Basics of Exploitation

Why exploitation

Risks of exploitation

Miscellaneous

Types of exploitation techniques

Most of the exploits fall under Service side exploit, client side exploit and local privilege escalation.

<aside> πŸ‘‰ Service Side Exploit

</aside>

A vulnerable service listening across the network is exploited by an attacker by sending some maliciously crafted packets with the capability to exploit it

<aside> πŸ‘‰ Client-side exploits

</aside>

Physical access attacks

Basics

Kon-boot

Lanturtle + Responder

We plug the Lanturtle to the system even when it's not logged in (hibernation state), and it opens up a new Ethernet interface and starts grabbing all the beacon packets with LLMNR to grab that authentication and can trick the system in authenticating to the Lanturtle and we can use Responder to capture those credentials.

LAN Turtle

Inception

https://github.com/carmaa/inception

Rubber Ducky / Bash Bunny

Duck ToolKit

Defence

BGP hijacking

What is it?

Mitigation

Attacks against DNS

DNS Spoofing

<aside> πŸ‘‰ Triggered Cache Poisoning (Eugene Kashpureff)

</aside>

Untitled

The mitigation for this attack was resolvers now started looking at the DNS response to check for information that had nothing to do with the query that was made, and such information was ignored.

<aside> πŸ‘‰ Message ID guessing and query prediction (Amit Klein)

</aside>

<aside> πŸ‘‰ Kaminsky NS Poisoning (Dan Kaminsky)

</aside>

<aside> πŸ‘‰ MITM

</aside>