M4 1B-C
M4 1B-C
Hacker Communities
Two ways commonly used to categorize hackers
● White Hat good hackers vs. Black Hat bad hackers
● Based loosely on psychological profiling
Hacker Motivation
● Curiosity
● Love of puzzles
● Desire for recognition or fame
● Revenge
● Financial gain
● Patriotism or politics
Ethical Hacking
Malware
Types of Malwares
• Viruses
• Worms
• Trojans
Viruses
Computer virus – malicious computer code that reproduces itself on the same computer
● Common data file virus is a macro virus that is written in a script known as macro
● Viruses cannot automatically spread to another computer—relies on user action to spread
● Viruses are attached to files
● Viruses are spread by transferring infected files
Worms
Trojans/Trojan horse
● Different types of malware are designed to collect important data from user’s computer and make
it available at the attacker
● This type of malware includes:
○ Spyware
○ Adware
○ Ransomware
Spyware
Keylogger
● Captures and stores each keystroke that a user types on the computer’s keyboard
● Attacker searches the captured text for any useful information such as passwords, credit catd
numbers, o personal information
● A keylogger can be a small hardware device or a software program
● As a hardware device, it is inserted between the computer keyboard connection and USB port
● Software keyloggers are programs installed on the computer that silently capture information
● An advantage of software keyloggers is that they do not require physical access to the user’s
computer
● Often installed as a trojan or virus, can send captured information back to the attacker via internet
Adware
● Program that delivers adversising content in manner unexpected and unwanted by user
● Typically displays advertising banners and pop-up ads
● May open new browser windows randomly
● Adware can also perform tracking of online activities
● Information is gathered by adware and solt to advertisers
Ransomware
● Logic Bomb
○ Computer code that lies dormant until it is triggered by a specific logical event
○ Difficult to detect before it is triggered
○ Often embedded in large computer programs that are not routinely scanned
● Backdoor
○ Gives access to a computer, program, or service that circumvents normal security to give
program access
○ When installed on a computer, they allow the attacker to return at a later time and bypass
security settings
● Zombie
○ Infected computer that is under the remote control of an attacker
○ Groups of zombie computers are gathered into a logical computer network called botnet
under that control of the attacker (bot herder)
○ Infected zombie computers wait for instructions through a command and control (C&C)
structure from bot herders
○ A common C&C mechanism used today is HTTP, which is more difficult to detect and
block
Psychological Approaches
Impersonation
Phishing
• Logos
• Urgent request
Variations of phishing attacks
Pharming
Spear phishing
Whaling
- Attacker calls victim with recorded bank message with callback number
Spam
- Unsolicited email
Image spam
- Attackers purchase the domain names of sites that are spelled similarly to actual sites
- Many may contain a survey that promises a chance to win prizes or will be filled with ads
Physical Procedure
Dumpster diving
Tailgating
- Watching an authorized user enter a security code on a keypad is known as shoulder surfing
Sphere of Application
This Act shall apply to:
- any kind of data message and electronic document use in commercial and non-commercial activities
- domestic and international dealings, transactions, contracts, exchanges and storage of information
Computer Virus
• Emails
• Downloads
• Messaging Services
• Old Software
• Malvertising
• Hijack your system’s code & resources causing performance issues on all devices
• Slow/lagging performance
• Corrupted/deleted files
• Malfunctioning apps/files