Cyber Security
An Introduction of SQL Injection, Buffer Overflow & Wireless Network Attack
http://techsecit.com
SQL Injection
• SQL injection is an attack technique that exploits a security vulnerability
occurring in the database layer of an application . Hackers use injections to
obtain unauthorized access to the underlying data, structure, and DBMS. It is
one of the most common web application vulnerabilities.
• A Database is the heart of many web-applications and is used to store
information needed by the application, such as, credit card information,
customer demographics, customer orders, client preferences, etc. Consequently,
databases have become attractive and very lucrative targets for hackers to hack
into.
• SQL Injections happen when a developer accepts user input that is directly placed
into a SQL Statement and doesn’t properly validate and filter out dangerous
characters. This can allow an attacker to alter SQL statements passed to the
database as parameters and enable her to not only steal data from your
database, but also modify and delete it.
Contd...
• Below are listed the main categories of SQL injection attacks.
• Classic Attack
• Most attacks rely on basic SQL manipulation and are considered to be classic attacks. It
includes WHERE clause modification, UNION operator injection and query stacking.
Those are by far the most popular kinds of SQLIA
• Inference attack
• Inference attacks involve a SQL manipulation that will provide the hacker the ability to
verify a true/false condition. Depending on the database system reaction, it is possible
to find out if the condition was realized or not.
Contd...
• DBMS specific attack
• This type of SQLIA is used as an alternative to classic SQL injection. It is especially useful
when trying to fingerprint the database system, but it can also provide the ability to achieve
a complete attack when some particular conditions are met.
• The risk of SQL injection exploits is on the rise because of automated tools. In the
past, the danger was somewhat limited because an exploit had to be carried out
manually: an attacker had to actually type their SQL statement into a text box.
However, automated SQL injection programs are now available, and as a result, both
the likelihood and the potential damage of an exploit has increased enormously.
• In an interview with Security Wire Perspectives, Caleb Sima, CTO of SPI Dynamics
spoke of the potential danger: "This technology being publicly released by some black
hat will give script-kiddies the ability to pick up a freeware tool, point it at a Web site
and automatically download a database without any knowledge whatsoever.
• I think that makes things a lot more critical and severe. The automation of SQL
injection gives rise to the possibility of a SQL injection worm, which is very possible. In
fact, I am surprised this hasn't occurred yet." Sima estimates that about 60% of Web
applications that use dynamic content are vulnerable to SQL injection.
Contd...
• According to security experts, the reason that SQL injection and many other
exploits, such as cross-site scripting, are possible is that security is not sufficiently
emphasized in development. To protect the integrity of Web sites and
applications, experts recommend simple precautions during development such
as controlling the types and numbers of characters accepted by input boxes.
• <It is the vulnerability that results when you give an attacker the ability to
influence the Structured Query Language (SQL) queries that an application
passes to a back-end database. By being able to influence what is passed to the
database, the attacker can leverage the syntax and capabilities of SQL itself, as
well as the power and flexibility of supporting database functionality and
operating system functionality available to the database. SQL injection is not a
vulnerability that exclusively affects Web applications; any code that accepts
input from an untrusted source and then uses that input to form dynamic SQL
statements could be vulnerable >
Buffer Overflow
• A buffer overflow condition exists when a program attempts to put more data in
a buffer than it can hold or when a program attempts to put data in a memory
area past a buffer. In this case, a buffer is a sequential section of memory
allocated to contain anything from a character string to an array of integers.
Writing outside the bounds of a block of allocated memory can corrupt data,
crash the program, or cause the execution of malicious code.
• Buffer overflow is probably the best known form of software security
vulnerability. Most software developers know what a buffer overflow
vulnerability is, but buffer overflow attacks against both legacy and newly-
developed applications are still quite common. Part of the problem is due to the
wide variety of ways buffer overflows can occur, and part is due to the error-
prone techniques often used to prevent them.
Contd...
• Exploiting a buffer overflow allows an attacker to control or crash the process or
to modify its internal variables. Buffer overflow always ranks high in the Common
Weakness Enumeration/SANS Top 25 Most Dangerous Software Errors and is
specified as CWE-120 under the Common Weakness Enumeration dictionary of
weakness types. Despite being well understood, buffer overflows continue to
plague software from vendors both large and small.
• A buffer overflow can occur inadvertently, but it can also be caused by a
malicious actor sending carefully crafted input to a program that then attempts
to store the input in a buffer that isn't large enough for that input. If the excess
data is written to the adjacent buffer, it overwrites any data held there. If the
original data includes the exploited Function’s return pointer -- the address to
which the process should go next -- an attacker can set the new values to point to
an address of his choosing. The attacker usually sets the new values to point to a
location where the exploit Payload has been positioned. This alters the execution
path of the process and effectively transfers control to the attacker's malicious
code.
