3 Unit
3 Unit
2. What are Proxy Servers and Anonymizers? Discuss different type of Types of Proxy Server.
Proxy servers act as middlemen between your device and the internet, hiding your IP address. They help you access
websites by sending your request to the server and then passing the response back to you. Attackers sometimes use
proxies to hide their identity when connecting to other computers. Proxies come in different types, helping keep your IP
address private.
The mechanism of a proxy server involves:
1. Client Request: Your device sends a request to access a web resource.
2. Proxy Server Interception: The proxy server intercepts your request.
3. Processing and Caching: The proxy server may process the request, cache content, filter content, require
authentication, or log requests.
4. Forwarding the Request: The proxy server forwards the request to the destination server.
5. Destination Server Response: The destination server responds to the request.
6. Proxy Server Response to Client: The proxy server sends the response to your device.
7. End-User Experience: You receive the response as if it came directly from the proxy server.
8. Network Traffic Routing: The proxy server continues to route traffic between clients and destination servers.
Proxy servers are needed for:
1. Enhanced Privacy and Anonymity 8. Monitoring and Logging
2. Bypassing Internet Restrictions 9. Bandwidth Savings
3. Improved Security 10. Anonymised Web Scraping
4. Network Performance Optimization 11. Secure Remote Access
5. Content Filtering and Parental Controls 12. Compliance with Organisational Policies
6. Load Balancing and Redundancy 13. Defeating Hackers
7. Accessing Geo-Restricted Content 14. Examining Packet Headers and Payloads
Understanding these needs helps individuals and organisations make informed decisions about using proxy servers to
improve internet security and performance.
Anonymiser
An anonymiser is like a secret agent for your internet browsing. It hides your identity and keeps your online activities
private. Here's how it works:
1. Hides Your IP Address: It disguises your computer's IP address so websites can't track you.
2. Encrypts Your Data: It scrambles your internet traffic to keep it safe from prying eyes.
3. Adds a Layer of Anonymity: It covers up your real identity and makes it hard for anyone to trace you.
4. Access Blocked Content: It lets you visit websites that might be blocked in your area.
5. Protects Against Attacks: It helps defend you from online scams and phishing attempts.
6. Bypasses Restrictions: It can get around firewalls or restrictions set by your school or workplace.
Uses of Anonymisers:
1. Privacy: Keeps your browsing private unless you give out personal info.
2. Access Restricted Content: Helps you view websites blocked by governments.
3. Security: Shields you from online attacks and scams.
4. Bypassing Firewalls: Lets you get past internet restrictions set by organizations.
Types of Anonymisers:
1. Networked Anonymisers: Routes your data through multiple computers to confuse trackers.
2. Single-Point Anonymisers: Directs your data through a specific website to hide your identity.
Some popular anonymisers include Tunnelbear, Psiphon, and Orbot for mobile devices. They work like a cloak for your
online adventures, keeping you safe and anonymous.
4. How to Defend Against Password Cracking Attack? Discuss some common password attack methods.
Password cracking:
Password cracking is the process of trying to uncover or guess a password, usually by using various methods such as
guessing common passwords, trying different combinations of characters, or exploiting vulnerabilities in security
systems. The goal of password cracking can vary, from legitimate attempts to recover forgotten passwords to malicious
efforts to gain unauthorized access to systems or accounts.
Defending against password cracking attacks is crucial for ensuring the security of your systems and accounts. Here
are some strategies to help defend against such attacks:
Keep an eye on data security regularly to catch password attacks early.
Don't reuse passwords for different accounts.
Never share passwords with anyone.
Avoid using common words or phrases as passwords.
Use strong encryption for passwords, not weak methods.
Make users change passwords regularly, like every month.
Store passwords securely to prevent unauthorized access.
Change default passwords on devices to unique ones.
Keep computer systems updated to fix vulnerabilities.
Set up account lockout policies to stop repeated login attempts.
Use automated systems for managing passwords efficiently.
Encrypt BIOS passwords on important devices like mainframes.
5. What is Keylogger? Discuss different types of Keylogger. Also discuss the methods to prevent from key-loggers.
Keylogger
A keylogger, also known as keystroke logger or keystroke recorder, is a type of software, hardware, or a combination
of both that secretly records every keystroke you make on your computer or phone. It's like a spy that keeps track of
everything you type, including passwords and other sensitive information, without you knowing. Keyloggers can be
software installed on your device or hardware plugged into it. They've been around since the 1970s and have gotten
more advanced over time, making them a big threat to your privacy and security.
Types of keyloggers:
1. Software-based Keyloggers: These are programs installed on devices to secretly record keystrokes. Example:
Spyrix Personal Monitor.
2. Hardware-based Keyloggers: Physical devices placed between keyboards and computers to capture keystrokes.
Example: Keyllama USB Keylogger.
3. Wireless Keyloggers: Intercept keystrokes from wireless keyboards. Example: KeyGrabber Wi-Fi Premium.
4. Kernel or Rootkit-based Keyloggers: Operate at a deep level within the system, making them hard to detect.
Example: DarkComet RAT.
5. Remote Keyloggers: Send captured keystrokes to a remote server controlled by attackers. Example: Ardamax
Keylogger.
6. Form-grabbing Keyloggers: Capture data entered into online forms. Example: Zeus Trojan.
7. Memory Injection Keyloggers: Inject malicious code into system memory to record keystrokes. Example: Poison
Ivy RAT.
8. Script-based Keyloggers: Use scripts embedded in websites to capture keystrokes. Example: Predator Pain.
9. Time-based Keyloggers: Record keystrokes at specific time intervals. Example: Perfect Keylogger.
10. SMS-based Keyloggers: Intercept text messages and keystrokes on mobile devices. Example: mSpy.
11. Remote Administration Tool (RAT) Keyloggers: Part of remote administration tools, providing control over a
victim's computer. Example: NetWire RAT.
Types of Spyware
1. Adware: It monitors your activities and shows you targeted ads. Example: Superfish.
2. Info Stealer: Collects specific data from your device, like passwords or instant messaging conversations. Example:
Zeus Trojan.
3. Keyloggers: Records everything you type, including passwords and messages. Example: Spyrix Keylogger.
4. Rootkits: Allows attackers to gain deep access to your device, making them hard to detect. Example: Sony Rootkit.
5. Red Shell: Installs during game installations and monitors your online activities. Example: Red Shell spyware in PC
games.
6. System Monitors: Tracks your computer usage, including emails, social media, and keystrokes. Example: Family
Orbit.
7. Tracking Cookies: Placed by websites to track your online activity. Example: DoubleClick.
8. Trojan Horse Virus: Delivers spyware to your device through disguised malware. Example: Emotet Trojan.
Spyware can target various devices, including:
Apple Devices: Spyware targeting Mac computers, stealing passwords and capturing screenshots. Example:
OSX/CrescentCore.
Mobile Devices: Steals data like call logs, messages, and tracks location. Example: Pegasus spyware.
Worm:
A computer worm is a type of malware that can spread itself to other computers without human intervention.
It replicates and infects computers by exploiting vulnerabilities in operating systems and software.
Worms can spread through email attachments, file-sharing networks, instant messaging, and websites.
Types of worms include email worms, file-sharing worms, crypto worms, internet worms, and worms that
spread via instant messaging.
Detection Algorithms can be detected, but breaking Detection is difficult without specific tools due to
encryption is challenging. intentional concealment.
Security vs. Focuses on securing data from unauthorized Focuses on hiding the fact that a message is being
Concealment access. sent.
Usage Used for secure communication, data privacy, Used in covert communication, watermarking,
authentication, etc. digital forensics, etc.
Types of Steganography
Steganography encompasses various techniques for concealing information within seemingly innocuous carriers, such as
images, text, audio, or video.
1. Image Steganography:
This form of steganography involves hiding data within digital images. The technique exploits the redundancy in
image files, allowing for the embedding of secret messages without significantly altering the visual appearance of
the image.
For example, the least significant bits of the pixels can be modified to encode the hidden data, making it
imperceptible to the human eye. Image steganography is commonly used for covert communication,
watermarking, and digital forensics.
2. Text Steganography:
Text steganography hides information within text documents or messages. Unlike encryption, which scrambles the
content of a message, text steganography aims to conceal the existence of the message itself. Techniques include
altering the formatting, word choice, or syntax of the text to embed hidden data.
For instance, certain words or letters may be used to convey a hidden message within an otherwise normal text
document.
3. Audio Steganography:
Audio steganography involves embedding secret information within audio files. This technique modifies the audio
signal in a way that is imperceptible to the human ear but allows for the concealment of data. Hidden messages
can be encoded within the frequency spectrum, amplitude modulation, or phase modulation of the audio signal.
Audio steganography is used for secure communication, copyright protection, and digital watermarking.
For example, you might have a song that sounds like any other song, but hidden within the audio signal are bits
of information. To the listener, the song would sound no different from any other, but specialized software could
extract the hidden message from the audio file.
4. Video Steganography:
Video steganography conceals information within video files. Similar to image steganography, this technique
exploits the redundancy in video data to embed hidden messages without noticeable changes to the visual
content. Hidden data can be encoded within individual frames, color channels, or motion vectors of the video
stream. Video steganography is employed in applications such as covert surveillance, forensic analysis, and
copyright protection.
For example, you could hide a secret message by adjusting the brightness or color of certain frames in the video.
To someone watching the video, it would look like any other video, but there would be a hidden message encoded
within it.
Example: A video of a landscape with subtle changes in color representing hidden text, such as timestamps or
coordinates.
1. Passive Attacks:
Packet Sniffing: Attackers capture and analyze data packets transmitted over the wireless network. They
can intercept sensitive information such as login credentials, emails, or financial transactions.
Eavesdropping: Similar to packet sniffing, eavesdropping involves listening in on wireless communications
to gather sensitive information without the user's knowledge.
