0% found this document useful (0 votes)
63 views31 pages

Chapter 4 - Cyber Security

The document discusses various tools and methods used for cybercrime including reconnaissance, network probing, password cracking, keyloggers, viruses, trojans, backdoors, and denial of service attacks. Reconnaissance involves gathering information about a target through legitimate means. Later steps involve gaining access to networks and systems and stealing data while covering tracks. Common password cracking techniques and ways to create strong passwords are also outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views31 pages

Chapter 4 - Cyber Security

The document discusses various tools and methods used for cybercrime including reconnaissance, network probing, password cracking, keyloggers, viruses, trojans, backdoors, and denial of service attacks. Reconnaissance involves gathering information about a target through legitimate means. Later steps involve gaining access to networks and systems and stealing data while covering tracks. Common password cracking techniques and ways to create strong passwords are also outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Cyber Security & Cyber Crime

Lesson 4: Tools and Methods Used in Cybercrime

Prof. P. S. Avadhani
M. Tech., PhD., F.I.E,FCSI, FAPAS.

Former Director, IIIT, Agartala


Former Principal, AU College of Engg,
Andhra University, Visakhapatnam
1. Initial uncovering: In the first step called as
reconnaissance, the attacker gathers information, as
much as possible, about the target by legitimate means.
2. In the second step, the attacker uncovers as much
information as possible on the company’s internal
network.
2. Network probe: A “ping sweep” of the network IP
addresses is performed to seek out potential targets, and
then a “port scanning” tool is used to discover exactly
which services are running on the target system.
3. Crossing the line toward electronic crime (E-crime):
Now the attacker is toward committing what is technically
a “computer crime” by exploiting possible holes on the
target system.
4. Capturing the network: At this stage, the attacker
attempts to “own” the network. The attacker gains a
foothold in the internal network quickly and easily.
5. Grab the data: Now that the attacker has “captured
the network,” he/she takes advantage of his/her position
to steal confidential data, customer credit card
information, deface webpages, alter processes and even
launch attacks at other sites from your network.
6. Covering tracks: This is the last step in any
cyberattack, which refers to the activities undertaken by
the attacker to extend misuse of the system without being
detected.
Proxy Servers and Anonymizers
Proxy server is a computer on a network which acts as an
intermediary for connections with other computers on that
network with the following purposes:
1. Keep the systems behind the curtain.
2. Speed up access to a resource (through “caching”).
3. Specialized proxy servers are used to filter unwanted
content such as advertisements.
4. Proxy server can be used as IP address multiplexer to
enable to connect number of computers on the Internet,
whenever one has only one IP address.
An anonymizer or an anonymous proxy is a tool that
attempts to make activity on the Internet untraceable.
It accesses the Internet on the user’s behalf, protecting
personal information by hiding the source computer’s
identifying information.
Phishing
Phishing is a fake or false e-mail which can infect
systems with in addition to stealing personal and
financial data.

How Phishing Works?


Phishers work in the following ways: (1) Planning
(decide the target), (2) Setup (create methods for
delivering the message and to collect the data about the
target), (3) Attack (phisher sends a phony message), (4)
Collection (record the information of victims), (5)
Identity theft and fraud (use the information that they
have gathered to make illegal purchases or commit
fraud).
Password Cracking: is a process of recovering passwords
from data that have been stored in or transmitted by a
computer system. Guessable passwords include:
1. Blank (none);
2. the words like “password,” “passcode” and “admin”;
3. series of letters from the “QWERTY” keyboard, for
example, qwerty, asdf or qwertyuiop;
4. user’s name or login name;
5. name of user’s friend/relative/pet;
6. user’s birthplace or date of birth of user/ friend/ relatves;
7. user’s vehicle /office/residence/mobile number;
8. names of a celebrity of the user like actors/actress;
9. simple modification of one of the preceding, such as
suffixing a digit, particularly 1, or reversing the order of
letters.
Password cracking attacks can be classified as three
categories: 1. Online attacks; 2. offline attacks;
3. non-electronic attacks (e.g., social engineering,
shoulder surfing and dumpster diving).
Online Attacks: The most popular online attack is man-
in-the middle (MITM) attack, also termed as “bucket-
brigade attack” or sometimes “Janus attack.”
It is a form of active eavesdropping in which the
attacker establishes a connection between a victim and
the server to which a victim is connected.
Offline Attacks: Offline attacks usually require physical
access to the computer and copying the password file
from the system onto removable media
Strong, Weak and Random Passwords
A weak password is one, which could be easily guessed,
short, common and a system default password that could
be easily found by executing a brute force attack and by
using a subset of all possible passwords.
A strong password is long enough, random or otherwise
difficult to guess, producible only by its own user.
Random Passwords: Password is stronger if it includes a
mix of upper and lower case letters, numbers and other
symbols, when allowed, for the same number of characters.
The general guidelines are: Keyloggers and Spywares
Keystroke logging is practice of noting (or logging) the
keys struck on a keyboard. Key (stroke) logger is quicker
and easier way of capturing the passwords and monitoring
the victims’ IT savvy behavior. It can be classified as
software keylogger and hardware keylogger.
Software Keyloggers: are software programs installed on
the computer systems which usually are located between
the OS and the keyboard hardware, and every keystroke is
recorded.
 A keylogger usually consists of two files that get
installed in the same directory: a dynamic link library
(DLL) file and an EXEcutable (EXE) file that installs the
DLL file and triggers it to work.
Hardware Keyloggers: are small hardware devices
connected to the PC and/or to the keyboard and save every
keystroke into a file or in the memory of the hardware
device.
These keyloggers look like an integrated part of such
systems; hence, bank customers are unaware of their
presence.
Antikeylogger: is a tool that can detect the keylogger
installed on the computer system and also can remove the
tool.
1. Firewalls cannot detect the installations of keyloggers
on the systems; hence, antikeyloggers can detect
installations of keylogger.
2. This software does not require regular updates of
signature bases to work effectively such as other
antivirus and antispy programs.
3. Prevents Internet banking frauds.
4. It prevents ID theft.
5. It secures E-Mail and instant messaging/chatting.
Spyware: is malicious software secretly installed on the
user’s personal computer. Spywares such as keyloggers are
installed by the owner of a shared, corporate or public
computer on purpose to secretly monitor other users.
Virus and Worms
Computer virus is a program that can “infect”
legitimate programs by modifying them to include a
possibly “evolved” copy of itself. Viruses can take
some typical actions:
1. Display a message to prompt an action which
may set of the virus;
2. delete files inside the system into which viruses
enter;
3. scramble data on a hard disk;
4. cause erratic screen behavior;
5. halt the system (PC);
6. just replicate themselves to propagate further
harm.
Types of Viruses
Computer viruses can be categorized based on attacks on
various elements of the system and can put the system and
personal data on the system in danger.
1.Boot sector viruses
2.Program viruses
3.Multipartite viruses
4.Stealth viruses
5.Polymorphic viruses
6.Macroviruses
7.Active X and Java Control
A computer worm is a self-replicating malware
computer program which uses a computer network to
send copies of itself to other nodes (computers on the
network) and it may do so without any user intervention
Trojan Horse: is a program in which malicious or
harmful code is contained inside apparently harmless
programming or data in such a way that it can get
control and cause harm.
Trojans can get into the system in a number of ways,
including from a web browser, via E-Mail or in a
bundle with other software downloaded from the
Internet.
o Unlike viruses or worms, Trojans do not replicate
themselves but they can be equally destructive.
o On the surface, Trojans appear benign and
harmless, but once the infected code is executed,
Trojans kick in and perform malicious functions to
harm the computer system without the user’s
knowledge.
Backdoor: is a means of access to a computer program
that bypasses security mechanisms.
A programmer may sometimes install a backdoor so
that the program can be accessed for troubleshooting
or other purposes.
An attackers often use backdoors that they detect or
install themselves as part of an exploit.
In some cases, a worm is designed to take advantage
of a backdoor created by an earlier attack.

How to Protect from Trojan Horses and Backdoors


1.Stay away from suspect websites/weblinks
2.Surf on the Web cautiously
3.Install antivirus/Trojan remover software
Steganography: is a method that attempts to hide the
existence of a message or communication.
The word “steganography” comes from the two Greek
words: steganos meaning “covered” and graphein
meaning “to write” that means “concealed writing.”
Steganalysis: is the art and science of detecting
messages that are hidden in images, audio/video files
using steganography.
Automated tools are used to detect such
steganographed data/information hidden in the image
and audio and/or video files.
DoS and DDoS Attacks: A denial-of-service attack
(DoS attack) or distributed denial-of-service attack
(DDoS attack) is an attempt to make a computer resource
unavailable to its intended users.
DoS Attacks
The attacker floods the bandwidth of the victim’s network
or fills his E-Mail box with Spam mail depriving him of
the services he is entitled to access or provide.
The goal of DoS is not to gain unauthorized access to
systems or data, but to prevent intended users (i.e.,
legitimate users) of a service from using it.
1. Flood a network with traffic, thereby preventing
legitimate network traffic.
2. Disrupt connections between two systems, thereby
preventing access to a service.
3. Prevent a particular individual from accessing a
service.
4. Disrupt service to a specific system or person.
DDoS Attacks: In this, an attacker may use or take control of
your computer to attack another computer by taking
advantage of security vulnerabilities or weaknesses. He/she
could then force your computer to send huge amounts of
data to a website or send Spam to particular E-Mail
addresses.
DDoS attack is a distributed DoS wherein a large number of
zombie systems are synchronized to attack a particular
system. The zombie systems are called “secondary victims”
and the main target is called “primary victim.”
DDoS attacks involves hardcoding the target IP address
prior to release of the malware, hence no further
interaction is necessary to launch the attack.
A system may also be compromised with a Trojan,
allowing the attacker to download a zombie agent.
How to Protect from DoS/DDoS Attacks
1. Implement router filters.
2. If such filters are available for your system, install patches
to guard against TCP SYN flooding.
3. Disable any unused or inessential network service.
4. Enable quota systems on your OS if they are available.
5. Observe your system’s performance and establish
baselines for ordinary activity
6. Routinely examine your physical security with regard to
your current needs.
7. Use Tripwire or a similar tool to detect changes in
configuration information or other files.
8. Invest in and maintain “hot spares” – machines that can
be placed into service quickly if a similar machine is
disabled.
How to Protect from DoS/DDoS Attack

