Point Snooping Sniffing
Unauthorized access to someone’s private data
Unauthorized interception and monitoring of
Meaning by spying/peeking into files, emails, or stored
network packets (data in transit).
information.
Accessing stored files, emails, or confidential Using packet sniffers/software to capture live
Method
info without permission. network traffic.
To steal confidential documents, personal info, To steal login credentials, bank details, session
Goal
or messages. cookies, etc.
Reading another person’s email without Capturing passwords from users on an
Example
consent. unsecured Wi-Fi.
Section 66 (computer-related offences) and Section 66C (identity theft), Section 66D
IT Act
Section 72 (breach of confidentiality & (cheating by impersonation), and Section 69
Provisions
privacy). (illegal interception).
Up to 3 years imprisonment or fine up to ₹5 Up to 3 years imprisonment and/or fine up to
Punishment
lakh, or both. ₹5 lakh.
--------------------------------------------------------------------------------------------------------------------------------------
What is a Botnet?
A botnet is a collection of internet-connected devices (computers, smartphones, IoT devices, servers)
that are infected with malware and controlled remotely by a hacker.
Each compromised device becomes a “bot” (or zombie), and together they act like an army of
machines under the attacker’s control.
Botnets are often used for Distributed Denial of Service (DDoS) attacks, spam campaigns, data
theft, phishing, and password cracking.
Steps in a Botnet Attack
1. Infection – Devices get infected through phishing emails, malicious downloads, or vulnerabilities.
2. Command & Control (C&C) – Infected devices connect to attacker’s central server.
3. Activation – Attacker sends commands to bots.
4. Attack Execution – Bots launch DDoS, spread malware, steal data, or send spam.
1. Infection
The first step is to infect devices and convert them into bots.
Hackers spread malware using methods such as:
o Phishing Emails → malicious attachments or links.
o Malicious Website Downloads → drive-by downloads without user knowledge.
o Exploiting Software Vulnerabilities → outdated OS or applications.
o Removable Media (USBs, external drives) carrying malware.
Once infected, the device unknowingly becomes part of the botnet.
2. Command and Control (C&C) Server
After infection, the compromised device connects to the attacker’s Command & Control server
(C&C).
This server works as the central hub of the botnet.
Through this hub, attackers can:
o Send instructions to infected devices.
o Update or install new malware.
o Monitor botnet size and activity.
Communication may use HTTP, IRC (Internet Relay Chat), or Peer-to-Peer (P2P) protocols.
3. Attack Activation
Once a large number of devices are infected, the attacker decides when and how to activate them.
The bots wait silently until they receive a command from the C&C server.
At this stage, attackers can coordinate mass actions across thousands or millions of devices
simultaneously.
4. The Attack Execution: Depending on the attacker’s goal, the botnet can perform several malicious tasks:
Distributed Denial of Service (DDoS) Attacks: Flooding a website/server with excessive traffic to
make it crash or go offline.
Spam Email Campaigns Sending millions of spam or phishing emails for scams, fake advertisements,
or spreading more malware.
Data Theft: Stealing sensitive information such as banking details, login credentials, or personal data
from infected devices.
Password Cracking: Using combined processing power of all bots to guess/bruteforce passwords of
accounts or systems.
Click Fraud: Forcing infected devices to click on ads to generate fake revenue.
Cryptojacking: Using bots’ computing power to secretly mine cryptocurrency.
Targets of Botnets
Personal Computers & Servers (for malware hosting, spam, DDoS).
Mobile Devices (via malicious apps and phishing).
IoT Devices (routers, smart home devices – weak passwords make them easy targets).
Network Equipment (switches, routers for redirecting traffic).
Preventive Measures
Use strong, unique passwords.
Keep OS and software updated.
Avoid suspicious links/attachments.
Install reliable antivirus/antimalware.
Change default admin settings on IoT devices.
IT Act, 2000 Provisions Related to Botnets
Section 43 – Unauthorized access, introducing virus/malware into a system.
Section 66 – Computer-related offences (dishonest/fraudulent use of computer resources).
