1. Buffer AttacksBuffers are queue spaces which software uses as temporary storage before processing or transmission. Unfortunately, early programmers failed to protect them, and some still struggle with this. Which explains why buffer attacks are one of the most well-known attack vectors even today. There are two common buffer attacks:
- The buffer overflow, where a buffer is filled with data that is larger than its maximum size. This causes the software to crash or in some cases, initiate a reboot.
- Out-of-bounds read/writes, where reading and writing functions can take place outside of the buffer memory location. This can allow for unauthorized access and writing to other areas of the software, which can have unintended outcomes.
2. SQL InjectionIt is frustrating that with so many examples and high-profile exploits using this method that SQL Injection still remains a common problem. Both incredibly easy to perform and understand, database scripts known as SQL are placed into input fields and URLs. These scripts are then executed on the underlying database. The results of this can be as severe as providing full administrative access to the database or changing the contents. SQL injection can be prevented with input field cleaning functions in the code of the application or software in question.
3. Cross-Site ScriptingIn a similar breath to SQL injection attacks, cross-site scripting, also known as XSS, uses an injection mechanism to implant code into a website. The intended result is that the page or site is modified from its original to contain malicious content. Common uses are implanting fields into websites to collect banking information from customers, adding crypto-mining scripts to sites and prompting visitors to download files that contain malware or ransomware. SANS rate XSS as “one of the most prevalent, obstinate and dangerous vulnerabilities in web applications.”
4. Unprotected APIsProbably the fastest growing exploit in today’s world is the gaining of access or sensitive information through unprotected APIs. APIs are very popular for automation and integration between systems and networks; however, they are often poorly understood and therefore improperly set up. There have been numerous high-profile breaches which have been traced back to insecure APIs that provide a level of access you would never dream of providing through a traditional GUI. For example, access without even a basic level of authentication.
5. Third-Party LibrariesChances are that you have read about a breach that involved a spiked third-party library, sometimes known as supply-chain attacks. Third-party libraries and frameworks are very popular with software developers as they save a lot of time in not having to re-invent the wheel. However, the reliance on something which you have not created could mean introducing vulnerabilities into the software of which you are unaware. An example of such a vulnerability is a regular issue found in Oracle’s JRE, a Java-based execution environment used by hundreds of thousands of pieces of software.
6. Directory TraversalWhen things function, people often forget to tie up the loose ends. This is something I have witnessed in my career very frequently. Such vulnerabilities allow an unauthorised party to move between directories on a server or even between servers/devices in your network just by modifying a URL or a connection string. Software running with accounts that have high-level privileges will often receive no resistance. In some cases, it can be as easy as inserting a backslash into a cookie request script to gain access to another directory.
The Best Way to Find and Attack VulnerabilitiesWith over 1,300 vulnerabilities reported in 10 applications this year alone, it can be a tough task to keep up-to-date with developments and to keep your attack surface manageable. The recommendation for any IT team is to use a software package or solution which is specifically designed to seek out such exploitable vulnerabilities around your network on a pre-determined and repeated schedule. A great example of such a solution is Tripwire’s IP360, a well-recognized and highly reputable solution which will take all the work away from you by simply providing you with a regular report of vulnerabilities that exist, what risk they pose and how to correct them. That has to be the closest we will ever get to a world where we can not worry too much about vulnerabilities in our networks.
About the Author: Infinigate was founded in 1996 as the first distributor of internet technology solutions in Europe. Since 2002, Infinigate’s sole focus has been on the distribution of innovative cybersecurity solutions to protect systems, data and applications across hybrid networks and modern distributed workforces. As a true Value-Added Distributor, Infinigate offers a full range of technical and business services which are made available to partners through the Infinigate 3xC’s partner success programme, a unique best practice engagement methodology. Through Infinigate, partners are able to leverage innovative technology and 17+ years of cybersecurity and partnering expertise to enable them to solve today’s complex cybersecurity challenges. Following recent acquisitions, the Infinigate Group today has operations in 10 European countries including Germany, France, Switzerland, Austria, Sweden, Norway, Denmark, Finland, Benelux and the United Kingdom. It covers 80% of the Western European IT Market and it is recognised as an industry leader across Europe. Find out more: www.infinigate.co.uk. Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc or the company for which he works.