2. Active Attacks:
Man-in-the-Middle (MITM) Attack: In this attack, the attacker intercepts and possibly alters the
communication between two parties without their knowledge. This can lead to unauthorized access, data
theft, or injection of malicious content.
Replay Attack: Attackers capture data packets transmitted over the network and replay them to gain
unauthorized access or disrupt communication.
Denial of Service (DoS) Attack: Attackers flood the wireless network with a high volume of traffic, causing
it to become overwhelmed and unavailable to legitimate users. This can result in disruption of services
and network downtime.
Deauthentication Attack: Attackers send deauthentication packets to wireless clients, forcing them to
disconnect from the network. This can lead to denial of service for legitimate users or enable further
attacks like capturing handshake packets for cracking Wi-Fi passwords.
3. Brute Force Attacks:
Password Guessing: Attackers attempt to gain unauthorized access to wireless networks by
systematically trying different passwords until the correct one is found. This is often done using
automated tools and dictionaries of commonly used passwords.
Dictionary Attack: Similar to password guessing, but attackers use a predefined list of words and phrases
(dictionary) to try and guess the password. This method is more efficient than random guessing.
Rainbow Table Attack: Attackers use precomputed tables of hashed passwords (rainbow tables) to
quickly crack hashed passwords obtained from wireless networks.
4. Security Protocol Exploitation:
WEP/WPA/WPA2 Cracking: Weaknesses in security protocols like WEP (Wired Equivalent Privacy), WPA
(Wi-Fi Protected Access), and WPA2 can be exploited to gain unauthorized access to wireless networks.
This may involve capturing and analyzing Wi-Fi handshake packets, exploiting protocol vulnerabilities, or
using brute force attacks to crack encryption keys.
Key Reinstallation Attacks (KRACK): Exploiting vulnerabilities in the WPA2 protocol, attackers can
intercept and manipulate data transmitted between devices on a Wi-Fi network, potentially leading to
data theft or manipulation.
Backdoor Trojans
Backdoor Trojans: Allow unauthorized remote access, giving hackers full control.
They sneak into systems, dodging detection by bypassing authentication.
Once installed, they become part of the system's startup routine for persistence.
Also known as Trojan horses, they create secret entry points for malware propagation.
Like the Greek myth, they lead to unexpected and harmful consequences.
Function as trap doors, providing covert access, hence the term "back door."
Heap-based Buffer Overflow: Happens when the buffer overflow occurs in the heap memory region, often due
to mismanagement of dynamically allocated memory.
Example: Attackers exploit buffers allocated on the heap, often in dynamically allocated memory, to
overwrite adjacent data structures or function pointers, potentially leading to arbitrary code execution.
Integer Overflow: While not strictly a buffer overflow, integer overflow occurs when the result of an arithmetic
operation exceeds the maximum value that can be represented by the data type, leading to unexpected behavior
or memory corruption.
Consequences:
Data Corruption: Too much data can mess up important stuff, like instructions or stored information, causing the
system to act weird or crash.
Code Execution: Attackers can send sneaky data to a program with overflow problems, making it run harmful
code and giving them control over the system.
Denial of Service (DoS): Overflowing data can crash or freeze the system, making it unusable for regular users.
System Crashes: Overflowing data can make programs crash or get stuck, causing everything to stop working.
Access Control Loss: Hackers might get more control over the system than they should, letting them do things
they're not supposed to.
Further Security Issues: Finding one problem might lead to uncovering more ways for hackers to mess with the
system, making things even worse.
Prevention Techniques:
Bounds Checking: Check data to ensure it doesn't go beyond its designated space.
Safe Coding: Use secure coding practices and avoid risky functions.
Address Space Layout Randomization (ASLR): Mix up memory layout to make it harder for attackers to predict
where code or data is stored.
Input Validation: Always check and clean up data from users to remove any harmful elements.
Keep Software Updated: Regularly update software to fix known issues and vulnerabilities.
Security Testing: Test regularly for vulnerabilities and fix them promptly.
Runtime Protection: Use tools to catch and stop buffer overflow attacks in real-time.
Importance: Buffer overflow vulnerabilities pose significant security risks, allowing attackers to compromise systems,
steal sensitive data, or disrupt operations. Therefore, it is crucial for developers to understand and mitigate these
vulnerabilities to ensure the security and integrity of their software applications.
There are different ways identity thieves can use your information:
They might open credit cards or loans in your name and leave you responsible for the charges.
They could pretend to be you to get government benefits or jobs, causing legal trouble for you.
Sometimes they use your identity to get medical services, which can mess up your medical records.
Thieves may even file fake tax returns using your information to get refunds, putting you in financial trouble.
They might trick you into giving them more personal information through emails or calls.
To protect yourself:
Keep your personal information safe and only share it when necessary.
Use strong passwords and be careful online.
Check your financial accounts regularly for any suspicious activity.
Make sure your devices are secure and update them regularly.
Shred any documents with personal information before throwing them away.