module 2 detail notes
module 2 detail notes
CYBER OFFENSES
Module Outcomes
After reading this Module, the student will be able to:
o Understand the different types of Cyber attacks.
o Get an overview of the steps involved in planning Cybercrime.
o Understand the tools used for gathering information about the target.
o Get an overview of Social engineering-What and how?
o Learn about the role of cybercafés in cybercrime.
o Understand what cyberstalking Is?
o Learn about Botnets and attack vectors.
Chapter 2: Cyber Offenses: How Criminals Plan Them (TB1: Page 45-75)
The topics to be covered in this module are
2.1 Introduction
2.2 How do criminals plan the attacks?
2.3 Social Engineering
2.4 Cyber Stalking
2.5 Cybercafe & cybercrimes
2.6 Botnets: The fuel for cybercrime
2.7 Attack Vector
2.1 Introduction:
o Technology is a “double-edged sword” as it can be used for both good
and bad purposes.
o People with the tendency to cause damage or carry out illegal activities
will use it for bad purposes.
o Computers and tools available in IT are also used as either targets of
offence or means for committing an offence.
o The Criminals take advantage of the widespread lack of awareness
about cyber crimes and cyber laws among the people who are
constantly using the IT infrastructure for official and personal purposes.
(3). Cracker
o A Cracker is a person who breaks into computers. Crackers should not be
confused with hackers.
o The main difference between a hacker and a cracker is their motivations
and intentions.
o The term "cracker” is usually connected to computer criminals. Some of
their crimes include vandalism, theft and snooping in unauthorised areas.
(4). Cracking
o It is the act of breaking into computers.
o Many sites are devoted to supplying crackers with programs that allow
them to crack computers.
o Some of these programs contain dictionaries for guessing passwords.
These sites usually display warnings such as “These files are illegal; we
are not responsible for what you do with them.”
(5). Cracker tools
o These are programs that’ break into a computer.
o These are widely distributed on the internet. Like password crackers,
Trojans, Viruses, war dialers and worms
(6). Phreaking:
o This is the notorious art of breaking into phones or other communication
systems.
o Phreaking is a type of hacking that involves manipulating telephone
networks to make free calls or gain unauthorized access to systems.
o Phreaking sites on the Internet are popular among crackers and other
criminals.
Hat concept in cyber security:*** There are FOUR different hat concepts
used in cyber security
1. Black Hat:
o A black hat is also called a cracker. These are the bad guys.
o Black hats may also share information about the “break-in” with other black hat
crackers so they can exploit the same vulnerabilities before the victim becomes
aware and takes appropriate measures.
2. White Hat:
o White black hats use their skill for malicious purposes, white hats are ethical
hackers.
o They use their knowledge and skill to thwart the black hats and secure the
integrity of computer systems or networks.
o If a black hat decides to target you, it’s a great thing to have a white hat around.
White hat focuses on securing IT systems.
o Whereas black hat would like to break into them. It's like a thief and police game.
3. Brown Hat:
o A hacker thinks before acting or committing a malice or non-malice deed.
4. A Grey Hat:
o Commonly refers to a hacker who releases information about any exploits or
security holes he/she finds openly to the public.
o In the world of "hacking," the reconnaissance phase begins with footprinting - this is
the preparation toward the preattack phase, and involves accumulating data about
the target environment and computer architecture to find ways to intrude into that
environment.
o The objective of this preparatory phase is to understand the system footprint, its
networking ports and services, and any other aspects of its security that are needed
for launching the attack.
o Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain
information about the company or employees.
o The key point is that in an active attack, the victim is informed about the attack.
o An active attack involves probing the network to discover individual hosts to confirm
the information (IP address, OS type etc) gathered in the passive attack phase.
o It can provide confirmation to an attacker about security measures in place (Whether
the front door is locked?)
Scrutinizing Phase
o It is also called as enumeration in the hacking world. The object behind the step is
to identify the following
3. Operating System (OS) and different applications that are running on the OS.
o In this phase validate the information as well as identify the existing
vulnerabilities. After collecting the data on the victim, validate the acquired
information and also identify the vulnerabilities.
5. Cover the tracks- delete access logs, so that there is no trial illicit activity
2.3 Social Engineering (June/July-2024-10M, Feb-2023-10M)
o Social engineering is a cybersecurity tactic that involves manipulating people into
sharing sensitive information or taking actions that compromise their security.
o Attackers use psychological manipulation and human behaviour, rather than technical
know-how, to gain the victim's trust
o Social engineers exploit the natural tendency of a person to trust social engineers’
word, rather than exploiting computer security holes.
o The goal of a social engineer is to fool someone into providing valuable information or
access to that information.
o Social engineer studies human behaviour so that people will help because of the
desire to be helpful, the attitude to trust people, and the fear of getting into trouble
o A social engineer usually uses telecommunication (i.e., telephone and/or cell phone)
or the Internet to get them to do something that is against the security practices
and/or policies of the organization.
o An example is calling a user and pretending to be someone from the service desk
working on a network issue; the attacker then proceeds to ask a question about what
the user is working on, what file shares he/she uses, what his/her password is and so
on.
1. Online stalkers:
o They aim to start the interaction with the victim directly with the help of Internet.
o E-Mail and chat rooms are the most popular communication medium to get
connected with the victim, rather than using traditional instrumentation like
telephone cell phone.
o stalker makes sure that the victim recognises the attack attempted on him/her.
o The stalker can use a third party to harass the victim.
2. Offline stalkers
o The stalker may begin the attack using traditional methods such as following the
o victim, watching the daily routine of the victim, etc. Searching on message
boards/newsgroups. Personal websites and people finding services or websites are
the most common ways to gather information
o about the victim using the Internet. The victim is unaware that the Internet has
been used to perpetuate an attack against them.
Both are criminal offences, both are motivated by a desire to control, intimidate or
influence a victim.
A Stalker may be an online stranger or a person whom the target knows. He may be
anonymous and solicit the involvement of other people online who do not even know
the target.
2. Established a contact with the victim through telephone or cell phone start
threatening or harassing.
4. Keep sending repeated emails asking for various kinds of favors or threaten
the victim.
6. Who so ever comes across the information start calling the victim on the given
contact details asking for sexual services.
Botnet
o The dictionary meaning of Bot is “(computing) an automated program for doing
some particular task, often over a network.”
o Botnet is a term used for the collection of software robots, or Bots, that run
autonomously and automatically.
o The term is often associated with malicious software but can also refer to the
network of computers using distributed computing software.
o In simple terms, a Bot is simply an automated computer program One can gain
control of a computer by infecting it with a virus or other Malicious Code that
gives access.
o Botnets are often used to conduct a range of activities, from distributing Spam
and viruses to conducting denial-of-service (DoS) attacks.
Botnets create business and are used for gainful purposes. (Jan-2024-10M)
A zero-day attack
o A zero-day attack or threat is an attack that exploits a previously unknown
vulnerability in a computer application or operating system, one that developers
have not had time to address and patch.
o Software vulnerabilities may be discovered by hackers security companies or
researchers, by the software vendors themselves or by users.
o If discovered by hackers, an exploit will be kept secret for as long as possible and
will circulate only through the ranks of hackers, until software or security
companies become aware of it or the attacks targeting it.
o Zero-day emergency response team (ZERT): This is a group of software engineers
who work to release non-vendor patches for zero-day exploits. Nevada is
attempting to provide support with the Zero-day Project at
www.zerodayproject.com, which purports to provide information on upcoming
attacks and support to vulnerable systems
MODEL 2: VTU SEE QUESTIONS
June/July-2024
Dec 2023/Jan-2024
Jan/Feb 2023