MH CYBER Presentation
MH CYBER Presentation
By
MHCYBER & ICPF
INDEX
• Introduction of Cyber Security • Morph Detection
• Fake Domain • VOIP call
• RDP Applications • System Hacking
• OLX Fraud • Malware
• Phishing Attack • Firewall
• Mobile Hacking • Cloud
• Social Media Hacking • OSINT
• Payment Request • Google Advance Search
• Data Base Hack • Website Intelligence
• Applications Permissions
Introduction of Cyber Security
The technique of protecting internet-connected systems such as computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity.
Cyber refers to the technology that includes systems, networks, programs, and data. And security
is concerned with the protection of systems, networks, applications, and information. In some
cases, it is also called electronic information security or information technology security.
Example :
● Prevention of job fraud: Do not make payments on unknown job search websites
Cyber Bullying
SIM Swap Scam
● What is SIM Swap Scam:
A SIM swap scam is a type of account takeover fraud that generally targets a weakness in
two-factor authentication and two-step verification in which the second factor or step is a
text message or call placed to a mobile telephone.
● How SIM swapping works : SIM swapping happens when scammers contact your mobile
phone's carrier and trick them into activating a SIM card that the fraudsters have.
Cyber Bullying
● What is Sextortion :
Sextortion occurs when someone threatens to distribute your private and sensitive material
if you don't provide them images of a sexual nature, sexual favors, or money.
Phishing: It is a type of cybersecurity attack during which malicious actors send messages pretending to be a
trusted person or entity.
Types of Phishing: Common Features of Phishing Emails:
1. Vishing 1. Sense of Urgency
2. Email phishing 2. Hyperlinks
3. Click jacking 3. Attachments
4. Smishing 4. Unusual Sender
Prevent Phishing Attacks: Pick Strong Passwords, Use Two-Factor Authentication, Be Careful What You
Click.
Mobile Hacking
• The attackers are easily able to compromise the mobile
network because of various vulnerabilities, the majority of the
attacks are because of the untrusted apps.
• The main operating systems used are:
• Android
• IOS
• Windows
• Blackberry
Demo of Mobile Tracker Application
How to prevent WhatsApp Hacking
• The technique relies on detecting either a delay, or a change in the HTTP response, to distinguish
between a query resolving to TRUE or FALSE.
VoIP Call
• Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a
broadband Internet connection instead of a regular (or analog) phone line.
__
ANY Call Application
Morphing
• Morphing is altering or changing the pictures of the person using morphing tools available online. Young girls and
women usually fall prey at the hands of the online criminals, who use their photographs posted online and misuse
these images by changing the pictures.
• The altered pictures are then used by perpetrators for blackmailing you, creating fake online profile, sexting, sex
chats, pornographic content, nude pictures etc.
Caller ID spoofing Identity Spoofing
Caller ID spoofing is the practice of causing the telephone network to
indicate to the receiver of a call that the originator of the call is a station other
than the true originating station.
This can lead to a caller ID display showing a phone number different from
that of the telephone from which the call was placed.
The term is commonly used to describe situations in which the motivation is
considered malicious by the originator.
How caller id spoofing detects
5 Phases of Ethical Hacking
SMS Bombing
Legal experts believe using SMS bombers qualifies as a form of harassment. “Such
apps/websites do not have a proper privacy policy or terms of service. Although it
calls itself a tool for fun, this has the potential to create immense harm. Incessant
messages can be a nuisance for the person targeted. This can be easily used to harass
persons. However, the terms of service state that it can be used only on friends and
family and with consent, but there is no way to monitor this,” said Prasanth
Sugathan, Legal Director at SFLC.in.
Bombarding of SMSes even after activating DND service on one’s phone number is
not just a form of harassment and nuisance (I.P.C Section 268), but “are a trap, bait,
and a criminal act of theft, cheating and dishonestly inducing delivery of property
under I.P.C Sections 378 & 420,” said Bombay High Court lawyer Satya Muley.
SMS Bombing
Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a
person or entity they either know or can trust. In spoofing attacks, the sender forges email headers so that client
software displays the fraudulent sender address, which most users take at face value. Unless they inspect the header
more closely, users see the forged sender in a message. If it’s a name they recognize, they’re more likely to trust it.
So they’ll click malicious links, open malware attachments, send sensitive data and even wire corporate funds.
Malware
Malware is any software intentionally designed to cause disruption to a computer, server, client, or
computer network, leak private information, gain unauthorized access to information or systems, deprive
access to information, or which unknowingly interferes with the user's computer security and privacy.
Types of malware:
• Virus
• Worms
• Trojan virus
• Spyware
• Adware
• Ransomware
• Fileless malware
Ransomware
Ransom malware, or ransomware, is a type of malware that prevents users from accessing
their system or personal files and demands ransom payment in order to regain access.
Types of Ransomware:
• WannaCry
• CryptoLocker
• NotPetya
• Bad Rabbit
• Revil
• Ryuk