Contd...
• The heap is a memory structure used to manage dynamic memory. Programmers
often use the heap to allocate memory whose size is not known at compile time,
where the amount of memory required is too large to fit on the stack or where
the memory is intended to be used across function calls.
• Other buffer-related attacks include integer overflow, which is when a number is
used in an operation, the result of which requires more memory to store. For
example, 8 bits of memory are required to store the number 192. If the process
adds 64 to this number, the answer 256 will not fit in the allocated memory, as it
requires 9 bits.
• Format strings attacks alter the flow of an application by using string formatting
library functions like printf and sprintf to access other memory space.
Contd...
• Finally, a Unicode overflow exploits the greater memory required to store a
string in Unicode format than in ASCII characters.
• The most common reason why buffer overflow attacks work is because
applications fail to manage memory allocations and validate input from the client
or other processes. Applications developed in C or C++ should avoid dangerous
standard Library functions that are not bounds checked, such as gets, scanf and
strcpy, and instead use libraries or classes explicitly created to perform string and
other memory operations securely. User input and data from untrusted sources
should always be validated to ensure that they are within the bounds of what's
expected and to prevent overly long input values.
• Vendors issue patches and updates for their software to fix buffer overflow
vulnerabilities that have been discovered, but there is still a period of risk
between the vulnerability being discovered and the patch being created and
deployed.
Contd...
• Most operating systems have introduced runtime protections to make it harder
for overflow buffer attacks to succeed. Address Space layout
randomization randomly arranges the address space positions of key data areas
of a process, including the base of the executable and the positions of the stack,
heap and libraries. This makes it difficult for an attacker to reliably jump to a
particular function in memory.
• Data Execution Prevention marks areas of memory as either executable or non-
executable. This prevents an attacker from being able to execute instructions
written to a data area via a buffer overflow.
Contd...
• Recently revived, this formerly obsolete term gained currency in its day (1500)
from a work by Johannes Trithemius, Steganographia, ostensibly a system of
angel magic but also claiming to include a synthesis of how to learn and know
things contained within a system of cryptography. The book was privately
circulated but never published by the author because those who read it found it
rather fearsome.
Wireless Network Attack
• Access Control Attacks
• Integrity Attacks
• Confidentiality Attacks
• Availability Attacks
• Authentication Attacks
Access Control Attacks
• War driving
• In a wardriving attack, wireless LANS are detected either by sending probe requests
over a connection or by listening to web beacons. Once a penetration point is
discovered, further attacks can be launched on the LAN. Some of the tools that can be
used to perform wardriving are KisMAC, NetStumbler, and WaveStumber.
• Rogue Access Points
• In order to create a backdoor into a trusted network, an unsecured access point or
fake access point is installed inside a firewall. Any software or hardware access points
can be used to perform this kind of attack.
• MAC Spoofing
• Using the MAC spoofing technique, the attacker can reconfigure the MAC address to
appear as an authorized access point to a host on a trusted network. The tools for
carrying out this kind of attack are: changemac.sh, SMAC, and Wicontrol.
Contd...
• Ad Hoc Associations
• This kind of attack can be carried out by using any USB adapter or wireless card. In this
method, the host is connected to an unsecured station to attack a particular station or
to avoid access point security.
• AP Misconfiguration
• If any of the critical security settings is improperly configured at any of the access
points, the entire network could be open to vulnerabilities and attacks. The AP can't
trigger alerts in most intrusion-detection systems, as it is authorized as a legitimate
device on the network.
• Client Misassociation
• The client may connect or associate with an AP outside the legitimate network either
intentionally or accidentally. This is because the WLAN signals travel through walls in
the air. This kind of client misassociation thus can be lead to access control attacks.
Contd...
• Unauthorized Association
• Unauthorized association is the major threat to wireless network. Prevention of this
kind of attack depends on the method or technique that the attacker uses in order to
get associated with the network.
• Promiscuous Client
• The promiscuous client offers an irresistibly strong signal intentionally for malicious
purposes. Wireless cards often look for a stronger signal to connect to a network. In
this way the promiscuous client grabs the attention of the users towards it by sending
strong signal.
Integrity Attacks
• In integrity attacks, attackers send forged control, management, or data frames
over a wireless network to misdirect the wireless devices in order to perform
another type of attack (e.g., DoS).
