Tools and Methods Used in Cybercrime Unit 3
Tools and Methods Used in Cybercrime Unit 3
Cybercrime
UNIT 3
Objectives
• Improve Performance:
• Filter Requests
• Keep system behind the curtain
• Used as IP address multiplexer
• Its Cache memory can serve all users
Attack on this: the attacker first connects to a proxy server-
establishes connection with the target through existing connection
with the proxy.
An Anonymizer
• Blank
• Words like “passcode” ,”password”, “admin”
• Series of letters “QWERTY”
• User’ s name or login name
• Name of the user’s friend/relative/pet
• User’s birth place, DOB
• Vehicle number, office number ..
• Name of celebrity
• Simple modification of one of the precedings, suffixing 1 …
Categories of password cracking attacks:
• Online attacks
• Offline attacks
• Non-electronic attacks
• Social engineering
• Shoulder surfing
• Dumpster diving
Online attacks
• Are performed from a location other than the target where these
passwords reside or are used
• Require physical access to the computer and copying the password
Types of Password Attacks
• Password Guessing
• Attackers can guess passwords locally or remotely using either a manual or
automated approach
• Dictionary attacks
• work on the assumption that most passwords consist of whole words, dates,
or numbers taken from a dictionary.
• Hybrid password
• assume that network administrators push users to make their passwords at
least slightly different from a word that appears in a dictionary.
Weak passwords
• Contain both upper and lower case characters (e.g., a-z, A-Z)
• Have digits and punctuation characters as well as letters e.g., 0-9, @#$
%^&*()_+|~-=\`{}[]:";'<>?,./)
• Are at least eight alphanumeric characters long.
• Are not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc.
• Passwords should never be written down or stored on-line.
• Try to create passwords that can be easily remembered.
• One way to do this is create a password based on a song title, affirmation,
or other phrase.
• For example, the phrase might be: "This May Be One Way To Remember"
• and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other
variation.
Random passwords
• To check the strength of your passwords and know whether they're inside the
popular rainbow tables, you can convert your passwords to MD5 hashes on
this MD5 hash generator, then decrypt your passwords by submitting these
hashes to an online MD5 decryption service. For instance, your password is
"0123456789A", using the brute-force method, it may take a computer almost
one year to crack your password, but if you decrypt it by submitting its MD5
hash( C8E7279CD035B23BB9C0F1F954DFF5B3 ) to a MD5 decryption website,
how long will it take to crack it? You can perform the test yourself.
• 12. It's recommended to change your passwords every 10 weeks.
• 13. It's recommended that you remember a few master passwords, store other
passwords in a plain text file and encrypt this file with 7-Zip, GPG or a disk
encryption software such as BitLocker, or manage your passwords with a
password management software.
• 14. Encrypt and backup your passwords to different locations, then if you lost
access to your computer or account, you can retrieve your passwords back
quickly.
Random passwords
• The internet
• A stand alone PC
• Local networks
Difference between virus and worm
Types of viruses
• A program virus becomes active when the program file (usually with
extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened.
• Once active, the virus will make copies of itself and will infect other
programs on the computer.
Multipartite viruses
• ActiveX and Java were created for web page designers to incorporate
a wide array of impressive effects on web pages, giving movement
and added dimension to the previously "flat" web pages.
• To operate properly, these ActiveX controls and Java applets need to
gain access to your hard disk. Insufficient memory and bandwidth
problems necessitate this approach. Although this desktop access
provides a wealth of beneficial applications of these controls and
applets, malicious code developers have the same access. They are
now using it to read and delete or corrupt files, access RAM, and
even access files on computers attached via a LAN.
6. Trojan horses and Backdoors
Allows an attacker to
• create, delete, rename, copy or edit any file
• Execute commands to change system settings
• Alter the windows registry
• Run, control and terminate applications
• Install arbitrary software and parasites
• Control computer hardware devices,
• Shutdown or restart computer
Functions of backdoors
• Bandwidth attacks
• Logic attacks
• Protocol attacks
• Unintentional DoS attack
Bandwidth attacks
• Flood attack
• Ping of death attack
• SYN attack
• Teardrop attack
• Smurf attack
• nuke
Flood attack
• Flooding is a Denial of Service (DoS) attack that is designed to
bring a network or service down by flooding it with large amounts
of traffic.
• Flood attacks occur when a network or service becomes so
weighed down with packets initiating incomplete connection
requests that it can no longer process genuine connection
requests.
• By flooding a server or host with connections that cannot be
completed, the flood attack eventually fills the hosts memory
buffer. Once this buffer is full no further connections can be
made, and the result is a Denial of Service.
ping of death attack
• http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4
…..
http://www.victimsite.com/index.php?id=2 order by 8(error)
so now x=8 , The number of column is x-1 i.e, 7.
• Step 4: Displaying the Vulnerable columns:
• Using “union select columns_sequence” we can find the vulnerable part
of the table. Replace the “order by n” with this statement.
• And change the id value to negative
• Replace the columns_sequence with the no from 1 to x-1(number of
columns) separated with commas(,).
• For eg:
if the number of columns is 7 ,then the query is as follow:
• Input validation
• Replace all single quotes to two single quotes
• Sanitize the input: clean characters like ;, --, select, etc
• Numeric values should be checked while accepting a query string value
• Keep all text boxes and form fields short
• Modify error reports
• SQL errors should not be displayed to the outside world
• Other preventions
• Never use default system accounts for SQL server 2000
• Isolate database server and webserver: different machines
• Extended stored procedures, user defined functions should be moved to an
isolated server.
10. Buffer overflow