cyberunit1ch4
cyberunit1ch4
3 PHISHING
PHISHING:
“Phishing” refers to an attack using mail programs to deceive Internet users into
disclosing confidential information that can be then exploited for illegal purposes.It
is believed that Phishing is an alternative spelling of “fishing,” as in “to fish for
information.”
The first documented use of the word “Phishing” was in 1996
These messages look authentic and attempt to get users to reveal their
personal information.
HOW PHISHING WORKS
2. Setup: Once phishers know which business/business house to spoof and who
their victims.
3. Attack: the phisher sends a phony message that appears to be from a reputable
source.
Password is like a key to get an entry into computerized systems like a lock.
Password cracking is a process of recovering passwords from data that have been
stored in or transmitted by a computer system.
Usually, an attacker follows a common approach – repeatedly making guesses for
the password.
The purpose of password cracking is as follows:
1. To recover a forgotten password.
ONLINE ATTACKS
NON-ELECTRONIC ATTACKS (e.g., social engineering, shoulder surfing and dumpster diving).
OFFLINE ATTACKS
Mostly offline attacks are performed from a location other than the target (i.e.,
either a computer system or while on the network) where these passwords reside
or are used.
Offline attacks usually require physical access to the computer and copying the
password file from the system onto removable media.
ONLINE ATTACKS
The most popular online attack is man-in-the middle (MITM) attack, also termed
as “bucket- brigade attack”
It is a form of active stealing in which the attacker establishes a connection
between a victim and the server to which a victim is connected.
When a victim client connects to the fraudulent server, the MITM server intercepts
the call, hashes the password and passes the connection to the victim server (e.g.,
an attacker within reception range of an unencrypted Wi-Fi wireless access point
can insert himself as a man-in- the-middle).
This type of attack is used to obtain the passwords for E-Mail accounts on public
websites such as Yahoo, Hotmail and Gmail and can also used to get the
passwords for financial websites that would like to gain the access to banking
websites.
PASSWORD GUIDELINES.
which usually are located between the OS and the keyboard hardware, and
and can obtain the required information about the victim very easily.
A keylogger usually consists of two files that get installed in the same directory:
a dynamic link library (DLL) file and an Executable (EXE) file that installs the
DLL file and triggers it to work. DLL does all the recording of keystrokes
HARDWARE KEYLOGGERS
These are connected to the PC and/or to the keyboard and save every
keystroke into a file or in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM
Cards’ PINs.
Each keypress on the keyboard of the ATM gets registered by these
keyloggers.
These keyloggers look like an integrated part of such systems; hence,
bank customers are unaware of their presence.
Software key-loggers : Software key-loggers are the computer programs which are developed to
steal password from the victims computer. However key loggers are used in IT organizations to
troubleshoot technical problems with computers and business networks.
Hardware Key-loggers : These are not dependent on any software as these are hardware key-
loggers. keyboard hardware is a circuit which is attached in a keyboard itself that whenever the key of
that keyboard pressed it gets recorded.
1. USB keylogger – There are USB connector key-loggers which has to be connected to a computer and
steals the data. Also some circuits are built into a keyboard so no external wire is used or shows on
the keyboard.
2. Smartphone sensors – Some cool android tricks are also used as key loggers such as android
accelerometer sensor which when placed near to the keyboard can sense the vibrations and the
graph then used to convert it to sentences, this technique accuracy is about 80
Prevention from key-loggers : These are following below-
1.Anti-Key-logger – As the name suggest these are the software which are
anti / against key loggers and main task is to detect key-logger from a
computer system.
2.Anti-Virus – Many anti-virus software also detect key loggers and delete
them from the computer system. These are software anti-software so these
can not get rid from the hardware key-loggers.
3.Automatic form filler – This technique can be used by the user to not fill
forms on regular bases instead use automatic form filler which will give a
shield against key-loggers as keys will not be pressed .
4.One-Time-Passwords – Using OTP’s as password may be safe as every
time we login we have to use a new password.
5.Patterns or mouse-recognition – On android devices used pattern as a
password of applications and on PC use mouse recognition, mouse program
uses mouse gestures.
ANTI KEYLOGGER
Antikeylogger is a tool that can detect the keylogger installed on the computer system and can
remove the tool.
Advantages of using antikeylogger are as follows:
Firewalls cannot detect the installations of keyloggers on the systems; hence, antikeyloggers can
detect installations of keylogger.
This software does not require regular updates of signature bases to work effectively such as
other antivirus and antispy programs; if not updated, it does not serve the purpose, which makes
the users at risk.
Prevents Internet banking frauds.
It prevents ID theft.
It secures E-Mail and instant messaging/chatting
SPYWARE
Spyware is a type of malware (i.e., malicious software) that is installed on computers
Spywares are powerful tools that can be used to protect your digital assets. They allow you
to take control of the online world by keeping a close eye on what is happening in it, both
Spyware is a powerful tool that can do many things for you, including monitoring your
computer usage, capturing screenshots of your activity, and tracking your location
Computer virus has the ability to copy itself and infect the system.
Viruses spread themselves, without the knowledge or permission of the users, to
A virus can start on event-driven effects (e.g., triggered after a specific number of
behavior;
halt the system (PC),just replicate themselves to
Like Spyware and Adware, Trojans can get into the system in a number of
ways, including from a web browser, via E-Mail.
Unlike viruses or worms, Trojans do not replicate themselves but they can be
equally destructive.
BACKDOOR
A backdoor is a means of access to a computer program that bypasses
security mechanisms. A programmer may sometimes install a
backdoor so that the program can be accessed for troubleshooting or
other purposes.
However, attackers often use backdoors that they detect or install
themselves as part of an exploit.
a worm is designed to take advantage of a backdoor created by an
earlier attack.
A backdoor works in background and hides from the user.
FOLLOWING ARE SOME FUNCTIONS OF BACKDOOR:
1. It allows an attacker to create, delete, rename, copy or edit any file, execute various
commands; change any system settings; alter the Windows registry; run, control and
3. It steals sensitive personal information, logs user activity and tracks web browsing habits.
screenshots.
steps to protect your systems from Trojan Horses and backdoors:
The different names for steganography are data hiding, information hiding
In this type of criminal act, the attacker floods the bandwidth of the victim’s
network or fills his E-Mail box with Spam mail depriving him of the services he is
entitled to access or provide.
The attackers typically target sites or services hosted on high-profile web servers
such as banks, credit card payment gateways, mobile phone networks and even root
name servers.Buffer overflow technique is employed to commit such kind of criminal
A DoS attack may do the following:
Flood a network with traffic,
Disrupt connections between two systems, thereby
service.
Disrupt service to a specific system or person.
CLASSIFICATION OF DOS ATTACKS
1. Bandwidth attacks: Loading any website takes certain time. Loading means
complete webpage appearing on the screen and system is awaiting user’s input.
2. Logic attacks: These kind of attacks can exploit vulnerabilities in network
software such as web server or TCP/IP .
3. Protocol attacks: Protocols here are rules that are to be followed to send data
over network.
4. Unintentional DoS attack : This is a scenario where a website ends up denied
not due to a attack by a single individual or group of individuals, but simply
due to a sudden enormous spike in popularity
HOW TO PROTECT FROM DOS/DDOS ATTACKS
1. Implement router filters. This will lessen your exposure to certain DoS attacks.
2. Disable any unused or inessential network service.
3. Observe your system’s performance and establish baselines for ordinary activity.
4. Invest in redundant and fault-tolerant network configurations.
application.
SQL injection attacks are also known as SQL insertion attacks.
anomalies.
on “view source” – source code is displayed in the notepad. The attacker checks
the source code of the HTML, and look for “FORM” tag in the HTML code.
Everything between the <FORM> and </FORM> have potential
. The attacker inputs a single quote under the text box provided on the webpage
to accept the username and password. This checks whether the user-input
such as use “a” = “a” then the website is found to be susceptible to an SQL
injection attack.
Similar SQL commands may allow bypassing of a login and may return many rows in
a table or even an entire database table because the SQL server is interpreting the terms
literally. The double dashes near the end of the command tell SQL to ignore the rest of the
command as a comment.
BLIND SQL INJECTION
SQL injection attacks occur due to poor website administration and coding..
Input validation
Replace all single quotes to two single quotes.
sanitize the input: User input needs to be checked and cleaned of any
Keep all text boxes and form fields as short as possible to limit the length of
user input.
HOW TO PREVENT SQL INJECTION ATTACKS
Use Stored Procedure, Not Dynamic SQL.
Use Prepared Statements.
Least Privilege.
Input Validation.
Character Escaping.
Vulnerability Scanners.
Use Web Application Firewall.
Modify error reports: SQL errors should not be displayed to outside users
stores data in a buffer outside the memory the programmer has set
buffer[20] = 10;}
However, the program attempts to write beyond the allocated memory for the
buffer, which might result in an unexpected behavior.
Types of Buffer Overflow
address on the program’s call stack outside the intended data structure –
initialized by the system, so they usually have garbage in them until they
are initialized.
Heap Buffer Overflow
Heap buffer overflow occurs in the heap data area and may be introduced
exploit.
“Heap” is a “free store” that is a memory space, where dynamic objects are
allocated.
Memory on the heap is dynamically allocated by the application at run-time
4. Road warrior: This is the ultimate mobile user and spends little time in the office;
Traditional Techniques of Attacks on Wireless Networks
crack WLANs.
Denial of service (DoS
Sniffing: The attacker usually installs the sniffers remotely on the
victim’s system and conducts activities such as Passive scanning of
wireless network
Spoofing: The attacker often launches an attack on a wireless network
by simply creating a new network
Man-in-the-middle attack (MITM