Attacks
Attacks
Computer network that are currently connected to the internet are vulnerable to a variety of exploits
that can compromise their intended operations.
Types of attacks
1. Human based :- Human based refers to person to person interactions to retrieve the desired
information.
2. Computer Based:-Computer based refers to having computer software that attempts to retrieve
the desired information.
Countermeasures :-
The best way to defense against Social Engineering attacks combines raising the Bar of awareness
among student . Faculty & staff. Coupled with a sense of Personal Responsibility to protect the assets.
c. Phishing:-
Phishing is criminality fraudulent to steal user sensitive information such as user ID
Passwords , Credit Card No. , Bank A/C No. Pin Code Etc. by sending the fake page & this
fake page sends the user sensitive information to attackers .
Phishing attacks use both Social Engineering & Technical subterfuge to steal
consumers personal identify data & Financial Account credentials .
2. Technical Attacks:-
a. Dos Attacks (denial of service attacks )
Dos attacks are commonly launched from one or more points on the internet that are external
to the victims own system.
DDos Attacks
DDos Attack is an advance version of Dos attack much like Dos also tries to block important
service by running on a server by flooding the destination server with packets.
The specialty Of DDos is that the Attacks Do not come from a single network or
host but from a number of different host or Network which have been previously compromised.
Note –
2. Land Attack-
When the attacker initiate a sync flood attack using the IP address of the victim as source and
destination IP address. Then it is said that the attacker has launched a land attack.
3. Tear drop attack-
This type of attack deals with fragmentation & reassembly of ip packets . an attacker could start
transmitting fragmented IP packets containing overlapped fragment offset making the victim
unable to reassemble them exhausting victim’s and crashing it.
4. Sync Flood attack-
Input validation attacks are where an attacker intentionally sends unusual input in the hopes of
configuring the application commonly known as IVA.
Types of IVA
SQL injection is an attack in which malicious code is inserted in to strings that are later passed to an
instance of SQL server for parsing & execution . even parameterized data can be manipulated by a
skilled attacker.
The most common method to prevent this kind of SQL injection vulnerability are to check the user’s
input for dangerous character’s like single quotes & using prepared statements which tell the database
exactly what to expect before any user provided data is passed to it.
2. CSS/XSS Attacks
Cross site scripting is generally believed to be one of the most common layer of application hacking
techniques. In general css refers to that hacking techniques that leverages vulnerabilities in the code of
web application to allow an attacker to send malicious content from an end user & collect some type
data from victim .
CSS allow an attacker to embed malicious JavaScript vbscript activex HTML or flash in to a
vulnerable dynamic page to fool the user executing the script on his machine in order to gather data .
To prevent these attacks dangerous characters must be filtered out both in their ASCII & hex values.
In computer security & programming a buffer overflow or buffer overrun is an anomaly where a process
stored data outside the memory the programmer set aside for it.
A buffer overflow occurs a process or program running on your computer system use more
memory than it was allocated & has to store extra data in temporary location called buffer.
This is one of the oldest & simplest method of hacking a computer A key logger is a piece of H/W or S/W
that logs everything someone types . Key loggers may program the to email you all the logs after a
particular time & may delete all logs itself.
Anti key loggers software will detect and block key loggers I used anti keylogger shield to block any
known or unknown key loggers on my computer.
Sniffing is observing packets passing by on a network . sniffing is a popular way to steal data from a
network usually inform of passwords id name etc.
Sniffer attack against the transport control protocol . there is a method hackers use in which the
attack lets a hacker redirect to the tcp stream through the hacker’s machine .
1. Default attack password - a default password is common password that is supplied with new
equipment that is password protected . Manufacturers of such equipment typically use a single
password such as admin or password thus users will change the password when they used it.
2. Dictionary Password Attack –A dictionary attack is a method of breaking in to a password
protected computer or server by systematically entering every word in a dictionary as a
password. Dictionary attack work because many computer user’s and business insist on using
ordinary words as passwords .Dictionary attack are rarely successful against system that employ
random combination & upper case or and lower case letters mixed up with numerals.
3. Brute force Password Attack-A brute force attack consist of trying every possible code
combination or password until you find right one .
The difficulty of a brute force attack consists of trying passwords depends on several factors such as –
As an example imagine a system which only allows 4 digital pin codes . this means that there are a
maximum of 10000 possible pin combination
Backdoor
Introduction - a secret or understand means of access ( to a place or a position) or an undocumented
way to get access to a system .A backdoor is a method of bypassing normal authentication or securing
remote access to a computer while attempting to remain hidden from casual inspection .
Examples of Backdoors
Remote connection also known as redneck is a dangerous backdoor that gives the remote
attacker full access to a compromised computer the parasite can shutdown or restart a pc
manage files record users keystrokes install & run virus programs take screen shot & perform
other malicious actions Remote connection runs or every window s startup other examples of
backdoors are net master net bus etc.
Root kits
A root kit is a collection of tools that enable administrator level access to a computer or computer
network . typically a cracker installs a root kit on a computer after first obtaining user level
access either by exploiting a known vulnerability or cracking a password.