Foot Printing:: Footprinting Means Gathering Information About A Target System Which Can
Foot Printing:: Footprinting Means Gathering Information About A Target System Which Can
1|Page
For example, devices connected to the Internet can be found. A
search string such as inurl:”ViewerFrame?Mode=” will find public
web cameras. “The “link:” search operator that Google used to
have, has been turned off by now (2017)”.
2|Page
IP address, contact information, and location.
8. Who is:
This is a website which serves a good purpose for Hackers.
Through this website information about the domain name, email-id,
domain owner, etc; a website can be traced. Basically, this serves a
way for Website Footprinting.
Advantages:
Footprinting allows Hackers to gather the basic security
configurations of a target machine along with network route and
data flow.
Once attacker finds the vulnerabilities he/she focuses towards a
specific area of the target machine.
It allows the hacker to identify as to which attack is more handy to
hack the target system.
Counter Measures:
3|Page
information about packet loss which can be helpful in determining reliability
of network.
A ping sweep is a method of pinging a list of IP automatically. Pinging a large
list of IPs can be time-consuming and problematic. Tool for Ping sweep is
Fping. Fping can be invoked by following command.
Fping -a -g 172.16.10.1 172.16.10.20
The “-a” switch is used to show a list of only alive IP in our output.
“-g” switch is used to specify a range of IP.
In above command range of IP is 172.16.10.1 to 172.16.10.20.
Port Scanning :
In a Computer, there are a total of 65, 536 (0-65, 535) ports. Depending
upon nature of communication and application using a port, it can be either
UDP or TCP. Scanning system for checking which ports are alive and which
ports are used by different applications gave us a better idea about target
system.
Port Scanning is done by a tool called Nmap. Nmap is written by Gordon
“Fyodor” Lyon. It is available in both GUI and command-line interface.
Command :
nmap -sT/U -p 172.16.10.5
“-s” is used to specify connection type.
-sT means TCP and -sU means UDP connection.
“-p” means to scan all ports of target IP.
Vulnerability Scanning :
Vulnerability is a weakness in software or system configuration that can be
exploited. Missing patches may result in the vulnerability of software.
Software vendors regularly provide patches for known issues. Some
Vulnerability leads to remote code execution which is a holy grail of hacking.
One of the tools for vulnerability scanning is Nessus. It can be downloaded
from website nessus.org. It contains thousands of plugins for vulnerability
scanning. A plugin is a small block of code send to target system IP for
purpose of vulnerability scanning.
Spoofing definition
Spoofing is the act of disguising a communication from an unknown source as being
from a known, trusted source. Spoofing can apply to emails, phone calls, and
websites, or can be more technical, such as a computer spoofing an IP address,
Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
4|Page
Spoofing can be used to gain access to a target’s personal information, spread
malware through infected links or attachments, bypass network access controls, or
redistribute traffic to conduct a denial-of-service attack. Spoofing is often the way a
bad actor gains access in order to execute a larger cyber attack such as
an advanced persistent threat or a man-in-the-middle attack.
Types of spoofing
Email Spoofing
Email spoofing occurs when an attacker uses an email message to trick a recipient
into thinking it came from a known and/or trusted source. These emails may include
links to malicious websites or attachments infected with malware, or they may
use social engineering to convince the recipient to freely disclose sensitive
information.
Sender information is easy to spoof and can be done in one of two ways:
Caller ID Spoofing
With caller ID spoofing, attackers can make it appear as if their phone calls are
coming from a specific number—either one that is known and/or trusted to the
recipient, or one that indicates a specific geographic location. Attackers can then use
social engineering—often posing as someone from a bank or customer support—to
convince their targets to, over the phone, provide sensitive information such as
passwords, account information, social security numbers, and more.
Website Spoofing
5|Page
IP Spoofing
ARP Spoofing
DNS (Domain Name System) servers resolve URLs and email addresses to
corresponding IP addresses. DNS spoofing allows attackers to divert traffic to a
different IP address, leading victims to sites that spread malware.
Do, when examining a communication to determine legitimacy, keep an eye out for:
Poor spelling
Incorrect/inconsistent grammar
Unusual sentence structure or turns of phrase
These errors are often indicators that the communications are not from who they
claim to be.
The email sender address: sometimes addresses will be spoofed by changing one or
two letters in either the local-part (before the @ symbol) or domain name.
The URL of a webpage: similar to email addresses, the spelling can be slightly
changed to trick a visitor not looking closely.
Don’t click on unfamiliar links or download unfamiliar/unexpected attachments. If you
receive this in your email, send a reply to ask for confirmation. If an email address is
spoofed exactly, the reply will go to the actual person with the email address—not
the person spoofing it.
6|Page
Don’t take phone calls at face value; be wary of the information the caller is
requesting. Google the phone number presented on the caller ID to see if it’s
associated with scams. Even if the number looks legitimate, hang up and call the
number yourself, as caller ID numbers can be spoofed.
Spoofing can sometimes be easy to spot, but not always—more and more, malicious
actors are carrying out sophisticated spoofing attacks that require vigilance on the
part of the user. Being aware of different spoofing methods and their signs can help
you avoid being a victim.
Introduction to Keyloggers
Key loggers also known as keystroke loggers, may be defined as the
recording of the key pressed on a system and saved it to a file, and the that
file is accessed by the person using this malware. Key logger can be
software or can be hardware.
Working:
Mainly key-loggers are used to steal password or confidential details such as
bank information etc. First key-logger was invented in 1970’s and was a
hardware key logger and first software key-logger was developed in 1983.
Software key-loggers :
Software key-loggers are the computer programs which are
developed to steal password from the victims computer.
However key loggers are used in IT organizations to
troubleshoot technical problems with computers and business
networks. Also Microsoft windows 10 also has key-logger
installed in it.
Applications of a Software-based Keylogger :
7|Page
5. Now if the keylogger infects the mobile device, there is a chance of
the information getting stolen.
6. The information that will be stolen are:- emails, login pages, and
more.
Advantage of a Software-based Keylogger :
1. It can be installed on a system when the victim opens the
attachment sent in an email.
2. It gives the advantage of taking snapshots, recording videos, and
more.
3. They are not physically detectable.
Disadvantage of a Software-based Keylogger :
1. It sometimes gets detected by Anti-spyware.
Detect Software-based Keylogger :
1. The user should have an anti-virus system. It should enable the
user to detect any software keylogger.
2. The user should look at all the files that have been installed. If any
files look suspicious, the user should immediately remove that file.
Prevention of the Software-based Keylogger :
1. The user should perform the two-step authentication.
2. Users should use some encryption software. This encryption
software encrypts the word typed from the keyboard.
Hardware Key-loggers :
These are not dependent on any software as these are hardware key-
loggers. keyboard hardware is a circuit which is attached in a keyboard itself
that whenever the key of that keyboard pressed it gets recorded.
8|Page
access that. Now there might be an option to retrieve the data from the
hardware keylogger remotely.
The operation of the hardware keylogger differs from the software keylogger.
There might be a chance of the software keylogger get detected, but the
hardware keylogger is undetectable. The hardware keylogger is undetectable
as it can appear as an external device that is attached to the computer. It is
not detectable by the anti-virus, and it is hard to be detectable. It allows the
attacker to get to know the confidential details and more details from the
victim.
Case study
There was a case of collecting data about other employees in the
year 2015. It was a German left-wing newspaper, where one found
a USB stick hardware keylogger.
Now schools have become commonplace for using the hardware
keylogger. Their students use this Hardware Keylogger to increase
their grades.
They are also used by the attacker to steal confidential data which
they can use to steal money from banks.
Hardware Keylogger key concepts
9|Page
User/Victim should implement the two-factor authorization step. It
will prevent the attacker/hacker to get access to your account.
Difference between hardware keylogger and software keylogger
Hardware Keylogger:– This is a device that is used to record keystrokes. It
is attached to the computer, and it starts its applications when it is plugged
in. Now the information gets stored in the device. So to retrieve the data
hackers/attacker have to physically access that. In short, we can say that
the Hardware Keylogger is much tough to detect than the software
keylogger.
Software Keylogger :- This is something that is installed on the hard drive.
This type of software is also called spy software. Now the software keylogger
can also be used by parents to monitor their kids, and it is also used for other
activities. This software keylogger may be better, but it is sometimes
detectable and can also be removed by the anti-virus.
1. USB keylogger –
There are USB connector key-loggers which has to be connected to
a computer and steals the data. Also some circuits are built into a
keyboard so no external wire i used or shows on the keyboard.
2. Smartphone sensors –
Some cool android tricks are also used as key loggers such as android
accelerometer sensor which when placed near to the keyboard can
sense the vibrations and the graph then used to convert it to
sentences, this technique accuracy is about 80%.
Now a days crackers are using keystroke logging Trojan, it is a
malware which is sent to a victims computer to steal the data and
login details.
So key-loggers are the software malware or a hardware which is used to
steal , or snatch our login details, credentials , bank information and many
more.
Some keylogger application used in 2020 are:
1. Kidlogger
2. Best Free Keylogger
3. Windows Keylogger
4. Refog Personal Monitor
5. All In One Keylogger
10 | P a g e
2. Anti-Virus –
Many anti-virus software also detect key loggers and delete them
from the computer system. These are software anti-software so
these can not get rid from the hardware key-loggers.
