Time
23 hours 21 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:02
Hi. Welcome back to the course. So, in the last video, we talked about some of the basic information you need to know about the cloud for the certified ethical hacker examination. If you haven't watched that video, you go ahead and policies want to go back to it is gonna have some good foundational knowledge for you.
00:16
Now, this video, we're gonna talk about some of the different cloud computing attacks that are out there. We're gonna start off with a couple of pre assessment questions.
00:24
Type of attack. The attacker must have a virtual machine placed on the same physical location
00:29
as a potential victims. What kind of attack is that?
00:35
Or it's a few guests. A side channel attack. You are correct. It is also noticed. Cross guest VM breach attack. So basically, the attacker somehow gets control of the existing VM more even places their own. All the same physical host is a target. And then and then from there, obviously from the same physical machine, you can pull off a lot of
00:55
crazy tricks on your potential victim.
00:58
Um, but you know, that does ponder from a real life perspective because of me to ponder of saying Well, why? If I've got access to that physical physical machine, why am I wasting time?
01:07
Something about my own virtual environment. Then try toe, you know, attack the victim when I had my own the machine already, right, So it doesn't make any sense. But for the exam, just know that side channel is a top of attacked that must have a virtual machine and it's placed on the same physical location is a potential victim.
01:26
So question number two, all these attacks can occur in a clot environment except which one?
01:33
All right, so if you guessed answer bur correct. So s A s again is just software as a service, so it's not actually an attack type.
01:42
So we've got several different types of cloud computing the attacks that can be done. And this is not an all inclusive list. So you got things like Side Channel or across guest VM attacks. And again, that's what we just talked about the side channel attack. Where requires them to be on the same physical host as a target.
02:00
You got sequel injection That was pretty self explanatory. And we went over that in our sequel injection section,
02:07
and then we've got the wrapping attack on. So basically, the wrapping attack is where a soap messages intercepted and then the data inside the envelope. It's actually changed, and then it's sent or replayed, so that's, Ah, wrapping attack. So for your exam, just remember wrapping attack equal soap, and that should be that should put you good to go.
02:29
And then, of course, we've got the man in the cloud attack. It's similar to the man in the middle of the difference here being. Basically, the Cloud Service uses a synchronization token to gain access to make sure it's like, you know, when you go to a log and it's making sure that state correct account and data so the attacker just sets themselves up. But usually it's through some kind of, ah,
02:46
social engineering. Things like that have you click on a spreadsheet or something like that,
02:50
and then it installs malware that will then harvest this synchronization token. And I'm basically it's similar to the men in the middle of that point where they just take the token and they submit to the Cloud Service in the Cloud Service thinks it's you and really, it's the attacker. So
03:07
we also have a service hijacking by sniffing so and this one here, we basically will kind of do a man in the middle. We're going to sit between ourselves and the target. So we we sit right in the middle there. So there's you know, there's the server, for example, given information back, and there's the end user that we're sitting in between.
03:27
So we sniff for a while. Then we're basically trying to get some type of us trying to get the sequence number right of the packet. So that three way handshake we were talking about earlier on the course, we want to get thesis Prince number, and our goal is to potentially predict the next sequence number. So, for example, find
03:46
you're sending you my packet and I'm 101 and the new incremental by one,
03:50
and you send it back and is 102 and then, you know, I respond again and now it's 103 Then all an attacker has to do is say, Well, you know, it's been one. It's been, you know, 100 203 and then all of a sudden I bet it's gonna be 104 right? So they predict and they can get in. So once you get in, essentially, once you've
04:08
predicted sequence number or obtain to some out,
04:11
go ahead and break the connection to the victims machine. Right? Because we don't want them trying to send out any information we want
04:16
on the army information to go to the target. So once we clunk them out with a D, Doster suddenly got a distributed denial of service attack.
04:25
Then
04:26
we can actually take over the section, right? We're gonna pretend where that were the victim, and we're gonna take over the session, and then we're gonna start injecting packets into the target server.
04:36
So session hijacking with cross site scripting. Um,
04:41
not a similar process, but some more similar here. So best of the attacker in Jack's malicious code into the website itself. I asked the user I go to that web site. The emotions code downloads onto my machine. And then from there, the attacker can take my credentials. And
04:57
you know what? I wanna visit the website that they can pretend there me and potentially log in
05:00
words. The problem is mostly a banking website
05:05
and then a. D. M s amplification attack here, essentially, the attacker spoofing your i P address. And then what they're doing is sending out all these queries to Deanna servers
05:15
with yours proved i p address. So it's actually the d n A service. We're gonna come back and just hit you with all sorts of responses to your packets cans.
05:26
Just a couple of questions in our post assessment here. So question number one and this type of attack the attacker spruce the victims like P address and then sends requesting the d n a server.
05:34
The goal here is to have the victim flooded with requests, so availability is limited.
05:40
So what's type of attack is there?
05:45
All right, so if he said, Do you know a simplification? You are correct. And we actually just covered that in the module.
05:50
So the second question here in this type of attack that sold Mrs of our Intercepted and the data in the envelopes is changed. Then it's sent on.
05:59
So which one of those is it?
06:03
All right. So, as I mentioned before, wrapping equal soap, remember that for your exams. So the answer here is B. It's rapping is a type of attack.
06:14
All right, so in this video, we just cover some of the basic cloud computing attacks that are out there. And you notice that many of these, like the hijacking aspect, for example, and ah, and different attacks is well, you see him in different areas, right? So it's not just cloud related, so just keep that in the back of your head.
06:31
So in the next video, we're gonna go over some generalized cloud security, and then from there we're gonna move on to our next module. Was his cryptography

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor