- A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other information technology (IT) resources.
- Attackers in these types of attacks typically flood web servers, systems or networks with traffic that overwhelms the victim's resources and makes it difficult or impossible for anyone else to access them.
- Restarting a system will usually fix an attack that crashes a server, but flooding attacks are more difficult to recover from. Recovering from a distributed DoS (DDoS) attack in which attack traffic comes from a large number of sources is even more difficult.
- DoS and DDoS attacks often take advantage of vulnerabilities in networking protocols and how they handle network traffic.
- For example, an attacker might overwhelm the service by transmitting many packets to a vulnerable network service from different Internet Protocol (IP) addresses.
Wednesday, March 9, 2022
DoS & DDoS: Denial-of-service attack
Sunday, February 20, 2022
SQL Injection
- SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed.
- It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself can access.
- In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behaviour.
Impact of a successful SQL injection attack
A successful SQL injection attack can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period.
SQL injection examples
There are a wide variety of SQL injection vulnerabilities, attacks, and techniques, which arise in different situations. Some common SQL injection examples include:
Retrieving hidden data, where you can modify an SQL query to return additional results.
Subverting application logic, where you can change a query to interfere with the application's logic.
UNION attacks, where you can retrieve data from different database tables.
Examining the database, where you can extract information about the version and structure of the database.
Blind SQL injection, where the results of a query you control are not returned in the application's responses.
Detection of SQL injection vulnerabilities
The majority of SQL injection vulnerabilities can be found quickly and reliably using Burp Suite's web vulnerability scanner.
SQL injection can be detected manually by using a systematic set of tests against every entry point in the application. This typically involves:
Submitting the single quote character ' and looking for errors or other anomalies.
Submitting some SQL-specific syntax that evaluates to the base (original) value of the entry point, and to a different value, and looking for systematic differences in the resulting application responses.
Submitting Boolean conditions such as OR 1=1 and OR 1=2, and looking for differences in the application's responses.
Submitting payloads designed to trigger time delays when executed within an SQL query, and looking for differences in the time taken to respond.
Submitting OAST payloads designed to trigger an out-of-band network interaction when executed within an SQL query, and monitoring for any resulting interactions.
SQLI prevention and mitigation
There are several effective ways to prevent SQLI attacks from taking place, as well as protecting against them, should they occur.
- The first step is input validation (a.k.a. sanitization), which is the practice of writing code that can identify illegitimate user inputs.
- Most instances of SQL injection can be prevented by using parameterized queries (also known as prepared statements) instead of string concatenation within the query.
Wednesday, December 16, 2020
Important Questions: Information Security
1. What is brute force attack?
- A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
- In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.
- Brute force attacks may be used by criminals to crack encrypted data, or by security, analysts to test an organization's network security. An attack of this nature can be time- and resource-consuming.
- An example of a type of brute force attack is known as a dictionary attack, which might try all the words in a dictionary.
Brute force explanation with example
Consider we have to open a number combination like in the above picture.We have 3 wheels to turn, each wheel has values from 0-9.
Therefore the smallest number is 000 and the largest number is 999, so there are 1000 possible combinations to unlock this lock.
An attacker with a brute force approach will try to manually try out all the possible combinations to unlock this lock.
# One disadvantage of this method is that it is really slow, to solve this we can use a dictionary attack.
A dictionary attack will try out all the combinations in a list, rather than trying out all possible combinations. Consider my Password is 1234, this is one of the most common passwords found and I am having a list with the top 1000 common passwords, so my password can be hacked in seconds.
- Attacks on confidentiality, integrity, availability.
- Brute force attack: A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).
- Timing Attack: A timing attack is a security exploit that allows an attacker to discover vulnerabilities in the security of a computer or network system by studying how long it takes the system to respond to different inputs.
- Sniffers: Sniffing is a process of monitoring and capturing all data packets passing through a given network.
- Denial of Service - It prevents the normal use of communication facilities. This attack may have a specific target.
- Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details.
- it is carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.
- Phishing is an example of social engineering techniques used to deceive users.
