Module 3
Module 3
Prepared By
Dr. Vikash Kumar
Department of ECE
RV Institute of Technology & Management
Module 3: Tools and Methods used in Cybercrime
Introduction, Proxy Servers And Anonymizers, Phishing, Password Cracking, Key Loggers
And Spywares, Virus And Worms, Trojan Horses And Backdoors, Steganography, DoS And
DDoS Attacks, Attacks On Wireless Networks.
Introduction
Different forms of attacks through which attackers target the computer systems are as
follows:
1. Initial uncovering:
Two steps are involved here.
i. In the first step called as reconnaissance, the attacker gathers information
about the target on the Internet websites.
ii. In the second step, the attacker finds the company’s internal
network, such as, Internet domain, machine names and the company’s
Internet Protocol (IP) address ranges to steal the data.
2. Network probe (investigation):
At the network probe stage, the attacker scans the organization information
through a “ping sweep” of the network IP addresses.
Then a “port scanning” tool is used to discover exactly which services are running
on the target system.
At this point, the attacker has still not done anything that would be
considered as an abnormal activity on the network or anything that can be
classified as an intrusion.
Page | 1
Module 3: Tools and Methods used in Cybercrime
Page | 2
Module 3: Tools and Methods used in Cybercrime
Page | 3
Module 3: Tools and Methods used in Cybercrime
Phishing
“Phishing” refers to an attack using mail programs to deceive Internet users into disclosing
confidential information that can be then exploited for illegal purposes.
While checking electronic mail (E-Mail) one day a user finds a message from the bank
threatening to close the bank account if he/she does not reply immediately.
Although the message seems to be suspicious from the contents of the message, it is
difficult to conclude that it is a fake/false E-Mail.
This message and other such messages are examples of Phishing – in addition to stealing
personal and financial data – and can infect systems with viruses and also a method of
online ID theft in various cases.
These messages look authentic and attempt to get users to reveal their personal
information.
It is believed that Phishing is an alternative spelling of “fishing,” as in “to fish for
information.”
The first documented use of the word “Phishing” was in 1996.
Page | 4
Module 3: Tools and Methods used in Cybercrime
Password Cracking
Password is like a key to get an entry into computerized systems like a lock.
Password cracking is a process of recovering passwords from data that have been stored
in or transmitted by a computer system.
Usually, an attacker follows a common approach – repeatedly making guesses for
the password.
The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system administrators to check for easily crackable
passwords.
3. To gain unauthorized access to a system.
Manual password cracking is to attempt to logon with different passwords. The attacker
follows the following steps:
1. Find a valid user account such as an Administrator or Guest;
2. create a list of possible passwords;
3. rank the passwords from high to low probability;
4. key-in each password;
5. try again until a successful password is found.
Passwords can be guessed sometimes with knowledge of the user’s personal
information. Examples of guessable passwords include:
1. Blank (none);
2. the words like “password,” “passcode” and “admin”;
3. series of letters from the “QWERTY” keyboard, for example, qwerty, asdf or
qwertyuiop;
4. user’s name or login name;
5. name of user’s friend/relative/pet;
6. user’s birthplace or date of birth, or a relative’s or a friend’s;
7. user’s vehicle number, office number, residence number or mobile number;
8. name of a celebrity who is considered to be an idol (e.g., actors, actress, spiritual gurus)
by the user;
Page | 5
Module 3: Tools and Methods used in Cybercrime
An attacker can also create a script file (i.e., automated program) which will be executed
to try each password in a list.
This is still considered manual cracking, is time-consuming and not usually effective.
Passwords are stored in a database and password verification process is established into
the system when a user attempts to login or access a restricted resource.
To ensure confidentiality of passwords, the password verification data is usually
not stored in a clear text format.
For example, one-way function (which may be either an encryption function
or a cryptographic hash) is applied to the password, possibly in combination with other
data, and the resulting value is stored.
When a user attempts to login to the system by entering the password, the same function
is applied to the entered value and the result is compared with the stored value. If they
match, user gains the access; this process is called authentication.
The most commonly used hash functions can be computed rapidly and the attacker can test
these hashes with the help of passwords cracking tools (see Table 4.3) to get the plain text
password.
Password cracking attacks can be classified under three categories as follows:
1. Online attacks;
2. offline attacks;
3. non-electronic attacks (e.g., social engineering, shoulder surfing and dumpster diving).
Online Attacks
An attacker can create a script file that will be executed to try each password in a list and
when matches, an attacker can gain the access to the system.
The most popular online attack is man-in-the middle (MITM) attack, also termed as
“bucket- brigade attack” or sometimes “Janus attack.”
It is a form of active stealing in which the attacker establishes a connection between a
victim and the server to which a victim is connected.
When a victim client connects to the fraudulent server, the MITM server intercepts the
call, hashes the password and passes the connection to the victim server (e.g., an attacker
within reception range of an unencrypted Wi-Fi wireless access point can insert himself
as a man-in- the-middle).
Page | 6
Module 3: Tools and Methods used in Cybercrime
This type of attack is used to obtain the passwords for E-Mail accounts on public
websites such as Yahoo, Hotmail and Gmail and can also used to get the
passwords for financial websites that would like to gain the access to banking websites.
Offline Attacks
Mostly offline attacks are performed from a location other than the target (i.e.,
either a computer system or while on the network) where these passwords reside or are
used.
Offline attacks usually require physical access to the computer and copying the password
file from the system onto removable media.
Password guidelines.
1. Passwords used for business E-Mail accounts, personal E-Mail accounts and
banking/financial user accounts should be kept separate.
2. Passwords should be of minimum eight alphanumeric characters (common names or
phrases should be phrased).
3. Passwords should be changed every 30/45 days.
4. Passwords should not be shared with relatives and/or friends.
5. Password used previously should not be used while renewing the password.
6. Passwords of personal E-Mail accounts and banking/financial user accounts should
be changed from a secured system, within couple of days, if these E-Mail
accounts has been accessed from public Internet facilities such as
cybercafes/hotels/libraries.
7. Passwords should not be stored under mobile phones/PDAs, as these devices are also
prone to cyberattacks.
8. In case E-Mail accounts/user accounts have been hacked, respective agencies/institutes
should be contacted immediately.
Page | 7
Module 3: Tools and Methods used in Cybercrime
Hardware Keyloggers
Hardware keyloggers are small hardware devices.
These are connected to the PC and/or to the keyboard and save every keystroke into a file
or in the memory of the hardware device.
Cybercriminals install such devices on ATM machines to capture ATM Cards’ PINs.
Each keypress on the keyboard of the ATM gets registered by these keyloggers.
These keyloggers look like an integrated part of such systems; hence, bank customers are
unaware of their presence.
Page | 8
Module 3: Tools and Methods used in Cybercrime
Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system
and can remove the tool. (Visit http://www.anti-keyloggers.com for more information)
Advantages of using antikeylogger are as follows:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence,
antikeyloggers can detect installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such
as other antivirus and antispy programs; if not updated, it does not serve the purpose,
which makes the users at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of
installing keyloggers.
4. It prevents ID theft
5. It secures E-Mail and instant messaging/chatting.
Spywares
Spyware is a type of malware (i.e., malicious software) that is installed on computers
which collects information about users without their knowledge.
The presence of Spyware is typically hidden from the user; it is secretly installed on the
user’s personal computer.
Sometimes, however, Spywares such as keyloggers are installed by the owner of a
shared, corporate or public computer on purpose to secretly monitor other users.
Some Important Spywares are as follows:
Spy. Spector Pro. Spector Pro.
eBlaster. Remotespy . Stealth Recorder Pro.
Stealth Website Logger. Flexispy. Wiretap Professional.
PC PhoneHome. SpyArsenal Print Monitor Pro.
Page | 9
Module 3: Tools and Methods used in Cybercrime
Page | 10
Module 3: Tools and Methods used in Cybercrime
Page | 11
Module 3: Tools and Methods used in Cybercrime
Page | 12
Module 3: Tools and Methods used in Cybercrime
Worms and Trojans, such as viruses, may harm the system’s data or performance.
Some viruses and other malware have noticeable symptoms that enable computer user to
take necessary corrective actions, but many viruses are surreptitious or simply do nothing
for user’s to take note of them.
Some viruses do nothing beyond reproducing themselves.
Types of Viruses
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g., hard drives)
and which is used to start the computer system.
2. Program viruses: These viruses become active when the program file (usually with
extensions .bin, .com,.exe, .ovl, .drv) is excuted
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It infects
program files along with the boot record when the infected program is active.
4. Stealth viruses: It hides itself and so detecting this type of virus is very difficult. It can
hiding itself such a way that antivirus software also cannot detect it. Example for Stealth
virus is “Brain Virus”.
5. Polymorphic viruses: It acts like a “chameleon” that changes its virus signature (i.e.,
binary pattern) every time it spreads through the system (i.e., multiplies and infects a new
file). Hence, it is always difficult to detect polymorphic virus with the help of an antivirus
program.
6. Macro viruses: Many applications, such as Microsoft Word and Microsoft Excel,
support MACROs (i.e., macrolanguages). These macros are programmed as a macro
embedded in a document. Once macrovirus gets onto a victim’s computer then every
document he/she produces will become infected.
7. Active X and Java Control: All the web browsers have settings about Active X and
Java Controls.
World’s worst worm attacks.
Conficker INF/AutoRun Win32 PSW Win32/Agent
Win32/FlyStudio Win32/Pacex.Gen Win32/Qhost WMA/ TrojanDownloader
Page | 13
Module 3: Tools and Methods used in Cybercrime
Page | 14
Module 3: Tools and Methods used in Cybercrime
7. They log keystrokes to steal information such as passwords and credit card numbers.
8. They copy fake links to false websites, display porno sites, play sounds/videos and
display images.
9. They slow down, restart or shutdown the system.
10. They reinstall themselves after being disabled.
11. They disable the task manager.
12. They disable the control panel.
Backdoor
A backdoor is a means of access to a computer program that bypasses security
mechanisms. A programmer may sometimes install a backdoor so that the program can
be accessed for troubleshooting or other purposes.
However, attackers often use backdoors that they detect or install themselves as part of an
exploit.
In some cases, a worm is designed to take advantage of a backdoor created by an earlier
attack.
A backdoor works in background and hides from the user.
It is very similar to a virus and, therefore, is quite difficult to detect and completely
disable.
A backdoor is one of the most dangerous parasite, as it allows a malicious person to
perform any possible action on a compromised system.
Page | 15
Module 3: Tools and Methods used in Cybercrime
Follow the following steps to protect your systems from Trojan Horses and backdoors:
1. Stay away from suspect websites/weblinks:
2. Surf on the Web cautiously:
3. Install antivirus/Trojan remover software:
Steganography
Steganography is the practice of concealing (hiding) a file, message, image, or video
within another file, message, image, or video. The word steganography combines the
Greek words steganos , meaning "covered, concealed, or protected", and graphein
meaning "writing".
It is a method that attempts to hide the existence of a message or communication.
Steganography is always misunderstood with cryptography
The different names for steganography are data hiding, information hiding and digital
watermarking.
Steganography can be used to make a digital watermark to detect illegal copying of
digital images. Thus, it aids confidentiality and integrity of the data.
Digital watermarking is the process of possibly irreversibly embedding information into
a digital signal.
The Digital signal may be, for example, audio, pictures or video.
Page | 16
Module 3: Tools and Methods used in Cybercrime
If the signal is copied then the information is also carried in the copy.
In other words, when steganography is used to place a hidden “trademark” in images,
music and software, the result is a technique referred to as “watermarking”
Steganalysis
Steganalysis is the art and science of detecting messages that are hidden in images,
audio/video files using steganography.
The goal of steganalysis is to identify suspected packages and to determine whether or
not they have a payload encoded into them, and if possible recover it.
Automated tools are used to detect such steganographed data/information hidden in the
image and audio and/or video files.
DoS Attacks
In this type of criminal act, the attacker floods the bandwidth of the victim’s network
or fills his E-Mail box with Spam mail depriving him of the services he is entitled to
access or provide.
The attackers typically target sites or services hosted on high-profile web servers
such as banks, credit card payment gateways, mobile phone networks and even root name
servers.
Page | 17
Module 3: Tools and Methods used in Cybercrime
Buffer overflow technique is employed to commit such kind of criminal attack known as
Spoofing.
The term IP address Spoofing refers to the creation of IP packets with a forged (spoofed)
source IP address with the purpose of concealing the ID of the sender or impersonating
another computing system.
A packet is a formatted unit of data carried by a packet mode computer network.
The attacker spoofs the IP address and floods the network of the victim with repeated
requests.
As the IP address is fake, the victim machine keeps waiting for response from the
attacker’s machine for each request.
This consumes the bandwidth of the network which then fails to serve the legitimate
requests and ultimately breaks down.
The United States Computer Emergency Response Team defines symptoms of DoS
attacks to include:
1. Unusually slow network performance (opening fi les or accessing websites);
2. unavailability of a particular website;
3. inability to access any website;
4. dramatic increase in the number of Spam E-Mails received (this type of DoS
attack is termed as an E-Mail bomb).
The goal of DoS is not to gain unauthorized access to systems or data, but to prevent
intended users (i.e., legitimate users) of a service from using it.
Page | 18
Module 3: Tools and Methods used in Cybercrime
2. Logic attacks: These kind of attacks can exploit vulnerabilities in network software such
as web server or TCP/IP stack.
3. Protocol attacks: Protocols here are rules that are to be followed to send data over
network.
4. Unintentional DoS attack : This is a scenario where a website ends up denied not due to
a attack by a single individual or group of individuals, but simply due to a sudden
enormous spike in popularity.
Page | 19
Module 3: Tools and Methods used in Cybercrime
and may hang the system. This attack can crash various OSs due to a bug in their TCP/IP
fragmentation reassembly code.
5. Smurf attack: This is a type of DoS attack that floods a target system via spoofed
broadcast ping messages. This attack consists of a host sending an echo request (ping)
to a network broadcast address.
6. Nuke: Nuke is an old DoS attack against computer networks consisting of fragmented
or invalid packets sent to the target.
DDoS Attacks
In a DDoS attack, an attacker may use your computer to attack another computer.
By taking advantage of security vulnerabilities or weaknesses, an attacker could take
control of your computer.
He/she could then force your computer to send huge amounts of data to a website or send
Spam to particular E-Mail addresses.
The attack is “distributed” because the attacker is using multiple computers, including
yours, to launch the DoS attack.
A DDoS attack is a distributed DoS wherein a large number of zombie systems are
synchronized to attack a particular system.
Page | 20
Module 3: Tools and Methods used in Cybercrime
The zombie systems are called “secondary victims” and the main target is called
“primary victim.”
Malware can carry DDoS attack mechanisms – one of the better-known examples of this
is MyDoom.
Botnet is the popular medium to launch DoS/DDoS attacks.
Attackers can also break into systems using automated tools that exploit flaws in
programs that listen for connections from remote hosts.
Page | 21
Module 3: Tools and Methods used in Cybercrime
Page | 22
Module 3: Tools and Methods used in Cybercrime
Wireless Networks
Page | 23
Module 3: Tools and Methods used in Cybercrime
5. Encryption cracking: It is always advised that the first step to protect wireless networks
is to use WPA encryption. The attackers always devise new tools and techniques to
deconstruct the older encryption technology, which is quite easy for attackers due to
continuous research in this field. Hence, the second step is to use a long and highly
randomized encryption key; this is very important. It is a little pain to remember long
random encryption; however, at the same time these keys are much harder to crack.
Page | 24
Module 3: Tools and Methods used in Cybercrime
Page | 25