SlideShare a Scribd company logo
What is an active attack?
An active attack is a network exploit in which a hacker attempts to make changes to data on the
target or data en route to the target.
There are several different types of active attacks. However, in all cases, the threat actor takes
some sort of action on the data in the system or the devices the data resides on. Attackers may
attempt to insert data into the system or change or control data that is already in the system.
Types of active attacks
What follows are some of the most common types of active attacks.
Masquerade attack
In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or
to gain greater privileges than they are authorized for. Masquerade attacks are conducted in
several different ways, including the following:
 using stolen login identifications (IDs) and passwords;
 finding security gaps in programs; and
 bypassing the authentication
An attempt may come from an employee inside an organization or from an outside threat actor
using a connection to the public network. Weak authentication can provide a point of entry for a
masquerade attack and make it easy for an attacker to gain entry. If attackers successfully receive
authorization and enter the network, depending on their privilege level, they may be able to
modify or delete the organization's data. Or they may make changes to network configuration and
routing information.
For example, an outside attacker can use spoofed Internet Protocol (IP) addresses to bypass the
victim's firewall and gain access from an unauthorized source. To do this, the attacker may use a
network sniffer to capture IP packets from the target machine. Another device is used to send a
message to the firewall with the forged IP address. The firewall then permits access to the
victim's machine.
In a
masquerade attack, the threat actor sends a message that appears to come from a legitimate
source.
Session hijacking attack
A session hijacking attack is also called a session replay attack. In it, the attacker takes advantage
of a vulnerability in a network or computer system and replays the session information of a
previously authorized system or user. The attacker steals an authorized user's session ID to get
that user's login information. The attacker can then use that information to impersonate the
authorized user.
A session hijacking attack commonly occurs over web applications and software that use cookies
for authentication. With the use of the session ID, the attacker can access any site and any data
that is available to the system or the user being impersonated.
In a
hijacking attack, the threat actor gets a copy of a message and resends it to the recipient who
is fooled into thinking it's coming from the original sender.
Message modification attack
In a message modification attack, an intruder alters packet header addresses to direct a message to
a different destination or to modify the data on a target machine. Message modification attacks
are commonly email-based attacks. The attacker takes advantage of security weaknesses in email
protocols to inject malicious content into the email message. The attacker may insert malicious
content into the message body or header fields.
With
a message modification attack, the threat actor intercepts a message, changes it and then
sends it on to the intended recipient.
DoS attack
In a denial-of-service (DoS) attack, the attackers overwhelm the victim's system, network or
website with network traffic, making it difficult for legitimate users to access those resources.
Two ways a DoS attack can occur include:
1. Flooding. The attacker floods the target computer with internet traffic to the point that the
traffic overwhelms the target system. The target system is unable to respond to any requests or
process any data, making it unavailable to legitimate users.
2. Malformed data. Rather than overloading a system with requests, an attacker may
strategically send data that a victim's system cannot handle. For example, a DoS attack could
corrupt system memory, manipulate fields in the network protocol packets or exploit servers.
Know
the four signs of a denial-of-service attack.
In a distributed DoS (DDoS) exploit, large numbers of compromised systems -- also referred to as
a botnet or zombie army -- attack a single target with a DoS attack. A DDoS uses multiple
devices and locations to launch requests and overwhelm a victim's system in the same way a DoS
attack does.
What are passive attacks?
Active attacks contrast with passive attacks, in which an unauthorized party monitors networks
and sometimes scans for open ports and vulnerabilities. Passive attackers aim to collect
information about the target; they don't steal or change data. However, passive attacks are often
part of the steps an attacker takes in preparation for an active attack.
Examples of passive attacks include:
 War driving. This is a wireless network reconnaissance method that involves driving or
walking around with a laptop computer and portable Wi-Fi-enabled wireless Ethernet card to
find unsecured wireless networks. Once found, these attackers use these networks to illegally
access computers and steal confidential information.
 Dumpster diving. This passive attack involves intruders searching for information on
discarded devices or for notes containing passwords in trash bins. For example, the attacker
can retrieve information from hard drives or other storage media that have not been properly
erased.
Ten
types of data that dumpster divers look for.
How to prevent an active attack
There are several ways to counter an active attack, including the following techniques:
 Firewalls and intrusion prevention systems (IPSes). Firewalls and IPSes are security
systems designed to block unauthorized access to a network. A firewall is part of the network
security infrastructure. It monitors all network traffic for suspicious activity and blocks any it
identifies. It also has a list of trusted senders and receivers. Similarly, an IPS monitors
network traffic for malicious activity and acts when an attack is detected.
 Random session keys. A session key is a temporary key created during a communication
session that is used to encrypt the data passed between two parties. Once the session ends, the
key is discarded. This provides security because the keys are only valid for a specific time
period, which means no one else can use them to access the data after the session has ended.
 One-time passwords (OTPs). These passwords are automatically generated numeric or
alphanumeric strings of characters that authenticate users. They are only valid for one use.
OTPs often are used in combination with a username and password to provide two-factor
authentication.
 Kerberos authentication protocol. This authentication protocol is a system for
authenticating users for network services based on trusted third parties. It was developed at
the Massachusetts Institute of Technology in the late 1980s. Kerberos authentication is a way
to prove to a network service that a user is who they say they are. It provides a single sign-
on service that enables users to use the same login credentials (username and password) to
access multiple applications.

