0% found this document useful (0 votes)
6 views25 pages

Module 2 Cyb Sec Updated20012023

The document outlines the distinctions between hackers and crackers, highlighting that hackers operate with good intentions to protect systems, while crackers exploit vulnerabilities for malicious purposes. It details various cybercrime categories, attack planning methods, reconnaissance techniques, and social engineering tactics used by cybercriminals. Additionally, it discusses tools and techniques employed in active and passive attacks to gather information and exploit system vulnerabilities.

Uploaded by

yuvarajravi456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views25 pages

Module 2 Cyb Sec Updated20012023

The document outlines the distinctions between hackers and crackers, highlighting that hackers operate with good intentions to protect systems, while crackers exploit vulnerabilities for malicious purposes. It details various cybercrime categories, attack planning methods, reconnaissance techniques, and social engineering tactics used by cybercriminals. Additionally, it discusses tools and techniques employed in active and passive attacks to gather information and exploit system vulnerabilities.

Uploaded by

yuvarajravi456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Parameters Hackers Crackers

Hackers are good people who hack Crackers are people who hack a system by breaking
devices and systems with good intentions. into it and violating it with some bad intentions. They

Definition They might hack a system for a may hack a system remotely for stealing the contained data
specified purpose or for obtaining more or for harming it permanently.
knowledge out of it.

They have advanced knowledge of These people may be skilled. But most of the time, they

Skills and
programming languages and computer don’t even need extensive skills. Some crackers only

Knowledge OS. Hackers are very skilled and intelligent have a knowledge of a few illegal tricks that help them
people. in stealing data.

Hackers work with specific organizations Crackers harm an organization. These are the people
Role in an
to help them in protecting their from whom hackers defend sensitive data and protect the
Organization
information and important data. organizations as a whole.

These are ethical types of professionals. These are illegal and unethical types of people who
Ethics
only focus on benefiting themselves with their hacking.
Hacking
Cracking Phreakers are people who specialize in attacks on
Cracker Tools the telephone system.
Phreaking
Phreaking attack on Communication system
War dialler

War dialing is a technique to automatically scan a list of telephone numbers, usually dialing every

number in a local area code to search for modems, computers, bulletin board systems and fax

machines
Cracker Tools

Working of Password Cracking apps


These applications make use of different
methods for recovering passwords. Common
techniques used include Dictionary Attack,
Brute Force Attack, Rainbow Table Attack,
Cryptanalysis, and simply guessing the
password
Categories of Vulnerabilities : Hackers Search for

Categories of Vulnerabilities that


Hackers typically search for :
Inadequate Border Protection
Remote Access Servers with
weak Access Controls
Application Servers with well
known exploits
Misconfigured systems and
systems with default
configurations.
Categories of Cyber Crimes
Cyber Crimes are categories based on :
 Target of the Crime
 Crimes Targeted at Individuals
 Crimes Targeted at Property
 Crimes Targeted at Organizations
 Occurrence of Crime as single event or as a series of events.
 Single Event of Cyber Crime
 Series of Events
Attack Planning by Criminals
Cyber Criminals use methods and Tools to identify the Vulnerabilities in the Target.
They Plan the attack in two ways :
 Active Attack
 Usually used to alter the System and its resources.
 Affects the availability, integrity and authenticity of the data.
 Passive Attack
 Usually used to gain information about the Target.
 Breach of confidentiality.
Phases involved in planning of Cyber Crimes :

 Reconnaissance (Information Gathering ) which is treated as a passive Attack

 Scanning and Scrutinizing gathered information for validity and identifying the existing vulnerabilities.

 Launching an Attack (Gaining and maintaining the system Access)


Reconnaissance
Reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather
information about vulnerabilities.

Attacker tries to gather information in two phases


Passive Attack phase
 Usually used to gain information about the Target.
 Breach of confidentiality.

Active Attack phase


 Usually used to alter the System and its resources.
 Affects the availability, integrity and authenticity of the data.
Reconnaissance : Passive Attacks
 Passive Attack phase is usually used to gain information about the Target without the knowledge of user which
leads to breach of confidentiality.
 Ex : Watching a building to know activities of its occupants
Searching Google for knowing more details about the target.
Reconnaissance : Active Attacks
 Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to
gather information about vulnerabilities.
 This type of recon requires that attacker interact with the target.
 This recon is faster and more accurate, however it also makes much more noise.
 This type of reconnaissance provides the attacker about the confirmation about the securoty measures in place at
the target.
 Since the attacker have to interact with the target to gain information, there’s an increased chance that the recon
will get caught by a firewall or one of the network security devices. (Intrusion Detection Systems, network
firewalls, etc.)
 Ex : This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat
etc.
Reconnaissance : Ports
Reconnaissance : Ports
Reconnaissance : Active Attacks Tools
Active recon activity can be performed by using three major types of tools:
 Port Scanning Tools: Identify open ports
 Web Service Review Tools: Identify web-based vulnerabilities
 Network Vulnerability Scanning Tools: Identify infrastructure-related security issues
Network Vulnerability Scanning
Port Scanning Tools Web Service Review Tools
Tools
NMap Nikto OpenVAS
udp-proto-scanner Netsparker Nessus
Masscan SQLMap Nexpose
Burpsuite Qualys
HCL AppScan Amass
wpscan
Eyewitness
WebInspect
ZAP
Scanning and Scrutinizing Gathered Information
 Scanning is a key step to examine intelligently while gathering information about the target.
 Objectives of Scanning
 Port Scanning : Identify Open / Close Ports
 Network Scanning : Understand IP Address and related information about the Networked Systems.
 Vulnerability Scanning : Understand existing Weaknesses in the system.

 Scrutinizing phase is also referred as “Enumeration” phase.


 Objectives of Scrutinizing is to identify :
 Valid User accounts / groups
 Network and / or shared Resources.
 Operating System and applications that can be run ion the OS.
Attack ( Gaining and Maintaining System Access)
 After Scanning and Scrutinizing, attack is launched through following steps :
 Crack the Password
 Exploit the Privileges.
 Execute Malicious commands / Applications
 Hide the files
 Cover the tracks – Delete the call logs, so that the trails of illicit activities are eliminated.
Social Engineering
 Social engineering is the “technique to influence” and “persuasion to deceive” people to obtain the information or perform
some action.
 Social engineers exploit the natural tendency of a person to trust social engineers’ word, rather than exploiting computer
security holes.
 It is generally agreed that people are the weak link in security and this principle makes social engineering possible.
 A social engineer usually uses telecommunication (i.e., telephone and/or cell phone) or Internet to get them to do
something that is against the security practices and/or policies of the organization.
 Social engineering involves gaining sensitive information or unauthorized access privileges by building inappropriate trust
relationships with insiders.
 It is an art of exploiting the trust of people, which is not doubted while speaking in a normal manner.
 The goal of a social engineer is to fool someone into providing valuable information or access to that information.
 Social engineer studies the human behavior so that people will help because of the desire to be helpful, the attitude to trust
people, and the fear of getting into trouble.
 The sign of truly successful social engineers is that they receive information without any suspicion.
Classification of Social Engineering
Human Based Computer Based
Impersonating an Employee
or Valid User Fake Emails

Posing as an important User

Using a Third Person Email Attachments


Calling Technical Support

Shoulder Surfing
Pop Up Windows

Dumpster Diving

You might also like