Post #6 - Network Security

 



What is Ping

Ping is a command that uses ICMP (Internet Control Message Protocol) to communicate with other devices on a network that has an IP address and can communicate. The primary purpose is to be used as a troubleshooting tool; however, a malicious actor can abuse the capabilities of this tool to disrupt systems.

Ping Flood

The most common and least sophisticated attack is known as a “ping flood,” a type of Denial-of-Service attack. The objective is to send recurring ping or echo requests to a device from multiple sources, thus making the target device too busy to respond to legitimate traffic, similar to a Denial-of-service attack that requests legitimate responses from a device but overwhelms this device with the sheer number of simultaneous requests. Cloudflare.com, a content delivery network, and a DDoS mitigation company have an exciting and detailed description of this attack.

Ping of Death

Another attack is known as “Ping of Death,” which is also a Denial of Service attack that works a little differently than a ping flood; rather than sending an overwhelming number of legitimate commands, the Ping of death consists in creating an IP version 4 packet larger than its normal size of 65,535 bytes. When a system receives this packet, it attempts to process it and can freeze or crash. Legacy systems that have not been patched due to being out of support are most vulnerable to these attacks. Fortinet has a detailed article describing this type of attack; they are a cybersecurity solutions provider.

Both attacks are easily mitigated if the destination device disables ICMP echo replies, which can be done programmatically as a function that can be disabled or by blocking those replies with a firewall.

 

Security holes/vulnerabilities

CrowdStrike is a popular cybersecurity provider emphasizing endpoint security, threat intelligence, and cyberattack response. They define security holes or vulnerabilities as “a weakness in a host or system.” A vulnerability is a weakness an adversary or hacker can exploit to achieve their purposes. The most common type of vulnerabilities are errors or omissions in security configurations of systems. Security configurations require manual intervention from a knowledgeable staff; many do not know or understand how to configure security settings in hosts and cloud services. The second and third most prevalent types of vulnerabilities are derived from Unsecured Application Programming Interfaces (APIs) and systems with outdated and unpatched software.

Vulnerabilities can be significantly minimized by adhering to a regular patching schedule of systems. Microsoft has had a monthly cadence of vulnerability patches and software enhancements for many years, and other vendors provide the same. Implementing a good vulnerability scanning system that can reference published resources on remediation and information about the potential danger is necessary to improve organizations' security stance.

Social Engineering

Social Engineering is a fancy term for manipulating a trusting individual into divulging information that can be used against an organization in a Cyberattack or a physical breach. This type of attack is very low-tech because it fails to attempt to defeat security systems and other electronic defenses but rather exploits human interaction to bypass the roadblocks presented by technological countermeasures. Posing as a legitimate person seeking to do business with an organization or simply shoulder-surfing when someone has confidential information available on their laptop while at the coffee shop are some examples of social engineering.

To avoid the shoulder surfing case, privacy screen covers can be purchased and installed on laptops that prevent viewing the screen from any angle other than being directly in front of the screen. The human interaction factor can be mitigated by conducting regular education campaigns to help employees identify these potentially suspicious activities and only to volunteer information after verifying whether it is a legitimate request.

 

 References

Cloudflare, Inc. (2023). Ping (ICMP) flood DDoS attack. Cloudflare.com

Retrieved from: https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/

 

CroudStrike, Inc. (2023). Most Common Types of Cyber Vulnerabilities. Croudstrike.com

Retrieved from: https://www.crowdstrike.com/cybersecurity-101/types-of-cyber-vulnerabilities/

 

Fortinet, Inc. (2023). Ping of Death. Fortinet.com

Retrieved from: https://www.fortinet.com/resources/cyberglossary/ping-of-death

 

Norton, Inc. Emerging Threats. (2023). What is Social Engineering? A definition + techniques to watch for. Norton.com

Retrieved from: https://us.norton.com/blog/emerging-threats/what-is-social-engineering

Comments