Distributed Denial of Service (DDoS)
- A DDoS attack aims to overwhelm a network or service by flooding it with traffic from multiple sources.
- Mechanism:
- Botnets: Attackers use networks of infected devices (botnets) to generate traffic.
- Target Saturation: The target becomes unresponsive to legitimate users.
- Example:
- An e-commerce site is flooded with requests during a sale, causing it to crash.
DDoS attacks can target any online service, from websites to gaming servers, making them a widespread threat.
Insecure Network Protocols
- Protocols that lack encryption or authentication, making them vulnerable to interception.
- Examples:
- Telnet and FTP: Transmit data in plaintext, allowing eavesdropping.
- HTTP: Lacks encryption, exposing sensitive information.
- Risks:
- Data Interception: Attackers can capture credentials and sensitive data.
- Session Hijacking: Unauthorized access to active sessions.
Always use secure protocols like HTTPS or SSH to protect data in transit.
Malware
- Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
- Types:
- Ransomware: Encrypts files, demanding payment for decryption.
- Spyware: Collects sensitive information without user consent.
- Example:
- A ransomware attack encrypts a company's files, halting operations until a ransom is paid.
Malware can spread through email attachments, infected websites, or compromised software updates.
There are many different types of Malware, it would be good to look at: Virus, Worm, Trojan Horse, Spyware, Adware, Ransomware, Rootkit, Keylogger, Botnet, Fileless Malware, Logic Bomb, Backdoor
Man-in-the-Middle (MitM) Attacks
- An attacker intercepts and alters communication between two parties without their knowledge.
- Mechanism:
- Eavesdropping: Capturing data as it travels between devices.
- Data Manipulation: Altering messages or injecting malicious content.
- Example:
- An attacker intercepts a Wi-Fi connection at a café, capturing credit card information during an online purchase.
MitM attacks are especially dangerous on public Wi-Fi networks, where encryption may be weak or absent.
Phishing Attacks
- Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
- Mechanism:
- Emails or messages that appear legitimate, directing users to fake websites.
- Social Engineering: Exploiting human trust to extract information.
- Example:
- An email pretending to be from a bank, asking users to verify their account details on a fake website.
Always verify the sender's email address and check for suspicious links before providing any information.
SQL Injection
- An attack that involves inserting malicious SQL statements into an input field to manipulate or exploit databases.
- Mechanism:
- Attackers inject SQL code into user inputs, such as login forms or search boxes.
- This code executes on the server, allowing data extraction or modification.
- Example:
- Entering ', DROP TABLE users, -- in a login form could delete a database table if input is not properly sanitized.
SQL injection is one of the most common and dangerous web application vulnerabilities, often due to poor input validation.
Cross-Site Scripting (XSS)
- A vulnerability that allows attackers to inject malicious scripts into web content viewed by other users.
- Mechanism:
- Attackers embed scripts in user-generated content, such as comments or forums.
- When other users view the content, the script executes in their browsers.
- Example:
- A blog comment contains a script that steals cookies from other users, allowing session hijacking.
XSS attacks can lead to data theft, session hijacking, and defacement of websites.
Unpatched Software
- Software that has not been updated with the latest security patches, making it vulnerable to exploitation.
- Risks:
- Known Vulnerabilities: Attackers can exploit documented weaknesses.
- Increased Attack Surface: Outdated software provides entry points for malware and attacks.
- Example:
- An operating system that has not been updated, allowing attackers to exploit a known vulnerability.
Regularly update all software, including operating systems, applications, and firmware, to minimize vulnerabilities.
Weak Authentication
- Security measures that are easy to bypass or crack, often due to simple passwords or lack of multifactor authentication.
- Risks:
- Brute Force Attacks: Attackers can guess passwords using automated tools.
- Credential Theft: Weak passwords are easily compromised.
- Example:
- A website that only requires a username and a simple password, without any additional verification.
Always use strong, unique passwords and enable multifactor authentication to enhance security.
Zero-Day Exploits
- Attacks that exploit previously unknown vulnerabilities in software or hardware before a patch is available.
- Mechanism:
- Attackers discover a vulnerability and develop an exploit before the vendor is aware.
- These attacks are highly effective because there are no defenses in place.
- Example:
- An attacker discovers a flaw in a popular browser and spreads malware before the issue is publicly known and patched.
Zero-day exploits are highly sought after by cyber criminals and nation-state actors due to their effectiveness.
- Can you explain how a DDoS attack differs from a MitM attack?
- Why is it important to regularly update software and apply security patches?
- How do phishing attacks exploit human psychology to gain access to sensitive information?