Cyber Security Unit-5
Cyber Security Unit-5
Password Cracking
Password cracking is the process of recovering passwords from data that have been stored
in or transmitted by a computer system. A common approach (brute-force attack) is to try
guesses repeatedly for the password and check them against an available cryptographic
hash of the password. The purpose of password cracking might be to help a user recover a
forgotten password (installing an entirely new password is less of a security risk, but it
involves System Administration privileges), to gain unauthorized access to a system, or as a
preventive measure by system administrators to check for easily crack able passwords. On a
file-by-file basis, password cracking is utilized to gain access to digital evidence for which a
judge has allowed access but the particular file's access is restricted. Password cracking
refers to various measures used to discover computer passwords. This is usually
accomplished by recovering passwords from data stored in, or transported from, a computer
system. Password cracking is done by either repeatedly guessing the password, usually
through a computer algorithm in which the computer tries numerous combinations until the
password is successfully discovered. Password cracking can be done for several reasons, but
the most malicious reason is in order to gain unauthorized access to a computer without the
computer owner’s awareness. This results in cybercrime such as stealing passwords for the
purpose of accessing banking information.
Key loggers-A Key loggers is a piece of software — or, even scarier, a hardware device —
that logs every key you press on your keyboard. It can capture personal messages,
passwords, credit card numbers, and everything else you type. Key loggers are generally
installed by malware, but they may also be installed by protective parents, jealous spouses,
or employers who want to monitor their employees. Hardware Key loggers are perfect for
corporate espionage. Key loggers can pose a serious threat to users, as they can be used to
intercept passwords and other confidential information entered via the keyboard. As a
result, cybercriminals can get PIN codes and account numbers for your financial accounts,
passwords to your email and social networking accounts and then uses this information to
take your money, steal your identity and possibly extort information and money from your
friends and family.
Spyware- Spyware is the term given to a category of software which aims to steal personal
or organizational information. It is done by performing a set of operations without
appropriate user permissions, sometimes even covertly. General actions a spyware performs
include advertising, collection of personal information and changing user configuration
settings of the computer.
A Spyware is generally classified into adware, tracking cookies, system monitors and Trojans.
The most common way for a spyware to get into the computer is through freeware and
shareware as a bundled hidden component. Once a spyware gets successfully installed, it
starts sending the data from that computer in the background to some other place. These
days’ spywares are usually used to give popup advertisements based on user habits and
search history. But when a spyware is used maliciously, it is hidden in the system files of the
computer and difficult to differentiate.
One of the simplest and most popular, yet dangerous is Key loggers. It is used to record the
keystrokes which could be fatal as it can record passwords, credit card information etc. In
some shared networks and corporate computers, it is also intentionally installed to track
user activities. Presence of spyware in a computer can create a lot of other troubles as
spyware intended to monitor the computer can change user preferences, permissions and
also administrative right s, resulting in users being locked out of their own computer and in
some cases, can also result in full data losses. Spyware running in the background can also
amount to increased number of processes and result in frequent crashes. It also often slows
down a computer.
Virus- A computer virus is malicious code that replicates by copying itself to another
program, computer boot sector or document and changes how a computer works. The virus
requires someone to knowingly or unknowingly spread the infection without the knowledge
or permission of a user or system administrator. A virus can be spread by opening an email
attachment, clicking on an executable file, visiting an infected website or viewing an infected
website advertisement. It can also be spread through infected removable storage devices,
such USB drives. Once a virus has infected the host, it can infect other system software or
resources modify or disable core functions or applications, as well as copy, delete or encrypt
data. Some viruses begin replicating as soon as they infect the host, while other viruses will
lie dormant until a specific trigger causes malicious code to be executed by the device or
system.
Types of viruses
•File infectors- Some file infector viruses attach themselves to program files, usually
selected.com or .exe files. Some can infect any program for which execution is
requested, including .sys, .ovl, .prg, and .mnu files. When the program is loaded, the
virus is loaded as well. Other file infector viruses arrive as wholly contained programs
or scripts sent as an attachment to an email note.
•Resident viruses-This type of virus embeds itself in the memory of a system. The
original virus program isn't needed to infect new files or applications; even if the
original virus is deleted, the version stored in memory can be activated when the
operating system loads a specific application or function. Resident viruses are
problematic because they can evade antivirus and antimalware software by hiding in
the system's RAM.
Worms- A computer worm is a standalone malware computer program that replicates itself
in order to spread to other computers. Often, it uses a computer network to spread itself,
relying on security failures on the target computer to access it. Worms almost always cause
at least some harm to the network, even if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted computer.
