Module 2
Module 2
2.1 Introduction
• Hacker:
A hacker is person with strong interest in computers who enjoys learning and
experimenting with them. He/She is very talented, smart people who
understand computer better than the others.
• Cracker tools: These are programs that’ break into computer. These are
widely distributed on the internet. Like password crackers, Trojans, Viruses,
war dialers and worms
• War dialer: It is program that automatically dials phone numbers looking for
computers on the other end. It catalogs numbers so that the hackers can call
back and try to break in.
• Black hat:
A black hat hacker is typically one that engages in cybercrime operations and
uses hacking for financial gain, cyber espionage purposes or other malicious
motives, like implanting malware into computer systems.
A black hat is also called cracker. To add insult to injury, black hats may also
share information about the “break in” with other black hat crackers so they
can exploit the same vulnerabilities before the victim becomes aware and
takes appropriate measures.
• White hat:
A White Hat hacker tests systems and networks by trying to break into them.
They are hackers, but their talents are being used to improve Cyber Security.
White hats are ethical hackers. They use their knowledge and skill to thwart
the black hats and secure the integrity of computer systems or networks. If a
black hat decides to target you, it’s a great thing to have a white hat around.
White hat focuses on securing IT systems. Whereas black hat would like to
break into them. It's like thief and police game.
• Brown hat:
He is the one is one who thinks before acting or committing a malice or non-
malice deed.
Gray hat hackers may not have the criminal or malicious intent of a black hat
hacker, but they also don’t have the prior knowledge or consent of those whose
systems they hack into. Nevertheless, when gray hat hackers uncover
weaknesses such as zero-day vulnerabilities, they report them rather than
fully exploiting them. But gray hat hackers may demand payment in exchange
for providing full details of what they uncovered.
Categories of Cybercrime
• Thus, criminals have a new tool that allows them to expand the pool of
potential victims. However, this also makes difficult to trace and apprehend the
criminals.
• These includes stealing mobile devices such as cell phone, laptops, personal
digital assistant (PDAs), and removable medias (CDs and pen drives);
transmitting harmful programs that can disrupt functions of the systems
and/or can wipe out data from hard disk and can create the malfunctioning of
the attached devices in the system such as modem, CD drive etc.,
• This usually includes Credit card frauds, Internet time theft and Intellectual
property crimes.
• Ex. Unknowingly open an attachment that may contain virus that will infect
the system (PC/Laptop). It is known as hacking or fraud.
5. Series of events
• Example, attacker interacts with the victim on the phone and/or via chat
rooms to establish relationship first and then exploit that relationship to
commit sexual assault. Ex. Cyber stalking
Impact on An Active Attack can damage the A Passive Attack does not
System system. have any impact on the
regular functioning of a
system.
Victim The victim gets informed in an The victim does not get
active attack. informed in a passive
attack.
Internet. The victim is not aware that the Internet has been used to perpetuate
an attack against them.
2.4.2 Cases reported on Cyber Stalking
• The majority of cyber stalkers are men and the majority of their victims are
women.
• Some cases are vice-versa and some cases are reported of same-sex cyber-
stalking.
• In many cases, the cyber stalker and the victim hold a prior relationship, and
the cyber stalking begins when the victim attempts to break off the relationship.
• However, many cases are reported done by stranger.
• This person was chatting on the Internet, using her name and giving her
address, talking in obscene language.
• The same person was also deliberately giving her telephone number to other
chatters encouraging them to call Mrs. Joshi at odd hours.
• This was the first time when a case of cyber stalking was registered.
• Cyber stalking does not have a standard definition but it can be defined to
mean threatening, unwarranted behavior, or advances directed by one person
toward another person using Internet and other forms of online communication
channels as medium.
• Pornographic websites and similar websites with indecent contents are not
blocked.
• Cybercafé Owners have less awareness about the IT security and IT
Governance.
• No proper guidelines to the owners of Cyber Café from Government/State
police.