Type of Attack Description Method and Tools
Data Frame Injection
Crafting and sending forged 802.11
frames.
Airpwn, File2air, libradiate,
voidll, WEPWedgie, wnet
dinject/reinject
WEP Injection
Crafting and sending forged WEP
encryption keys
WEP cracking + injection
tools
Data Replay
Capturing 802.11 data frames for
later (modified) replay.
Capture + injection tools
Contd...
Initialization Vector
Replay Attacks
The key stream is derived by sending
the plain-text message.
Bit-Flipping Attacks
Captures the frame and flips random
bits in the data payload, modifies
ICV, and sends to the user
Extensible AP Replay
Capturing 802.IX Extensible
Authentication Protocols (e.g., EAP
Identity, Success, Failure) for later
replay.
Wireless capture +
injection tools between
station and AP
RADIUS Replay
Capturing RADIUS Access-Accept or
Reject messages for later replay
Ethernet capture +
injection tools between AP
and authentication server
Wireless Network Viruses
Viruses have their impact on the
wireless network to a great extent. It
allows the attacker with simplest
ways for attacking on APs.
Confidentiality Attacks
• These attacks attempt to intercept confidential information sent over wireless
associations, whether sent in the clear text or encrypted by Wi-Fi protocols.
Type of Attack Description Method and Tools
Eavesdropping
Capturing and decoding unprotected
application traffic to obtain
potentially sensitive information.
bsd-airtools, Ethereal,
Ettercap, Kismet,
commercial analyzers
Traffic Analysis
Implication of information from the
observation of external traffic
characteristics.
Cracking WEP Key
Capturing data to recover a WEP key
using brute force or Fluhrer-Mantin-
Shamir (FMS) cryptanalysis.
Aircrack, AirSnort,
chopchop, dwepcrack,
WepAttack, WepDecrypt,
WepLab
Contd...
Evil Twin AP
Masquerading as an authorized AP by
beaconing the WLAN's service set
identifier (SSID) to lure users.
qureAP, HermesAP,
HostAP, OpenAP, Quetec,
WifiBSD
Man-in-the- Middle Attack
Running traditional man-in-the- middle
attack tools on an evil twin AP to
intercept TCP sessions or SSL/SSH
tunnels.
dsniff, Ettercap
Masquerading
Pretends to be an authorized user of a
system in order to gain access to it.
Stealing login IDs and
passwords, bypassing
authentication mechanisms
Session Hijacking
Manipulating the network so the
attacker's host appears to be the
desired destination.
Manipulating
Honeypot Access Point
Setting its service identifier (SSID) to
be the same as an access point at the
local hotspot assumes the attacker as
the legitimate hotspot.
Manipulating SSID
Availability Attack
• These attacks aim at obstructing the delivery of wireless services to legitimate
users, either by crippling those resources or by denying them access to WLAN
resources. There are many attacks using which an attacker can obstruct the
availability of wireless networks. The availability attacks include:
Type of Attack Description Method and Tools
Access Point Theft
Physically removing an AP from a
public space.
Five finger discount
Denial of Service
Exploiting the CSMA/CA Clear
Channel Assessment (CCA)
mechanism to make a channel
appear busy
An adapter that supports
CW Tx mode, with a low-
level utility to invoke
continuous transmit
Beacon Flood
Generating thousands of counterfeit
802.11 beacons to make it hard for
stations to find a legitimate AP.
FakeAP
Contd...
Authenticate Flood
Sending forged Authenticates or
Associates from random MACs to fill
a target AP's association table.
Airjack, File2air, Macfld,
voidll
Disassociation Attacks
Causes the target unavailable to
other wireless devices by destroying
the connectivity between station
and the client.
Destroys the connectivity
De-authenticate Flood
Flooding station(s) with forged
Deauthenticates or Disassociates to
disconnecting users from an AP.
Destroys the connectivity
TKIP MIC Exploit
Generating invalid TKIP data to
exceed the target AP's MIC error
threshold, suspending WLAN service.
File2air, wnet dinject
ARP Cache Poisoning
Attack
Provides attackers with many attack
vectors
Contd...
EAP-Failure
Observing a valid 802.IX EAP
exchange, and then sending the
station a forged EAP-Failure
message.
QACafe, File2air, libradiate
Routing Attacks
Routing information is distributed
within the network
RIP protocol
Power Saving Attacks
Transmitting a spoofed TIM or DTIM
to the client while in power saving
mode causes the DoS attack
Authentication Attacks
• The objective of authentication attacks is to steal the identity of Wi-Fi clients,
their personal information, login credentials, etc. to gain unauthorized access to
network resources.
