Module 3 Course Material
Module 3 Course Material
Introduction, Proxy Servers And Anonymizers, Phishing, Password Cracking, Key Loggers
And Spywares, Virus And Worms, Trojan Horses And Backdoors, Steganography, DoS And
DDoS Attacks, SQL Injection, Buffer Overflow, Attacks On Wireless Networks, Phishing And
Identity Theft: Introduction, Phishing, Identity Theft (ID Theft)
1. Introduction
2. Proxy Servers and Anonymizers,
3. Phishing
4. Password Cracking
5. Key loggers and Spywares
6. Virus and Worms
7. Trojan Horses and Backdoors
8. Steganography
9. DoS and DDoS Attacks
10. SQL Injection
11. Buffer Overflow
12. Attacks on Wireless Networks
13. Phishing and Identity Theft: Introduction - Phishing,
14. Identity Theft (ID Theft)
Introduction
Different forms of attacks through which attackers target the computer systems are as
follows:
1. Initial uncovering:
Two steps are involved here.
i. In the first step called as reconnaissance, the attacker gathers information
about the target on the Internet websites.
ii. In the second step, the attacker finds the company’s internal
network, such as, Internet domain, machine names and the company’s
Internet Protocol (IP) address ranges to steal the data.
2. Network probe (investigation):
Offline Attacks
Mostly offline attacks are performed from a location other than the target (i.e.,
either a computer system or while on the network) where these passwords reside or are
used.
Offline attacks usually require physical access to the computer and copying the password
file from the system onto removable media.
Password guidelines.
1. Passwords used for business E-Mail accounts, personal E-Mail accounts and
banking/financial user accounts should be kept separate.
2. Passwords should be of minimum eight alphanumeric characters (common names or
phrases should be phrased).
3. Passwords should be changed every 30/45 days.
4. Passwords should not be shared with relatives and/or friends.
5. Password used previously should not be used while renewing the password.
6. Passwords of personal E-Mail accounts and banking/financial user accounts should
be changed from a secured system, within couple of days, if these E-Mail
accounts has been accessed from public Internet facilities such as
cybercafes/hotels/libraries.
7. Passwords should not be stored under mobile phones/PDAs, as these devices are also
prone to cyberattacks.
8. In case E-Mail accounts/user accounts have been hacked, respective agencies/institutes
should be contacted immediately.
Hardware Keyloggers
Hardware keyloggers are small hardware devices.
These are connected to the PC and/or to the keyboard and save every keystroke into a file
or in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM Cards’ PINs.
Each keypress on the keyboard of the ATM gets registered by these keyloggers.
These keyloggers look like an integrated part of such systems; hence, bank customers are
unaware of their presence.
Spywares
Spyware is a type of malware (i.e., malicious software) that is installed on computers
which collects information about users without their knowledge.
The presence of Spyware is typically hidden from the user; it is secretly installed on the
user’s personal computer.
Sometimes, however, Spywares such as keyloggers are installed by the owner of a
shared, corporate or public computer on purpose to secretly monitor other users.
Some Important Spywares are as follows:
Spy. Spector Pro. Spector Pro.
eBlaster. Remotespy . Stealth Recorder Pro.
Stealth Website Logger. Flexispy. Wiretap Professional.
PC PhoneHome. SpyArsenal Print Monitor Pro.
Types of Viruses
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g., hard drives)
and which is used to start the computer system.
2. Program viruses: These viruses become active when the program file (usually with
extensions .bin, .com,.exe, .ovl, .drv) is excuted
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It infects
program files along with the boot record when the infected program is active.
4. Stealth viruses: It hides itself and so detecting this type of virus is very difficult. It can
hiding itself such a way that antivirus software also cannot detect it. Example for Stealth
virus is “Brain Virus”.
5. Polymorphic viruses: It acts like a “chameleon” that changes its virus signature (i.e.,
binary pattern) every time it spreads through the system (i.e., multiplies and infects a new
file). Hence, it is always difficult to detect polymorphic virus with the help of an antivirus
program.
6. Macro viruses: Many applications, such as Microsoft Word and Microsoft Excel,
support MACROs (i.e., macrolanguages). These macros are programmed as a macro
embedded in a document. Once macrovirus gets onto a victim’s computer then every
document he/she produces will become infected.
7. Active X and Java Control: All the web browsers have settings about Active X and
Java Controls.
World’s worst worm attacks.
Conficker INF/AutoRun Win32 PSW Win32/Agent
Win32/FlyStudio Win32/Pacex.Gen Win32/Qhost WMA/ TrojanDownloader
Backdoor
A backdoor is a means of access to a computer program that bypasses security
mechanisms. A programmer may sometimes install a backdoor so that the program can
be accessed for troubleshooting or other purposes.
However, attackers often use backdoors that they detect or install themselves as part of an
exploit.
In some cases, a worm is designed to take advantage of a backdoor created by an earlier
attack.
A backdoor works in background and hides from the user.
It is very similar to a virus and, therefore, is quite difficult to detect and completely
disable.
A backdoor is one of the most dangerous parasite, as it allows a malicious person to
perform any possible action on a compromised system.
Follow the following steps to protect your systems from Trojan Horses and backdoors:
1. Stay away from suspect websites/weblinks:
2. Surf on the Web cautiously:
3. Install antivirus/Trojan remover software:
Steganography
Steganography is the practice of concealing (hiding) a file, message, image, or video
within another file, message, image, or video. The word steganography combines the
Greek words steganos , meaning "covered, concealed, or protected", and graphein
meaning "writing".
It is a method that attempts to hide the existence of a message or communication.
Steganography is always misunderstood with cryptography
The different names for steganography are data hiding, information hiding and digital
watermarking.
Steganography can be used to make a digital watermark to detect illegal copying of
digital images. Thus, it aids confidentiality and integrity of the data.
Digital watermarking is the process of possibly irreversibly embedding information into
a digital signal.
The Digital signal may be, for example, audio, pictures or video.
Steganalysis
Steganalysis is the art and science of detecting messages that are hidden in images,
audio/video files using steganography.
The goal of steganalysis is to identify suspected packages and to determine whether or
not they have a payload encoded into them, and if possible recover it.
Automated tools are used to detect such steganographed data/information hidden in the
image and audio and/or video files.
Box 4.7 | Difference between Steganography and Cryptography
Steganography is the art and science of writing hidden messages in such a way that no one apart
from the intended recipient knows the existence of the message; this is in contrast to
cryptography, of the message itself is not disguised, but the content is obscured. It is said that
terrorists use where the existence steganography techniques to hide their communication in
images on the Internet; most popular images are used such as those of film actresses or other
celebrities. In its basic form, steganography is simple.
DoS Attacks
In this type of criminal act, the attacker floods the bandwidth of the victim’s network
or fills his E-Mail box with Spam mail depriving him of the services he is entitled to
access or provide.
The attackers typically target sites or services hosted on high-profile web servers
such as banks, credit card payment gateways, mobile phone networks and even root name
servers.
DDoS Attacks
In a DDoS attack, an attacker may use your computer to attack another computer.
By taking advantage of security vulnerabilities or weaknesses, an attacker could take
control of your computer.
He/she could then force your computer to send huge amounts of data to a website or send
Spam to particular E-Mail addresses.
The attack is “distributed” because the attacker is using multiple computers, including
yours, to launch the DoS attack.
A DDoS attack is a distributed DoS wherein a large number of zombie systems are
synchronized to attack a particular system.
SQL Injection
Structured Query Language (SQL) is a database computer language designed for
managing data in relational database management systems (RDBMS).
SQL injection is a code injection technique that exploits a security vulnerability occurring
in the database layer of an application.
Here are a few examples of phrases used to entice the user to take the action.
1. “Verify your account”:
2. “You have won the lottery”:
3. “If you don’t respond within 48 hours, your account will be closed”:
Let us understand the ways to reduce the amount of Spam E-Mails we receive.
1. Share personal E-Mail address with limited people and/or on public websites – the more
it is exposed to the public, the more Spam E-Mails will be received.
2. Never reply or open any Spam E-Mails.
3. Disguise the E-Mail address on public website or groups by spelling out the sign “@” and
the DOT (.); for example, RajeevATgmailDOTcom. This usually prohibits phishers to
catch valid E-Mail addresses while gathering E-Mail addresses through programs.
ID theft fraudsters and/or industrial/international spies target to gain the access to private,
confidential, secret and top secret information.