Top 10 types of Cyber Attacks
Hello and
welcome guys to THEHACKINGERA, I am Dark Villain and I’m back again with
another interesting topic.
So, without
wasting much time let’s get started.
We all live in the world full of computers and we are having risk with a facility and in whole world an attack is attempted at every 39 seconds, so now you can think how insecure are you and your data.
So let’s try to know what are the most common types of cyber attack that are possible to be done with different users.
1.
2. Man-in-the-middle (MitM) attack
3. Phishing and spear phishing attack.
4. Drive-by attack
5. Password attack
6. SQL Injection Attack
7. Cross site attack (XSS)
8. Eavesdropping attack
9. Birthday attack
10. Malware Attack
1. Denial of service (Dos) and (DDOS)
distributed denial of service attack
A Denial of service overpowers a framework's assets with the goal that it can't react to support demands. A DDoS attack is additionally an attack on framework's assets, yet it is dispatched from an enormous number of other host machines that are contaminated by noxious programming constrained by the attacker.

Not at all like attacks that are intended to empower the attacker to acquire or expand access, forswearing of-administration doesn't give direct advantages to attackers. For some of them, it's sufficient to have the fulfillment of administration forswearing. Notwithstanding, assuming the attacked asset has a place with a business contender, the advantage to the attacker might be sufficiently genuine.
Another motivation behind a DoS attack can be to take a
framework disconnected with the goal that an alternate sort of attack can be
dispatched. One regular model is meeting seizing, which I'll portray later.
There are
various sorts of DoS and DDoS attacks; the most well-known are TCP SYN flood
attack, tear attack, smurf attack, ping-of-death attack and botnets.
TCP SYN
flood attack
In this
attack, an attacker abuses the utilization of the cushion space during a
Transmission Control Protocol (TCP) meeting introduction handshake. The
attacker's gadget floods the objective framework's little in-measure line with
association demands, yet it doesn't react when the objective framework answers
to those solicitations. This makes the objective framework break while sitting
tight for the reaction from the attacker's gadget, which makes the framework
crash or become unusable when the association line tops off.
There are a
couple of countermeasures to a TCP SYN flood attack:
Spot workers
behind a firewall arranged to stop inbound SYN bundles.
Increment
the size of the association line and decline the break on open associations.
Tear attack
This attack
causes the length and discontinuity balance fields in successive Internet
Protocol (IP) bundles to cover each other on the attacked have; the attacked
framework endeavors to recreate parcels during the interaction yet falls flat.
The objective framework at that point gets befuddled and crashes.
On the off
chance that clients don't have patches to secure against this DoS attack,
handicap SMBv2 and square ports 139 and 445.
Smurf
attack
This attack
includes utilizing IP ridiculing and the ICMP to soak an objective organization
with traffic. This attack technique utilizes ICMP reverberation demands focused
at broadcast IP addresses. These ICMP demands start from a parodied
"casualty" address. For example, if the expected casualty address is
10.0.0.10, the attacker would parody an ICMP reverberation demand from
10.0.0.10 to the transmission address 10.255.255.255. This solicitation would
go to all IPs in the reach, with every one of the reactions returning to
10.0.0.10, overpowering the organization. This interaction is repeatable, and
can be mechanized to produce colossal measures of organization clog.
To shield
your gadgets from this attack, you need to impair IP-coordinated transmissions
at the switches. This will forestall the ICMP reverberation broadcast demand at
the organization gadgets. Another choice is design the end frameworks to hold
them back from reacting to ICMP parcels from broadcast addresses.
Ping of
death attack
This sort
of attack utilizes IP parcels to 'ping an objective framework with an IP size
over the limit of 65,535 bytes. IP parcels of this size are not permitted, so
attacker pieces the IP bundle. When the objective framework reassembles the
bundle, it can encounter support floods and different accidents.
Ping of
death attacks can be hindered by utilizing a firewall that will check divided
IP parcels for most extreme size.
Botnets
Botnets are
the large numbers of frameworks contaminated with malware under programmer
control to complete DDoS attacks. These bots or zombie frameworks are utilized
to complete attacks against the objective frameworks, regularly overpowering
the objective framework's transfer speed and handling capacities. These DDoS
attacks are hard to follow on the grounds that botnets are situated in varying
geographic areas.
Botnets can
be relieved by:
RFC3704
sifting, which will deny traffic from satirize addresses and help guarantee
that traffic is recognizable to its right source organization. For instance,
RFC3704 separating will drop parcels from bogon list addresses.
Dark
opening sifting, which drops unwanted traffic before it enters an ensured
network. At the point when a DDoS attack is identified, the BGP (Border Gateway
Protocol) host ought to send directing updates to ISP switches with the goal
that they course all traffic making a beeline for casualty workers to a null0
interface at the following bounce.
Man-in-the-center
(MitM) attack
2. Mitm attack (Man in the middle)
A MitM
attack happens when a programmer embeds itself between the interchanges of a
customer and a worker. Here are some regular sorts of man-in-the-center
attacks:
Meeting
commandeering