Type of Attack Description Method and Tools
Application Login Theft
Capturing user credentials (e.g.,
email address and password) from
clear text application protocols.
Ace Password Sniffer,
Dsniff, PHoss, WinSniffer
PSK Cracking
Recovering a WPA PSK from
captured key handshake frames
using a dictionary attack tool.
coWPAtty, KisMAC,
wpa_crack, wpa-psk-bf
Shared Key Guessing
Attempting 802.11 Shared Key
Authentication with guessed vendor
default or cracked WEP keys.
WEP cracking tools
Contd...
Domain Login Cracking
Recovering user credentials (e.g.,
Windows login and password) by
cracking NetBIOS password hashes,
using a brute-force or dictionary
attack tool.
John the Ripper,
LOphtCrack, Cain
Identity Theft
Capturing user identities from
cleartext 802.IX Identity Response
packets
Capture tools
VPN Login Cracking
Recovering user credentials (e.g.,
PPTP password or IPSec Preshared
Secret Key) by running brute-force
attacks on VPN authentication
protocols.
ike_scan and ike_crack
(IPsec), anger and THC-
pptp- bruter (PPTP
Password Speculation
Using a captured identity, repeatedly
attempting 802.IX authentication to
guess the user's password.
Password dictionary
Contd...
LEAP Cracking
Recovering user credentials from
captured 802.IX Lightweight EAP
(LEAP) packets using a dictionary
attack tool to crack the NT password
hash.
Anwrap, Asleap, THC-
LEAPcracker
Thank You
http://techsecit.com

More Related Content

PDF
NOSQL- Presentation on NoSQL
PPTX
Multidimensional schema of data warehouse
PDF
Artificial Intelligence Notes Unit 1
PPTX
Problem solving agents
PPTX
Knowledge based agents
DOCX
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
PPTX
Deep learning presentation
PDF
11. grid scheduling and resource managament
NOSQL- Presentation on NoSQL
Multidimensional schema of data warehouse
Artificial Intelligence Notes Unit 1
Problem solving agents
Knowledge based agents
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Deep learning presentation
11. grid scheduling and resource managament

What's hot (20)

PPT
Artificial Intelligence 1 Planning In The Real World
PPTX
Attribute oriented analysis
PPTX
Feed forward ,back propagation,gradient descent
PPTX
And or graph
PPTX
Data Mining: Mining ,associations, and correlations
PDF
Ai lecture 7(unit02)
PPT
Symbol table management and error handling in compiler design
PPT
Artificial neural network model & hidden layers in multilayer artificial neur...
PDF
Identifying classes and objects ooad
PPT
14. Query Optimization in DBMS
PDF
Query optimization in SQL
PPT
screen output and keyboard input in js
PDF
Adversarial search
PPTX
Foundation of A.I
PPTX
Implementation of lexical analyser
PPT
Loop invariant computation
PDF
Run time storage
PPT
Multi-tenancy In the Cloud
PPTX
Knowledge Representation & Reasoning AI UNIT 3
PDF
Internet Of Things (November – 2018) [Choice Based | Question Paper]
Artificial Intelligence 1 Planning In The Real World
Attribute oriented analysis
Feed forward ,back propagation,gradient descent
And or graph
Data Mining: Mining ,associations, and correlations
Ai lecture 7(unit02)
Symbol table management and error handling in compiler design
Artificial neural network model & hidden layers in multilayer artificial neur...
Identifying classes and objects ooad
14. Query Optimization in DBMS
Query optimization in SQL
screen output and keyboard input in js
Adversarial search
Foundation of A.I
Implementation of lexical analyser
Loop invariant computation
Run time storage
Multi-tenancy In the Cloud
Knowledge Representation & Reasoning AI UNIT 3
Internet Of Things (November – 2018) [Choice Based | Question Paper]
Ad

Viewers also liked (20)

PPTX
Buffer overflow
PPT
Buffer Overflow
PPTX
Buffer overflow attacks
PPTX
Buffer overflow attacks
PPTX
Buffer Overflow by SecArmour
PPTX
Anatomy of a Buffer Overflow Attack
PPT
6 buffer overflows
PDF
Buffer overflow attacks
PDF
Presentation buffer overflow attacks and theircountermeasures
PPTX
Instintos Unidad II Fisiología y Conducta
PDF
itek Energy_Marketing Strategy Powerpoint (1)
DOCX
міністерство освіти і науки україни
PPTX
marketing plan
PPTX
Instinto sexual y sexualidad
PDF
Buffer Overflow exploitation
PPT
Intrusion detection and prevention
PDF
(130216) #fitalk potentially malicious ur ls
PDF
Desofuscando um webshell em php h2hc Ed.9
PDF
Binary Obfuscation from the Top Down: Obfuscation Executables without Writing...
