CSL Module-3
CSL Module-3
CSL Module-3
Bhavin Shah
Module - 3
Faculty Dr. Bhavin Shah (HOD & Assistant Professor - ECS/ETRX Dept.), Atharva College of
Coordinator Engineering, Mumbai
● To understand and identify different types cyber crime and cyber law
Course
● To recognized Indian IT Act 2008 and its latest amendments
Objectives
● To learn various types of security standards compliances
Reference Books:
1. Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi
2. The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi
3. The Information technology Act, 2000; Bare Act- Professional Book Publishers, New Delhi
4. Cyber Law & Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai
5. Nina Godbole, Information Systems Security, Wiley India, New Delhi
6. Kennetch J. Knapp, Cyber Security & Global Information Assurance Information Science Publishing
7. William Stallings, Cryptography and Network Security, Pearson Publication
8. Websites for more information is available on : The Information Technology ACT, 2008- TIFR : https://www.tifrh.res.in
9. Website for more information , A Compliance Primer for IT professional:
https://www.sans.org/readingroom/whitepapers/compliance/compliance-primer-professionals- 33538
Assessment:
Internal Assessment consists of two tests out of which; one should be compulsory class test (on minimum 02 Modules) and the other is
either a class test or assignment on live problems or course project
Theory Examination:
Cyber Crime Tools: There are many types of Digital forensic tools:-
• Kali Linux: Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a
specially designed program for digital forensics and penetration testing.
• Ophcrack: This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It
offers a secure GUI system and allows you to runs on multiple platforms.
• EnCase: This software allows an investigator to image and examine data from hard disks and removable disks.
• SafeBack: SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these
images to some other hard disks.
• Data dumper: This is a command-line computer forensic tool. It is freely available for the UNIX Operating system,
which can make exact copies of disks suitable for digital forensic analysis.
• Md5sum: A tool to check helps you to check data is copied to another storage successfully or not.
1. Initial Uncovering: Two steps are involved here. In the first step called as
reconnaissance, the attacker gathers information, as much as possible, about the
target by legitimate means – searching the information about the target on the
Internet by Googling social networking websites and people finder websites.
2. Network probe: At the network probe stage, the attacker uses more invasive
techniques to scan the information. Usually, a “ping sweep” of the network IP
addresses is performed to seek out potential targets, and then a “port scanning” tool.
3. Crossing the line toward electronic crime (E-crime): Now the attacker is toward
committing what is technically a “computer crime.” He/she does this by exploiting
possible holes on the target system.
5. Grab the data: Now That the attacker has “captured the network” he/she takes
advantage of his/her position steal confidential data, customer credit card
information, defacewebpages, alter processes and even launch attacks at other sites
from your network, causing a potentially expensive and embarrassing situation for an
individual and/or for an organization.
6. Covering tracks: This is the last step in any cyber-attack, which refers to the
activities undertaken by the attacker to extend misuse of the system without being
detected.
1. Keep the systems behind the curtain (mainly for security reasons)
2. Speed up access to a resource (through “caching”). It is usually used to cache the web pages from a web server.
3. Specialized proxy servers are used to filter unwanted content such as advertisements.
4. Proxy Server can be used as IP address multiplexer to enable to connect number of computers on the Internet, whenever
one has only one IP address.
One of the advantages of a proxy server is that its cache memory can serve all users. If one or more websites are requested
frequently, may be by diff erent users, it is likely to be in the proxy’s cache memory, which will improve user response
time. In fact there are special servers available known as cache servers? A proxy can also do logging.
An Anonymizers or an anonymous proxy is a tool that attempts to make activity on the Internet
untraceable. It accesses the Internet on the user’s behalf, protecting personal information by
hiding the source computer’s identifying information.
Listed are few websites where more information about Anonymizers can be found:
1. http://www.anonymizer.com
2. http://www.browzar.com
3. http://www.anonymize.net
4. http://www.anonymouse.ws
5. http://www.anonymousindex.com
2. Setup: Once phishers know which business/business house to spoof and who their victims are, they will create methods
for delivering the message and to collect the data about the target. Most often this involves E-Mail addresses and a
webpage.
3. Attack: This is the step people are most familiar with the phisher sends a phony message that appears to be from a
reputable source.
