www.sciencedirect.com
Open in
urlscan Pro
162.159.129.81
Public Scan
URL:
https://www.sciencedirect.com/topics/computer-science/information-leak
Submission: On September 30 via api from MX — Scanned from DE
Submission: On September 30 via api from MX — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to Main content ScienceDirect * Journals & Books * Help * SearchSearchSearch RegisterSign in INFORMATION LEAK RELATED TERMS: * Internet of Things * Side Channel Attack * Domain Name System * Side Channel * Virtual Machine * Reverse Lookup Zone View all TopicsNavigate Right PlusAdd to Mendeley DownloadDownload as PDF BellSet alert InfoAbout this page VULNERABILITY TYPES Russ Rogers, in Nessus Network Auditing (Second Edition), 2008 MEMORY DISCLOSURE One of the more common information leak vulnerability is memory disclosure. This problem occurs when a system forgets to clear a memory block before using it to construct a message that is sent to an untrusted party. Consider the memory block as a sheet of paper, and the message itself as the lead of a pencil. If the paper is not erased prior to a new message being written, any place on the paper that is not part of the new message could contain the contents of a previous message. The message in this case can be anything from an HTML page displayed by a web server to an ICMP packet on the network. Memory disclosure flaws have been discovered in everything from the Windows NetBIOS service to the network card drivers used across a wide range of operating systems. The actual impact of a memory disclosure vulnerability depends on what the affected system is doing and what the disclosed memory is used for. In some cases, this can result in a remote attacker being able to capture passwords to and from the affected system. For example, Linksys routers have a well-known vulnerability where they will respond to legitimate BOOTP requests with portions of the memory from their network cards in the payload (OSVDB ID TBD, CVE-2004-0580). Given enough packets, this can lead to an attacker being able to analyze the network traffic passing through the device. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B978159749208900006X RANDOM NUMBER GENERATION Tom St Denis, Simon Johnson, in Cryptography for Developers, 2007 BACKTRACKING ATTACKS A backtracking attack occurs when your output data leaks information about the internal state of the PRNG, to the point where an attacker can then step the state backward. The goal would be to find previous outputs. For example, if the PRNG is used to make an RSA key, figuring out the previous output gives the attacker the factors to the RSA key. As an example of the attack, suppose the PRNG was merely an LFSR. The output is a linear combination of the internal state. An attacker could solve for it and then proceed to retrieve any previous or future output of the PRNG. Even if the PRNG is well designed, learning the current state must not reveal the previous state. For example, consider our RNG construction in rng.c; if we removed the XOR near line 122 the state would not really change between invocations when being used as a PRNG. This means, if the attacker learns the state and we had not placed that XOR there, he could run it forward indefinitely and backward partially. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9781597491044500066 SYSTEM EXPLOITATION Aditya K Sood, Richard Enbody, in Targeted Cyber Attacks, 2014 4.4.4 DIGGING INSIDE INFO LEAK VULNERABILITIES Successful exploitation of vulnerabilities to attack DEP also requires presence of information leak vulnerabilities in order to bypass the ASLR. However, information leak vulnerabilities are also desired in other exploitation scenarios in addition to ASLR. The idea is to use the leaked address of base modules or kernel memory to map the memory contents (addresses) to be used by the exploits. In other words, info leak vulnerabilities are frequently used with ROP programming to exploit systems that use mitigations such as GS cookie, SEHOP, DEP, and ASLR. On the whole, Table 4.6 shows the different type of vulnerabilities that can be exploited to leak memory addresses [27]. Table 4.6. Info Leaking Vulnerabilities Description Info Leaking VulnerabilitiesDescriptionStack overflow—partial overwriteOverwriting target partially and returning an info leaking gadget to perform write operations on the heapHeap overflows—overwriting string.length field and final NULL [w]char• Reading the entire address space by overwriting the first few bytes of the string on the allocated heap • Reading string boundaries by overwriting the last character of [w]char on the allocated heap Heap massaging—overflowing the JS string and object placed after heap bufferType confusionReplacing the freed memory block with attacker controlled object of same sizeUser after free conversion (read and write operations, controlling pointers, on demand function pointers and vtables)Forcing pointer to reference the attacker generated fake objects and further controlling uninitialized variables.Use-after free conversion/application-specific vulnerabilitiesUtilizing use-after free scenarios to combine with application layer attacks such as Universal Cross-site Scripting (UXSS) View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9780128006047000048 PROTECTING YOURSELF FROM GOOGLE HACKERS Johnny Long, ... Justin Brown, in Google Hacking for Penetration Testers (Third Edition), 2016 GETTING HELP FROM GOOGLE So far we’ve looked at various ways of checking your site for potential information leaks, but what can you do if you detect such leaks? First and foremost, you should remove the offending content from your site. This may be a fairly involved process, but to do it right, you should always figure out the source of the leak, to ensure that similar leaks don’t happen in the future. Information leaks don’t just happen; they are the result of some event that occurred. Figure out the event, resolve it, and you can begin to stem the source of the problem. Solving the local problem is only half the battle. In some cases, Google has a cached copy of your information leak just waiting to be picked up by a Google hacker. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B978012802964000012X SIDE-CHANNEL ATTACKS Swarup Bhunia, Mark Tehranipoor, in Hardware Security, 2019 8.2.2 UNCOMMON SIDE-CHANNEL ATTACKS Besides the common ones described earlier, there are several other side-channel signals that can leak information about stored secrets in a hardware. These signals include emitted sound, temperature, and vibration. The analysis of these signals to extract secret information is not widely researched. One example of these uncommon SCAs is acoustic side-channel analysis [22]. It resembles the first reported SCA in 1965 in terms of the side-channel signal used in the attack [6]. The attack focuses on systems that produce sounds while being operated (such as, 3D printers), where program information can be extracted from the leaked acoustic signals. The captured sound signal is run through a series of signal processing and machine-learning stages that can accomplish reconstructing the operation and producing an output similar to that of the device under attack. Other uncommon side-channels, such as, temperature and vibration, can also leak a significant amount of critical information about the device under attack. In order to build secure systems, all forms of side-channels need to be considered as a valid threat to information leakage, and adequate countermeasures need to be incorporated. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9780128124772000137 RECON Jayson E. Street, ... Marcus Carey, in Dissecting the Hack, 2010 EXPLOITING THE COMPANY Even easier for the attacker than exploiting an employee is to just sit back and wait for the employee to leak information all over the Internet. This is becoming a common occurrence as employees take to the Internet to air their grievances with their employers or business partners. Confusing privacy controls on popular social networking sites like Facebook complicate the problem as many users are unaware that their private messages are actually being aired publicly for the entire world to see. Although many of the messages may seem innocent to the author, an attacker targeting their company can use information to form an idea on internal business matters. Consider the following messages: > Employee 1: “New exploit released for Windows Server… oh, this is going to > suck” > > Company Press Release: “We will have a scheduled downtime this weekend to > perform maintenance on our servers.” > > Employee 2: “Just got an email that I have to work through the weekend. So > much for my fishing trip!” Each of these messages, on its own, is just an innocent posting on the Internet. Companies take down their servers all of the time for regular maintenance. However, an attacker who is cyber-stalking employees of the company can put the pieces together to see that the company's servers are vulnerable to a newly released exploit and that they are waiting until the weekend to install patches. This is a process known as inference, and it is a common attack vector in the information security field simply because of the vast amounts of data being released on a regular basis. Posts made online can even come back to haunt an employee long after a security event has taken place. In early 2010, a civil action lawsuit was filed against a school district in Pennsylvania over the misuse of laptops distributed to its students.1 The laptops contained surveillance software that allowed the school system to turn on each camera at any time and take pictures from the user-facing webcam. This activity led to an incident in which a student was disciplined for allegedly using illegal drugs, later reported to be a box of Mike and Ike candy. Although the case itself is interesting in its own merits, of particular note here is the online persona of the school's network technician and his role in the situation. According to one independent researcher, the network technician maintains his own blog and has “a large online Web forum footprint,”2 meaning that he is easily found across many online discussion forums. The technician has made many public postings and interviews about his involvement with the laptop webcams. At the very least, the online information shows his fascination and passion for using the technology to spy on students and catch those performing illegal acts. The decision of who was right and wrong is still undecided in this case as of the time of this printing, but the amount of material publicly posted by a technician involved with the case has made the school's legal defense much harder to prove. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9781597495684000018 COMPUTER NETWORK EXPLOITATION Jason Andress, Steve Winterfeld, in Cyber Warfare (Second Edition), 2014 OPEN SOURCE INTELLIGENCE OSINT involves the use of methods that are designed to not alert a target to the fact that they are under observation. Many of the tools that we discussed in the reconnaissance tools section of Chapter 6 fall squarely into this category. Investigating Domain Name System (DNS) information, Google hacking, information gathered from websites, investigation of document metadata, and other similar methods can all be excellent means of executing OSINT operations, as long as they are careful to not expose their interests in the process of conducting them. In OSINT they will likely start with public information, then job-related information, then Google hacking, then DNS information, then metadata gathering, as shown in Figure 9.1. When conducting reconnaissance against a