You are on page 1of 4

Next generation tactical attacks

Hacking has evolved from direct exploitation to


multi-stage tactical attacks. Client side exploitation,
application level attacks, complex social engineering
are the threats of the day. Does the conventional
threat definition work anymore? Are the
conventional security solutions geared to face the
emerging attacks?

How has hacking changed? relationships, tricking authentication systems


and hijacking services to gain access to more
With the technological advancements in systems. This is also true for attackers looking
existing security measures like firewall, IPS, beyond exploits to gain access and control of
anti-virus etc., attacker’s approach is also confidential information.
changing significantly. As direct exploitation
of the network devices, operating systems, and Attackers are now opportunists: attacking the
applications is getting tougher, attackers are opportunity of applications, people and
increasingly turning to exploiting employees process for successful break-ins. H D Moore &
and users, finding multi-stage attack paths, Valsmith’s paper- "Random Pwning Fun Bag”
attacking client software and attacking rich first gave a good glimpse of the various tactical
internet applications. Organizations often approaches of the current day attacker. Below
miss out vulnerabilities resulting out of this we describe some of those next generation
“tactical approach” and live in a false sense of tactical attacks and iViZ’s own experience that
security. Anyone who thinks that security are successfully used to find out unknown and
products alone can offer true security is settling newer vulnerabilities:
for the illusion of security. “Attackers are now opportunists:
Hacking has moved beyond attacking the opportunity of
exploitation weak applications, people and
Hacking has ceased to be only about exploits. process for successful break-ins”
This is because the vulnerabilities are
transient. A newly discovered vulnerability will
Attacking Data in Motion
be patched in the next cycle rendering the Contrary to attacking the vulnerable software
exploit totally useless. In a typical penetration directly, attackers are interested in exploiting
test only one or two real exploits may be the opportunity of intercepting data in
successfully used. The rest of the time is spent motion. Attackers are interested in gaining
obtaining passwords, abusing trust access to the data, not in gaining
09
administrative privileges. So even though you domains and host names to determine
might have a very secure system, a whether those entries exist. Many DNS servers
sophisticated attacker can steal your data are mis-configured to allow reverse DNS
without attacking your secure system! lookups of private addresses, exposing the
names and addresses of important servers on
File Transfers the internal network. A successful attack can
Traditional attacks involved exploiting the lead to false DNS records injection into the
FTP server software. However, in tactical cache and a potential hijack of internal and
approach, attackers focus on the data transfer: external domains. Dan Kamisky’s famous and
the opportunity of actual transfer in process. shocking DNS attack is an example of this
File transfers attacked in this process could be attack.
FTP or NFS which lead to significant
Att acking Trust Based
confidential data disclosure. This is also a
premium attack vector as most organizations, Relationships
small or large, use file transfers in some form or Trust is one of the easily exploitable things to
the other. attack and leverage in a tactical approach.
iViZ, while conducting many penetration tests
Mail services has found that exploiting trust based
Unencrypted email can be read easily while it is relationships can offer attackers easy access to
making its way to your friend's inbox! A typical even the most secure systems! An example of
mail system is composed of one or more relay tactically exploiting trust based relationship is
systems, some form of antivirus / spam filter, the use of custom software meant for system
the real mail server itself and finally the user’s administration running in all the computers
email client. Traditionally attackers focused inside a network with administrative
only on the intermediate systems; however, in privileges. This means that this application is
tactical approach they target the mail clients as trusted by every computer in the network. By
well. For example, in older versions of some reverse engineering the software for the
mail clients, if two email messages containing hardcoded username and password, attackers
the same attachment name are received, the can compromise every host inside the network.
newer message can overwrite the previous Any resource trusted by more than one user or
message’s attachment. This can be used to computer is a potential leverage point for the
replace a trusted attachment with a backdoor attacker.
within the user’s mailbox.
“Exploiting trust based
“Gaining access to the data in relationships can offer attackers
transit may be easier and more easy access to even the most
attractive for a hacker rather secure systems!”
than gaining root privilege”
Attack chaining through Multi-
Attacking DNS services stage attack paths
With moderate security level, most DNS Conventional wisdom suggests that it is
servers are configured to reject zone transfers important to focus on critical assets only. But
from unauthorized hosts. However, in tactical there are severe vulnerabilities in less critical
approach, attackers use brute force on possible assets that can be used by attackers as a
10
launching pad for breaking into the network. any desktop/laptop. There have been a lot of
As a recent example of a famous security vulnerability disclosures in IE, Firefox, Opera,
breach, a hacker broke into the entire network Safari, MS word, Adobe, MS outlook etc.
by using vulnerability in an administrator's
desktop. Possibilities and combinations of “A hacker can send you a link or
such similar attacks are huge and are a file. Opening them could
important to mitigate. Unfortunately, multi- easily trigger a trojan download
stage attacks are complex and it is beyond the
capacity of human minds to find out all
on your system in spite of your
possible attack paths. Situation gets more firewall.”
complex when an attacker breaks into several
such less critical hosts and chains attack ARP poisoning with software
payload through them before reaching the updates
final secure critical server. ARP poisoning combined with Man-in-the
Dangerous low threat vulnerabilities Middle attacks have long been a known
technique for attackers to intercept and steal
and harmless high threat
confidential information. Tactical approach
vulnerabilities uses this technique and goes one step beyond
There are many low threat vulnerabilities in by combining it with automatic fake software
hosts that appear harmless because of their low updates. Attackers can fool users by forcing
severity rating. However, these often lead to their traffic to pass through a rouge gateway
severe vulnerabilities in a system. Attackers are setup by ARP poisoning and push malicious
increasingly exploiting this opportunity. software updates from a fake update server. As
Security managers focus mostly on eliminating an example, when a fake or trojan infected
high threat vulnerabilities leaving the low update of “Microsoft word 2007” pops up on
threat ones open – falsely assuming that they the user’s screen, an unsuspecting user may
pose little or no threat at all! install the update believing that it is actually
from Microsoft. Every user’s workstation can
“What may appear as a benign
potentially be compromised this way.
or low-priority vulnerability on
a host may be used as a Social Engineering
launching point for an attacker Social engineering hackers exploit the users’
to penetrate other devices on credulity, laziness, good manners, or even their
enthusiasm. Therefore it is challenging to
the network” defend against socially engineered attacks
Client Side Exploitation because the targets may not even realize that
they have been duped, or may prefer not to
Attackers are exploiting client side software admit it to others.
like browsers, word processors, document
readers to gain access to victim's system. Since Advanced social engineering techniques have
users are trusted within a network, attackers surfaced in recent times combined with client
can now easily bypass perimeter security side att acks, phishing, and system
devices. Browsers and email clients are the exploitation. This form of attack is not only
most popular targets since they are prevalent in effective but also has devastating impact.