4. Collection: Phishers Record the information of victims entering into web pages or pop-up windows.
5. Identity theft and fraud: Phishers use the information that they have gathered to make illegal purchases or commit
fraud. Phishing started off as being part of popular hacking culture. Nowadays, more and more organizations/institutes
provide greater online access for their customers and hence criminals are successfully using Phishing techniques to steal
personal information and conduct ID theft at a global level. We have explained Phishing and Identity theft.
II. Password Cracking Password: is like a key to get an entry into computerized systems like a lock. Password cracking
is a process of recovering passwords from data that have been stored in or transmitted by a computer system. The purpose
of password cracking is as follows:
Passwords can be guessed sometimes with knowledge of the user’s personal information:
1. Blank (none)
2. The words like “password,” “passcode” and “admin”
3. Series of letters from the “qwerty” keyboard, for example, qwerty, asdf or qwertyuiop
4. User’s name or login name
5. Name of user's friend/relative/pet
6. User’s birthplace or date of birth, or a relative’s or afriend’s
7. User’s vehicle number, office number, residence number or mobile number
8. Name of a celebrity who is considered to be an idol by the user
9. Simple modification of one of the preceding,such as suffixing a digit, particularly 1, or reversing the order of letters
Offline Attacks: Mostly offline attacks are performed from a location other than the target (i.e., either a computer system or while on the
network) where these passwords reside or are used.
Strong, Weak and Random Passwords: A weak password is one, which could be easily guessed, short, common and a system default
password that could be easily found by executing a brute force attack and by using a subset of all possible passwords. Here are some of the
examples of “weak passwords”:
1. Susan: Common personal name
2. aaaa: repeated letters, can be guessed
3. rover: common name for a pet, also a dictionary word
4. abc123: can be easily guessed
5. admin: can be easily guessed
6. 1234: can be easily guessed
7. QWERTY: a sequence of adjacent letters on many keyboards
8. 12/3/75: date, possibly of personal importance
9. nbusr123: probably a username, and if so, can be very easily guessed
10. p@$$\/\/0rd: simple letter substitutions are preprogrammed into password cracking tools
11. password: used very often – trivially guessed
12. December12: using the date of a forced password change is very common
Random Passwords: Password is stronger if it includes a mix of upper and lower case letters, numbers and other symbols, when allowed, for
the same number of characters
The general guidelines applicable to the password policies, which can be implemented organization-wide, are as follows:
1. Passwords and user logon identities (IDs) should be unique to each authorized user
2. Passwords should consist of a minimum of eight alphanumeric characters
3. There should be computer-controlled lists of prescribed password rules and periodic testing to identify any password weaknesses
4. Passwords Should be kept private, that is, not shared with friends, colleagues
5. Passwords shall be changed every 30/45 days or less
6. User accounts should be frozen after five failed logon attempts
7. Sessions should be suspended after 15 minutes (or other specified period) of inactivity and require the passwords to be re-entered
8. Successful logons should display the date and time of the last logon and logoff
9. Logon IDs and passwords should be suspended after a specified period of non-use
10. For high-risk systems, after excessive violations, the system should generate an alarm and be able to simulate a continuing session (with
dummy data) for the failed user
1. Software Keyloggers: Software keyloggers are software programs installed on the computer systems which usually are located between the
OS and keyboard hardware, and every keystrokes recorded.
SC-KeyLog PRO: It allows to secretly record computer user activities such as E-Mails, chat conversations, visited websites, clipboard usage,
etc. in a protected log file.
Spytech SpyAgent Stealth: It provides a large variety of essential computer monitoring features as well as website and application filtering,
chat blocking and remote delivery of logs via E-Mail or FTP.
All in one Keylogger: It is an invisible keystrokes recorder and a spy software tool that registers every activity on the PC to encrypted logs.
Stealth Keylogger
Perfect Keylogger
KGB Spy
Spy Buddy
Elite Keylogger
CyberSpy
Powered Keylogger
3. Anti Keylogger: is a tool that can detect the keylogger installed on the computer system and also can remove the tool. Visit
http://www.anti-keyloggers.com for more information. Advantages of using Anti Keylogger are as follows:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence, Anti Keylogger can detect installations of keylogger
2. Thissoftwaredoesnotrequireregularupdatesofsignaturebasestoworkeff ectivelysuchas other antivirus and antispyprograms
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of installing keyloggers
4. It prevents ID theft
5. It secures E-Mail and instant messaging/chatting.
The features and functions of such Spywares are beyond simple monitoring.
1. 007 Spy: It has following key features:
● Capability of overriding “antispy” programs like “ad-aware”
● Record all websites url visited in internet
● Powerful keylogger engine to capture all passwords
● View logs remotely from anywhere at any time
● Export log report in html format to view it in the browser
● Automatically clean-up on outdated logs
● Password protection
4. Remotespy: Besides remote computer monitoring, silently and invisibly, it also monitors and records users PC without any need for
physical access. Moreover, it records keystrokes(keylogger),screenshots, E-Mail, passwords, chats, instant messenger conversations and
websites visited.
5. Stealth Recorder Pro: It is a new type of utility that enables to record a variety of sounds and transfer them automatically through Internet
without being notified by original location or source. It has following features:
● Real-time mp3 recording via microphone, cd, line-in and stereo mixer as mp3, wma or wav formatted files
● Transferring via e-mail or ftp, the recorded files to a user-defined e-mail address or ftp automatically
● Controlling from a remote location
● Voice mail, records and sends the voice messages
6. Stealth Website Logger: It records all accessed websites and a detailed report can be available on a specified E-Mail address. It has
following key features:
● Monitor visited websites
● Reports sent to an E-Mail address
● Daily log & Global log for a specified period
● Log deletion after a specified period
● Hotkey and password protection
● Not visible in add/remove programs or task manager
8. Wiretap Professional: It is an application for monitoring and capturing all activities on the system. It can capture the entire Internet
activity. ftis spy software can monitor and record EMail, chat messages and websites visited. In addition, it helps in monitoring and recording
of keystrokes, passwords entered and all documents, pictures and folders viewed.
9. PC Phone Home: It is a software that tracks and locates lost or stolen laptop and desktop computers. Every time a computer system on
which PC Phone Home has been installed, connected to the Internet, a stealth E-Mail is sent to a specified E-Mail address of the user’s choice.
Virus spreads:
(a) Through the internet
(b) Through a stand-alone computer system
(c) Through local networks
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g., floppy diskettes and hard drives) and which is used to start the
computer system. The entire data/programs are stored on the floppy disks and hard drives in smaller sections called sectors.
2. Program viruses: These viruses become active when the program file (usually with extensions.bin, .com, .exe, .ovl, .drv) is executed (i.e.,
opened – program is started). Once these program files get infected, the virus makes copies of itself and infects the other programs on the
computer system.
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It infects program files along with the boot record when the
infected program is active.
4. Stealth viruses: It camouflages and/or masks itself and so detecting this type of virus is very difficult. It can disguise itself such a way that
antivirus software also cannot detect it thereby preventing spreading into the computer system.
5. Polymorphic Viruses: It acts like a “chameleon” that changes its virus signature (i.e., binary pattern) everytime it spreads through the
system(i.e., multiplies and infects a new file).
7. Activex And Java Control: All The web browsers have settings about Activex and Java Controls. Little awareness is needed about
managing and controlling these settings of a web browser. A typical definition of computer virus/worms might have various aspects such as:
1. Back Orifice: It is a well-known example of backdoor Trojan designed for remote system administration.
It enables a user to control a computer running the Microsoft Windows OS from a remote location.The name is a word play on Microsoft
BackOffice Server software. Readers may visit http://www.cultdeadcow.com/tools/bo.html to know more about backdoor
2. Bifrost: It is another backdoor Trojan that can infect Windows 95 through Vista. It uses the typical server, server builder and client
backdoor program configuration to allow a remote attacker, who uses client, to execute arbitrary code on the compromised machine.
3. SAP backdoors: SAP is an Enterprise Resource Planning (ERP) system and nowadays ERP is the heart of the business technological
platform. These systems handle the key business processes of the organization, such as procurement, invoicing, human resources management,
billing, stock management and financial planning.
4. Onapsis Bizploit: It is the open-source ERP penetration testing framework developed by the Onapsis Research Labs. Bizploit assists
security professionals in the discovery, exploration, vulnerability assessment and exploitation phases of specialized ERP penetration tests.
Readers may visit http://www.onapsis.com/research.html to know more about this tool.
1. Stay away from suspect websites/weblinks: Avoid downloading free/pirated softwares that often get infected by Trojans, worms, viruses
and other things
2. Surf on the Web cautiously: Avoid connecting with and/or downloading any information from peer-to-peer (P2P) networks, which are most
dangerous networks to spread Trojan Horses and other threats
3. It may be experienced that, after downloading the file, it never works and here is a threat that although the file has not worked, something
must have happened to the system the malicious software deploys its gizmos and the system is at serious health risk
4. Install antivirus/Trojan remover software: Nowadays antivirus software(s) have built-in feature for protecting the system not only from
viruses and worms but also from malware such as Trojan Horses
Peer-to-Peer (P2P) Networks Peer-to-peer, commonly abbreviated as P2P, is any distributed network architecture composed of participants
that make a portion of their resources
1. Hybrid P2P: There is a central server that keeps information about the network. The peers are responsible for storing the information
2. Pure P2P: There is absolutely no central server or router. Each peer acts as both client and server at the same time. This is also sometimes
referred to as “serverless” P2P
3. Mixed P2P: It is between “hybrid” and “pure” P2P networks. An example of such a network is Gnutella that has no central server but
clusters its nodes around so-called “supernodes”
Invisible Secrets: It not only encrypts the data and files for safe-keeping or for secure transfer across the Net but also hides them in places
such as picture or sound files or webpages. These types of files are a perfect disguise for sensitive information.
Stealth Files: It hides any type of file in almost any other type of file. Using steganography technique, Stealth Files compresses, encrypts and
then hides any type of file inside various types of files (including EXE, DLL, OCX, COM, JPG, GIF, ART, MP3, AVI, WAV, DOC, and
BMP) and other types of video, image and executable files.
2. Steganalysis: Steganalysis is the art and science of detecting messages that are hidden in images, audio/video files using steganography.
The goal of steganalysis is to identify suspected packages and to determine whether or not they have a payload encoded into them, and if
possible recover it. Automated tools are used to detect such steganographed data/information hidden in the image and audio and/or video files.
1. Steps for SQL Injection Attack: Following are some steps for SQL injection attack:
1. The attacker looks for the web pages that allow submitting data, that is, login page, search page, feedback, etc…
2. To check the source code of any website, right click on the webpage and click on “view source” (if you are using IE – Internet Explorer) –
source code is displayed in the notepad. The attacker checks the source code of the HTML, and look for “FORM” tag in the HTML code.
Everything between the <FORM< and </FORM> have potential parameters that might be useful to find the vulnerabilities.
<FORM action=Search/search.asp method=post>
<input type=hidden name=A value=C></FORM>
3. The attacker inputs a single quote under the text box provided on the web page to accept the user-name and password. This checks whether
the user-input variable is sanitized or interpreted literally by the server.
4. The attacker uses SQL commands such as SELECT statement command to retrieve data from the database or INSERT statement to add
information to the database
4. How to Prevent SQL Injection Attacks: SQL injection attacks occur due to poor website administration and coding. The following steps
can be taken to prevent SQL injection.
1. Input validation
2. Modify error reports
3. Other preventions
2. NOPs: NOP or NOOP (short form of no operation or no operation performed) is an assembly language instruction/ command that effectively does
nothing at all.
3. Heap Buffer Overflow: Heap buffer overflow occurs in the heap data area and may be introduced accidentally by an application programmer, or it may
result from a deliberate exploit. In either case, the overflow occurs when an application copies more data into a buffer than the buff er was designed to
contain. The characteristics of stack-based and heap-based programming are as follows:
1. “Heap” is a “free store” that is a memory space, where dynamic objects are allocated
2. The heap is the memory space that is dynamically allocated new(), malloc() and calloc() functions
3. Dynamically created variables are created on the heap before the execution program is initialized to zeros and are stored in the memory until the life cycle
of the object has completed. How to Minimize Buffer Overflow Although it is difficult to prevent all possible attacks, the following methods will definitely
help to minimize such attacks:
1. Assessment of secure code manually
2. Disable stack execution
3. Compiler Tools
Identity Theft
• Identity theft is the act of wrongfully obtaining
someone’s personal information (that defines
one’s identity) without their permission.
• The personal information may include their
name, phone number, address, bank account
number, Aadhaar number or credit/debit card
number etc.
Identity Theft
Hacking or gaining Misuse of photo Credit/Debit
access to Social Media copies of identity Card Skimming
Accounts proofs
Case 1: Hacking or
gaining access to
Social Media Accounts
Case 1: Hacking or
gaining access to
Social Media Accounts
Contd…
Thank You…!!!