In this
sort of MitM attack, an attacker commandeers a meeting between a confided in
customer and organization worker. The attacking PC substitutes its IP address
for the believed customer while the worker proceeds with the meeting, trusting
it is speaking with the customer. For example, the attack may unfurl this way:
A customer
associates with a worker.
The
attacker's PC oversees the customer.
The
attacker's PC disengages the customer from the worker.
The
attacker's PC replaces the customer's IP address with its own IP address and
parodies
the customer's arrangement numbers.
The
attacker's PC proceeds with exchange with the worker and the worker trusts it
is as yet speaking with the customer.
IP Spoofing
IP mocking is utilized by an attacker to persuade a framework that it is speaking with a known, confided in element and furnish the attacker with admittance to the framework. The attacker sends a bundle with the IP source address of a known, confided in have rather than its own IP source address to an objective host. The objective host may acknowledge the parcel and follow up on it.
Reply
A replay
attack happens when an attacker catches and saves old messages and afterward
attempts to send them later, mimicking one of the members. This sort can be
effortlessly countered with meeting timestamps or nonce (an arbitrary number or
a string that changes with time).
As of now,
there is no single innovation or setup to forestall all MitM attacks. For the
most part, encryption and advanced testaments give a compelling shield against
MitM attacks, guaranteeing both the privacy and respectability of correspondences.
In any case, a man-in-the-center attack can be infused into the center of
correspondences so that encryption won't help — for instance, attacker
"A" captures public key of individual "P" and substitute it
with his own public key. At that point, anybody needing to send a scrambled
message to P utilizing P's public key is accidentally utilizing A's public key.
Hence, A can peruse the message proposed for P and afterward send the message
to P, encoded in P's genuine public key, and P won't ever see that the message
was undermined. What's more, A could likewise alter the message prior to
resending it to P. As should be obvious, P is utilizing encryption and thinks
that his data is secured however it isn't, due to the MitM attack.
All in all,
how might you disclose sure that P's key has a place with P and not to A?
Testament specialists and hash capacities were made to take care of this issue.
At the point when individual 2 (P2) needs to make an impression on P, and P
needs to be certain that A won't peruse or alter the message and that the
message really came from P2, the accompanying technique should be utilized:
P2 makes a
symmetric key and encodes it with P's public key.
P2 sends
the encoded symmetric key to P.
P2 figures
a hash capacity of the message and carefully signs it.
P2 encodes
his message and the message's marked hash utilizing the symmetric key and sends
the whole thing to P.
P can get
the symmetric key from P2 on the grounds that lone he has the private key to
decode the encryption.
P, and no
one but P, can decode the evenly scrambled message and marked hash since he has
the symmetric key.
He can
confirm that the message has not been adjusted on the grounds that he can
process the hash of got message and contrast it and carefully marked one.
P is
likewise ready to demonstrate to himself that P2 was the sender on the grounds
that lone P2 can sign the hash so it is checked with P2 public key.
3. Phishing and spear phishing attacks
Phishing
attack is the practice of sending emails that appear to be from trusted sources
with the goal of gaining personal information or influencing users to do
something. It combines social engineering and technical trickery. It could
involve an attachment to an email that loads malware onto your computer. It
could also be a link to an illegitimate website that can trick you into
downloading malware or handing over your personal information.

Spear
phishing is a very targeted type of phishing activity. Attackers take the time
to conduct research into targets and create messages that are personal and
relevant. Because of this, spear phishing can be very hard to identify and even
harder to defend against. One of the simplest ways that a hacker can conduct a
spear phishing attack is email spoofing, which is when the information in the
“From” section of the email is falsified, making it appear as if it is coming
from someone you know, such as your management or your partner company. Another
technique that scammers use to add credibility to their story is website
cloning — they copy legitimate websites to fool you into entering personally
identifiable information (PII) or login credentials.
To
reduce the risk of being phished, you can use these techniques:
- Critical
thinking —
Do not accept that an email is the real deal just because you’re busy or
stressed or you have 150 other unread messages in your inbox. Stop for a
minute and analyze the email.
- Hovering
over the
links — Move your mouse over the link, but do
not click it! Just let your mouse cursor h over over the
link and see where would actually take you. Apply critical thinking to
decipher the URL.
- Analyzing
email headers —
Email headers define how an email got to your address. The “Reply-to” and
“Return-Path” parameters should lead to the same domain as is stated in
the email.
- Sandboxing — You can test email
content in a sandbox environment, logging activity from opening the
attachment or clicking the links inside the email.
4. Drive-by
attack
Drive-by
download attacks are a typical strategy for spreading malware. Programmers
search for uncertain sites and plant a malevolent content into HTTP or PHP code
on one of the pages. This content may introduce malware straightforwardly onto
the PC of somebody who visits the site, or it may re-direct the casualty to a
site constrained by the programmers. Drive-by downloads can happen when
visiting a site or review an email message or a spring up window. Dissimilar to
numerous different kinds of network safety attacks, a drive-by doesn't depend
on a client to successfully effectively empower the attack — you don't need to
click a download catch or open a malignant email connection to get tainted. A
drive-by download can exploit an application, working framework or internet
browser that contains security blemishes because of ineffective updates or
absence of updates.

To save yourself from drive-by attacks, you need to keep your programs and working
frameworks modern and maintain a strategic distance from sites that may contain
pernicious code. Adhere to the locales you ordinarily use — despite the fact
that remember that even these destinations can be hacked. Try not to keep an
excessive number of pointless projects and applications on your gadget. The
more modules you have, the more weaknesses there are that can be abused by
drive-by attacks.
5. Password
attack
Since
passwords are the most regularly utilized instrument to confirm clients to a
data framework, getting passwords is a typical and powerful attack approach.
Admittance to an individual's secret word can be gotten by checking out the
individual's work area, ''sniffing'' the association with the organization to
secure decoded passwords, utilizing social designing, accessing a secret key
data set or altogether speculating. The last methodology should be possible in
either an irregular or efficient way:
Savage
power secret key speculating implies utilizing an arbitrary methodology by
attempting various passwords and trusting that one work Some rationale can be
applied by attempting passwords identified with the individual's name, work
title, pastimes or comparative things.

In a word
reference attack, a word reference of regular passwords is utilized to endeavor
to access a client's PC and organization. One methodology is to duplicate an
encoded record that contains the passwords, apply similar encryption to a word
reference of generally utilized passwords, and think about the outcomes.
To shield
yourself from word reference or savage power attacks, you need to carry out a
record lockout strategy that will bolt the record after a couple of invalid
secret phrase endeavors. You can follow these record lockout best practices to
set it up accurately.
6. SQL
injection attack
SQL
injection has become a typical issue with information base driven sites. It
happens when a criminal executes a SQL inquiry to the data set through the
information from the customer to worker. SQL orders are embedded into information
plane contribution (for instance, rather than the login or secret key) to run
predefined SQL orders. A fruitful SQL injection adventure can peruse touchy
information from the data set, adjust (addition, refresh or erase) data set
information, execute organization activities (like closure) on the data set,
recuperate the substance of a given record, and, now and again, issue orders to
the working framework.
For
instance, a web structure on a site may demand a client's record name and
afterward send it to the data set to pull up the related record data utilizing
dynamic SQL like this:

"SELECT
* FROM clients WHERE account = '" + userProvidedAccountNumber
+"';"
While this
works for clients who are appropriately entering their record number, it leaves
an opening for attackers. For instance, in the event that somebody chose to
give a record number of "' or '1' = '1'", that would bring about a
question line of:
"SELECT
* FROM clients WHERE account = '' or '1' = '1';"
Since '1' =
'1' consistently assesses to TRUE, the information base will return the
information for all clients rather than simply a solitary client.
The
weakness to this sort of network protection attack relies upon the way that SQL
makes no genuine qualification between the control and information planes.
Thusly, SQL injections work generally if a site utilizes dynamic SQL. Moreover,
SQL injection is extremely basic with PHP and ASP applications because of the
pervasiveness of more seasoned practical interfaces. J2EE and ASP.NET applications
are more averse to have handily abused SQL injections in view of the idea of
the automatic interfaces accessible.
To shield
yourself from a SQL injection attacks, apply least0privilege model of
authorizations in your information bases. Stick to put away methodology (ensure
that these strategies do exclude any unique SQL) and arranged proclamations
(defined questions). The code that is executed against the data set should be
sufficiently able to forestall injection attacks. Moreover, approve input
information against a white rundown at the application level.
7. cross-site scripting (XSS) attack
XSS attacks
utilize outsider web assets to run contents in the casualty's internet browser
or scriptable application. In particular, the attacker infuses a payload with
vindictive JavaScript into a website's data set. At the point when the casualty
demands a page from the website, the website communicates the page, with the
attacker's payload as a component of the HTML body, to the casualty's program,
which executes the malignant content. For instance, it may send the casualty's
treat to the attacker's worker, and the attacker can remove it and use it for
meeting capturing. The most hazardous outcomes happen when XSS is utilized to
abuse extra weaknesses. These weaknesses can empower an attacker to take
treats, yet additionally log key strokes, catch screen captures, find and
gather network data, and distantly access and control the casualty's machine.
While XSS
can be exploited inside VBScript, ActiveX and Flash, the most broadly
manhandled is JavaScript — basically on the grounds that JavaScript is upheld
generally on the web.

To guard
against XSS attacks, designers can disinfect information contribution by
clients in a HTTP demand prior to reflecting it back. Ensure all information is
approved, separated or gotten away prior to repeating anything back to the
client, like the estimations of question boundaries during look. Convert
uncommon characters, for example, ?, and,/, <, > and spaces to their particular
HTML or URL encoded reciprocals. Give clients the choice to incapacitate
customer side contents.
8. Eavesdropping
attack
Eavesdropping
attacks happen through the block attempt of organization traffic. By
eavesdropping, an attacker can acquire passwords, Visa numbers and other
private data that a client may be sending preposterous. Eavesdropping can be
inactive or dynamic:
Latent
eavesdropping — A programmer distinguishes the data by tuning in to the message
transmission in the organization.

Dynamic
eavesdropping — A programmer effectively gets the data by camouflaging himself
as cordial unit and by sending inquiries to transmitters. This is called
testing, filtering or altering.
Identifying
latent eavesdropping attacks is regularly more significant than spotting
dynamic ones, since dynamic attacks requires the attacker to acquire
information on the agreeable units by leading inactive eavesdropping
previously.
Information
encryption is the best countermeasure for eavesdropping.
9. Birthday
attack
Birthday
attacks are made against hash calculations that are utilized to confirm the
uprightness of a message, programming or advanced mark. A message prepared by a
hash work delivers a message digest (MD) of fixed length, free of the length of
the information message; this MD extraordinarily describes the message. The
birthday attack alludes to the likelihood of discovering two irregular messages
that produce a similar MD when handled by a hash work. On the off chance that
an attacker computes same MD for his message as the client has, he can securely
supplant the client's message with his, and the recipient won't distinguish the
substitution regardless of whether he thinks about MDs.

10 Malware
attack
Pernicious
programming can be portrayed as undesirable programming that is introduced in
your framework without your assent. It can join itself to genuine code and
engender; it can prowl in helpful applications or reproduce itself across the
Internet. Here are the absolute most basic kinds of malware:
Large scale
infections — These infections contaminate applications like Microsoft Word or
Excel. Full scale infections append to an application's instatement succession.
At the point when the application is opened, the infection executes directions
prior to moving control to the application. The infection duplicates itself and
joins to other code in the PC framework.

Document
infectors — File infector infections generally join themselves to executable
code, for example, .exe records. The infection is introduced when the code is
stacked. Another adaptation of a record infector partners itself with a
document by making an infection record with a similar name, yet an .exe augmentation.
Along these lines, when the document is opened, the infection code will
execute.
Framework
or boot-record infectors — A boot-record infection appends to the expert boot
record on hard circles. At the point when the framework is begun, it will take
a gander at the boot area and burden the infection into memory, where it can
proliferate to different plates and PCs.

Polymorphic
infections — These infections cover themselves through differing patterns of
encryption and decoding. The scrambled infection and a related change motor are
at first unscrambled by a decoding program. The infection continues to
contaminate a zone of code. The transformation motor at that point builds up
another decoding normal and the infection scrambles the change motor and a
duplicate of the infection with a calculation comparing to the new unscrambling
schedule. The encoded bundle of transformation motor and infection is joined to
new code, and the interaction rehashes. Such infections are hard to identify
however have a significant degree of entropy on account of the numerous
adjustments of their source code. Hostile to infection programming or free
instruments like Process Hacker can utilize this element to recognize them.
Secrecy
infections — Stealth infections assume control over framework capacities to
hide themselves. They do this by bargaining malware recognition programming
with the goal that the product will report a contaminated territory as being
uninfected. These infections disguise any increment in the size of a
contaminated document or changes to the record's date and season of last
alteration.

Trojans — A
Trojan or a Trojan pony is a program that stows away in a helpful program and
typically has a vindictive capacity. A significant contrast among infections and
Trojans is that Trojans don't self-repeat. As well as dispatching attacks on a
framework, a Trojan can set up an indirect access that can be misused by
attackers. For instance, a Trojan can be modified to open a high-numbered port
so the programmer can utilize it to tune in and afterward play out an attack.

Post a Comment