@vtucode - in BETCK105l Module 2 2022 Scheme
@vtucode - in BETCK105l Module 2 2022 Scheme
Cyber Offenses: How Criminals Plan Them: Introduction, how criminals plan the
attacks, Social Engineering, Cyber Stalking, Cybercafe & cybercrimes.
Botnets: The fuel for cybercrime, Attack Vector. Textbook:1 Chapter 2 (2.1 to 2.7)
2.1 Introduction
• Hacker: A hacker is person with strong interest in computers who enjoys learning
and experimenting with them. He/She is very talented, smart people who
understand computer better than the others.
• Cracker: A Cracker is a person who breaks into computers. Crackers should not be
confused with hackers the term "cracker” is usually connected to computer
criminals. Crimes conducted by crackers are vandalism, theft and snooping in
unauthorized areas.
• Cracking: It's the act of breaking into computers. Cracking is a popular growing
subject on the internet. There are website→ supplying crackers with programs that
allows them to crack computers (like guessing passwords); they used to break
phone line (phreaking). These files display warnings such as "These files are illegal;
we are not responsible for what you do with them”
• Cracker tools: These are programs that’ break into computer. These are widely
distributed on the internet. Like password crackers, Trojans, Viruses, war dialers
and worms
• War dialer: It is program that automatically dials phone numbers looking for
computers on the other end. It catalogs numbers so that the hackers can call back
and try to break in.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
2. With neat sample network, explain the categories of vulnerabilities that hackers
typically search (06 M)
The network shown in figure 1 consists of the many workstations. These workstations
are connected by switch. Intern switch is connected to the Citrix server and
applications servers.
The clinical data is analyzed and intern connected to the switch.
• BIND: Berkely Internet Name Domain
• IDS: Intrusion Detection System
• IIS: Internet Information Service
• DNS: Domain Name Service
•
Categories of vulnerabilities that hackers typically search for are
1. Inadequate border protection (border as in the sense of network periphery);
Many workstations are connected together and employee instals the PC without a
password. Poor password allows the guessing of password easily.
2. Remote Access Servers (RASs) with weak access controls
These are connected to all the network. A Firewall will protect the PC, by reporting
suspicious activity, when admis tarator fails to monitor the IDS alters.
IDS is a Intrusion Detection system, It is a system that monitors network traffic for
suspicious activity and alters when such activity is discovered.
3. Application servers with well-known exploits;
Administrator fails to install patch to fix the BIND Vulnerability.
Web admis tarator fails to install patch to fix IIS Unicode vulnerability
4. Misconfigured systems and systems with default configurations.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
Ans:
• Black Hat- Just like in the old westerns, these are the bad guys. A black hat
is also called cracker.
• To add insult to injury, black hats may also share information about the
“break in” with other black hat crackers so they can exploit the same
vulnerabilities before the victim becomes aware and takes appropriate
measures.
• White Hat- White black hats use their skill for malicious purposes, white
hats are ethical hackers.
• They use their knowledge and skill to thwart the black hats and secure the
integrity of computer systems or networks.
• If a black hat decides to target you, it’s a great thing to have a white hat
around. White hat focuses on securing IT systems.
• Whereas black hat would like to break into them. It's like thief and police
game.
• Brown hat hacker is one who thinks before acting or committing a malice or
non-malice deed.
• He/she does so without concern for how the information is used in the end.
(whether for patching or exploiting).
• The target of the crime and whether the crime occurs as a Single event or as
a series of events
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
• with the development in the IT and the Internet; thus, criminals have a new
tool that allows them to expand the pool of potential victims. However, this
also makes difficult to trace and apprehend the criminals
• These includes stealing mobile devices such as cell phone, laptops, personal
digital assistant (PDAs), and removable medias (CDs and pen drives);
• And can create the malfunctioning of the attached devices in the system
such as modem, CD drive etc.,
• Ex. Unknowingly open an attachment that may contain virus that will infect
the system (PC/Laptop). It is known as hacking or fraud.
Series of events
• Example, attacker interacts with the victim on the phone and/or via chat
rooms to establish relationship first and then exploit that relationship to
commit sexual assault. Ex. Cyberstalking
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
Port scanning:
• The act of systematically scanning a computer port.
• Support is a place where information goes into and out of a computer port
scanning identify is open doors to a computer.
• It is a similar to a test going through your neighborhood and checking
every door and window on each house to see which ones are open and
which ones are locked.
• There is no way to stop someone from port scanning your computer while
you are on the Internet because accessing internet server open support
which open the door to your computer.
Scrutinizing Phase
• It is also called as enumeration in the hacking world. The object to behind the
step is to identify the following
1. The valid user accounts or groups;
2. Network resources and/or shared resources;
3. Operating System (OS) and different applications that are running on the OS.
6. Explain the difference between passive and active attacks. Provide examples. (10M)
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
about what the user is working on, what files shares he/she uses, what
his/her password is and so on..,
• Example: Talking to an employee of a company, in the name of technical
support from the same office. While taking with the employee the attacker will
collect the confidential information such as name of the company, username
and password etc.
Shoulder surfing
It is a technique of gathering information such as usernames and passwords by watching
over a person's shoulder while he/she logs into the system, thereby helping an attacker to
gain access to the system.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
Dumpster diving
It involves looking in the trash for information written on pieces of paper or
computer printouts. This is a typical North American term; it is used to describe the
practice of rummaging through commercial or residential trash to find useful free items
that have been discarded.
It is also called dumpstering, binning, trashing garbing or garbage gleaning "Scavenging is
another term to describe these habits. In the UK, the practice is referred to as "binning or
"skipping and the person doing it is a "binner" or a "skipper.
Fake E-Mails
An attacker sends emails to numerous users in such that the user finds it as
legitimate mail. This activity is called as Phishing. Free websites are available to
send fake emails. One can observe here that "To" in the text box is a blank space.
Phishing involves false emails, chats or websites designed to impersonate real
systems with the goal of capturing sensitive data.
A mail might send to victim (Internet users/ Netizens) by attacker to reveal their
personal information. Phishing is carried through email or instant messaging.
E-Mail attachment
E-Mail attachments are used to send malicious code to a victim's system, which will
automatically (e.g. keylogger utility to capture passwords) get executed.
Viruses. Trojans, and worms can be included cleverly into the attachments to entice a
victim to open the attachment.
Pop-up windows
Pop-up windows are also used. in a similar manner to E Mail attachments Pop-up
windows with special offers or tree stuff can encourage a user to unintentionally install
malicious software.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
10. What is cyberstalking? As per your understanding is it a crime under the Indian IT
act? (06M)
As per Law Cyber Stalking is a punishable offence and attracts section 354 (D), 509
IPC, and section 67 under I.T. Amendment Act 2008. Information Technology Act, 2000
(amended in 2008) - When a person publishes or sends salacious material via electronic
media is to be charged under Section 67 of the Act.
[Source: https://infosecawareness.in/concept/safety-on-
cyberstalking#:~:text=As%20per%20Law%20Cyber%20Stalking,Section%2067%20of%20the
%20Act.]
Both are criminal offenses, both are motivated by a desire to control, intimidate of
influence a victim.
A Stalker may be an online stranger or a person whom the target knows. He may be
anonymous and solicit involvement of other people online who do not even know the
target.
Online Stalkers Offline Stalkers
They aim to start the interaction with the The stalker may begin the attack using
victim directly with the help of s traditional methods such as following the
Internet. E-Mail and chat rooms are the victim, watching the daily routine of the
most popular communication medium to victim, etc. Searching on message
get connected with the victim, rather than boards/newsgroups. Personal websites, and
using traditional instrumentation like people finding services or websites are most
telephone cell phone. The stalker common ways to gather information
makes sure that the victim recognizes the about the victim using the Internet. The
attack attempted on him/her. The stalker victim is not aware that the Internet has
can make use of been used to perpetuate an attack against
a third party to harass the victim. them.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
Case Study
The Indian police have registered first case of cyberstalking in Delhi- the brief account of
the case has been mentioned here. To maintain confidentiality and privacy of the entities
involved, we have changed their names. Mrs. Joshi received almost 40 calls in 3 days
mostly at odd hours from as far away as Kuwait, Cochin, Bombay, and Ahmadabad. The
said calls created havoc in the personal life destroying mental peace of Mrs. Joshi who
decided to register a complaint with Delhi Police.
