0% found this document useful (0 votes)
23 views

cyberunit1ch4

The document discusses various cyber threats including phishing, password cracking, keyloggers, spyware, viruses, trojan horses, backdoors, steganography, denial-of-service attacks, and SQL injection. It outlines how these attacks work, their implications, and preventive measures to protect against them. Key recommendations include using strong, unique passwords, employing anti-keylogger software, and maintaining regular system backups.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

cyberunit1ch4

The document discusses various cyber threats including phishing, password cracking, keyloggers, spyware, viruses, trojan horses, backdoors, steganography, denial-of-service attacks, and SQL injection. It outlines how these attacks work, their implications, and preventive measures to protect against them. Key recommendations include using strong, unique passwords, employing anti-keylogger software, and maintaining regular system backups.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

4.

3 PHISHING
PHISHING:

“Phishing” refers to an attack using mail programs to deceive Internet users into
disclosing confidential information that can be then exploited for illegal purposes.It
is believed that Phishing is an alternative spelling of “fishing,” as in “to fish for
information.”
 The first documented use of the word “Phishing” was in 1996
 These messages look authentic and attempt to get users to reveal their
personal information.
HOW PHISHING WORKS

1. Planning: Criminals, usually called as phishers, decide the target.

2. Setup: Once phishers know which business/business house to spoof and who
their victims.
3. Attack: the phisher sends a phony message that appears to be from a reputable
source.

4. Collection: Phishers record the information of victims entering into webpages


or pop- up windows.
5. Identity theft and fraud: Phishers use the information that they have gathered
to make illegal purchases or commit fraud.
4.4 PASSWORD CRACKING

 Password is like a key to get an entry into computerized systems like a lock.

 Password cracking is a process of recovering passwords from data that have been
stored in or transmitted by a computer system.
 Usually, an attacker follows a common approach – repeatedly making guesses for
the password.
 The purpose of password cracking is as follows:
1. To recover a forgotten password.

2. As a preventive measure by system administrators to check for easily crackable


passwords.

3. To gain unauthorized access to a system.


PASSWORD CRACKING ATTACKS CAN BE CLASSIFIED UNDER THREE CATEGORIES :
 OFFLINE ATTACKS.

 ONLINE ATTACKS

 NON-ELECTRONIC ATTACKS (e.g., social engineering, shoulder surfing and dumpster diving).

OFFLINE ATTACKS
 Mostly offline attacks are performed from a location other than the target (i.e.,
either a computer system or while on the network) where these passwords reside
or are used.
 Offline attacks usually require physical access to the computer and copying the
password file from the system onto removable media.
ONLINE ATTACKS
 The most popular online attack is man-in-the middle (MITM) attack, also termed
as “bucket- brigade attack”
 It is a form of active stealing in which the attacker establishes a connection
between a victim and the server to which a victim is connected.
 When a victim client connects to the fraudulent server, the MITM server intercepts
the call, hashes the password and passes the connection to the victim server (e.g.,
an attacker within reception range of an unencrypted Wi-Fi wireless access point
can insert himself as a man-in- the-middle).
 This type of attack is used to obtain the passwords for E-Mail accounts on public
websites such as Yahoo, Hotmail and Gmail and can also used to get the
passwords for financial websites that would like to gain the access to banking
websites.
PASSWORD GUIDELINES.

 Passwords used for business E-Mail accounts, personal E-Mail


accounts and banking/financial user accounts should be kept separate.
 Passwords should be of minimum eight alphanumeric characters.
 Passwords should be changed every 30/45 days.
 Passwords should not be shared with relatives and/or friends.
 Passwords should not be stored under mobile phones/PDAs, as these
devices are also prone to cyberattacks.
 In case E-Mail accounts/user accounts have been hacked, respective
agencies/institutes should be contacted immediately.
KEY LOGGERS
 Keystroke logging, often called keylogging, is the practice of
noting (or logging) the keys strokes on a keyboard, typically in a
covert manner so that the person using the keyboard is unaware
that such actions are being monitored.
 Keystroke logger or keylogger is quicker and easier way of
capturing the passwords and monitoring the victims’ IT savvy
behavior.
SOFTWARE KEYLOGGERS
 Software keyloggers are software programs installed on the computer systems

which usually are located between the OS and the keyboard hardware, and

every keystroke is recorded. Cybercriminals always install such tools on the

insecure computer systems available in public places (i.e., cybercafés, etc)

and can obtain the required information about the victim very easily.
 A keylogger usually consists of two files that get installed in the same directory:

a dynamic link library (DLL) file and an Executable (EXE) file that installs the

DLL file and triggers it to work. DLL does all the recording of keystrokes
HARDWARE KEYLOGGERS

 Hardware keyloggers are small hardware devices.

