Module 3
Module 3
1. Initial uncovering:
🞄 Two steps involved: 1) Reconnaissance
2) Attacker uncovers information
2. Network Probe
3. Crossing the line toward E-crime
4. Capturing the network
5. Grab the data
6. Covering tracks
⦿ Proxy server is computer on a network
which acts as an intermediary for
connections with other computers on that
network
⦿ It
accesses the Internet user’s b ehalf,
protecting personal information by
hiding the source computer’s identifying
information
⦿ Introduced in 1996
⦿ Fake E-Mail using other reputed
companies or individual’s identity
⦿ Viruses
spread themselves, without
the knowledge or permission of the
users
⦿ Program viruses:
• Active when program file(usually with extensions
.bin, .com, .exe, .ovl, .drv) is executed
• Makes copy of itself
⦿ Multipartite Viruses:
• Hybrid of a boot sector and program viruses
⦿ Stealth viruses:
• Masks itself
• Antivirus S/W also cannot detect
• Alter its file system and hide in the computer
memory to remain in the system undetected
• 1st computer virus named as Brain
⦿ Polymorphic viruses:
• Like “ chameleon ” that changes its virus
signature (i.e., binary pattern) every time it
spread throug h the system (i.e., multiplies
& infect a new file)
• Polymorphic generators are routines that can
b e linked with the existing viruses
• Generators are not viruses but purpose to hide
actual viruses under the cloak of
polymorphism
⦿ Macroviruses:
• Infect documents produced by victims computer