A person was using her ID to chat over the Internet at the website www.mirc.com, mostly
in the Delhi channel for four consecutive days. This person was chatting on the Internet,
using her name and giving her address, talking in obscene language. The same person
was also deliberately giving her telephone number to other chatters encouraging them to
call Mrs. Joshi at odd hours.
This was the first time when a case of cyberstalking was registered. Cyberstalking does
not have a standard definition but it can be defined to mean threatening, unwarranted
behaviour, or advances directed by one person toward another person using Internet and
other forms of online communication channels as medium.
• Cyber café are Used for either real or falls terrorist communication
• For stealing bank password fraudulent withdraw of money
• Keyloggers or Spyware.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
• Shoulder Surfing
• For sending options Mails to harass people
• They are not network service providers (NSP) according to IT act 2000
• They are responsible for due diligence
16.Discuss the safety and security measures while using the computer in a cybercafe?
(08M)
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
For this, go to Tools > Internet options again> click the General tab go to Temporary
Internet Files > click Delete Files and then click Delete Cookies
Then, under history, click clear history. Wait for the process to finish before leaving the
computer
4. Be alert don't be a victim of Shoulder Surfing
One should have to stay alert and aware of the surroundings while using a public
computer. Snooping over the shoulder is an easy way of getting your username and
password.
5. Avoid online financial transaction
Ideally one should avoid online banking, shopping or other transactions that require one
to provide personal, confidential and sensitive information such as credit card or bank
account details. In case of urgency, one has to do it; however, one should take the
precaution of changing all the passwords as soon as possible. One should change the
passwords using a more trusted computer, such as at home and/or in office.
6. Change password
ICICI Bank/SBI about changing the bank account/transaction passwords is the best
practice to be followed by every one who does the online net banking.
7. Virtual Keyboard
Nowadays almost every bank has provided the virtual keyboard on their website.
The advantages of utilizing virtual keyboard is we can avoid the keylogger attack.
8. Security warnings
One should take utmost care while accessing the websites of any banks/financial
institution. The screenshot in Fig. 2.7 displays security warnings very clearly (marked
in bold rectangle), and should be followed while accessing these financial accounts
from cybercafe
Bot: “ An automated program for doing some particular task, often over a network”
A botnet (also known as a zombie army) is a number of internet computer that, although their
owners are unaware of it, have been set up to forward transmissions (including spam or
viruses )
Any such computer is called as a zombie-in effect, a computer “robot” or “bot” that servers the
wishes of some master spam or virus originator.
Most computers compromised in this way are home based.
According to a report from Russian based Kaspersky labs botnets– not spam, viruses, or
worms– currently pose the biggest threat to the Internet.
18. Explain with neat diagram how Botnets create business and used for gainful
purpose. (08M)
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
Malware: It is malicious software. designed to damage a computer system without the owners
informed consent. Viruses and worms are the examples of malware.
Adware: It is advertising-supported software. which automatically plays, displays, or
downloads advertisements to a computer after the software is installed on it or while the
application is being used. Few spywares are classified as adware.
Spam: It means unsolicited or undesired E-Mail messages
Spamdexing: It is also known as search Spam or search engine Spam. It involves a number
of methods. such as repeating unrelated phrases, to manipulate the relevancy or prominence
of resources indexed by a search engine in a manner inconsistent with the purpose of the
indexing system.
DDoS: Distributed denial-of service attack (DDoS) occurs when multiple systems flood
bandwidth of resources of a targeted system, usually one or more web servers. These systems
are by attackers using a variety of methods.
