Ics Module 2 Notes
Ics Module 2 Notes
MODULE 2
CYBER OFFENSES: HOW CRIMINALS PLAN THE ATTACK
CONTENTS
Understand different types of Cyber attacks
Overview the steps involved in cybercrime
Understand tools used for gathering information about the target
Overview of Social Engineering
Role of Cybercafes in Cybercrime
Understand what is cyberstalking
Learn about Botnet and Attack Vector
INTRODUCTION
Cybercriminals use the World Wide Web (www) and Internet for all illegal activities. These
criminal0 take the advantage of the wide spread lack of awareness about cybercrime and
cyberlaws among the people who are constantly using the Information Technology(IT) for
official and personal purpose.
FEW TERMINOLOGIES
(a) Hacker- Hacker is a person with strong interest in computers who enjoys learning
and experimenting with them. Hackers are usually very talented, smart people who
understand computers better than others.
(b) Brute Force Hacking- it is a technique used to find passwords and Encryption Keys.
It involves trying every possible combination of letters, numbers etc. until the code is
broken.
(c) Cracker- A cracker is a person who breaks into computers. They are computer
criminals. Their act includes Vandalism, theft and snooping in unauthorized areas.
(d) Cracking- It is an act of breaking into computers. Cracking is a popular growing
subject on the internet. Many sites are available to supply Crackers with programs that
allow them to crack computers.
(e) Cracker Tools- These are programs that break into the computers like password
crackers, viruses, war dialer and worms
(f) Phreaking- This is the notorious act of breaking into phones and other
communication systems.
(g) War Dialer- It is a program that automatically dials phone numbers looking for
modems or computers on the other end to which they are connected. It catalogs
numbers so that the hacker can call back and try to break in.
(h) Cyber Bullying- when Internet, phones and other devices are used to send or post
texts or images intended to hurt and embarrass another person is called cyber bullying
TYPES OF HACKERS
1. Black hat hackers
2. White hat hackers
3. Gray hat hackers
4. Brown hat hackers
CATEGORIES OF CYBERCRIME
a) Crimes targeted at Individuals-The goal is to exploit human weakness such as Greed and
Innocence. These crimes include financial fraud sale of non-existent or stolen items copyright
violation harassment etc.
b) Crimes targeted at Property-Programs that can disrupt the functions and erase the data
from cell phone, laptops, Personal Digital Assistants (PDA’s) and renewable medias (CDs
and drivers), hard disk etc. Then they can create malfunctioning of the device.
a) Single event of Cybercrime -It is a single event from the perspective of victims. For
example unknowingly open and attachment that contain virus that will affect the system
b) Series of events-This involves attackers interacting with the victims repetitively. For
example, attacker internets with the victim over the phone or via chat rooms to establish
relationship first and then use the relationship to commit illegal activities
Criminals use various tools and methods to locate vulnerability of the target. Criminals plan
either Active or Passive Attacks.
a) Inside attack-An attack originating and/or attempted within the security parameters
of an organisation. It is usually attempted by an insider who gains access to more
resources.
a) Passive attacks
b) Active attacks
a) Passive attacks involve gathering information about the target without his/her
knowledge. Example watching a building to identify what time employees Enter
building premises. It is done by internet searches or by googling about and individual
or organisation to gain information
5. Going through job postings in a particular job profile-To get information about
what kind of Technology their company is working on. Example- Naukri, LinkedIn
etc
6. Network sniffing -It is used to get Useful information such as internet protocol
address servers or networks and other available services on the system or network
Scanning is the It is the key step to examine intelligently the gathered information about the
target.The objectives of scanning are
After scanning and scrutinizing the attack is launched using the following steps
1. People search -Provides details about personal information, date of birth, residential
address, contact information etc of a person
2. Domain name confirmation -Perform searches for domain names. This helps to find
registered domain names like “.Com”, “.net”, “.org” and “.edu”
3. Trace route- best tool to find routes to the target system by knowing the packets
(data) transmitted across network
4. Email Tracker Pro-Analysis the email address and provides IP address of the system
that sent the email
5. Competitive intelligence- Provides information related to almost any product on
recent industry trends
6. Visual Route Trace- This is a tool which determines traffic(data) on computer
flowing between source and target
1. NMap-Automated mechanism tool used to find the open port and also to identify the
OS being used in the system
2. Dsniff-This is a networki monitoring tool to capture usernames, Password and
authentication information
3. FileSnarf-This tool is used to capture file transfers and data
4. MsgSnarf-Tool used to capture instant messages. Example Yahoo chat
5. URLSnarf-Tool used to capture Http traffic
6. Xprobe2-Tool used to find the type of operating system of target host
SOCIAL ENGINEERING
a. Fake emails-The attacker sends fake emails to numerous users such that the user
finds it as legitimate mail. This act is called as Phishing
b. Email attachments-Email attachments consisting of Malicious codes and sending it
to victim system which will automatically get executed in their system. Example
keyloggers virus worms and Trojan Horses all these can be included in the attachment
c. Pop-up Windows- They are used in similar manner to email attachments. Pop-up
windows with special offers and free stuffs can encourage users to unintentionally
install malicious software or programs.
