Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
What is an IP Address?
The term IP Address is an acronym for Internet Protocol Address. An IP Address refers to
the address that assists a user in identifying a network connection. It also goes by
the Logical Address name provided to individual connections in the present network. An IP
address lets us understand and control the way in which various devices communicate on
the Internet. It also defines the specific behaviour of various Internet routers.
Protocol Used You can retrieve a device attached to You can retrieve a device
for Retrieval the MAC address using the ARP attached to the IP address using
protocol. the RARP protocol.
Use The primary use of a MAC address is The IP address, on the other
to ensure the physical address of a hand, defines a computer’s
given device/ computer. logical address.
Alteration and This address does not alter or change This address gets modified
Changes with the passing time and change of depending on the change in
environment. environment and time.
Third-Party Any third party can find out a device’s The IP address stays hidden
Access MAC address. from display in front of any third
party.
5. The three server types work together and continue redirecting until they retrieve a
DNS record that contains the queried IP address. It sends this information to the
recursive DNS server, and the webpage the user is looking for loads. DNS root name
servers and TLD servers primarily redirect queries and rarely provide the resolution
themselves.
6. The recursive server stores, or caches, the A record for the domain name, which
contains the IP address. The next time it receives a request for that domain name, it
can respond directly to the user instead of querying other servers.
7. If the query reaches the authoritative server and it cannot find the information, it
returns an error message.
4.2.3 DHCP, Router, Bots
DHCP:
− Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
automatically provides an Internet Protocol (IP) host with its IP address and other
related configuration information such as the subnet mask and default gateway.
− RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF)
standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares
many implementation details. DHCP allows hosts to obtain required TCP/IP
configuration information from a DHCP server.
Benefits of DHCP
− Reliable IP address configuration. DHCP minimizes configuration errors caused by
manual IP address configuration, such as typographical errors, or address conflicts
caused by the assignment of an IP address to more than one computer at the same
time.
− Reduced network administration. DHCP includes the following features to reduce
network administration:
− Centralized and automated TCP/IP configuration.
− The ability to define TCP/IP configurations from a central location.
− The ability to assign a full range of additional TCP/IP configuration values by means
of DHCP options.
− The efficient handling of IP address changes for clients that must be updated
frequently, such as those for portable devices that move to different locations on a
wireless network.
− The forwarding of initial DHCP messages by using a DHCP relay agent, which
eliminates the need for a DHCP server on every subnet.
Routers:
− A device that forwards data packets (units of info) from one network to another.
− Based on routing tables (lists of addresses, permissions etc) and routing protocols,
routers read the network address in each transmission and make a decision on how
to send it based on the most expedient route (determined by traffic load, line costs,
speed, bad lines)
− Routers are used to segment networks to balance and filter traffic for security
purposes and policy management
− They are also used at the edge of the n/w to connect remote offices
− Router can only route a message that is transmitted by a routable protocol (e.g.
Internet Protocol)
− Routers have to inspect n/w address in the protocol, so they process data and thus
add overhead.
− Most routers are specialized computers that are optimized for communications
− Router functions can also be implemented by adding routing software to file server.
(e.g. Windows 2000 include routing software)
− The operating system can route from one n/w to another, if each is connected to its
own n/w adapter (or NIC), in the server.
Bots:
− An autonomous program on the internet or another network that can interact with
systems or users.
− A ‘bot’ – short for robot – is a software program that performs automated,
repetitive, pre-defined tasks. Bots typically imitate or replace human user behavior.
Because they are automated, they operate much faster than human users. They
carry out useful functions, such as customer service or indexing search engines, but
they can also come in the form of malware – used to gain total control over a
computer.
− Internet bots can also be referred to as spiders, crawlers, or web bots.
− Bots can be:
Chatbots
− Bots that simulate human conversation by responding to certain phrases with
programmed responses. for example google assistant
Social bots
− Bots which operate on social media platforms, and are used to automatically
generate messages, advocate ideas, act as a follower of users, and as fake accounts
to gain followers themselves. As social networks become more sophisticated, it is
becoming harder for social bots to create fake accounts. It is difficult to identify
social bots because they can exhibit similar behavior to real users.
Shop bots
− Bots that shop around online to find the best price for products a user is looking for.
Some bots can observe a user’s patterns in navigating a website and then customize
that site for the user.
Spider bots or web crawlers
− Bots that scan content on webpages all over the internet to help Google and other
search engines understand how best to answer users’ search queries. Spiders
download HTML and other resources, such as CSS, JavaScript, and images, and use
them to process site content.
Malicious bots /Web scraping crawlers
− Bots that scrape content, spread spam content, or carry out credential stuffing
attacks Bots that read data from websites with the objective of saving them offline
and enabling their reuse. This may take the form of scraping the entire content of
web pages or scraping web content to obtain specific data points, such as names and
prices of products on e-commerce websites.
− In some cases, scraping is legitimate and may be allowed by website owners. In
other instances, bot operators may be violating website terms of use or stealing
sensitive or copyrighted material.
Knowbots
− Bots that collect knowledge for users by automatically visiting websites to retrieve
information which fulfils certain criteria.
Monitoring bots
− Bots used to monitor the health of a website or system. Downdetector.com is an
example of an independent site that provides real-time status information, including
outages, of websites and other kinds of services.
Transactional bots
− Bots used to complete transactions on behalf of humans. For example, transactional
bots allow customers to make a transaction within the context of a conversation.
Download bots
− Bots that are used to automatically download software or mobile apps. They can be
used to manipulate download statistics – for example, to gain more downloads on
popular app stores and help new apps appear at the top of the charts.
− They can also be used to attack download sites, creating fake downloads as part of a
Denial of Service (DoS) attack.
Ticketing bots
− Bots which automatically purchase tickets to popular events, with the aim of
reselling those tickets for a profit. This activity is illegal in many countries, and even
when not against the law, it can be a nuisance to event organizers, legitimate ticket
sellers, and consumers. Ticketing bots are often sophisticated, emulating the same
behaviors as human ticket buyers.
Why do cybercriminals use bots?
− 1. To steal financial and personal information
− 2. To attack legitimate web services
− 3. To extort money from victims
− 4. To make money from zombie and botnet systems
− A DDoS attack aims to overwhelm the devices, services, and network of its intended
target with fake internet traffic, rendering them inaccessible to or useless for
legitimate users.
DoS vs. DDoS
− A distributed denial-of-service attack is a subcategory of the more general denial-
ofservice (DoS) attack. In a DoS attack, the attacker uses a single internet
connection to barrage a target with fake requests or to try and exploit a
cybersecurity vulnerability.
− DDoS is larger in scale. It utilizes thousands (even millions) of connected devices to
fulfill its goal.
Botnets
− Botnets are the primary way distributed denial-of-service-attacks are carried out.
The attacker will hack into computers or other devices and install a malicious piece
of code, or malware, called a bot. Together, the infected computers form a network
called a botnet. The attacker then instructs the botnet to overwhelm the victim's
servers and devices with more connection requests than they can handle.
Protocol Attacks
− Protocol attacks look to exhaust resources of a server or those of its networking
systems like firewalls, routing engines, or load-balancers.
load . An example of a protocol
attack is the SYN flood attack.
− Before two computers can initiate a secure communication channel – they must
perform a TCP handshake. A TCP handshake is a means for two parties to exchange
preliminary information. A SYN packet is typically the first step of the TCP
handshake, indicating to the server that the client wants to start a new channel.
− In a SYN flood attack, the attacker floods the server with numerous SYN packets,
each containing spoofed IP addresses. The server responds to each packet (via SYN-
SYN
ACKs), requesting the client to complete the handshake. However, the client(s) never
respond, and the server keeps waiting. Eventually, it crashes after waiting too long
for too many responses.
−
−
Application-Layer Attacks
− The application layer is where the server generates the response to an incoming
client request. For example, if a user enters hhttp://www.xyz.com/learning/
earning/ on their
browser, an HTTP request is sent to the server, requesting the learning page page. The
server will fetch all the information related to the page, package it in a response, and
send it back to the browser.
− The most common type of application layer attacks are the HTTP flood attacks in
which malicious actors just keep sending various HTTP requests to a server using
different IP addresses. One example of this is asking a server to generate PDF
documents over and over again. Since the IP address and other identifiers change in
every request, the server can’t detect that it’s being attacked.
−
4.3.2 Man in the Middle, Email Attack
Man in the middle:
− Just as the name suggests, the man
man-in-the-middle
middle is like an eavesdropper between
two sessions where the communication between two parties is monitored and
intercepted. The goal of such an attack is to steal financial or login information
of users.
Email attack:
This is one popular example of an email cyberattack, which has just used email as an attack
vector to steal the user’s credentials and other sensitive or personal data so it can be
leveraged for malicious intent.
Types of Email Attacks
1. Phishing
Phishing is a type of deception. Cybercriminals utilize email, instant messaging, and
other social media to impersonate a trusted individual to obtain information such as
login credentials.When an evil entity sends a false email that appears to be from a
legitimate, trustworthy source, it is known as phishing. The goal of the message is
to deceive the receiver into downloading malware or disclosing personal or financial
information.
Spear phishing is a form of phishing attack that is very specific in its approach. While
phishing and spear-phishing use emails to contact their victims, spear-phishing
delivers personalized emails to a single individual. Before sending the email, the
criminal researches the target's interests.
2. Vishing
It is a type of phishing that employs voice communication technologies. Using voice-
over IP technologies, criminals can fake calls from legitimate sources. Victims may
also get a recorded message that purports to be from an official source. Criminals
attempt to steal the victim's identity by obtaining credit card numbers or other
personal information. Vishing takes advantage of people's faith in the telephone
system.
3. Smishing
It is a sort of phishing that uses mobile phones to send text messages. To earn the
victim's trust, criminals imitate a legitimate source. A smishing attack might, for
example, send the victim a webpage URL. Malware is installed on the victim's phone
when they access the page.
4. Whaling
A phishing assault that targets high-profile targets within a business, such as senior
executives, is known as whaling. Politicians and celebrities are also possible targets.
5. Pharming
Pharming is the impersonation of a reputable website to dupe individuals to submit
their personal information. Pharming leads consumers to a phony website that
appears to be legitimate. Victims then provide their data under the impression that
they have reached a legitimate website.
6. Spyware
It is software that allows a criminal to collect data about a user's computer
activity. Activity trackers, keystroke collecting, and data capture are all standard
features of spyware. A spyware frequently adjusts its security settings in an attempt
to circumvent security measures. Spywares often come along with legitimate
applications or Trojan horses. Many shareware sites are infected with spyware.
7. Scareware
It is software that uses fear to encourage the user to execute a specified action.
Scareware creates pop-up windows that seem like those found in operating systems.
These windows display fake messages claiming that the system is in danger or
requires the execution of a specific program to resume regular operation. In
actuality, there are no issues, and malware infects the user's PC if they agree and
permit the indicated program to run.
8. Adware
Adware generates cash for its makers by displaying unpleasant pop-ups. By tracking
the pages visited, the malware may be able to determine the user's interests. It can
then send relevant pop-up advertisements to those websites. Adware is installed by
default in some software versions.
9. Spam
Unsolicited emails are referred to as spam (also known as junk mail). Spam is almost
always a form of advertising. Spams can contain hazardous links, viruses, or false
content. The ultimate goal is to collect sensitive data like a social security number
or bank account details. The majority of spams originate from numerous computers
connected to a network infected with a virus or worm. These infected computers
send out as many spam emails as they can.
4.3.2 Password Attack, Malware
Password Attacks
− Because passwords are the most commonly used mechanism to authenticate users
to an information system, obtaining passwords is a common and effective attack
approach. Access to a person’s password can be obtained by looking around the
person’s desk, ‘‘sniffing’’ the connection to the network to acquire unencrypted
passwords, using social engineering, gaining access to a password database or
outright guessing. The last approach can be done in either a random or systematic
manner:
− Brute-force password guessing means using a random approach by trying different
passwords and hoping that one work some logic can be applied by trying passwords
related to the person’s name, job title, hobbies or similar items.
Malware:
Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software.” Examples of common
malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
4.4 Hackers:
4.4.1 Various Vulnerabilities:
What is Vulnerability in Cyber Security?
Vulnerability in cyber security refers to any weakness in an information system, system
processes, or internal controls of an organization. These vulnerabilities are targets for
lurking cybercrimes and are open to exploitation through the points of vulnerability.
These hackers are able to gain illegal access to the systems and cause severe damage
to data privacy. Therefore, cyber security vulnerabilities are extremely important to
monitor for the overall security posture as gaps in a network can result in a full-scale breach
of systems in an organization.
Examples of Vulnerabilities
Below are some examples of vulnerability:
− A weakness in a firewall that can lead to malicious hackers getting into a computer
network
− Lack of security cameras
− Unlocked doors at businesses
Types of Vulnerabilities
Below are some of the most common types of cybersecurity vulnerabilities:
− System Misconfigurations
Network assets that have disparate security controls or vulnerable settings can
result in system misconfigurations. Cybercriminals commonly probe networks for
system misconfigurations and gaps that look exploitable. Due to the rapid digital
transformation, network misconfigurations are on the rise. Therefore, it is important
to work with experienced security experts during the implementation of new
technologies.
− Out-of-date or Unpatched Software
Similar to system misconfigurations, hackers tend to probe networks for unpatched
systems that are easy targets. These unpatched vulnerabilities can be exploited by
attackers to steal sensitive information. To minimize these kinds of risks, it is
essential to establish a patch management schedule so that all the latest system
patches are implemented as soon as they are released.
− Missing or Weak Authorization Credentials
A common tactic that attackers use is to gain access to systems and networks
through brute force like guessing employee credentials. That is why it is crucial that
employees be educated on the best practices of cybersecurity so that their login
credentials are not easily exploited.
− Malicious Insider Threats
Whether it’s with malicious intent or unintentionally, employees with access to
critical systems sometimes end up sharing information that helps cyber criminals
breach the network. Insider threats can be really difficult to trace as all actions will
appear legitimate. To help fight against these types of threats, one should invest in
network access control solutions, and segment the network according to employee
seniority and expertise.
− Missing or Poor Data Encryption
It’s easier for attackers to intercept communication between systems and breach a
network if it has poor or missing encryption. When there is poor or unencrypted
information, cyber adversaries can extract critical information and inject false
information onto a server. This can seriously undermine an organization’s efforts
toward cyber security compliance and lead to fines from regulatory bodies.
− Zero-day Vulnerabilities
Zero-day vulnerabilities are specific software vulnerabilities that the attackers have
caught wind of but have not yet been discovered by an organization or user.In these
cases, there are no available fixes or solutions since the vulnerability is not yet
detected or notified by the system vendor. These are especially dangerous as there
is no defense against such vulnerabilities until after the attack has happened. Hence,
it is important to remain cautious and continuously monitor systems for
vulnerabilities to minimize zero-day attacks.
Vulnerability Remediation
− To always be one step ahead of malicious attacks, security professionals need to
have a process in place for monitoring and managing the known vulnerabilities.
Once a time-consuming and tedious manual job, now it is possible to continuously
keep track of an organization’s software inventory with the help of automated tools,
and match them against the various security advisories, issue trackers, or databases.
− If the tracking results show that the services and products are relying on risky code,
the vulnerable component needs to be located and mitigated effectively and
efficiently.
− The following remediation steps may seem simple, but without them, organizations
may find themselves in a bit of difficulty when fighting against hackers.
− Step 1: Know Your Code – Knowing what you’re working with is crucial and the first
step of vulnerability remediation. Continuously monitoring software inventory to be
aware of which software components are being used and what needs immediate
attention will significantly prevent malicious attacks.
− Step 2: Prioritize Your Vulnerabilities – Organizations need to have prioritization
policies in place. The risk of the vulnerabilities needs to be evaluated first by going
through the system configuration, the likelihood of an occurrence, its impact, and
the security measures that are in place.
− Step 3: Fix – Once the security vulnerabilities that require immediate attention are
known, it is time to map out a timeline and work plan for the fix.
− It is highly insecure because credentials are sent "in the clear" and repeatedly,
making it vulnerable even to the most simple attacks like eavesdropping and man-in-
man
the-middle
middle based attacks.
CHAP - Challenge-handshake
handshake authentication p protocol
− The authentication process in this protocol is always initialized by the server/host
and can be performed anytime during the session, even repeatedly. Server sends a
random string (usually 128B long). The client uses password and the string receive
received
as parameters for MD5 hash function and then sends the result together with
username in plain text.
− Server uses the username to apply the same function and compares the calculated
and received hash. An authentication is successful or unsuccessful.
EAP - Extensible Authentication Protocol
− EAP was originally developed for PPP(Point
PPP(Point-to-Point
Point Protocol) but today is
widely used in IEEE 802.3
802.3, IEEE 802.11(WiFi) or IEEE 802.16 as a part of IEEE
802.1x authentication framework.
− The latest version is standardized in RFC 5247. The advantage of EAP is that it
is only a general authentication framework for client
client-server
server authentication - the
specific way of authentication is defined in its many versions called EAP
EAP--methods.
− White hat Hackers are also known as Ethical Hackers or a Penetration Tester.
White hat hackers are the good guys of the hacker world.
− These people use the same technique used by the black hat hackers. They
also hack the system, but they can only hack the system that they have
permission to hack in order to test the security of the system. They focus on
security and protecting IT system. White hat hacking is legal.