - Method for adding annotations
to text
Example is HTML:
Uses tags surrounded by brackets
Instructs browser to display text in specific format

XML (Extensible Markup Language):


Carries data instead of indicating how to display it
No predefined set of tags
Users define their own tags
Security+ Guide to Network Security Fundamentals, Fifth Edition

19

XML Attack
XML Attack - Similar to SQL injection attack
Attacker discovers Web site that does not filter user
data
Injects XML tags and data into the database
Xpath injection:
Specific type of XML injection attack
Attempts to exploit XML Path Language queries

Security+ Guide to Network Security Fundamentals, Fifth Edition

20

Directory Traversal/Command
Injection
Web server users typically restricted to root
directory
Users may be able to access subdirectories but not
parallel or higher level directories
Helps to protect sensitive files
Directory traversal - Uses malformed input or
takes advantage of vulnerability to move from root
directory to restricted directories
Command injection - Attacker enters commands
to execute on server or view confidential files
Security+ Guide to Network Security Fundamentals, Fifth Edition

21

Directory Traversal Attack (Figure 3-6)

Security+ Guide to Network Security Fundamentals, Fifth Edition

22

Client-Side Application Attacks


Web application attacks are server-side attacks
Client-side attacks target vulnerabilities in client
applications:
Interacting with a compromised server
Client initiates connection with server, which could
result in an attack

Security+ Guide to Network Security Fundamentals, Fifth Edition

23

Drive-By Download
Drive-by download:
Client computer compromised simply by viewing a
Web page
Attackers inject content into vulnerable Web server
to gain access to servers operating system
Attackers craft a zero pixel frame to avoid visual
detection
Embed an HTML document inside main document
Clients browser downloads malicious script
Instructs computer to download malware
Security+ Guide to Network Security Fundamentals, Fifth Edition

24

HTTP Header
HTTP header consists of fields that characterize
data being transmitted
Header fields are comprised of:
Field name
Colon
Field value

Example Content-length: 49.


HTTP header field names and values may be any
application-specific strings, but core set
standardized by Internet Engineering Task Force
Security+ Guide to Network Security Fundamentals, Fifth Edition

25

HTTP Header Fields (Table 3-3)

Security+ Guide to Network Security Fundamentals, Fifth Edition

26

Header Manipulation
HTTP header manipulation - Attack modifies
HTTP headers
HTTP header manipulation is not actual attack but
rather vehicle through which other attacks like
(XSS) can be launched.
HTTP header manipulation allows an attacker to
pass malicious instructions from own malicious
website or through an infected site to the web
browser via HTTP headers

Security+ Guide to Network Security Fundamentals, Fifth Edition

27

HTTP Header Attacks


Examples of HTTP header attacks:
Referer - Can bypass security by modifying Referer
field to hide fact came from another site
Accept-Language Because some web applications
pass contents of field directly to database attacker
can inject SQL command by modifying header
Response splitting - Inserting a CRLF in an HTTP
header can give attackers control of the remaining
HTTP headers and body of the response

Security+ Guide to Network Security Fundamentals, Fifth Edition

28

Cookies
Cookies - Store user-specific information on users
local computer
Web sites use cookies to identify repeat visitors
Examples of information:
Travel Web sites may store users travel itinerary
Personal information provided when visiting a site

Only Web site that created a cookie can read it

Security+ Guide to Network Security Fundamentals, Fifth Edition

29

Types of Cookies
First-party cookie - Cookie created by Web site
user currently visiting
Third-party cookie - Site advertisers (third parties)
place cookie to record user preferences
Session cookie - Stored in RAM and expires when
browser is closed
Persistent cookie - Recorded on computers hard
drive and does not expire when browser closes

Security+ Guide to Network Security Fundamentals, Fifth Edition

30

Locally Shared Object (LSO)


Locally shared object (LSO) or Flash cookie named after the Adobe Flash player
Different from regular cookies:
Store data more complex
Store up to 100 KB of data from a website (25 times
data as regular cookie)
Cannot be deleted through browser's normal
configuration settings
Saved in multiple locations on hard drive
Can be used to reinstate regular cookies that user
deleted or blocked
Security+ Guide to Network Security Fundamentals, Fifth Edition

