Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:01
This video covers the second part of section one dot to compare and contrast different types of attacks for the Company of Security plus exam.
00:11
In this video, I'll be talking about application and service attacks
00:16
on your screen. You see the many types of attacks that can occur and breach our information and data systems.
00:24
In this video, I'll be talking about application and service attacks such as buffer overflow, cross site scripting, cross site request for forgery, privilege escalation, injections, etcetera.
00:37
Also be talking about some cryptographic attack such as birthday greenbow tables, brute force and past the hash
00:46
application. Vulnerabilities are unknown. Threat vector in on your screen. You see some of the common types of attacks will be talking about each of these over the next few minutes.
00:57
A WASP is considered the authoritative source to understand about the top 10 applications security risks.
01:04
See a wasp dot org's for more information.
01:08
You see the list on your screen. It's very similar to the list that's also mentioned by security, plus
01:15
the first type of application attack. I'll discuss our buffer overflows.
01:21
This is a type of injection attack where more data is input through a field.
01:27
I think the buffer can hold. It's like trying to fill a bucket too full.
01:33
Any of the water that spills out is then executed. Any of the code that goes beyond the buffer could then be executed by the operating system. It's an anomaly. Were program while writing data to a registry or buffer overruns, the buffers boundaries and over its adjacent memory locations,
01:52
causing the breach.
01:55
The second form of application attack is injection that occurs when untrusted data is sent to an interpreter as a part of a command
02:04
or a query. Most common fall into the following categories using escape characters, not filter correctly type handling. Not properly done. Conditional errors and timing delays.
02:16
Way to defend this attack is to filter your input.
02:21
See the later video where I talk about how to protect Web applications.
02:25
Common examples of injection and tax include sequel injection
02:30
operating system injection, L DAP against the directory and XML injection.
02:38
Cross site scripting occurs whenever an application includes untrusted data and a new Web page without proper validation for escaping
02:46
or updates an existing Web page with user supplied data using a browser, a p I that can create HTML were JavaScript.
02:55
You see an example on your screen.
02:59
Cross site request. Forgery. CSR F is an attack that forces an end user toe. Execute unwanted actions on a Web application.
03:07
Also known as a session writing or one click attack
03:13
privilege. Escalation is a form of pivoting attack.
03:16
The attacker will breach the system, having bear authentication writes their privileges
03:22
and then they try to gain further privileges, such as administrator or route were the privilege that is running a particular application.
03:31
It's the act of exploiting a bug design flaw or configuration oversight in the operating system. Application or software.
03:39
Begin elevated access to resources that are normally protected from that application or user.
03:46
How do we protect against thes application attacks
03:51
on your screen? You see some good ideas.
03:53
First of all, follows from good coding practices.
03:57
Goto a wasp and see their directions.
04:00
Worked with your application development team to make sure they learn good coding practices as well.
04:08
Filter and validate any input, any input that could come from an untrusted source. Anyone on the Internet should be filtered and validated. Basically, don't trust input.
04:18
Use a Web application firewall. A laugh, which is a specific device that scrubs for any unwanted data based on heuristics, anomalies or signatures.
04:31
You just want to build security into the software development life cycle,
04:35
lastly, have an instant response plan in place.
04:40
For one, that inevitable bad thing happens.
04:44
A zero day exploit is a type of an attack against a previously unknown security vulnerability.
04:50
It may take advantage of a security vulnerability on the same day that vulnerability becomes generally known. It's zero day because there's zero time to get the vulnerability fixed before it's announced.
05:04
Best known example, ISS stuxnet was the worm that took out nuclear generators.
05:12
Prevention for zero days include defense in depth,
05:15
staying up to date on patches and keeping your anti virus up to date.
05:21
There are other types of attacks you should be aware of, such as Impersonating, masquerading and relay attacks per person. A shin is the act of pretending to be someone or getting something to gain unauthorized access to a system. The prevention against these attacks are token authentication, such as using curb rose,
05:41
multi factor and two factor authentication,
05:44
encryption
05:45
and sequenced session identification.
05:48
Driver manipulation is another form of attack.
05:53
Drivers are the programs that control devices such as printers, media, keyboards, mice, et cetera.
06:00
Drivers are normally signed.
06:02
If you trust a driver from a source, he shouldn't
06:06
and it could lead to a breach onto your system.
06:11
Shaming is creating a library or modifying an existing one toe, bypass a driver and perform a function other than the one for which the AP I was created.
06:21
Re factoring is a type of driver of manipulation.
06:26
It's a set of techniques used to identify the flow and then modify the internal structure of code without changing the codes. Visible behavior.
06:35
Be familiar with these forms of driver manipulation and ways to secure against them.
06:43
There are numerous cryptographic attacks you should know
06:46
if you're not familiar with cryptography.
06:48
Reference. Domain six of the Company of Security Plus exam,
06:55
The first cryptographic attack our birthday attacks.
06:58
I kind of like two people having the same birthday. It's a one and 13 chance birthday attack. It's an attack against a cryptographic hash that looks for hash collisions,
07:09
exploiting the oneto, one nature of hashing function.
07:13
And if you're not familiar with hashing for two Section six,
07:16
a known plain text cipher text attack is when an attacker attempts to derive a cryptographic key by using pairs of known plane tax along with the corresponding cipher text.
07:29
So I have cipher text. I have the plain text. I might be able to determine what that key is.
07:34
A frequency analysis. Tak is looking at blocks of the encrypted message to determine if there any common patterns. So you're seeing multiple letters. Maybe they're not using assault.
07:46
We're not familiar with salt and check out section Six
07:51
Other types of cryptographic attacks include password attacks, such as a dictionary
07:58
attack, where you're systematically entering every word from the dictionary as a password.
08:03
Wait, a defeated is Don't use dictionary words as your password
08:07
brute force. It systematically attempted all possible combinations of letters, numbers and symbols. This is usually automated
08:16
rainbow tables that is all possible. Password hash is that air computed in advance?
08:22
The last cryptographic attack against passwords is past the hash.
08:28
It's where an attacker attempts to authenticate to remote server or service by intercepting password. Hash is on the network. See your study material for more information on these and other types of cryptographic attacks against passwords.
08:45
Let's practice on another sample quiz question
08:48
during a breach investigation, you noticed that the attacker entered the database through a Web front end application by manipulating the data base code to exploit a vulnerability.
08:58
What is the most likely name for this type of attack?
09:03
The answer is.
09:05
See
09:07
sequel injection. This is a form of injection attack against back in databases.
09:13
Question, too.
09:15
Which of the following types of attack is the result of software vulnerabilities and is caused by supplying more data than is expected in an input field?
09:24
The answer is
09:26
a buffer overflow attack.
09:30
This is basically the definition for buffer overflows. Question three,
09:35
which form of attack uses special programs that attempt all possible character combinations to determine password.
09:43
The answer is
09:45
a
09:46
brute force attack.
09:48
This is the definition.
09:50
This concludes Part two of section one dot to compare and contrast different types of attacks.
09:58
In this video, I talked about application service and cryptographic attacks

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor