In this report, I will examine various security threats, as well as methods through which these threats can be protected against. I will cover four threats in detail, these being;

  • Denial of Service
  • Password Crackers
  • Trojans / Worms / Viruses
  • Internal / External Threats

Denial of Service

Essentially, a denial of service attack, or DoS, is when a hacker attempts to make a system unusable by flooding the target with packets and communication requests. By doing this, the victim becomes saturated, is unable to handle the unusually high volume of traffic, and becomes unstable. There are a variety of ways in which an attacker may which to deploy a DoS against a target, each with varying outcomes. Some DoS will reduce the performance of its target, others may result in the victim coming to a complete standstill. Most modern DoS attacks are targeted at web servers. As already mentioned, there are a variety of differing types of DoS. I will examine a number of these, namely; Buffer overflow attacks, SYN attacks and DDoS.

An attack using buffer overflow is a very simple concept. Attackers simply try to flood a system with more traffic than that system’s buffer allows for. They do this by using traffic that the system does not flag as unusual. When a buffer attempts to store more data than it was intended to hold, the surplus will look to other buffers for space. This causes the data in the new buffer to become corrupted and lost, before the data looks for further adjacent buffers, spilling out across the system, eventually causing widespread data corruption.

A well-known example of this type of attack occurred in 2000 when it was discovered that Microsoft’s Outlook software contained a programming error within the message header mechanisms[1]. This made it possible for attackers to target victims by simply sending them an eMail containing enough data to exploit the fault in Outlook’s headers. Defending against this attack was not possible through the usual means of eMail virus protection, as users simply had to receive the eMail for the attack to come into effect.

SYN attacks take advantage of the TCP three-way handshake.  Attackers deploy a DoS using a SYN attack by, firstly, sending multiple SYN packets to the target. As any system would treat these incoming SYN packets, the target machine will send a SYN-ACK back to the attacker. However, the attacker will not respond to this phase of the handshake, often because the IP is spoofed, so the target will attempt to resend the SYN-ACK a number of times. If this is done repeatedly, the resource allocation of the victim becomes so considerable that performance is soon adversely affected.

This method of attacking, also known as flooding, poses various other types of threat. For example, an attacker could use such a method to flood a switch. When flood with enough packets, a switch essentially becomes a hub and sends all packets that it receives out to everyone. Switches generate a list known as a Content Addressable Memory, or CAM, Table. By referring to this database, the switch is able to identify a specific MAC address with a particular port on the network. So, when data is being transmitted for a certain computer, it is aware of which port the packets are to be transmitted to. By flooding a switch, the CAM table will be disregarded due to the limitation in resources, and it will enter failopen mode, essentially causing the switch to behave like a hub, and broadcast all packets to all ports. It is then possible for the attacker to easily sniff these, compromising security and privacy on a network.

I previously mentioned spoofing an IP. There are a number of methods through which an attacker can achieve this. One of the ways which I myself find most interesting is a Man in the Middle Attack, or a MITM. Essentially, what an MITM attack does is make its victims think that they are communicating directly with each other, when in reality, they are doing so through the “middle” PC. In other words, the Good PC and the Switch think that they are communicating directly, when they in fact doing so through the Bad PC. To achieve this, Bad PC will use a tool called arpsoof. arpspoof that is distributed as part of the dsniff package.  Firstly, Bad PC will enable IP forwarding on his host. Failing to do this will in fact cause Good PC, the victim in this case, to lose connectivity. In the first instance, Bad PC will tell Good PC that it is the Switch, and in the second instance, it will tell the Switch that it is Good PC, utilising ARP replies. Once completed, all Bad PC has to do to is monitor the traffic as it so pleases, both good systems now thinking that it is the other good system.

Join now!

DDoS, Distributed Denial of Service, attacks are also quite common, and when deployed correctly, can be detrimental to the target system. Deploying a DDoS requires a hacker to first compromise a number of other machines. Once they have done this, they then point all of these at the target system, so that the victim is attacked not from one, but from multiple systems. There have been cases where targets have fallen victim to DDoS from hundreds, even thousands, of compromised systems. DDoS attacks are the most detrimental of the DoS forms as there are a number of victims. Not only ...

This is a preview of the whole essay