Cyber Security Unit 3 Notes
Cyber Security Unit 3 Notes
Cyber Security Unit 3 Notes
SHEENAM NAAZ 1
ii. In the second step, the attacker finds the company’s internal network, such as,
Internet domain, machine names and the company’s Internet Protocol (IP) address ranges
to steal the data.
2. Network probe (investigation):
• At the network probe stage, the attacker scans the organization information through a “ping sweep”
of the network IP addresses.
• Then a “port scanning” tool is used to discover exactly which services are running on the target
system.
• At this point, the attacker has still not done anything that would be considered as an
abnormal activity on the network or anything that can be classified as an intrusion.
3. Crossing the line toward electronic crime (E-crime):
• Once the attackers are able to access a user account, then they will attempt further exploits to get
an administrator or “root” access.
• Root access is a UNIX term and is associated with the system privileges required to run all services
and access all files on the system (readers are expected to have a basic familiarity with Unix-based
systems).
• “Root” is an administrator or super-user access and grants them the privileges to do anything on
the system.
4. Capturing the network:
• At this stage, the attacker attempts to “own” the network. The attacker gains the internal network
quickly and easily by target systems.
• The next step is to remove any evidence of the attack. The attacker will usually install a set of
tools that replace existing files and services with Trojan files and services that have a backdoor
password.
5. Grab the data:
Now that the attacker has “captured the network,” he/she takes advantage of his/her position to steal
confidential data
6. Covering tracks:
SHEENAM NAAZ 2
• This is the last step in any cyber attack, which refers to the activities undertaken by the attacker
to extend misuse of the system without being detected.
• The attacker can remain undetected for long periods.
• During this entire process, the attacker takes optimum care to hide his/her identity (ID) from the first step
itself.
Proxy Servers and Anonymizers
Proxy server is a computer on a network which acts as an intermediary for connection with other
computers on that network.
• The attacker first connects to a proxy server and establishes a connection with the target system
through existing connection with proxy.
• This enables an attacker to surf on the Web anonymously and/or hide the attack.
• A client connects to the proxy server and requests some services (such as a file, webpage) available from
a different server.
• The proxy server evaluates the request and provides the resource by establishing the connection to
the respective server and/or requests the required service on behalf of the client.
• Using a proxy server can allow an attacker to hide ID (i.e., become anonymous on the network).
A proxy server has following purposes:
1. Keep the systems behind the curtain (mainly for security reasons).
2. Speed up access to a resource (through “caching”). It is usually used to cache the web pages from a web
server.
3. Specialized proxy servers are used to filter unwanted content such as advertisements.
4. Proxy server can be used as IP address multiplexer to enable to connect number of computers on the
Internet, whenever one has only one IP address
• One of the advantages of a proxy server is that its cache memory can serve all users.
• If one or more websites are requested frequently, may be by different users, it is likely to be in the
proxy’s cache memory, which will improve user response time.
• An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet
untraceable. It accesses the Internet on the user’s behalf, protecting personal information by hiding
the source computer’s identifying information.
SHEENAM NAAZ 3
• Anonymizers are services used to make Web surfing anonymous by utilizing a website that acts as
a proxy server for the web client.
Phishing
“Phishing” refers to an attack using mail programs to deceive Internet users into disclosing confidential
information that can be then exploited for illegal purposes.
• While checking electronic mail (E-Mail) one day a user finds a message from the bank threatening to close
the bank account if he/she does not reply immediately.
• Although the message seems to be suspicious from the contents of the message, it is difficult to conclude
that it is a fake/false E-Mail.
• This message and other such messages are examples of Phishing – in addition to stealing personal and
financial data – and can infect systems with viruses and also a method of online ID theft in various cases.
• These messages look authentic and attempt to get users to reveal their personal information.
• It is believed that Phishing is an alternative spelling of “fishing,” as in “to fish for information.”
• The first documented use of the word “Phishing” was in 1996.
SHEENAM NAAZ 4
Password Cracking
• Password is like a key to get an entry into computerized systems like a lock.
• Password cracking is a process of recovering passwords from data that have been stored in or transmitted
by a computer system.
• Usually, an attacker follows a common approach – repeatedly making guesses for the password.
The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system administrators to check for easily crackable passwords.
3. To gain unauthorized access to a system.
Manual password cracking is to attempt to logon with different passwords. The attacker follows the
following steps:
1. Find a valid user account such as an Administrator or Guest;
2. create a list of possible passwords;
3. rank the passwords from high to low probability;
4. key-in each password;
5. try again until a successful password is found.
Passwords can be guessed sometimes with knowledge of the user’s personal information. Examples
of guessable passwords include:
1. Blank (none);
2. the words like “password,” “passcode” and “admin”;
3. series of letters from the “QWERTY” keyboard, for example, qwerty, asdf or qwertyuiop;
4. user’s name or login name;
5. name of user’s friend/relative/pet;
6. user’s birthplace or date of birth, or a relative’s or a friend’s;
7. user’s vehicle number, office number, residence number or mobile number;
8. name of a celebrity who is considered to be an idol (e.g., actors, actress, spiritual gurus) by the user;
• An attacker can also create a script file (i.e., automated program) which will be executed to try each
password in a list.
SHEENAM NAAZ 5
• This is still considered manual cracking, is time-consuming and not usually effective.
• Passwords are stored in a database and password verification process is established into the system when
a user attempts to login or access a restricted resource.
• To ensure confidentiality of passwords, the password verification data is usually not stored in a
clear text format.
• For example, one-way function (which may be either an encryption function or a
cryptographic hash) is applied to the password, possibly in combination with other data, and the resulting
value is stored.
• When a user attempts to login to the system by entering the password, the same function is applied to the
entered value and the result is compared with the stored value. If they match, user gains the access; this
process is called authentication.
The most commonly used hash functions can be computed rapidly and the attacker can test these hashes with
the help of passwords cracking tools (see Table 4.3) to get the plain text password.
Password cracking attacks can be classified under three categories as follows:
1. Online attacks; 2. offline attacks;
3. non-electronic attacks (e.g., social engineering, shoulder surfing and dumpster diving).
Online Attacks
• An attacker can create a script file that will be executed to try each password in a list and when matches,
an attacker can gain the access to the system.
• The most popular online attack is man-in-the middle (MITM) attack, also termed as “bucket- brigade
attack” or sometimes “Janus attack.”
• It is a form of active stealing in which the attacker establishes a connection between a victim and the server
to which a victim is connected.
• When a victim client connects to the fraudulent server, the MITM server intercepts the call, hashes the
password and passes the connection to the victim server (e.g., an attacker within reception range of an
unencrypted Wi-Fi wireless access point can insert himself as a man-in- the-middle).
• This type of attack is used to obtain the passwords for E-Mail accounts on public websites such as Yahoo,
Hotmail and Gmail and can also used to get the passwords for financial websites that would like
to gain the access to banking websites.
SHEENAM NAAZ 6
Offline Attacks
• Mostly offline attacks are performed from a location other than the target (i.e., either a computer
system or while on the network) where these passwords reside or are used.
• Offline attacks usually require physical access to the computer and copying the password file from the
system onto removable media.
Password guidelines.
1. Passwords used for business E-Mail accounts, personal E-Mail accounts and banking/financial user
accounts should be kept separate.
2. Passwords should be of minimum eight alphanumeric characters (common names or phrases should be
phrased).
3. Passwords should be changed every 30/45 days.
4. Passwords should not be shared with relatives and/or friends.
5. Password used previously should not be used while renewing the password.
6. Passwords of personal E-Mail accounts and banking/financial user accounts should be changed
from a secured system, within couple of days, if these E-Mail accounts has been accessed from
public Internet facilities such as cybercafes/hotels/libraries.
7. Passwords should not be stored under mobile phones/PDAs, as these devices are also prone to
cyberattacks.
8. In case E-Mail accounts/user accounts have been hacked, respective agencies/institutes should be
contacted immediately.
SHEENAM NAAZ 7
• Keystroke logger or keylogger is quicker and easier way of capturing the passwords and monitoring the
victims’ IT savvy behavior. It can be classified as software keylogger and hardware keylogger.
Software Keyloggers
• Software keyloggers are software programs installed on the computer systems which usually are located
between the OS and the keyboard hardware, and every keystroke is recorded.
• Software keyloggers are installed on a computer system by Trojans or viruses without the knowledge of
the user.
• Cybercriminals always install such tools on the insecure computer systems available in public places (i.e.,
cybercafés, etc) and can obtain the required information about the victim very easily.
• A keylogger usually consists of two files that get installed in the same directory: a dynamic link library
(DLL) file and an EXEcutable (EXE) file that installs the DLL file and triggers it to work. DLL does all
the recording of keystrokes.
Some Important Keyloggers are as follows
All In One Keylogger Stealth Keylogger Perfect Keylogger
KGB Spy Spy Buddy Elite Keylogger
CyberSpy Powered Keylogger
Hardware Keyloggers
• Hardware keyloggers are small hardware devices.
• These are connected to the PC and/or to the keyboard and save every keystroke into a file or in the memory
of the hardware device.
• Cybercriminals install such devices on ATM machines to capture ATM Cards’ PINs.
• Each keypress on the keyboard of the ATM gets registered by these keyloggers.
• These keyloggers look like an integrated part of such systems; hence, bank customers are unaware of their
presence.
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system and can remove the
tool. (Visit http://www.anti-keyloggers.com for more information) Advantages of using antikeylogger are as
follows:
SHEENAM NAAZ 8
1. Firewalls cannot detect the installations of keyloggers on the systems; hence, antikeyloggers can detect
installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such as other antivirus
and antispy programs; if not updated, it does not serve the purpose, which makes the users at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of installing keyloggers.
4. It prevents ID theft (we will discuss it more in Chapter 5).
5. It secures E-Mail and instant messaging/chatting.
Spywares
• Spyware is a type of malware (i.e., malicious software) that is installed on computers which collects
information about users without their knowledge.
• The presence of Spyware is typically hidden from the user; it is secretly installed on the user’s personal
computer.
• Sometimes, however, Spywares such as keyloggers are installed by the owner of a shared, corporate or
public computer on purpose to secretly monitor other users.
Some Important Spywares are as follows:
Spy. Spector Pro. Spector Pro.
eBlaster. Remotespy . Stealth Recorder Pro.
Stealth Website Logger. Flexispy. Wiretap Professional.
PC PhoneHome. SpyArsenal Print Monitor Pro.
Malware, short for malicious software, is a software designed to infiltrate a computer system
without the owner’s informed consent. The expression is a general term used by computer
professionals to mean a variety of forms of hostile, intrusive or annoying software or program
code. Malware can be classified as follows:
SHEENAM NAAZ 9
1. Viruses and worms: These are known as infectious malware. They spread from one computer
system to another with a particular behavior.
2. Trojan Horses: A Trojan Horse,[14] Trojan for short, is a term used to describe malware that
appears,to the user, to perform a desirable function but, in fact, facilitates unauthorized access to
the user’s computer system
3. Rootkits: Rootkits is a software system that consists of one or more programs designed to
obscurethe fact that a system has been compromised.
5. Spyware:
6. Botnets:
7. Keystroke loggers:
SHEENAM NAAZ 10
Viruses can take some typical actions:
1. Display a message to prompt an action which may set of the virus;
2. delete files inside the system into which viruses enter;
3. scramble data on a hard disk;
4. cause erratic screen behavior;
5. halt the system (PC);
6. just replicate themselves to propagate further harm.