 These are connected to the PC and/or to the keyboard and save every
keystroke into a file or in the memory of the hardware device.
 Cybercriminals install such devices on ATM machines to capture ATM
Cards’ PINs.
 Each keypress on the keyboard of the ATM gets registered by these
keyloggers.
 These keyloggers look like an integrated part of such systems; hence,
bank customers are unaware of their presence.
 Software key-loggers : Software key-loggers are the computer programs which are developed to
steal password from the victims computer. However key loggers are used in IT organizations to
troubleshoot technical problems with computers and business networks.

1. JavaScript based key logger

2. Form Based Key loggers

 Hardware Key-loggers : These are not dependent on any software as these are hardware key-
loggers. keyboard hardware is a circuit which is attached in a keyboard itself that whenever the key of
that keyboard pressed it gets recorded.

1. USB keylogger – There are USB connector key-loggers which has to be connected to a computer and
steals the data. Also some circuits are built into a keyboard so no external wire is used or shows on
the keyboard.

2. Smartphone sensors – Some cool android tricks are also used as key loggers such as android
accelerometer sensor which when placed near to the keyboard can sense the vibrations and the
graph then used to convert it to sentences, this technique accuracy is about 80
Prevention from key-loggers : These are following below-
1.Anti-Key-logger – As the name suggest these are the software which are
anti / against key loggers and main task is to detect key-logger from a
computer system.
2.Anti-Virus – Many anti-virus software also detect key loggers and delete
them from the computer system. These are software anti-software so these
can not get rid from the hardware key-loggers.
3.Automatic form filler – This technique can be used by the user to not fill
forms on regular bases instead use automatic form filler which will give a
shield against key-loggers as keys will not be pressed .
4.One-Time-Passwords – Using OTP’s as password may be safe as every
time we login we have to use a new password.
5.Patterns or mouse-recognition – On android devices used pattern as a
password of applications and on PC use mouse recognition, mouse program
uses mouse gestures.
ANTI KEYLOGGER
Antikeylogger is a tool that can detect the keylogger installed on the computer system and can
remove the tool.
Advantages of using antikeylogger are as follows:
 Firewalls cannot detect the installations of keyloggers on the systems; hence, antikeyloggers can
detect installations of keylogger.
 This software does not require regular updates of signature bases to work effectively such as
other antivirus and antispy programs; if not updated, it does not serve the purpose, which makes
the users at risk.
 Prevents Internet banking frauds.
 It prevents ID theft.
 It secures E-Mail and instant messaging/chatting
SPYWARE
 Spyware is a type of malware (i.e., malicious software) that is installed on computers

which collects information about users without their knowledge.

 Spywares are powerful tools that can be used to protect your digital assets. They allow you

to take control of the online world by keeping a close eye on what is happening in it, both

for personal and professional use

 Parental Control is one of the main advantages of Spyware

 Spyware is a powerful tool that can do many things for you, including monitoring your

computer usage, capturing screenshots of your activity, and tracking your location

 Sometimes, however, Spywares such as keyloggers are installed by the owner of a

shared, corporate or public computer on purpose to secretly monitor other users.


4.6 VIRUS and WORMS
 Computer virus is a program that can “infect” programs by modifying them to

include a possibly “evolved” copy of itself.

 Computer virus has the ability to copy itself and infect the system.
 Viruses spread themselves, without the knowledge or permission of the users, to

potentially large numbers of programs on many machines.


 Viruses may also contain malicious instructions that may cause damage. Viruses can

often spread without any readily visible symptoms.

 A virus can start on event-driven effects (e.g., triggered after a specific number of

executions), time-driven effects (e.g., triggered on a specific date, such as Friday ) or

can occur at random.


VIRUSES CAN TAKE SOME TYPICAL ACTIONS:
 Display a message to prompt an action
 delete files inside the system into which viruses enter;
 scramble data on a hard disk, cause erratic screen

behavior;
 halt the system (PC),just replicate themselves to

propagate further harm.


4.7 TROJAN HORSES AND BACKDOORS

 Trojan Horse is a program in which malicious or harmful code is contained


inside apparently harmless programming or data in such a way that it can get
control and cause harm, for example, ruining the file allocation table on the
hard disk.
 The term Trojan Horse comes from Greek mythology about the Trojan War.

 Like Spyware and Adware, Trojans can get into the system in a number of
ways, including from a web browser, via E-Mail.
 Unlike viruses or worms, Trojans do not replicate themselves but they can be
equally destructive.
BACKDOOR
 A backdoor is a means of access to a computer program that bypasses
security mechanisms. A programmer may sometimes install a
backdoor so that the program can be accessed for troubleshooting or
other purposes.
 However, attackers often use backdoors that they detect or install
themselves as part of an exploit.
 a worm is designed to take advantage of a backdoor created by an
earlier attack.
 A backdoor works in background and hides from the user.
FOLLOWING ARE SOME FUNCTIONS OF BACKDOOR:

1. It allows an attacker to create, delete, rename, copy or edit any file, execute various

commands; change any system settings; alter the Windows registry; run, control and

terminate applications; install arbitrary software and parasites.