• No periodic visits to Cyber Cafe by Cyber-Cell wing (state Police) or Cybercafé
Association until any cyber crime is filed in the station in the form of FIR.
Here are few tips for safety and security while using the computers in Cyber Café.
1. Always logout:
Do not save login information through automatic login using saved passwords.
While checking E-Mails or logging into chatting services such as instant
messaging or using any other service that requires a username and a
password, always click "logout or sign out" before leaving the system. Simply
closing the browser window is not enough, because if some body uses the same
service after you then one can get an easy access to your account. However, do
not save your login information through options that allow automatic login.
Disable such options before login
• Stay with the computer :
While surfing/browsing, one should not leave the system unattended for any
period of time. If one has to go out, logout and close all browser windows.
3. Clear history and temporary files:
Internet Explorer saves pages that you have visited in the history folder and in
temporary Internet files. Your passwords may also be stored in the browser if
that option has been enabled on the computer that you have used. Therefore,
before you begin browsing, do the following in case of the browser Internet
Explorer:
• Go to Tools> Internet options click> the Content tab > click AutoComplete. If
the checkboxes for passwords are selected, deselect them. Click OK twice.
• After you have finished browsing, you should clear the history and temporary
Internet files folders.
For this, go to Tools > Internet options again> click the General tab go to
Temporary Internet Files > click Delete Files and then click Delete Cookies
• Then, under history, click clear history. Wait for the process to finish before
leaving the computer.
4. Be alert don't be a victim of Shoulder Surfing:
One should have to stay alert and aware of the surroundings while using a
public computer. Snooping over the shoulder is an easy way of getting your
username and password.
5. Avoid online financial transaction :
Ideally one should avoid online banking, shopping or other transactions that
require one to provide personal, confidential and sensitive information such as
credit card or bank account details. In case of urgency, one has to do it;
however, one should take the precaution of changing all the passwords as soon
as possible. One should change the passwords using a more trusted computer,
such as at home and/or in office.
6. Change password :
Changing the bank account/transaction passwords is the best practice to be
followed by every one who does the online net banking.
7. Virtual Keyboard:
Nowadays almost every bank has provided the virtual keyboard on their
website. The advantages of utilizing virtual keyboard is we can avoid the key
logger attack.
8. Security warnings: One should take utmost care while accessing the websites
of any banks/financial institution.
• Bot usually means “an automated program for doing some particular task,
often over network”.
• Bot net is a term used for collection of robots or Bots that run autonomously or
automatically.
• This term is associated with malicious software but can also refer to the
network of computers using distributed computing software.
• A bot net also called as zombie network is a network of computers infected with
malicious program that allows cyber criminals to control the infected machines
remotely without the users knowledge.
• If someone wants to start a business and has no programming skills, there are
plenty of bot for sale.
Technical terms
OS companies issue the security patches for flaws that are found in these
systems.
Attackers cannot get into the system when the system is disconnected from the
Internet. Firewall, antivirus, and anti-Spyware software's are not foolproof
mechanisms to get access to the system.
6. Check regularly inbox and sent items, for those messages you did not
send: If you do find such messages in your outbox, it is a sign that your
system may have infected with Spyware, and maybe a part of a Botnet. This is
not foolproof; many spammers have learned to hide their unauthorized access.
• An attack vector is a path or means by which a hacker (or cracker) can gain
access to a computer or network server in order to deliver a payload or
malicious outcomes.
• Attack vector include viruses, email attachments, Web pages, pop-up windows,
instant messages, chat rooms, and deception.
• To some extent, Firewalls and anti-virus software can block attack vectors.
• A defense method that is affected today may not remain so for long, because
hackers are constantly updating Attack vectors, and seeking new ones, in their
quest to gain unauthorized access to computers and servers.
• If vulnerability is at the entry point then attack vectors are the way attacks can
launch their results are try to infrate the building .
• In the broadest sent purpose of the attack battery in plant or piece of code that
makes use of a Wonderla score is called as pay load Android vector very in how
a balloon is implemented the most common malicious follow the viruses which
can function as their own attack vectors ) Trojan horses, worms and spyware.
Many worms are delivered as E-Mail attachments, but network worms use
holes in network protocols directly. Any remote access service, like file sharing,
is likely to be vulnerable to this sort of worm. In most cases, a firewall will
block system worms. Many of these system worms install Trojan Horses. Next,
they begin scanning the Internet from the computer they have just infected,
and start looking for other computers to infect. If the worm is successful, it
propagates rapidly. The worm owner soon has thousands of "zombie"
computers to use for more mischief.
7. Malicious macros:
Microsoft Word and Microsoft Excel are some of the examples that allow
macros. A macro does something like automating a spreadsheet, for example.
Macros can also be used for malicious purposes. All Internet services like
instant messaging, Internet Relay Chart (IRC), and P2P file-sharing networks
rely on cozy connections between the computer and the other computers on the
Internet. If one is using P2P software then his/her system is more vulnerable to
hostile exploits
9. Viruses: These are malicious computer codes that hitch a ride and make the
payload. Nowadays, virus vectors include E-Mail attachments, downloaded
files, worms, etc.
• A zero-day (or zero - hour or day zero) attack or threat is an attack that exploits
a previously unknown vulnerability in a computer applications or operating
system, one that developers have not had time to address and patch.
2. Remote Access Servers (RASs) with weak access controls: These are
connected to all the network. A Firewall will protect the PC, by reporting
suspicious activity, when admistarator fails to monitor the IDS alters. IDS is a
Intrusion Detection system, It is a system that monitors network traffic for
suspicious activity and alters when such activity is discovered.
1. Google Earth:
2. Internet archive:
It is an internet library with the purpose of offering permanent access for
researchers, historians and scholars to historical collections that exist in
digital format.
It includes texts, audio, moving images, and software as well as archived
WebPages in our collection.
3. Professional Community:
LinkedIn is an interconnected network of experienced professional from
around.
4. People Search
People Search provides details about personal information like Date of
Birth, residential address, contact number etc.
5. WHOIS
This is a domain registration lookup tool. This utility is used for
communicating with WHOIS servers located around the world to obtain
domain registration information(Domain name registration is the act of
reserving a name on the Internet for a certain period, usually one year)
It supports IP address queries. And automatically selects appropriate
WHOIS server for IP address.
6. Nslookup:
It means name server lookup. This tool is used in windows and UNIX to
query Domain name system(DNS) servers to find DNS details, including
IP address and other technical details such as mail exchanger and name
server.
7. Dnsstuff
This is a tool to extract DNS information about the IP address, mail
server extensions, DNS lookup etc.
8. Traceroute:
It is a tool to find the route to a target system. It determines the route
taken by packets across an IP network.
9. VisualRoute Trace:
This is a graphical tool which determines where and how virtual traffic
on the computer network is flowing between source and target
destination.
10. eMailtrackerPro:
It analyzes the E-Mail header and provides the IP address of the system
that sent the mail.
11. HTTrack
This tool acts like an offline browser. It can mirror the entire website to
a desktop. One can analyze the entire website by being offline.
12. Website Watcher
This tool can be used to keep the track of favorite websites for an update.
When the website undergoes an update/change, this tool automatically
detects it and saves the last 2 versions onto the desktop.
Arphound:
Arping:
Bugtraq
Dig
• This is used to perform detailed queries about DNS records and zones,
extracting configuration, and administrative information about a network
or domain
DNStracer
• dnstracer determines where a given Domain Name Server (DNS) gets its
information from for a given hostname, and follows the chain of DNS
servers back to the authoritative answer.
Dsniff
Filesnarf
• This is network auditing tool to capture file transfers and file sharing
traffic on a local subnet.
FindSMB
• This is used to find and describe message block servers on the local
network.
Fping
Hackbot
Hmap
******End******