Types of Cyberattack, Specific Risks and How to Mitigate those Risks
Please note that the list of cyberattack types is distributed by the Canadian Centre for Cyber Security and the means to mitigate is provided by third parties. This information is not meant to be exhaustive and Skyway West is not responsible for omissions or mistakes.
What is a multicast DNS Service Exploit, what is the risk and how can you mitigate that risk?
What is it? The Domain Name System (DNS) is a network of computers that convert web addresses like “google.com” into Internet Protocol (IP) addresses like 192.168.0.1. The client computer connects to a DNS server and asks for the IP address of “google.com” and gets an answer back. Multicast DNS (mDNS) does the same thing ...What is an Open Portmapper Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Portmapper, also known as Remote Procedure Call Bind (RPCBind), is a mechanism where Internet address ports can be assigned as a program running on a remote computer to act as if it is running on the local computer. RPCBind runs on port 111 and dates back to 1991. Although portmapper has ...What is a NetBios Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Network Basic Input/Output System (NetBIOS) is the mechanism that Microsoft Windows systems use to share resources, particularly file and printer shares. NetBIOS uses ports 137, 138 and 139. Why is it a risk? Using a command called NBSTAT (link below), an attacker can discover computer names, IP addresses, NetBIOS names, Windows Internet ...What is a Microsoft (MS) SQL Server Resolution Service Vulnerability and How Does it Affect You?
Microsoft SQL is a database management system, and its Server Resolution Service is a way external devices can request details on the MS SQL server running on a network. When exposed to the wider Internet, the Server Resolution Service can be used by a third party to commit abuse. Your compromised or misconfigured device is ...What is an SMB Protocol Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Server Message Block (SMB), also called Common Internet File System (CIFS) allows Microsoft Windows computers to share files, serial ports and printers across a network. SMB uses ports 139 or 445. The UpGuard link below provides background on the protocol and how it works. Why is it a risk? Version 1.0 ...What is an Open Telnet Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Telnet allows a user to open a command terminal on a remote computer or device and execute commands. Telnet runs on port 23. Telnet is primarily used to log in to a remote server, but it can also be used to log in to routers and other network devices. Why is ...What is a TFTP Vulnerability, what is the risk and how can you mitigate that risk?
What is it? Trivial File Transfer Protocol (TFTP) can operate in very little memory so it is sometimes used by a desktop computer to update the firmware on a router. TFTP uses port 69. TFTP is rarely used for Internet file transfers. Wikipedia (link below) does a good job of explaining TFTP. ...