9. Invest in redundant and fault-tolerant network


configurations.
10. Establish and maintain regular backup schedules
and policies, particularly for important configuration
information.
11. Establish and maintain appropriate password
policies, especially access to highly privileged
accounts such as Unix root or Microsoft Windows
NT Administrator.
SQL Injection: is a code injection technique that exploits a
security vulnerability occurring in the database layer of an
application.
The vulnerability is present when user input is either
filtered incorrectly for string literal escape characters
embedded in SQL statements or user input is not strongly
typed and thereby unexpectedly executed.
Attackers target the SQL servers, common database servers
used by many organizations to store confidential data.
During an SQL injection attack, Malicious Code is inserted
into a web form field or website’s code to make a system
execute a command shell or other arbitrary commands.
Just as a legitimate user enters queries and additions to the
SQL database via a web form, the attacker can insert
commands to the SQL server through the same web form
field.
Blind SQL Injection
Blind SQL injection is used when a web application
is vulnerable to an SQL injection, but the results of
the injection are not visible to the attacker.
The page with the vulnerability may not be the one
that displays data; however, it will display differently
depending on the results of a logical statement
injected into the legitimate SQL statement called for
that page.
Using SQL injections, attackers can:
1. Obtain some basic information if the purpose of the
attack is reconnaissance
2. May gain access to the database by obtaining
username and their password
3. Add new data to the database
4. Modify data currently in the database
How to Prevent SQL Injection Attacks
SQL injection attacks occur due to poor website
administration and coding. The following steps can be taken
to prevent SQL injection.
1.Input validation 2. Modify error reports
3. Other preventions
The default system accounts for SQL server 2000 should
never be used.
Isolate database server and web server. Both should reside
on different machines.
Most often attackers may make use of several extended
stored procedures such as xp_cmdshell and xp_grantlogin
in SQL injection attacks. In case such extended stored
procedures are not used or have unused triggers, stored
procedures, user-defined functions, etc., then these should
be moved to an isolated server.
Buffer Overflow
Buffer overflow occurs when a program or process
tries to store more data in a buffer (temporary data
storage area) than it was intended to hold.
As buffers are created to contain a finite amount of
data, the extra information can overflow into adjacent
buffers, corrupting or overwriting the valid data held
in them.
Although it may occur accidentally through
programming error, buffer overflow is an
increasingly common type of security attack on data
integrity.
Types of Buffer Overflow
Stack-Based Buffer Overflow: occurs when a program writes
to a memory address on the program’s call stack outside the
intended data structure, usually a fixed length buffer.
The attacker may exploit stack-based buffer overflows to
manipulate the program in various ways by overwriting.
NOPs: NOP or NOOP (no peration or no operation
performed) is an assembly language which enables the
developer to force memory alignment to act as a place holder
to be replaced by active instructions later on in program
development.
 NOP opcode can be used to form an NOP slide, which
allows code to execute when the exact value of the
instruction pointer is indeterminate.
Heap Buffer Overflow: occurs in the heap data area when an
application copies more data into a buffer than it is designed
How to Minimize Buffer Overflow
The following methods will definitely help to minimize
such attacks:
1.Assessment of secure code manually
2.Disable stack execution
3.Compiler tools
4.Dynamic run-time checks
5.Tools used for detecting/defending buffer overflow
Attacks on Wireless Networks
Even when people travel, they still need to work. The
employee is no longer tied to an office location and is,
in effect, “boundaryless.” The following are different
types of “mobile workers”:
1.Tethered/remote worker 2. Roaming user
2.Nomad 4. Road warrior
Wireless networks extend the range of traditional
wired networks by using radio waves to transmit data
to wireless-enabled devices such as laptops and PDAs.
Wireless networks are generally composed of two
basic elements:
(a)access points (APs)
(b)other wireless-enabled devices, such as laptops
radio transmitters and receivers to communicate or
“connect” with each other (see Fig. 1).
Traditional Techniques of Attacks on Wireless
Networks
Penetration of a wireless network through
unauthorized access is termed as wireless cracking.
There are various methods that demand high level of
technological skill and knowledge, and availability of
numerous software tools made it less sophisticated
with minimal technological skill to crack WLANs.
1.Sniffing
2.Spoofing
3.Denial of service (DoS)
4.Man-in-the-middle attack (MITM)
5.Encryption cracking
Theft of Internet Hours and Wi-Fi-based Frauds and
Misuses
Wireless network into homes enables the Internet on
the finger tip of home users.
In case, unfortunately, he/she visits a malicious
webpage, the router is exposed for an attack.
As the networks become stronger and more prevalent,
more of the signals are available outside the home of
the subscriber, spilling over into neighbor’s
apartments, hallways and the street.
Be careful with use of WAPs; when you are using a
WAP to gain access to computer on a network
be aware of the local laws/legislations where you are
doing it because things can become dangerous from
security and privacy as well legal perspective.
Following summarized steps will help to improve and
strengthen the security of wireless network:
1. Change the default settings of all the
equipments/components of wireless network (e.g., IP
address/ user IDs/administrator passwords, etc.).
2. Enable WPA/WEP encryption. 3. Change the default
SSID. 4. Enable MAC address filtering.
5. Disable remote login. 6. Disable SSID broadcast.
7. Disable the features that are not used in the AP (e.g.,
printing/music support).
8. Avoid providing the network a name which can be easily
identified (e.g., My_Home_Wifi ).
9. Connect only to secured wireless network (i.e., do not
autoconnect to open Wi-Fi hotspots).
10. Upgrade router’s firmware periodically.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy