Modified Final Unit-2
Modified Final Unit-2
RV College world
of
Engineering
22EM106-Introduction to Cyber Security
UNIT- II
Chapter-2:Cyber Offenses How Criminals Plan Them
Text Book:
Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit Belapure and Nina
Godbole, Wiley India Pvt. Ltd, 1st Edition 2011,Reprint 2022, ISBN:978-81-265-2179-1 .
Hackers:
• Person with strong interest in computers and enjoys learning and
experimenting
• Very talented and smart people
Crackers:
• Person who breaks into computer
• Crimes include vandalisms, theft and snooping in unauthorized areas
RV College of
Engineering
Go, change the
world
• 1. Hacker:
• A hacker is a person who is generally skilled in computer programming and
technology. Hackers can be of two types:
• White Hat Hackers: These are ethical hackers who use their skills to identify and fix
security vulnerabilities. They work to improve cybersecurity and protect systems.
• Black Hat Hackers: These are malicious hackers who use their skills for illegal or
unethical purposes, such as gaining unauthorized access to computer systems, stealing
data, or causing harm.
• The term "hacker" is often used broadly and can refer to anyone with advanced
computer skills, but it's essential to distinguish between those who use their skills for
good and those who engage in cybercrime.
• Brute force hacking: It is a technique used to find password or encryption keys by
trying every possible combinations of letters, numbers etc until code is broken.
RV College of
Engineering
Go, change the
world
2. Cracker:
• A cracker is a subset of hackers, specifically referring to
individuals who engage in unauthorized activities, often with
malicious intent. Crackers are primarily focused on breaking
into computer systems, networks, and software for illegal
purposes, such as software piracy, data theft, or disrupting
services.
• While the term "cracker" is less commonly used today, it
historically referred to those who "crack" software to remove
copy protection or license restrictions, allowing it to be used
without authorization.
RV College of
Engineering
Go, change the
world
• 3. Phreaker:
• Phreakers are individuals who manipulate or exploit the
telecommunication infrastructure, such as phone systems, to make
free or unauthorized calls. This practice, known as "phone phreaking,"
was more common in the past when phone networks were less secure.
• Phreakers were known for using various techniques to access free long-
distance calls, explore the phone network's inner workings, and
sometimes engage in pranks or illegal activities related to
telecommunications.
⮚ 4. War Dialers: Often called as ‘Demon dialers’ automatically dial phone numbers of
same area code to look for unprotected modems.
⮚ A single wardialing call would involve calling an unknown number, and
waiting for one or two rings, since answering computers usually pick up
on the first ring. If the phone rings twice, the modem hangs up and
tries the next number. If a modem or fax machine answers, the
RV College of
Engineering
Go, change the
world
⮚ Patriotic hacking is a term for computer hacking or system
cracking in which citizens or supporters of a country,
traditionally industrialized Western countries but increasingly
developing countries, attempt to perpetrate attacks on, or
block attacks by, perceived enemies of the state.
⮚ It has been deemed illegal and reserved only for government
agencies like CIA,NSA,FBI etc
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
⮚ How cybercriminals plan attacks is a basic question that every cybersecurity
expert needs to know. Cybercriminals use various tools and techniques to
identify the vulnerabilities of their target victims. The target can either be an
individual or an organization. Most cyber-attacks aim at stealing valuable
information or breaching systems. Criminals plan active and passive attacks.
⮚ Active attacks actively aim to alter the targeted system. On the other hand,
passive attacks only attempt to acquire as much information as possible about
their target.
⮚ Active attacks may affect the integrity, authenticity, and availability of data,
whereas passive attacks lead to breaches of privacy.
RV College of
Engineering
Go, change the
world
⮚ Cyber-attacks can also be classified as either outside attacks or inside attacks.
An attack originating or executed from within the security perimeter of an
organization is called an inside attack. In most cases, inside attacks are
engineered and performed by employees who have access to the organization’s
credentials and knowledge of the organization’s security infrastructure.
⮚ Criminal communities operate as a unit, where they share strategies and tools
to launch coordinated attacks, either from the same place or from different
remote locations. The “business” has advanced over the past few years with
the emergence of underworld cyber-markets, where you can conveniently
purchase and sell stolen credentials and other information of significance.
RV College of
Engineering
Go, change the
world
⮚ The internet makes it very difficult to track down cybercriminals. It allows
cybercriminals to collaborate anonymously(Dark Web(hidden part of
internet), Tor(The Onion Router) tool, Cryptocurrencies,
Virtual Private Networks (VPNs), Hacker Forums and
Marketplaces). Attacks can be launched and controlled from any
location across the globe. Hackers often use computers that have already been
hacked, and any form of identity is removed.
⮚ This makes it extremely difficult to identify the attacker, tool, or gadget used
to execute the attack. Crime laws vary from country to country, making the
situation very complicated when an attack is launched from a different
country.
RV College of
Engineering Types of Cyber Crime Go, change the
world
a. Cyber-crime targeting an individual
⮚ In this type of attack, criminals exploit human weaknesses such as innocence,
ignorance, and avidity(eager). Attacks targeting an individual include copyright
violation, sale of stolen or non-existent properties, financial fraud, harassment,
etc. The latest technological advancements and developments of new
innovative attacking tools allow cyber criminals to expand the group of
potential victims.
⮚ 79% of security professionals think that the biggest threat to endpoint security
is the negligence among the employees for security practices. We are all human,
and we all make mistakes. However, many people are scheming day and night
to take advantage of a single silly mistake. This mistake can cost you
tremendous financial loss.
RV College of
Engineering
Go, change the
world
b. Cybercrime against an organization
⮚ Cyber-attacks against an organization are also referred to as cyber terrorism.
Hackers rely on computers and the internet to perform cyber terrorism, steal
confidential information or destroy valuable files, take total control of the
network system, or damage programs. An example is a cyber-attack on
financial institutions such as banks.
RV College of
Engineering
Go, change the
world
c. Cybercrimes target valuable assets
⮚ This kind of crime involves stealing property such as laptops, pen drives,
DVDs, mobile devices, CDs, iPad, etc. In some cases, an attacker may infect the
devices with a malicious program such as malware or Trojan to disrupt the
functionality. One of the virus used to steal information from target victims is
known as a Shortcut virus. The Shortcut virus is a form of a virus that converts
your valid files into a form that cannot be accessed on your PC’s hard drive or
Flash drive. The shortcut does not delete the actual file but instead hides it
behind the shortcut files.
RV College of
Engineering
Go, change the
world
d. Attacks using a single event
⮚ From the victim’s point of view, this attack is performed with a single action.
For example, an individual mistakenly opens an email containing corrupted
files, which may either be malware or a link that redirects you to a corrupted
website. An attacker then uses the malware as a backdoor to access your
system and take over the control of the entire system if need be. This type of
attack can also be used to cause organization-wide havoc, and it all starts with
a single click by an “ignorant” employee.
RV College of
Engineering
Go, change the
world
e. Cyber-attacks considering a chain of events
⮚ In some situations, hackers perform a series of events to track a victim and
interact with them personally. For example, an attacker may make a phone
call or chat room to establish a connection with the victim and afterward steal
or explore valuable data by breaching the relationship between the two
parties. Nowadays, this type of attack is prevalent. Therefore, you should be
extremely cautious before accepting a friend request on Facebook or joining a
WhatsApp group using links from unknown sources or WhatsApp groups.
RV College of
Engineering How Cybercriminals Plan Attacks Go, change the
world
⮚ Below are the 5 phases involved in planning a cyber-attack.
1. Reconnaissance – footprint(initial phase) this is the information-gathering
stage and is usually considered a passive attack.
2. Passive attack
3. Active attack
4. Scanning and scrutinization of the collected data for validation and accurate
identification of existing vulnerabilities.
5. Launching the attack – entails gaining and maintaining access to the
system.
RV College of
Engineering
Go, change the
world
1. Reconnaissance
⮚ The first step in how cybercriminals plan attacks is always Reconnaissance. The literal
meaning of reconnaissance is an act of exploring with an aim or goal of finding
someone or something about the target. Concerning cybersecurity, it’s an exploration to
gain information about an enemy or a potential enemy. In cybersecurity, reconnaissance
begins with “Footprinting”, the initial preparation towards the preattack phase, and
entails collecting data about the target’s computer infrastructure as well as their cyber-
environment.
⮚ Footprinting gives an overview of the victim’s weak points and suggestions on how they
can be exploited. The primary objective of this phase is to provide the attacker with an
understanding of the victim’s system infrastructure, the networking ports and services,
and any other aspect of security required for launching attacks.
⮚ Thus, an attacker attempts to source data from two different phases: passive and active
attacks.
RV College of
Engineering
Go, change the
world
2. Passive attacks
This is the second phase of the attack plan. In this phase, an attacker secretly gathers information about their target; the aim is to
acquire the relevant data without the victim noticing. The process can be as simple as watching an organization to see when their CEO
reports to work or spying on a specific department to see when they down their tools. Because most hackers prefer executing their duties
remotely, most passive attacks are conducted over the internet by googling. For example, one may use search engines such as dogpile to
search for information about an individual or organization.
1. Yahoo or Google search: malicious individuals can use these search engines to gather information about employees of the firm they
are targeting to breach their system.
2. Surfing online communities like Twitter, Facebook, Instagram can also prove useful sources to gather information about an
individual, their lifestyle, and probably a hint to their weakness that can then be exploited.
3. The organization’s website may also provide useful information about specific or key individuals within the organization, such as the
CEO, MD, head of the IT department, etc. The website can be used to source personal details such as email addresses, phone numbers,
roles, etc. With the details, an attacker can then launch a social engineering attack to breach their target.
4. Press releases, blogs, newsgroups, and so on, are in some cases, used as the primary channels to gather information about an entity or
employees.
5. Going through job requirements for a specific position within a company can also help an attacker identify the type of technology
being used by a company and the level of competency of their workforce. An attacker can then decide on what method to use when
breaching the targeted system from the data.
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
3. Active Attacks
⮚ An active attack involves closely examining the network to discover
individual hosts and verify the validity of the gathered information, such as
the type of operating system in use, IP address of the given gadget, and
available services on the network, collected during the passive attack. It
involves the risk of detection and can also be referred to as “Active
reconnaissance” or “Rattling the doorknobs”
⮚ Active reconnaissance can be used to confirm the security measures put in
place by an attacker, but at the same time, it can alert the victim if not well
executed. The process may raise suspicion or increase the attacker’s chance
of being caught before they execute the full attack.
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
4. Scrutinizing and Scanning the Gathered Information
⮚ Scanning is a key step to intelligently examine as you collect information about the network
infrastructure. The process has the following objectives;
1. Network scanning is executed to understand better the IP address and other related information
about the computer network system.
2. Port Scanning – to identify any closed or open ports and services
3. Vulnerability scanning – to identify existing weak links within the system.
⮚ In the hacking world, the scrutinizing phase is also referred to as enumeration. The objective of
scrutinizing includes:
1. To validate the authenticity of the user running the given account, be it an individual or a group of
persons.
2. To identify network resources and or shared resources
3. To verify the operating system and various applications that are running on the computer OS.
RV College of
Engineering
Go, change the
world
5. Attack
⮚ The attack phase is the last step in the attack process. It involves the hacker
gaining and maintaining full control of the system access. It comes
immediately after scanning and enumeration, and it launches sequentially as
listed in the below steps.
1. Brute force attack or any other relevant method to bypass the password.
2. Exploit the password.
3. Launch the malicious command or applications.
4. hide the files.
5. Cover the tracks, don’t leave any trail that can lead back to you as the
malicious third party. This can be achieved by deleting logs so that there is
no trail for your illicit actions.
RV College of
Engineering
Go, change the
world
• It involves probing the network to discover individual hosts to confirm the information gathered in
• Risk of detection and is also called rattling the doorknobs or active reconnaissance
• Due to active attack system is always damaged and System resources can be changed.
• The most important thing is that, In active attack, Victim gets informed about the attack.
RV College of
Engineering
Go, change the
world
RV College of
Engineering Tools used during active attack Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Difference between Active attack and Passive attack Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering Categories of cybercrime Go, change the
world
• Human weakness
• Financial frauds
• Child pornography
• Copy right violations
• Harassment
RV College of
Engineering 2. Crimes targeted at property Go, change the
world
• Stealing devices
• Transmitting harmful programs to destroy the devices
RV College of
Engineering 3. Crimes targeted at organizations Go, change the
world
• Cyberterrorism
• Attackers (individual / group)
• Usage of computer tools and usage
RV College of
Engineering 4. Single event of cybercrime Go, change the
world
• Criminals use many methods and tools to locate the vulnerabilities of their target
• Target can be individual or / and organizations
• Active attack and passive attack
• Inside attack and outside attack
• Fake E-mails
• E-mail attachments
• Pop-up windows
RV College of
Engineering
Go, change the
world
Fake E-mails:
RV College of
Engineering
Go, change the
world
https://www.getastra.com/blog/security-audit/cyber-security-statistics/#:~:text=Social%20engineering%20statistics%202023,-75%25%20of%20security&text=2%
2C249%20social%20engineering%20incidents%20were%20reported
.
https://firewalltimes.com/social-engineering-statistics/
RV College of
Engineering Cyberstalking Go, change the
world
• Cyberstalkers take advantage of the anonymity afforded by the internet to stalk or harass
their victims, sometimes without being caught, punished or even detected. The terms
cyberstalking and cyberbullying are often used interchangeably.
• Trying to approach some-body or something.
• Refers to use of internet / ICT/ electronic communications devices to stalk another person
• Individual or group of individual to harass another individual, group of individual or
organization.
• Behaviour includes false accusation, monitoring, transmission of threats, ID theft, damage to data
or equipment, and gathering information for harassment purposes.
RV College of
Engineering Types of Cyber stalkers Go, change the
world
RV College of
Engineering Cases reported on cyber stalking Go, change the
world
RV College of
Engineering
Go, change the
world
https://www.mondaq.com/india/social-media/1193320/cyberstalking-and-the-indian
jurisprudence#:~:text=More%20than%2075%25%20of%20the,354D%20which%20deals%20with%20stalking.
RV College of
Engineering How stalking works Go, change the
world
RV College of
Engineering
Go, change the
world
RV College of
Engineering Real life incident of cyberstalking Go, change the
world
RV College of
Engineering Cybercafe and cybercrimes Go, change the
world
• A cybercafe is a business which allows people to pay for access to the Internet. Another name
for a cybercafe is an Internet cafe. Such places often look just like cafes or coffee shops, with the
addition of computer terminals.
• Bot- computing
• A botnet (short for “robot network”) is a network of computers infected by malware
that are under the control of a single attacking party, known as the “bot-herder.”
• Each individual machine under the control of the bot-herder is known as a bot.
Thank you
RV College of
Engineering
Go, change the
world
RV College of
Engineering
Go, change the
world