What is an Active Attack? - Definition from WhatIs.com (2024)

What is an Active Attack? - Definition from WhatIs.com (1)

By

  • TechTarget Contributor

What is an active attack?

An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target.

There are several different types of active attacks. However, in all cases, the threat actor takes some sort of action on the data in the system or the devices the data resides on. Attackers may attempt to insert data into the system or change or control data that is already in the system.

Types of active attacks

What follows are some of the most common types of active attacks.

Masquerade attack

In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. Masquerade attacks are conducted in several different ways, including the following:

  • using stolen login identifications (IDs) and passwords;
  • finding security gaps in programs; and
  • bypassing the authentication

An attempt may come from an employee inside an organization or from an outside threat actor using a connection to the public network. Weak authentication can provide a point of entry for a masquerade attack and make it easy for an attacker to gain entry. If attackers successfully receive authorization and enter the network, depending on their privilege level, they may be able to modify or delete the organization's data. Or they may make changes to network configuration and routing information.

For example, an outside attacker can use spoofed Internet Protocol (IP) addresses to bypass the victim's firewall and gain access from an unauthorized source. To do this, the attacker may use a network sniffer to capture IP packets from the target machine. Another device is used to send a message to the firewall with the forged IP address. The firewall then permits access to the victim's machine.

What is an Active Attack? - Definition from WhatIs.com (2)

Session hijacking attack

A session hijacking attack is also called a session replay attack. In it, the attacker takes advantage of a vulnerability in a network or computer system and replays the session information of a previously authorized system or user. The attacker steals an authorized user's session ID to get that user's login information. The attacker can then use that information to impersonate the authorized user.

A session hijacking attack commonly occurs over web applications and software that use cookies for authentication. With the use of the session ID, the attacker can access any site and any data that is available to the system or the user being impersonated.

What is an Active Attack? - Definition from WhatIs.com (3)

Message modification attack

In a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or to modify the data on a target machine. Message modification attacks are commonly email-based attacks. The attacker takes advantage of security weaknesses in email protocols to inject malicious content into the email message. The attacker may insert malicious content into the message body or header fields.

What is an Active Attack? - Definition from WhatIs.com (4)

DoS attack

In a denial-of-service (DoS) attack, the attackers overwhelm the victim's system, network or website with network traffic, making it difficult for legitimate users to access those resources. Two ways a DoS attack can occur include:

  1. Flooding. The attacker floods the target computer with internet traffic to the point that the traffic overwhelms the target system. The target system is unable to respond to any requests or process any data, making it unavailable to legitimate users.
  2. Malformed data. Rather than overloading a system with requests, an attacker may strategically send data that a victim's system cannot handle. For example, a DoS attack could corrupt system memory, manipulate fields in the network protocol packets or exploit servers.
What is an Active Attack? - Definition from WhatIs.com (5)

In a distributed DoS (DDoS) exploit, large numbers of compromised systems -- also referred to as a botnet or zombie army -- attack a single target with a DoS attack. A DDoS uses multiple devices and locations to launch requests and overwhelm a victim's system in the same way a DoS attack does.

What are passive attacks?

Active attacks contrast with passive attacks, in which an unauthorized party monitors networks and sometimes scans for open ports and vulnerabilities. Passive attackers aim to collect information about the target; they don't steal or change data. However, passive attacks are often part of the steps an attacker takes in preparation for an active attack.

Examples of passive attacks include:

  • War driving. This is a wireless network reconnaissance method that involves driving or walking around with a laptop computer and portable Wi-Fi-enabled wireless Ethernet card to find unsecured wireless networks. Once found, these attackers use these networks to illegally access computers and steal confidential information.
  • Dumpster diving. This passive attack involves intruders searching for information on discarded devices or for notes containing passwords in trash bins. For example, the attacker can retrieve information from hard drives or other storage media that have not been properly erased.
What is an Active Attack? - Definition from WhatIs.com (6)

How to prevent an active attack

There are several ways to counter an active attack, including the following techniques:

