Unit 4 Nothing
Unit 4 Nothing
Cybercrime
Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Key loggers and
Spywares, Virus and Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS
Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks, Phishing and Identity
Theft: Introduction, Phishing, Identity Theft (ID Theft).
4.1 Introduction
• Different forms of attacks through which attackers target the computer systems are as
follows
1. Initial uncovering:
Two steps are involved here.
• In the first step called as reconnaissance, the attacker gathers information about the
target on the Internet websites.
• In the second step, the attacker finds the company’s internal network, such as, Internet
domain, machine names and the company’s Internet Protocol (IP) address ranges to steal
the data.
2. Network probe (investigation) :
• At the network probe stage, the attacker scans the organization information through a
<ping sweep= of the network IP addresses.
• And then a <port scanning= tool is used to discover exactly which services are running
on the target system.
• At this point, the attacker has still not done anything that would be considered as an
abnormal activity on the network or anything that can be classified as an intrusion.
3. Crossing the line toward electronic crime (E-crime):
• Once the attackers are able to access a user account, then they will attempt further
exploits to get an administrator or <root= access.
• Root access is a UNIX term and is associated with the system privileges required to run
all services and access all files on the system (readers are expected to have a basic
familiarity with Unix-based systems).
• <Root= is basically an administrator or super-user access and grants them the privileges
to do anything on the system.
4. Capturing the network:
• At this stage, the attacker attempts to <own= the network.
• The attacker gains the internal network quickly and easily by target systems.
• The next step is to remove any evidence of the attack.
• The attacker will usually install a set of tools that replace existing files and services with
Trojan files and services that have a backdoor password.
5. Grab the data:
• Now that the attacker has <captured the network,= he/she takes advantage of his/her
position to steal confidential data
6. Covering tracks:
• This is the last step in any cyberattack, which refers to the activities undertaken by the
attacker to extend misuse of the system without being detected.
• The attacker can remain undetected for long periods.
• During this entire process, the attacker takes optimum care to hide his/her identity (ID)
from the first step itself.
4.2 Proxy Servers and Anonymizers
• Proxy server is a computer on a network which acts as an intermediary for connections
with other computers on that network.
• The attacker first connects to a proxy server and establishes a connection with the target system
through existing connection with proxy.
• This enables an attacker to surf on the Web anonymously and/or hide the attack.
• A client connects to the proxy server and requests some services (such as a file, webpage)
available from a different server.
• The proxy server evaluates the request and provides the resource by establishing the connection
to the respective server and/or requests the required service on behalf of the client.
• Using a proxy server can allow an attacker to hide ID (i.e., become anonymous on the network).
A proxy server has following purposes:
1. Keep the systems behind the curtain (mainly for security reasons).
2. Speed up access to a resource (through <caching=). It is usually used to cache the webpages
from a web server.
3. Specialized proxy servers are used to filter unwanted content such as advertisements.
4. Proxy server can be used as IP address multiplexer to enable to connect number of computers
on the Internet, whenever one has only one IP address
• One of the advantages of a proxy server is that its cache memory can serve all users.
• If one or more websites are requested frequently, may be by different users, it is likely to be in
the proxy’s cache memory, which will improve user response time.
• An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet
untraceable. It accesses the Internet on the user’s behalf, protecting personal information by
hiding the source computer’s identifying information.
• Anonymizers are services used to make Web surfing anonymous by utilizing a website that acts
as a proxy server for the web client.
4.3 Phishing
• <Phishing= refers to an attack using mail programs to deceive Internet users into disclosing
confidential information that can be then exploited for illegal purposes.
• While checking electronic mail (E-Mail) one day a user finds a message from the bank
threatening to close the bank account if he/she does not reply immediately.
• Although the message seems to be suspicious from the contents of the message, it is difficult to
conclude that it is a fake/false E-Mail.
• This message and other such messages are examples of Phishing – in addition to stealing
personal and financial data – and can infect systems with viruses and also a method of online ID
theft in various cases.
• These messages look authentic and attempt to get users to reveal their personal information.
• It is believed that Phishing is an alternative spelling of <fishing,= as in <to fish for information.=
• The first documented use of the word <Phishing= was in 1996.
Nowadays, more and more organizations/institutes provide greater online access for their customers
and hence criminals are successfully using Phishing techniques to steal personal information and
conduct ID theft at a global level.
