ICS Module-2
ICS Module-2
⚫ Google Earth
⚫ WHOIS
⚫ Nslookup (name server lookup)
⚫ Dnsstuff
⚫ eMailTrackerPro
⚫ Website Watcher
⚫Active Attack
Fake E-mail
E-mail attachments
Pop-up windows
Cyberstalking
Offline stalkers
⚫ Online stalkers :
They aim to start the interaction with the victim
the victim.
⚫ Offline stalkers :
The stalker may begin the attack using traditional
websites,
personal websites.
The victim is not aware that the Internet has
always click
logout/sign out.
⚫ Stay with the computer
While surfing, don’t leave the system unatteneded
Browser -
> Tools -> Internet options -> Content tab.
Tools -> Internet Option -> General Tab ->
card
number or bank account details.
⚫ Change Passwords / Virtual Keyboard
Change password after completion of transaction.
⚫ Security Warnings
Follow security warning while accessing any bank
websites.
Botnet
⚫ The meaning of botnet is “an
automated program for doing some
particular task, over a network”.
⚫ Botnet term is used for collection of
software that run autonomously and
automatically.
⚫ Botnets are exploited for various
purposes, including denial-of-service
attacks, creation or misuse of SMTP mail
relays for spam, click fraud, and financial
information such as credit card numbers.
⚫ In short, a botnet is a network of
computers infected with a malicious
program that allows cybercriminals to
control the infected machines remotely
without the users’ knowledge.
⚫ A Botnet is also called a zombie
network.
How a botnet is created and
used
⚫ A botnet operator sends out viruses or
worms, infecting ordinary users' computers,
whose payload is a malicious application—
the bot.
⚫ The bot on the infected PC logs into a
particular C&C server (often an IRC server,
but, in some cases a web server).
⚫ A spammer purchases the services of the
botnet from the operator.
Botne
Botnet
t
rentin selling
g
Malware Stealing
Phishin
Ddos Spam and confidenti Spamdexi
g
attacks attacks Adware al ng
attack
installation informatio
s
n
Selling
Selling Selling
internet
credit card personal
services
and bank identity
and shops
account informatio
account
details n
Points to secure the
system :
⚫ Use antivirus and anti-Spyware software and
keep it up-to-date.
⚫ Set the OS to download and install security
patches automatically.
⚫ Use a firewall to protect the system from
hacking attacks while it is connected on the
internet.
⚫ Disconnected from the internet when you are
away from your computer.
⚫ Downloading the freeware only from
websites that are known and trustworthy.
⚫ Check regularly the folders in the mail
box for those messages you did not
send.
⚫ Take an immediate action if your
system is infected.
Attack Vector
⚫ An attack vector is a path by which an
attacker can gain access to a computer or
to a network server to deliver a payload.
⚫ Attack vectors enable attackers to exploit
system vulnerability.
⚫ Attack vectors include viruses, e-mail
attachments, webpages, pop-up windows,
instant messages, and chat rooms.
⚫ The most common malicious payloads are
viruses, trojan horses, worms and spyware.