unix and shall programming
unix and shall programming
• These threats can come in the form of malware, phishing, and other
malicious activity.
1. Malware
Unit-4
Malware is malicious software such as spyware, ransomware, viruses and
worms. Malware is activated when a user clicks on a malicious link or
attachment, which leads to installing dangerous software. Cisco reports that
malware, once activated, can:
2. Emotet
• The Cybersecurity and Infrastructure Security Agency (CISA) describes
Emotet as “an advanced, modular banking Trojan that primarily functions
as a downloader or dropper of other banking Trojans.
3. Denial of Service
• A denial of service (DoS) is a type of cyber attack that floods a computer
or network so it can’t respond to requests.
• A distributed DoS (DDoS) does the same thing, but the attack originates
from a computer network.
• Cyber attackers often use a flood attack to disrupt the “handshake”
process and carry out a DoS. Several other techniques may be used, and
some cyber attackers use the time that a network is disabled to launch
other attacks.
• A botnet is a type of DDoS in which millions of systems can be infected
with malware and controlled by a hacker, according to Jeff Melnick of
Netwrix, an information technology security software company. Botnets,
sometimes called zombie systems, target and overwhelm a target’s
processing capabilities. Botnets are in different geographic locations and
hard to trace.
5. Phishing
• Phishing attacks use fake communication, such as an email, to trick the
receiver into opening it and carrying out the instructions inside, such as
providing a credit card number.
• “The goal is to steal sensitive data like credit card and login information
or to install malware on the victim’s machine,” Cisco reports.
6. SQL Injection
• A Structured Query Language (SQL) injection is a type of cyber attack that
results from inserting malicious code into a server that uses SQL.
• When infected, the server releases information. Submitting the malicious
code can be as simple as entering it into a vulnerable website search box.
7. Password Attacks
• With the right password, a cyber attacker has access to a wealth of
information.
• Social engineering is a type of password attack that Data Insider defines
as “a strategy cyber attackers use that relies heavily on human interaction
and often involves tricking people into breaking standard security
practices.” Other types of password attacks include accessing a password
database or outright guessing.
8. Backdoor attacks
• A backdoor attack is a type of cyber attack where the attacker gains access
to a system or network by bypassing security mechanisms.
• Once the attacker has gained access, they can then install malicious
software or perform other malicious actions.
Unit-4
MAC Address
• A MAC address (media access control address) is a 12-
digit hexadecimal number assigned to each device connected to the
network.
• Primarily specified as a unique identifier during device manufacturing, the
MAC address is often found on a device's network interface card (NIC).
• A MAC address is required when trying to locate a device or when
performing diagnostics on a network device.
DHCP
Dynamic Host Configuration Protocol(DHCP) is an application layer protocol
which is used to provide:
Router
• The router is a physical or virtual internetworking device that is designed
to receive, analyze, and forward data packets between computer
networks.
• A router examines a destination IP address of a given data packet, and it
uses the headers and forwarding tables to decide the best way to
transfer the packets.
Bots
A bot (short for robot) is a software application programmed to perform tasks
through Robotic Process Automation, or RPA. Bots work by automatically going
through a set of instructions, and they carry out tasks and processes much
faster, more accurately, and at a higher volume than it would otherwise take
humans.
4.3.2
Man in the Middle
• A man-in-the-middle (MiTM) attack is a type of cyber attack in which the
attacker secretly intercepts and relays messages between two parties
who believe they are communicating directly with each other.
Unit-4
Key Concepts of a Man-in-the-Middle Attack
Man-in-the-middle attacks:
• You can think of this type of attack as similar to the game of telephone
where one person's words are carried along from participant to
participant until it has changed by the time it reaches the final person. In
a man-in-the-middle attack, the middle participant manipulates the
conversation unknown to either of the two legitimate participants, acting
to retrieve confidential information and otherwise cause damage.
1. The attacker sets up a fake chat service that mimics that of a well-known
bank.
2. Using knowledge gained from the data intercepted in the first scenario,
the attacker pretends to be the bank and starts a chat with the target.
3. The attacker then starts a chat on the real bank site, pretending to be the
target and passing along the needed information to gain access to the
target's account.
Email Attack
1) Phishing:
Phishing is a form of fraud. Cyber criminals use email, instant
messaging, or other social media to try to gather information such
as login credentials by masquerading as a reputable person.
Phishing occurs when a malicious party sends a fraudulent email
disguised as being from an authorized, trusted source. The message
intent is to trick the recipient into installing malware on his or her
device or into sharing personal or financial information.
Unit-4
Spear phishing is a highly targeted phishing attack. While phishing
and spear-phishing both use emails to reach the victims, spear-
phishing sends customized emails to a specific person. The criminal
researches the target’s interests before sending the email.
2) Vishing:
Vishing is phishing using voice communication technology.
Criminals can spoof calls from authorized sources using voice-over
IP technology. Victims may also receive a recorded message that
appears authorized. Criminals want to obtain credit card numbers
or other information to steal the victim’s identity. Vishing takes
advantage of the fact that people trust the telephone network.
3) Smishing:
Smishing is phishing using text messaging on mobile phones.
Criminals impersonate a legitimate source in an attempt to gain the
trust of the victim. For example, a smishing attack might send the
victim a website link. When the victim visits the website, malware is
installed on the mobile phone.
4) Whaling:
Whaling is a phishing attack that targets high profile targets within
an organization such as senior executives. Additional targets include
politicians or celebrities.
5) Pharming:
Pharming is the impersonation of an authorized website in an effort
to deceive users into entering their credentials. Pharming misdirects
users to a fake website that appears to be official. Victims then enter
their personal information thinking that they are connected to a
legitimate site.
6) Spyware:
Spyware is software that enables a criminal to obtain information
about a user’s computer activities. Spyware often includes activity
trackers, keystroke collection, and data capture. In an attempt to
overcome security measures, spyware often modifies security
settings. Spyware often bundles itself with legitimate software or
with Trojan horses. Many shareware websites are full of spyware.
7) Adware:
Adware typically displays annoying pop-ups to generate revenue
for its authors. The malware may analyze user interests by tracking
the websites visited. It can then send pop-up advertising relevant to
those sites. Some versions of software automatically install Adware.
Unit-4
8) Spam:
Spam (also known as junk mail) is unsolicited email. In most cases,
spam is a method of advertising. However, spam can send harmful
links, malware, or deceptive content. The end goal is to obtain
sensitive information such as a social security number or bank
account information. Most spam comes from multiple computers
on networks infected by a virus or worm. These compromised
computers send out as much bulk email as possible.
4.3.3 Password Attack, Malware
4.4 Hackers:
A Hacker is a person who finds and exploits the weakness in computer systems
and/or networks to gain access. Hackers are usually skilled computer
programmers with knowledge of computer security.
• These hackers are able to gain illegal access to the systems and cause
severe damage to data privacy. Therefore, cybersecurity vulnerabilities
are extremely important to monitor for the overall security posture as
gaps in a network can result in a full-scale breach of systems in an
organization.
System Misconfigurations
• Networks are frequently searched for system errors and vulnerable spots
by cybercriminals. Network misconfigurations are increasing as a result of
the quick digital revolution.
Zero-day Vulnerabilities
• Zero-day vulnerabilities are specific software flaws that the attackers are
aware of but that a company or user has not yet identified.
• Since the vulnerability has not yet been identified or reported by the
system manufacturer, there are no known remedies or workarounds in
these situations. These are particularly risky because there is no
protection against them before an attack occurs. Exercising caution and
checking systems for vulnerabilities is crucial to reducing the risk of zero-
day attacks.
• They can lead to data theft, data loss, loss of data integrity, denial of
service, as well as full system compromise. The primary reason for
injection vulnerabilities is usually insufficient user input validation.
Code injection
• The attacker injects application code written in the application language.
This code may be used to execute operating system commands with the
privileges of the user who is running the web application. In advanced
cases, the attacker may exploit additional privilege escalation
vulnerabilities, which may lead to full web server compromise.
• Impact
Full system, compromise
CRLF injection
• The attacker injects an unexpected CRLF (Carriage Return and Line Feed)
character sequence. This sequence is used to split an HTTP response
header and write arbitrary contents to the response body. This attack may
be combined with Cross-site Scripting (XSS).
• Impact: Cross-site Scripting (XSS)
Cross-site Scripting (XSS)
• The attacker injects an arbitrary script (usually in JavaScript) into a
legitimate website or web application. This script is then executed inside
the victim’s browser.
• Impact
LDAP Injection
• The attacker injects LDAP (Lightweight Directory Access Protocol)
statements to execute arbitrary LDAP commands. They can gain
permissions and modify the contents of the LDAP tree.
• Impact: Authentication bypass, Privilege escalation, Information
disclosure
OS Command Injection
• The attacker injects operating system commands with the privileges of
the user who is running the web application. In advanced cases, the
attacker may exploit additional privilege escalation vulnerabilities, which
may lead to full system compromise.
• Impact: Full system compromise
SQL Injection (SQLi)
• The attacker injects SQL statements that can read or modify database
data. In the case of advanced SQL Injection attacks, the attacker can use
SQL commands to write arbitrary files to the server and even execute OS
commands. This may lead to full system compromise.
• Impact
Authentication bypass
Information disclosure
Data loss
Sensitive data theft
Loss of data integrity
Denial of service
Full system compromise.
XPath injection
• The attacker injects data into an application to execute crafted XPath
queries. They can use them to access unauthorized data and bypass
authentication.
• Impact: Information disclosure, Authentication bypass
Black hat
• Black-hat Hackers are also known as an Unethical Hacker or a Security
Cracker.
• These people hack the system illegally to steal money or to achieve their
own illegal goals.
• They find banks or other companies with weak security and steal money
or credit card information.
Unit-4
• They can also modify or destroy the data as well. Black hat hacking is
illegal.