Attacks and Remediations

Attacks and Remediations

A list of the Attacks and their respective Remediations / Defences we'll tackle in the blog articles until the end of this year (Yey!)

By handling potential online threats, we arm ourselves to make smarter choices, spot sketchy stuff, and know how to react when things don't feel right.

Categories of Attacks

  1. Access-Control-Attack

    (e.g., IDOR, Privilege Escalation)

    Description: Attacks that exploit flaws in access control mechanisms, allowing attackers to gain unauthorized access to resources or perform actions they should not be able to. These attacks often arise from poor implementation of access control policies.

    Examples:

    • Insecure Direct Object References (IDOR) (accessing resources by manipulating request parameters).
    • Privilege Escalation (gaining higher privileges by exploiting system vulnerabilities).
  1. API-Security

    (e.g., API Misconfiguration, Rate Limiting Bypass)

    Description: Attacks that exploit vulnerabilities in APIs (Application Programming Interfaces), such as improper authentication, lack of rate limiting, or exposure of sensitive endpoints. APIs are often targeted due to their direct access to backend services.

    Examples:

    • API Misconfiguration (exposing administrative functions publicly).
    • Rate Limiting Bypass (sending too many requests to overwhelm or exploit an API).
  1. Authentication-and-Session-Attack

    (e.g., Broken Authentication, Brute Force)

    Description: Attacks that exploit weaknesses in authentication mechanisms or session management to gain unauthorized access to systems or hijack user sessions. This includes exploiting weak passwords, poor session handling, or insecure authentication protocols.

    Examples:

    • Brute Force Attacks (guessing passwords through repeated attempts).
    • Session Hijacking (stealing session tokens to impersonate a user).
  1. Cloud-Specific-Vulnerability

    (e.g., IAM Misconfigurations, Insecure Serverless Functions)

    Description: Attacks that target vulnerabilities specific to cloud environments, such as misconfigured identity and access management (IAM) policies, insecure serverless functions, or poorly protected virtual private clouds (VPCs).

    Examples:

    • IAM Misconfigurations (over-permissioned roles leading to unauthorized access).
    • Insecure Serverless Functions (exposing cloud functions to unauthorized execution).
  1. Code-Execution-Attack

    (e.g., Remote Code Execution, Insecure Deserialization)

    Description: Attacks where an attacker can execute arbitrary code on a vulnerable system, either locally or remotely. These attacks often lead to full system compromise and are considered highly severe. Examples:

    • Remote Code Execution (RCE) (executing commands on a remote server).
    • Insecure Deserialization (executing code by tampering with serialized data).
  1. Configuration-Based-Attack

    (e.g., Security Misconfiguration, Open Redirects)

    Description: Attacks that exploit weaknesses in system configurations, including open redirects or improper security settings that are left exposed, take advantage of misconfigured security policies or parameters.

    Examples:

    • Open Redirects (redirecting users to malicious sites).
    • Security Misconfiguration (allowing access to sensitive configuration files).
  1. Container-Orchestration-Security

    (e.g., Kubernetes Misconfigurations, Insecure Container Registries)

    Description: Attacks that target container orchestration platforms, such as Kubernetes or Docker Swarm, by exploiting misconfigurations or insecure practices in managing containers and workloads.

    Examples:

    • Kubernetes Misconfigurations (exposing unauthenticated dashboards).
    • Insecure Container Registries (storing unverified or vulnerable images).
  1. Cryptographic-Attack

    (e.g., Padding Oracle Attack, Advanced Cryptanalysis Techniques)

    Description: Attacks targeting the cryptographic algorithms or their implementation are aimed at breaking encryption schemes, decrypting sensitive data, or bypassing encryption-based security mechanisms.

    Examples:

    • Padding Oracle Attack (exploiting padding errors in block cyphers).
    • Advanced Cryptanalysis (using statistical methods to break encryption algorithms).
  1. DevOps-Security

    (e.g., CI/CD Pipeline Attack, Insecure Code Repositories)

    Description: Attacks targeting the DevOps lifecycle, including vulnerabilities in continuous integration/continuous deployment (CI/CD) pipelines, insecure code repositories, or compromised build systems. These attacks focus on gaining control over the software development and deployment process.

    Examples:

    • CI/CD Pipeline Attacks (injecting malicious code into the build process).
    • Insecure Code Repositories (leaking sensitive information through version control systems like GitHub).
  1. File-Based-Attack

    (e.g., Directory Traversal, Insecure File Upload)

    Description: Attacks that exploit vulnerabilities in how a system handles file access or uploads, allowing attackers to upload malicious files or read/write unauthorized files on the server.

    Examples:

  • Directory Traversal (accessing restricted files by manipulating file paths).
  • Insecure File Upload (uploading files that contain malicious code).
  1. Input-Based-Attack

    (e.g., SQL Injection, XSS, CSRF)

    Description: Attacks where the attacker manipulates user inputs that are insufficiently validated by the system, leading to unauthorized access or execution of malicious commands. These attacks exploit input fields such as forms, URL parameters, or headers.

