cyberattacks

  1. What is cyberattacks?

  2. Model OSI. Typical cyberattacks.

  3. Session Layer. Attacks and methods of protection.

  4. Presentation Layer. Attacks and methods of protection.

  5. Application Layer. Attacks and methods of protection.

  6. Examples.

AGENDA

    A cyberattack is any malicious attempt to gain unauthorized access, disrupt, modify, destroy, or steal data or systems within a computer network using digital technology.

 

     It can be:

     Active: aimed at altering system resources or affecting their operation (e.g., DDoS, data modification).

     Passive: aimed at unauthorized eavesdropping or information gathering without altering resources (e.g., network traffic sniffing, port scanning).

cyberattacks

Model OSI. Typical cyberattacks

Physical

Data Link

Network

Transport

Session

Presentation

Application

SQL Injection, XSS (Cross-Site Scripting), Phishing, Code vulnerabilities, DDoS

Man-in-the-middle attacks (MITM), Data manipulation

Session Hijacking, Sockets port attacks, Improper session termination

SYN Flood, Port Scanning

IP Spoofing, Attacks on routing protocols, MITM

ARP Spoofing, MAC Spoofing, MAC Flooding

Eavesdropping, Sabotage, Signal Jamming

  •  Session Hijacking - stealing a user's session identifier (token) to gain unauthorized access to their active session. XSS attacks are used to steal session cookies.

 

  • Socket port attacks - attacker joining the connection and can send data that the server interprets as commands, leading to the execution of malicious code on the server). An attacker can intercept data.

 

 

Session Layer. Attacks.

  •  Secure Cookies - using cookie attributes such as Secure (for transmission only over HTTPS) and HttpOnly (to prevent access via JavaScript, protecting against XSS).

 

  • Session Tokens - use of long, randomly generated and unpredictable session identifiers to prevent session hijacking.

 

  • Session Time Limits - set reasonable session expiration times and force logout after a long period of inactivity.

 

 

Session Layer. methods of protection

This layer is protected through secure session management.

 

  • Man-in-the-middle (MITM) - is a type of cyberattack in which an attacker secretly inserts himself into the middle of a communication between two parties.

 

 

Presentation Layer. Attacks.

This level is protected through strong encryption.

Presentation Layer. methods of protection.

  • use cryptographic protocol the latest TLS (Transport Layer Security) versions and strong encryption algorithms.
  • using HSTS (HTTP Strict Transport Security)
  • using VPN
  • be careful with public Wi-Fi
  • Injection - injecting malicious data that is executed as commands or database queries: SQL Injection (SQLi), Command Injection, LDAP Injection.
  • XSS (Cross-Site Scripting) - injecting client-side scripts into web pages viewed by other users to steal sessions or data.
  • Broken Access Control - incorrect implementation of access rights, allowing a user to gain unauthorized access to data or functions (IDOR - Insecure Direct Object Reference).
  • Incorrect Security Configuration - Open configuration files, use of weak HTTP headers.
  • DDoS - destruction of a website or online service by overloading the target server, network resources, or software with a huge amount of traffic.

Application Layer. Attacks.

  • Input Validation - all user data must be validated, sanitized and/or shielded.
  • CSP (Content Security Policy) - it works as a "whitelist" of content sources that are allowed to load on a page.
  • Secure Coding - adhering to secure development standards (e.g. OWASP guidelines) to eliminate logical vulnerabilities and access control errors.
  • Web Application Firewall - inbound HTTP traffic filtering, blocking known attack patterns (such as XSS or SQLi) before they reach the application.
  • Authentication and Authorization - using multi-factor authentication (MFA) and strict verification of access rights on the server (Broken Access Control).
  • DDoS - Rate Limiting, Blackholing.

Application Layer. methods of protection.

Developer tools -> Validation

Examples

disabled, required, checked

XSS

Examples

XSS -> Frame

Examples

XSS

Examples

<scri<script type="text/javascript">pt>

document.write ('<table width="100%" border="1">');

for (i=1; i<6; i++)

{ document.writeln("<tr>"); for (j=1; j<6; j++) 

document.write("<td>" + i + j + "<\/td>"); document.writeln("<\/tr>"); }

document.write ("<\/table> ");
</scri</script>pt>

SQL injection

Examples

SELECT * FROM users WHERE email = '${email}';

r1pm@gmail.com'; DELETE FROM users; --

SELECT * FROM users WHERE email = 'r1pm@gmail.com'; DELETE FROM users; --';
SELECT * FROM users WHERE username = '${username}' AND password = '${password}';

' OR '1' = '1

SELECT * FROM users WHERE username = 'ruslan' AND password = '' OR '1' = '1';

SE/*comment*/LECT

SeLeCt

Fishing

Examples

Q/A

cyberattacks

By TenantCloud

cyberattacks

  • 24