. Drive-by attack
Drive-by download attacks are a common method of spreading malware.
Hackers look for insecure websites and plant a malicious script into HTTP or
PHP code on one of the pages. This script might install malware directly onto
the computer of someone who visits the site, or it might re-direct the victim
to a site controlled by the hackers. Drive-by downloads can happen when
visiting a website or viewing an email message or a pop-up window. Unlike many
other types of cyber security attacks, a drive-by doesn’t rely on a user to do
anything to actively enable the attack — you don’t have to click a download
button or open a malicious email attachment to become infected. A drive-by
download can take advantage of an app, operating system or web browser that
contains security flaws due to unsuccessful updates or lack of updates.
To protect yourself from drive-by attacks, you need to keep your
browsers and operating systems up to date and avoid websites that might contain
malicious code. Stick to the sites you normally use — although keep in mind
that even these sites can be hacked. Don’t keep too many unnecessary programs
and apps on your device. The more plug-ins you have, the more vulnerabilities
there are that can be exploited by drive-by attacks.
Password attack
Because passwords are the most commonly used mechanism to authenticate
users to an information system, obtaining passwords is a common and effective
attack approach. Access to a person’s password can be obtained by looking
around the person’s desk, ‘‘sniffing’’ the connection to the network to acquire
unencrypted passwords, using social engineering, gaining access to a password
database or outright guessing. The last approach can be done in either a random
or systematic manner:
·
Brute-force password guessing means using a
random approach by trying different passwords and hoping that one work Some
logic can be applied by trying passwords related to the person’s name, job
title, hobbies or similar items.
·
In a dictionary attack, a dictionary of common
passwords is used to attempt to gain access to a user’s computer and network.
One approach is to copy an encrypted file that contains the passwords, apply
the same encryption to a dictionary of commonly used passwords, and compare the
results.
In order to protect yourself from dictionary or brute-force attacks, you
need to implement an account lockout policy that will lock the account after a
few invalid password attempts. You can follow these account lockout best practices in order to
set it up correctly.
Handpicked related
content:
·
Password Policy Best Practices
6. SQL injection
attack
SQL injection has become a common issue with database-driven websites.
It occurs when a malefactor executes a SQL query to the database via the input
data from the client to server. SQL commands are inserted into data-plane input
(for example, instead of the login or password) in order to run predefined SQL
commands. A successful SQL injection exploit can read sensitive data from the
database, modify (insert, update or delete) database data, execute administration
operations (such as shutdown) on the database, recover the content of a given
file, and, in some cases, issue commands to the operating system.
For example, a web form on a website might request a user’s account name
and then send it to the database in order to pull up the associated account
information using dynamic SQL like this:
“SELECT * FROM users WHERE account = ‘“ + userProvidedAccountNumber
+”’;”
While this works for users who are properly entering their account
number, it leaves a hole for attackers. For example, if someone decided to
provide an account number of “‘ or ‘1’ = ‘1’”, that would result in
a query string of:
“SELECT * FROM users WHERE account = ‘’ or ‘1’ = ‘1’;”
Because ‘1’ = ‘1’ always evaluates to TRUE, the
database will return the data for all users instead of just a single user.
The vulnerability to this type of cyber security attack depends on the
fact that SQL makes no real distinction between the control and data planes.
Therefore, SQL injections work mostly if a website uses dynamic SQL.
Additionally, SQL injection is very common with PHP and ASP applications due to
the prevalence of older functional interfaces. J2EE and ASP.NET applications
are less likely to have easily exploited SQL injections because of the nature
of the programmatic interfaces available.
In order to protect yourself from a SQL injection attacks, apply
least0privilege model of permissions in your databases. Stick to stored
procedures (make sure that these procedures don’t include any dynamic SQL) and
prepared statements (parameterized queries). The code that is executed against
the database must be strong enough to prevent injection attacks. In addition,
validate input data against a white list at the application level.
greate job
ReplyDelete