Monday, July 22, 2024

Classifications of CEH Attack

Important Attack Classifications to Be Aware Of:

Passive Attacks:

  • Objective: Malicious actors gather information by inspecting network traffic.
  • Methods: Packet sniffing, network traffic analysis, decryption.
  • Characteristics:
    • Hard to detect.
    • Involves collecting clear-text passwords and other sensitive information.
    • Comparable to passive-aggressive behavior: subtle and not raising red flags.

Examples:

  • Packet Sniffing: Capturing data packets as they travel through a network.
  • Network Traffic Analysis: Examining the flow of data to gather information.
  • Decryption: Breaking encrypted data to access sensitive information.

Analogy:

  • Imagine a stalker observing you from a distance, noting down your routines and systems without direct interaction. They gather information such as business hours, system types, and operating systems, all without raising any alarms.

Technical Methods:

  • Network Sniffing and Traffic Analysis: Tools like Wireshark can be used to monitor network traffic. This can reveal clear-text passwords, names, dates, systems, IP addresses, and other sensitive data.
  • WiFi Decryption: Weak WiFi passwords can be cracked, allowing access to systems and data undetected.

Lets do abit of hands-on. Go to your browser and search  "Grayhatwarfare":

  • Public buckets in cloud technology, like AWS S3, can be scanned passively. This means attackers don't need to interact with the systems directly but can search for keywords or file extensions to find sensitive information. This method can reveal AWS keys or other critical data stored in public buckets. 
For example:
if I'm looking for keywords, give me a keyword. Like? Key and search. 

"Key".


As a free user, you should see 2,468 from the 8,200  Million, that's million files. In the index, and you can look down here and scroll. You can click on these EXTENSION. So there is tech key, this is a PNG.That's where the file extension thing would come in handy.

If that was your target, I could look for, obviously the premium edition is gonna allow you to target a whole lot easier as we hve kind of seen in there. The buckets are public, you're not breaking anything.

I like that because it just keeps us moving in and talking about things that are relevant to this and that is a very relevant thing, that this is a great way to gain passive information about your targets, like their AWS keys or other sensitive information that's in an AWS S3 bucket. Because that never happens, no one ever puts sensitive information in a public bucket.

These classifications and examples highlight the various motives behind cyber attacks and the subtle yet effective methods used to gather information and disrupt operations.

No comments:

Post a Comment

CONFIGURING A PHISHING CAMPAIGN IN MICROSOFT DEFENDER.

Configuring a phishing campaign in Microsoft Defender (specifically Microsoft Defender for Office 365) involves creating a simulated attack ...