SHEENAM NAAZ 11
Figure: Virus Spread Through stand alone System
Computer virus has the ability to copy itself and infect the system.
• The term virus is also commonly but erroneously used to refer to other types of malware,
Adware and Spyware programs that do not have reproductive ability.
• A true virus can only spread from one system to another (in some form of executable code)
when its host is taken to the target computer; for instance, when a user sent it over the
Internet or a network, or carried it on a removable media such as CD, DVD or USB drives.
• Viruses can increase their chances of spreading to other systems by infecting files on a
network file system or a file system that is accessed by another system.
• Malware includes computer viruses, worms, Trojans, most Rootkits, Spyware, dishonest
Adware, crimeware and other malicious and unwanted software as well as true viruses.
• Viruses are sometimes confused with computer worms and Trojan Horses, which are
technically different (see Table 4.7 to understand the difference between computer virus
and worm).
• A worm spreads itself automatically to other computers through networks by exploiting
security vulnerabilities, whereas a Trojan is a code/program that appears to be harmless but
hides malicious functions.
• Worms and Trojans, such as viruses, may harm the system’s data or performance.
SHEENAM NAAZ 12
• Some viruses and other malware have noticeable symptoms that enable computer user to
take necessary corrective actions, but many viruses are surreptitious or simply do nothing
for user’s to take note of them.
• Some viruses do nothing beyond reproducing themselves.
Types of Viruses
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g., hard drives)
and which is used to start the computer system.
2. Program viruses: These viruses become active when the program file (usually with
extensions .bin, .com,.exe, .ovl, .drv) is excuted
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It infects program
files along with the boot record when the infected program is active.
4. Stealth viruses: It hides itself and so detecting this type of virus is very difficult. It can
hiding itself such a way that antivirus software also cannot detect it. Example for Stealth
virus is “Brain Virus”.
5. Polymorphic viruses: It acts like a “chameleon” that changes its virus signature (i.e.,
binary pattern) every time it spreads through the system (i.e., multiplies and infects a new
file). Hence, it is always difficult to detect polymorphic virus with the help of an antivirus
program.
6. Macro viruses: Many applications, such as Microsoft Word and Microsoft Excel, support
MACROs (i.e., macrolanguages). These macros are programmed as a macro embedded in
a document. Once macrovirus gets onto a victim’s computer then every document he/she
produces will become infected.
7. Active X and Java Control: All the web browsers have settings about Active X and Java
Controls.
World’s worst worm attacks.
Conficker INF/AutoRun Win32 PSW Win32/Agent
SHEENAM NAAZ 13
Morris Worm ILOVEYOU Nimda Jerusalem
SHEENAM NAAZ 14
7. They log keystrokes to steal information such as passwords and credit card numbers.
8. They copy fake links to false websites, display porno sites, play sounds/videos and display
images.
9. They slow down, restart or shutdown the system.
10. They reinstall themselves after being disabled.
11. They disable the task manager.
12. They disable the control panel.
Backdoor
• A backdoor is a means of access to a computer program that bypasses security mechanisms.
A programmer may sometimes install a backdoor so that the program can be accessed for
troubleshooting or other purposes.
• However, attackers often use backdoors that they detect or install themselves as part of an
exploit.
• In some cases, a worm is designed to take advantage of a backdoor created by an earlier
attack.
• A backdoor works in background and hides from the user.
• It is very similar to a virus and, therefore, is quite difficult to detect and completely disable.
• A backdoor is one of the most dangerous parasite, as it allows a malicious person to perform
any possible action on a compromised system.
SHEENAM NAAZ 15
5. It sends all gathered data to a predefined E-Mail address, uploads it to a predetermined FTP
server or transfers it through a background Internet connection to a remote host.