31

Risks of Cookies
Cookies have security and privacy risks
First-party cookies can be stolen and used to
impersonate the user
Third-party cookies can be used to track the
browsing or buying habits of a user
When multiple websites are serviced by a single
marketing organization, cookies can be used to
track browsing habits on all clients site

Security+ Guide to Network Security Fundamentals, Fifth Edition

32

Attachments
Attachments - Files that are coupled to email
messages
Malicious attachments commonly used to spread
viruses, Trojans, and other malware when opened
Most users routinely open any email attachment
received even if from an unknown sender
Attackers often include information in the subject
line that entices even reluctant users to open the
attachment, such as a current event

Security+ Guide to Network Security Fundamentals, Fifth Edition

33

Session Token
User accessing secure web application needs be
verified to prevent an imposter from jumping in to
interaction
Session token - Verification through which random
string assigned to interaction between user and web
application currently being accessed (session)
Web application server assigns a unique session
token
Each subsequent request from users web browser to
web application contains session token verifying user
identity
Security+ Guide to Network Security Fundamentals, Fifth Edition

34

Session Hijacking
Session hijacking - Attacker attempts to
impersonate the user by using er session token
Attacker can attempt to obtain session token:
Use XSS or other attacks to steal the session token
cookie from the victims computer
Eavesdropping on the transmission
Guessing the session token (successful if generation
of session tokens not truly random)

Security+ Guide to Network Security Fundamentals, Fifth Edition

35

Session Hijacking Attack (Figure 3-7)

Security+ Guide to Network Security Fundamentals, Fifth Edition

36

Plug-Ins and Add-Ons


Tools be added to enhance users interaction with
website through web browser
Plug-in - Third-party library (Java, Adobe Flash
player, Apple QuickTime, Adobe Acrobat Reader)
that attaches to web browser and can be embedded
inside a webpage (but affects only specific page)
Add-ons or extensions - Tools that add functionality
to the web browser itself

Security+ Guide to Network Security Fundamentals, Fifth Edition

37

Malicious Add-Ons
Attackers can create malicious add-ons to launch
attacks against users computer
ActiveX - Set of rules for how applications under the
Microsoft Windows operating system should share
information
ActiveX controls (add-ons) - Specific way of
implementing ActiveX and are sometimes called
ActiveX applications
ActiveX controls can be invoked from webpages
through the use of a scripting language or directly by
HTML command
Security+ Guide to Network Security Fundamentals, Fifth Edition

38

Impartial Overflow Attacks


Impartial attacks can target either server or client
Many these attacks designed to overflow areas of
memory with instructions from the attacker
Types of attacks:
Buffer overflow attacks
Integer overflow attacks
Arbitrary/remote code execution attacks.

Security+ Guide to Network Security Fundamentals, Fifth Edition

39

Buffer Overflow Attack


Buffer overflow attack - Process attempts to store
data in RAM beyond boundaries of fixed-length
storage buffer
Data overflows into adjacent memory locations
Attacker can change return address of memory
location of code and redirect to memory address
containing malware code

Security+ Guide to Network Security Fundamentals, Fifth Edition

40

Buffer Overflow Attack (Figure 3-8)

Security+ Guide to Network Security Fundamentals, Fifth Edition

41

Integer Overflow
Integer overflow - Condition occurs when result of
arithmetic operation (addition or multiplication)
exceeds the maximum size of the integer type used
to store it
When overflow occurs, the interpreted value then
wraps around from maximum value to minimum
value

Security+ Guide to Network Security Fundamentals, Fifth Edition

42

Integer Overflow Attack


Example:
8-bit signed integer has a maximum value of 127 and
a minimum value of 128
If the value 127 is stored in a variable and 1 is added
to it, the sum exceeds the maximum value for this
integer type
Wraps around to become 128.

Integer overflow attack - Attacker changes value


of variable to something outside the range
programmer had intended by using an integer
overflow
Security+ Guide to Network Security Fundamentals, Fifth Edition

43

Arbitrary/Remote Code Execution


Heap spray - Targeted to insert data only in certain
parts of memory
Arbitrary/remote code execution - Allows
attacker to run programs and execute commands
on different computer
Once under the attackers control, computer can
perform virtually any command from the attacker
Arbitrary/remote code execution attacks often take
advantage of malicious attachments like Microsoft
Visio file or PDF file
Security+ Guide to Network Security Fundamentals, Fifth Edition

44

Network Attacks
Attackers place high priority on targeting networks
Exploiting single vulnerability may expose
hundreds or thousands of devices to an attacker
Types of attacks that target a network or network
process:

Denial of service
Interception
Poisoning
Attacks on access rights

Security+ Guide to Network Security Fundamentals, Fifth Edition

45

Denial of Service (DoS)


Denial of service (DoS) - Attempts to prevent
system from performing normal functions
Distributed denial of service (DDoS) - Uses
thousands zombie computers in botnet
Ping flood attack - Ping utility used to send large
number of echo request messages and overwhelms
server
Smurf attack - Ping request with originating address
changed (spoofing) and appears as if target
computer is asking for response from all computers
on the network
Security+ Guide to Network Security Fundamentals, Fifth Edition

46

SYN Flood Attack


SYN flood attack - Takes advantage of procedures
for establishing connection
Attacker sends SYN segments in IP packets to server
but modifies source address of each packet to
computer addresses that do not exist or cannot be
reached
Server continues to wait for a response (which is not
coming) while receiving more false requests and
keeping more lines open for responses
Server ultimately runs out of resources and can no
longer respond to legitimate requests
Security+ Guide to Network Security Fundamentals, Fifth Edition

47

SYN Flood Attack (Figure 3-9)

Security+ Guide to Network Security Fundamentals, Fifth Edition

48

Interception
Man-in-the-middle - Interception of legitimate
communication
Forging a fictitious response to the sender
Passive attack records transmitted data, active
attack alters contents of transmission before sending
to recipient
Replay - Similar to passive man-in-the-middle attack
Replay makes a copy of the transmission before
sending it to the recipient for use at a later time (the
man-in-the-middle replays it)
Security+ Guide to Network Security Fundamentals, Fifth Edition

49

ARP Poisoning
ARP poisoning
Attacker modifies MAC address in ARP cache to
point to different computer

Table 3-4 ARP poisoning attack


Security+ Guide to Network Security Fundamentals, Fifth Edition

50

Attacks From ARP Poisoning (Table 35)

Table 3-5 Attacks from ARP poisoning

Security+ Guide to Network Security Fundamentals, Fifth Edition

51

DNS Poisoning
Domain Name System - Current basis for name
resolution to IP address
DNS poisoning - Substitutes DNS addresses to
redirect computer to another device
DNS poisoning
Two locations for DNS poisoning:
Local host table
External DNS server

Security+ Guide to Network Security Fundamentals, Fifth Edition

52

Sample HOSTS file (Figure 3-11)

Security+ Guide to Network Security Fundamentals, Fifth Edition

53

DNS Poisoning (Figure 3-12)

Security+ Guide to Network Security Fundamentals, Fifth Edition

54

Attacks on Access Rights


Privilege escalation - Exploiting software
vulnerability to gain access to restricted data
Two types of privilege escalation:
Vertical privilege escalation exist - User with lower
privilege uses privilege escalation to grant self
access functions reserved for higher-privilege users
Horizontal privilege escalation - User with restricted
privileges accesses the different restricted functions
of a similar user

Security+ Guide to Network Security Fundamentals, Fifth Edition

55

Transitive Trust
Transitive - Relation with a property so that if a
relation exists been A and B, and there is also a
relation between B and C, then there is a relation
between A and C
Transitive trust - If Alice trusts Bob, and Bob trusts
Carol, then Alice trusts Carol

Security+ Guide to Network Security Fundamentals, Fifth Edition

56

Transitive Access
Transitive trust can result in transitive access:
System 1 can access System 2, and because
System 2 can access System 3, then System 1 can
access System 3
Intention may not be for System 1 to access
System 3, but instead for System 1 to be restricted
to accessing only System 2
Inadvertent and unauthorized access can result in
serious security risks

Security+ Guide to Network Security Fundamentals, Fifth Edition

57

Security+ Guide to Network


Security Fundamentals,
Fifth Edition
Chapter 3
Application and Networking-Based
Attacks

You might also like