CS Unit1 Removed Removed
CS Unit1 Removed Removed
• Reconnaissance : This is the first phase where the Hacker tries to collect
information about the target. It may include Identifying the Target, finding
out the target’s IP Address Range, Network, DNS records, etc.Let’s assume
that an attacker is about to hack a websites’ contacts.
Indian targets
•Banking and finance
•Energy, oil and gas
$
financial identity economic Physical
•Telecom
•Defence & research
crime theft espionage attacks
•Manufacturing
•Infrastructure
•Affiliates of above
Realise that today, a hacker can:
Hacking (Guessing
of password ) &
taking control of
Social Site Profiles
and sending
offensive messages
through it
FAKE PROFILE
Hacking
(Guessing of
password ) &
taking control of
Social Site
Profiles and
sending
offensive
messages
through it
MORPHING & DEFAMTION
Circulating
Morphed or
private pictures
and information
on social sites
like Facebook &
mobile apps like
Whatsapp
Cyber Stalking via Mobile
Continuously
calling and
messaging
through
phone or its
applications
to harass.
Cyber Stalking via E-mails
Sending
offensive
messages with
vulgar/abusive
attachments
via E-mails
Cheating using Matrimonial sites
Cheating
Prospective Brides
by contacting
them through
Matrimonial sites
INSULT TO THE MODESTY OF WOMAN
Creating Profiles on
porn sites or any
other websites and
uploading contact
details & private
photos.
Child Pornography
Child Pornography
one of the most
heinous offence
Downloading & Copyright Infringement
Instagram/Facebook Fake or
Harassment Case.
5. Spending Hours
Browsing Through
Facebook Every day
6. Mad rush to add
more friends
7. Compromising
offline social life
Emotional Symptoms of Online Addition
Are you preoccupied with using the Internet? Do you think about your previous
or future online activity?
• Do you have the need to be online longer to be satisfied?
Have you made repeated but unsuccessful attempts to cut back,
stop or control your Internet use?
• Do you become moody, restless, irritable or depressed when you stop or
decrease your Internet use?
• Is your time spent online longer than what you originally planned?
• Did your online use negatively affect a significant relationship,
education, career or job?
• Do you conceal the extent of your Internet usage from your therapist,
family or others?
• Does the Internet serve as an escape from problems or relief from a bad
mood?
Chat Rooms & Online Predators
• Started by turning the A/C on full, blaring the radio and turning the
wipers on and off.
• Two weeks later, hacker Samy Kamkar showed how he can unlock and
start any high-end car — Cadillac’s, BMW’s, Nissan’s etc.
‘ROLLJAM’ DEVICE - UNLOCKS ALMOST ANY
CAR
Copy someone’s keys with A PHOTOGRAPH
From the convenience of your smart phone
•New apps like KeyMe have been launched.
•You take a photo of a key and the duplicate
it.
•The key will be shipped to the comfort of
your home.
•There is no validation of who is the key
owner!
Miniature do-it-yourself CREDIT CARD SPOOFER