Attackers employ various techniques to exploit vulnerabilities and achieve their objectives. Some common methods include: •
Buffer overflow – Attackers send more data to a buffer than it can handle, causing it to overflow and overwrite adjacent memory, potentially allowing arbitrary code execution. •
SQL injection – Malicious
SQL code is inserted into input fields of web applications, enabling attackers to access or manipulate databases. •
Cross-site scripting (
XSS) – Attackers inject malicious scripts into web pages viewed by other users, potentially leading to session hijacking or data theft. •
Cross-site request forgery (
CSRF) – Attackers trick users into performing actions they did not intend, such as changing account settings, by exploiting the user's authenticated session.
Zero-click A zero-click attack is an exploit that requires no
user interaction to operate – that is to say, no key-presses or mouse clicks. These exploits are commonly the most sought after exploits (specifically on the underground exploit market) because the target typically has no way of knowing they have been compromised at the time of exploitation.
FORCEDENTRY, discovered in 2021, is an example of a zero-click attack. In 2022,
NSO Group was reportedly selling zero-click exploits to governments for breaking into individuals' phones. For mobile devices, the
National Security Agency (NSA) points out that timely updating of software and applications, avoiding public network connections, and turning the device Off and On at least once a week can mitigate the threat of zero-click attacks. Experts say that protection practices for traditional endpoints are also applicable to mobile devices. Many exploits exist only in
memory, not in files. Theoretically, restarting the device can wipe malware payloads from memory, forcing attackers back to the beginning of the exploit chain.
Pivoting Pivoting is a follow-on technique: After an exploit has compromised a system, access to other devices on the network can be gained, so the process repeats; i.e., additional vulnerabilities can be sought and attempts made to exploit those in turn. Pivoting is employed by both hackers and
penetration testers to expand their access within a target network. By compromising a system, attackers can leverage it as a platform to target other systems that are typically shielded from direct external access by
firewalls. Internal networks often contain a broader range of accessible machines compared to those exposed to the internet. For example, an attacker might compromise a web server on a corporate network and then utilize it to target other systems within the same network. This approach is often referred to as a multi-layered attack. Pivoting is also known as
island hopping. Pivoting can further be distinguished into
proxy pivoting and
VPN pivoting: • Proxy pivoting is the practice of channeling traffic through a compromised target using a proxy payload on the machine and launching attacks from the computer. This type of pivoting is restricted to certain
TCP and
UDP ports that are supported by the proxy. • VPN pivoting enables the attacker to create an encrypted layer to tunnel into the compromised machine to route any network traffic through that target machine, for example, to run a vulnerability scan on the internal network through the compromised machine, effectively giving the attacker full network access as if they were behind the firewall. Typically, the proxy or VPN applications enabling pivoting are executed on the target computer as the
payload of an exploit. Pivoting is usually done by infiltrating a part of a network infrastructure (as an example, a vulnerable printer or thermostat) and using a scanner to find other devices connected to attack them. By attacking a vulnerable piece of networking, an attacker could infect most or all of a network and gain complete control. ==See also==