- Mass Phishing (Deceptive Phishing) – Mass, large-volume attack intended to reach as many people as possible
- Spear Phishing – Targeted attack directed at specific individuals or companies using gathered information to personalize the message and make the scam more difficult to detect
- Whaling (CEO Fraud) – Type of spear phishing attack that targets “big fish,” including high-profile individuals or those with a great deal of authority or access
- Clone Phishing(pharming) – Spoofed copy of a legitimate and previously delivered email, with original attachments or hyperlinks replaced with malicious versions, which is sent from a forged email address. so it appears to come from the original sender or another legitimate source
- Advance-Fee Scam- Requests the target to send money or bank account information to the cyber-criminal
Frame Spoofing
Premature Termination of connections
➢ A number of management frames used in 802.11 wireless LANs such as the Beacon, Association and Authentication frames.
➢ A station needs to authenticate and then associate with an Access Point (AP) before they can exchange data frames with each other.
➢ Each party can, at any point in time, terminate the connection by transmitting a Deauthentication frames.
➢ The recipient of a management frame relies on the sender address field in the frame to identify the originator of the message.
However, an attacker can spoof the sender address in the frame. For example, he can fabricate a de-authentication frame with
Sender Address = Sataion_27
Receiver Address = AP
➢ The address used are 48-bit MAC address. When the AP receives the above frame, it thinks that Station_27 wishes to terminate the existing connection to itself. The AP sets the state of the connection between itself and Station_27 to be “Unauthenticated and Unassociated”
➢ Station_27 would have to go through the time-consuming process of re-associating itself to the AP if it wished to resume the communication. The attacker could repeatedly transmit such Deauthentication frames to the AP thus effectively slowing down or even preventing communication between Station_27 and AP.
- Mutual Authentication: provides enhanced protection against false base station attacks by allowing the mobile to authenticate the network.
- Data Integrity: provides enhanced protection against false base station attacks by allowing the mobile to check the authenticity of certain signalling messages.
- Network to Network Security: Secure communication between serving networks.
- Flexibility: Security features can be extended and enhanced as required by new threats and services.
- Longer key length: Key length is 128 as against 64 bits in GSM.
- Wider security scope: Security is based within the RNC rather than the base station.
- SOAP (Simple Object Access Protocol) bindings are mechanisms which allow SOAP messages to be effectively exchanged using a transport protocol.
- Most SOAP implementations provide bindings for common transport protocols, such as HTTP or SMTP.
- HTTP is synchronous and widely used. A SOAP HTTP request specifies at least two HTTP headers: Content-Type and Content-Length.
- Man-in-the-Middle Attack: A man-in-the-middle attack happens during the transmission of a signal. The hacker listens for communication between a tag and reader and then intercepts and manipulates the information. The hacker diverts the original signal and then sends false data while pretending to be a normal component in the RFID system.
- Denial of Service: A Denial of Service attack is the broad concept of an RFID system failure that is associated with an attack. These attacks are usually physical attacks like jamming the system with noise interference, blocking radio signals, or even removing or disabling RFID tags.
- Power Analysis: Power analysis attacks can be mounted on RFID systems by monitoring the power consumption levels of RFID tags.
- Eavesdropping: Eavesdropping, like it sounds, occurs when an unauthorized RFID reader listens to conversations between a tag and reader then obtains important data.
- Role-based access control (RBAC) is an approach to restricting system access to authorized users.
- It s a policy-neutral access-control mechanism defined around roles and privileges.
- RBAC can be used to facilitate administration of security in large organizations with hundreds of users and thousands of permissions.
- The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments.
- The owner of a protected system or resource sets policies defining who can access it.
- DAC can involve physical or digital measures, and is less restrictive than other access control systems, as it offers individuals complete control over the resources they own.
- It is less secure because associated programs inherit security settings and allow malware to exploit them without the knowledge of the end-user.
- You can use RBAC to implement DAC.
- Is a mechanism that restricts system access.
- It involves setting permissions and privileges to enable access to authorized users.
- Most large organizations use role-based access control to provide their employees with varying levels of access based on their roles and responsibilities.
- This protects sensitive data and ensures employees can only access information and perform actions they need to do their jobs.
- MAC is considered the most secure of all access control models.
- In MAC, central authority regulates access rights based on multiple levels of security.
- Only users or devices with the required information security clearance can access protected resources.
- Access rules are manually defined by system administrators and strictly enforced by the operating system or security kernel.
- Organizations with varying levels of data classification, like government and military institutions, typically use MAC to classify all end users.
- You can use role-based access control to implement MAC.