target the attacker will generally start with OSINT, and then move to passive. Sign in to download full-size image Figure 9.1. OSINT process. Primarily, when taking an OSINT approach to reconnaissance, an attacker will want to use information sources that do not leak information about our interests, or at least minimize such leakage. For instance, although they may use a public web-based whois query tool to conduct research against a target, the administrators of such an application may find it interesting that the IP address block of a known government contract organization had a suddenly high level of interest in the DNS information of systems related to the Chinese government. In such cases, it is often best to use a network masking technology such as The Onion Router (Tor) and to spread such queries out over many different sources. TIP Tor, which can be found at www.torproject.org, is a tool that provides network anonymization by routing the traffic from a client through a variety of intermediate systems and out through one of many possible endpoints. Although Tor does indeed provide some measure of protection against a target or application being able to trace back the source of the network traffic in question, there are several attacks and configuration issues, including endpoints set up specifically to sniff traffic, that may make it possible to do exactly this. To a certain extent, attackers can also use some network monitoring techniques for OSINT purposes. Although attackers are very limited in what they can do for sniffing on a wireless network when bound by the requirement of stealth, there are packet sniffing tools that are entirely passive in nature and are very difficult to detect without taking specific measures to do so. NOTE The battle between passive network sniffers and the systems that can pick them out is an ongoing one. As we note, if we put a passive sniffer on the network, it is difficult to detect, but we can do so with a properly configured Intrusion Detection System (IDS). We can also adjust our sniffers to avoid such IDSs, and tune our IDSs to ferret out such avoidance measures, and so on ad infinitum. There are also network sniffing tools that work through induction rather than direct interface with the network that are, in theory, truly impossible to detect without physically finding the inductive tap itself [2]. Even fiber optic cables, often considered to not be passively tappable, in fact are exactly that. Low cost devices are available to read the light leakage through the jacket of a fiber cable without actually needing to cut it to insert a tap [3]. Additionally, we can eavesdrop on wireless network traffic in relative safety, as long as we are careful not to interact with the network itself. Even encrypted wireless traffic can reveal information about the devices that are connecting to it and, based off names and Media Access Control (MAC) addresses of such devices, we can often infer quite a bit of information about the environment. A technique that we cannot discount in cyber warfare scenarios is that of passive physical observation, which is part of Human Intelligence, or HUMINT. Such techniques, as they generally require, at least at some point, the physical presence of an observer, do have the opportunity to alert the target in question that they are being watched, but when carried out carefully can be invaluable. Physical observations of traffic patterns at facilities, movement of vendors, arrival of equipment, and other similar factors can allow us to infer much about the goings on at our target location. We discussed this and some of the other intelligence gathering methods in more depth in Chapter 2. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B978012416672100009X VULNERABILITIES TO ADDRESS Ira Winkler, Araceli Treu Gomes, in Advanced Persistent Security, 2017 INFORMATION RELEASE PROCEDURES Too frequently, organizations are their own worst enemy. Through policy, process, happenstance, accident, or carelessness, organizations leak information that their threats would spend virtually unlimited resources to collect. These leaks can take many forms. From an espionage perspective, China sometimes sponsors conferences and similar events where it invites scientists leading research that is important to their efforts. It might invite the scientists to present their research and pushes them to include the more sensitive aspects of their work. Even if they do not, the Chinese intelligence services might invite the researchers out for social events, provide them with a lot of alcohol, and then will subtly drill them for the more sensitive aspects of their work. How the organization deals with the media is also a vulnerability. To curry favor with the media, organizations sometimes provide more information than they should. They might provide information on background. Poor media relations policies can result in people inside organizations providing information to media outlets in attempts to be helpful. Sometimes revenge can lead to major compromises of information. Such was the case with Valerie Plame. In this case, Plame's husband, Ambassador Joseph Wilson, was a critic of the Bush administration policies, and in retaliation, Richard Armitage, a deputy secretary of state provided a reporter with information that Plame was an undercover CIA operative. This resulted in a massive compromise of CIA covert operations. Intelligence agencies from around the world, where Plame was stationed and visited, could then identify front companies and potentially other undercover operatives and people providing information to Plame and others. For example, if Plame worked for an organization, it was likely that the organization was a CIA front company. Other employees of that organization also potentially worked for the CIA. People that Plame met might be spying against their host government. Not only Plame, but everything she was associated with was compromised, with basic research by the host governments where Plame was stationed. Organizations sometimes post too much information on their websites. Sometimes the information is not considered to be sensitive. Sometimes the communications department just posts information as a habit, without considering the strategic value. Other times, sensitive information is not properly filtered. For example, in one case a PDF file contained information that was redacted by placing black bars over the text. The people posting the information apparently did not realize that the redacted information can be viewed by looking at the source file. There are countless other examples where sensitive information was leaked. What is important is that the inadvertent release of information is considered a vulnerability that is considered for mitigation. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9780128093160000099 AN OVERVIEW OF STEGANOGRAPHY Gary C. Kessler, Chet Hosmer, in Advances in Computers, 2011 4.7.1 STEGO AND COMMUNICATION PROTOCOLS As the plethora of communication protocols evolves, the ability to embed (hide) information in these data streams in order to either leak information or to covertly communicate using these streams is possible. As with other forms of steganography, the first key to identifying the covert channels is to be looking for them. It is important to remember that individuals would use this method to leak information or covertly communicate when proven cryptography methods do not exist. Consider that the primary purpose for crypto is to deliver private and confidential communication between users that possess the proper credentials and keying material. The purpose or intent of steganography, however, is to hide the very existence of the communication channel. Given this distinction, covert channels attempt to circumvent organization security policies by exploiting legitimate communication channels [29]. Organizations today have large, complex network and communications infrastructures. Each provides a point of attack for insiders or infected systems to communicate covertly. Utilizing compromised images and multimedia files in conjunction with Internet, e-mail, and other common infrastructure services to push files that contain hidden content represents the simplest form of this attack. More complex forms involve the modification of the communication channel itself in order to exploit unused spaces and attributes of the channels. Even wireless local area networks (WLANs) are susceptible to such attacks [30]. One such example is the Frame Control (FC) field of IEEE 802.11 WLAN frame header. Manipulating rarely used bits in the FC field, such as More Frag, Retry, PwrMgt, or More Data, can provide single or multiple bit alterations in every frame and, thus, a low-bandwidth side communication channel. The method of modifying communication packets to embed hidden information is not new. Covert TCP by Craig Rowland [31], for example, forms covert communication channels using the Identification field in IP packets or the Sequence Number field in TCP segments [4,32]. As new protocols are developed, rarely used fields or fields that contain limited value offer new applications for steganography. Whether these protocols are TCP, IP, or User Datagram Protocol (UDP) based, or whether the application is client/server or peer-to-peer, exploitation opportunities exist. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9780123855107000023 DATA LOSS PROTECTION Ken Perkins, in Computer and Information Security Handbook (Second Edition), 2013 2 WHAT IS DLP? Data loss protection is a term that has percolated up from the alphabet soup of computer security concepts in the past few years. Known in the past as information leak detection and prevention (ILDP), used by IDC; information protection and control (IPC); information leak prevention (ILP), coined by Forrester; content monitoring and filtering (CMF), suggested by Gartner; or extrusion prevention system (EPS), the opposite of intrusion prevention system (IPS), the acronym DLP seems to have won out. No matter what acronym of the day is used, DLP is an automated system to identify anything that leaves the organization that could harm the organization. DLP applications try to move away from the point or niche application and give a more holistic approach to coverage, remediation and reporting of data issues. One way of evaluating an organization’s level of risk is to look around in an unbiased fashion. The most benign communication technologies could be used against the organization and cause harm. Before embarking on a DLP project, understanding some example types of harm and/or the corresponding regulations can help with the evaluation. The following sidebar, “Current Data Privacy Legislation and Standards,” addresses only a fraction of current data privacy legislation and standards but should give the reader a good understanding of the complexities involved in protecting data. View chapterPurchase book Read full chapter URL: https://www.sciencedirect.com/science/article/pii/B9780123943972000672 RECOMMENDED PUBLICATIONS InfoInfo icon * Computer Networks Journal * Future Generation Computer Systems Journal * Computers & Security Journal * Journal of Systems and Software Journal Browse books and journals * About ScienceDirect * Remote access * Shopping cart * Advertise * Contact and support * Terms and conditions * Privacy policy We use cookies to help provide and enhance our service and tailor content and ads. By continuing you agree to the use of cookies. Copyright © 2022 Elsevier B.V. or its licensors or contributors. ScienceDirect ® is a registered trademark of Elsevier B.V. ScienceDirect ® is a registered trademark of Elsevier B.V.