En CCNAS v11 Ch01
En CCNAS v11 Ch01
Security Threats
• Spammer
– Individual that sends large quantities of
unsolicited email messages.
– Spammers often use viruses to take
control of home computers to send out
their bulk messages.
• Phisher
– Individual uses email or other means in an
attempt to trick others into providing
sensitive information, such as credit card
numbers or passwords.
• Wireless access
• Lack of awareness
• Propagation mechanism
– After gaining access to devices, a worm replicates and selects new targets.
• Payload
– Once the device is infected with a worm, the attacker has access to the host –
often as a privileged user.
– Attackers could use a local exploit to escalate their privilege level to
administrator.
• Penetrate phase:
– Exploit code is transferred to the vulnerable target.
– Goal is to get the target to execute the exploit code through an attack vector, such as a buffer overflow,
ActiveX or Common Gateway Interface (CGI) vulnerabilities, or an email virus.
• Persist phase:
– After the attack is successfully launched in the memory, the code tries to persist on the target system.
– Goal is to ensure that the attacker code is running and available to the attacker even if the system reboots.
– Achieved by modifying system files, making registry changes, and installing new code.
• Propagate phase:
– The attacker attempts to extend the attack to other targets by looking for vulnerable neighboring machines.
– Propagation vectors include emailing copies of the attack to other systems, uploading files to other systems
using file shares or FTP services, active web connections, and file transfers through Internet Relay Chat.
• Paralyze phase:
– Actual damage is done to the system.
– Files can be erased, systems can crash, information can be stolen, and distributed DDoS attacks can be
launched.
• Inoculation Phase:
– Runs parallel to or subsequent to the containment phase.
– All uninfected systems are patched with the appropriate vendor patch for the
vulnerability.
– The inoculation process further deprives( )بی بهره کردنthe worm of any
available targets.
• Treatment Phase:
– Actively infected systems are disinfected of the worm.
– Terminate the worm process, remove modified files or system settings that the
worm introduced, and patch the vulnerability the worm used to exploit the
system.
– In more severe cases, completely reinstalling the system to ensure that the
worm and its by products are removed.