- A buffer overflow, or buffer overrun, occurs when more data is put into a fixed-length buffer ( Buffers are areas of memory set aside to hold data) than the buffer can handle.
- The extra information, which has to go somewhere, can overflow into adjacent memory space, corrupting or overwriting the data held in that space.
- This overflow usually results in a system crash, but it also creates the opportunity for an attacker to run arbitrary code or manipulate the coding errors to prompt malicious actions.
- Stack-based exploitation
- Heap-based exploitation: A buffer overflow occurring in the heap data area is referred to as a heap overflow.
- Barriers to exploitation: Manipulation of the buffer, which occurs before it is read or executed, may lead to the failure of an exploitation attempt. These manipulations can mitigate the threat of exploitation, but may not make it impossible.
- Cross-site scripting (XSS) is a type of security vulnerability, typically found in web applications.
- XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users.
- A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
- XSS effects vary in range from a petty nuisance to a significant security risk, depending on the sensitivity of the data handled by the vulnerable site.
- Cross-site scripting attacks use known vulnerabilities in web-based applications, their servers, or the plug-in systems on which they rely.
- Exploiting one of these, attackers fold malicious content into the content being delivered from the compromised site.
- The number of susceptible (S)
- The number of infectious (I)
- The number of recovered individuals (R)

- An Email-Worm (also known as a mass-mailer or less commonly, an Internet worm) is a type of worm that distributes copies of itself in infectious executable files attached to fake email messages.
- Email-Worm typically arrives as executable files attached to fake email messages.
- P2P Worms spread via peer-to-peer file-sharing networks (such as Kazaa, EDonkey, FastTrack, etc.).
- Most of these worms work in a relatively simple way, to get onto a P2P network, all the worm has to do is, copy itself to the file-sharing directory, which is usually on a local machine.
- The P2P network does the rest, when a file search is conducted, it informs remote users of the file and provides services making it possible to download the file from the infected computer.
- The only efficient way to detect SQL Injections is by using a vulnerability scanner, often called a DAST tool (dynamic application security testing).
- Input validation - The validation process is aimed at verifying whether or not the type of input submitted by a user is allowed. Input validation makes sure it is the accepted type, length, format, etc. Only the value which passes the validation can be processed.
- Parametrized queries - Parameterized queries are a means of pre-compiling a SQL statement so that you can then supply the parameters in order for the statement to be executed. This method makes it possible for the database to recognize the code and distinguish it from input data.
- Escaping - Always use character-escaping functions for user-supplied input provided by each database management system (DBMS). This is done to make sure the DBMS never confuses it with the SQL statement provided by the developer.
b) Name any worm that exploited buffer overflow vulnerability. Explain its characteristics.
- It often uses a computer network to spread itself, relying on security failures on the target computer to access it.
- It will use this machine as a host to scan and infect other computers.
- Computer worms use a recursive method to copy themselves without host programs and distribute themselves and then controlling and infecting more and more computers in a short time.
- Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
- In link-level security, a device starts security procedures before any physical link is established.
- In this mode, authentication and encryption are used for all connections to and from the device.
- The authentication and encryption processes use a separate secret link key that is shared by paired devices, once the pairing has been established.
- The link key is generated for the first time when two devices communicate.
- Two devices communicating for the first time will go through an initialization phase, they will be “associated” at that point.
- The link key generation begins when the user enters identical PINs into both devices, which the devices use to generate their secret link keys.
- One of Bluetooth's security strengths is that in subsequent communications between devices, the link key is never transmitted outside of the device.
- The link key is simply used in cryptographic algorithms to generate matching sequences.
- XML is a markup language. With a markup language, we can structure a document using tags, using XML, we can customize the tags also.
- Each bit of information in a document is defined by tags without the overload of formatting present in HTML.
- This type of representation is suitable for application-to-application communication.
- Another feature of XML is that the vocabulary can be extended. Vocabulary refers to the types of tags used to structure a document in XML.
- XML supports multichannel portal applications
- The Simple Object Access Protocol is a standard protocol that provides a definition for XML-based information exchange by means of XML messages.
- SOAP provides a paradigm for allowing different programs, running in different or the same operative system to communicate with each other using a transport protocol (mainly HTTP) and XML based structures.