PDF
Spo2 t19 spo2-t19
Buffer overflow
Buffer Overflow
Buffer overflow attacks
Buffer overflow attacks
Buffer Overflow by SecArmour
Anatomy of a Buffer Overflow Attack
6 buffer overflows
Buffer overflow attacks
Presentation buffer overflow attacks and theircountermeasures
Instintos Unidad II Fisiología y Conducta
itek Energy_Marketing Strategy Powerpoint (1)
міністерство освіти і науки україни
marketing plan
Instinto sexual y sexualidad
Buffer Overflow exploitation
Intrusion detection and prevention
(130216) #fitalk potentially malicious ur ls
Desofuscando um webshell em php h2hc Ed.9
Binary Obfuscation from the Top Down: Obfuscation Executables without Writing...
Spo2 t19 spo2-t19
Ad

Similar to An Introduction of SQL Injection, Buffer Overflow & Wireless Attack (20)

PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
PPT
Software security (vulnerabilities) and physical security
PPT
Software Security (Vulnerabilities) And Physical Security
PDF
Using Analyzers to Resolve Security Problems
PPTX
Introduction to penetration testing
PPTX
Exploitation techniques and fuzzing
PDF
Solvay secure application layer v2015 seba
PPTX
Web and Mobile Application Security
PPTX
DBMS Vulnerabilities And Threats.pptx
PPTX
VAPT_FINAL SLIDES.pptx
PPSX
Ids 008 buffer overflow
PDF
Secure coding guidelines
PPTX
owasp top 10 security risk categories and CWE
PDF
Chapter 9 system penetration [compatibility mode]
PPTX
csf_ppt.pptx
PDF
owasp-top-10 presentation dhs ad health .
PPTX
Cyber security issues
PPTX
AW-Infs201101067.pptx
PPTX
A general security rule is that if an individual can physically touch a devic...
PPTX
Owasp top 10 2017
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Software security (vulnerabilities) and physical security
Software Security (Vulnerabilities) And Physical Security
Using Analyzers to Resolve Security Problems
Introduction to penetration testing
Exploitation techniques and fuzzing
Solvay secure application layer v2015 seba
Web and Mobile Application Security
DBMS Vulnerabilities And Threats.pptx
VAPT_FINAL SLIDES.pptx
Ids 008 buffer overflow
Secure coding guidelines
owasp top 10 security risk categories and CWE
Chapter 9 system penetration [compatibility mode]
csf_ppt.pptx
owasp-top-10 presentation dhs ad health .
Cyber security issues
AW-Infs201101067.pptx
A general security rule is that if an individual can physically touch a devic...
Owasp top 10 2017

Recently uploaded (20)

PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
Internet Safety for Seniors presentation
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
MY PRESENTATION66666666666666666666.pptx
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Exploring The Internet Of Things(IOT).ppt
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
Layers_of_the_Earth_Grade7.pptx class by
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
simpleintnettestmetiaerl for the simple testint
Internet Safety for Seniors presentation
Viva Digitally Software-Defined Wide Area Network.pptx
Containerization lab dddddddddddddddmanual.pdf
AI_Cyberattack_Solutions AI AI AI AI .pptx
MY PRESENTATION66666666666666666666.pptx
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Alethe Consulting Corporate Profile and Solution Aproach
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
250152213-Excitation-SystemWERRT (1).ppt
Exploring The Internet Of Things(IOT).ppt
Artificial_Intelligence_Basics use in our daily life
Layers_of_the_Earth_Grade7.pptx class by

An Introduction of SQL Injection, Buffer Overflow & Wireless Attack

  • 1. Cyber Security An Introduction of SQL Injection, Buffer Overflow & Wireless Network Attack http://techsecit.com
  • 2. SQL Injection • SQL injection is an attack technique that exploits a security vulnerability occurring in the database layer of an application . Hackers use injections to obtain unauthorized access to the underlying data, structure, and DBMS. It is one of the most common web application vulnerabilities. • A Database is the heart of many web-applications and is used to store information needed by the application, such as, credit card information, customer demographics, customer orders, client preferences, etc. Consequently, databases have become attractive and very lucrative targets for hackers to hack into. • SQL Injections happen when a developer accepts user input that is directly placed into a SQL Statement and doesn’t properly validate and filter out dangerous characters. This can allow an attacker to alter SQL statements passed to the database as parameters and enable her to not only steal data from your database, but also modify and delete it.
