Module 2
Module 2
RashtreeyaSikshanaSamithi Trust
Prepared By
Dr. Vikash Kumar
Department of ECE
RV Institute of Technology & Management
Unit -II: Cyber Offenses
How Criminals Plan Them – Introduction, How Criminals Plan The Attacks, Social Engineering,
and Cyber Stalking, Cyber Cafe And Cybercrimes, Botnets: The Fuel For Cybercrime, Attack
Vector Cloud Computing.
The categories of vulnerabilities that hackers typically search for are the following:
o Inadequate border protection (border as in the sense of network periphery);
o remote access servers (RASs) with weak access controls;
Introduction to Cyber Security (22ETC154/254) 2|Page
o application servers with well-known exploits;
o misconfigured systems and systems with default configurations.
To help the reader understand the network attack scenario, Fig. above illustrates a small
network highlighting specific occurrences of several vulnerabilities described above.
Reconnaissance
The literal meaning of “Reconnaissance” is an act of finding something or somebody
(especially to gain information about an enemy or potential enemy).
In the world of “hacking,” reconnaissance phase begins with “Footprinting” – this is the
preparation toward pre-attack phase, and involves accumulating data about the target’s
environment and computer architecture to find ways to intrude into that environment.
Footprinting gives an overview about system vulnerabilities and provides a judgment
about possible exploitation of those vulnerabilities.
The objective of this preparatory phase is to understand the system, its networking ports
and services, and any other aspects of its security that are needful for launching the
attack.
Thus, an attacker attempts to gather information in two phases: passive and active
attacks. Let us understand these two phases.
Passive Attacks
A passive attack involves gathering information about a target without his/her (individual’s
or company’s) knowledge. It can be as simple as watching a building to identify what time
employees enter the building premises. However, it is usually done using Internet searches or by
Googling (i.e., searching the required information with the help of search engine Google) an
individual or company to gain information.
1. Google or Yahoo search: People search to locate information about employees.
2. Surfing online community groups like Orkut/Facebook will prove useful to gain the
information about an individual.
3. Organization’s website may provide a personnel directory or information about key
employees, for example, contact details, E-Mail address, etc. These can be used in a
social engineering attack to reach the target.
4. Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain
information about the company or employees.
5. Going through the job postings in particular job profiles for technical persons can provide
information about type of technology, that is, servers or infrastructure devices a company
maybe using on its network.
Social Engineering
Social engineering is the “technique to influence” and “persuasion to deceive” people to
obtain the information or perform some action.
Social engineers exploit the natural tendency of a person to trust social engineers’ word,
rather than exploiting computer security holes.
It is generally agreed that people are the weak link in security and this principle makes
social engineering possible.
A social engineer usually uses telecommunication (i.e., telephone and/or cell phone) or
Internet to get them to do something that is against the security practices and/or policies
of the organization.
Social engineering involves gaining sensitive information or unauthorized access
privileges by building inappropriate trust relationships with insiders.
It is an art of exploiting the trust of people, which is not doubted while speaking in a
normal manner.
Cyberstalking
The dictionary meaning of “stalking” is an “act or process of following prey stealthily –
trying to approach somebody or something.”
Cyberstalking has been defined as the use of information and communications
technology, particularly the Internet, by an individual or group of individuals to harass
another individual, group of individuals, or organization.
The behavior includes false accusations, monitoring, transmission of threats, ID theft,
damage to data or equipment, solicitation of minors for sexual purposes, and gathering
information for harassment purposes.
Cyberstalking refers to the use of Internet and/or other electronic communications
devices to stalk another person.
It involves harassing or threatening behavior that an individual will conduct
repeatedly, for example, following a person, visiting a person’s home and/or at business
place, making phone calls, leaving written messages, or vandalizing against the person’s
property. As the Internet has become an integral part of our personal and professional
Types of Stalkers
There are primarily two types of stalkers.
1. Online stalkers:
They aim to start the interaction with the victim directly with the help of the Internet.
E-Mail and chat rooms are the most popular communication medium to get connected
with the victim, rather than using traditional instrumentation like telephone/cell
phone.
The stalker makes sure that the victim recognizes the attack attempted on him/her.
The stalker can make use of a third party to harass the victim.
2. Offline stalkers:
The stalker may begin the attack using traditional methods such as following the
victim, watching the daily routine of the victim, etc.
Searching on message boards/newsgroups, personal websites, and people finding
services or websites are most common ways to gather information about the victim
using the Internet.
The victim is not aware that the Internet has been used to perpetuate an attack against
them.
Attack Vector
An “attack vector” is a path, which an attacker can gain access to a computer or to a
network server to deliver a payload or malicious outcome.
Attack vectors enable attackers to exploit system vulnerabilities, including the human
element.
Attack vectors include viruses, E-Mail attachments, webpages, pop-up windows, instant
messages, chat rooms, and deception. All of these methods involve programming (or, in a
few cases, hardware), except deception, in which a human operator is fooled into
removing or weakening system defenses.
To some extent, firewalls and antivirus software can block attack vectors.
However, no protection method is totally attack-proof.
A defense method that is effective today may not remain so for long because attackers are
constantly updating attack vectors, and seeking new ones, in their quest to gain
unauthorized access to computers and servers. Refer to Box 2.10.
1. Attack by E-Mail: The content is either embedded in the message or linked to by the
message. Sometimes attacks combine the two vectors, so that if the message does not get
you, the attachment will. Spam is almost always carrier for scams, fraud, dirty tricks, or
malicious action of some kind. Any link that offers something “free” or tempting is a
suspect.
2. Attachments (and other files): Malicious attachments install malicious computer code.
The code could be a virus, Trojan Horse, Spyware, or any other kind of malware.
Attachments attempt to install their payload as soon as you open them.
3. Attack by deception: Deception is aimed at the user/operator as a vulnerable entry point.
It is not just malicious computer code that one needs to monitor. Fraud, scams, and to
some extent Spam, not to mention viruses, worms and such require the unwitting
cooperation of the computer’s operator to succeed. Social engineering are other forms of
deception that are often an attack vector too.
4. Hackers: Hackers/crackers are a formidable attack vector because, unlike ordinary
Malicious Code, people are flexible and they can improvise. Hackers/crackers use variety
of hacking tools, heuristics, Cyberoffenses: How and social engineering to gain access to
computers and online accounts. They often install a Trojan Horse to commandeer the
computer for their own use.
5. Heedless guests (attack by webpage): Counterfeit websites are used to extract personal
information. Such websites look very much like the genuine websites they imitate. One
may think he/she is doing business with someone you trust. However, he/she is really
giving their personal information, like address, credit card number, and expiration date.
They are often used in conjunction with Spam, which gets you there in the first place. Pop-
up webpages may install Spyware, Adware or Trojans.
6. Attack of the worms: Many worms are delivered as E-Mail attachments, but network
worms use holes in network protocols directly. Any remote access service, like file