- SOAP is a lightweight protocol that provides a message exchange pattern for structured information in a decentralized, distributed environment; it defines an extensible messaging framework based on XML to provide a message construct (SOAP messages) which can be exchanged over different underlying protocols. This framework is independent of any programming model and other implementation semantics.
SOAP Message Structure
The following block depicts the general structure of a SOAP message −
<?xml version = "1.0"?>
<SOAP-ENV:Envelope xmlns:SOAP-ENV = "http://www.w3.org/2001/12/soap-
envelope"
SOAP-ENV:encodingStyle = "http://www.w3.org/2001/12/soap-encoding">
<SOAP-ENV:Header>
...
...
</SOAP-ENV:Header>
<SOAP-ENV:Body>
...
...
<SOAP-ENV:Fault>
...
...
</SOAP-ENV:Fault>
...
</SOAP-ENV:Body>
</SOAP_ENV:Envelope>
Tuesday, December 15, 2020
Introduction: Overview of computer security
Introduction: Overview of computer security
CIA Triangle (Triad)
Confidentiality
- Confidentiality is roughly equivalent to privacy, that means that only the authorized individuals/systems can view sensitive or classified information.
- The data being sent over the network should not be accessed by unauthorized individuals.
- The attacker may try to capture the data using different tools available and gain access to your information.
- Data encryption is a common method of ensuring confidentiality.
- Another way to protect your data is through a VPN tunnel. VPN stands for Virtual Private Network and helps the data to move securely over the network.
Integrity
- Integrity is protecting information from being modified by unauthorized parties.
- The ability to ensure that data is an accurate and unchanged representation of the original secure information, Well, the idea here is making sure that data has not been modified.
- Corruption of data is a failure to maintain data integrity. Corruption can occur when information is being compiled, stored, or transmitted.
- To check if our data has been modified or not, we make use of a hash function such as SHA (Secure Hash Algorithm) and MD5(Message Direct 5).
Availability
- Availability of information refers to, ensuring that authorized users are able to access the information when needed.
- This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly.
- Information can be erased or become inaccessible, resulting in “loss of availability.”
- Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system, essentially forcing it to shut down.
To make information available to those who need it and who can be trusted with it, organizations use authentication and authorization.
Challenges of Computer Security
- Computer security is not as simple as it might first appear to the novice. But the mechanisms used to meet the requirements such as confidentiality, integrity, and availability can be quite complex, and understanding them may involve rather a subtle reasoning (mental keenness).
- Potential attacks on developing a particular security mechanism or algorithm's security features.
- The procedures used to provide particular services are often counterintuitive (does not happen in the way you would expect it to)
- It is necessary to decide where to use the various security mechanisms in terms of physical placement (e.g., at what points in a network are certain security mechanisms needed) & in a logical sense (e.g., at what layer or layers of architecture such as TCP/IP should mechanisms be placed)
- Security requires regular, even constant, monitoring, and this is difficult in today’s short-term, overloaded environment.
Components of Information System
Need for Information Security
Protecting the functionality of the organization
- Implementing information security in an organization can protect the technology and information assets, by preventing, detecting, and responding to threats.
- The decision-maker in organizations must set policy and operates their organization in keeping with the complex, efficient, and capable applications.
Enabling the safe operation of applications
- The modern organization needs to create an environment that safeguards the application, particularly those application that serves as important elements of the infrastructure of the organization.
Protecting the data that the organization collect & use
- Data in the organization can be in two forms that are either in rest or in motion, the motion of data signifies that data is currently used or processed by the system.
- The attacker may try to corrupt the data values which affects the integrity of the data.
Safeguarding technology assets in organisations
- The organization must add secure infrastructure services based on the size & scope of the organization.
- Additional security services may be needed as the organization expands.
NSTISSC SECURITY MODEL
Access Control Mechanisms in information Security
Access Control
- It is the security term used to refer to a set of policies for restricting access to information and resources in computing environments.
- It is a fundamental concept in security that minimizes risk of unauthorized access to physical and logical systems.
- Access control systems perform identification authentication and authorization of users& entities by evaluating required credentials.

Access Control Elements
- Subject- Here A is the subject, i.e source (e.g. users, processes)
- Object- Here B is the Object, i.e resource (e.g. files, printers)
Types of Access Control
- Mandatory access control (MAC)
- Discretionary access control (DAC)
- Role-based access control (RBAC)
![]() |
Picture from cloud audit controls |