Section 66C – Identity theft (using stolen credentials).
Section 66D – Cheating by impersonation using computer resources.
Section 66F – Cyber terrorism (if botnet is used to threaten national security).
Punishment: Up to 3 years imprisonment and/or fine up to ₹5 lakh, depending on severity.
--------------------------------------------------------------------------------------------------------------------------------------
Scareware: Scareware is a type of malware that tricks and frightens users into taking harmful actions, such
as downloading fake antivirus software or paying for unnecessary fixes.
Method: It usually spreads through spam emails, pop-up ads, or fake system alerts.
Target: Mostly affects less tech-savvy or older users, who may panic and follow the instructions.
Impact: Leads to data theft, financial loss, or further malware infection.
IT Act, 2000 Provisions
Section 66 – Computer-related offences (fraudulent use of computer resources).
Section 66D – Cheating by impersonation using computer resources (fake antivirus scams).
Punishment: Up to 3 years imprisonment and/or fine up to ₹5 lakh.
--------------------------------------------------------------------------------------------------------------------------------------
Social Engineering
Meaning: Social engineering is a psychological manipulation tactic where attackers trick individuals
into revealing confidential information, granting access, or performing harmful actions.
Key Idea: Instead of exploiting technical flaws, it exploits human psychology (trust, fear, curiosity).
Examples: Phishing → fake emails to steal credentials.
Pretexting → creating false scenarios to gain information.
Baiting → offering something desirable (e.g., free USB, downloads) to lure victims.
Goal: To gain unauthorized access, sensitive data, or disrupt systems by exploiting human nature.
Steps in Social Engineering Attack
1. Investigation
In this stage, the attacker carefully studies the target.
They gather information such as job role, habits, contact details, and vulnerabilities.
Sources include LinkedIn, social media platforms, company websites, or recent news/updates.
Example: An attacker researches employees of a company to identify key personnel and their
responsibilities, making it easier to design a convincing attack.
2. Hook
Here, the attacker engages the victim by creating a believable story or scenario.
The goal is to gain the victim’s trust and attention, often by using authority, urgency, or fear.
Example: The attacker might pretend to be from the company’s IT department, asking the victim to
“verify credentials” to fix a fake issue.
3. Play
In this stage, the attacker executes the main attack after securing trust.
They may extract sensitive information, install malware, siphon data, or even disrupt business
operations.
This can take place over a period of time, gradually deepening control and increasing damage.
Example: The victim unknowingly shares confidential documents or provides system access, thinking it
is legitimate.
4. Exit
The final step ensures the attacker leaves without raising suspicion.
They may close the conversation politely, remove malware, delete logs, or cover digital footprints.
A successful exit allows the attacker to remain hidden while continuing to exploit the stolen data later.
Types of Social Engineering Attacks
1. Baiting
o Attacker lures the victim by offering something attractive (e.g., free software, infected USB
drive).
o Once the victim downloads/uses it, malware gets installed.
o IT Act: Section 66 (computer-related offences).
2. Catfishing
o Creating a fake online identity to trick someone into sharing personal details or money.
o Common in social media and dating scams.
o IT Act: Section 66D (cheating by impersonation).
3. Pretexting
o Attacker builds a false story/scenario to obtain confidential info.
o Example: Pretending to be bank staff asking for “verification.”
o IT Act: Section 66C (identity theft) & 66D.
4. Phishing, Vishing, Spear Phishing
o Phishing: Fake emails/links to steal data.
o Vishing: Phone calls pretending to be authority.
o Spear Phishing: Targeted phishing at specific individuals.
o IT Act: Section 66C (identity theft), 66D.
5. Scareware
o Frightening users with fake warnings (e.g., “Your PC is infected!”) to force
downloads/payments.
o IT Act: Section 66, Section 66D.
6. Tailgating / Piggybacking
o Gaining physical access by following an authorized person into a restricted area.
o Example: An attacker enters an office building by closely following an employee.
o IT Act: Section 43 (unauthorized access).
7. Water-Holing
o Attacker infects websites frequently visited by the target group.
o Victims unknowingly download malware from a compromised trusted site.
o IT Act: Section 66 (introducing malware).
8. Quid Pro Quo
o “Something for something” → attacker offers a fake benefit in exchange for info.
o Example: Pretending to be IT support, offering free help in return for login details.
o IT Act: Section 66D (cheating by impersonation).
--------------------------------------------------------------------------------------------------------------------------------------
Spear Phishing Attack: Spear phishing is a targeted form of phishing where attackers use personalized and
convincing messages to trick specific individuals into revealing sensitive information.
Unlike normal phishing (mass emails), spear phishing involves research and customization, making it
harder to detect.
Steps in Spear Phishing Attack
1. Research: Attacker gathers personal/professional info from social media, company websites, etc.
2. Crafting Message: A realistic & personalized email/message is created, pretending to be from trusted
source.
3. Delivery: Victim receives the email/message containing malicious links or attachments.
4. Exploitation: If the victim clicks or opens it, attacker gains login credentials, financial data, or system
access.
IT Act, 2000 Provisions
Section 66C → Identity theft (stealing login IDs, passwords).
Section 66D → Cheating by impersonation using computer resources.
Penalty: Up to 3 years imprisonment and/or fine up to ₹1 lakh – ₹5 lakh.
1. Phishing
Meaning: Phishing is a cyber-attack where attackers trick users into revealing sensitive information
(like passwords, credit card numbers, or banking details) by sending fake emails, messages, or websites
that appear legitimate.
Example: An email pretending to be from a bank asking the user to "verify account details."
IT Act, 2000:
o Section 66D – Cheating by impersonation using computer resources.
o Penalty: Up to 3 years imprisonment and fine up to ₹1 lakh – ₹5 lakh.
2. Identity Theft
Meaning: Identity theft is when an attacker steals and misuses another person’s personal data (like
name, Aadhaar, PAN, credit card details, login credentials) without permission to commit fraud or other
crimes.
Example: Using someone else’s debit card info to make unauthorized purchases.
IT Act, 2000:
o Section 66C – Identity theft (using stolen passwords, digital signatures, electronic IDs).
o Penalty: Up to 3 years imprisonment and fine up to ₹1 lakh.
Point Backdoor Attack Trapdoor Attack
A secret way (hidden entry point) created by A hidden vulnerability or code (trapdoor) left
Meaning attackers or even developers to bypass normal intentionally in a program that allows
authentication and gain unauthorized access. attackers to exploit the system later.
Usually created to gain remote control over a Created to exploit a specific condition in
Purpose
system without the user knowing. software (a secret password, special input).
Often installed using malware or inserted during Inserted during coding by a programmer
Creation
software development. (intentionally or accidentally).
User Users are completely unaware, as it bypasses Hard to detect since it looks like part of the
Awareness security checks. normal program code.
Point Backdoor Attack Trapdoor Attack
Hacker installs a backdoor Trojan to control your A program runs only when the attacker enters
Example
PC. a secret key/command.
Covered under Section 66 (Computer-related Covered under Section 65 (Tampering with
IT Act, 2000
offences) & 66F (Cyber Terrorism) if misused. source code) & 66 (Unauthorized access).
Vote of Thanks
On behalf of Watumull Institute of Engineering & Technology, we extend our heartfelt
gratitude to our distinguished speakers, Prof. Amit Singh and Mr. Vivek Vishwakarma, for
sharing their invaluable insights and inspiring us with their entrepreneurial journey.
We are deeply grateful to our respected Principal, Prof. Avinash Gondal, whose vision and
encouragement have been the guiding force behind this initiative.
A special appreciation goes to our E-Cell President, and IIC President,
for their relentless efforts and dedication in making this celebration a resounding success.
Last but not the least, we thank our faculty, organizing committee, and all the enthusiastic
participants for their active involvement. Your support has truly ignited the spirit of
entrepreneurship at WIET.
Together, let us continue to foster innovation, creativity, and leadership.
Special thanks to Prof. and the organizing team for their tireless efforts in
making this event a grand success.
We would also like to acknowledge Prof. for their valuable contributions.