  • 3. Contd... • Below are listed the main categories of SQL injection attacks. • Classic Attack • Most attacks rely on basic SQL manipulation and are considered to be classic attacks. It includes WHERE clause modification, UNION operator injection and query stacking. Those are by far the most popular kinds of SQLIA • Inference attack • Inference attacks involve a SQL manipulation that will provide the hacker the ability to verify a true/false condition. Depending on the database system reaction, it is possible to find out if the condition was realized or not.
  • 4. Contd... • DBMS specific attack • This type of SQLIA is used as an alternative to classic SQL injection. It is especially useful when trying to fingerprint the database system, but it can also provide the ability to achieve a complete attack when some particular conditions are met. • The risk of SQL injection exploits is on the rise because of automated tools. In the past, the danger was somewhat limited because an exploit had to be carried out manually: an attacker had to actually type their SQL statement into a text box. However, automated SQL injection programs are now available, and as a result, both the likelihood and the potential damage of an exploit has increased enormously. • In an interview with Security Wire Perspectives, Caleb Sima, CTO of SPI Dynamics spoke of the potential danger: "This technology being publicly released by some black hat will give script-kiddies the ability to pick up a freeware tool, point it at a Web site and automatically download a database without any knowledge whatsoever. • I think that makes things a lot more critical and severe. The automation of SQL injection gives rise to the possibility of a SQL injection worm, which is very possible. In fact, I am surprised this hasn't occurred yet." Sima estimates that about 60% of Web applications that use dynamic content are vulnerable to SQL injection.
  • 5. Contd... • According to security experts, the reason that SQL injection and many other exploits, such as cross-site scripting, are possible is that security is not sufficiently emphasized in development. To protect the integrity of Web sites and applications, experts recommend simple precautions during development such as controlling the types and numbers of characters accepted by input boxes. • <It is the vulnerability that results when you give an attacker the ability to influence the Structured Query Language (SQL) queries that an application passes to a back-end database. By being able to influence what is passed to the database, the attacker can leverage the syntax and capabilities of SQL itself, as well as the power and flexibility of supporting database functionality and operating system functionality available to the database. SQL injection is not a vulnerability that exclusively affects Web applications; any code that accepts input from an untrusted source and then uses that input to form dynamic SQL statements could be vulnerable >
  • 6. Buffer Overflow • A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer. In this case, a buffer is a sequential section of memory allocated to contain anything from a character string to an array of integers. Writing outside the bounds of a block of allocated memory can corrupt data, crash the program, or cause the execution of malicious code. • Buffer overflow is probably the best known form of software security vulnerability. Most software developers know what a buffer overflow vulnerability is, but buffer overflow attacks against both legacy and newly- developed applications are still quite common. Part of the problem is due to the wide variety of ways buffer overflows can occur, and part is due to the error- prone techniques often used to prevent them.
  • 7. Contd... • Exploiting a buffer overflow allows an attacker to control or crash the process or to modify its internal variables. Buffer overflow always ranks high in the Common Weakness Enumeration/SANS Top 25 Most Dangerous Software Errors and is specified as CWE-120 under the Common Weakness Enumeration dictionary of weakness types. Despite being well understood, buffer overflows continue to plague software from vendors both large and small. • A buffer overflow can occur inadvertently, but it can also be caused by a malicious actor sending carefully crafted input to a program that then attempts to store the input in a buffer that isn't large enough for that input. If the excess data is written to the adjacent buffer, it overwrites any data held there. If the original data includes the exploited Function’s return pointer -- the address to which the process should go next -- an attacker can set the new values to point to an address of his choosing. The attacker usually sets the new values to point to a location where the exploit Payload has been positioned. This alters the execution path of the process and effectively transfers control to the attacker's malicious code.
  • 8. Contd... • The heap is a memory structure used to manage dynamic memory. Programmers often use the heap to allocate memory whose size is not known at compile time, where the amount of memory required is too large to fit on the stack or where the memory is intended to be used across function calls. • Other buffer-related attacks include integer overflow, which is when a number is used in an operation, the result of which requires more memory to store. For example, 8 bits of memory are required to store the number 192. If the process adds 64 to this number, the answer 256 will not fit in the allocated memory, as it requires 9 bits. • Format strings attacks alter the flow of an application by using string formatting library functions like printf and sprintf to access other memory space.
