Module 2
Module 2
MODULE 2
Cyber Offenses
1
• How Criminals Plan Them: Introduction
• How criminals plan the attacks
• Social Engineering
• Cyber Stalking
• Cybercaafe & cybercrimes
• Botnets: The fuel for cybercrime
• Attack Vector
2
3 Introduction
Technology is a double edged sword as it can be used for both good and
bad purpose.
In today’s world of internet and computer networks, criminal activity can
be carried out across national borders with “false sense of anonymity”.
Cybercriminal use the World Wide Web and Internet to an optimum level
for all illegal activities to store data, contacts, account information, etc.
People who commit cybercrimes are known as “crackers”.
4 Hacker: A hacker is a person with a strong interest in computers who
enjoys learning and experimenting with them.
Cracking: It is the act of breaking into computers. Many sites are devoted
to supplying crackers with programs that allow them to crack computers.
5 Cracker tools: These are programs used to break into computers. They
include Password crackers, Trojan, Viruses, war dialers and worms.
2. Surfing online community groups like orkut/ facebook will prove useful to
gain the information about an individual.
Going through the job postings in particular job profiles for technical
persons can provide information about key type of technology, that is,
servers or infrastructure devices a company may be using on its
network.
20 Passive Attacks cont….
The network traffic is sniffed for monitoring the traffic on the network-
attacker watches the flow of data to see what time certain transactions
take place and where the traffic is going.
21 Other tools that are used for
gathering information
Google Earth: is a virtual globe, map, and geographic information
program.
The tool is used on windows and unix to query domain name system
(DNS) servers to find DNS details, including IP addresses of a particular
computer and other technical details such as small exchanger (MX)
records for a domain and name server (NS) servers of a domain.
Website Watcher: the tool can be used to keep the track of favorite
websites for an update.
DNStracer: This is a tool determine the data source for a given DNS
server and follow the chain of DNS servers back to the authoritative
sources.
Filesnarf: this is network auditing tool to capture files transfers and file
sharing traffic on a local subnet.
33 FindSMB: this is used to find and describe server message block (SMB)
servers on the local subnet.
I shows how long a URL will take to connect, send a request, and receive
a reply.
Netcat: this is a utility to read and write custom TCP/ User Datagram
Protocol (UDP) data packets across a network debugging or exploration.
Nikto: This is a web server vulnerability scanner that rests over 2,600
potentially dangerous files/ CGIs on over 625 types of servers.
This tool also performs comprehensive tests against web servers for
multiple items and version-specific problems on over 230 servers. Scan
items and plugins are frequently updated and can be automatically
updated (if desired).
40 Nmap: This is a port scanner, operating system fingerprinter,
service/version identifier, and much more.
It is a open-source/ free software suite that has, since 1992, provided file
and print services to all types of SMB/ common Internet file system
(CIFS) clients, including the numerous versions of Microsoft Windows
operating systems.
It gives you the ability to use previously captured traffic to test a variety
of network devices.
44
TCPreplay supports both single and dual NIC modes for testing both
sniffing and inline devices.
TCP/IP Protocol suite made out of the two protocols, TCP and UDP, is
used universally to communicate on the internet.
Each of these has ports 0 through 65536 (i.e., the range is from 2 0 to 216
Some ports have numbers that are preassigned to them by the Internet
Assigned Numbers Authority (IANA), an organization working under the
auspices of the Internet Architecture Board (IAB), responsible for
assigning new Internet-wide IP addresses.
A port is a place where information goes into and out of a computer and
so, with port scanning, one can identify open doors to a computer.
Ports are basically entry/exit points that any computer has to be able to
communicate with external machines.
These are ports used by the computer to communicate with the other
computers, printer, modem, mouse, video game, scanner, and other
peripherals.
54 Port Scanning cont....
The important characteristic about these external ports is that they are
indeed external and visible to the naked eye.
Ports 20 and 21- File Transfer Protocols (FTP)-are used for uploading
and downloading of information.
Port 23- Telnet Protocol – is used to connect directly to remote host and
Internet control message.
Closed ports present only the latter of the two vulnerabilities that open ports
do.
An example is calling the help desk and trying to find out a password.
66 Human –Based Social Engineering
cont..
1. Impersonating an employee or valid user:
“Impersonation “ (eg. Posting oneself as an employee of
the same organization) is perhaps the greatest technique
used by social engineers to deceive people.
5. Shoulder surfing:
It is a technique of gathering information such
as usernames and passwords by watching
over a person’s shoulder while he/she logs
into the system, thereby helping an attacker
to gain access to the system.
72 Human –Based Social Engineering
cont..
6. Dumpster diving:
It involves looking in the thrash for information
written on pieces of paper or computer
printouts.
6. Dumpster diving:
it is also called dumpstering, binning, trashing,
garbing or garbage gleaning, scavanging etc.
6. Dumpster diving:
For example, going through someone’s trash
to recover documentation of his/her critical
data [eg. Social security number (SSN) in the
US, PAN number in India, credit card identity
(ID) numbers etc.]
75 Human–Based Social Engineering
cont..
6. Dumpster diving:
According to the definition in the glossary of
terms for the convoluted terminology of
information warfare, “scavanging” means
searching through object residue
(eg.,discarded disks, tapes, or paper) to
acquire sensitive data without authorization.
