Page 1495 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1495

Masquerading Attacks


               One of the easiest ways to gain access to resources you’re not
               otherwise entitled to use is to impersonate someone who does have the
               appropriate access permissions. In the offline world, teenagers often

               borrow the driver’s license of an older sibling to purchase alcohol, and
               the same type of thing happens in the computer security world.
               Attackers borrow the identities of legitimate users and systems to gain
               the trust of third parties. In the following sections, we’ll take a look at
               two common masquerading attacks—IP spoofing and session

               hijacking.


               IP Spoofing

               In an IP spoofing attack, the malicious individual simply reconfigures
               their system so that it has the IP address of a trusted system and then
               attempts to gain access to other external resources. This is surprisingly

               effective on many networks that don’t have adequate filters installed to
               prevent this type of traffic from occurring. System administrators
               should configure filters at the perimeter of each network to ensure that
               packets meet at least the following criteria:

                    Packets with internal source IP addresses don’t enter the network
                    from the outside.

                    Packets with external source IP addresses don’t exit the network
                    from the inside.


                    Packets with private IP addresses don’t pass through the router in
                    either direction (unless specifically allowed as part of an intranet
                    configuration).

               These three simple filtering rules can eliminate the vast majority of IP
               spoofing attacks and greatly enhance the security of a network.


               Session Hijacking


               Session hijacking attacks occur when a malicious individual intercepts
               part of the communication between an authorized user and a resource
   1490   1491   1492   1493   1494   1495   1496   1497   1498   1499   1500