Cyber 2
Cyber 2
Cyber Offenses:
How Criminals Plan Them
CYBER SECURITY BY SARTHAK
Hacking, Industrial Espionage, Network Intrusion, Password Sniffing, Computer Viruses are
Cyber Offenses: How Criminals Plan them store data, contacts, account information, etc.
Hacker
A Hacker is a person with strong Interest in computers who
enjoys learning and experimenting with them. Hackers are
usually very talented, smart peoples who understand
computer better than others.
CYBER SECURITY
BY SARTHAK
CYBER SECURITY BY SARTHAK
Brute Force
Attack/Hacking
It is an technique used by the Hacker/Attacker to find
passwords or encryption keys.
• It involves every combinations of letters, digits, special
characters until the code is broken
8
Cracker
A Cracker is a person who breaks into any computer/server.
Cracker is usually connected to computer criminals.
CYBER SECURITY
BY SARTHAK
9
Cracker, 1
Cracker
Cracking And A person who breaks into the computer is known
its Tools
as Cracker. e.g. Vandalism, theft, etc.
Roadmap of Cracking 2
Cracking
What is Cracking, What is Cracking and What The act of breaking into computers/servers is
3
Cracker Tools
Tools that are used to break into the
computers/servers. e.g. Virus, Trojan Horse, etc.
CYBER SECURITY BY SARTHAK
CYBER SECURITY
BY SARTHAK
10
Phreaking
This is the notorious art of breaking into phone and other
communication systems. Phreaking websites are very
popular among the Crackers and other criminals.
CYBER SECURITY
BY SARTHAK
11
Vulnerabilities
The categories of vulnerability that hackers typically
search for are the following :
CYBER SECURITY
BY SARTHAK
Different Hats
Different Hats in Cyber Security
As per Edward De Bono, in his Book “The Six Thinking Hats”, he mentioned 6 hats of Hackers,
Four of the following are given below:
Black Hat Hacker White Hat Hacker Grey Hat Hacker Red Hat Hacker
Cracker/Dark Side Hacker/ Ethical Hacker/ Both Ethical Hacker and Hacker that thinks before
Criminal Hacker Positive Side Hacker Criminal Hacker committing a malice or
non-malice deed
Categories of
Cyber Crimes
1. Crimes Targeted at Individual: Cyber Crimes targeted at a
particular Individual and exploit human weakness, e.g.
Phishing.
2. Crimes Targeted at Property: Cyber Crimes targeted at a
particular cyber property, e.g. Stealing Mobile Phones.
3. Crimes Targeted at Organization: Cyber Crimes targeted
at a particular organization, government or Military
maintained websites. e.g. stealing country’s data.
1. Single Event of Cybercrime: It is the single event of crime
from the perspective of victim. e.g. Fraud.
2. Series of Events of Cybercrime: It is series of events of
crime from the perspective of victim. e.g. Cyberstalking.
Categories of
Cyber Attacks
1. Active Attack: The Attacks in which the attacker directly
engages with the victim is known as Active Attack. It
affects the Availability, Integrity, e.g. DoS Attack
1. Passive Attack: The Attacks in which the attacker doesn’t
directly engages with the victim in known as Passive
Attack. e.g. Doing Reconnaissance on the Target
CYBER SECURITY BY SARTHAK 15
Passive Attacks
Information Gathering in which attackers gather
Information of Individual/Company/
Organization without letting the victim know
about it or without his/her knowledge.
.e.g. Google or Yahoo Search, Smurfing Social
Media to gain information, Blogs, newspaper,
etc.
1 2 3
Reconnaissance/
Information
Gathering
“Reconnaissance” is the act of reconnoitering – explore, often
with a goal of finding something or somebody.
In Hacking, this phase starts with Footprinting
Footprinting: It is the preparation act for pre-attack process
in which attackers find out the victim’s environment,
computer architecture, and how can he intrude into that.
19
Scanning and
Scrutinizing Info
Scanning is the key step to examine the intelligently while
gathering information about the target. The objectives of
scanning are as follows:
CYBER SECURITY
• Network resources and or/shared resources.
BY SARTHAK
• OS and different application running that OS.
20
Ports
A port is an interface to which one can connect a device.
TCP/IP made two protocol that is used universally to
communicate all over the internet
1. TCP
2. UDP
Each of these have ports 0 to 65536 to communicate
Port Scanning
With Port Scanning we can find doors to go in and out
Port Scanning is used to find all the doors by sending
packets.
CYBER SECURITY
BY SARTHAK
• Open: Listening on the Port
• Closed: Port is closed.
• Filtered/Blocked: No reply from the Host
CYBER SECURITY BY SARTHAK 21
Attack
Gaining and Maintaining Access
Engineering
Social Engineers exploit the “Human Tendency” of a person to trust social engineers word, and
exploiting it.
Social Engineers mostly uses VoIP or VoWIFI for telecommunication and Internet to
Cyber Offenses: How Criminals Plan them communicate with the Victim.
Classification of Social Engineering
Human based Social Engineering
1 2 3
4 5 6
1 2 3
Offline Stalkers
The attacker use traditional ways such as
following the victim, watching the daily routine
of the victim, etc. Searching on message
boards/newsgroup, personal websites, blogs,
etc. to gain the information about victim. The
victim is not aware that the internet is used to Online Stalkers Offline Stalkers
perpetuate an attack against them.
(Continued)
28
Cases Reported On
Cyber Stalk
Majority of Time the Case Reported on Cyber Stalking, the victims
are Women and Men are stalkers and mostly cases are sex-cyber-
stalking. But there are many cases of attacker being a stranger.
How Stalking
Works ?
1. Personal Information Gathering about the Victim
2. Establish a contact with the victim through E-Mail or
Telephone, the stalker can use multiple names.
1. Some stalkers keep on sending repeated E-Mails for asking
various kinds of favors or threaten the victim.
CYBER SECURITY
BY SARTHAK
2. Posting Victim’s Personal Information on Web
3. Information used by Public/Internet User for different deeds
CYBER SECURITY BY SARTHAK
CYBER SECURITY
BY SARTHAK
CYBER SECURITY BY SARTHAK
Bots are the automated programs for doing some particular task,
often over a network. It is a term used for collection of software robots,
or bots that run automatically and
autonomously.
Attack Vectors
Cyber Offenses: How Criminals Plan them
36
Attack Vector
An attack vector is the path by which the attacker gains
access. Attack vectors enables the attacker to exploit
vulnerabilities, including the human element.
CYBER SECURITY
Vectors)
BY SARTHAK
37
Attack Vector
(Continued)
CYBER SECURITY
6. Attack of the Worms: Many worms are delivered through
BY SARTHAK
email attachments but network worms uses holes in the
network directly.
38
Attack Vector
(Continued)
CYBER SECURITY
BY SARTHAK