CYBERSTALKING
a) Through online
1. False accusations
2. Monitoring
3. Transmission of data
4. ID theft
5. Damage the data or system gathering information for harassment purpose
b) Through offline
1. Following a person
2. visiting the persons home or business place
3. making Phone calls
4. Leaving written messages
5. Destroying the victims property
TYPES OF STALKERS
1. Online stalker
2. Offline stalker
1. Online stalker
They aim to start the interaction with the victim directly through the internet
Email and chat rooms are the most popular communication medium to get connected
with the victim
The stalker makes sure that the victim recognises the Attack made by him or her
2. Offline stalker
Stalker uses traditional methods such as following victim, watching daily routine of
the victim etc
Stalker individually searches in newsgroups, personal websites and people finding
services
All these are done without the knowledge of victim so that victim is not aware about
stalking
The majority of Cyber stalkers are men and majority of victims are women
Some cases also have been reported where women act as cyber stockers and men as
victims as well as cases of same sex
In many cases cyber stalkers and victims hold a prior relationship and it begins when
the victims try to break the relationship. Example Ex-Lover, Ex-Spouse, -Ex-Boss etc
“Cyber Cafe or internet cafe provides internet access to public for a Fee”.
Since many people you cybercafes IT security and governance should be maintained
by the cybercafe owners
The most common attacks carried out using cyber cafes are stealing Bank passwords,
fraudulent transaction of money using username and password etc
Keyloggers run on the background capturing keystrokes to know password and other
confidential information and monitoring browsing behaviour
Spywares are software that install itself on the user computer and starts secretly
monitoring online behaviour without users’ knowledge or permission
Looking over someone's shoulder to get information about what they are doing on the
system and find out usernames and passwords.
1. Always Logout-After checking mail or logging into accounts one should logout or
sign out before leaving the system. Do not save your login information and disable
automatic login option
2. Stay with the Computer-while browsing one should not leave the system unattended
for any period of time. If you get any emergency call or work make sure you have
logged out of the account and close all the browser Windows
3. Clear history and Temporary Files-Internet Explorer saves Pages that users have
visited. Your passwords can be stored in the browser if that option has been enabled
on computer being used
4. Be alert-stay alert and be aware of the surroundings
5. Avoid online financial transactions-Avoid online banking, shopping and other
transactions requiring to provide personal or confidential information. In case if there
is an emergency do it but try to change the password as soon as possible using trusted
computer at home or at office
6. Change Passwords- Change strong passwords at regular intervals of time
7. Use virtual keyboard-Nowadays almost every bank has provided virtual keyboard on
their website providing high security
8. Follow Security warnings-Each Bank provides security warnings like (a) changing
password after using computers outside (b) use virtual keyboards to protect password
from keyloggers, spywares and trojans (c) Do not share your CVV or OTP with
anyone
Individuals should take care while accessing computers or internet in public places such as
hotels, libraries etc. It is required to follow safety and security while operating on systems
outside
Bot-It is an automated program or software application program that does a certain task.
Bots are automated that run according to the instructions without human intervention
Botnet-A group of computers infected by Malware and is under the control of malicious
attacker
Zombie networks
Botnet is also called as “Zombie network” here Network of Computers are infected with
malicious programs that allows criminals to control the infected machines remotely without
users knowledge. Zombie Networks become a source of income for group of Cyber criminals
Botnets have gained popularity and have increased in number due to the following reasons
There are plenty of “Bot for sales” for someone who wants to start a business and has no
programming skills
7. Check regularly the folders in the mailbox-Check in “sent items” and “outbox” for
mails or messages you have not sent. If such messages are found then it is a sign that
your system maybe a part of bot
8. Take an immediate action if your system is infected- Steps to be followed
1. Disconnect It from internet
2. Scan entire system with fully updated anti-virus
3. Report to Internet Service Provider (ISP) or Legal Authorities
4. Change the password immediately
ATTACK VECTOR
ZERO-DAY ATTACK