Z - Cybersecurity Unit 2
Z - Cybersecurity Unit 2
Tools and Methods used in Cyber Crime: Introduction, Proxy Servers and Anonymizers, Phishing,
Password Cracking, Key loggers and Spywares, Virus and Worms, Trojan horses and Backdoors,
Steganography, DoS and DDoS attacks.
Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft).
(pg 125) There are different forms of attacks through which attackers target computer systems. There
are various tools and techniques and complex methodologies used to launch these attacks against
targets.
Network Probe – Use of invasive techniques like “ping sweep” and “port scanning” tool
At this point as well, the attacker hasn’t done anything that can be classified as an intrusion.
Crossing the line toward electronic crime(E-crime) – Attacker starts exploiting possible holes
in the system. Exploits usually include vulnerabilities in common gateway interface (CGI)
scripts. The easiest way is to check default login accounts with easy guessable passwords.
After this the attacker will further exploit to get an administrator or ‘root’ access. Root is
basically the administrator or super-access and grants them the privileges to do anything on
the system.
Capturing the network – Attacker will attempt to “own” the network by compromising low-
priority target systems.
Next step is to remove any evidence. The attacker will install a set of tools that replace
existing files and services with Trojan files and services that have a backdoor password.
The attacker tries to “capture” the network.
Grab the Data - Stealing confidential data & launch attacks at other sites from your network
Phishing (131)
Phishing is a deceptive online tactic that involves sending fake messages, often posing as legitimate
entities like banks or businesses, to trick users into revealing personal and financial information.
These messages can also infect systems with viruses and lead to online identity theft. Phishers, or
criminals behind phishing attacks, follow a systematic process:
1. Planning: Phishers select a target, such as a specific business or individual, and gather email
addresses using mass mailing and other spam-like techniques.
2. Setup: Once the target and victims are identified, phishers create methods, including email
messages and fake webpages, to deliver the phishing attack.
3. Attack: Phishers send deceptive messages, appearing authentic, to lure users into providing
sensitive information.
4. Collection: Phishers record the information entered by victims on fake webpages or pop-up
windows.
5. Identity Theft and Fraud: The stolen information is then used for illegal activities, such as making
unauthorized purchases or committing fraud. Phishing has evolved from its roots in hacking culture,
with an increasing number of organizations providing online access, making it a global threat for
personal information and identity theft.
Software Keylogger
Software keyloggers are programs installed on computer systems, typically positioned
between the operating system and keyboard hardware, capturing and recording every
keystroke.
They are stealthily installed by Trojans or viruses without the user's knowledge.
Cybercriminals often target insecure computer systems in public places, like cybercafes or
libraries, to easily obtain sensitive information.
A typical keylogger comprises two files in the same directory: a dynamic link library (DLL) file
and an executable (EXE) file.
EXE file installs the DLL file and triggers it to work.
The DLL file is responsible for recording keystrokes, making it a potent tool for unauthorized
access and data theft.
Hardware Keylogger
To install these keyloggers, physical access to the computer system is required.
Hardware keyloggers are small hardware devices.
These are connected to the PC and/or to the keyboard and save every keystroke into a file or
in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM Cards' PINs.
Each keypress on the keyboard of the ATM gets registered by these keyloggers.
These keyloggers look like an integrated part of such systems; hence, bank customers are
unaware of their presence.
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system and also can
remove the tool.
2. This software does not require regular updates of signature bases to work effectively such as other
antivirus and antispy programs; if not updated, it does not serve the purpose, which makes the users
at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of installing
keyloggers.
4. It prevents ID theft
Spywares
Spyware is a form of malicious software (malware) that secretly collects information about
users without their knowledge.
Secretly monitors the user.
It is often discreetly installed on personal computers, hidden from the user.
In some cases, owners intentionally install spyware, like keyloggers, on shared or public
computers to monitor other users.
Beyond simple monitoring, spyware gathers personal information such as internet surfing
habits and visited websites.
It can also redirect internet activities and alter computer settings, leading to issues like
slowed internet speed.
Anti-spyware software is available to counteract these threat, a common practice in
computer security to protect against the troublesome effects of spyware.
- Viruses can spread (a) through the Internet, (b) through a standalone computer, (c) through
local networks
Types of Viruses
A. Boot Sector Viruses
B. Program Viruses
C. Multipartite Viruses
D. Stealth Viruses
E. Polymorphic Viruses
F. Macro Viruses
G. Active X and Java Control
1. **Boot Sector Viruses**: These infect the storage media used to start the computer (e.g., floppy
disks, hard drives) by attacking the master boot record (MBR). They spread when infected disks are
used, potentially infecting other systems.
2. **Program Viruses**: These activate when program files are opened, making copies of themselves
and infecting other programs on the computer.
3. **Multipartite Viruses**: A combination of boot sector and program viruses, infecting both the
boot record and program files. They spread when infected programs are activated.
4. **Stealth Viruses**: Difficult to detect as they disguise themselves (camouflage or mask), altering
file sizes and concealing in computer memory. They may evade antivirus software by hiding in
memory.
5. **Polymorphic Viruses**: Act like chameleons, changing their signature each time they spread,
making them hard to detect. Polymorphic generators create new variants to evade detection.
6. **Macroviruses**: Target applications supporting macros, like Microsoft Word and Excel. They
infect documents and spread when opened, potentially bypassing outdated antivirus software.
7. **ActiveX and Java Control**: Threats related to web browsing, where users may unwittingly
allow harmful functions like pop-ups and file downloads. Awareness and control of browser settings
are crucial to prevent such threats.
Worms
A worm spreads itself automatically to other computers through networks by exploiting
security vulnerabilities where areas at Trojan is a cord of program that appears to be
harmless, but hides malicious functions.
Worms and Trojans, such as viruses may harm the systems data performance.
Some viruses and other malware have notable symptoms that enable computer user to take
necessary corrective actions, but many viruses are surreptitious, or simply do nothing for
users to take note of them.
Some viruses do nothing beyond reproducing themselves.
1. **Mess up your files: They can delete, change, or ruin your computer files.
2. **Spread other bad stuff: Trojans can help spread viruses or other malware to mess up more
computers.
3. **Block your defenses: They can stop your antivirus or firewall programs from working so they can
keep causing trouble.
4. **Let others control your computer: Some Trojans let bad people access your computer from far
away without you knowing.
5. **Secretly move files: They can move files around on your computer without you seeing.
6. **Steal information: Trojans can sneakily record what you type, like passwords or credit card
numbers, and send it to bad people. (log keystrokes)
7. **Show inappropriate stuff: They can make your computer show things you don't want, like bad
websites or images.
8. **Mess with your computer: Trojans can slow down, restart, or shut down your computer
whenever they want.
9. **Keep coming back: Even if you try to get rid of them, Trojans can come back and infect your
computer again.
10. **Block your control: Some Trojans stop you from using your computer's task manager or control
panel to fix things. (disable task manager & control panel)
So, in short, Trojans are sneaky programs that pretend to be safe but actually cause a lot of trouble
on your computer. Be careful what you download or click on!
Backdoors
1. What's a Backdoor?
- Think of a backdoor like a secret entrance into a computer program that bypasses normal security
checks.
- Sometimes, programmers put backdoors in their programs for troubleshooting or special access.
2. How Backdoors Are Used:
- But bad guys can also use backdoors they find or create to sneak into computers.
- They're like hidden tunnels that let hackers get into your computer without you knowing.
- Backdoors can do a lot of bad stuff once they're inside your computer.
- They can:
- Mess with your files: They can change, delete, or copy your files without you knowing.
- Control your computer: Hackers can control your computer's hardware and make it do things like
shut down or restart.
- Steal your info: Backdoors can take your personal information like passwords and send it to the
bad guys.
- Spy on you: They can secretly watch what you type on your keyboard or take screenshots of
what's on your screen.
- Send data out: Backdoors can send all the stolen information to the hackers through email or the
internet.
- Spread more trouble: They can infect other files on your computer and even spread to other
computers.
- Set up secret servers: Hackers can use backdoors to set up hidden servers for illegal activities.
- Slow things down: Backdoors can make your internet slow, mess up your computer's
performance, and cause problems with other programs.
- Hide themselves: They're tricky to find and remove because they hide from your computer's
defenses.
So, in short, backdoors are sneaky ways for hackers to get into your computer and cause a lot of
trouble. Be careful with what you download and click on to keep them out!
1. **Back Orifice:
- It's like a sneaky tool that lets someone control a Windows computer from far away.
- Imagine it's like having a remote control for a computer, even if you're not next to it.
2. **Bifrost:
- This one infects Windows computers from older versions like Windows 95 to newer ones like Vista.
- It sets up a secret connection that lets someone far away run any commands they want on the
infected computer.
- It's like giving someone the keys to your computer without you knowing.
3. **SAP Backdoors:
- SAP is a big software used by businesses to manage important stuff like finances and inventory.
- Backdoors in SAP can let sneaky people get into the system without permission.
- They might mess with user accounts or important business programs, which can be really harmful.
4. **Onapsis Bizploit:
- This one is like a toolkit for testing the security of big business software like SAP.
- It helps security experts find weaknesses in SAP systems so they can be fixed before bad guys find
them.
- It's like having a detective tool to make sure the big business software stays safe from hackers.
- Avoid sketchy websites and links that offer free or pirated software. They often hide Trojan Horses
and other harmful stuff.
- Surf the web cautiously, especially on peer-to-peer (P2P) networks. These networks are hotspots
for spreading Trojan Horses.
- Sometimes, even if you download something from these sites and it doesn't work, your system
could still be infected without you knowing it.
- Turn on your spam filter to help block malicious emails, but remember it's not foolproof.
Spammers are always finding new ways to bypass filters.
- Get antivirus software that can also detect and remove Trojan Horses and other malware.
- There are free Trojan remover programs available online that can help keep your system safe.
- Keep your antivirus software updated regularly to ensure it can catch the latest threats.
Steganography
- Steganography is like hiding a message in plain sight. It's all about concealing information so that
it's not even noticeable.
- The word comes from Greek, meaning "covered writing." It's been used for centuries, like writing
secret messages under wax or tattooing messages on messengers' heads.
- In digital terms, it means hiding data within other data, like embedding a message in a digital
image without changing how the image looks.
- Steganography helps keep data confidential and maintains its integrity, meaning it's hard for
others to see the hidden message or alter it without permission.
(elaborate accordingly)
Steganography can be used to make a digital watermark to detect illegal copying of digital images.
Thus, it aids confidentiality and integrity into a digital signal.
Digital Watermarking:
- Digital watermarking is a bit like putting an invisible stamp on something digital, like an image,
audio file, or video.
- The original, innocent file is called the "cover" or "cover medium." It's what hides the secret
message.
- Watermarking embeds information into the digital signal, so if the signal gets copied, the hidden
info goes along with it.
- For example, digital watermarking can help detect illegal copying of digital images by embedding
identifying information that's hard to remove.
- The parts of the cover medium that can be changed without affecting it much are called
"redundant bits." These bits can be replaced with the hidden message.
In simple terms, steganography is about hiding messages so they're not obvious, and digital
watermarking is about embedding information into digital files to protect them or identify them.
They both help keep digital data safe and secure!
Steganalysis is the art and science of detecting messages that are hidden in images,
audio/video files using steganography.
The goal is to identify suspected packages and to determine whether or not they have a
payload encoded into them, and if possible, recover it
Automated tools are used to detect such steganographic data/information hidden in the
image and audio and/or video files.
Classification of DoS attacks: bandwidth attacks, Logic attacks, protocol attacks, Unintentional Dos
attacks
Types or levels of DoS attacks: flood attack, ping of death attack, SYN attack, Teardrop attack, smurf
attack, Nuke
Tools used to launch DoS attack: Jolt2, Nemesy, Targa, Crazy pinger, SomeTrouble
DDoS attacks -
Tools used to launch DDoS attack: Trinoo, Tribe flood network (TFN), Shaft, MStream
Phishing (187)
Phishing is a type of deception designed to steal your identity. Phisher tries to get the user to
disclose valuable personal data such as credit card information by convincing the user to provide it
under false pretences. Emails is a popular medium.
-hoax emails- deceives an individual into believing something is real, when the hoaxer know it’s false.
Methods of phishing –
1. **Dragnet**: This method involves sending out mass emails with falsified corporate identification
to a large group of people, such as customers of a specific financial institution or members of an
auction site. Victims are prompted to click on links in the email that lead to fraudulent websites or
pop-up windows where they are asked to enter sensitive information like bank or credit card details.
3. **Lobsterpot**: Phishers create bogus websites that resemble legitimate corporate sites, targeting
a specific group of victims likely to visit them. Victims may be directed to these spoofed websites
through deceptive links in emails, where they unwittingly provide personal information that is then
used for identity theft or fraudulent activities.
4. **Gillnet**: This technique involves the introduction of malicious code into emails and websites to
infect users' systems. Malicious code may redirect users to fake phishing sites, record keystrokes and
passwords, or alter browser settings to facilitate illegal access to users' financial accounts.
Phishing Techniques – URL manipulation, Filter Evasion, Website forgery, flash phishing, social
phishing, phone phishing
Spear phishing – Spear Phishing is a method of sending highly targeted phishing messages to
specific organizations or groups in order to obtain sensitive information for more sophisticated social
engineering attacks. Here's how Spear Phishing works:
1. **Highly Targeted Attacks**: Spear Phishers send emails that appear legitimate to employees or
members of a particular organization, government agency, or group. These emails are tailored to
look like they come from someone within the organization, such as a colleague or IT administrator,
and may request usernames, passwords, or other sensitive information.
2. **Faked Sender Information**: The sender information in Spear Phishing emails is often faked or
"spoofed" to appear genuine. This adds to the illusion of legitimacy and makes it more likely for
recipients to fall for the scam.
3. **Targeting the Entire System**: Unlike traditional phishing scams that target individuals, Spear
Phishing aims to gain access to an organization's entire computer system. Responding to these emails
by providing login credentials or clicking on malicious links can put both the individual and the
organization at risk of data breaches and identity theft.
4. **Personalized Scams**: Spear Phishing scams are personalized and tailored to specific groups or
individuals. Scam artists use any available information to customize their attacks, making them more
convincing and harder to detect.
5. **Risk to Individuals and Organizations**: Responding to Spear Phishing emails can result in
identity theft and compromise the security of the organization's systems and data. It's crucial for
both individuals and organizations to be vigilant and employ security measures to prevent falling
victim to these scams.
To avoid Spear Phishing scams, individuals and organizations can use similar techniques employed to
avoid standard phishing attacks, such as verifying the legitimacy of emails, avoiding clicking on
suspicious links or attachments, and being cautious when providing sensitive information online.
Whaling – targets executives from the top management in th -e organizations. Objective is to swindle
the executives into revealing confidential info.
Types of ID theft – financial, criminal, identity cloning, business identity theft, medical ID theft,
synthetic ID theft, child identity theft
Techniques of ID Theft:
dumpster diving
Shoulder surfing
Backup theft
Phishing
Pharming
Redirectors
hardware