Brief Notes
Brief Notes
Ethical Hacking
Exploring Network Protocols and Cybersecurity Threats
Fundamentals of Data
Communication and Networking
Data communication and networking form the backbone of modern information exchange.
Understanding these fundamentals is crucial for anyone looking to delve into the field of
computer networks.
TCP/IP Model
1. Link Layer: Equivalent to the OSI’s Physical and Data Link layers.
2. Internet Layer: Corresponds to the OSI Network layer, focusing on addressing and
routing.
3. Transport Layer: Similar to the OSI Transport layer, providing communication services.
4. Application Layer: Encompasses the OSI’s Session, Presentation, and Application layers.
TCP Flags include SYN, ACK, FIN, RST, PSH, URG, and others, which help manage the state and
flow of the TCP connection.
Information Security
Information security is about protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction.
Hacking Concepts
Hacking refers to the practice of modifying or bypassing system security features to achieve
a goal outside the original purpose of the system.
Types of Hacking/Hackers
White Hat Hackers: Ethical hackers who use their skills to improve security.
Black Hat Hackers: Malicious hackers who exploit vulnerabilities for personal gain.
Gray Hat Hackers: Operate between ethical and unethical practices, often without
malicious intent.
What is Cybercrime?
Cybercrime involves illegal activities conducted via computer networks or the internet,
including fraud, identity theft, and unauthorized access.
Types of Cybercrime
Phishing: Deceptive attempts to obtain sensitive information by impersonating a
trustworthy entity.
Malware: Malicious software designed to harm or exploit any programmable device.
Ransomware: Malware that encrypts a user's data, demanding payment for the
decryption key.
These involve monitoring or eavesdropping on transmissions without altering them, such as:
Active Attacks
These involve some modification of the data stream or creation of a false stream, such as:
Essential Terminology
Threat: A potential cause of an unwanted impact.
Vulnerability: A weakness in a system that can be exploited.
Target of Evaluation: The system or asset being tested or attacked.
Attack: An action that exploits a vulnerability.
Exploit: A method or tool used to carry out an attack.
Hacktivism
Hacktivism is the act of hacking, or breaking into a computer system, for politically or socially
motivated purposes. It aims to promote a political agenda or social change, often by exposing
vulnerabilities or highlighting issues.
Cyber Law
Cyber law refers to legal measures that address crimes committed through the internet or
other digital means. In India, the primary law dealing with cybercrime and electronic
commerce is the Information Technology (IT) Act, 2000, which has been amended multiple
times to stay updated with new threats.
Cyber Terrorism
Cyber terrorism refers to the use of computers, networks, and the internet to cause damage,
disruption, fear, or violence for political or ideological gains.
Examples:
Punishment:
Punishment:
Up to 3 years imprisonment
Fine up to ₹5 lakh
Punishment:
Using someone else’s personal data like passwords, PAN, Aadhaar, etc., to impersonate
them.
Password theft is also part of this.
Punishment:
Up to 3 years imprisonment
Fine up to ₹1 lakh
Punishment:
Up to 3 years imprisonment
Fine up to ₹1 lakh
Punishment:
Understanding Malware
Malware, short for malicious software, refers to any software intentionally designed to cause
damage to a computer, server, client, or computer network. It can manifest in various forms,
each with unique characteristics and methods of attack.
Types of Malware
1. Virus: A type of malware that attaches itself to a program or file, enabling it to spread
from one computer to another, leaving infections as it travels.
2. Worm: Similar to viruses, worms replicate themselves to spread to other computers.
However, they don't need to attach themselves to other programs or files.
3. Trojan Horse: Disguised as legitimate software, trojans deceive users into loading and
executing them on their systems.
4. Spyware: This form of malware spies on user activity without their knowledge, collecting
data such as passwords, credit card numbers, and browsing habits.
5. Adware: Often bundled with free software, adware displays unwanted advertisements on
a user's computer, sometimes tracking behavior to serve targeted ads.
6. Ransomware: This malicious software encrypts files on a victim's device, demanding a
ransom for the decryption key.
Bots/Botnets (Zombies)
A bot is a software application that runs automated tasks over the internet. A botnet is a
collection of internet-connected devices, which may include PCs, servers, and mobile
devices, infected and controlled by a common type of malware. These "zombies" can be used
for malicious activities, such as DDoS attacks.
SQL Injection
SQL injection involves inserting malicious SQL queries into input fields, exploiting
vulnerabilities in the database layer of a web application. This can lead to unauthorized data
access, data manipulation, or even deletion of entire databases.
Command Injection
Command injection occurs when an attacker is able to execute arbitrary commands on the
host operating system via a vulnerable application. This can lead to full system compromise if
the attacker gains sufficient privileges.
Buffer Overflow
A buffer overflow vulnerability arises when a program writes more data to a buffer than it can
hold. This overflow can overwrite adjacent memory, potentially allowing attackers to execute
arbitrary code.
Directory Traversal
Directory traversal allows attackers to access restricted directories and execute commands
outside the web server's root directory. This can lead to exposure of sensitive files and
information.
Phishing Scams
Phishing scams involve tricking users into providing sensitive information like usernames,
passwords, or credit card numbers by masquerading as a trustworthy entity in an electronic
communication.
Drive-By Downloads
Drive-by downloads occur when users inadvertently download malicious software simply by
visiting a compromised or malicious website. This can lead to malware infection without user
consent or knowledge.
Wireless Networking
Wireless networking has revolutionized how we connect to the internet and communicate.
Understanding its concepts and security is vital for both personal and organizational use.
Wireless Standards
Wireless standards define the protocols for communication over wireless networks. Some
common standards include IEEE 802.11 (Wi-Fi), Bluetooth, and cellular standards like 4G and
5G.
What is Wi-Fi?
Wi-Fi is a technology that allows electronic devices to connect to a wireless LAN (WLAN)
network, commonly using the 2.4 GHz and 5 GHz radio bands. It is widely used for internet
access in homes, businesses, and public spaces.
Wireless Attacks
War Driving: The act of searching for Wi-Fi networks by driving around in a vehicle with a
laptop or smartphone.
War Walking: Similar to war driving, but done on foot.
War Flying: Using aircraft to detect Wi-Fi networks from above.
War Chalking: Using symbols to denote open Wi-Fi networks in public spaces.
Blue Jacking: Sending unsolicited messages over Bluetooth to Bluetooth-enabled
devices.
HTTP (Hypertext Transfer Protocol): Utilizes port 80. It is used for transferring web pages
on the internet.
HTTPS (Hypertext Transfer Protocol Secure): Operates on port 443. It is the secure
version of HTTP, encrypting data for safe online transactions.
FTP (File Transfer Protocol): Uses ports 20 and 21. It is employed for transferring files
between systems.
SSH (Secure Shell): Functions on port 22. It provides secure access to a remote computer.
TELNET: Operates on port 23. It is used for remote communication but lacks encryption,
making it less secure.
SMTP (Simple Mail Transfer Protocol): Uses port 25. It is responsible for sending emails.
DNS (Domain Name System): Functions on port 53. It translates domain names to IP
addresses.
POP3 (Post Office Protocol 3): Uses port 110. It is used by email clients to retrieve
messages from a server.
Understanding Proxies
A proxy acts as an intermediary between a user and the internet. It can provide anonymity,
security, and performance benefits.
Types of Proxies
Forward Proxy: This type of proxy sits between a client and the internet. It helps users
access resources by acting on their behalf and can filter requests for security and
caching purposes.
Reverse Proxy: Positioned between the internet and a server, a reverse proxy handles
incoming requests and forwards them to the appropriate server. It can enhance load
balancing, security, and caching.
Proxy Chains: A proxy chain involves multiple proxy servers. By routing traffic through
several proxies, users can enhance their anonymity and security.
Brute Force Attack: Attempts all possible combinations until the correct one is found.
Phishing: Tricks users into revealing their passwords through deceptive communications.
Dictionary Attack: Uses a list of common words and phrases to guess passwords.