Monday, May 20, 2019

PHP Remote File Include (RFI) Essay

1. What is a PHP Remote File embroil (RFI) attack, and wherefore be these prevalent in todays Internet world? a. A Remote File Include allows an aggressor to admit a remote accuse. This vulnerability is most often found on websites and is usually implemented finished a script on the web server. 2. What country is the top host of SQL Injection and SQL Slammer transmittance? Why cant the US Government do eitherthing to prevent these injection attacks and infections? a. Peru.3. What does it mean to get to a policy of Nondisclosure in an composition? a. It means that certain information cant be made public under the companys policy. 4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab? a. Swifi, Interrupdate, Fostrem, Kuaiput, Mibling, Pilleuz, Ergrun, Bredolab, Changeup, Induc 5. What is Phishing? Describe what a typical Phishing attack attempts to accomplish. a. Stealing online account information by posing as a legitimate company. 6. What is the Zero Day Initiative? Do you think this is valuable, and would you infix if you were the managing partner in a large firm? a. A program to reward pledge researchers for disclosing vulnerabilities. Yes. 7. What is a Server Side Include (SSI)? What are the ramifications if an SSI exploit is successful? a. A Server Side Include is a process of adding content to an existing HTML page. 8. According to the TippingPoint Report researched in this lab how do SMB attacks measure up to HTTP attacks in the recent past?a. There was almost a 60% turn from a SMB type attack, towards an HTTP-based attack. In addition, nearly 100% of the observed attacks are automated, botnet, or worm-based attacks. 9. According to the TippingPoint Report, what are some of the PHP RFI payload effects DVLabs has detected this year? a. PHP Remote wedge-include attacks saw a steady boilersuit downward trend, except for a massive spike in mid-year of 2010. 10. Explain the steps it t akes to execute a Malicious PDF Attack as described in the Tipping Point Report? a. whole step 1 The aggressor begins by using powerful free attack software to create a malicious PDF file that contains exploitation code. If this file is opened on a dupe computer with unpatched PDF reader software, this code lead execute commands of the attackers choosing. b. Step 2 The attacker loads the malicious PDF file 2 a third-party website. The attacker then loads the malicious PDF file on a publicly handywebsite.c. STEP 3 The attacker now sends electronic mail to high-profile individual in the target institution, including corporate officers. This cognitive content contains a hyperlink to the attackers malicious PDF file on the external Web server. The e-mail depicted object is finely tuned to each target individual with a focused effort to get the recipient to dog on the link some other trusted site. The attacker does not include the malicious PDF file as an e-mail attachment, beca use such attacks are to a greater extent likely to be blocked by e-mail filters, anti-virus software, and other defenses of the target musical arrangement. d. Step4 The victim inside the targeted organization reads the e-mail, pulling down the attackers cognitive content with the link to the malicious PDF. The user reads the e-mail and clicks on the link. e. Step5 When the user on the victim machine clicks on the link in the e-mail message, the victims computer automatically launches a browser to puzzle the malicious PDF file. When the file arrives at the victim computer, the browser automatically invokes the PDF reader program to process and disclose the malicious PDF file.f. Step6 When the PDF reader software processes the malicious PDF file for display, exploit code from the file executes on the victim machine. This code causes the system to launch an interactive command shell the attacker can use to surmount the victim machine. The exploit code also causes the machine to ma ke an outbound connection back to the attacker through the enterprise firewall. Via this reverse shell connection, the attacker uses an outbound connection to gain inbound retard of the victim machine. g. Step 7 With shell access of the victim machine, the attacker scours the system looking at for sensitive files stored locally. After stealing some files from this first conquered system, the attacker looks for evidence of other nearby machines. In particular, the attacker focuses on identifying mounted file shares the user has connected to on a file server. h. Step 8 After identifying a file server, the attacker uses the command shell to access the server with the authentication of the victim user who clicked on the link to the malicious PDF. The attacker then analyzes the file server, looking for more files from the target organization.i. Step9 Finally, with access to the file server, the attacker extracts a significant number of sensitive documents, possibly including the organi zations trade secrets and business plans, Personally Identifiable Information about customers and employees, or other important data the attacker could use or sell. 11. Whatis a Zero Day attack and how does this relate to an organizations vulnerability window? a. A Zero Day attack is an attack that exploits a shelter vulnerability the same day it becomes public knowledge. This may cause an organization to have a enormous vulnerability window since it is still unfamiliar of how to mitigate the possible intrusion. 12. How can you mitigate the risk from users and employees from clicking on an imbedded URL link or e-mail attachment from unknown sources? a. Create an Internet Usage form _or_ system of government stating against such actions. Another alternative or addition can be to block e-mail websites.13. When auditing an organization for residency, what role does IT security policies and an IT security policy framework play in the compliance audit? a. The security used to protec t the company is changed and updated based on the policies that are in place. These policies must include any and all parts of compliance requirements based on the type of organization. 14. When performing a security assessment, why is it a good idea to examine compliance in separate compartments like the seven domains of a typical IT infrastructure? a. Its easier to manage the findings by each domain to minimize the chance of over-looking a compliance error. 15. True or False. Auditing for compliance and performing security assessments to achieve compliance requires a checklist of compliance requirements. a. True.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.