Trojan Horses- A Trojan horse or Trojan is a type of malware that is often disguised as
legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain
access to users' systems. Users are typically tricked by some form of social engineering into
loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-
criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
These actions can include:
• Deleting data
•Blocking data
• Modifying data
•Copying data
• Data theft
•Website defacing
•Server hijacking
DoS Attack- A denial-of-service (DoS) is any type of attack where the attackers (hackers)
attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker
usually sends excessive messages asking the network or server to authenticate requests that
have invalid return addresses. The network or server will not be able to find the return
address of the attacker when sending the authentication approval, causing the server to wait
before closing the connection. When the server closes the connection, the attacker sends
more authentication messages with invalid return addresses. Hence, the process of
authentication and server wait will begin again, keeping the network or server busy.
DDoS Attack- A Distributed Denial of Service (DDoS) attack is an attempt to make an online
service unavailable by overwhelming it with traffic from multiple sources. They target a wide
variety of important resources, from banks to news websites, and present a major challenge
to making sure people can publish and access important information.
Buffer Overflow- A buffer overflow, or buffer overrun, is a common software coding mistake
that an attacker could exploit to gain access to your system. To effectively mitigate buffer
overflow vulnerabilities, it is important to understand what buffer overflows are, what
dangers they pose to your applications, and what techniques attackers use to successfully
exploit these vulnerabilities.
• This error occurs when there is more data in a buffer than it can handle, causing
data to overflow into adjacent storage.
• This vulnerability can cause a system crash or, worse, create an entry point for a
cyber-attack.
• Secure development practices should include regular testing to detect and fix
buffer overflows.
• These practices include automatic protection at the language level and bounds-
checking at run- time.
Attack on Wireless Networks- Wireless attacks have become a very common security issue
when it comes to networks. This is because such attacks can really get a lot of information
that is being sent across a network and use it to commit some crimes in other networks.
Every wireless network is very vulnerable to such kinds of attacks and it is therefore very
important that all the necessary security measures are taken so as to prevent the mess that
can be caused by such attacks. These attacks are normally carried out to target information
that is being shared through the networks. It is therefore very important to know of such
attacks so that one is in a position to identify it in case it happens. Some of the common
network attacks have been outlined below.
• Rogue access points-A rouge access point is basically an access point that has been
added to one's network without one's knowledge. One totally has no idea that it is
there. This is a kind of scenario that can create a kind of back door especially if one is
not conversant with it and have complete management of it. This is an access point
that can create some very huge security concerns. One is due to the fact that it can
be very easy to plug in a wireless access point in it. If one is not doing any type of
network access control protocols on one's network, it becomes very easy for
additional workstations and access points to be added onto one's network.
• Evil twin-A wireless evil twin mainly comes into play when criminals are trying to
create rogue access points so as to gain access to the network or access to
information that is being put through a network. Coming up with an evil twin is very
simple since all one need to do is purchase a wireless access point, plug it into the
network and configure it as exactly as the existing network. This is possible in open
access points that do not have any passwords associated with them. Once one comes
up with one’s access point, one plugs it into the network so that it becomes the
primary access point thus overpowering other existing access points. With this, one's
evil twin will tend to have a stronger network signal and therefore people will choose
it. Through this, the individual controlling the access point will be in a position to see
all the information being sent around the network.
• War driving-War driving is a way that bad guys use so as to find access points
wherever they can be. ith the availability of free Wi-Fi connection and other GPS
functionalities, they can drive around and obtain a very huge amount of information
over a very short period of time. One can also use some special type of software to
view all the different access points around one. With this information, an individual is
in a position to come up with a very large database which he or she can use to
determine where he or she can gain access to a wireless signal.
• Blue Jacking-Blue jacking is a kind of illegal activity that is similar to hacking where
one can be able to send unsolicited messages to another device via Bluetooth. This is
considered spam for Bluetooth and one might end up seeing some pop-up
messages on one's screen. Blue jacking is possible where a Bluetooth network is
present and it is limit end to a distance of ten meters which is the distance a
Bluetooth device can send a file to another device. It rarely depends on antennae.
Blue jacking works on the basis that it takes advantage of what is convenient for us
on our mobile devices and the convenience is being able to communicate and send
things back and forth between devices. With this, one can easily send messages to
other Bluetooth devices since no authentication is required. Some third party
software can also be used to carry out blue jacking.
•Men in the Middle Phishing-A man-in-the-middle social network attack, also known
as social network session hijacking attack, is a form of phishing in which the phisher
positions himself between the user and a legitimate social network website.
Messages intended for the legitimate social network website pass through the
phisher who can inspect the messages and acquire valuable information.