More Related Content

PPTX
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
PPTX
typesofattacks-180418113629 255536155.pptx
PDF
typesofattacks-180418113629.pdf
PPTX
Types of attacks
PDF
Network Security & Attacks
PPTX
cyber-warfare.pptx
PPTX
Types of Cyber Security Attacks- Active & Passive Attak
PPTX
INS_CH-1INS_CH-1INS_CH-1INS_CH-1INS_CH-1.pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
typesofattacks-180418113629 255536155.pptx
typesofattacks-180418113629.pdf
Types of attacks
Network Security & Attacks
cyber-warfare.pptx
Types of Cyber Security Attacks- Active & Passive Attak
INS_CH-1INS_CH-1INS_CH-1INS_CH-1INS_CH-1.pptx

Similar to CNS unit -1.docx (20)

PPTX
Information Security Fundamentals - New Horizons Bulgaria
PPTX
Lec 2- Hardening and whitelisting of devices
PPTX
Computer security 7.pptx
PPTX
week#03 Lecture #02.pptx, computer scien
PPT
Ne Course Part Two
PPTX
INFO.pptx this is reagarding to the information system security and types of ...
PPT
SECURITY ATTACKS presentations for network security
PPTX
Information security ist lecture
PPTX
information security (network security methods)
PPTX
cryptography Threat - Attack presentation.pptx
PPTX
Unit-2 Network Security Concepts (1).pptx
PPT
Security Attacks.ppt
PPTX
CNS Module 1 in cryptography and network security
PDF
1 ijaems sept-2015-3-different attacks in the network a review
PDF
Chapter 2 konsep dasar keamanan
PPTX
Network security and cyber law (1).pptx
PPTX
Active and Passive Network Attacks
PPTX
Information system security Unit 1.pptx
PPTX
NIS1ppt (1).pptxhgfchgfhgfhgfgjdgfdhgdhgfehft
PPTX
OSI_Security_Architecture Computer Science.pptx
Information Security Fundamentals - New Horizons Bulgaria
Lec 2- Hardening and whitelisting of devices
Computer security 7.pptx
week#03 Lecture #02.pptx, computer scien
Ne Course Part Two
INFO.pptx this is reagarding to the information system security and types of ...
SECURITY ATTACKS presentations for network security
Information security ist lecture
information security (network security methods)
cryptography Threat - Attack presentation.pptx
Unit-2 Network Security Concepts (1).pptx
Security Attacks.ppt
CNS Module 1 in cryptography and network security
1 ijaems sept-2015-3-different attacks in the network a review
Chapter 2 konsep dasar keamanan
Network security and cyber law (1).pptx
Active and Passive Network Attacks
Information system security Unit 1.pptx
NIS1ppt (1).pptxhgfchgfhgfhgfgjdgfdhgdhgfehft
OSI_Security_Architecture Computer Science.pptx
Ad

More from Padamata Rameshbabu (9)

PDF
CD NOTErvvtvvevbvtgv4tgtgtgtgtvefeveS.pdf
PDF
Ch03-LexicalAnalysis in compiler design subject.pdf
PDF
05SyntaxAnalysis in compiler design notespdf
PPTX
Ch03-LexicalAnalysis chapter2 in compiler design.pptx
PPT
51114.-Compiler-Design-Syntax-Analysis-Top-down.ppt
PPTX
LexicalAnalysis chapter2 i n compiler design.pptx
PPT
51114.-Compiler-Design-Syntax-Analysis-Top-down.ppt
PDF
CNS2 unit 2.pdf
PDF
Http tutorial
CD NOTErvvtvvevbvtgv4tgtgtgtgtvefeveS.pdf
Ch03-LexicalAnalysis in compiler design subject.pdf
05SyntaxAnalysis in compiler design notespdf
Ch03-LexicalAnalysis chapter2 in compiler design.pptx
51114.-Compiler-Design-Syntax-Analysis-Top-down.ppt
LexicalAnalysis chapter2 i n compiler design.pptx
51114.-Compiler-Design-Syntax-Analysis-Top-down.ppt
CNS2 unit 2.pdf
Http tutorial
Ad

Recently uploaded (20)

PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
composite construction of structures.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Welding lecture in detail for understanding
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Construction Project Organization Group 2.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT
Project quality management in manufacturing
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
composite construction of structures.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Welding lecture in detail for understanding
OOP with Java - Java Introduction (Basics)
Operating System & Kernel Study Guide-1 - converted.pdf
bas. eng. economics group 4 presentation 1.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Construction Project Organization Group 2.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Project quality management in manufacturing

CNS unit -1.docx

  • 1. What is an active attack? An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. There are several different types of active attacks. However, in all cases, the threat actor takes some sort of action on the data in the system or the devices the data resides on. Attackers may attempt to insert data into the system or change or control data that is already in the system. Types of active attacks What follows are some of the most common types of active attacks. Masquerade attack In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. Masquerade attacks are conducted in several different ways, including the following:  using stolen login identifications (IDs) and passwords;  finding security gaps in programs; and  bypassing the authentication An attempt may come from an employee inside an organization or from an outside threat actor using a connection to the public network. Weak authentication can provide a point of entry for a masquerade attack and make it easy for an attacker to gain entry. If attackers successfully receive authorization and enter the network, depending on their privilege level, they may be able to modify or delete the organization's data. Or they may make changes to network configuration and routing information. For example, an outside attacker can use spoofed Internet Protocol (IP) addresses to bypass the victim's firewall and gain access from an unauthorized source. To do this, the attacker may use a network sniffer to capture IP packets from the target machine. Another device is used to send a message to the firewall with the forged IP address. The firewall then permits access to the victim's machine.
  • 2. In a masquerade attack, the threat actor sends a message that appears to come from a legitimate source. Session hijacking attack A session hijacking attack is also called a session replay attack. In it, the attacker takes advantage of a vulnerability in a network or computer system and replays the session information of a previously authorized system or user. The attacker steals an authorized user's session ID to get that user's login information. The attacker can then use that information to impersonate the authorized user. A session hijacking attack commonly occurs over web applications and software that use cookies for authentication. With the use of the session ID, the attacker can access any site and any data that is available to the system or the user being impersonated.
  • 3. In a hijacking attack, the threat actor gets a copy of a message and resends it to the recipient who is fooled into thinking it's coming from the original sender. Message modification attack In a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or to modify the data on a target machine. Message modification attacks are commonly email-based attacks. The attacker takes advantage of security weaknesses in email protocols to inject malicious content into the email message. The attacker may insert malicious content into the message body or header fields. With a message modification attack, the threat actor intercepts a message, changes it and then sends it on to the intended recipient. DoS attack
  • 4. In a denial-of-service (DoS) attack, the attackers overwhelm the victim's system, network or website with network traffic, making it difficult for legitimate users to access those resources. Two ways a DoS attack can occur include: 1. Flooding. The attacker floods the target computer with internet traffic to the point that the traffic overwhelms the target system. The target system is unable to respond to any requests or process any data, making it unavailable to legitimate users. 2. Malformed data. Rather than overloading a system with requests, an attacker may strategically send data that a victim's system cannot handle. For example, a DoS attack could corrupt system memory, manipulate fields in the network protocol packets or exploit servers. Know the four signs of a denial-of-service attack. In a distributed DoS (DDoS) exploit, large numbers of compromised systems -- also referred to as a botnet or zombie army -- attack a single target with a DoS attack. A DDoS uses multiple devices and locations to launch requests and overwhelm a victim's system in the same way a DoS attack does. What are passive attacks? Active attacks contrast with passive attacks, in which an unauthorized party monitors networks and sometimes scans for open ports and vulnerabilities. Passive attackers aim to collect information about the target; they don't steal or change data. However, passive attacks are often part of the steps an attacker takes in preparation for an active attack. Examples of passive attacks include:
  • 5.  War driving. This is a wireless network reconnaissance method that involves driving or walking around with a laptop computer and portable Wi-Fi-enabled wireless Ethernet card to find unsecured wireless networks. Once found, these attackers use these networks to illegally access computers and steal confidential information.  Dumpster diving. This passive attack involves intruders searching for information on discarded devices or for notes containing passwords in trash bins. For example, the attacker can retrieve information from hard drives or other storage media that have not been properly erased. Ten types of data that dumpster divers look for. How to prevent an active attack There are several ways to counter an active attack, including the following techniques:  Firewalls and intrusion prevention systems (IPSes). Firewalls and IPSes are security systems designed to block unauthorized access to a network. A firewall is part of the network security infrastructure. It monitors all network traffic for suspicious activity and blocks any it identifies. It also has a list of trusted senders and receivers. Similarly, an IPS monitors network traffic for malicious activity and acts when an attack is detected.  Random session keys. A session key is a temporary key created during a communication session that is used to encrypt the data passed between two parties. Once the session ends, the key is discarded. This provides security because the keys are only valid for a specific time period, which means no one else can use them to access the data after the session has ended.
  • 6.  One-time passwords (OTPs). These passwords are automatically generated numeric or alphanumeric strings of characters that authenticate users. They are only valid for one use. OTPs often are used in combination with a username and password to provide two-factor authentication.  Kerberos authentication protocol. This authentication protocol is a system for authenticating users for network services based on trusted third parties. It was developed at the Massachusetts Institute of Technology in the late 1980s. Kerberos authentication is a way to prove to a network service that a user is who they say they are. It provides a single sign- on service that enables users to use the same login credentials (username and password) to access multiple applications.