2. It allows an attacker to control computer hardware devices, modify related settings,

shutdown or restart a computer without asking for user permission.

3. It steals sensitive personal information, logs user activity and tracks web browsing habits.

4. It records keystrokes that a user types on a computer’s keyboard and captures

screenshots.
steps to protect your systems from Trojan Horses and backdoors:

1. Stay away from suspect websites/weblinks.

2. Surf on the Web cautiously.

3. Install antivirus/Trojan remover software.


4.8 STEGANOGRAPHY

 Steganography is the practice of concealing (hiding) a file, message, image,

or video within another file, message, image, or video. The word

steganography combines the Greek words steganos , meaning "covered,

concealed, or protected", and graphein meaning "writing".


 It is a method that attempts to hide the existence of a message or communication.

 The different names for steganography are data hiding, information hiding

and digital watermarking.


STEGANALYSIS

Steganalysis is the art and science of detecting messages that are


hidden in images, audio/video files using steganography.
The goal of steganalysis is to identify suspected packages and to
determine whether or not they have a payload encoded into them,
and if possible recover it.
 Automated tools are used to detect such steganographed
data/information hidden in the image and audio and/or video files
4.9 DOS AND DDOS ATTACKS
A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable
to its intended users.

A denial-of-service (DoS) attack is a cyber attack that aims to make a


machine or network resource unavailable to its intended users.

In this type of criminal act, the attacker floods the bandwidth of the victim’s
network or fills his E-Mail box with Spam mail depriving him of the services he is
entitled to access or provide.
The attackers typically target sites or services hosted on high-profile web servers
such as banks, credit card payment gateways, mobile phone networks and even root
name servers.Buffer overflow technique is employed to commit such kind of criminal
A DoS attack may do the following:
 Flood a network with traffic,
 Disrupt connections between two systems, thereby

preventing access to a service.


 Prevent a particular individual from accessing a

service.
 Disrupt service to a specific system or person.
CLASSIFICATION OF DOS ATTACKS

1. Bandwidth attacks: Loading any website takes certain time. Loading means
complete webpage appearing on the screen and system is awaiting user’s input.
2. Logic attacks: These kind of attacks can exploit vulnerabilities in network
software such as web server or TCP/IP .
3. Protocol attacks: Protocols here are rules that are to be followed to send data
over network.
4. Unintentional DoS attack : This is a scenario where a website ends up denied
not due to a attack by a single individual or group of individuals, but simply
due to a sudden enormous spike in popularity
HOW TO PROTECT FROM DOS/DDOS ATTACKS

1. Implement router filters. This will lessen your exposure to certain DoS attacks.
2. Disable any unused or inessential network service.

3. Observe your system’s performance and establish baselines for ordinary activity.
4. Invest in redundant and fault-tolerant network configurations.

5. Establish and maintain regular backup schedules

6. Establish and maintain appropriate password policies


4.10 SQL INJECTION

• SQL injection, is a code injection technique that allows hackers


to insert malicious SQL statements into a database.
 SQL injection is a code injection technique that exploits a

security vulnerability occurring in the database layer of an

application.
 SQL injection attacks are also known as SQL insertion attacks.

 Attackers target the SQL servers


•The single quote character ' and look for errors or other

anomalies.

•Some SQL-specific syntax that evaluates to the original value of

the entry point, and to a different value,

•look for systematic differences in the application responses.

•Boolean conditions such as OR 1=1 and look for differences in

the application's responses.


Some common SQL injection examples include:
•Retrieving hidden data, where you can modify a SQL query to return
additional results.
•Subverting application logic, where you can change a query to interfere
with the application's logic.
•UNION attacks, where you can retrieve data from different database
tables.
•Blind SQL injection, where the results of a query you control are not
returned in the application's responses.
STEPS FOR SQL INJECTION ATTACK
 . The attacker looks for the webpages that allow submitting data, that is, login

page, search page, feedback, etc.


 To check the source code of any website, right click on the webpage and click

on “view source” – source code is displayed in the notepad. The attacker checks

the source code of the HTML, and look for “FORM” tag in the HTML code.
 Everything between the <FORM> and </FORM> have potential

parameters that might be useful to find the vulnerabilities.


 <FORM action=Search/search.asp method=post>
 </FORM>
STEPS FOR SQL INJECTION ATTACK

. The attacker inputs a single quote under the text box provided on the webpage

to accept the username and password. This checks whether the user-input

variable is interpreted literally by the server. If the response is an error message

such as use “a” = “a” then the website is found to be susceptible to an SQL

injection attack.


