Module 3 Introduction To Cyber Security Module 3 Notes
Module 3 Introduction To Cyber Security Module 3 Notes
3.1. Introduction
1). Discuss the different forms of attacks through which attacker target the computer
system. (08M)
Different forms of attacks through which attacker target the computer systems are as
follows. Initial uncovering, Network probe (Investigation), Crossing the line toward E-
crime, Capturing the network, Grab the data, and Covering tracks:
1. Initial uncovering:
Two steps involved: step1) Reconnaissance- attackers gathers the information about the
target on the Internet websites in a legitimate way.
step2) Attacker finds information about company's internal network such as Internet
domain, machine names and the company's Internet Protocol (IP) address ranges to steal
data.
2. Network probe (Investigation). At the network probe stage, the attacker uses more
invasive techniques to scan the information Usually "ping sweep of the network IP
addresses.
And then a port scanning tool is used to discover exactly which services are running on the
target system.
At this point. the attacker has still not done anything that would be considered as an
abnormal activity on the network or anything that can be classified as an intrusion
Crossing the line toward electronic crime (E-crime) He/she does this by exploiting possible
holes on the target system.
Once the attackers are able to access a user account, then they will attempt further exploits
to get an administrator "root access"
Root access is a Unix term and is associated with the system privileges required to run all
services and access all files on the system.
Root is a basically an administrator or super-user access and grants them the privileges
to do anything on the system
4. Capturing the network: At this stage, the attacker attempts to "own" the network
The attacker gains the internal network quickly and easily by target system.
• Various tools and techniques used to launch attacks against the targets
• It uses social engineering approach for selling. It causes anxiety or the perception of
a threat.
• Pop messages in websites such as "your computer may be infected with harmful
spyware programs. Immediate removal may be required. To scan, click yes below"→
is an example of
Then ransomware disable the essential system service and encrypt some of the
personal files.
11. https://www.immunitysec.com/products-canvas-shtml --
Canvas is commercia vulnerability exploitation tool from Dave Aitel’s
ImmunitySec.
12. https://www.coresecurity.com/content/core-impact-overview -
-Core impact exploitation tool
3. Discuss the proxy server and Anonymizers in the cyber security (08M)
Advantages of Proxy server is that its cache memory can serve all users.
List of few websites where more information about anonymizers can be found
1. http://www.anonymizer.com
2. http://www.browzar.com
3. http://www.anonymize.net
4. http://www.anonymouse.ws
5. http://www.anonymousindex.com
5.Discuss the following: Google Cookie, Cookie, DoubleClick and G-Zapper. (08M)
Google Cookie
Google was the first search engine to use a cookie. Google set the standard and nowadays
cookies are commonplace among search engines. This cookie places a unique ID number
on your hard disk. Anytime you visit Google, user gets a Google cookie if a user doesn't
already have one. If a user has one then it will read and record the unique ID number.
Google can build a detailed list of your search terms over many years. (Google's cookies
are set to expire by the year 2038, unless d Use deletes before its expiry.)
Cookie (also known as HTTP cookie/browser cookie) is a small text file that contains a
string of alphanumeric characters and is used for storing netizen's website
preferences/authentication while visiting the same webpage again and again or also acts
as identifier for server-based session-such mechanism of setting and reading cookies
invites attackers to use these cookies as "Spyware."
There are two types of cookies:
1. Persistent cookie (It is stored by the web browser into the cookie folder on the PC's hard
disk. It remains under the cookie folder, which is maintained by web browser. and
2. session cookie It is temporary cookie and does not reside on the PC once the browser
is closed
DoubleClick
is a subsidiary of Google and provides Internet ad-serving services and paid search
Network (DART Search ") and utilize the cookies, which are called DART cookie.
Double Click was first online media representative business, that is, representing
websites to sell advertising space to marketers.
G-zapper
G-Zapper utility helps to stay anonymous while searching Google. Google stores a unique
identifier in a cookie on the computer (i.e., on the hard disk) which allows to track
keywords that are searched for. This information ls used to compile reports, track user
habits and test features. In the future, it would be possible that this information is sold
and/or shared with others. G-Zapper helps to protect users' D and search history.
G-Zapper reads the Google cookie installed on users PC, displays thee date it was
installed, determines how long user searches have been tracked and displays Google
searches. G-Zapper allows user to automatically delete or entirely block the Google search
cookie from future installation
3.3 Phishing
6. Explain the Phishing, with examples and discuss the step how it works?
• While checking electronic mail (E-Mail) one day a user finds a message from the bank
threatening him/her to close the bank account if he/she does not reply immediately.
• Although the message seems to be suspicious from the contents of the message, it is
difficult to conclude that it is a fake/false E-Mail.
• Examples: stealing personal and financial data - and can infect systems with viruses
and also a method of online ID theft in various cases.
• Fake email using other reputed companies or individual identity
• People associate phishing with E-mail message that spoof or mimic banks credit card
companies or other business such as Amazon, and eBay
1. Planning: Criminals called as phisher, decide the target & determine how to get E-
mail address
2. Setup: Once phishers know which business/business house to spoof and who their
victims are, they create methods for delivering the message & to collect the data
about the target.
3. Attack: Phisher sends a phony message that appears to be from a reputed source
4. Collection: Phisher record the information of victims entering into web pages or pop-
up window
5. Identity theft and fraud: Phisher use Information that they have gathered to make
illegal purchases and commit fraud.
Recently more and more organisation/Institute provides greater online access for their
customers and hence criminals are successfully using phishing techniques to steal personal
information and conduct ID theft at global level.
• Password is like a key to get an entry into computerized systems like a lock.
• Password cracking is a process of recovering passwords from data that have been
stored in or transmitted by a computer system.
• Attacker follow common approach of guessing of passwords.
• The purpose of password cracking is as follows:
• To recover a forgotten password.
• As a preventive measure by system administrators to check for easily
crackable passwords
• To gain unauthorized access to a system.
These are used to get the password in the clear text format.
dictionary, proper names and words based on the username or common variations
on these themes.
• Passwords that can be easily guessed by acquaintances of the netizens (such as
date of birth, pet's name and spouses name) are considered to be very weak.
• Here are some of the examples of "weak passwords”:
• 1. Susan: Common personal name
• 2. aaaa: repeated letters, can be guessed;
• 3. rover: common name for a pet, also a dictionary word;
• 4. abc123: can be easily guessed;
• 5. admin: can be easily guessed;
• 6. 1234: can be easily guessed;
• 7. QWERTY: a sequence of adjacent letters on many keyboards
• 8. 12/3/75: date, possibly of personal importance;
• 9. nbusr123: probably a username, and if so, can be very easily guessed
• 10. p@S$V/ord: simple letter substitutions are preprogrammed into password
cracking tools;
• 11. password: used very often - trivially guessed; 12. December12: using the date of
a forced password change is very common.
• Strong password:
• A strong password is long enough, random or otherwise difficult to guess -
producible only by the user who choose it.
• The length of time deemed to be too long will vary with the attacker, the attacker's
resources, the ease in which a password can be tried and the value of the password
to the attacker.
• A student's password might not be worth more than a few seconds of computer time,
while a password controlling access to a large banks electronic money transfer
system might be worth many weeks of computer time for trying a crack it..
• There are some examples of strong passwords:
• 1. Coon vert £100 to Euros!: Such phrases are long, memorable and contain an
extended symbol to increase the strength of the password.
• 2. 465304H: It is mix of numbers and a letter at the end, usually used on mass user
accounts and 3 passwords can be generated randomly, for example, in schools and
business.
• 3. PIeai@3: lt is not a dictionary word: however it has cases of alpha along with
numeric and punctuation characters.
• 4. MoOoOfln245679: It is long with both alphabets and numerals.
• 5. t3wahSetyeT4: It is not a dictionary word; however, it has both alphabets and
numerals
• Password is stronger if it includes a mix of upper and lower case letters, numbers
and other symbols, when allowed, for the same umber of characters.
• The difficulty in remembering such a password increases the chance that the
user will write down the password, which makes it more vulnerable to a different
attack.
OR
• Keystroke logging, often called keylogging, is the practice of noting (or logging) the
keys struck on a keyboard, typically in a covert manner so that the person using
the keyboard is unaware that such actions are being monitored.
• Keystroke logger or keylogger is quicker and easier way of capturing the passwords
and monitoring the Victims IT savvy behavior.
• It can be classified as Software keylogger and Hardware keylogger
• These are connected to the PC and/or to the keyboard and save every keystroke into
a file or in the memory of the hardware device.
• Cybercriminals install such devices on ATM machines to capture ATM Cards PINs.
• Each keypress on the keyboard of the ATM gets registered by these keyloggers
• These keyloggers look like an integrated part of such systems; hence, bank customers
are unaware of their presence.