76 Computer-Based Social
Engineering
It refers to an attempt made to get the
required/ desired information by using
computer software/Internet.
They aim to start the interaction with the victim directly with the help of the internet
email and chat rooms are the most popular communication medium to get
communicated with the victim rather, than using traditional instrumentation Like
telephone/cell phone. The stalker make sure that the victim recognizes the attack
attempted on him/her .The stalker can make use of a third party to harass the victim
Offline stalkers
The stalker may begin the attack using traditional methods such as the
following victim watching the daily routine of the victim etc searching on
message boards or news groups personal website and people finding services
or websites are most common ways to gather information about the victim
using the internet .
How Stalking works
It is seen that stalking works in the following ways
Personal information gathering about the victim; name; family background;
contact details such as cell phone and telephone numbers ;address of
Residence as well as of the office ;email address ; date of birth, etc .
Establish a contact with the victim through telephone or cell phone. Once the
contact is established, the stalker may make calls to the victim to threaten or
harass .
Stalker will almost always establish a contact with the victims through email .
Some stalkers keep on sending repeated email asking for various kinds of
favors or threaten the victim.
88 Real-Life Incident of Cyberstalking
The Indian police have registered first case of cyberstalking in Delhi –in brief
account of the case has been mentioned here, To maintain confidentiality and
privacy.
Mrs. Joshi received almost 40 calls in 3days mostly at odd hours from as far away
as cochin, Bombay and Ahmadabad.
the said calls created Havoc in the personal life destroying mental peace of Mrs.
Joshi who decided to register a complaint with Delhi police.
A person was using her ID to chat over the internet at the website
www.mirc.com, mostly in the Delhi channel for four consecutive days.
89 Real-Life Incident of Cyberstalking cont....
This person was chatting on the internet, using her name and giving her address,
talking in absence language.
The same person was also deliberately giving her telephone number to other
chatters encouraging them to call Mrs. Joshi at odd hours
This was the first time when a case of cyber stalking was registered.
Cyberstalking does not have a standard definition but it can be defined to mean
threatening, unwarranted behaviour or advance directed by one persons toward
another person using internet and other forms of online communication channel
as medium.
90 Cybercafe and Cybercrimes: Facts
Pirated softwares are installed in all the computers.
Cybercafe owners have very less awareness about IT security and IT governance.
Antivirus software is found to be not updated to the latest patch and /or antivirus.
1. Cybercafe association or state police ( cyber cell wing) do not conduct regular
visits to cybercafes.
2. Several cybercafes had installed the software called “deep freeze” for protecting
the computer from prospective malware attacks.
3. Not having the AMC(Annual maintenance contract) is a risk from cybercrime
perspective because a cybercriminal can install a malicious code on a computer
and conduct criminal activities without any interruption.
4. Government/ISPs/State Police do not seem to provide IT governance guidelines
to cybercafe owners.
91 Tips for safety and security while using
the computer in a cybercafe:
1. Always logout: while checking E-Mails or logging into chatting services such as
instant messaging or using any other service that requires a username and a
password, always click “logout” or “signout” before leaving the system.
2. Stay with the computer: while surfing/browsing, one should not leave the
system unattended for any period of time. If one has to go out, logout and close
all browser windows.
3. Clear history and temporary files.
4. Be alert: one should have to stay alert and aware of the surroundings while using
a public computer. Snooping over the shoulder is an easy way of getting your
username and password.
92 Tips for safety and security while using
the computer in a cybercafe: cont....
5. Avoid online financial transactions: ideally one should avoid online banking,
shopping, or other transactions that require one to provide personal, confidential
and sensitive information such as credit card or bank account details.
6. Change passwords.
7. Virtual keyboard: Nowadays almost every bank has provided the virtual
keyboard on their website.
8. Security warnings: one should take utmost care while accessing the websites
of any banks/financial institution. The security warnings should be followed while
accessing these financial accounts from cybercafe.
93 BOTNETS: THE FUEL FOR CYBERCRIME
BOTNET:
An automatic program for doing some particular task, often
over a network.
Then scan the entire system with fully updated antivirus and anti-
Spyware software.
The defense method that is effective today may not remain so for long
because attackers are constantly updating attack vectors, and seeking
new ones, in their quest to gain unauthorized access to computers and
servers.
111 Attack Vector
In the context of attack vector payload means the malicious activity that
the attack performs.
112 Attack Vector
Payload is the bits that get delivered to the end-user at the destination.
113 Attack Vector: based on how they
are launched
1. Attack by E-Mail:
The hostile content is either embedded in the message or linked to buy
the message.
The code could be a virus, Trojan horse, Spyware, or any other kind
of malware.
Social engineering and hoaxes are other forms of deception that are
often an attack vector too.
117 Attack Vector: based on how they
are launched
4. Hackers:
Hackers/crackers are a formidable attack vector because, unlike
ordinary Malicious Code, people are flexible and they can improvise.
They often install a Trojan Horse to commandeer the computer for their
own use.
118 Attack Vector: based on how they
are launched
5. Heedless guests (attack by webpage):
Counterfeit websites are used to extract personal information.
Such websites look very much like the genuine websites they initiate.
They are often used in conjunction with Spam, which gets you there in
the first place.