6. It infects files, corrupts installed applications and damages the entire system.
Follow the following steps to protect your systems from Trojan Horses and backdoors:
1. Stay away from suspect websites/weblinks:
2. Surf on the Web cautiously:
3. Install antivirus/Trojan remover software:
Steganography
• Steganography is the practice of concealing (hiding) a file, message, image, or video within
another file, message, image, or video. The word steganography combines the Greek words
steganos , meaning "covered, concealed, or protected", and graphein meaning "writing".
• It is a method that attempts to hide the existence of a message or communication.
• Steganography is always misunderstood with cryptography
• The different names for steganography are data hiding, information hiding and digital
watermarking.
• Steganography can be used to make a digital watermark to detect illegal copying of digital
images. Thus, it aids confidentiality and integrity of the data.
• Digital watermarking is the process of possibly irreversibly embedding information into a
digital signal.
• The Digital signal may be, for example, audio, pictures or video.
• If the signal is copied then the information is also carried in the copy.
• In other words, when steganography is used to place a hidden “trademark” in images, music
and software, the result is a technique referred to as “watermarking”
SHEENAM NAAZ 16
Steganalysis
• Steganalysis is the art and science of detecting messages that are hidden in images,
audio/video files using steganography.
• The goal of steganalysis is to identify suspected packages and to determine whether or not
they have a payload encoded into them, and if possible recover it.
• Automated tools are used to detect such steganographed data/information hidden in the
image and audio and/or video files.
Box 4.7 | Difference between Steganography and Cryptography
Steganography is the art and science of writing hidden messages in such a way that no one apart
from the intended recipient knows the existence of the message; this is in contrast to cryptography,
of the message itself is not disguised, but the content is obscured. It is said that terrorists use where
the existence steganography techniques to hide their communication in images on the Internet;
most popular images are used such as those of film actresses or other celebrities. In its basic form,
steganography is simple.
DoS Attacks
• In this type of criminal act, the attacker floods the bandwidth of the victim’s network
or fills his E-Mail box with Spam mail depriving him of the services he is entitled to access
or provide.
• The attackers typically target sites or services hosted on high-profile web servers such
as banks, credit card payment gateways, mobile phone networks and even root name
servers.
• Buffer overflow technique is employed to commit such kind of criminal attack known as
Spoofing.
SHEENAM NAAZ 17
• The term IP address Spoofing refers to the creation of IP packets with a forged (spoofed)
source IP address with the purpose of concealing the ID of the sender or impersonating
another computing system.
• A packet is a formatted unit of data carried by a packet mode computer network.
• The attacker spoofs the IP address and floods the network of the victim with repeated
requests.
• As the IP address is fake, the victim machine keeps waiting for response from the attacker’s
machine for each request.
• This consumes the bandwidth of the network which then fails to serve the legitimate
requests and ultimately breaks down.
• The United States Computer Emergency Response Team defines symptoms of DoS
attacks to include:
1. Unusually slow network performance (opening fi les or accessing websites);
2. unavailability of a particular website;
3. inability to access any website;
4. dramatic increase in the number of Spam E-Mails received (this type of DoS attack
is termed as an E-Mail bomb).
The goal of DoS is not to gain unauthorized access to systems or data, but to prevent
intended users (i.e., legitimate users) of a service from using it.
SHEENAM NAAZ 18
3. Protocol attacks: Protocols here are rules that are to be followed to send data over network.
4. Unintentional DoS attack : This is a scenario where a website ends up denied not due to
a attack by a single individual or group of individuals, but simply due to a sudden enormous
spike in popularity.
SHEENAM NAAZ 19
5. Smurf attack: This is a type of DoS attack that floods a target system via spoofed
broadcast ping messages. This attack consists of a host sending an echo request (ping) to
a network broadcast address.
6. Nuke: Nuke is an old DoS attack against computer networks consisting of fragmented
or invalid packets sent to the target.
DDoS Attacks
• In a DDoS attack, an attacker may use your computer to attack another computer.
• By taking advantage of security vulnerabilities or weaknesses, an attacker could take
control of your computer.
• He/she could then force your computer to send huge amounts of data to a website or send
Spam to particular E-Mail addresses.
