Ethical Hacking Assignment
Ethical Hacking Assignment
It's important to note that the lifecycle of an attack can vary depending
on the specific attack vector and the goals of the attacker. Different
attacks may follow different stages or may combine multiple stages
into a single step. Additionally, defenders can use this lifecycle as a
framework to understand and mitigate attacks by identifying and
disrupting the attacker's activities at each stage.
a) Botnets:
Botnets are networks of compromised computers or devices that are
controlled by a malicious actor, known as the botmaster. These
compromised devices, also known as bots or zombies, are typically
infected with malware that allows the botmaster to remotely control
and coordinate their activities. Botnets are often used for malicious
purposes, such as launching distributed denial-of-service (DDoS)
attacks, sending spam emails, spreading malware, or conducting large-
scale cybercriminal activities.
b) Rootkits:
Rootkits are a type of malicious software that is designed to hide its
presence and activities on a compromised system. They are often used
by attackers to gain unauthorized access and maintain control over a
compromised system while avoiding detection by system
administrators and security tools.
Rootkits typically operate at a low level of the operating system,
directly interacting with the kernel or other critical system
components. By modifying system files, processes, or drivers, rootkits
can alter the behaviour of the operating system, hide files and
processes, intercept system calls, and disable security mechanisms.
Q4. Describe Man in the Middle Attack with relevant examples and
diagrams.
A Man-in-the-Middle (MitM) attack is a type of cyber attack where an
attacker intercepts and relays communication between two parties
without their knowledge. The attacker secretly relays and possibly
alters the communication between the two parties, making them
believe that they are directly communicating with each other. Here's
an example to illustrate a Man-in-the-Middle attack:
1. Initial Setup:
● Alice and Bob are connected to the same network.
● Eve positions herself as a network attacker and sets up a
rogue access point.
2. Attack Execution:
● Alice tries to establish a secure connection with Bob by
initiating a session.
● Eve intercepts Alice's request and acts as a proxy,
forwarding the request to Bob.
● Bob receives the request, but he believes it is directly
coming from Alice.
● Bob responds to the request, thinking he is communicating
directly with Alice.
● Eve intercepts Bob's response and forwards it to Alice,
pretending to be Bob.
3. Impersonation and Eavesdropping:
● Now, Alice and Bob think they are securely communicating,
but Eve is in the middle, intercepting and possibly altering
their messages.
● Eve can read, modify, or inject malicious content into the
communication without the knowledge of Alice or Bob.
● Eve can also impersonate either party, leading to
unauthorized actions or theft of sensitive information.
4. Mitigation:
● To mitigate Man-in-the-Middle attacks, it is crucial to
implement secure communication protocols, such as
Transport Layer Security (TLS) or Secure Sockets Layer
(SSL), which provide encryption and authentication.
● Users should also be cautious when connecting to public or
untrusted networks and verify the authenticity of websites
and certificates.
5. Diagram
Q5. Explain the term Sniffing with relevant example and diagram
Sniffing refers to the act of capturing and analyzing network traffic to
intercept and view data packets transmitted over a network. It is often
used by network administrators for troubleshooting, but it can also be
exploited by attackers to eavesdrop on sensitive information. Here's an
example to illustrate sniffing:
Example: Alice and Bob are communicating over an unencrypted Wi-Fi
network, and Eve, an attacker, wants to intercept their communication
using a sniffing technique.
1. Diagram
2. Setup:
a. Alice and Bob are connected to the same Wi-Fi network.
b. Eve positions herself within the Wi-Fi network range and
runs a packet sniffing tool.
3. Packet Capture
a. Alice sends a message to Bob over the network.
b. The message is broken down into data packets that are
transmitted over the Wi-Fi network.
c. Eve's sniffing tool captures these packets as they pass
through the network.
4. Packet Analysis
a. Eve analyzes the captured packets to extract information
such as usernames, passwords, or any other sensitive data.
b. Eve can also analyze the packets to gain insights into the
network traffic, identify vulnerabilities, or exploit
weaknesses.
5. Mitigation
a. To protect against sniffing attacks, it is important to use
secure protocols, such as HTTPS, which encrypts the data
being transmitted.
b. Implementing strong Wi-Fi encryption, such as WPA2 or
WPA3, can also help prevent unauthorized access to
network traffic.
c. Network administrators should monitor network traffic for
any signs of suspicious activity and use intrusion detection
and prevention systems.