Another area for memorization in our stroll through this
introduction concerns the various types of attacks a hacker could attempt.
Most of these are fairly easy to identify and seem, at times, fairly silly
to even categorize. After all, do you care what the attack type is called if it
works for you? For this exam, EC-Council broadly defines all these attack types
in four categories.
• Operating system
(OS) attacks Generally speaking, these
attacks target the common mistake many people make when installing operating
systems—accepting and leaving all the defaults. Administrator accounts with no
passwords, all ports left open, and guest accounts (the list could go on
forever) are examples of settings the installer may forget about. Additionally,
operating systems are never released fully secure—they can’t be, if you ever plan
on releasing them within a timeframe of actual use—so the potential for an old vulnerability
in newly installed operating systems is always a plus for the ethical hacker.
• Application-level
attacks These are attacks on the actual
programming code and software logic of an application. Although most people are
cognizant of securing their OS and network, it’s amazing how often they
discount the applications running on their OS and network. Many applications on
a network aren’t tested for vulnerabilities as part of their creation and, as
such, have many vulnerabilities built into them. Applications on a network are
a gold mine for most hackers.
• Shrink-wrap code
attacks These attacks take advantage of
the built-in code and scripts most off-the-shelf applications come with. The
old refrain “Why reinvent the wheel?” is often used to describe this attack
type. Why spend time writing code to attack something when you can buy it
already “shrink-wrapped”? These scripts and code pieces are designed to make
installation and administration easier but can lead to vulnerabilities if not
managed appropriately.
• Misconfiguration
attacks These attacks take advantage of
systems that are, on purpose or by accident, not configured appropriately for
security. Remember the triangle earlier and the maxim “As security increases,
ease of use and functionality decrease”? This type of attack takes advantage of
the administrator who simply wants to make things as easy as possible for the
users. Perhaps to do so, the admin will leave security settings at the lowest possible
level, enable every service, and open all firewall ports. It’s easier for the
users but creates another gold mine for the hacker.