Unit 5 Part 1
Unit 5 Part 1
https://www.scribd.com/document/661638611/WILEY-INDIA-Cyber-Security-Understanding-Cy
ber-Crimes-Computer-Forensics-and-Legal-Perspectives-Nina-Godbole-Sunit-Belapure-Kamles
h-Bajaj-2011
Cyber Crime
Key Points
1. Repeating Keywords
2. Use of non-related keywords
3. REdirection
4. Use of colored Text
5. Hidden Links
6. Duplication of pages with different URLS
7. Use of different pages that direct to same URL
4. Cyber Defamation
5. Cyber Stalking and Harassment
Password Cracking - to recover the password from
data that has been stored or transmitted
Why it is needed?
1. To recover forgotten password
2. To check for security of passwords at organization level.
3. To gain unauthorized access into someone’s else account
How manual cracking is tried?
1. Choose a random account.
2. Create list of possible passwords
3. Try logging in with each passwords until the login is successful
Very easy guesses:
1. DOB
2. Place of birth
3. Mobile Number
4. Fathers name
5. Vehicle number
6. Simple words like password, open etc.
General Rules for Password Confidentiality
● Spyware is malicious software that enters a user’s computer, gathers data from the
device and user, and sends it to third parties without their consent. A commonly accepted
spyware definition is a strand of malware designed to access and damage a device
without the user’s consent.
● Spyware collects personal and sensitive information that it sends to advertisers, data
collection firms, or malicious actors for a profit. Attackers use it to track, steal, and sell
user data, such as internet usage, credit card, and bank account details, or steal user
credentials to spoof their identities.
● Spyware is one of the most commonly used cyberattack methods that can be difficult for
users and businesses to identify and can do serious harm to networks. It also leaves
businesses vulnerable to data breaches and data misuse, often affects device and
network performance, and slows down user activity.
How spyware works?
Types of Impact
SQL Injection Attack
1. The attacker looks for the webpages that allow submitting data, that is, login page,
search page, feedback, etc. The attacker also looks for the webpages that display the
HTML commands such as POST or GET by checking the site's source code.
2. To check the source code of any website, right click on the webpage and click on "view
source" ,source code is displayed in the notepad. The attacker checks the source code
of the HTML, and look for "FORM" tag in the HTML code. Everything between the
<FORM> and </FORM> have potential parameters that might be useful to find the
vulnerabilities.
3. The attacker inputs a single quote under the text box provided on the webpage to accept
the username and password. This checks whether the user-input variable is sanitized or
interpreted literally by the server. If the response is an error message such as use
"a"="a" (or something similar) then the website is found to be susceptible to an SQL
injection attack.
4. The attacker uses SQL commands such as SELECT statement command to retrieve
data from the database or INSERT statement to add information to the database.