Passive and Active attacks


What is Passive attacks

It is common knowledge that when using an untrusted network, such as Internet Café, your communication with the gateway (i.e. a router or access point) must always be treated as untrustworthy.  
The methods available for intercepting users' traffic using a Man-in-the-Middle attack in order to initiate a Passive attack have already been widely discussed.  
For instance, an attacker sets-up an access point with the same network name and MAC address as a genuine one. This gives the attacker complete control over the communication of everyone who mistakenly uses the rogue network instead of the genuine one. This attack is described in the book "Wireless Hacking: Breaking Through "ii. 
Although Passive attacks work well and constitute a serious risk when using a public network, users can protect themselves by following a few general security guidelines, such as:
1. Use SSL as much as possible:
• Avoid logging in to any non-SSL sites
• Make sure the site's SSL certificate is valid
2. If you must access a non-SSL site:
• Do not supply sensitive information: Credit Cards, usernames and passwords.
• Be aware that the integrity of the information you see on such a Web site might have been compromised
• Do not execute applications downloaded from the site
• Do not install software updates, ActiveX controls, browser extensions, etc.
Of course, some of the attack vectors are still valid even if these security guidelines are followed, but the attacker cannot cause much harm, since the user never surfs to any site that deals with sensitive information. 

What is Active attacks
In the Active attack scenario, a malevolent third party manipulates a response within a legitimate session in a way that tricks the client into issuing an unwanted request (unknown to the user) that discloses sensitive information. The attacker can then apply a regular Passive attack on this information. It is important to emphasize that this is made possible by a design flaw, not an implementation error or bug. 
We describe this type of attack as "active" rather than "passive" because of two essential differences in the nature of the attack:
• It is initiated by the attacker rather than the victim 
• The target is entirely controlled by the attacker, rather than being limited by the extent of the victim's browsing activity

Post a Comment

Type your comments Hear..
Not type
To send E-mail