Security Countermeasures Against Attacks
If there’s one thing that’s abundant in the IT world, it is attacks and attackers. Attackers lurk almost everywhere. If you have computer systems, you can’t escape them. However, you can be proactive in identifying the different types of attacks and take steps to prevent them, or at least prevent their effectiveness. It’s important to realize that effective countermeasures exist for all of the attacks.
Attackers are actively working on beating the countermeasures. As they do, security professionals create additional countermeasures and the attackers try to beat them. The battle continues daily. If you’re planning to take the Security+ exam, you should have a basic understanding of various types of attacks from different sources and have some insight into preventing many of them.
For example, can you answer this question?
Q. Some protocols include timestamps and sequence numbers. What types of attacks do these components help protect against?
C. Flood guards
More, do you know why the correct answer is correct and the incorrect answers are incorrect? The answer and explanation is available at the end of this post.
A replay attack is one where an attacker replays data that was already part of a communication session. In a replay attack, a third party attempts to impersonate a client that is involved in the original session. Replay attacks can occur on both wired and wireless networks.
As an example, Maggie and Bart may initiate a session with each other. During the communication, each client authenticates with the other by passing authentication credentials to the other system. Hacker Harry intercepts all the data, including the credentials, and later initiates a conversation with Maggie pretending to be Bart. When Maggie challenges hacker Harry, he sends Bart’s credentials.
Many protocols use timestamps and sequence numbers to thwart replay attacks. For example, Kerberos helps prevent replay attacks with timestamped tickets.
Replay attacks capture data in a session with the intent of later impersonating one of the parties in the session. Timestamps and sequence numbers are effective countermeasures against replay attacks.
The Xmas attack, also called a Christmas tree attack, is a type of port scan used to identify underlying details of an operating system. For example, it can help determine if the scanned system is running a Microsoft-based operating system or a Linux-based operating system.
A typical port scan attempts to learn what ports are open on a system. Based on what ports are open, the port scanner can detect what services and protocols are running on a system. For example, if port 80 is open, it’s very likely that the Hypertext Transfer Protocol (HTTP) protocol is running on the system because the well-known port for HTTP is port 80.
However, the Xmas attack goes farther than a typical port scan. It has several bits set in the packet header and is reminiscent of lights lit in a Christmas tree. As least someone thought it looked like a Christmas tree and decided to name it a Christmas tree attack, or Xmas attack.
More importantly, the Xmas attack sets specific flags within the TCP packet header. Different operating systems respond to these flags in specific ways. Attackers can analyze the response and determine the operating system of the remote system in addition to what ports are open. In many cases, the attacker can even determine the version of the responding system.
The Xmas attack is often used as reconnaissance in an overall attack. It doesn’t cause damage itself. However, attackers use the information they gain from the Xmas attack to launch other attacks. Most intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) can detect these attacks.
A man-in-the-middle (MITM) attack is a form of active interception or active eavesdropping. It uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two. The two computers are unaware of the MITM computer, and it can interrupt the traffic at will or insert malicious code.
For example, imagine that Maggie and Bart are exchanging information with their two computers over a network. If hacker Harry can launch an MITM attack from a third computer, he will be able to intercept all traffic. Maggie and Bart still receive all the information, so they are unaware of the attack. However, hacker Harry also receives all the information. Because the MITM computer can control the entire conversation, it is easy to insert malicious code and send it to the computers. The ARP Poisoning Attacks blog post shows how ARP poisoning can be used to launch an MITM attack.
Kerberos helps prevent man-in-the-middle attacks with mutual authentication. It doesn’t allow a malicious system to insert itself in the middle of the conversation without the knowledge of the other two systems.
Q. Some protocols include timestamps and sequence numbers. These components help protect against what type of attacks?
C. Flood guards
Answer is B. Timestamps and sequence numbers act as countermeasures against replay attacks.
Blocking directed broadcasts prevents smurf attacks.
Flood guards protect against SYN (synchronize) attacks.
Salting protects against brute force attacks on passwords.