• The attack is “distributed” because the attacker is using multiple computers, including
yours, to launch the DoS attack.
• A DDoS attack is a distributed DoS wherein a large number of zombie systems are
synchronized to attack a particular system.
• The zombie systems are called “secondary victims” and the main target is called “primary
victim.”
SHEENAM NAAZ 20
• Malware can carry DDoS attack mechanisms – one of the better-known examples of this is
MyDoom.
• Botnet is the popular medium to launch DoS/DDoS attacks.
• Attackers can also break into systems using automated tools that exploit flaws in programs
that listen for connections from remote hosts.
SQL Injection
• Structured Query Language (SQL) is a database computer language designed for managing
data in relational database management systems (RDBMS).
• SQL injection is a code injection technique that exploits a security vulnerability occurring
in the database layer of an application.
• SQL injection attacks are also known as SQL insertion attacks.
• Attackers target the SQL servers – common database servers used by many organizations
to store confidential data.
SHEENAM NAAZ 21
• The prime objective behind SQL injection attack is to obtain the information while
accessing a database table that may contain personal information such as credit card
numbers, social security numbers or passwords.
• During an SQL injection attack, Malicious Code is inserted into a web form field or the
website’s code.
• For example, when a user logs in with username and password, an SQL query is sent to the
database to check if a user has valid name and password.
• With SQL injection, it is possible for an attacker to send crafted username and/or password
field that will change the SQL query.
SHEENAM NAAZ 22
1. Blah’ or 1=1-- 2.
Login:blah’ or 1=1-- 3.
Password::blah’ or 1=1--
4. http://search/index.asp?id=blah’ or 1=1--
Similar SQL commands may allow bypassing of a login and may return many rows in a
table or even an entire database table because the SQL server is interpreting the terms literally. The
double dashes near the end of the command tell SQL to ignore the rest of the command as a
comment.
SHEENAM NAAZ 23
• Keep all text boxes and form fields as short as possible to limit the length of user
input.
2. Modify error reports: SQL errors should not be displayed to outside users
3. Other preventions
• The default system accounts for SQL server 2000 should never be used.
• Isolate database server and web server.
Buffer Overflow
• Buffer overflow, or buffer overrun, is an anomaly where a process stores data in a buffer
outside the memory the programmer has set aside for it.
• This may result unreliable program behavior, including memory access errors, incorrect
results, program termination (a crash) or a breach of system security.
• Buffer overflows can be triggered by inputs that are designed to execute code or alter the
way the program operates.
• They are, thus, the basis of many software vulnerabilities and can be maliciously exploited.
Bounds checking can prevent buffer overflows.
• Programming languages commonly associated with buffer overflows include C and C++,
which provide no built-in protection against accessing or overwriting data in any part of
memory and do not automatically check that data written to an array.
• Buffer overflow occurs when a program or process tries to store more data in a buffer
(temporary data storage area) than it was intended to hold.
• Although it may occur accidentally through programming error, buffer overflow is an
increasingly common type of security attack on data integrity.
• The knowledge of C, C++ or any other high-level computer language (i.e., assembly
language) is essential to understand buffer overflow.
For example,
int main () { int
buffer[10];
buffer[20] = 10;
}
• This C program is a valid program and every compiler can compile it without any errors.
SHEENAM NAAZ 24
• However, the program attempts to write beyond the allocated memory for the buffer, which
might result in an unexpected behavior.
SHEENAM NAAZ 25
NOPs
NOP or NOOP (short form of no operation) is an assembly language instruction/ command
that effectively does nothing at all.
Heap Buffer Overflow
Heap buffer overflow occurs in the heap data area and may be introduced accidentally by
an application programmer, or it may result from a deliberate exploit. The characteristics of stack
based and heap-based programming are as follows:
1. “Heap” is a “free store” that is a memory space, where dynamic objects are allocated.