    Examples:

  • SQL Injection (injecting SQL code into a query to manipulate a database).
  • Cross-Site Scripting (XSS) (injecting malicious scripts into web pages).
  • Cross-Site Request Forgery (CSRF) (tricking users into performing actions they didn’t intend).
  1. Microservices-Security

    (e.g., Service-to-Service Authentication, Insecure Service Discovery)

    Description: Attacks targeting microservice architectures, particularly focusing on weak or insecure communication between services, service discovery mechanisms, or insecure authentication practices within the microservices ecosystem.

    Examples:

  • Insecure Service Discovery (exposing service discovery endpoints to attackers).
  • Service-to-Service Authentication Bypass (exploiting trust relationships between services).
  1. Misconfiguration-Attack

    (e.g., Security Misconfiguration, Insecure Deserialization)

    Description: Attacks that exploit improperly configured system components, such as leaving sensitive endpoints exposed, using default credentials, or enabling insecure features by default, these attacks take advantage of weak or missing security controls in the configuration.

    Examples:

  • Security Misconfiguration (leaving default passwords unchanged).
  • Insecure Deserialization (allowing the deserialization of untrusted data).
  1. Network-Based-Attack

    (e.g., DDoS, SSRF)

    Description: Attacks that target network communication protocols and infrastructure, disrupting services or gaining unauthorized access to networked systems. These attacks often aim to exhaust resources, intercept data, or manipulate requests between systems.

    Examples:

  • Distributed Denial of Service (DDoS) (overwhelming a server with traffic).
  • Server-Side Request Forgery (SSRF) (tricking a server into making unauthorized requests to internal services).

The "70" List

See what articles are in and what is there to come

  1. SQL Injection (SQLi) | Article ↗
  2. Cross-Site Scripting (XSS) | Article ↗
  3. Cross-Site Request Forgery (CSRF) | Article ↗
  4. Directory Traversal | Article ↗
  5. Remote Code Execution (RCE) | Article ↗
  6. Insecure Direct Object References (IDOR) | Article ↗
  7. Denial of Service (DoS) / Distributed Denial of Service (DDoS) | Article ↗
  8. Insecure Deserialization | Article ↗
  9. Security Misconfiguration | Article ↗
  10. Password Attacks (Brute Force, Credential Stuffing) | Article ↗
  11. Broken Authentication and Session Management | Article ↗
  12. XML External Entity (XXE) | Article ↗
  13. Open Redirect | Article ↗
  14. Buffer Overflow | Article ↗
  15. Race Condition | Article ↗
  16. Privilege Escalation
  17. File Upload Vulnerability
  18. Insecure Cryptographic Storage
  19. Server-Side Request Forgery (SSRF)
  20. Insufficient Logging and Monitoring
  21. Insufficient Transport Layer Security (TLS)
  22. HTTP Parameter Pollution (HPP)
  23. Open Redirects (Unvalidated Redirects and Forwards)
  24. XML Injection
  25. LDAP Injection
  26. HTTP Response Splitting
  27. Command Injection
  28. Business Logic Vulnerability
  29. Session Fixation
  30. Sensitive Data Exposure
  31. Cross-Site WebSocket Hijacking
  32. Clickjacking
  33. Race Conditions in Distributed Systems
  34. Padding Oracle Attack
  35. Cache Poisoning
  36. Cross-Site Script Inclusion (XSSI)
  37. Cross-Site History Manipulation
  38. Server-Side Template Injection (SSTI)
  39. Cross-Origin Resource Sharing (CORS) Misconfiguration
  40. Race Condition in File Systems
  41. Elliptic Curve Cryptography (ECC) Attack
  42. Side-Channel Attack
  43. Padding Oracle Attack (Advanced Variant)
  44. Cloud Misconfiguration (S3 Bucket Exposure)
  45. API Misconfiguration
  46. Cloud Privilege Escalation (AWS IAM Role Misuse)
  47. API Rate Limiting Bypass
  48. API Key Leakage
  49. Server-Side Request Forgery (SSRF) in Cloud Services
  50. Microservices Communication Vulnerabilities
  51. Cryptanalysis Techniques (Chosen Ciphertext Attack)
  52. Cloud-Specific Vulnerability: GCP IAM Misconfigurations
  53. Container Vulnerabilities (Docker Privilege Escalation)
  54. Cloud-Specific Vulnerability: Azure Active Directory (AAD) Misconfigurations
  55. CI/CD Pipeline Vulnerabilities (Insecure Artifacts in Build Process)
  56. Secret Management Vulnerabilities (Exposed Secrets in Code Repositories)
  57. Insecure Docker Image Vulnerabilities
  58. Insecure API Gateway Configuration
  59. Improper Role-Based Access Control (RBAC) in Kubernetes
  60. Insecure Default Configurations in Cloud Environments
  61. Kubernetes Pod Security Policy (PSP) Misconfiguration
  62. Misconfigured Virtual Private Cloud (VPC) in AWS
  63. Insecure Serverless Function Configurations
  64. IAM Role Misconfigurations in AWS
  65. Differential Cryptanalysis
  66. Lattice-Based Cryptography Attacks
  67. Container Escape Vulnerability (Docker and Kubernetes)
  68. Insecure Kubernetes Network Policies
  69. Cloud-Specific Vulnerability: Misconfigured Google Cloud Functions
  70. Misconfigured AWS Lambda Permissions