11
Tactical social engineering is also bring with them a new class of
sophisticated threats which are not easily
deadly when combined with
detectable by normal application vulnerability
client side attacks even for fairly scanners. Some of the latest attacks that
security conscious individuals. hackers are increasingly exploiting are:

Attacking SSH • AJAX Cross-site scripting XML


poisoning
Software supporting encrypted protocols like
• Malicious AJAX code execution
SSH can be used to gather information about
other possible targets on the network. Every • RSS / Atom injection
time users connect to a system using SSH, a file • Client side validation attack in AJAX
is created in “/.ssh/” called known hosts. This routines
file lets an attacker see other hosts that trust the
• Web services routing attack
user.
• Parameter manipulation with SOAP
In newer versions, the Master mode can be
used with good leverage to hijack SSH • XPATH injection in SOAP message
connections. Master mode lets the user set up a To stay ahead in this game of tactical security,
tunnel which allows multiple sessions over the conventional ways must be discarded. A
s a m e S S H c o n n e c t i o n w i t h o u t re - laundry list of vulnerabilities generated by
authentication. This essentially implies that automated tools is good but not good enough.
when one SSH connection is setup to a host Instead, organizations should evolve to
using master mode, an attacker can spawn building and testing security systems from the
other sessions over this same connection perspective of tactical attack vectors along with
without having to know the password or have human vulnerabilities. In the game of security
access to a key! its all about who runs faster. Is it you or the
hacker? There is no end to this race. Just
Advanced Web 2.0 attacks staying one step ahead is the name of the game.
AJAX, RIA and Web services are three Organizations should evolve to
important technological vectors in the Web
building and testing security
2.0 application space. These technologies are
promising and bring new equations to the systems from the perspective of
table, empowering overall effectiveness and tactical attack vectors along with
efficiency of Web applications. Mail human vulnerabilities.
applications, social networking, document
sharing, business utilities are increasingly
using Web 2.0 technologies to add newer
features and increase application
responsiveness. However, these technologies

12

You might also like