0% found this document useful (0 votes)
32 views50 pages

Chapter Four

The document discusses various tools, techniques and methods used for cybercrimes including phishing, password cracking, malware, SQL injection and denial of service attacks. It provides details on how each method works and recommendations for prevention.

Uploaded by

Maxamed xasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views50 pages

Chapter Four

The document discusses various tools, techniques and methods used for cybercrimes including phishing, password cracking, malware, SQL injection and denial of service attacks. It provides details on how each method works and recommendations for prevention.

Uploaded by

Maxamed xasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Tools and Methods Used in

Cybercrime

Chapter Four
Agenda

❑ Introduction
❑ Tools & Techniques
Introduction
in Chapter 3, we have learnt about how
criminals/attackers plan Cyberoffenses against
an individuals or organizations. in this chapter, we
will focus upon different forms of attacks through
which attackers target the computer systems.
Tools & Tech.
There are various tools and techniques
and complex methodologies used to
launch attackers against the target.
https://cve.mitre.org/ Common vulnerability and Exposure (CVE) is a
dictionary of publicly known information security
vulnerabilities and exposures and free for public
use
www.osvdb.org OSVDB: is an open-source vulnerability database
providing a large quantity of technical information
and resources about thousands of vulnerabilities.
https://www.metasploit.com is an open-source computer security project that
provides information security vulnerabilities and
aids in penetration testing.
https://www.cvedetails.com/ an open-source vulnerability database.
Techniques
Phishing
Phishing:-
it's believed that phishing is an alternative
spelling of "fishing" as in "to fish for
information". The first documented use of
the word "Phishing" was in 1996.
How Phishing works?
Phishers work in the following ways
1. Planning: criminals decide the target and
determine to get E-mail address of the target.
2. Set-up: after gathering the target and email.
They will create the methods for delivering
the message and to collect the data about
the target.
Phishers work in the following ways
Most often this involves:
❑ E-mail address
❑ A webpage.
3. Attack: The phishers sends a phony
message that appears to be from a reputable
source.
Phishers work in the following ways
4. Collection: They record the information of
victim entering into webpages or pop-up
windows.
5. Identity theft and Fraud: Phishers use the
information that they have gathered to make
illegal purchase or commit fraud.
Password Cracking
Password Cracking
Password is like a key to get an entry into
computerized systems like a lock.
❑ Password cracking is a process of recovering
passwords from data that have been stored in
or transmitted by a computer system.
Password Cracking

Usually an attacker follows a common


approach-repeatedly making guesses for
the password.
Password Cracking
The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system
administrators to check for easily crackable
passwords.
3. To gain unauthorized access to a system.
Password Cracking
Methods
Password cracking Methods
There are three ways to gain passwords:
❑ Manual password cracking: is to
attempt to logon with different
passwords.
The attacker follows the following steps:
1. Find a valid user account such as an
administrator or guest.
2. Create a list of possible passwords;
3. Rank the passwords from high to low
probability.
4. try again and again until a successful
password is found.
Passwords can be guessed sometimes with
knowledge of the user's personal information.
Example of guessable passwords include:
▪ "password" or "passcode" or "passw0rd" or
"admin" and etc.
▪ name of user's family, friend/relative/pet.
▪ user's birthday or birthday place or phone
number(s)
Automated password
cracking
Password cracking categories

An attacker can also create a script file (i.e.,


automated program) which will be executed to
try each password in a list.
❑ Password cracking attacks can be classified
under three categories as follows:
Password cracking categories

1. Online attacks
2. Offline attacks
3. Non-electronic attacks
Discussion

How to gain someone his/her


password without using electronic
devices.
Online attacks

Online attacks:
an attacker can create a script file (i.e.,
automated program) that will be executed to
try each password in a list and when matches,
an attacker can gain the access to the system.
Offline attacks
Mostly offline attacks are performed from a
location other than the target where passwords
reside or are used.
❑ Offline attacks usually require physical
access to the computer.
Computer System Attacks
Malware
Malware is a malicious software designed to
infiltrate a computer system without the
owner's informed consent.

❑ Malware can be classified as follows:


• Viruses and Worms
• Trojan Horses
• Rootkits
• Backdoors
• Spywares
• Keystroke loggers
• Botnets and more
Computer Virus
Computer Virus is a program that can "infect"
legitimate programs by modifying them to
include a possibly copy of itself.
▪ Viruses contain malicious instructions that
may cause damage or annoyance.
Trojan Horse
Trojan Horse is a program is which malicious
or harmful code is contained inside harmless
programming or data in such a way that it can
get control that program/application and
cause harm.
Keyloggers and Spywares
Keystroke logging, often called keylogging, is
the practice of noting (or logging) the keys
struck on a keyboard.
• Typically in a covert manner so that the
person using the keyboard is unaware that
such actions are being monitored.
Keyloggers and Spywares

Keylogging is classified as:

• Software keylogger and


• hardware keylogger.
Spywares
Spyware is type of Malware that is installed on
computers which collects information about
users without their knowledge.
❑ The presence of Spyware is typically hidden
from the user; it is secretly installed on the
user's personal computer.
Dos and DDoS Attacks
A denial-of-service attack (DoS attack) or
distributed denial-of-service attack (DDoS
attack) is an attempt to make a computer
resource (i.e., information system) unavailable
to its intended users.
SQL Injection
SQL Injection

Structured Query Language (SQL) is a


database computer language designed
for managing data in relational database
management system.
SQL Injection

SQL injection is a code injection technique


that exploits a security vulnerability
occurring in the database layer of an
application.
SQL Injection
The vulnerability is present when user input is
either filtered incorrectly for string literal scape
characters embedded in SQL statements or
user input is not strongly typed and thereby
unexpectedly executed.
SQL injection attacks are also known as SQL
insertion attacks.
❑ Attackers target the SQL Servers- the prime
goal of SQL injection attack is to obtain the
information while accessing a database
table that may contain personal information
such as:
- Credit card numbers
- Social security numbers
- Username and Passwords.
During an SQL injection attack, Malicious code
is inserted into a web form field to make a
system execute a command shell or other
arbitrary commands.
Steps For SQL Injection Attacks
Steps For SQL Injection Attacks:

Following are some steps for SQL injection


attack:
SQL Injection steps
1. The attacker looks for the webpages that
allow submitting data, that is, login page,
search page, feedback, etc.
2. Then, the attacker will check the source
code of the website to find a useful
vulnerabilities in the source code.
SQL Injection steps

3. The attacker inputs a "Single quote" under


the text box provided on the webpage to
accept the username and password and to
check the response.
SQL Injection steps

4. The attacker uses SQL commands such as


SELECT statement command to retrieve
data from the database. or uses INSERT
command to add data to the database.
How to prevent SQL Injection
Attacks
How to prevent …

SQL injection attacks occur due to poor website


administration and coding.

❑ The following steps can be useful to prevent


SQL Injection:
Preventing SQL Injection:

• Input validation: User input needs to be


checked and cleaned of any characters or
strings that could possibly be used
maliciously.
• Modify error reports: SQL errors should not
be displayed to outside users and to avoid
this, the developer should configure the error
reports very carefully.
• Isolate database server and web server:
Both should reside on different machines.
END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy