Cybersecurity Unit-2 Notes
Cybersecurity Unit-2 Notes
Cybersecurity Unit-2 Notes
1. Introduction,
3. Trends in Mobility,
12.Laptops.
Prepared by:Suraj B S
2
Introduction
In this modern era, the rising importance of electronic gadgets (i.e., mobile hand-held
devices) – which became an integral part of business, providing connectivity with the
Internet outside the office – brings many challenges to secure these devices from being a
victim of cybercrime.
In the recent years, the use of laptops, personal digital assistants (PDAs), and mobile
phones has grown from limited user communities to widespread desktop replacement and
broad deployment.
By the end of 2008 around 1.5 billion individuals around the world had the Internet
access.
In November 2007, mobile phone users were numbered 3.3 billion, with a growing
proportion of those mobile devices enabled for the Internet access.
The complexity of managing these devices outside the walls of the office is something
that the information technology (IT) departments in the organizations need to address.
Remote connection has extended from fixed location dial-in to wireless-on-the-move, and
smart hand-held devices such as PDAs have become networked, converging with mobile
phones.
Furthermore, the maturation of the PDA and advancements in cellular phone technology
have converged into a new category of mobile phone device: the Smartphone.
Smartphones combine the best aspects of mobile and wireless technologies and blend
them into a useful business tool.
Although IT departments of organizations as yet are not swapping employees’ company-
provided PDAs (as the case may be) for the Smartphones, many users may bring these
devices from home and use them in the office.
Thus, the larger and more diverse community of mobile users and their devices increase
the demands on the IT function to secure the device, data and connection to the network,
keeping control of the corporate assets, while at the same time supporting mobile user
productivity.
Clearly, these technological developments present a new set of security challenges to the
global organizations.
Mobile computing
Mobile computing is “taking a computer and all necessary files and software out into the
field.” Many types of mobile computers have been introduced since 1990s.
Prepared by:Suraj B S
3
Wireless computing
Wireless refers to the method of transferring information between a computing device
(such as a PDA) and a data source (such as an agency database server) without a physical
connection.
Not all wireless communication technologies are mobile. For example, lasers are used in
wireless data transfer between buildings, but cannot be used in mobile communications at
this time.
Mobile simply describes a computing device that is not restricted to a desktop, that is, not
tethered. As more personal devices find their way into the enterprise, corporations are
realizing cybersecurity threats that come along with the benefits achieved with mobile
solutions.
Mobile computing does not necessarily require wireless communication. In fact, it may
not require communication among devices at all.
Thus, while “wireless” is a subset of “mobile,” in most cases, an application can be
mobile without being wireless.
Smart hand-helds are defined as hand-held or pocket-sized devices that connect to a
wireless or cellular network, and can have software installed on them; this includes
networked PDAs and Smartphones.
Trends in Mobility
Mobile computing is moving into a new era, third generation (3G), which promises
greater variety in applications and have highly improved usability as well as speedier
networking.
Prepared by:Suraj B S
4
“iPhone” from Apple and Google-led “Android” phones are the best examples of this
trend and there are plenty of other developments that point in this direction.
This smart mobile technology is rapidly gaining popularity and the attackers (hackers and
crackers) are among its biggest fans.
It is worth noting the trends in mobile computing; this will help readers to realize the
seriousness of cybersecurity issues in the mobile computing domain.
Figure 3.3 shows the different types of mobility and their implications.
Prepared by:Suraj B S
5
2. Denial-of-service (DoS): The main objective behind this attack is to make the system
unavailable to the intended users. Virus attacks can be used to damage the system to make the
system unavailable.
3. Overbilling attack: Overbilling involves an attacker hijacking a subscriber’s IP address
and then using it (i.e., the connection) to initiate downloads that are not “Free downloads” or
simply use it for his/her own purposes. In either case, the legitimate user is charged for the
activity which the user did not conduct.
4. Spoofed policy development process (PDP): These types of attacks exploit the
vulnerabilities in the GTP [General Packet Radio Service (GPRS) Tunneling Protocol].
5. Signaling-level attacks: The Session Initiation Protocol (SIP) is a signaling protocol used
in IP multimedia subsystem (IMS) networks to provide Voice Over Internet Protocol (VoIP)
services. There are several vulnerabilities with SIP-based VoIP systems.
Prepared by:Suraj B S
6
Credit card companies, normally, do a good job of helping consumers resolve identity
(ID) theft problems once they occur. But they could reduce ID fraud even more if they
give consumers better tools to monitor their accounts and limit high-risk transactions
Figure 3.5, the basic flow is as follows:
1. Merchant sends a transaction to bank;
2. The bank transmits the request to the authorized cardholder
[not short message service (SMS)];
3. The cardholder approves or rejects (password protected);
4. The bank/merchant is notified;
5. The credit card transaction is completed.
Prepared by:Suraj B S
7
Traditional Techniques
The traditional and the first type of credit card fraud is paper-based fraud – application
fraud, wherein a criminal uses stolen or fake documents such as utility bills and bank
statements that can build up useful personally Identifiable Information (PII) to open an
account in someone else’s name.
Application fraud can be divided into
1. ID theft: Where an individual pretends to be someone else
2. Financial fraud: Where an individual gives false information about his or her financial
status to acquire credit. Illegal use of lost and stolen cards is another form of traditional
technique. Stealing a credit card is either by pickpocket or from postal service before it
reaches its final destination.
Modern Techniques
Skimming is where the information held on either the magnetic strip on the back of the
credit card or the data stored on the smart chip are copied from one card to another.
Site cloning and false merchant sites on the Internet are becoming a popular method of
fraud and to direct the users to such bogus/fake sites is called Phishing.
Such sites are designed to get people to hand over their credit card details without
realizing that they have been directed to a fake weblink /website (i.e., they have been
scammed).
1. Triangulation: It is another method of credit card fraud and works in the fashion as
explained further.
• The criminal offers the goods with heavy discounted rates through a website designed and
hosted by him, which appears to be legitimate merchandise website.
• The customer registers on this website with his/her name, address, shipping address and
valid credit card details.
• The criminal orders the goods from a legitimate website with the help of stolen credit card
Prepared by:Suraj B S
8
details and supply shipping address that have been provided by the customer while
registering on the criminal’s website.
• The goods are shipped to the customer and the transaction gets completed.
• The criminal keeps on purchasing other goods using fraudulent credit card details of
different customers till the criminal closes existing website and starts a new one.
2. Credit card generators: It is another modern technique – computer emulation software –
that creates valid credit card numbers and expiry dates. The criminals highly rely on these
generators to create valid credit cards. These are available for free download on the Internet.
Prepared by:Suraj B S
9
There is one more dimension to mobile device security: new mobile applications are
constantly being provided to help protect against Spyware, viruses, worms, malware and
other Malicious Codes that run through the networks and the Internet.
The mobile security issues on a Windows platform is that the baseline security is not
configured properly.
When you get a computer installed or use a mobile device for the first time, it may not be
100% secure. Even if users go through every Control Panel setting and group policy
option, they may not get the computer to the desired baseline security.
For example, the only way to get a Windows computer to a security level that will be near
bulletproof is to make additional registry changes that are not exposed through any
interface.
There are many ways to complete these registry changes on every computer, but some are
certainly more efficient than others.
Naïve (Innocent) users may think that for solving the problem of mobile device security
there are not many registry settings to tackle.
However, the reality is far different! The reality of the overall problem becomes prevalent
when you start researching and investigating the abundance of “registry hacks” that are
discussed in Microsoft Knowledge Base articles.
Figure 3.7 displays an illustration of how some tools allow users to browse to the desired
registry value on their mobile devices.
Prepared by:Suraj B S
10
Prepared by:Suraj B S
11
Prepared by:Suraj B S
12
RAS (Remote Access Server) is an important consideration for protecting the business-
sensitive data that may reside on the employees’ mobile devices.
In terms of cybersecurity, mobile devices are sensitive. Figure 3.11 : organization’s
sensitive data can happen through mobile hand-held devices carried by employees.
Prepared by:Suraj B S
13
In addition to being vulnerable to unauthorized access on their own, mobile devices also
provide a route into the systems with which they connect.
By using a mobile device to appear as a registered user (impersonating or masquerading)
to these systems, a would-be cracker is then able to steal data or compromise corporate
systems in other ways.
Another threat comes from the practice of port scanning.
First, attackers use a domain name system (DNS) server to locate the IP address of a
connected computer. A domain is a collection of sites that are related in some sense.
Second, they scan the ports on this known IP address, working their way through its
Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) stack to see what
communication ports are unprotected by firewalls.
For instance, File Transfer Protocol (FTP) transmissions are typically assigned to port 21.
If this port is left unprotected, it can be misused by the attackers (see Box 3.5).
Protecting against port scanning requires software that can trap unauthorized incoming
data packets and prevent a mobile device from revealing its existence and ID.
A personal firewall on a pocket PC or Smartphone device can be an effective protective
screen against this form of attack for the users connecting through a direct Internet or
RAS connection.
Prepared by:Suraj B S
14
Box 3.6 | Tips to Secure your Cell/Mobile Phone from being Stolen/Lost
Ensure to note the following details about your cell phone and preserve it in a safe place:
1. Your phone number; 2. the make and model; 3. color and appearance details;
4. PIN and/or security lock code; 5. IMEI number.
The International Mobile Equipment Identity (IMEI)
It is a number unique to every GSM, WCDMA and iDEN cell phone. It is a 15-digit
number and can be obtained by entering *#06# from the keypad.
The IMEI number is used by the GSM network to identify valid devices and therefore
can be used to stop a stolen phone from accessing the network in that country.
For example, if a mobile phone is stolen, the owner can call his or her service
provider and instruct them to “lock” the phone using its IMEI number.
This will help to stop the usage of phone in that country, even if a SIM is changed.
Visit the weblink http://www.numberingplans.com/?page=analysis&sub=imeinr to
check all information about your cell phone such as manufacturer, model type and
country of approval of a handset.
Following are few antitheft software(s) available in the market:
1. GadgetTrak: http://www.gadgettrak.com/products/mobile/
2. Back2u: http://www.bak2u.com/phonebakmobilephone.php
3. Wavesecure: https://www.wavesecure.com/
4. F-Secure: http://www.f-secure.com/
Prepared by:Suraj B S
15
Mobile Viruses
A mobile virus is similar to a computer virus that targets mobile phone data or
applications/software installed in it.
Virus attacks on mobile devices are no longer an exception or proof-of-concept
nowadays.
In total, 40 mobile virus families and more than 300(+) mobile viruses have been
identified.
First mobile virus was identified in 2004 and it was the beginning to understand that
mobile devices can act as vectors to enter the computer network.
Mobile viruses get spread through two dominant communication protocols – Bluetooth
and MMS.
Bluetooth virus can easily spread within a distance of 10–30 m, through Bluetooth-
activated phones
MMS virus can send a copy of itself to all mobile users whose numbers are available in
the infected mobile phone’s address book.
How to Protect from Mobile Malwares Attacks
Following are some tips to protect mobile from mobile malware attacks:
1. Download or accept programs and content (including ring tones, games, video clips and
photos) only from a trusted source.
2. If a mobile is equipped with Bluetooth, turn it OFF or set it to non-discoverable mode
when it is not in use and/or not required to use.
3. If a mobile is equipped with beam (i.e., IR), allow it to receive incoming beams, only from
the trusted source.
4. Download and install antivirus software for mobile devices.
Mishing
Mishing is a combination of mobile and Phishing.
Mishing attacks are attempted using mobile phone technology.
M-Commerce is fast becoming a part of everyday life. If you use your mobile phone for
purchasing goods/services and for banking, you could be more vulnerable to a Mishing
scam.
A typical Mishing attacker uses call termed as Vishing or message (SMS) known as
Smishing.
Attacker will pretend to be an employee from your bank or another organization and will
claim a need for your personal details.
Attackers are very creative and they would try to convince you with diferent reasons why
they need this information from you.
Vishing
Vishing is the criminal practice of using social engineering over the telephone system,
most often using features facilitated by VoIP, to gain access to personal and financial
information from the public for the purpose of financial reward.
The term is a combination of V – voice and Phishing.
Vishing is usually used to steal credit card numbers or other related data used in ID theft
schemes from individuals.
The most profitable uses of the information gained through a Vishing attack include:
1. ID theft; 2. purchasing luxury goods and services; 3. transferring money/funds;
4. monitoring the victims’ bank accounts; 5. making applications for loans and credit cards.
Prepared by:Suraj B S
16
Following are the steps detailing on how direct phone call works:
• The criminal gathers cell/mobile phone numbers located and steals mobile phone numbers
after accessing cellular company.
• The criminal often uses a dialer to call phone numbers of people from a specific region, and
that to from the gathered list of phone numbers.
• When the victim answers the call, an automated recorded message is played to alert the
victim that his/her credit card has had fraudulent activity and/or his/her bank account has had
unusual activity.
The message instructs the victim to call one phone number immediately.
The same phone number is often displayed in the spoofed caller ID, under the name of the
financial company the criminal is pretending to represent.
• When the victim calls on the provided number, he/she is given automated instructions to
enter his/her credit card number or bank account details with the help of phone keypad.
• Once the victim enters these details, the criminal (i.e., visher) has the necessary information
to make fraudulent use of the card or to access the account.
• Such calls are often used to gain additional details such as date of birth, credit card
expiration date, etc.
Some of the examples of vished calls, when victim calls on the provided number after
receiving phished E-Mail and/or after listening voicemail, are as follows:
1. Automated message: Thank you for calling (name of local bank). Your business is
important to us. To help you reach the correct representative and answer your query fully,
please press the appropriate number on your handset after listening to options.
• Press 1 if you need to check your banking details and live balance.
• Press 2 if you wish to transfer funds.
• Press 3 to unlock your online profile.
• Press 0 for any other query.
2. Regardless of what the victim enters (i.e., presses the key), the automated system prompts
him to authenticate himself: “The security of each customer is important to us. To proceed
further, we require that you authenticate your ID before proceeding. Please type your bank
account number, followed by the pound key.”
3. The victim enters his/her bank account number and hears the next prompt: “Thank you.
Now please type your date of birth, followed by the pound key. For example 01 January 1950
press 01011950.”
4. The caller enters his/her date of birth and again receives a prompt from the automated
system: “Thank you. Now please type your PIN, followed by the pound key.”
5. The caller enters his PIN and hears one last prompt from the system: “Thank you.
We will now transfer you to the appropriate representative.” At this stage, the phone call gets
disconnected, and the victim thinks there was something wrong with the telephone line; or
visher may redirect the victim to the real customer service line, and the victim will not be
able to know at all that his authentication was appropriated by the visher.
Prepared by:Suraj B S
17
Smishing
Smishing is a criminal offense conducted by using social engineering techniques similar
to Phishing.
The name is derived from “SMS PhISHING.”
SMS can be abused by using different methods and techniques other than information
gathering under cybercrime.
Smishing uses cell phone text messages to deliver a lure message to get the victim to
reveal his/her PI.
The popular technique to “hook” (method used to actually “capture” your information)
the victim is either provide a phone number to force the victim to call or provide a
website URL to force the victim to access the URL, wherein, the victim gets connected
with bogus website (i.e., duplicate but fake site created by the criminal) and submits
his/her PI.
Smishing works in the similar pattern as Vishing.
3. Never click on a hot link received through message on your Smartphone or PDA. Hot
links are links that you can click, which will take you directly to the Internet sites.
Smishing messages may have hot links, wherein you click on the link and download Spyware
to your phone without knowing. Once this software has been downloaded, criminals can
easily steal any information that is available on your cell phone and have access to everything
that you do on your cell phone.
Prepared by:Suraj B S
18
Hacking Bluetooth
Bluetooth is an open wireless technology standard used for communication (i.e.,
exchanging data) over short distances (i.e., using short length radio waves) between fixed
and/or mobile device.
Bluetooth is a short-range wireless communication service/technology that uses the 2.4-
GHz frequency range for its transmission/communication.
The older standard – Bluetooth 1.0 has a maximum transfer speed of 1 Mbps (megabit per
second) compared with 3 Mbps by Bluetooth 2.0.
When Bluetooth is enabled on a device, it essentially broadcasts “I’m here, and I’m able
to connect” to any other Bluetooth-based device within range.
This makes Bluetooth use simple and straightforward, and it also makes easier to identify
the target for attackers.
The attacker installs special software [Bluetooth hacking tools] on a laptop and then
installs a Bluetooth antenna.
Whenever an attacker moves around public places, the software installed on laptop
constantly scans the nearby surroundings of the hacker for active Bluetooth connections.
Once the software tool used by the attacker finds and connects to a vulnerable Bluetooth-
enabled cell phone, it can do things like download address book information, photos,
calendars, SIM card details, make long-distance phone calls using the hacked device, bug
phone calls and much more.
Bluejacking, Bluesnarfing, Bluebugging and Car Whisperer are common attacks that have
emerged as Bluetooth-specific security issues.
1. Bluejacking: It means Bluetooth + Jacking where Jacking is short name for hijack – act of
taking over something. Bluejacking is sending unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones, PDAs or computers (within 10-m radius),
Bluejacking is harmless, as bluejacked users generally do not understand what has happened
and hence they may think that their phone is malfunctioning.
2. Bluesnarfing: It is the unauthorized access from a wireless device through a Bluetooth
connection between cell phones, PDAs and computers. This enables the attacker to access a
calendar, contact list, SMS and E-Mails as well as enable attackers to copy pictures and
private videos.
Prepared by:Suraj B S
19
3. Bluebugging: It allows attackers to remotely access a user’s phone and use its features
without user’s attention.
4. Car Whisperer: It is a piece of software that allows attackers to send audio to and receive
audio from a Bluetooth-enabled car stereo.
“Bluetooth and Bluetooth Security” is a separate subject in itself. Readers may visit the
following
websites to explore more on this topic:
• https://www.bluetooth.org/apps/content/
• http://www.bluetooth.com/English/Pages/default.aspx
• http://www.bluetoothhack.info/
Prepared by:Suraj B S
20
Prepared by:Suraj B S
21
The term “strong encryption” is used here to describe these technologies in contrast to the
simple encryption.
Strong encryption means that it is much harder to break, but it also has a significant
impact on performance.
Prepared by:Suraj B S
22
3. Standardize the mobile computing devices and the associated security tools being used
with them.
4. Develop a specific framework for using mobile computing devices.
5. Maintain an inventory so that you know who is using what kinds of devices.
6. Establish patching procedures for software on mobile devices.
7. Label the devices and register them with a suitable service.
8. Establish procedures to disable remote access for any mobile.
9. Remove data from computing devices that are not in use
10. Provide education and awareness training to personnel using mobile devices.
1. Cables and hardwired locks: The most cost-efficient and ideal solution to safeguard any
mobile device is securing with cables and locks, specially designed for laptops.
2. Laptop safes: Safes made of polycarbonate – the same material that is used in bulletproof
windows, police riot shields and bank security screens – can be used to carry and safeguard
the laptops
3. Motion sensors and alarms: Alarms and motion sensors are very efficient in securing
laptops.
4. Warning labels and stamps: Warning labels containing tracking information and
identification details can be fixed onto the laptop to deter aspiring thieves. These labels
cannot be removed easily and are a low-cost solution to a laptop theft.
Prepared by:Suraj B S
1
5. Other measures for Protecting laptops are as follows:
• keeping the laptop close to oneself wherever possible;
• carrying the laptop in a different and unobvious bag
• creating the awareness among the employees about the sensitive information contained inthe
laptop;
• making a copy of the purchase receipt of laptop
• installing encryption software to protect information stored on the laptop;
• using personal firewall software to block unwanted access and intrusion;
• updating the antivirus software regularly;
• tight office security using security guards and securing the laptop by locking it down in
lockers when not in use;
• never leaving the laptop unattended in public places
• disabling IR ports and wireless cards when not in use.
• Choosing a secure OS
• Registering the laptop with the laptop manufacturer to track down the laptop in case of
theft.
• Disabling unnecessary user accounts and renaming the administrator account.
• Backing up data on a regular basis.
A few logical access controls are as follows:
1. Protecting from malicious programs/attackers/social engineering.
2. Avoiding weak passwords/open access.
3. Monitoring application security and scanning for vulnerabilities.
4. Ensuring that unencrypted data/unprotected fi le systems do not pose threats.
5. Proper handling of removable drives/storage mediums/unnecessary ports.
6. Password protection through appropriate passwords rules and use of strong passwords.
7. Locking down unwanted ports/devices.
8. Regularly installing security patches and updates.
9. Installing antivirus software/firewalls/intrusion detection system (IDSs).
10. Encrypting critical file systems.
11. Other countermeasures:
Preapared by:Suraj B S
2
Preapared by:Suraj B S
3
Introduction
Different forms of attacks through which attackers target the computer systems are as follows
1. Initial uncovering:
Two steps are involved here.
In the first step called as reconnaissance, the attacker gathers information about the target on
the Internet websites.
In the second step, the attacker finds the company’s internal network, such as, Internet
domain, machine names and the company’s Internet Protocol (IP) address ranges to steal the
data.
Preapared by:Suraj B S
4
Preapared by:Suraj B S
5
Phishing
“Phishing” refers to an attack using mail programs to deceive Internet users into disclosing
confidential information that can be then exploited for illegal purposes.
While checking electronic mail (E-Mail) one day a user finds a message from the bank
threatening to close the bank account if he/she does not reply immediately.
Although the message seems to be suspicious from the contents of the message, it is difficult
to conclude that it is a fake/false E-Mail.
This message and other such messages are examples of Phishing – in addition to stealing
personal and financial data – and can infect systems with viruses and also a method of online
ID theft in various cases.
These messages look authentic and attempt to get users to reveal their personal information.
It is believed that Phishing is an alternative spelling of “fishing,” as in “to fish for
information.”
The first documented use of the word “Phishing” was in 1996.
Nowadays, more and more organizations/institutes provide greater online access for their customers
and hence criminals are successfully using Phishing techniques to steal personal information and
conduct ID theft at a global level.
Preapared by:Suraj B S
6
Password Cracking
Password is like a key to get an entry into computerized systems like a lock.
Password cracking is a process of recovering passwords from data that have been stored in or
transmitted by a computer system.
Usually, an attacker follows a common approach – repeatedly making guesses for the
password.
The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system administrators to check for easily crackable passwords.
3. To gain unauthorized access to a system.
Manual password cracking is to attempt to logon with different passwords. The attacker followsthe
following
steps:
1. Find a valid user account such as an Administrator or Guest;
2. create a list of possible passwords;
3. rank the passwords from high to low probability;
4. key-in each password;
5. try again until a successful password is found.
Passwords can be guessed sometimes with knowledge of the user’s personal information.Examples of
guessable passwords include:
1. Blank (none);
2. the words like “password,” “passcode” and “admin”;
3. series of letters from the “QWERTY” keyboard, for example, qwerty, asdf or qwertyuiop;
4. user’s name or login name;
5. name of user’s friend/relative/pet;
6. user’s birthplace or date of birth, or a relative’s or a friend’s;
7. user’s vehicle number, office number, residence number or mobile number;
8. name of a celebrity who is considered to be an idol (e.g., actors, actress, spiritual gurus) by the
user;
An attacker can also create a script file (i.e., automated program) which will be executed to
try each password in a list.
This is still considered manual cracking, is time-consuming and not usually effective.
Passwords are stored in a database and password verification process is established into
the system when a user attempts to login or access a restricted resource.
To ensure confidentiality of passwords, the password verification data is usually not
stored in a clear text format.
For example, one-way function (which may be either an encryption function or a
cryptographic hash) is applied to the password, possibly in combination with other data, and
the resulting value is stored.
When a user attempts to login to the system by entering the password, the same function is
applied to the entered value and the result is compared with the stored value. If they match,
user gains the access; this process is called authentication.
Preapared by:Suraj B S
7
The most commonly used hash functions can be computed rapidly and the attacker can test these
hashes with the help of passwords cracking tools (see Table 4.3) to get the plain text password.
Online Attacks
An attacker can create a script file that will be executed to try each password in a list and
when matches, an attacker can gain the access to the system.
The most popular online attack is man-in-the middle (MITM) attack, also termed as “bucket-
brigade attack” or sometimes “Janus attack.”
It is a form of active stealing in which the attacker establishes a connection between a victim
and the server to which a victim is connected.
When a victim client connects to the fraudulent server, the MITM server intercepts the call,
hashes the password and passes the connection to the victim server (e.g., an attacker within
reception range of an unencrypted Wi-Fi wireless access point can insert himself as a man-in-
the-middle).
This type of attack is used to obtain the passwords for E-Mail accounts on public websites
such as Yahoo, Hotmail and Gmail and can also used to get the passwords for financial
websites that would like to gain the access to banking websites.
Offline Attacks
Mostly offline attacks are performed from a location other than the target (i.e., either a
computer system or while on the network) where these passwords reside or are used.
Offline attacks usually require physical access to the computer and copying the password file
from the system onto removable media.
Password guidelines.
1. Passwords used for business E-Mail accounts, personal E-Mail accounts and banking/financial
user accounts should be kept separate.
2. Passwords should be of minimum eight alphanumeric characters (common names or phrases
should be phrased).
3. Passwords should be changed every 30/45 days.
4. Passwords should not be shared with relatives and/or friends.
5. Password used previously should not be used while renewing the password.
6. Passwords of personal E-Mail accounts and banking/financial user accounts should be
changed from a secured system, within couple of days, if these E-Mail accounts has been
accessed from public Internet facilities such as cybercafes/hotels/libraries.
7. Passwords should not be stored under mobile phones/PDAs, as these devices are also prone to
cyberattacks.
8. In case E-Mail accounts/user accounts have been hacked, respective agencies/institutes should
be contacted immediately.
Preapared by:Suraj B S
8
Software Keyloggers
Software keyloggers are software programs installed on the computer systems which
usually are located between the OS and the keyboard hardware, and every keystroke is
recorded.
Software keyloggers are installed on a computer system by Trojans or viruses without the
knowledge of the user.
Cybercriminals always install such tools on the insecure computer systems available in
public places (i.e., cybercafés, etc) and can obtain the required information about the victim
very easily.
A keylogger usually consists of two files that get installed in the same directory: a dynamic
link library (DLL) file and an EXEcutable (EXE) file that installs the DLL file and triggers it
to work. DLL does all the recording of keystrokes.
Hardware Keyloggers
Hardware keyloggers are small hardware devices.
These are connected to the PC and/or to the keyboard and save every keystroke into a file or
in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM Cards’ PINs.
Each keypress on the keyboard of the ATM gets registered by these keyloggers.
These keyloggers look like an integrated part of such systems; hence, bank customers are
unaware of their presence.
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system and
also can remove the tool. (Visit http://www.anti-keyloggers.com for more information)
Advantages of using antikeylogger are as follows:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence, antikeyloggers
can detect installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such as
other antivirus and antispy programs; if not updated, it does not serve the purpose, which makes
the users at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of installing
Preapared by:Suraj B S
9
keyloggers.
4. It prevents ID theft (we will discuss it more in Chapter 5).
5. It secures E-Mail and instant messaging/chatting.
Spywares
Spyware is a type of malware (i.e., malicious software) that is installed on computers which
collects information about users without their knowledge.
The presence of Spyware is typically hidden from the user; it is secretly installed on the
user’s personal computer.
Sometimes, however, Spywares such as keyloggers are installed by the owner
of a shared, corporate or public computer on purpose to secretly monitor other
users.
Some Important Spywares are as follows
Spy. Spector Pro. Spector Pro.
eBlaster. Remotespy . Stealth Recorder Pro.
Stealth Website Logger. Flexispy. Wiretap Professional.
PC PhoneHome. SpyArsenal Print Monitor Pro.
Preapared by:Suraj B S
9
Prepared by:Suraj B S
10
Computer virus has the ability to copy itself and infect the system.
The term virus is also commonly but erroneously used to refer to other types of malware,
Adware and Spyware programs that do not have reproductive ability.
A true virus can only spread from one system to another (in some form of executable code)
when its host is taken to the target computer; for instance, when a user sent it over the
Internet or a network, or carried it on a removable media such as CD, DVD or USB drives.
Viruses can increase their chances of spreading to other systems by infecting files on a
network file system or a file system that is accessed by another system.
Malware includes computer viruses, worms, Trojans, most Rootkits, Spyware, dishonest
Adware, crimeware and other malicious and unwanted software as well as true viruses.
Viruses are sometimes confused with computer worms and Trojan Horses, which are
technically different (see Table 4.7 to understand the difference between computer virus and
worm).
A worm spreads itself automatically to other computers through networks by exploiting
security vulnerabilities, whereas a Trojan is a code/program that appears to be harmless but
hides malicious functions.
Worms and Trojans, such as viruses, may harm the system’s data or performance.
Some viruses and other malware have noticeable symptoms that enable computer user to take
necessary corrective actions, but many viruses are surreptitious or simply do nothing for
user’s to take note of them.
Some viruses do nothing beyond reproducing themselves.
Types of Viruses
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g., hard drives) and
which is used to start the computer system.
2. Program viruses: These viruses become active when the program file (usually with
extensions .bin, .com,.exe, .ovl, .drv) is excuted
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It infects program
files along with the boot record when the infected program is active.
Preapared by:Suraj B S
11
4. Stealth viruses: It hides itself and so detecting this type of virus is very difficult. It can hiding
itself such a way that antivirus software also cannot detect it. Example for Stealth virus is “Brain
Virus”.
5. Polymorphic viruses: It acts like a “chameleon” that changes its virus signature (i.e., binary
pattern) every time it spreads through the system (i.e., multiplies and infects a new file). Hence,
it is always difficult to detect polymorphic virus with the help of an antivirus program.
6. Macro viruses: Many applications, such as Microsoft Word and Microsoft Excel, support
MACROs (i.e., macrolanguages). These macros are programmed as a macro embedded in a
document. Once macrovirus gets onto a victim’s computer then every document he/she produces
will become infected.
7. Active X and Java Control: All the web browsers have settings about Active X and Java
Controls.
World’s worst worm attacks.
Conficker INF/AutoRun Win32 PSW Win32/Agent
Win32/FlyStudio Win32/Pacex.Gen Win32/Qhost WMA/ TrojanDownloader
The world’s worst virus and worm attacks!!!
Morris Worm ILOVEYOU Nimda Jerusalem
Code Red Melissa MSBlast
Sobig Storm Worm Michelangelo
Preapared by:Suraj B S
12
Backdoor
A backdoor is a means of access to a computer program that bypasses security mechanisms.
A programmer may sometimes install a backdoor so that the program can be accessed for
troubleshooting or other purposes.
However, attackers often use backdoors that they detect or install themselves as part of an
exploit.
In some cases, a worm is designed to take advantage of a backdoor created by an earlier
attack.
A backdoor works in background and hides from the user.
It is very similar to a virus and, therefore, is quite difficult to detect and completely disable.
A backdoor is one of the most dangerous parasite, as it allows a malicious person to perform
any possible action on a compromised system.
Follow the following steps to protect your systems from Trojan Horses and
backdoors:
1. Stay away from suspect websites/weblinks:
2. Surf on the Web cautiously:
3. Install antivirus/Trojan remover software:
Preapared by:Suraj B S
13
Steganography
Steganography is the practice of concealing (hiding) a file, message, image, or video within
another file, message, image, or video. The word steganography combines
the Greek words steganos , meaning "covered, concealed, or protected", and graphein
meaning "writing".
It is a method that attempts to hide the existence of a message or communication.
Steganography is always misunderstood with cryptography
The different names for steganography are data hiding, information hiding and digital
watermarking.
Steganography can be used to make a digital watermark to detect illegal copying of digital
images. Thus, it aids confidentiality and integrity of the data.
Digital watermarking is the process of possibly irreversibly embedding information into a
digital signal.
The Digital signal may be, for example, audio, pictures or video.
If the signal is copied then the information is also carried in the copy.
In other words, when steganography is used to place a hidden “trademark” in images, music
and software, the result is a technique referred to as “watermarking”
Steganalysis
Steganalysis is the art and science of detecting messages that are hidden in images,
audio/video files using steganography.
The goal of steganalysis is to identify suspected packages and to determine whether or not
they have a payload encoded into them, and if possible recover it.
Automated tools are used to detect such steganographed data/information hidden in the
image and audio and/or video files.
Box 4.7 | Difference between Steganography and Cryptography
Steganography is the art and science of writing hidden messages in such a way that no one apart
from the intended recipient knows the existence of the message; this is in contrast to
cryptography, of the message itself is not disguised, but the content is obscured. It is said that
terrorists use where the existence steganography techniques to hide their communication in
images on the Internet; most popular images are used such as those of fi lm actresses or other
celebrities. In its basic form, steganography is simple.
Preapared by:Suraj B S
14
Preapared by:Suraj B S
15
2. Ping of death attack: The ping of death attack sends oversized Internet Control Message
Protocol (ICMP) packets, and it is one of the core protocols of the IP Suite. It is mainly used by
networked computers’ OSs to send error messages indicating (e.g., that a requested service is not
available or that a host or router could not be reached) datagrams (encapsulated in IP packets) to
the victim.
3. SYN attack: It is also termed as TCP SYN Flooding. In the TCP, handshaking of network
connections is done with SYN and ACK messages.
An attacker initiates a TCP connection to the server with an SYN.
The server replies with an SYN-ACK.
The client then does not send back an ACK, causing the server to allocate memory for the
pending connection and wait.
This fills up the buffer space for SYN messages on the target system, preventing other
systems on the network from communicating with the target system.
4. Teardrop attack: The teardrop attack is an attack where fragmented packets are forged to
overlap each other when the receiving host tries to reassemble them. IP’s packet
fragmentation algorithm is used to send corrupted packets to confuse the victim and may hang
the system. Th is attack can crash various OSs due to a bug in their TCP/IP fragmentation
reassembly code.
5. Smurf attack: This is a type of DoS attack that floods a target system via spoofed
broadcast ping messages. This attack consists of a host sending an echo request (ping) to a
network broadcast address.
6. Nuke: Nuke is an old DoS attack against computer networks consisting of fragmented or
invalid packets sent to the target.
Preapared by:Suraj B S
16
DDoS Attacks
In a DDoS attack, an attacker may use your computer to attack another computer.
By taking advantage of security vulnerabilities or weaknesses, an attacker could take control
of your computer.
He/she could then force your computer to send huge amounts of data to a website or send
Spam to particular E-Mail addresses.
The attack is “distributed” because the attacker is using multiple computers, including yours,
to launch the DoS attack.
A DDoS attack is a distributed DoS wherein a large number of zombie systems are
synchronized to attack a particular system.
The zombie systems are called “secondary victims” and the main target is called “primary
victim.”
Malware can carry DDoS attack mechanisms – one of the better-known examples of this is
MyDoom.
Botnet is the popular medium to launch DoS/DDoS attacks.
Attackers can also break into systems using automated tools that exploit flaws in programs
that listen for connections from remote hosts.
Preapared by:Suraj B S
17
SQL Injection
Structured Query Language (SQL) is a database computer language designed for managing
data in relational database management systems (RDBMS).
SQL injection is a code injection technique that exploits a security vulnerability occurring in
the database layer of an application.
SQL injection attacks are also known as SQL insertion attacks.
Attackers target the SQL servers – common database servers used by many organizations to
store confidential data.
The prime objective behind SQL injection attack is to obtain the information while accessing
a database table that may contain personal information such as credit card numbers, social
security numbers or passwords.
During an SQL injection attack, Malicious Code is inserted into a web form field or the
website’s code.
For example, when a user logs in with username and password, an SQL query is sent to the
database to check if a user has valid name and password.
With SQL injection, it is possible for an attacker to send crafted username and/or password
field that will change the SQL query.
Here are few examples of variable field text the attacker uses on a webpage to test for SQL
vulnerabilities:
1. Blah’ or 1=1--
2. Login:blah’ or 1=1--
3. Password::blah’ or 1=1--
4. http://search/index.asp?id=blah’ or 1=1--
Preapared by:Suraj B S
18
Similar SQL commands may allow bypassing of a login and may return many rows in a table or
even an entire database table because the SQL server is interpreting the terms literally. The
double dashes near the end of the command tell SQL to ignore the rest of the command as a
comment.
Preapared by:Suraj B S
19
Buffer Overflow
Buffer overflow, or buffer overrun, is an anomaly where a process stores data in a buffer
outside the memory the programmer has set aside for it.
This may result unreliable program behavior, including memory access errors, incorrect
results, program termination (a crash) or a breach of system security.
Buffer overflows can be triggered by inputs that are designed to execute code or alter the way
the program operates.
They are, thus, the basis of many software vulnerabilities and can be maliciously exploited.
Bounds checking can prevent buffer overflows.
Programming languages commonly associated with buffer overflows include C and C++,
which provide no built-in protection against accessing or overwriting data in any part of
memory and do not automatically check that data written to an array.
Buffer overflow occurs when a program or process tries to store more data in a buffer
(temporary data storage area) than it was intended to hold.
Although it may occur accidentally through programming error, buffer overflow is an
increasingly common type of security attack on data integrity.
The knowledge of C, C++ or any other high-level computer language (i.e., assembly
language) is essential to understand buffer overflow.
For example,
int main () {
int buffer[10];
buffer[20] = 10;
}
This C program is a valid program and every compiler can compile it without any errors.
However, the program attempts to write beyond the allocated memory for the buffer, which
might result in an unexpected behavior.
The attacker may exploit stack-based buffer overflows to manipulate the program in various
ways by overwriting:
1. A local variable that is near the buffer in memory on the stack to change the behavior of the
program that may benefit the attacker.
2. The return address in a stack frame. Once the function returns, execution will resume at the
return address as specified by the attacker, usually a user input-filled buffer.
3. A function pointer, or exception handler, which is subsequently executed.
Preapared by:Suraj B S
20
NOPs
NOP or NOOP (short form of no operation) is an assembly language instruction/ command that
effectively does nothing at all.
Heap Buffer Overflow
Heap buffer overflow occurs in the heap data area and may be introduced accidentally by an
application programmer, or it may result from a deliberate exploit. The characteristics of stack-
based and heap-based programming are as follows:
1. “Heap” is a “free store” that is a memory space, where dynamic objects are allocated.
2. The heap is the memory space that is dynamically allocated new(), malloc() and calloc()
functions; it is different from the memory space allocated for stack and code.
3. Dynamically created variables (i.e., declared variables) are created on the heap before the
execution program is initialized to zero.
Memory on the heap is dynamically allocated by the application at run-time and normally
contains program data. Exploitation is performed by corrupting this data in specific ways to
cause the application to overwrite internal structures such as linked list pointers.
Preapared by:Suraj B S
21
Preapared by:Suraj B S
22
Preapared by:Suraj B S
23
Preapared by:Suraj B S
24
Preapared by:Suraj B S