20. Discuss the steps to secure the computer system (04 M)
Ways to secure the system [USUDDCT]
1. Use antivirus and anti-Spyware and keep it up-to-date
lt is important to remove and/or quarantine the viruses. The settings of these
software's should be done during the installations so that these software's get
updated automatically on a daily basis.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
3. Use firewall to protect the system from hacking attack, while it is connected to
the Internet.
A firewall is a software and/or hardware that is designed to block unauthorized access
while permit- ting authorized communications. It is a device or set of devices
configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic
between different security domains based upon a set of rules and other criteria. A
firewall is different from antivirus protection. Antivirus software scans incoming
communications and files for troublesome viruses vis-à-vis properly configured
firewall that helps to block all incoming communications from unauthorized sources.
6. Check regularly inbox and sent items, for those messages you did not send.
If you do find such messages in your outbox, it is a sign that your system may have
infected with Spyware, and maybe a part of a Botnet. This is not foolproof; many
spammers have learned to hide their unauthorized access.
21. What are the different attacks launched with attack vector and explain
in detail. (08M)
• An attack vector is a path or means by which a hacker (or cracker) can gain access
to a computer or network server in order to deliver a payload or malicious
outcomes.
• Attack vectors enable hackers to exploit system vulnerabilities, including the
human element.
• Attack vector include viruses, email attachments, Web pages, pop-up windows,
instant messages, chat rooms, and deception.
• All of these methods involve programming (or hardware), except deception, in which
a human operator is fooled into removing or weaking system defenses.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
• To some extent, Firewalls and anti-virus software can block attack vectors.
• But no protection method is totally attempting proof.
• A defense method that is affected today may not remain so for long, because
hackers are constantly updating Attack vectors, and seeking new ones, in their
quest to gain unauthorized access to computers and servers.
• If vulnerability is at the entry point then attack vectors are the way attacks can
launch their results are try to infrate the building .
• In the broadest sent purpose of the attack battery in plant or piece of code that
makes use of a Wonderla score is called as pay load Android vector very in how a
balloon is implemented the most common malicious follow the viruses which can
function as their own attack vectors ) Trojan horses, worms and spyware.
• If an attack vector is thought of as guided missile, its payload can be compared to
the warhead in the tip of the missile.
Attachments:
Malicious attachments install malicious computer Code. The code could be a virus, Trojan
Horse, Spyware, or any other kind of malware. Attachments attempts to install their
payload as soon as you open them.
Hackers
Hacker or cracker are a formidable attack vector because, unlike ordinary malicious code,
people are flexible and they can improvise. They have hacking tool, heuristic, and social
engineering to gain access to computer and online accounts. They often install Trojan
Horse to commandeer the computer for their own use.
vtucode.in
Introduction to Cyber Security (22ETC15I) Module 2
Malicious macros:
Microsoft Word and Microsoft Excel are some of the examples that allow macros. A macro
does something like automating a spreadsheet, for example. Macros can also be used for
malicious purposes. All Internet services like instant messaging, Internet Relay Chart
(IRC), and P2P file-sharing networks rely on cozy connections between the computer and
the other computers on the Internet. If one is using P2P software then his/her system is
more vulnerable to hostile exploits
Viruses:
These are malicious computer codes that hitch a ride and make the payload. Nowadays,
virus vectors include E-Mail attachments, downloaded files, worms, etc.
A zero-day attack
A zero-day (or zero - hour or day zero) attack or threat is an attack that exploits a
previously unknown vulnerability in a computer applications or operating system, one
that developers have not had time to address and patch.
Software vulnerabilities may be discovered by hackers by security companies or
researchers, by the software vendors themselves of by users.
If discovered by hackers, an exploit will be kept secret for as long as possible and will
circulate only through the ranks of hackers, until software or security companies become
aware of it or of the attacks targeting it.
Zero-day emergency response team (ZERT): This is a group of software engineers who
work to release non-vendor patches for zero-day exploits. Nevada is attempting to provide
support with the Zero day Project at www.zerodayproject.com, which purports to provide
information on upcoming attacks and provide support to vulnerable systems.
***********************end***************************
vtucode.in