Manual password cracking is to attempt to logon with different passwords. The attacker follows the
following
steps:
1. Find a valid user account such as an Administrator or Guest;
2. create a list of possible passwords;
3. rank the passwords from high to low probability;
4. key-in each password;
5. try again until a successful password is found.
Passwords can be guessed sometimes with knowledge of the user’s personal information. Examples of
guessable passwords include:
1. Blank (none);
2. the words like <password,= <passcode= and <admin=;
3. series of letters from the <QWERTY= keyboard, for example, qwerty, asdf or qwertyuiop;
4. user’s name or login name;
5. name of user’s friend/relative/pet;
6. user’s birthplace or date of birth, or a relative’s or a friend’s;
7. user’s vehicle number, office number, residence number or mobile number;
8. name of a celebrity who is considered to be an idol (e.g., actors, actress, spiritual gurus) by the
user;
• An attacker can also create a script file (i.e., automated program) which will be executed to try
each password in a list.
• This is still considered manual cracking, is time-consuming and not usually effective.
• Passwords are stored in a database and password verification process is established into the
system when a user attempts to login or access a restricted resource.
• To ensure confidentiality of passwords, the password verification data is usually not stored in a
clear text format.
• For example, one-way function (which may be either an encryption function or a cryptographic
hash) is applied to the password, possibly in combination with other data, and the resulting value is
stored.
• When a user attempts to login to the system by entering the password, the same function is applied
to the entered value and the result is compared with the stored value. If they match, user gains the
access; this process is called authentication.
The most commonly used hash functions can be computed rapidly and the attacker can test these hashes
with the help of passwords cracking tools (see Table 4.3) to get the plain text password.
Password Cracking Tools: Default Password, Cain & Abel , John the Ripper, THC-Hydra , Aircrack-ng
LophtCrack, AirSnort , Solar Winds , Pwdump , RainbowCrack , Brutus
Weak passwords:
A weak password is one,which could be easily guessed,short,common and a system default password
that could be easily found by executing a brite force attack and by using a subset of all possible
passwords.
Strong Passwords:
A strong password is long enough, random or otherwise difficult to guess-producible only by the user
who chooses it
• Contain both upper and lower case characters (e.g., a-z, A-Z)
• Have digits and punctuation characters as well as letters e.g., 0-9, @#$%^&*()_+|~-
=\`{}[]:";'<>?,./)
• Are at least eight alphanumeric characters long.
• Are not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc.
• Passwords should never be written down or stored on-line.
• Try to create passwords that can be easily remembered.
• One way to do this is create a password based on a song title, affirmation, or other phrase.
• For example, the phrase might be: "This May Be One Way To Remember" and the password
could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.
Random passwords
Secure Password Generator
Password Length, Include Symbols ( e.g. @#$% ) , Include Numbers: ( e.g. 123456 ) , Include
Lowercase Characters: ( e.g. abcdefgh ) ,Include Uppercase Characters: ( e.g. ABCDEFGH ),
Exclude Similar Characters: ( e.g. i, l, 1, L, o, 0, O ) ,Exclude Ambiguous Characters: ( { } [ ] ( ) / \ '
" ` ~ , ; : . < > ) , Generate On The Client Side: ( do NOT send across the Internet ) , Auto-Select: (
select the password automatically ) , Save My Preference: ( save all the settings above for later use ) ,
Load My Settings Anywhere: URL to load my settings on other computers quickly , Your New
Password: Remember your password: Remember your password with the first letters of each word
in this sentence.
To prevent your passwords from being hacked by social engineering, brute force or dictionary attack
method, you should notice that:
1. Do not use the same password for multiple important accounts.
2. Use a password that has at least 16 characters, use at least one number, one uppercase letter, one
lowercase letter and one special symbol.
3. Do not use the names of your families, friends or pets in your passwords.
4. Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers, social security
numbers, and so on in your passwords.
5. Do not use any dictionary word in your passwords.
6. Do not use something that can be cloned( but you can't change ) as your passwords, such as your
fingerprints.
7. Do not let your Web browsers( FireFox, Chrome, Safari, Opera, IE ) store your passwords, since
all passwords saved in Web browsers can be revealed easily.
8. Do not log in to important accounts on the computers of others, or when connected to a public Wi-
Fi hotspot, Tor, free VPN or web proxy.
9. Do not send sensitive information online via HTTP or FTP connections, because messages in these
connections can be sniffed with very little effort. You should use encrypted connections such as
HTTPS and SFTP whenever possible.