2. The heap is the memory space that is dynamically allocated new(), malloc() and calloc()
functions; it is different from the memory space allocated for stack and code.
3. Dynamically created variables (i.e., declared variables) are created on the heap before the
execution program is initialized to zero.
Memory on the heap is dynamically allocated by the application at run-time and normally
contains program data. Exploitation is performed by corrupting this data in specific ways to cause
the application to overwrite internal structures such as linked list pointers.
SHEENAM NAAZ 26
4. Dynamic run-time checks: In this scheme, an application has restricted access to prevent
attacks. This method primarily relies on the safety code being preloaded before an
application is executed. This preloaded component can either provide safer versions of the
standard unsafe functions or it can ensure that return addresses are not overwritten. One
example of such a tool is libsafe. The libsafe library provides a way to secure calls to these
functions, even if the function is not available.
SHEENAM NAAZ 27
Wireless Networks The
following are different types of “mobile workers”:
1. Tethered/remote worker: This is considered to be an employee who generally remains at
a single point of work, but is remote to the central company systems.
2. Roaming user: This is either an employee who works in an environment (e.g.,
warehousing, shop floor, etc.) or in multiple areas (e.g., meeting rooms).
3. Nomad: This category covers employees requiring solutions in semi-tethered (connected)
environments where modem use frequently.
4. Road warrior: This is the ultimate mobile user and spends little time in the office;
SHEENAM NAAZ 28
3. Wi-Fi hotspots: A hotspot is a site that offers the Internet access by using Wi-Fi technology
over a WLAN. Hotspots are found in public areas (such as coffee shops, public libraries,
hotels and restaurants) and are commonly offered facility throughout much of North
America and Europe.
• Free Wi-Fi hotspots: Wireless Internet service is offered in public areas, free of cost
and that to without any authentication.
• Commercial hotspots: The users are redirected to authentication and online payment to
avail the wireless Internet service in public areas.
4. Service Set IDentifier (SSID): It is the name of 802.11i WLAN and all wireless devices
on a WLAN must use the same SSID to communicate with each other. While setting up
WLAN, the user (or WLAN administrator) sets the SSID, which can be up to 32 characters
long so that only the users who knew the SSID will be able to connect the WLAN. It is
always advised to turn OFF the broadcast of the SSID.
5. Wired equivalence privacy (WEP): Wireless transmission is susceptible to
eavesdropping and to provide confidentiality, WEP was introduced as part of the original
802.11i Protocol in 1997. It is always termed as deprecated security algorithm for IEEE
802.11i WLANs. SSID along with WEP delivers fair amount of secured wireless network.
6. Wi-Fi protected access (WPA and WPA2): WPA was introduced as an interim standard
to replace WEP to improve upon the security features of WEP. WPA2 provides a stronger
encryption mechanism through Advanced Encryption Standard (AES), which is a
requirement for some corporate and government agencies.
7. Media access control (MAC): It is a unique identifier of each node (i.e., each network
interfaces) of the network and it is assigned by the manufacturer of a network interface card
(NIC) stored in its hardware. MAC address filtering allows only the devices with specific
MAC addresses to access the network.
Tools used for hacking wireless networks
NetStumbler: This tool is based on Windows OS and easily identifies wireless signals being
broadcast within range.
Kismet: This tool detects and displays SSIDs that are not being broadcast which 0is very critical
in finding wireless networks.
SHEENAM NAAZ 29
Airsnort: This tool is very easy and is usually used to sniff and crack WEP keys
CowPatty: This tool is used as a brute force tool for cracking WPA-PSK and is considered to be
the “New WEP” for home wireless security.
Wireshark (formerly ethereal): Ethereal can scan wireless and Ethernet data and comes with
some robust filtering capabilities. It can also be used to sniff out 802.11 management Beacons and
probes, and subsequently could be used as a tool to sniff out non-broadcast SSIDs.
