Cyber Security UNIT1
Cyber Security UNIT1
UNIT-II:CYBER OFFENSES
2.4 Cyberstalking
2.7 AttackVector
• Technology is a“double-edged sword”asit can be used for both good and bad purposes.
• People with the tendency to cause damages or carryingout illegal activities will use it for
bad purpose.
• Computers and tools available in IT are also used as either target of offense.
• In today’s world of Internet and computer networks, a criminal activity can be carried
outacrossnational borders.
• Chapter1 provided an over view of hacking, cyberterrorism, networkintrusions, password
sniffing, computer viruses, etc. They are the most commonly occurring crimes that target
the computer.
• Cybercriminal use the World Wide Web and Internet to an optimum level for all illegal
activities to storedata, contacts, account information, etc.
• The criminals take advantage of the widespread lack of awareness about cybercrimes
andcyberlaws among the people who are constantly usingtheIT infrastructure for
officialandpersonal purposes.
• People who commit cybercrimes are known as“Crackers”(Box2.1).
Box2.1|Hackers,CrackersandPhreakers
Hacker: A hacker is a person with a strong interest in computers who enjoys learning and
experimenting withthem. Hackers are usually very talented,smartpeople who understand
computers better than others.The term is often confused with cracker that defines someone who
Breaks into computers(refertoBox2.2).
Bruteforce hacking:It is a technique used to find passwords or encryption keys. Bruteforce
Hacking involves trying every possible combination of letters, numbers, etc., until the code is
broken.
Cracker:A cracker is a person who breaks into computers.Crackers should not be confused with
hackers.The term“cracker”is usually connected to computer criminals. Some of their
Crimes include vandalism, theft and snooping in unauthorized areas.
Cracking:It is the act of breaking into computers.Cracking is a popular,growing subjectonthe
Internet. Many sites are devoted to supplying crackers with programs that allow them to crack
computers. Some of these programs contain dictionaries for guessing passwords. Others are used
to break into phonelines(called“phreaking”).These sites usually display warnings such as
“These files are illegal; we are not responsible for what you do with them.”
Crackertools:These are programs used to breakintocomputers.Crackertoolsarewidely
distributedontheInternet.Theyincludepasswordcrackers,Trojans,viruses,wardialersandworms.
Phreaking:Thisisthenotoriousartofbreakingintophoneorothercommunicationsystems.
PhreakingsitesontheInternetarepopularamongcrackersandothercriminals.
Wardialer:Itisprogramthatautomaticallydialsphonenumberslookingforcomputersonthe
otherend.It catalogsnumbersso thatthehackerscancall backandtrytobreakin.
3
• Anattackerwouldlooktoexploitthevulnerabilitiesinthenetworks,mostoftensobecausethenetwor
ks arenot adequatelyprotected.
• Thecategoriesof vulnerabilitiesthathackers typicallysearchforarethefollowing:
1. Inadequateborderprotection(borderasinthesenseofnetworkperiphery);
2. remoteaccessservers (RASs)withweakaccess controls;
3. applicationserverswithwell-knownexploits;
4. misconfiguredsystemsandsystemswithdefaultconfigurations.
• Tohelpthereaderunderstandthenetworkattackscenario,Fig.2.2illustratesasmallnetworkhighligh
tingspecificoccurrencesof severalvulnerabilities describedabove.
4
A black hatis also called a “cracker” or “dark side hacker.” Such a person is a malicious
orcriminal hacker. Typically, theterm“cracker”isused within the security industry. However,the
general public uses the term hacker to refer to the same thing. In computer terminology,
themeaning of “hacker” can be much broader. The name comes from the opposite of “white
hathackers.”
Awhitehathackerisconsideredanethicalhacker.IntherealmofIT,a“whitehathacker”is a person
who is ethically opposed to the abuse of computer systems. It is said that the term
isderivedfromAmericanwesternmovies,wheretheprotagonisttypicallyworeawhitecowboyhat and
the antagonist typically wore a black one. As a simplified explanation, a “white hat”generally
focuses on securing IT systems, whereas a “black hat” (the opposite) would like tobreakinto
them, so this sounds likean age-oldgame ofathief and apolice.
A brown hat hackeris one who thinks before acting or committing a malice or non-
malicedeed. A grey hat commonly refers to a hacker who releases information about any exploits
orsecurity holes he/she finds openly to the public. He/she does so without concern for how
theinformationis used in the end (whether forpatchingorexploiting).
2.1.1Categoriesof Cybercrime
Cybercrimecanbe categorizedbasedonthefollowing:
1. Thetargetofthecrime and
2. whetherthe crimeoccursasasingle eventorasaseriesof events.
• Cybercrimecanbetargetedagainstindividuals(persons),assets(property)and/or
organizations(government,businessandsocial).
1. Crimes targeted at individuals: The goal is to exploit human weakness such as
greedand naivety. These crimes include financial frauds, sale of non-existent or stolen
items,childpornography(explainedinSection1.5.13,Chapter1),copyrightviolation,harassme
nt, etc. with the development in the IT and the Internet; thus, criminals have anew tool
that allows them to expand the pool of potential victims. However, this alsomakesdiffi
cult to traceand apprehend thecriminals.
2. Crimes targeted at property: This includes stealing mobile devices such as cell
phone,laptops, personal digital assistant (PDAs), and removable medias (CDs and pen
drives);transmitting harmful programs that can disrupt functions of the systems and/or
can wipeout data from hard disk, and can create the malfunctioning of the attached
devices in thesystemsuchas modem, CD drive, etc.
3. Crimes targeted at organizations: Cyberterrorism is one of the distinct crimes
againstorganizations/governments.Attackers(individualsorgroupsofindividuals)usecompu
ter tools and the Internet to usually terrorize the citizens of a particular country bystealing
the private information, and also to damage the programs and fi les or plantprogramstoget
controlof thenetworkand/or system (seeBox2.3).
5
4. Single event of cybercrime: It is the single event from the perspective of the victim.
Forexample, unknowingly open an attachment that may contain virus that will infect
thesystem(PC/laptop).This is known as hackingor fraud.
5. Series of events: This involves attacker interacting with the victims repetitively.
Forexample,attackerinteractswiththevictimonthephoneand/orviachatroomstoestablish
relationship first and then they exploit that relationship to commit the sexualassault.
Box2.3|PatriotHacking
Patriot hacking[1] also known as Digital Warfare, is a form of vigilante computer
systems’crackingdonebyindividualsorgroups(usuallycitizensorsupportsofacountry)againstarealor
perceived threat. Traditionally, Western countries, that is, developing countries, attempts
tolaunchattacks on their perceivedenemies.
Althoughpatriothacking isdeclaredasillegalinthe US, however, itisreservedonly forgovernment
agencies [i.e., Central Intelligence Agency (CIA) and National Security Agency(NSA)] as a
legitimate form of attack and defense. Federal Bureau of Investigation (FBI)
raisedtheconcernaboutriseincyberattackslikewebsitedefacements(explainedinBox1.4,Chapter1)
and denial-of-service attacks (DoS – refer to Section 4.9, Chapter 4), which adds as fuel
intoincreasein international tension andgets mirroredit intothe online world.
After the war in Iraq in 2003, it is getting popular in the North America, Western Europe
andIsrael.ThesearecountriesthathavethegreatestthreattoIslamicterrorismanditsaforementioneddigi
tal version.
The People’s Republic of China is allegedly making attacks upon the computer networks of
theUSandtheUK.RefertoBox5.15inChapter5.Fordetailedinformationvisitwww.patriothacking.co
m
6
2.2 HowCriminalsPlantheAttacks
• Criminals use many methods andtools to locate the vulnerabilities of their target.
• Thetargetcanbe anindividualand/oranorganization.
• Criminalsplanpassiveandactiveattacks
• Activeattacksareusuallyusedtoalterthesystem(i.e.,computernetwork)whereaspassiveattacksa
ttempt to gain information about the target.
• Activeattacksmayaffecttheavailability,integrityandauthenticityofdatawhereaspassiveattacksl
ead to violationofconfidentiality.