10. It's recommended to change your passwords every 10 weeks.
11. Be careful when using online paste tools and screen capture tools, do not let them to upload your
passwords to the cloud.
12. If there are important files on your computer, and it can be accessed by others, check if there are
hardware keyloggers( e.g. wireless keyboard sniffer ), software keyloggers and hidden cameras when
you feel it's necessary.
Password guidelines.
1. Passwords used for business E-Mail accounts, personal E-Mail accounts and banking/financial user
accounts should be kept separate.
2. Passwords should be of minimum eight alphanumeric characters (common names or phrases should
be phrased).
3. Passwords should be changed every 30/45 days.
4. Passwords should not be shared with relatives and/or friends.
5. Password used previously should not be used while renewing the password.
6. Passwords of personal E-Mail accounts and banking/financial user accounts should be changed
from a secured system, within couple of days, if these E-Mail accounts has been accessed from public
Internet facilities such as cybercafes/hotels/libraries.
7. Passwords should not be stored under mobile phones/PDAs, as these devices are also prone to
cyberattacks.
8. In case E-Mail accounts/user accounts have been hacked, respective agencies/institutes should be
contacted immediately.
4.5.3 Spywares
• Spyware is a type of malware (i.e., malicious software) that is installed on computers which
collects information about users without their knowledge.
• The presence of Spyware is typically hidden from the user; it is secretly installed on the user’s
personal computer.
• Sometimes, however, Spywares such as keyloggers are installed by the owner of a shared,
corporate or public computer on purpose to secretly monitor other users.
• A worm spreads itself automatically to other computers through networks by exploiting security
vulnerabilities, whereas a Trojan is a code/program that appears to be harmless but hides malicious
functions.
• Worms and Trojans, such as viruses, may harm the system’s data or performance.
• Some viruses and other malware have noticeable symptoms that enable computer user to take
necessary corrective actions, but many viruses are surreptitious or simply do nothing for user’s to
take note of them.
• Some viruses do nothing beyond reproducing themselves.
4.7.1 Backdoor
• A backdoor is a means of access to a computer program that bypasses security mechanisms. A
programmer may sometimes install a backdoor so that the program can be accessed for
troubleshooting or other purposes.
• However, attackers often use backdoors that they detect or install themselves as part of an exploit.
• In some cases, a worm is designed to take advantage of a backdoor created by an earlier attack.
• A backdoor works in background and hides from the user.
• It is very similar to a virus and, therefore, is quite difficult to detect and completely disable.
• A backdoor is one of the most dangerous parasite, as it allows a malicious person to perform any
possible action on a compromised system.
Follow the following steps to protect your systems from Trojan Horses and backdoors:
4.8 Steganography
• Steganography is the practice of concealing (hiding) a file, message, image, or video within another
file, message, image, or video. The word steganography combines the Greek words
steganos , meaning "covered, concealed, or protected", and graphein meaning "writing".
• It is a method that attempts to hide the existence of a message or communication.
• Steganography is always misunderstood with cryptography
• The different names for steganography are data hiding, information hiding and digital
watermarking.
• Steganography can be used to make a digital watermark to detect illegal copying of digital images.
Thus, it aids confidentiality and integrity of the data.
• Digital watermarking is the process of possibly irreversibly embedding information into a digital
signal.
• The Digital signal may be, for example, audio, pictures or video.
• If the signal is copied then the information is also carried in the copy.
• In other words, when steganography is used to place a hidden <trademark= in images, music and
software, the result is a technique referred to as <watermarking=
4.8.1 Steganalysis
• Steganalysis is the art and science of detecting messages that are hidden in images, audio/video
files using steganography.
• The goal of steganalysis is to identify suspected packages and to determine whether or not they
have a payload encoded into them, and if possible recover it.
• Automated tools are used to detect such steganographed data/information hidden in the image
and audio and/or video files.
•In this type of criminal act, the attacker floods the bandwidth of the victim’s network or fills
his E-Mail box with Spam mail depriving him of the services he is entitled to access or provide.
• The attackers typically target sites or services hosted on high-profile web servers such as
banks, credit card payment gateways, mobile phone networks and even root name servers
• Buffer overflow technique is employed to commit such kind of criminal attack known as
Spoofing.
• The term IP address Spoofing refers to the creation of IP packets with a forged (spoofed) source
IP address with the purpose of concealing the ID of the sender or impersonating another
computing system.
• A packet is a formatted unit of data carried by a packet mode computer network.
• The attacker spoofs the IP address and floods the network of the victim with repeated requests.
• As the IP address is fake, the victim machine keeps waiting for response from the attacker’s
machine for each request.
• This consumes the bandwidth of the network which then fails to serve the legitimate requests
and ultimately breaks down.
• The United States Computer Emergency Response Team defines symptoms of DoS attacks to
include:
1. Unusually slow network performance (opening fi les or accessing websites);
2. unavailability of a particular website;
3. inability to access any website;
4. dramatic increase in the number of Spam E-Mails received (this type of DoS attack is termed as
an E-Mail bomb).
The goal of DoS is not to gain unauthorized access to systems or data, but to prevent intended users
(i.e., legitimate users) of a service from using it.
A DoS attack may do the following:
1. Flood a network with traffic, thereby preventing legitimate network traffic.
2. Disrupt connections between two systems, thereby preventing access to a service.
3. Prevent a particular individual from accessing a service.
4. Disrupt service to a specific system or person.
1 Jolt2 : The vulnerability allows remote attackers to cause a DoS attack against Windows-based
machines – the attack causes the target machine to consume of the CPU time on processing of illegal
packets.
2 Nemesy : This program generates random packets of spoofed source IP to enable the attacker to
launch DoS attack.
3 Targa : It is a program that can be used to run eight diff erent DoS attacks. Th e attacker has the
option to launch either individual attacks or try all the attacks until one is successful.
4 Crazy Pinger : This tool could send large packets of ICMP(Internet Control Message Protocol) to a
remote target network.
5 SomeTrouble: It is a remote flooder and bomber. It is developed in Delphi.
• In a DDoS attack, an attacker may use your computer to attack another computer.
• By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of
your computer.
• He/she could then force your computer to send huge amounts of data to a website or send Spam
to particular E-Mail addresses.
• The attack is <distributed= because the attacker is using multiple computers, including yours, to
launch the DoS attack.
• A DDoS attack is a distributed DoS wherein a large number of zombie systems are
synchronized to attack a particular system.
• The zombie systems are called <secondary victims= and the main target is called <primary
victim.=
• Malware can carry DDoS attack mechanisms – one of the better-known examples of this is
MyDoom.
• Botnet is the popular medium to launch DoS/DDoS attacks.
• Attackers can also break into systems using automated tools that exploit flaws in programs that
listen for connections from remote hosts.
Computer Emergency Response Team Coordination Center (CERT/CC) offers many preventive
measures from being a victim of DoS attack.
1. Implement router filters. This will lessen your exposure to certain DoS attacks.
2. If such filters are available for your system, install patches to guard against TCP SYN flooding.
3. Disable any unused or inessential network service.
4. Enable quota systems on your OS if they are available.
5. Observe your system’s performance and establish baselines for ordinary activity.
6. Routinely examine your physical security with regard to your current needs.
7. Use Tripwire or a similar tool to detect changes in configuration information or other files.
8. Invest in and maintain <hot spares= – machines that can be placed into service quickly if a similar
machine is disabled.
9. Invest in redundant and fault-tolerant network configurations.
10. Establish and maintain regular backup schedules
11. Establish and maintain appropriate password policies
Here are few examples of variable field text the attacker uses on a webpage to test for SQL
vulnerabilities:
1. Blah’ or 1=1--
2. Login:blah’ or 1=1--
3. Password::blah’ or 1=1--
4. http://search/index.asp?id=blah’ or 1=1--
Similar SQL commands may allow bypassing of a login and may return many rows in a table or even
an entire database table because the SQL server is interpreting the terms literally. The double dashes
near the end of the command tell SQL to ignore the rest of the command as a comment.
The attacker may exploit stack-based buffer overflows to manipulate the program in various ways by
overwriting:
1. A local variable that is near the buffer in memory on the stack to change the behavior of the
program that may benefit the attacker.
2. The return address in a stack frame. Once the function returns, execution will resume at the return
address as specified by the attacker, usually a user input-filled buffer.
3. A function pointer, or exception handler, which is subsequently executed.
NOPs
NOP or NOOP (short form of no operation) is an assembly language instruction/ command that
effectively does nothing at all.
Heap Buffer Overflow
Heap buffer overflow occurs in the heap data area and may be introduced accidentally by an
application programmer, or it may result from a deliberate exploit. The characteristics of stack- based
and heap-based programming are as follows:
1. <Heap= is a <free store= that is a memory space, where dynamic objects are allocated.
2. The heap is the memory space that is dynamically allocated new(), malloc() and calloc() functions;
it is different from the memory space allocated for stack and code.
3. Dynamically created variables (i.e., declared variables) are created on the heap before the execution
program is initialized to zero.
Memory on the heap is dynamically allocated by the application at run-time and normally contains
program data. Exploitation is performed by corrupting this data in specific ways to cause the
application to overwrite internal structures such as linked list pointers.
A. Spam E-Mails
• Also known as <junk E-Mails= they involve nearly identical messages sent to numerous recipients.
Spam E-Mails have steadily grown since the early 1990s. Botnets, networks of virus-infected
computers, are used to send about 80% of Spam.
• Types of Spam E-Mails are as follows:
1. Unsolicited bulk E-Mail (UBE): It is synonym for SPAM unsolicited E-Mail sent in large
quantities (see Box 5.2).
2. Unsolicited commercial E-Mail (UCE): Unsolicited E-Mails are sent in large quantities from
commercial perspective, for example, advertising. See Box 5.3 to know more about US Act on Spam
mails.
Examples:
1. HSBC, Santander, CommonWealth Bank: International Banks having large customer base,
phishers always dive deep in such ocean to attempt to hook the fi sh.
2. eBay: It is a popular auction site, often mimicked to gain personal information.
3. Amazon: It was the top brand to be exploited by phishers till July 2009.
4. Facebook: Netizens, who liked to be on the most popular social networking sites such as Facebook,
are always subject to threats within Facebook as well as through E-Mail. One can reduce chances of
being victim of Phising attack by using the services – security settings to enable contact and E-Mail
details as private.
The E-Mail will usually ask the user to provide valuable information about himself /herself or to
<verify= information that the user may have provided in the past while registering for online account.
To maximize the chances that a recipient will respond, the phisher might employ any or all of the
following tactics:
1. Names of legitimate organizations: Instead of creating a phony company from scratch, the phisher
might use a legitimate company’s name and incorporate the look and feel of its website (i.e., including
the color scheme and graphics) into the Spam E-Mail.
2. <From= a real employee: Real name of an official, who actually works for the organization. This
way, if a user contacts the organization to confirm whether <Rajeev Arora= truly is <Vice President of
Marketing= then the user gets a positive response and feels assured.
3. URLs that <look right=: The E-Mail might contain a URL (i.e., weblink) which seems to be
original website wherein user can enter the information the phisher would like to steal.
4. Urgent messages: Creating a fear to trigger a response is very common in Phishing attacks – the E-
Mails warn that failure to respond will result in no longer having access to the account or E-Mails
might claim that organization has detected suspicious activity in the users’ account or that organization
is implementing new privacy software for ID theft solutions.
Here are a few examples of phrases used to entice the user to take the action.
1. <Verify your account=:
2. <You have won the lottery=:
3. <If you don’t respond within 48 hours, your account will be closed=:
Let us understand the ways to reduce the amount of Spam E-Mails we receive.[11]
1. Share personal E-Mail address with limited people and/or on public websites – the more it is
exposed to the public, the more Spam E-Mails will be received.
2. Never reply or open any Spam E-Mails.
3. Disguise the E-Mail address on public website or groups by spelling out the sign <@= and the DOT
(.); for example, RajeevATgmailDOTcom. This usually prohibits phishers to catch valid E-Mail
addresses while gathering E-Mail addresses through programs.
4. Use alternate E-Mail addresses to register for any personal or shopping website. Never ever use
business E-Mail addresses.
5. Do not forward any E-Mails from unknown recipients.
6. Make a habit to preview an E-Mail before opening it.
7. Never use E-Mail address as the screen name in chat groups or rooms.
8. Never respond to a Spam E-Mail asking to remove your E-Mail address from the mailing
distribution list. More often it confirms to the phishers that your E-Mail address is active.
2. Classified information
• Confidential: Information that requires protection and unauthorized disclosure could damage
national security (e.g., information about strength of armed forces and technical information about
weapons).
• Secret: Information that requires substantial protection and unauthorized disclosure could
seriously damage national security (e.g., national security policy, military plans or intelligence
operations).
• Top secret: Information that requires the highest degree of protection and unauthorized
disclosure could severely damage national security (e.g., vital defense plans and cryptologic
intelligence systems).
ID theft fraudsters and/or industrial/international spies target to gain the access to private, confidential,
secret and top secret information.