Introduction To Cyber Security Unit 2
Introduction To Cyber Security Unit 2
1) Reconnainance:
Passive attack
o It can be as simple as watching a building to identify what time employees enter the building
premises.
o However it is usually done with internet searches or by googling about Individual or company to
gain information.
o Organisation website may provide a personal directory or information about key employees.
o Going through the job postings in particular job profiles for technical persons can provide
Information about type of technology.
o Google earth is a virtual globe it maps the earth by the super imposing images obtained from
satellite imagery and provides aerial photography of a particular location.
o People search - provides personal information (DOB, residential address, contact number, etc).
o WHO IS - this is a domain name registration lookup tool to find a website. This utility is used for
communicating servers who is located around the world to obtain domain name registration.
o NS lookup - the tool is used in windows and linux to query DNS details.
Active attack
o Arpbound - it listens to the traffic on the ethernet network Interface. It reports MAC address pairs
as well as events such as IP conflicts, IP changes, various ARP protocol spoofing & packets not using
the expected gateways.
о Arping - it is a network tool that broadcasts ARP packets & receives replies similar to ping.
o Bing - it is used for band width ping, it is a point - to - point band width width measurement tool
based on ping.
o Dsniff - this is a network auditing tool to capture user name, password & authentication
Information on a local subnet.
o Filesnarf - this is a network auditing tool to capture file transfers on a local subnet.
2) Scanning & Scrutinising the information:
Port scanning :-
TCP
o Porte no. - 1.
RJE
o Port no. - 5.
FTP
ECHO
o Port no. - 7.
MSP
Network scanning;-
Understand the IP address & related information about the computer network systems.
Vulnerability scanning:-
A recent survey conducted in one of the metropolitan cities in India reveals the following facts( eye
opener)
3) Several cybercafe had installed a software called deep freeze from protecting computer from
malware attack but it's disadvantage is that it will help cybercriminals to hood winking investigation
agencies because the characteristics of deep freeze is that it will wipe out all the recent events which
is done on the system
4)Annual maintenance contract found not in place for serving the computer . Harddisc are not
formatted unless computer's are down.
5)Pornographic websites and other similar websites with indecent contents are not block in cyber
cafe.
6)Cybercafe owners have less knowledge about IT security and it its governance.
7)Government state police, ISP's do not seem to provide IT governance guidelines to cybercafe
owners.
8)Cybercafe association or state police do not seem to conduct periodic visit to cybercafe.
To some extent anitivirus software and firewall stops attack vectors however no protection method is
fully attack proof.
If an attack Vector though of a guided missile it's payward contains the malicious software.
In technical terms, the payword is necessary. Data carried in a pocket or other transmission unit.
Example- Zero day attack - It attacks a computer threat which attemts to exploit tge computer
applications vulnerabilities that are unkown by anybody in the world that is undisclosed to the
software vendors for which no patch is available.
Zero day attack are used by the attackers before the software vendors know about system
vulnerability