Module 1 _Final_CSLP
Module 1 _Final_CSLP
Cyber Crime:
hours:08
Topics
Definition and Origin of the Word
Salami technique Data
Cyber Crime and Information Diddling
Security Forgery
who are Cyber Criminals Newsgroup Spam
Classification of Cybercrimes Online Frauds
E-mail Spoofing
Pornographic Offenders
Email Bombing
Spamming Password Sniffing
Cyber Defamation Credit Card Frauds.
Internet Time Theft
Salami Attack
Original
User
Flipkart
Fake_FlipK
art
Tips To Prevent Credit Card Fraud
Do’s Don'ts
Store card no and PIN no
Put signature on back side of
together.
card.
Give your card to anyone.
Use Help line No.
Leave card or transaction
Change password regularly.
receipt laying around.
Ensure the legitimacy of the Don’t sign blank receipt.
website before using the
Write a card no /pin no on
card.
postcard or the outside
of an envelope.
Give out immediately your
number over phone.
Vishing
Vishing is combination of mobile phone and
VoIP.
Smart phone with VoIP s/w.
Vishing is used to steal credit card number or
other related data used in ID theft scheme.
Vishing attack includes
- ID theft.
- Purchasing money / funds.
- Transferring money /funds.
- Monitoring the victims’s bank account.
- making application for loan and credit card.
How Vishing works
Internet E mail.
Mobile Text Messaging.
Voicemail.
Direct phone call.
- Gathering contact no.
- Use war dialer to contact with victim.
- Use automatic answer m/c to alert to user about
the future financial fraud.
- User is provided with contact no.
- When user call on contact no., he is asked to provide a
financial details/credit card details.
- When user target provide financial details , he will be
targated by attacker.
How to protect from vishing attack
SMS phishing.
Attacker send tempt message to victim.
Asking victim to either call on provided no or
connected with bogus website.
Using social engg. skill obtain all financial info.
How to protect from smishing attack.
- Do not answer a text message that you
have
received asking Personal Information.
- Avoid calling any phone no.
- Do not click on any link on mobile phone.
- Ex Visiting card , which contain message in the name field.
- If user could not recognize the message then he will add message
in the contact list. Later attacker contact with victim as a
legitimate user.
If attacker sends the message then user will open it bcz he may
treat it as a legitimate message.
Bluetooth hacking tool
BlueScanner :
1. Search for bluetooth device.
2. Extract the information from newly discover
device.
BlueSniff : It is use to discover and hidden
Bluetooth enable device.
Bluesnarfer : This tools makes it possible to
connect to phone without alerting owner and to
gain access to restricted portion /sensitive info.
( Bluetooth should be on)
BlueDriving : It is testing Bluetooth penetration.
Bluetooth Attack
Bluejacking : ( Bluetooth and
jacking :”hijack”).
- Attacker send unsolicited message to
bluetooth enable device.
Bluesnarfing : It is unauthorized access
from wireless device through Bluetooth
connection between cell phone,PDA and
computer.
- It allow attacker to access calender ,SMS
and E-mail as well as allow copy images.