9

Click here to load reader

Access control attacks by nor liyana binti azman

Embed Size (px)

DESCRIPTION

Access control attacks

Citation preview

Page 1: Access control attacks by nor liyana binti azman

Nor Liyana Binti Azman

14th Mac 2014

Page 2: Access control attacks by nor liyana binti azman

Access Control Attacks Example Backdoor

method of bypassing normal authentication, securing illegal remote access to computer, while attempting to remain undetected.

sometimes programmer install a back door so that the program can be accessed for troubleshooting or other purposes

Backdoor is security risk, because there is another cracker try to find any vulnerability to exploit.

Example: Nimda gains through backdoor left by Code Red.

http://www.youtube.com/watch?v=7ZwGvFu9WhY

Page 3: Access control attacks by nor liyana binti azman

Spoofing Attacks

attacker pretends to be someone else in order gain access to restricted resources or steal information.

type of attack can take a variety of different forms; for instance, an attacker can impersonate the Internet Protocol (IP) address of a legitimate user in order to get into their accounts.

http://www.youtube.com/watch?v=z8ySsaRMcI8

Access Control Attacks Example

Page 4: Access control attacks by nor liyana binti azman

Spoofing Attacks

Page 5: Access control attacks by nor liyana binti azman

Man-In-The-Middle

the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection.

It is an attack on mutual authentication

http://www.youtube.com/watch?v=N86xJpna9Js

Access Control Attacks Example

Page 6: Access control attacks by nor liyana binti azman

Man-In-The-Middle

Page 7: Access control attacks by nor liyana binti azman

Replay

A form of network attack which a valid data transmission is maliciously repeated or delayed

Example: messages from an authorized user who is logging into a network may be captured by an attacker and resent (replayed) the next day

Video:

http://www.youtube.com/watch?v=kBCr-vYdgNo

Access Control Attacks Example

Page 8: Access control attacks by nor liyana binti azman

TCP hijacking

a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.

Session hijacking takes advantage of that practice by intruding in real time, during a session.

Video: http://www.youtube.com/watch?v=s_XD8heYNrc

Access Control Attacks Example

Page 9: Access control attacks by nor liyana binti azman

THANKS A LOT