  • 9. Contd... • Finally, a Unicode overflow exploits the greater memory required to store a string in Unicode format than in ASCII characters. • The most common reason why buffer overflow attacks work is because applications fail to manage memory allocations and validate input from the client or other processes. Applications developed in C or C++ should avoid dangerous standard Library functions that are not bounds checked, such as gets, scanf and strcpy, and instead use libraries or classes explicitly created to perform string and other memory operations securely. User input and data from untrusted sources should always be validated to ensure that they are within the bounds of what's expected and to prevent overly long input values. • Vendors issue patches and updates for their software to fix buffer overflow vulnerabilities that have been discovered, but there is still a period of risk between the vulnerability being discovered and the patch being created and deployed.
  • 10. Contd... • Most operating systems have introduced runtime protections to make it harder for overflow buffer attacks to succeed. Address Space layout randomization randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap and libraries. This makes it difficult for an attacker to reliably jump to a particular function in memory. • Data Execution Prevention marks areas of memory as either executable or non- executable. This prevents an attacker from being able to execute instructions written to a data area via a buffer overflow.
  • 11. Contd... • Recently revived, this formerly obsolete term gained currency in its day (1500) from a work by Johannes Trithemius, Steganographia, ostensibly a system of angel magic but also claiming to include a synthesis of how to learn and know things contained within a system of cryptography. The book was privately circulated but never published by the author because those who read it found it rather fearsome.
  • 12. Wireless Network Attack • Access Control Attacks • Integrity Attacks • Confidentiality Attacks • Availability Attacks • Authentication Attacks
  • 13. Access Control Attacks • War driving • In a wardriving attack, wireless LANS are detected either by sending probe requests over a connection or by listening to web beacons. Once a penetration point is discovered, further attacks can be launched on the LAN. Some of the tools that can be used to perform wardriving are KisMAC, NetStumbler, and WaveStumber. • Rogue Access Points • In order to create a backdoor into a trusted network, an unsecured access point or fake access point is installed inside a firewall. Any software or hardware access points can be used to perform this kind of attack. • MAC Spoofing • Using the MAC spoofing technique, the attacker can reconfigure the MAC address to appear as an authorized access point to a host on a trusted network. The tools for carrying out this kind of attack are: changemac.sh, SMAC, and Wicontrol.
  • 14. Contd... • Ad Hoc Associations • This kind of attack can be carried out by using any USB adapter or wireless card. In this method, the host is connected to an unsecured station to attack a particular station or to avoid access point security. • AP Misconfiguration • If any of the critical security settings is improperly configured at any of the access points, the entire network could be open to vulnerabilities and attacks. The AP can't trigger alerts in most intrusion-detection systems, as it is authorized as a legitimate device on the network. • Client Misassociation • The client may connect or associate with an AP outside the legitimate network either intentionally or accidentally. This is because the WLAN signals travel through walls in the air. This kind of client misassociation thus can be lead to access control attacks.
  • 15. Contd... • Unauthorized Association • Unauthorized association is the major threat to wireless network. Prevention of this kind of attack depends on the method or technique that the attacker uses in order to get associated with the network. • Promiscuous Client • The promiscuous client offers an irresistibly strong signal intentionally for malicious purposes. Wireless cards often look for a stronger signal to connect to a network. In this way the promiscuous client grabs the attention of the users towards it by sending strong signal.
  • 16. Integrity Attacks • In integrity attacks, attackers send forged control, management, or data frames over a wireless network to misdirect the wireless devices in order to perform another type of attack (e.g., DoS). Type of Attack Description Method and Tools Data Frame Injection Crafting and sending forged 802.11 frames. Airpwn, File2air, libradiate, voidll, WEPWedgie, wnet dinject/reinject WEP Injection Crafting and sending forged WEP encryption keys WEP cracking + injection tools Data Replay Capturing 802.11 data frames for later (modified) replay. Capture + injection tools
  • 17. Contd... Initialization Vector Replay Attacks The key stream is derived by sending the plain-text message. Bit-Flipping Attacks Captures the frame and flips random bits in the data payload, modifies ICV, and sends to the user Extensible AP Replay Capturing 802.IX Extensible Authentication Protocols (e.g., EAP Identity, Success, Failure) for later replay. Wireless capture + injection tools between station and AP RADIUS Replay Capturing RADIUS Access-Accept or Reject messages for later replay Ethernet capture + injection tools between AP and authentication server Wireless Network Viruses Viruses have their impact on the wireless network to a great extent. It allows the attacker with simplest ways for attacking on APs.
