Chapter Four
Chapter Four
Cybercrime
Chapter Four
Agenda
❑ Introduction
❑ Tools & Techniques
Introduction
in Chapter 3, we have learnt about how
criminals/attackers plan Cyberoffenses against
an individuals or organizations. in this chapter, we
will focus upon different forms of attacks through
which attackers target the computer systems.
Tools & Tech.
There are various tools and techniques
and complex methodologies used to
launch attackers against the target.
https://cve.mitre.org/ Common vulnerability and Exposure (CVE) is a
dictionary of publicly known information security
vulnerabilities and exposures and free for public
use
www.osvdb.org OSVDB: is an open-source vulnerability database
providing a large quantity of technical information
and resources about thousands of vulnerabilities.
https://www.metasploit.com is an open-source computer security project that
provides information security vulnerabilities and
aids in penetration testing.
https://www.cvedetails.com/ an open-source vulnerability database.
Techniques
Phishing
Phishing:-
it's believed that phishing is an alternative
spelling of "fishing" as in "to fish for
information". The first documented use of
the word "Phishing" was in 1996.
How Phishing works?
Phishers work in the following ways
1. Planning: criminals decide the target and
determine to get E-mail address of the target.
2. Set-up: after gathering the target and email.
They will create the methods for delivering
the message and to collect the data about
the target.
Phishers work in the following ways
Most often this involves:
❑ E-mail address
❑ A webpage.
3. Attack: The phishers sends a phony
message that appears to be from a reputable
source.
Phishers work in the following ways
4. Collection: They record the information of
victim entering into webpages or pop-up
windows.
5. Identity theft and Fraud: Phishers use the
information that they have gathered to make
illegal purchase or commit fraud.
Password Cracking
Password Cracking
Password is like a key to get an entry into
computerized systems like a lock.
❑ Password cracking is a process of recovering
passwords from data that have been stored in
or transmitted by a computer system.
Password Cracking
1. Online attacks
2. Offline attacks
3. Non-electronic attacks
Discussion
Online attacks:
an attacker can create a script file (i.e.,
automated program) that will be executed to
try each password in a list and when matches,
an attacker can gain the access to the system.
Offline attacks
Mostly offline attacks are performed from a
location other than the target where passwords
reside or are used.
❑ Offline attacks usually require physical
access to the computer.
Computer System Attacks
Malware
Malware is a malicious software designed to
infiltrate a computer system without the
owner's informed consent.