Ecomm Unit 4
Ecomm Unit 4
What is an IP Address?
The term IP Address is an acronym for Internet Protocol Address. An IP Address refers to the
address that assists a user in identifying a network connection. It also goes by the Logical
Address name provided to individual connections in the present network. An IP address lets
us understand and control the way in which various devices communicate on the Internet. It
also defines the specific behaviour of various Internet routers.
Full-Form The term MAC address is an acronym for Media The term IP Address is an acronym for
Access Control Address. Internet Protocol Address.
Number of Bytes It is a hexadecimal address of six bytes. This address is either an eight-byte or a
six-byte one.
Protocol Used for You can retrieve a device attached to the MAC You can retrieve a device attached to the IP
Retrieval address using the ARP protocol. address using the RARP protocol.
Provider The Manufacturer of NIC Cards provides a device An ISP (Internet Service Provider) provides a
with its MAC address. device’s IP address.
Use The primary use of a MAC address is to ensure the The IP address, on the other hand, defines a
physical address of a given device/ computer. computer’s logical address.
Operation The MAC address primarily operates on the data The IP address primarily operates on the
link layer. network layer.
Alteration and This address does not alter or change with the This address gets modified depending on
Changes passing time and change of environment. the change in environment and time.
Third-Party Access Any third party can find out a device’s MAC The IP address stays hidden from display in
address. front of any third party.
1. The user enters a web address or domain name into a browser.
2. The browser sends a message, called a recursive DNS query, to the network to find
out which IP or network address the domain corresponds to.
3. The query goes to a recursive DNS server, which is also called a recursive resolver,
and is usually managed by the internet service provider (ISP). If the recursive
resolver has the address, it will return the address to the user, and the webpage will
load.
4. If the recursive DNS server does not have an answer, it will query a series of other
servers in the following order: DNS root name servers, top-level domain (TLD) name
servers and authoritative name servers.
5. If the query reaches the authoritative server and it cannot find the information, it
returns an error message.
Benefits of DHCP
− Reliable IP address configuration. DHCP minimizes configuration errors caused by
manual IP address configuration, such as typographical errors, or address conflicts
caused by the assignment of an IP address to more than one computer at the same
time.
− Reduced network administration. DHCP includes the following features to reduce
network administration:
− Centralized and automated TCP/IP configuration.
− The ability to assign a full range of additional TCP/IP configuration values by means of
DHCP options.
− The efficient handling of IP address changes for clients that must be updated
frequently, such as those for portable devices that move to different locations on a
wireless network.
− The forwarding of initial DHCP messages by using a DHCP relay agent, which
eliminates the need for a DHCP server on every subnet.
Routers:
− A device that forwards data packets (units of info) from one network to another.
− Based on routing tables (lists of addresses, permissions etc) and routing protocols,
routers read the network address in each transmission and make a decision on how
to send it based on the most expedient route (determined by traffic load, line costs,
speed, bad lines)
− Routers are used to segment networks to balance and filter traffic for security
purposes and policy management
− They are also used at the edge of the n/w to connect remote offices
− Router can only route a message that is transmitted by a routable protocol (e.g.
Internet Protocol)
− Routers have to inspect n/w address in the protocol, so they process data and thus
add overhead.
− Most routers are specialized computers that are optimized for communications
− Router functions can also be implemented by adding routing software to file server.
(e.g. Windows 2000 include routing software)
− The operating system can route from one n/w to another, if each is connected to its
own n/w adapter (or NIC), in the server.
Bots:
− An autonomous program on the internet or another network that can interact with
systems or users.
− A ‘bot’ – short for robot – is a software program that performs automated,
repetitive, pre-defined tasks. Bots typically imitate or replace human user behavior.
Because they are automated, they operate much faster than human users. They carry
out useful functions, such as customer service or indexing search engines, but they
can also come in the form of malware – used to gain total control over a computer.
− Internet bots can also be referred to as spiders, crawlers, or web bots.
− Bots can be:
Chatbots
− Bots that simulate human conversation by responding to certain phrases with
programmed responses. for example google assistant
Social bots
− Bots which operate on social media platforms, and are used to automatically
generate messages, advocate ideas, act as a follower of users, and as fake accounts
to gain followers themselves. As social networks become more sophisticated, it is
becoming harder for social bots to create fake accounts. It is difficult to identify
social bots because they can exhibit similar behavior to real users.
Shop bots
− Bots that shop around online to find the best price for products a user is looking for.
Some bots can observe a user’s patterns in navigating a website and then customize
that site for the user.
Spider bots or web crawlers
− Bots that scan content on webpages all over the internet to help Google and other
search engines understand how best to answer users’ search queries. Spiders
download HTML and other resources, such as CSS, JavaScript, and images, and use
them to process site content.
Malicious bots /Web scraping crawlers
− Bots that scrape content, spread spam content, or carry out credential stuffing
attacks Bots that read data from websites with the objective of saving them offline
and enabling their reuse. This may take the form of scraping the entire content of
web pages or scraping web content to obtain specific data points, such as names and
prices of products on e-commerce websites.
− In some cases, scraping is legitimate and may be allowed by website owners. In other
instances, bot operators may be violating website terms of use or stealing sensitive
or copyrighted material.
Knowbots
− Bots that collect knowledge for users by automatically visiting websites to retrieve
information which fulfils certain criteria.
Monitoring bots
− Bots used to monitor the health of a website or system. Downdetector.com is an
example of an independent site that provides real-time status information, including
outages, of websites and other kinds of services.
Transactional bots
− Bots used to complete transactions on behalf of humans. For example, transactional
bots allow customers to make a transaction within the context of a conversation.
Download bots
− Bots that are used to automatically download software or mobile apps. They can be
used to manipulate download statistics – for example, to gain more downloads on
popular app stores and help new apps appear at the top of the charts.
− They can also be used to attack download sites, creating fake downloads as part of a
Denial of Service (DoS) attack.
Ticketing bots
− Bots which automatically purchase tickets to popular events, with the aim of reselling
those tickets for a profit. This activity is illegal in many countries, and even when not
against the law, it can be a nuisance to event organizers, legitimate ticket sellers, and
consumers. Ticketing bots are often sophisticated, emulating the same behaviors as
human ticket buyers.
Why do cybercriminals use bots?
− 1. To steal financial and personal information
− 2. To attack legitimate web services
− 3. To extort money from victims
− 4. To make money from zombie and botnet systems
− SQL injection
− Cross-site scripting (XSS)
− A DDoS attack aims to overwhelm the devices, services, and network of its intended
target with fake internet traffic, rendering them inaccessible to or useless for
legitimate users.
DoS vs. DDoS
− A distributed denial-of-service attack is a subcategory of the more general
denial-ofservice (DoS) attack. In a DoS attack, the attacker uses a single internet
connection to barrage a target with fake requests or to try and exploit a
cybersecurity vulnerability.
− DDoS is larger in scale. It utilizes thousands (even millions) of connected devices to
fulfill its goal.
Botnets
− Botnets are the primary way distributed denial-of-service-attacks are carried out.
The attacker will hack into computers or other devices and install a malicious piece
of code, or malware, called a bot. Together, the infected computers form a network
called a botnet. The attacker then instructs the botnet to overwhelm the victim's
servers and devices with more connection requests than they can handle.
− This type of attack aims to control all available bandwidth between the victim and
the larger internet. Domain name system (DNS) amplification is an example of a
volume-based attack. In this scenario, the attacker spoofs the target's address, then
sends a DNS name lookup request to an open DNS server with the spoofed address.
− When the DNS server sends the DNS record response, it is sent instead to the target,
resulting in the target receiving an amplification of the attacker’s initially small query.
Protocol Attacks
− Protocol attacks look to exhaust resources of a server or those of its networking
systems like firewalls, routing engines, or load-balancers. An example of a protocol
attack is the SYN flood attack.
−
−
Application-Layer Attacks
− The most common type of application layer attacks are the HTTP flood attacks in
which malicious actors just keep sending various HTTP requests to a server using
different IP addresses. Since the IP address and other identifiers change in every
request, the server can’t detect that it’s being attacked.
−
4.3.2 Man in the Middle, Email Attack
Man in the middle:
− Just as the name suggests, the man-in-the-middle is like an eavesdropper between
two sessions where the communication between two parties is monitored and
intercepted. The goal of such an attack is to steal financial or login information
of users.
−
− Use a VPN. A secure virtual private network (VPN) will help prevent
man-in-the-middle attacks by ensuring that all the servers you send data to are
trusted.
Email attack:
This is one popular example of an email cyber-attack, which has just used email as an attack
vector to steal the user’s credentials and other sensitive or personal data so it can be
leveraged for malicious intent.
Types of Email Attacks
1. Phishing
Phishing is a type of deception. Cybercriminals utilize email, instant messaging, and
other social media to impersonate a trusted individual to obtain information such as
login credentials. When an evil entity sends a false email that appears to be from a
legitimate, trustworthy source, it is known as phishing. The goal of the message is
to deceive the receiver into downloading malware or disclosing personal or financial
information.
Spear phishing is a form of phishing attack that is very specific in its approach. While
phishing and spear-phishing use emails to contact their victims, spear-phishing
delivers personalized emails to a single individual. Before sending the email, the
criminal researches the target's interests.
2. Vishing
It is a type of phishing that employs voice communication technologies. Using
voice-over IP technologies, criminals can fake calls from legitimate sources. Victims
may also get a recorded message that purports to be from an official source.
Criminals attempt to steal the victim's identity by obtaining credit card numbers or
other personal information. Vishing takes advantage of people's faith in the
telephone system.
3. Smishing
It is a sort of phishing that uses mobile phones to send text messages. To earn the
victim's trust, criminals imitate a legitimate source. A smishing attack might, for
example, send the victim a webpage URL. Malware is installed on the victim's phone
when they access the page.
4. Whaling
A phishing assault that targets high-profile targets within a business, such as senior
executives, is known as whaling. Politicians and celebrities are also possible targets.
5. Pharming
Pharming is the impersonation of a reputable website to dupe individuals to submit
their personal information. Pharming leads consumers to a phony website that
appears to be legitimate. Victims then provide their data under the impression that
they have reached a legitimate website.
6. Spyware
It is software that allows a criminal to collect data about a user's computer
activity. Activity trackers, keystroke collecting, and data capture are all standard
features of spyware. A spyware frequently adjusts its security settings in an attempt
to circumvent security measures. Spywares often come along with legitimate
applications or Trojan horses. Many shareware sites are infected with spyware.
7. Scareware
It is software that uses fear to encourage the user to execute a specified action.
Scareware creates pop-up windows that seem like those found in operating systems.
These windows display fake messages claiming that the system is in danger or
requires the execution of a specific program to resume regular operation. In actuality,
there are no issues, and malware infects the user's PC if they agree and permit the
indicated program to run.
8. Adware
Adware generates cash for its makers by displaying unpleasant pop-ups. By tracking
the pages visited, the malware may be able to determine the user's interests. It can
then send relevant pop-up advertisements to those websites. Adware is installed by
default in some software versions.
9. Spam
Unsolicited emails are referred to as spam (also known as junk mail). Spam is almost
always a form of advertising. Spams can contain hazardous links, viruses, or false
content. The ultimate goal is to collect sensitive data like a social security number or
bank account details. The majority of spams originate from numerous computers
connected to a network infected with a virus or worm. These infected computers
send out as many spam emails as they can.
4.3.2 Password Attack, Malware
Password Attacks
− Because passwords are the most commonly used mechanism to authenticate users
to an information system, obtaining passwords is a common and effective attack
approach. Access to a person’s password can be obtained by looking around the
person’s desk, ‘‘sniffing’’ the connection to the network to acquire unencrypted
passwords, using social engineering, gaining access to a password database or
outright guessing. The last approach can be done in either a random or systematic
manner:
− Brute-force password guessing means using a random approach by trying different
passwords and hoping that one work some logic can be applied by trying passwords
related to the person’s name, job title, hobbies or similar items.
− In a dictionary attack, a dictionary of common passwords is used to attempt to gain
access to a user’s computer and network. One approach is to copy an encrypted file
that contains the passwords, apply the same encryption to a dictionary of
commonly used passwords, and compare the results.
− In order to protect yourself from dictionary or brute-force attacks, you need to
implement an account lockout policy that will lock the account after a few invalid
password attempts. You can follow these account lockout best practices in order to
set it up correctly.
− Remote access. Using a smart remote access platform like OneLogin means that
individual websites are no longer the source of user trust. Instead, OneLogin ensures
that the user's identity is confirmed, and then logs them in.
− Biometrics. A malicious actor will find it very difficult to replicate your fingerprint or
facial shape. Enabling biometric authentication turns your password into only one of
several points of trust that a hacker needs to overcome.
Malware:
Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software.” Examples of common
malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
eventually make their way into your network. As a result, it is crucial to deploy technologies
that continually monitor and detect malware that has evaded perimeter defenses. Sufficient
advanced malware protection requires multiple layers of safeguards along with high-level
network visibility and intelligence.
Types of Vulnerabilities
Below are some of the most common types of cybersecurity vulnerabilities:
− System Misconfigurations
Network assets that have disparate security controls or vulnerable settings can
result in system misconfigurations. Cybercriminals commonly probe networks for
system misconfigurations and gaps that look exploitable. Due to the rapid digital
Vulnerability Remediation
− To always be one step ahead of malicious attacks, security professionals need to
have a process in place for monitoring and managing the known vulnerabilities.
Once a time-consuming and tedious manual job, now it is possible to continuously
keep track of an organization’s software inventory with the help of automated tools,
and match them against the various security advisories, issue trackers, or databases.
− If the tracking results show that the services and products are relying on risky code,
the vulnerable component needs to be located and mitigated effectively and
efficiently.
− The following remediation steps may seem simple, but without them, organizations
may find themselves in a bit of difficulty when fighting against hackers.
− Step 1: Know Your Code – Knowing what you’re working with is crucial and the first
step of vulnerability remediation. Continuously monitoring software inventory to be
aware of which software components are being used and what needs immediate
attention will significantly prevent malicious attacks.
− Step 2: Prioritize Your Vulnerabilities – Organizations need to have prioritization
policies in place. The risk of the vulnerabilities needs to be evaluated first by going
through the system configuration, the likelihood of an occurrence, its impact, and the
security measures that are in place.
− Step 3: Fix – Once the security vulnerabilities that require immediate attention are
known, it is time to map out a timeline and work plan for the fix.
to secure channels that transmit data within the organization’s network, as these
attackers could impersonate parties to access more sensitive data.
4.4.1.3 Breach(crack) in authentication protocol
− A security breach is any incident that results in unauthorized access to computer
data, applications, networks or devices. It results in information being accessed
without authorization. Typically, it occurs when an intruder is able to bypass security
mechanisms.
Types of security breaches
− There are a number of types of security breaches depending on how access has been
gained to the system:
− An exploit attacks system vulnerability, such as an out of date operating system.
Legacy systems which haven't been updated, for instance, in businesses where
outdated and versions of Microsoft Windows that are no longer supported are being
used, are particularly vulnerable to exploits.
− Weak passwords can be cracked or guessed. Even now, some people are still using
the password 'password', and 'pa$$word' is not much more secure.
− Malware attacks, such as phishing emails can be used to gain entry. It only takes one
employee to click on a link in a phishing email to allow malicious software to start
spreading throughout the network.
− Drive-by downloads use viruses or malware delivered through a compromised or
spoofed website.
− Social engineering can also be used to gain access. For instance, an intruder phones
an employee claiming to be from the company's IT helpdesk and asks for the
password in order to 'fix' the computer.
− An authentication protocol is a type of computer communications protocol or
cryptographic protocol specifically designed for transfer of authentication data
between two entities.
− It allows the receiving entity to authenticate the connecting entity (e.g. Client
connecting to a Server) as well as authenticate itself to the connecting entity (Server
to a client) by declaring the type of information needed for authentication as well as
syntax. It is the most important layer of protection needed for secure communication
within computer networks.
−
− It is highly insecure because credentials are sent "in the clear" and repeatedly,
making it vulnerable even to the most simple attacks like eavesdropping and
man-in-the-middle based attacks.
− It uses a two way handshake to perform authentication. For example login.
CHAP - Challenge-handshake authentication protocol
− It is an encrypted authentication scheme. It is developed by IETF. It performs periodic
checkups to check if the router is communicating with the same host.
− It uses a three way handshake to perform authentication.
− Server sends a random string (usually 128B long). The client uses password and the
string received as parameters for MD5 hash function and then sends the result
together with username in plain text.
− Server uses the username to apply the same function and compares the calculated
and received hash. An authentication is successful or unsuccessful.
EAP - Extensible Authentication Protocol
− EAP was originally developed for PPP(Point-to-Point Protocol) but today is widely
used in IEEE 802.3, IEEE 802.11(WiFi) or IEEE 802.16 as a part of IEEE
802.1x authentication framework.
− The latest version is standardized in RFC (Request for Comments) 5247. The
advantage of EAP is that it is only a general authentication framework for
client-server authentication - the specific way of authentication is defined in its
many versions called EAP-methods.
− White hat Hackers are also known as Ethical Hackers or a Penetration Tester.
White hat hackers are the good guys of the hacker world.
− These people use the same technique used by the black hat hackers. They
also hack the system, but they can only hack the system that they have
permission to hack in order to test the security of the system. They focus on
security and protecting the IT system. White hat hacking is legal.