Methods Used in Cyber Crime
Methods Used in Cyber Crime
used in Cybercrime
UNIT 3
Unit 3: Learning Objectives
• Improve Performance:
• Filter Requests
• Keep system behind the curtain
• Used as IP address multiplexer
• Its Cache memory can serve all users
Attack on this: the attacker first connects to a proxy
server- establishes connection with the target through
existing connection with the proxy.
An Anonymizer
• An anonymizer or an anonymous proxy is a tool that attempts to
make activity on the Internet untraceable.
• It is a proxy server computer that acts as an intermediary and
privacy shield between a client computer and the rest of the
Internet.
• It accesses the Internet on the user's behalf, protecting personal
information by hiding the client computer's identifying information.
• For example, large news outlets such as CNN target the viewers
according to region and give different information to different
populations
2. Phishing
• Password Guessing
• Attackers can guess passwords locally or remotely using either a
manual or automated approach
• Dictionary attacks
• work on the assumption that most passwords consist of whole
words, dates, or numbers taken from a dictionary.
• Hybrid password
• assume that network administrators push users to make their
passwords at least slightly different from a word that appears in a
dictionary.
Weak passwords
• The password contains less than eight characters
• The password is a word found in a dictionary (English or foreign)
• The password is a common usage word such as:
• Names of family, pets, friends, co-workers, fantasy characters, etc.
• Computer terms and names, commands, sites, companies, hardware, software.
• The words "<Company Name>", "sanjose", "sanfran" or any derivation.
• Birthdays and other personal information such as addresses and phone numbers.
• Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.
• Any of the above spelled backwards.
• Any of the above preceded or followed by a digit (e.g., secret1,1secret
Strong Passwords
• Contain both upper and lower case characters (e.g., a-z, A-Z)
• Have digits and punctuation characters as well as letters e.g., 0-9, @#$%^&*()_+|~-=\
`{}[]:";'<>?,./)
• Are at least eight alphanumeric characters long.
• Are not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc.
• Passwords should never be written down or stored on-line.
• Try to create passwords that can be easily remembered.
• One way to do this is create a password based on a song title, affirmation, or other
phrase.
• For example, the phrase might be: "This May Be One Way To Remember"
• and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.
Random passwords
• The internet
• A stand alone PC
• Local networks
Difference between virus and worm
Types of viruses
Allows an attacker to
• create, delete, rename, copy or edit any file
• Execute commands to change system settings
• Alter the windows registry
• Run, control and terminate applications
• Install arbitrary software and parasites
• Control computer hardware devices,
• Shutdown or restart computer
Functions of backdoors
• Steals sensitive personal information, valuable documents, passwords,
login name…
• Records keystrokes, captures screenshots
• Sends gathered data to predefined E-mail addresses
• Infects files, corrupts installed apps, damages entire system
• Distributes infected files to remote computers
• Installs hidden FTP server
• Degrades internet connection and overall system performance
• Decreases system security
• Provides no uninstall feature, hides processes, files and other objects
Examples of Backdoor trojans
• Back Orifice : for remote system administration
• Bifrost : can infect Win95 through Vista, execute
arbitrary code
• SAP backdoors : infects SAP business objects
• Onapsis Bizploit: Onapsis Bizploit is an SAP
penetration testing framework to assist security
professionals in the discovery, exploration, vulnerability
assessment and exploitation phases of specialized SAP
security assessment
How to protect from Trojan
Horses and backdoors
• Stay away from suspect websites/ links
• Bandwidth attacks
• Logic attacks
• Protocol attacks
• Unintentional DoS attack
Bandwidth attacks
• Flood attack
• Ping of death attack
• SYN attack
• Teardrop attack
• Smurf attack
• nuke
Flood attack