  • 18. Confidentiality Attacks • These attacks attempt to intercept confidential information sent over wireless associations, whether sent in the clear text or encrypted by Wi-Fi protocols. Type of Attack Description Method and Tools Eavesdropping Capturing and decoding unprotected application traffic to obtain potentially sensitive information. bsd-airtools, Ethereal, Ettercap, Kismet, commercial analyzers Traffic Analysis Implication of information from the observation of external traffic characteristics. Cracking WEP Key Capturing data to recover a WEP key using brute force or Fluhrer-Mantin- Shamir (FMS) cryptanalysis. Aircrack, AirSnort, chopchop, dwepcrack, WepAttack, WepDecrypt, WepLab
  • 19. Contd... Evil Twin AP Masquerading as an authorized AP by beaconing the WLAN's service set identifier (SSID) to lure users. qureAP, HermesAP, HostAP, OpenAP, Quetec, WifiBSD Man-in-the- Middle Attack Running traditional man-in-the- middle attack tools on an evil twin AP to intercept TCP sessions or SSL/SSH tunnels. dsniff, Ettercap Masquerading Pretends to be an authorized user of a system in order to gain access to it. Stealing login IDs and passwords, bypassing authentication mechanisms Session Hijacking Manipulating the network so the attacker's host appears to be the desired destination. Manipulating Honeypot Access Point Setting its service identifier (SSID) to be the same as an access point at the local hotspot assumes the attacker as the legitimate hotspot. Manipulating SSID
  • 20. Availability Attack • These attacks aim at obstructing the delivery of wireless services to legitimate users, either by crippling those resources or by denying them access to WLAN resources. There are many attacks using which an attacker can obstruct the availability of wireless networks. The availability attacks include: Type of Attack Description Method and Tools Access Point Theft Physically removing an AP from a public space. Five finger discount Denial of Service Exploiting the CSMA/CA Clear Channel Assessment (CCA) mechanism to make a channel appear busy An adapter that supports CW Tx mode, with a low- level utility to invoke continuous transmit Beacon Flood Generating thousands of counterfeit 802.11 beacons to make it hard for stations to find a legitimate AP. FakeAP
  • 21. Contd... Authenticate Flood Sending forged Authenticates or Associates from random MACs to fill a target AP's association table. Airjack, File2air, Macfld, voidll Disassociation Attacks Causes the target unavailable to other wireless devices by destroying the connectivity between station and the client. Destroys the connectivity De-authenticate Flood Flooding station(s) with forged Deauthenticates or Disassociates to disconnecting users from an AP. Destroys the connectivity TKIP MIC Exploit Generating invalid TKIP data to exceed the target AP's MIC error threshold, suspending WLAN service. File2air, wnet dinject ARP Cache Poisoning Attack Provides attackers with many attack vectors
  • 22. Contd... EAP-Failure Observing a valid 802.IX EAP exchange, and then sending the station a forged EAP-Failure message. QACafe, File2air, libradiate Routing Attacks Routing information is distributed within the network RIP protocol Power Saving Attacks Transmitting a spoofed TIM or DTIM to the client while in power saving mode causes the DoS attack
  • 23. Authentication Attacks • The objective of authentication attacks is to steal the identity of Wi-Fi clients, their personal information, login credentials, etc. to gain unauthorized access to network resources. Type of Attack Description Method and Tools Application Login Theft Capturing user credentials (e.g., email address and password) from clear text application protocols. Ace Password Sniffer, Dsniff, PHoss, WinSniffer PSK Cracking Recovering a WPA PSK from captured key handshake frames using a dictionary attack tool. coWPAtty, KisMAC, wpa_crack, wpa-psk-bf Shared Key Guessing Attempting 802.11 Shared Key Authentication with guessed vendor default or cracked WEP keys. WEP cracking tools
  • 24. Contd... Domain Login Cracking Recovering user credentials (e.g., Windows login and password) by cracking NetBIOS password hashes, using a brute-force or dictionary attack tool. John the Ripper, LOphtCrack, Cain Identity Theft Capturing user identities from cleartext 802.IX Identity Response packets Capture tools VPN Login Cracking Recovering user credentials (e.g., PPTP password or IPSec Preshared Secret Key) by running brute-force attacks on VPN authentication protocols. ike_scan and ike_crack (IPsec), anger and THC- pptp- bruter (PPTP Password Speculation Using a captured identity, repeatedly attempting 802.IX authentication to guess the user's password. Password dictionary
  • 25. Contd... LEAP Cracking Recovering user credentials from captured 802.IX Lightweight EAP (LEAP) packets using a dictionary attack tool to crack the NT password hash. Anwrap, Asleap, THC- LEAPcracker