3. Automatic form filler –
This technique can be used by the user to not fill forms on regular
bases instead use automatic form filler which will give a shield
against key-loggers as keys will not be pressed .
4. One-Time-Passwords –
Using OTP’s as password may be safe as every time we login we
have to use a new password.
5. Patterns or mouse-recognition –
On android devices used pattern as a password of applications and
on PC use mouse recognition, mouse program uses mouse
gestures instead of stylus.
What is Sniffing?
Sniffing is the technique of continuously monitoring and recording all data
packets that transit via a network. Network or system administrators employ
sniffers to monitor and troubleshoot network traffic. Hackers use sniffers to
capture data packets containing sensitive data such as passwords and account
information. Attackers install sniffers as hardware or software in the system.
Active Sniffing
Active Sniffing is sniffing in the switch. It is a network device that connects two
points. This switch monitors the MAC addresses on each port, which ensures
that data is passed only to the appropriate destination. To sniff the traffic
between targets, sniffers must actively inject traffic into the LAN. There are
several ways to accomplish this.
Passive Sniffing
The process of Sniffing through the hub is called passive Sniffing. All machines
on an un-bridged or non-switched network segment will be able to see any
traffic passing through it. They operate on the data link layer of the network. A
11 | P a g e
hacker transmits a network packet across the LAN, where it reaches every
machine connected to it. Attackers can passively capture data by sending
sniffers.
Active Sniffing involves infesting the switch content address memory (CAM) table
with address resolution protocols (ARPs). Consequently, the attacker sniffs data
from the switch by redirecting legitimate traffic to other ports. There are several
active Sniffing techniques, including Spoofing, DHCP, and DNS poisoning.
What is Spoofing?
Caller ID Spoofing
Spoofing takes place when the caller ID is changed by using false information. To
hide their identity, phone scammers use Caller ID Spoofing to make it impossible
to block a number. In some cases, scammers will use your area code to disguise
the call as being local.
Scammers often use Voice over Internet Protocol (VoIP) to spoof caller ID by
creating fake phone numbers and names. Scammers will attempt to get vital
information from the call recipient, once they answer the phone.
12 | P a g e
Email Spoofing
Scammers use fake sender addresses to harm your computer, steal your
information, or infect your computer with malware through email Spoofing.
Such emails look like they came from a friend or co-worker. This is so that you
can be fooled into thinking that the emails are legit.
Using alternative numbers or letters to look slightly different from the original
will get you this result, or disguising the “from” field to become an address that
belongs to someone in your contact list.
Website Spoofing
Scammers use legitimate fonts, colors, and logos to make a dangerous website
appear to be a secure one. Scammers replicate a trusted website so that users
visit a phishing or malicious site. Most of these copied sites look authentic at first
glance due to the similar website addresses. Nevertheless, their primary
purpose is to gather visitor information.
DNS Spoofing, also known as cache poisoning, is the process of rerouting traffic
to a different IP address. Malicious websites will be redirected to this page.
Scammers do this by replacing the DNS server’s IP addresses with their own.
Enroll in our Cyber Security course to learn more about this domain and get
certified from experts!
GPS Spoofing
A GPS Spoofing attack occurs when fake signals resemble real signals and are
broadcast to fool GPS receivers. Essentially, scammers pretend to be in one
place, while, in reality, being in another place.
Scammers use this type of attack to interfere with GPS signals of ships, buildings,
or aircrafts such as to drive them to wrong addresses. Apps that rely on the
location data from a smartphone are potentially vulnerable to this type of attack.
13 | P a g e
ARP Spoofing
The practice of Spoofing texts occurs when scammers use another person’s
phone number to send a text message. Scammers use alpha-numeric sender IDs
to mask their identity, and they normally link to phishing or malware downloads.
Make sure that you are familiar with mobile security tips, if you fear your data is
being compromised.
Extension Spoofing
Our blog on Cyber Security Interview Questions will help you if you are
preparing for Cyber Security Interview questions.
Sniffing takes place when an attacker collects data packets that pass over a
network by utilizing packet sniffers and data traffic in the network.
14 | P a g e
In contrast to Sniffing, Spoofing happens when an attacker steals a user’s rights
and uses them to acquire legitimate user access to a system to execute attacks
against network hosts, steal data, distribute malware, or evade access controls.
Spoofing attacks are duplicating factors because the system’s authorized users
perform the same action. As opposed to counterfeiting or Sniffing, Spoofing
methods are distinct from these other types of attacks. First, let us define packet
Sniffing and packet Spoofing before learning their differences:
The technique of gathering, collecting, and logging some or all packets transiting
across a computer network is known as packet Sniffing. Every packet, or a
determined selection of packets, can be gathered in this manner for subsequent
analysis. As a network administrator, you may utilize the acquired data for
several tasks including bandwidth and traffic monitoring.
Hackers use the IP Spoofing technique to disguise their locations when they
send or request data online. By impersonating an IP address, a computer can be
misled into believing that information being sent to it is from an officially
authorized source, and malicious content can be sent through.
15 | P a g e
Packet Sniffing is a passive attack since attackers cannot mutilate the system in
any way. In packet Spoofing, stackers inject malicious software into the victim’s
system.
Attackers get access to the device or system that directs traffic in the packet and
carry out packet Spoofing attacks by sending packets with false source
addresses, i.e., changing routing tables.
The development of technology brings more and more new cyber threats, so
staying informed about the protection measures is imperative to be able to
combat and defend against illegal hackers. We have listed a few points that you
can follow to keep your devices safe from hackers.
Sniffing
Spoofing
Conclusion
It is high time you start protecting your devices and save yourselves from
malicious attacks. If you think cyber security could be a career for you, then
enroll for the Cyber Security course from our Intellipaat website.
What Is Malware?
Malware is intrusive software that is designed to damage and destroy
computers and computer systems. Malware is a contraction for “malicious
16 | P a g e
software.” Examples of common malware includes viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
How do I protect my network against malware?
Typically, businesses focus on preventative tools to stop breaches. By securing the perimeter,
businesses assume they are safe. Some advanced malware, however, will eventually make
their way into your network. As a result, it is crucial to deploy technologies that continually
monitor and detect malware that has evaded perimeter defenses. Sufficient advanced malware
protection requires multiple layers of safeguards along with high-level network visibility and
intelligence.
How do I detect and respond to malware?
Malware will inevitably penetrate your network. You must have defenses that provide
significant visibility and breach detection. In order to remove malware, you must be able to
identify malicious actors quickly. This requires constant network scanning. Once the threat is
identified, you must remove the malware from your network. Today's antivirus products are
not enough to protect against advanced cyber threats. Learn how to update your antivirus
strategy.
Types of malware
Virus
Viruses are a subgroup of malware. A virus is malicious software attached to a document or
file that supports macros to execute its code and spread from host to host. Once downloaded,
the virus will lay dormant until the file is opened and in use. Viruses are designed to disrupt a
system’s ability to operate. As a result, viruses can cause significant operational issues and
data loss.
Worms
Worms are a malicious software that rapidly replicates and spreads to any device within the
network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a
device via a downloaded file or a network connection before it multiplies and disperses at an
exponential rate. Like viruses, worms can severely disrupt the operations of a device and
cause data loss.
Trojan virus
Trojan viruses are disguised as helpful software programs. But once the user downloads it,
the Trojan virus can gain access to sensitive data and then modify, block, or delete the data.
This can be extremely harmful to the performance of the device. Unlike normal viruses and
worms, Trojan viruses are not designed to self-replicate.
Spyware
Spyware is malicious software that runs secretly on a computer and reports back to a remote
user. Rather than simply disrupting a device’s operations, spyware targets sensitive
information and can grant remote access to predators. Spyware is often used to steal financial
or personal information. A specific type of spyware is a keylogger, which records your
keystrokes to reveal passwords and personal information.
17 | P a g e
Adware
Adware is malicious software used to collect data on your computer usage and provide
appropriate advertisements to you. While adware is not always dangerous, in some cases
adware can cause issues for your system. Adware can redirect your browser to unsafe sites,
and it can even contain Trojan horses and spyware. Additionally, significant levels of adware
can slow down your system noticeably. Because not all adware is malicious, it is important to
have protection that constantly and intelligently scans these programs.
Ransomware
Ransomware is malicious software that gains access to sensitive information within a system,
encrypts that information so that the user cannot access it, and then demands a financial
payout for the data to be released. Ransomware is commonly part of a phishing scam. By
clicking a disguised link, the user downloads the ransomware. The attacker proceeds to
encrypt specific information that can only be opened by a mathematical key they know.
When the attacker receives payment, the data is unlocked.
Fileless malware
Fileless malware is a type of memory-resident malware. As the term suggests, it is malware
that operates from a victim’s computer’s memory, not from files on the hard drive. Because
there are no files to scan, it is harder to detect than traditional malware. It also makes
forensics more difficult because the malware disappears when the victim computer is
rebooted. In late 2017, the Cisco Talos threat intelligence team posted an example of fileless
malware that they called DNSMessenger.
18 | P a g e