Similar SQL commands may allow bypassing of a login and may return many rows in
a table or even an entire database table because the SQL server is interpreting the terms
literally. The double dashes near the end of the command tell SQL to ignore the rest of the
command as a comment.
BLIND SQL INJECTION

 Blind SQL injection is used when a web application is vulnerable to


an SQL injection but the results of the injection are not visible to the
attacker.
 The page with the vulnerability may not be the one that displays
data; however, it will display differently depending on the results of
a logical statement injected into the legitimate SQL statement called
for that page.
HOW TO PREVENT SQL INJECTION ATTACKS

SQL injection attacks occur due to poor website administration and coding..
 Input validation
 Replace all single quotes to two single quotes.

 sanitize the input: User input needs to be checked and cleaned of any

characters or strings that could possibly be used maliciously. For example,

character sequences such as ; , --, select, insert


 Numeric values should be checked while accepting a query string value.

 Keep all text boxes and form fields as short as possible to limit the length of

user input.
HOW TO PREVENT SQL INJECTION ATTACKS
 Use Stored Procedure, Not Dynamic SQL.
 Use Prepared Statements.
 Least Privilege.
 Input Validation.
 Character Escaping.
 Vulnerability Scanners.
 Use Web Application Firewall.
 Modify error reports: SQL errors should not be displayed to outside users

 Isolate database server and web server.


4.11 BUFFER OVERFLOW
 Buffer overflow, or buffer overrun, is an anomaly where a process

stores data in a buffer outside the memory the programmer has set

aside for it.


 Buffer overflows can be triggered by inputs that are designed to

execute code or alter the way the program operates.


 They are, thus, the basis of many software vulnerabilities and can

be maliciously exploited. Bounds checking can prevent buffer


 Programming languages commonly associated with buffer overflows include C and
C++, which provide no built-in protection against accessing or overwriting data in
any part of memory and do not automatically check that data written to an array.

 The knowledge of C, C++ or any other high-level computer language (i.e.,


assembly language) is essential to understand buffer overflow.For example,
int main () { int buffer[10];

buffer[20] = 10;}
 However, the program attempts to write beyond the allocated memory for the
buffer, which might result in an unexpected behavior.
 Types of Buffer Overflow

 Stack-Based Buffer Overflow


 Stack buffer overflow occurs when a program writes to a memory

address on the program’s call stack outside the intended data structure –

usually a fixed length buffer.


 “Stack” is a memory space in which automatic variables (and often

function parameters) are allocated.


 Function parameters are allocated on the stack and are not automatically

initialized by the system, so they usually have garbage in them until they

are initialized.
 Heap Buffer Overflow
 Heap buffer overflow occurs in the heap data area and may be introduced

accidentally by an application programmer, or it may result from a deliberate

exploit.
 “Heap” is a “free store” that is a memory space, where dynamic objects are

allocated.

Memory on the heap is dynamically allocated by the application at run-time

and normally contains program data. Exploitation is performed by corrupting

this data in specific ways to cause the application to overwrite internal

structures such as linked list pointers.


How to Minimize Buffer Overflow

Assessment of secure code manually: Buffer overflow occurs

when a program or process tries to store more data in a buffer

than it was intended to hold.


Disable stack execution

Compiler tools: Over the years, compilers have become more

and more aggressive in optimizations


Dynamic run-time checks
 4.12 Attacks on Wireless Networks

 Wireless networks are generally composed of two basic


elements
o access points (APs) and
o other wireless-enabled devices, such as laptops radio
transmitters and receivers to communicate or “connect”
with each other.
 APs are connected through physical wiring to a conventional
network, and they broadcast signals with which a wireless
The following are different types of “mobileworkers”:

1. Remote worker: This is considered to be an employee who generally remains at a

single point of work, but is remote to the central company systems.

2. Roaming user: This is either an employee who works in an environment (e.g.,

warehousing, shop floor, etc.) or in multiple areas (e.g., meeting rooms).

3. Nomad: This category covers employees requiring solutions in semi-tethered

(connected) environments where modem use frequently.

4. Road warrior: This is the ultimate mobile user and spends little time in the office;
Traditional Techniques of Attacks on Wireless Networks

In security breaches, penetration of a wireless network through

unauthorized access is termed as wireless cracking. There are

various methods that demand high level of technological skill

and knowledge, and availability of numerous software tools

made it less sophisticated with minimal technological skill to

crack WLANs.
 Denial of service (DoS
 Sniffing: The attacker usually installs the sniffers remotely on the
victim’s system and conducts activities such as Passive scanning of
wireless network
 Spoofing: The attacker often launches an attack on a wireless network
by simply creating a new network
 Man-in-the-middle attack (MITM

 Encryption cracking: Hence, the second step is to use a long and


highly randomized encryption key; this is very important. It is a little
pain to remember long random encryption; however, at the same time
these keys are much harder to crack.

You might also like