Access Control Attacks

Gaining access (getting through that hard and crunchy outside) to a system or network is an attacker’s first objective. Attackers commonly use several methods of attack against access control systems, including

check.png Brute-force or dictionary attack: The attacker attempts every possible combination of letters, numbers, and characters to crack a password, passphrase, or PIN. A dictionary attack is essentially a more focused type of brute force attack in which the attacker uses a predefined word list. You can find such word lists or dictionaries, including foreign language and special-interest dictionaries, widely available on the Internet for use in password-cracking utilities such as L0phtCrack and John the Ripper. Attackers typically run these password-cracking utilities against a copy of the target system’s (or network’s) security accounts database or password file. The utility creates hashes of passwords contained in its dictionary or word list, and then compares the resulting hash to the password file. These types of programs work very quickly and effectively (see the sidebar “How much brute force does it take to crack your passwords?” in this chapter), even when organizations use complex passwords, so the key to defending against a brute-force or dictionary attack is to protect your security accounts databases and password files.

check.png Buffer or stack overflow: Buffer or stack overflows constitute the most common and successful type of computer attacks today. Although often used in Denial of Service attacks, buffer overflows in certain systems or applications may enable an attacker to gain unauthorized access to a system or directory. An overflow occurs when an application or protocol attempts to store more information than the allotted resources will allow. This causes previously entered data to become corrupted, the protocol or application to crash, or other unexpected or erratic behavior to occur. A teardrop attack is a type of stack overflow attack that exploits vulnerabilities in the IP protocol. The best defense against buffer or stack overflow attacks is to identify and patch vulnerabilities in the system, network, and applications as quickly as possible after each vulnerability is identified (and ideally before the affected code or application is used in a production environment).

check.png Man-in-the-Middle attacks: Here an attacker intercepts messages between two parties and forwards a modified version of the original message to the intended recipient. For example, an attacker may substitute his or her own public key during a public-key exchange between two parties. The two parties believe that they’re still communicating only with each other and unknowingly encrypt messages by using the attacker’s public key, rather than the intended recipient’s public key. The attacker can then decrypt secret messages between the two parties, modify their contents as desired, and send them on to the unwary recipient.

check.png Packet (or password) sniffing: An attacker uses an application or device, known as a sniffer, to capture network packets and analyze their contents, such as usernames and passwords, and shared keys.

check.png Session hijacking: Similar to a Man-in-the-Middle attack, except that the attacker impersonates the intended recipient, instead of modifying messages in transit.

check.png Social engineering: This low-tech method is one of the most effective and easily perpetrated forms of attack. Common techniques involve phishing (see the sidebar “Gone phishin’,” in this chapter), dumpster diving, shoulder surfing, raiding cubicles (looking for passwords on monitors, under keyboards, and under mouse pads), and plain ol’ asking. This latter brazen technique can simply involve the attacker calling a user, pretending to be a system administrator and asking for the user’s password, or calling a help desk pretending to be a user and asking to have the password changed.

Organizations should employ various tactics and processes to counter access control attacks, including

check.png Threat modeling. Ensures that security is a key design consideration early in the application development lifecycle. A security specification is created and tested during the design phase to identify likely threats, vulnerabilities and countermeasures for a specific application and its uses.

check.png Asset valuation. The process of assigning a financial value to an organization’s information assets, thereby enabling an objective measure of the systems and data that require various levels of protection.

check.png Vulnerability analysis. The process of identifying defining, identifying and prioritizing a system’s vulnerabilities.

check.png Access aggregation. Combines all of a user’s access rights, privileges, and permissions in a single or multiple systems (for example, using single sign-on or SSO).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.211.166