? Unit 3 PDF
? Unit 3 PDF
Cyber Crime
1. What is Phishing? How Phishing Works?
Phishing is a trick to steal your personal or financial information by pretending to be a
trusted source (like a bank or popular website).
1
Deceptive
Email
A fake email is sent to
the victim.
4 2
Identity Fraud Trust
Exploitation
The stolen
information is used The email pretends to
for fraudulent be from a trusted
activities. source.
3
Information
Theft
The victim's personal
or financial data is
stolen.
How it works:
1. You get a fake email or message (looks like it’s from your bank or company).
2. It asks you to click a link and log in or enter personal info.
3. The link opens a fake website that looks real.
4. When you type your username, password, or card details, the hacker saves it.
5. Your information is now stolen and misused.
Phishing Attack Process
Click on Link
The user clicks on a
malicious link
Visit Fake
Website
The user is directed to a
fraudulent website
Enter Personal
Info
The user inputs sensitive
personal information
Information
Stolen
The hacker captures the
user's data
Example:
Email says – “Your account is blocked. Click here to verify” → Fake site → You enter your
password → Hacker gets it.
Guess
Password
Break
Use Account
Password
Password
Cracking
Access
Account
Purposes:
• To steal information
• To hack into systems
• To test system security (by ethical hackers)
Purposes of Hacking
Types of Cracking:
1. Brute Force Attack – Trying every possible combination.
2. Dictionary Attack – Using a list of common passwords.
3. Rainbow Table Attack – Using pre-computed password hash values.
4. Phishing – Tricking you to tell your password.
5. Keylogging – Recording your keystrokes to capture passwords.
Rainbow Table
Attack
Employing pre-
computed password
hash values for quick
access.
Brute Force
Attack
Trying every possible
Keylogging
combination to crack Recording keystrokes to
passwords. capture passwords.
Cyber Attack
Methods
3. Difference between Keyloggers and Spyware
FeatureKeyloggerSpyware
Main WorkRecords what you type (keyboard inputs)Secretly collects data from your
PurposeSteal passwords or messagesMonitor user activity, steal personal data
device
VisibilityHidden in the backgroundAlso hidden but may slow the system
Example UseCapturing login infoSending user data to a hacker or company
How it works:
• The hacker puts harmful SQL code in a search box or form.
• The website doesn’t show the data directly.
• But based on the site’s response time or behavior, the hacker guesses if the injection
worked.
Website Response
Analysis
Hacker analyzes website's
response time
Behavior
Observation
Hacker observes website's
behavior
Injection Success
Guess
Hacker guesses if injection
was successful
It’s "blind" because the hacker can't directly see the results, but still finds a way to steal or
modify data.
5. What is Buffer Overflow Attack? How to minimize it?
Buffer Overflow happens when a program stores more data than a space (buffer) can hold.
The extra data can overflow into other areas and change the program’s behavior.
Cycle of Buffer Overflow
Data Exceeds
Buffer
Buffer
Overflow
Program Overflow
Behavior Occurs
Changes
Take Control of
Identify Crash Program System
Vulnerability The program Hackers gain
Hackers find a flaw malfunctions due to unauthorized access
in the system the attack to the system
Wireless NIC
Hardware enabling
Router
device connection to Wi- Directs internet traffic in
Fi. and out of the network.
Access Point
Facilitates wireless
Antenna
device connections to Sends and receives
the network. wireless signals.
Wireless Network
Short Notes:
Proxy Server:
A server that acts as a bridge between your device and the internet. It hides your IP and
improves privacy.
Uses:
Proxy Server Functionality
Enables access to
Access
blocked websites
Manages internet
Control
usage
• Anonymity
• Control internet usage
• Access blocked websites
Anonymizer:
A tool or website that hides your real identity while browsing the internet. It helps keep
you anonymous.
Cycle of Online Anonymity
1
Access
Anonymizer
User connects to the
anonymizer service.
4 2
Maintain Privacy
Hide Identity
User's online activities
Anonymizer masks the
remain private and
user's IP address.
untracked.
3
Browse
Anonymously
User navigates the
internet without
revealing their identity.
The resulting
unavailability of the System Crash
system
1
Botnet Formation
Hackers create a
network of
compromised devices.
4
Service
2
Disruption Attack Execution
Normal services are The botnet launches a
interrupted or coordinated attack.
unavailable.
3
Target Overload
The target system
becomes overwhelmed.