Jan 2006
Jan 2006
– Rourkela
Network Security
COMPUTER HACKING
Ritu Hooda
How to become a Computer Security Expert?
THINGS TO DO:
Qualities of a Hacker :
Qualities of a Cracker :
Privacy Attacks
Sniffer Attacks
DOS Attacks
Individual Internet User
NASA
An attacker’s first step is to find out the IP Address of the target system.
http://www.hackingmobilephones.com
INSTANT MESSENGERS
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
http://www.hackingmobilephones.com
Thus in this case, you first have to establish a direct connection with
your friend’s computer by either sending him a file or by using the call
feature.
Then, goto MSDOS or the command line and type:
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
http://www.hackingmobilephones.com
Countermeasures
PROXY SERVERS
Definition:
A Proxy Server acts as a buffer between you and the Internet, hence it
protects your identity.
Working:
PROXY BOUNCING
Definition:
Working:
Tools:
MultiProxy
http://www.hackingmobilephones.com
/whois nicknameofvictim
If this does not work, then one can send a file to the friend and use
the ‘netstat’ command to get his IP Address.
http://www.hackingmobilephones.com
Countermeasures
One should not accept any files or direct chat requests from
unknown people.
One can also use the below command to hide one’s IP Address:
/mode your_nickname +x
OR
/mode your_nickname +z
http://www.hackingmobilephones.com
WEBSITES
One can easily log the IP Addresses of all visitors to their website by
using simply JAVA applets or JavaScript code.
Countermeasures
One can also make use of the numerous Free Anonymous Surfing
Proxy Services.
EMAIL HEADERS
Return-Path: <[email protected]>
Received: from hotmail.com by delhi1.mtnl.net.in
(8.9.1/1.1.20.3/26Oct99-0620AM)
id TAA0000032714; Sun, 23 Jan 2000 19:02:21 +0530 (IST)
Message-ID: <[email protected]>
Received: from 202.54.109.174 by www.hotmail.com with HTTP;
Sun, 23 Jan 2000 05:30:14 PST
X-Originating-IP: [202.xx.109.174]
http://www.hackingmobilephones.com
DOS Attacks
Disconnect from the Internet
Trojans Exploitation
Geographical Information: Click Here
File Sharing Exploits
Invades your Privacy
Spy on You
Steal your Passwords
Slow Your Internet Access Speed.
TROJANS
TROJANS
Definition:
Threats:
Tools:
TROJANS
COUNTERMEASURES
• Hence, one should search all the start up files of the system and
remove any references to suspicious programs.
http://www.hackingmobilephones.com
Privacy Attacks
Sniffer Attacks
DOS Attacks
http://www.hackingmobilephones.com
TV Group
• Tainted relations.
http://www.hackingmobilephones.com
Email Forging
Email Forging
Definition:
Email Forging is the art of sending an email from the victim’s email account
without knowing the password.
Working:
Tools:
Email Forging
COUNTERMEASURES
Privacy Attacks
Sniffer Attacks
DOS Attacks
http://www.hackingmobilephones.com
Healthcare Sector
Healthcare Group
Government Sector
BARC Group
SNIFFERS
SNIFFERS
Definition:
Sniffers are tools that can capture all data packets being sent across the
entire network in the raw form.
Threats:
Tools:
SNIFFERS
COUNTERMEASURES
Privacy Attacks
Sniffer Attacks
DOS Attacks
http://www.hackingmobilephones.com
There is usually always some sort of program (software) that accepts the
user’s input in order to either process it or store it.
However, a problem arises when a program accepts input from the user
without validating/verifying it.
DANGERS
• Enter 1000 random characters as the password and gain root access.
• Enter the path of the password file in the search box of a website
and actually get access to it!
http://www.hackingmobilephones.com
http://www.abc.com/cgi-bin/phf?Qalias=x&0a/bin/cat&20/etc/passwd
/bin/cat /etc/passwd
http://www.hackingmobilephones.com
EXAMPLES: Hotmail
https://register.passport.net/emailpwdreset.srf?lc=1033&em=victim@
hotmail.com&id=&cb=&[email protected]&rst=1
http://www.hackingmobilephones.com
EXAMPLES: MailMachine.cgi
http://www.abc.com/cgi-bin/mailmachine.cgi?EMAIL
http://www.hackingmobilephones.com
SQL injection attacks are a form of input validation attacks wherein the
attacker uses specially crafted SQL queries or commands to carry out
malicious activities on the target system.
The best part about SQL injection attacks – like most other input
validation attacks— is that they can easily be executed with the help of
only a browser.
http://www.hackingmobilephones.com
http://www.domain.com/index.asp?querystring=sports
http://www.domain.com/index.asp?querystring=sports’ or 1=1–
COUNTERMEASURES
Privacy Attacks
Sniffer Attacks
DOS Attacks
http://www.hackingmobilephones.com
DOS ATTACKS
Definition:
Working:
Tools:
2. Target Network gets choked or cannot handle the malicious data and
hence crashes.
PING OF DEATH
In the Ping of Death Attack, a packet having a size greater than this
maximum size allowed by TCP\IP, is sent to the target system.
As soon as the target system receives a packet exceeding the allowable
size, then it crashes, reboots or hangs.
Data sent from the source to the destination system, is broken down
into smaller fragments at the source system and then reassembled
into larger chunks at the destination system.
For Example,
Since here the ranges are overlapping, the target system gets
DOS’ed!!!
http://www.hackingmobilephones.com
SMURF ATTACKS
Due to infinite loops thus generated and due to the large number of
Ping Requests, the target network will crash, restart or hang up.
Countermeasure
LAND ATTACKS
The same source and target address and port number crashes the
victim system.
Countermeasure:
SYN Flooding
SYN Flooding exploits this classic 3-way TCP/IP handshake. Here, the
attacker sends infinite SYN Packets to the victim computer from
spoofed IP Addresses. This creates infinite threads in the following
half-open state:
SYN Flooding
Attacker uses all these 100 systems to attack the actual target T.
Attacker----------------- Clients---------------Daemons
Allows TCP Floods, SYN Floods or UDP floods on the target system.
Tools: Trin00
Attacker----------------- Masters---------------Daemons
Trin00 clients are password protected and do not allow illicit usage.
However, the password is stored in plaintext in the source code itself.
BUSINESS THREATS
•Loss of revenue.
DOS Attacks
COUNTERMEASURES
• Security by obscurity?
http://www.hackingmobilephones.com
ATM Hacking
http://www.hackingmobilephones.com
ATM Hacking
http://www.hackingmobilephones.com
ATM Hacking
http://www.hackingmobilephones.com
ATM Hacking
http://www.hackingmobilephones.com
Different Types:
BlueJacking
BlueSnarfing
BlueBug Attacks
Failed Authentication Attacks
Malformed OBEX Attack
Malformed SMS Text Message Attack
Malformed MIDI File DOS Attack
Jamming
Viruses and Worms
Secret Codes: *#92702689# or
#3370*
http://www.hackingmobilephones.com
HACKED!!! – Rourkela
Network Security
Questions?
Ankit Fadia
Intelligence Consultant cum Author
[email protected]