2.2.1 Reconnaissance
• Theliteralmeaningof“Reconnaissance”isanactoffindingsomethingorsomebody
(especiallytogaininformation aboutanenemyorpotentialenemy).
• In the world of “hacking,” reconnaissance phase begins with “Footprinting” – this is
thepreparationtowardpre-
attackphase,andinvolvesaccumulatingdataaboutthetarget’senvironmentand computer
architecture to find ways to intrude into that environment.
• Footprinting gives an overview about system vulnerabilities and provides a judgment about
possible exploitation of those vulnerabilities.
• The objective of this preparatory phase is to understand the system, its networking ports
andservices,andanyother aspects ofitssecuritythatareneedful forlaunching the attack.
• Thus, anattacker attempts to gatherinformationin two phases: passiveand activeattacks.Letus
understandthesetwo phases.
2.2.2 PassiveAttacks
• A passive attack involves gathering informationabout a target without his/her
(individual’sorcompany’s)knowledge.
• It can be as simple as watching a building to identify what time employees enter the
buildingpremises.
• However,itisusuallydoneusingInternetsearchesorby Googling (i.e.,searching therequired
information with the help of search engine Google) an individual orcompany
togaininformation.
1. GoogleorYahoo search:Peoplesearch tolocateinformationaboutemployees.
2. Surfingonlinecommunity
groupslikeOrkut/Facebookwillproveusefultogaintheinformationabout an individual.
3. Organization’swebsitemayprovideapersonneldirectoryorinformationaboutkeyemployees,
for example, contact details, E-Mail address, etc. These can be used in a
socialengineeringattack toreach the target(seeSection2.3).
4. Blogs,newsgroups,pressreleases,etc.aregenerallyusedasthemediumstogaininformationabou
t the companyoremployees.
7
5. Going through the job postings in particular job profiles for technical persons can
provideinformation about type of technology, that is, servers or infrastructure devices a
companymaybeusingon itsnetwork.
2.2.3 ActiveAttacks
• An active attack involves probing the network to discover individual hosts to confirm
theinformation (IP addresses, operating system type and version, and services on the
network)gatheredin thepassiveattackphase.
• Itinvolvesthe riskofdetectionandisalsocalled“Rattlingthe doorknobs” or
“Activereconnaissance.”
• Active reconnaissance can provide confirmation to an attacker about security measures
inplace (e.g., whether the front door is locked?), but the process can also increase the chance
ofbeingcaught or raise a suspicion.
2.2.4 ScanningandScrutinizingGatheredInformation
• Scanningisakeysteptoexamineintelligentlywhilegatheringinformationaboutthetarget.Theobjec
tivesofscanningareasfollows:
1. Portscanning:Identifyopen/closeportsandservices.RefertoBox 2.5.
2. Networkscanning:UnderstandIPAddressesandrelatedinformationaboutthecomputernetwor
ksystems.
3. Vulnerabilityscanning:Understandthe existingweaknessesinthesystem.
2.2.5 Attack(GainingandMaintainingtheSystemAccess)
• Afterthescanningandenumeration, theattackislaunchedusingthefollowingsteps:
1. Crackthepassword.
2. exploittheprivileges.
3. executethemaliciouscommands/applications.
4. hidethefiles(if required).
5. coverthetracks –deletetheaccesslogs,sothat thereisnotrailillicitactivity.
8
2.3 SocialEngineering
• Social engineering is the “technique to influence” and “persuasion to deceive” people
toobtainthe information orperform someaction.
• Social engineers exploit the natural tendency of a person to trust social engineers’
word,ratherthanexploitingcomputer securityholes.
• It is generally agreed that people are the weak link in security and this principle makes
socialengineeringpossible.
• A socialengineerusually usestelecommunication(i.e.,telephoneand/orcellphone) orInternet
toget them todo something that is against the security practices and/or policies
oftheorganization.
• Social engineering involves gaining sensitive information or unauthorized access
privilegesbybuildinginappropriate trust relationships with insiders.
• It is an art of exploiting the trust of people, which is not doubted while speaking in a
normalmanner.
• The goal of a socialengineer is to fool someone into providingvaluable information
oraccessto that information.
• Social engineer studies the human behavior so that people will help because of the desire
tobehelpful, theattitudetotrust people,and the fearof gettingintotrouble.
• The sign of truly successful social engineers is that they receive information without
anysuspicion.
• A simple example is calling a user and pretending to be someone from the service
deskworkingonanetworkissue;theattackerthenproceedstoaskquestionsaboutwhattheuseriswork
ingon, what file shares he/sheuses, what his/her password is, and so on…
(seeBox2.6).
Box2.6|SocialEngineeringExample
Mr.Joshi:Hello?
The Caller: Hello, Mr. Joshi. This is Geeta Thomas from Tech Support. Due to some disk
spaceconstraintsonthefileserver,wewillbemovingfewuser’shomedirectoriestoanotherdisk.This
activity will be performed tonight at 8:00 p.m. Your account will be a part of this move
andwillbeunavailable temporarily.
Mr.Joshi:Thankyou. Bye.
Caller: Byeand have aniceday.
9
2.3.1 ClassificationofSocialEngineering
Human-BasedSocialEngineering
• Human-basedsocialengineeringreferstoperson-to-
personinteractiontogettherequired/desiredinformation.
• Anexampleiscallingthehelpdesk and tryingto findout apassword.
Computer-Based SocialEngineering
1. FakeE-Mails:
• The attacker sends fake E-Mails(seeBox2.7)to users in such that the user finds it as a real
e-mail.
• This activity is also called “Phishing”.
• It is an attempt to attract the Internet users (netizens) to reveal their personal information,
such as usernames,passwords and credit card details by impersonating as a trustworthy
and legitimate organization or an individual.
• Banks, financial institutes and payment gateways are the common targets.
• Phishing is typically carried out through E-Mails or instant messaging and often directs
users to enter details at a website, usually designed by the attacker with abiding the look
and feel of the original website.
• Thus, Phishing is also an example of social engineering techniques used to fool netizens.
• The term “Phishing” has been evolved from the analogy that Internet scammers are using
E-Mails attract to fish for passwords and financial data from the sea of Internet users
(i.e.,netizens).
• The term was coined in 1996 by hackers who were stealing AOL Internet accounts by
scamming passwords without the knowledge of AOL users.
• As hackers have a tendency of replacing “f” with “ph,” the term “Phishing” came into
being.
2. E-Mail attachments:
• E-mail attachments are used to send malicious code to a victim’s system, which will
automatically (e.g., keylogger utility to capture passwords) get executed.
• Viruses,Trojans,and worms can be included cleverly into the attachments to entice a
victim to open the attachment.
3. Pop-upwindows:
• Pop-up windows are also used, in a similar manner to E-Mail attachments. Pop-up
windows with special offers or free stuff can encourage a user to unintentionally install
malicious software.
11
2.4.1 TypesofStalkers
Thereareprimarilytwo types ofstalkers.
1. Online stalkers:
• They aim to start the interaction with the victim directly with the help of the Internet.
• E-Mail and chat rooms are the most popular communication medium to get connected
with the victim,rather than using traditional instrumentation like telephone/cellphone.
• The stalker makes sure that the victim recognizes the attack attempted on him/her.
• The stalker can make use of a third party to harass the victim.
2. Offline stalkers:
• The stalker may begin the attack using traditional methods such as following the
victim, watching the daily routine of the victim, etc.
• Searching on message boards/newsgroups,personal websites,and people finding
services or websites are most common ways to gather information about the victim
using the Internet.
• The victim is not aware that the Internet has been used to perpetuate an attack against
them.
2.4.4 Real-LifeIncidentofCyberstalking
CaseStudy
The Indian police have registered first case of cyberstalkinginDelhi–
thebriefaccountofthecasehasbeenmentionedhere.Tomaintainconfidentialityandprivacyoftheentitie
sinvolved,
• Mrs.Joshi received almost 40 calls in 3days mostly at odd hours from as far away as
Kuwait,Cochin, Bombay, and Ahmadabad.
• The said calls created havoc in the personal life destroying mental peace of Mrs.Joshi
who decided to register a complaint with Delhi Police.
• A person was using her ID to chat over the Internet at the website www.mirc.com,mostly
in the Delhi channel for four consecutive days.
• This person was chatting on the Internet,using her name and giving her address,talking in
obscene language.
• The same person was also deliberately giving her telephone number to other chatters
encouraging them to call Mrs. Joshi at odd hours.
• This was the first time when a case of cyberstalking was registered.
• Cyberstalking does not have a standard definition but it can be defined to mean
threatening,unwarranted behavior,or advances directed by one person to ward another
Person using Internet and other forms ofo nline communication channels as medium.
13
Box2.8 |Cyberbullying
The NationalCrime PreventionCouncildefinesCyberbullyingas“whentheInternet,cellphones or
other devices are used to send or post text or images intended to hurt or
embarrassanotherperson.”
The practice of cyberbullying is not limited to children and, while the behavior is identified
bythe same definition in adults, the distinction in age groups is referred to as cyberstalking
orcyberharassment when perpetrated byadults toward adults.[4]
Source:http://en.wikipedia.org/wiki/Cyber-bullying(2April2009).
14
down. Not having the AMC is a risk from cybercrime perspective because a
cybercriminalcan install a Malicious Code on a computer and conduct criminal activities
without anyinterruption.
5. Pornographicwebsitesandothersimilarwebsiteswithindecentcontentsarenotblocked.
6. Cybercafeownershaveverylessawareness aboutITSecurityandITGovernance.
7. Government/ISPs/StatePolice(cybercellwing)donotseemtoprovideITGovernanceguidelines
to cybercafeowners.
8. Cybercafe association or State Police (cyber cell wing) do not seem to conduct
periodicvisits to cybercafes – one of the cybercafe owners whom we interviewed expressed a
viewthat the police will not visit a cybercafe unless criminal activity is registered by filing an
FirstInformationReport(FIR).Cybercafeownersfeelthatpoliceeitherhaveaverylittleknowledge
aboutthe technicalaspectsinvolvedincybercrimes and/oraboutconceptualunderstandingofIT
security. Therearethousandsofcybercafes across India.
In the event that a central agency takes up the responsibility for monitoring cybercafes,
anindividualshould takecarewhile visitingand/or operatingfromcybercafe.
2.6 Botnets:TheFuelforCybercrime
2.6.1 Botnet
• Thedictionarymeaning ofBot is
“(computing)an automatedprogram for doing someparticular task,often overa network.”
• Botnetisatermusedforcollectionofsoftwarerobots,orBots,thatrunautonomouslyandautomaticall
y.
• Thetermisoftenassociatedwithmalicioussoftwarebutcanalsorefertothenetworkofcomputersusin
gdistributed computingsoftware.
• Insimpleterms,aBotissimplyanautomatedcomputerprogramOnecangainthecontrolofcomputerb
yinfectingthem with avirus orotherMalicious Codethatgives the access.
• Computersystemmaybe apart of aBotneteventhoughitappearstobeoperatingnormally.
• Botnets are often used to conduct a range of activities, from distributing Spam and viruses
toconductingdenial-of-service(DoS) attacks
• ABotnet(alsocalledaszombienetwork)isanetworkofcomputersinfectedwithamalicious program
that allows cybercriminals to control the infected machines remotelywithoutthe
users’knowledge.
• “Zombienetworks”have become asourceof incomeforentire groupsofcybercriminals.
16
• TheinvariablylowcostofmaintainingaBotnetandtheeverdiminishingdegreeofknowledgerequire
dtomanageoneareconducivetothegrowthinpopularityand,consequently,the number ofBotnets.
• Ifsomeonewantstostarta“business”andhasnoprogrammingskills,thereareplentyof
“Botforsale”offers onforums.
• ‘encryptionoftheseprograms’codecanalsobeorderedinthesamewaytoprotectthemfrom
detection byantivirus tools.
• AnotheroptionistostealanexistingBotnet.Figure2.8explainshowBotnetscreatebusiness.
• Onecanreducethechances of becomingpartofaBotbylimitingaccess intothesystem.
• LeavingyourInternetconnectionONandunprotectedisjustlikeleavingthefrontdoorofthe
housewideopen.
Onecanensurefollowingtosecurethesystem:
1. Useantivirusand anti-Spywaresoftware andkeep itup-to-date:
2. SettheOS todownload andinstallsecuritypatchesautomatically:
3. UseafirewalltoprotectthesystemfromhackingattackswhileitisconnectedontheInternet:
Afirewallisasoftwareand/orhardwarethatisdesignedtoblockunauthorizedaccesswhilepermit
tingauthorized communications.
4. DisconnectfromtheInternetwhenyou areawayfromyour computer:
5. Downloadingthefreewareonlyfrom websitesthatareknownandtrustworthy:
6. Checkregularlythefoldersinthemailbox–“sentitems”or“outgoing”–forthosemessagesyou
did not send:
7. Takeanimmediate actionif yoursystemisinfected:
Box2.9|TechnicalTerms
Malware: Itismalicious software,designedtodamageacomputersystem withouttheowner’s
informedconsent.Viruses andworms arethe examplesof malware.
Adware: It is advertising-supported software, which automatically plays, displays, or
downloadsadvertisements to a computer after the software is installed on it or while the
application is beingused.Few Spywaresare classifi ed as Adware.
Spam: ItmeansunsolicitedorundesiredE-Mail messages
Spamdexing: It is also known as search Spam or search engine Spam. It involves a number
ofmethods, such as repeating unrelated phrases, to manipulate the relevancy or prominence
ofresources indexed by a search engine in a manner inconsistent with the purpose of the
indexingsystem.
DDoS: Distributed denial-of-service attack (DDoS) occurs when multiple systems flood
thebandwidth or resources of a targeted system, usually one or more web servers. These systems
arecompromised byattackers usingavarietyof methods
17
2.7 AttackVector
• An “attack vector” is a path, which an attacker can gain access to a computer or to
anetworkserver to deliverapayload ormalicious outcome.
• Attackvectorsenableattackerstoexploitsystemvulnerabilities,includingthehumanelement.
• Attack vectors include viruses, E-Mail attachments, webpages, pop-up windows,
instantmessages, chat rooms, and deception. All of these methods involve programming (or,
inafew cases,hardware), exceptdeception, inwhich a human operator isfooled into
removingorweakeningsystem defenses.
• Tosomeextent,firewallsandantivirussoftwarecanblockattackvectors.
• However,noprotectionmethod is totallyattack-proof.
• A defense method that is effective today may not remain so for long because attackers
areconstantly updating attack vectors, and seeking new ones, in their quest to gain
unauthorizedaccessto computers andservers. Refer to Box2.10.
• The most common malicious payloads are viruses (which can function as their own
attackvectors),Trojan Horses, worms, and Spyware.
• If an attack vector is thought of as a guided missile, its payload can be compared to
thewarheadin thetip of the missile.
• In the technical terms, payload is the necessary data being carried within a packet or
othertransmission unit – in this scenario (i.e., attack vector) payload means the malicious
activitythatthe attack performs.
• From the technical perspective, payload does not include the “overhead” data required to
getthe packet to its destination. Payload may depend on the following point of view:
“Whatconstitutes it?” To a communications layer that needs some of the overhead data to do
its job,the payload is sometimes considered to include that part of the overhead data that this
layerhandles.
Acloudservicehasthreedistinctcharacteristicswhichdifferentiateitfromtraditionalhosting:
1. Itis sold on demand –typicallybythe minuteorthehour;
2. It is elastic in terms of usage – a user can have as much or as little of a service as he/she
wantsat anygiventime;
3. The service is fully managed by the provider – a user just needs PC and Internet
connection.Significant innovations into distributed computing and virtualization as well as
improved accessspeedoverthe Internet havegenerated agreat demandforcloud computing.
3. Software-as-a-service (SaaS): It is the broadest market. In this case, the provider allows the
customer only to use its applications. The software interacts with the user through a user
interface. These applications can be anything from Web-based E-Mail to applications such
asTwitteror Last.fm.