  • Firewalls and intrusion prevention systems (IPSes). Firewalls and IPSes are security systems designed to block unauthorized access to a network. A firewall is part of the network security infrastructure. It monitors all network traffic for suspicious activity and blocks any it identifies. It also has a list of trusted senders and receivers. Similarly, an IPS monitors network traffic for malicious activity and acts when an attack is detected.
  • Random session keys. A session key is a temporary key created during a communication session that is used to encrypt the data passed between two parties. Once the session ends, the key is discarded. This provides security because the keys are only valid for a specific time period, which means no one else can use them to access the data after the session has ended.
  • One-time passwords (OTPs). These passwords are automatically generated numeric or alphanumeric strings of characters that authenticate users. They are only valid for one use. OTPs often are used in combination with a username and password to provide two-factor authentication.
  • Kerberos authentication protocol. This authentication protocol is a system for authenticating users for network services based on trusted third parties. It was developed at the Massachusetts Institute of Technology in the late 1980s. Kerberos authentication is a way to prove to a network service that a user is who they say they are. It provides a single sign-on service that enables users to use the same login credentials (username and password) to access multiple applications.

Learn how to create a cybersecurity strategy to prevent active and other types of attacks in this cybersecurity planning guide.

This was last updated in June 2021

Continue Reading About active attack

  • Top 10 types of information security threats for IT teams
  • 6 common types of cyber attacks and how to prevent them
  • Data storage security best practices for avoiding cyberattacks
  • 10 types of security incidents and how to handle them
  • How to prevent cybersecurity attacks using this 4-part strategy

Related Terms

What is MXDR, and do you need it?
Managed extended detection and response (MXDR) is an outsourced service that collects and analyzes threat data from across an ...Seecompletedefinition
What is network detection and response (NDR)?
Network detection and response (NDR) technology continuously scrutinizes network traffic to identify suspicious activity and ...Seecompletedefinition
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be ...Seecompletedefinition
What is an Active Attack? - Definition from WhatIs.com (2024)
Top Articles
Teaching Kids The Difference Between Debit And Credit | Bankrate
Metagross (Pokémon)
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Quick Pickling 101
Missed Connections Inland Empire
Polyhaven Hdri
Parks in Wien gesperrt
Craigslist Phoenix Cars By Owner Only
Carter Joseph Hopf
Nichole Monskey
FIX: Spacebar, Enter, or Backspace Not Working
Https //Advanceautoparts.4Myrebate.com
Johnston v. State, 2023 MT 20
Cooktopcove Com
Jesus Calling Oct 27
NBA 2k23 MyTEAM guide: Every Trophy Case Agenda for all 30 teams
Buy Swap Sell Dirt Late Model
Fort Mccoy Fire Map
How many days until 12 December - Calendarr
Panolian Batesville Ms Obituaries 2022
Nsa Panama City Mwr
Construction Management Jumpstart 3Rd Edition Pdf Free Download
Getmnapp
Avatar: The Way Of Water Showtimes Near Maya Pittsburg Cinemas
Piedmont Healthstream Sign In
Dtm Urban Dictionary
Tinyzonehd
Sandals Travel Agent Login
Abga Gestation Calculator
Summoners War Update Notes
Movies - EPIC Theatres
CohhCarnage - Twitch Streamer Profile & Bio - TopTwitchStreamers
Bj's Tires Near Me
Mastering Serpentine Belt Replacement: A Step-by-Step Guide | The Motor Guy
Blush Bootcamp Olathe
100 Million Naira In Dollars
Wells Fargo Bank Florida Locations
Kristen Hanby Sister Name
Boondock Eddie's Menu
Rise Meadville Reviews
Tmka-19829
Autozone Locations Near Me
Space Marine 2 Error Code 4: Connection Lost [Solved]
Cal Poly 2027 College Confidential
Daly City Building Division
Prior Authorization Requirements for Health Insurance Marketplace
Discover Wisconsin Season 16
Lady Nagant Funko Pop
Gary Vandenheuvel Net Worth
Advance Auto.parts Near Me
Deshuesadero El Pulpo
How To Find Reliable Health Information Online
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 6233

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.