SHEENAM NAAZ 30
deconstruct the older encryption technology, which is quite easy for attackers due to
continuous research in this field. Hence, the second step is to use a long and highly
randomized encryption key; this is very important. It is a little pain to remember long
random encryption; however, at the same time these keys are much harder to crack.
SHEENAM NAAZ 31
3. Warkitting:
4. WAPKitting:
5. WAPjacking:
SHEENAM NAAZ 32
1. Names of legitimate organizations: Instead of creating a phony company from
scratch, the phisher might use a legitimate company’s name and incorporate the
look and feel of its website (i.e., including the color scheme and graphics) into the
Spam E-Mail.
2. “From” a real employee: Real name of an official, who actually works for the
organization. This way, if a user contacts the organization to confirm whether
“Rajeev Arora” truly is “Vice President of Marketing” then the user gets a positive
response and feels assured.
3. URLs that “look right”: The E-Mail might contain a URL (i.e., weblink) which
seems to be original website wherein user can enter the information the phisher
would like to steal.
4. Urgent messages: Creating a fear to trigger a response is very common in Phishing
attacks – the E-Mails warn that failure to respond will result in no longer having
access to the account or E-Mails might claim that organization has detected
suspicious activity in the users’ account or that organization is implementing new
privacy software for ID theft solutions.
Here are a few examples of phrases used to entice the user to take the action.
1. “Verify your account”:
2. “You have won the lottery”:
3. “If you don’t respond within 48 hours, your account will be closed”:
Let us understand the ways to reduce the amount of Spam E-Mails we receive.
1. Share personal E-Mail address with limited people and/or on public websites – the more it
is exposed to the public, the more Spam E-Mails will be received.
2. Never reply or open any Spam E-Mails.
3. Disguise the E-Mail address on public website or groups by spelling out the sign “@” and
the DOT (.); for example, RajeevATgmailDOTcom. This usually prohibits phishers to
catch valid E-Mail addresses while gathering E-Mail addresses through programs.
4. Use alternate E-Mail addresses to register for any personal or shopping website. Never ever
use business E-Mail addresses.
SHEENAM NAAZ 33
5. Do not forward any E-Mails from unknown recipients.
6. Make a habit to preview an E-Mail before opening it.
7. Never use E-Mail address as the screen name in chat groups or rooms.
8. Never respond to a Spam E-Mail asking to remove your E-Mail address from the mailing
distribution list. More often it confirms to the phishers that your E-Mail address is active.
SHEENAM NAAZ 34
3. Employment fraud (12%): In this fraud, the attacker borrows the victim’s valid SSN to
obtain a job.
4. Government fraud (9%): This type of fraud includes SSN, driver license and income tax
fraud.
5. Loan fraud (5%): It occurs when the attacker applies for a loan on the victim’s name and
this can occur even if the SSN does not match the name exactly.
SHEENAM NAAZ 35
• Personal information:
• Routine business information:
• Private information:
2. Classified information
• Confidential: Information that requires protection and unauthorized disclosure
could damage national security (e.g., information about strength of armed forces
and technical information about weapons).
• Secret: Information that requires substantial protection and unauthorized
disclosure could seriously damage national security (e.g., national security policy,
military plans or intelligence operations).
• Top secret: Information that requires the highest degree of protection and
unauthorized disclosure could severely damage national security (e.g., vital defense
plans and cryptologic intelligence systems).
ID theft fraudsters and/or industrial/international spies target to gain the access to private,
confidential, secret and top secret information.
Techniques of ID Theft
1. Human-based methods:
• Direct access to information:
• Dumpster diving:
• Theft of a purse or wallet:
• Mail theft and rerouting:
SHEENAM NAAZ 36
• Shoulder surfing:
• Dishonest or mistreated employees:
• Telemarketing and fake telephone calls:
2. Computer-based technique:
• Backup theft:
• Hacking, unauthorized access to systems and database theft:
• Phishing:
• Pharming:
• Hardware:
SHEENAM NAAZ 37