• Listed are few websites where more information about hardware keyloggers can
be found:
• http://www.keyghost.com
• http://www.keelog.com
• http://www.keydevil.com
• http://www.keykatcher.com
3.5.3 Antikeylogger
• Antikeylogger is a tool that can detect the keylogger installed on the computer system
and also can remove the tool.
• Advantages of using antikeylogger are as follows:
3.5.4 Spywares
Spywares examples
• Computer Virus is a program that can “infect” legitimate programs by modifying them
to include a possibly “evolved” copy of itself.
• Viruses spread themselves, without the knowledge or permission of users
• Virus contains malicious instructions that may cause damage or annoyance; the
combination of possibly malicious code with the ability to spread is what that makes
viruses a considerable concern.
• A computer virus passes from computer to computer in a similar manner as a
biological virus passes from person to person.
• A virus can start on event driven effects (e.g., triggered after a specific number of
executions), time driven effects (e.g., triggered on a specific date, such as Friday the
13th), or can occur random.
Figure 3.1 shows the virus spread through internet. Figure 3.2 shows the Virus spreads
through stand-alone system. And Figure 3.3 shows the Virus spreads through local
networks
Computer virus has the ability to copy itself and infect the system. The term virus is also
commonly but erroneously used to refer to other types of malwares, adware and spyware
programs that do not have reproductive ability.
A true virus can only spread from one system to another (in some form of executable code).
When its host is taken to the target computer, for instance, when a user sent it over the
internet or a network, or carried it on a removable media such as CD, DVD or USB drives.
Malware includes viruses, worms, Trojans, most Rootkits, Spyware, dishonest Adware,
Crimeware and other malicious and unwanted software as well as true viruses.
1. Boot sector viruses: It Infects the storage media on which OS is stored and which
is used to start the computer system. Spread to other systems when shared infected
disks and pirated software's are used.
2. Program viruses: These viruses becom Active when the programs files (usually with
extension .bin, .com, .exe,. ovl, .drv) is executed. Makes copy of itself.
3. Multipartite viruses: It is hybrid of a boot sector and program viruses. It infects
program files along with the record when the infected program is active.
4. Stealth viruses: It camouflages and/or Masks (hides) itself so detecting this virus is
difficult. It can hide itself such a way that anti-virus software also cannot detect it.
Memory to remind in the system and detected. Example of stealth virus is Brain
virus.
5. Polymorphic viruses: It acts like a "Chameleon" that changes its virus signature
(I,e., binary pattern) every time it spread through the system (i.e., multiplies and
infects a new file). Polymorphic generators are routines (small programs) that can be
linked with the existing viruses.
Generators are not viruses but purpose to hide actual viruses under the cloak of
polymorphism. It is difficult to detect polymorphic virus with the help of an antivirus
program.First Polymorphic generator was the Mutation Engine (MtE). Other
Polymorphic generators are Dark Angel’s Multiple Encryptor (DAME), Darwinian
Genetic Mutation Engine (DGME), Dark Slayer Mutation Engine (DSME), MutaGen,
Guns’nRoses Polymorphic Engine (GPE), and Dark Slayer Confusion Engine (DSME)
6. Macro viruses: Many applications, such as Microsoft word and Microsoft Excel,
support MACROs (i.e., macrolanguages). These macros are programmed as a macro
embedded in a document. Once macro virus gets onto a victim's computer then every
document he/she produces will become Infected.
7. Active X Java control: All the web browsers have settings about Active X and Java
Commands. Little awareness is needed about managing and controlling these
settings of a web browser to prohibit and allow certain functions to work.
8. Which invites the threats for the computer system being targeted by unwanted
software
Worms:
Everyday new virus albums are created day be coming you trade to netizens. In spite of
different platforms OS and or applications a typical definition of computer virus or warm
white have the various aspects such as
Viruses can modify themselves and may possibly escape detection this way
***************************************
Malware
• 6.Botnets: These refers to network of hijacked internet connected devices that are
installed with malicious code known s malware. The infected devices are called as
bots. Hackers remotely controls the
3.7.1 Backdoors
• Programmer sometimes leave such backdoor in their software for diagnostic and
troubleshooting purpose. Attacker discover these undocumented features and use
them.
1. It allows an attacker to create, delete, rename, copy or edit any file; change any
system setting, alter window registry; run control and terminate application; instal
arbitrary software
2. The control computer hardware devices, modify related setting, shutdown or restart
a computer without asking for user permission
3. Steals sensitive personal information, logs user activity, tracks web browsing habits
4. Record Keystrokes that a user types on a computer’s keyboard and captures
screenshots
5. Sends all gathered data to predefined E-Mail address
6. It infects files, corrupts installed app and damage entire system
7. It distributes infected files to remote computers and perform attack against hacker-
defined remote hosts.
8. It installed hidden FTP server that can be used by malicious person
9. It degrades Internet connection speed and overall system performance
10. It provides uninstall features and hides processes, files and other objects to complicate
its removal as much as possible.
1. Back office: Enable user to control a computer running the Microsoft windows OS
from remote location
2. Bifrost: Infect Windows 95 through Vista
3. SAP backdoors: SAP is an Enterprise Resource Planning (ERP) system and nowadays
ERP is the heart of the business technological platform.
These systems handle the key business processes of the organization, such as
procurement, invoicing, human resources management, billing, stock management and
financial planning.
Avoid connecting with and/or downloading any information from peer (P2P) networks,
which are most dangerous networks to spread Trojan Horses and other threats. P2P
networks create files packed with malicious software, and then rename them to files
with the criteria of common search that are used while surfing the information on the
web.
3. Install antivirus/Trojan remover Software
Nowadays antivirus software(s) have built-in features for protecting the system not
only from viruses and worms but also from malware such as Trojan hoses. Free
Trojan remover programs.
• Hybrid P2P: There is a central server that keeps information about the network.
The peers are responsible for storing the information. If they want to contact
another peer, they query the server for the address.
• Pure P2P: There is absolutely no central server or router. Each peer acts as
both client and server at the same time. This is also sometimes referred to as
"serverless" P2P.
• Mixed P2P: It is between "hybrid" and "pure" P2P networks. An example of
such a network is Gnutella that has no central server but clusters its nodes
around so-called "super nodes."
3.8 Stganography
Elaborate the steganography and Steganalysis? How criminals use 06M
these methods?
Discuss the steganography and Cryptography. 04M
• Greek word that means “Sheltered writing”. It is a method that attempts to hide the
existence of a message or communication. It comes from 2 Greek words:
• Steganos means “Covered” and graphein means “to write” or “concealed writing”
• Steganalysis: Detecting messages that are hidden in images, audio/video files using
steganography.
• For example, in a digital image the least significant bit of each word can be used to
comprise a message without causing any significant change in the image.
• It is used to make a digital watermark to detect illegal copying of digital image.
• The Cover medium is used to describe the original, innocent message, data audio,
still, video and so on. It is the medium that hides the secret message as shown in
figure 3.4. A stegokey password is required in the process.
• Steganography is used to place a hidden "trademark" in images, music and
software, the result is a technique referred to as watermarking.
Steganography tools
• http://www.securityfocus.com: DiSi-Steganograph:
• http://www.brothersoft.com/invisible-: Invisible Folders
• http://www.programurl.com/stealth-files.htm Invisible Secrets:
• http://www.programurl.com/hermetic-stego.htm Stealth Files:
• http://www.petitcolas.net/fabien/steganography/mp3stego Hermetic Stego:
• http://compression.ru/video/stego_video/index_en.html DriveCrypt Plus (DCPP):
• http://www.petitcolas.net/fabien/steganography/mp3stego MP3Stego
3.8.1. Steganalysis
Sreganalysis is the art and science of detecting messages that are hidden in
images, audio/video files using steganography.
• Attacker spoofs the IP address and floods the network of victim with repeated request
• As the IP address is fake, the victim machine keeps waiting for response from the
attacker’s machine for each request
• This consumes the bandwidth of the network which then fails to server the legitimate
responses and ultimately breaks down.
• Goal of DoS is not to gain unauthorized access to systems or data, but to prevents
intended users of a service from using it. The DoS attack do the following
• 1. Bandwidth attacks: Loading any websites takes certain time. Loading means
complete webage appearing on the screen and system is awaiting user's input.
Loading consumes some amount of memory.
• Every site given with a particular amount of bandwidth for its hosting, say 50GB.
Now if visitor consumes all 50GB bandwidth then hosting of the site can ban this
site.
• The does the same- he/she opens 100 pages of a site and keeps on refreshing and
consumes all the bandwidth, the site becomes out of service.
• 2. Logic attack: These kinds of attacks can exploit vulnerabilities in network
software such as web server or TCP/IP stack.
• 3. Protocol attacks: Protocols are rules that are to be followed to send data over
network. These kinds of attacks exploit specific feature or implementation bug of
some protocol installed at victim’s system to consume excess amount of its
resources
• 4. Unintentional DoS attacks: This is a scenario where a website ends up denied
not due to a deliberate attack by a single individual or group of individuals, but
simply due to a sudden enormous spike in popularity.
• This is the warliest form of DoS attack and is also known as ping flood. Attacker
sending number of ping packets, using ping command, which result into more
traffic than victim can handle.
• This requires the attacker to have faster network connection than the victim
• It is very simple to launch, but Prevention is difficult
• The ping death attack sends oversized ICMP (Internet Control Message Control)
packets, and it is core protocol of IP Suite.
• It is mainly used by networked computers OS's to send error messages indicating
datagrams to the victim.
• The maximum packet size allowed is of 65,536 octets. Some system upon
receiving the oversized packet, will crash, freeze or reboot system resulting DoS.
4. Teardrop attack
5. Smurf attack
• Generating significant computer network traffic on victim network using foods via
spoofed broadcast ping message
• Attack consists of a host sending ICMP echo request to network broadcast ping
address
• Every host receive this packet and send back ICMP echo response
• Internet relay chat (IRC) servers are primarily victim of smurf attack
6. Nuke:
Jolt2: attack against window based machine consume 100% of CPU time on processing
of illegal packets
Blended Threat: It is more sophisticated attack that bundles some of the worst aspects
of viruses, worms, Trojan Horses and Malicious code into one single threat
Use server & Internet vulnerabilities to initiate, transmit and thereafter spread attack
Characteristics:
6. Routinely examine your physical security with regard to your current needs.
7. Use tools (eg. Tripware) to detect changes in configuration information or other files
8. Invest and maintain "hot spares" – Machine that can be placed into service quickly if
a similar machine is disabled.
9. Invest in redundant and fault-tolerant network configuration
10. Establish and maintain regular backup schedules and policies, fr important
configuration information.
11. Establish and maintain appropriate password policies, especially access to highly
privileged accounts such as Unix root or Microsoft Windows NT Administrator.
Wireless networks
• Wireless networks extend the range of traditional wired networks by using radio
waves to transmit data to wireless-enabled devices such as laptops and PDAs.
• Wireless networks are generally composed of wo basic elements: (a) access points
(APs) and (b) other wireless-enabled devices, such as laptops radio transmitters and
receivers to communicate or "connect" with each other. It has modems, routers, hubs
and firewall are the integral part of wired and wireless networks. The wirless network
is shown in figure 3.6.
Wireless Technology
802.11g: It provides 54 Mbps transmission in the 2.4 GHz band and the same OFDM 802.
Coding as 802.11a, hence it is a lot faster than 802.11a and 802.11lb.
802.11n: It is the newest standard available widely and uses multiple-input multiple-
output MIMO that enabled to improve the speed and range significantly. For example,
although 802.11g provides 54 Mbps transmission
Theoretical.
802.15 WLAN → This standard is used for personal WLANs and covers a very short range.
Hence it is used for Bluetooth technology
802.16: It is WiMax [broadband and wireless]: It combines the benefits of broadband and
wireless, hence it provides high-speed wireless Internet over very long distances and
provides access to large areas such as cities.
2. Access Points (AP): It is also termed as AP. It is a hardware device and/or a software
that acts as a central transmitter and receiver of WLAN radio signals. Users of wireless
device, such as laptop/PDAs get connected with these APs, which in turn get connected
with the wired LAN, An AP acts as a communication hub for users to connect with the
wired LAN.
3. Wi-Fi hotspots: hotspot is a site that offers the Internet access by using Wi-Fi
technology over a WLAN. Hotspots are found in public areas (such as coffee shops, public
libraries, hotels and restaurants) and are commonly offered facility throughout much of
North America and Europe.
Free Wi-Fi hotpots
Commercial hotspots
4. Service set identifier (SSID): is the name of 802.11i WLAN and all wireless devices on
a WLAN must use the same SSID to communicate with each other. While setting up
WLAN, the user (or WLAN administrator) sets the SSID, which can be up to 32 characters
long so that only the users who knew the SSID will be able to connect the WLAN.
5.Wired Equivalence Privacy (WEP): Wireless transmission is susceptible to
eavesdropping and to provide confidentiality, WEP was introduced as part of the original
802.1li Protocol in 1997.
6. Wi-Fi protected access (WPA and WPA2): During 2001, serious weakness in WEP was
identified that resulted WEP cracking software (s) being made available to enable
cybercriminals to intrude into W'LANs. WPA was introduced as an interim standard to
replace WEP to improve upon the security features of WEP. WIPA2 is the approved Wi-Fi
alliance (www.wi-fi.org) interoperable implementation of 802. 11i. WPA2 provides a
stronger encryption mechanism through Advanced Encryption standard (AES), which is a
requirement for some corporate and government agencies.
7. Media access Control (MAC): It is a unique identifier of each node (i.e., each network
interfaces) of the network and it is assigned by the manufacturer of a network interface
card (NIC) stored in its hardware. MAC address filtering allows only the devices with
specific MAC addresses to access the network. The router should be configured stating
which addresses are allowed.
1. Sniffing → Sniffers (passive scanning, detection of SSID, MAC address, collecting the
frames to crack WEP.
2. Spoofing: The primary objective of this attack is to successfully masquerade
the identity by falsifying data and thereby gaining an illegitimate advantage. The
attacker often launches an attack on a wireless network by simply creating a new
network with a stronger wireless signal and a copied SSID in the same areas as a
legitimate network.
MAC address Spoofing: It is a technique of changing an assigned media access
control (MAC) address of a networked device to a different one. This allows the
attacker to bypass the access control lists on servers or routers by either hiding
a computer on a network or allowing it to impersonate another network device.
Frame Spoofing: The attacker injects the frames whose content is carefully spoofed
and which are valid as per 802.11 specifications. Frames themselves are not
authenticated in 802.11 networks and hence when a frame has a spoofed source
address, it cannot be detected unless the address is entirely faked/bogus.
3. DoS: In this type of criminal act, the attacker floods the bandwidth of the victim's
network or fills his E-Mail box with spam mail depriving him of the services he if
entitled to access or provide.
The attacker typically sites or services hosted on high profile web servers such as
bank credit card payment gateways mobile phone networks and even root name
servers.
4. Man-in-the middle attack (MITM): It is the most popular online attack. It is also
called as bucket-brigade attack or sometimes Janus attack. It is active eavesdropping
in which the attacker establishes a connection between a victim and the server to
which a victim is connected. When a victim client connects to the fraudulent servers
the MITM Server intercepts the call, hashes the password and passes the connection
to the victim server.
5. Encryption cracking: It is always advised that the first step to protect wireless
networks is to use WPA encryption. The attackers always devise new tools and
techniques to deconstruct the older encryption technology, which is quite easy for
attackers due to continuous research in this held. Hence, the second step is to use
a long and highly randomized encryption key; this is very important. It is a little
pain to remember long random encryption; however, at the same time these keys
are much harder to crack.
25. Discuss the theft Internet hours and Wi-Fi based Frauds and Misuses.
3.10.2 Theft of Internet Hours and Wi-Fi based frauds and misuses
1. Computer with ICT → Wireless Internet access→ most homes equipped with Internet.
2. Router configured easily with plug and play feature.
3. Internet is in fingertip of all users, when he/she visit malicious page, the router is
exposed to attack.
4. Jupiter research tells that 14% of wireless network owners have access→ neighbour
network.
Cybercriminals know that they should not steal Internet hour purchased by others but
somehow, they want to get their work done without paying for the internet connection.
• First word wardriving derived from wardailing came in the film WarGames
•
• Warwalking/war jagging: [Pocket PC]and similar in nature to war driving.
Except that it is done on foot rather than conducted from a moving vehicle.
• Warbiking same as wardriving → WiFi capable device on vehicle itself. (Bicycle
or motorcycle)
• Warkitting wardriving and rootkitting
• WAPKitting: In this attack. external software clutches the control of router's
firmware that can be easily accomplished by Exploiting open administrative
access.
• WAPkitting can theoretically proceed by more traditional means Such as buffer
overflow
• WAPjacking: similar DNS poisoning attack. it changes the settings of firmware,
that’s helps an attacker to engage in malicious configuration of firmware
settings.
• A rootkit is a collection of computer software, typically malicious, designed to
enable access to a computer
Security features of Wi-Fi networking products are not that time consuming and non-
intuitive; sometimes they are still ignored, by home users. The following steps heps to
improve the security of wireless Networks
1. Change the default settings of all the equipment’s /components of wireless network
2. Enable WPA (Wi-Fi Protected Access) /WEP (wired Equivalent Privacy) encryption
3. Change the default SSID (Service Set Identifier)
4. Enable MAC address filtering.
5. Disable remote login
*********************************************