Unit-4
Unit-4
Other Methods:
1. Business Email Compromise (BEC)
2. CEO Fraud
3. Watering Hole Attacks
Cybercrime tools:
Malware and Ransomware Tools
1. Ransomware kits
2. Malware builders
3. Exploit kits
Network Exploitation Tools:
1. Nmap
2. Metasploit
3. Burp Suite
Password Cracking and Credential Theft Tools:
1. John the Ripper
2. Aircrack-ng
3. Keylogger software
Other Tools:
1. Virtual Private Networks (VPNs)
2. Tor Browser
3. Dark web marketplaces
Proxy server:
A proxy server is a computer system or software that acts as an intermediary
between a client device (such as a computer or smartphone) and a server on the
internet.
Types of Proxy Servers:
Forward Proxy
Reverse Proxy
Transparent Proxy
Caching Proxy
Anonymizing Proxy
How Proxy Servers Work:
1. Client Request: A client sends a request to the proxy server.
2. Proxy Server Processing: The proxy server receives the request, modifies it if
necessary, and forwards it to the destination server.
3. Server Response: The destination server processes the request and sends a
response back to the proxy server.
4. Proxy Server Response: The proxy server receives the response, modifies it if
necessary, and forwards it back to the client.
Benefits of Proxy Servers:
1. Anonymity
2. Security
3. Caching
4. Content Filtering
5. Load Balancing
Anonymizers:
An anonymizer is a tool or service designed to conceal a user's identity, location, and online
activities from third parties, including governments, corporations, and hackers.
Types of Anonymizers:
1. Web Anonymizers
2. Proxy Anonymizers
3. VPN Anonymizers
4. Tor Anonymizers
Hashcat
GPU-accelerated cracking tool.
Supported Attacks: Brute force, dictionary, combinator, mask, and rule-
based attacks.
Strengths: Extremely efficient, handles complex password hashes.
John the Ripper
Supports multiple attack modes (dictionary, brute force, hybrid).
Feature: Cracks different types of hashes (e.g., DES, MD5, SHA1).
Other Tools:
Cain and Abel: Windows-based, supports network sniffing, cracking and
decoding passwords.
Hydra: Used for brute force attacks on various network protocols (SSH, HTTP,
FTP, etc.).
Multi-Factor Authentication (MFA)
and Password Cracking Defense
Why MFA is Critical:
Even if passwords are cracked, MFA (e.g., OTP, biometric, or hardware
keys) adds another layer of security.
Examples of MFA mechanisms:
SMS/Email codes, Google Authenticator, or hardware tokens (YubiKey).
Defending Against Password Cracking:
Enforce Strong Password Policies: Minimum length, character
diversity, disallowing common passwords.
Salted Password Hashes: Prevents precomputation attacks.
Rate Limiting: Throttle or block multiple login attempts.
Account Lockout: Temporarily lock accounts after a set number of
failed login attempts.
Password Cracking and
Ethical Hacking
Ethical Hacking:
Legitimate penetration testers use password cracking tools to test
the strength of an organization's defenses.
Legal Considerations: Always ensure written permission before
conducting any password cracking activities.
Real-World Use Cases:
Security audits for organizations.
Examples: Cracking weak passwords in encrypted archives (ZIP,
RAR) or testing password policies in enterprise environments.
Countermeasures & Best
Practices
Strong Password Creation:
Use at least 12 characters, mix upper/lowercase letters, numbers, and
symbols.
Avoid using easily guessable information (e.g., names, dates).
Password Managers:
Safely store and generate strong passwords for each account.
Regularly Update Passwords:
Enforce policies for periodic password changes.
Encryption and HMAC:
Use encryption to protect stored passwords and sensitive data. Use
HMAC (Hash-based Message Authentication Code) for integrity
verification.
Keyloggers: Understanding and
Protecting Against Them
A keylogger is a type of malicious software or hardware device
that records every keystroke made on a computer or mobile
device, often without the user’s knowledge. Keyloggers can be
used for both legitimate and illegitimate purposes. In this section,
we'll dive into what keyloggers are, how they work, how they're
used, and how to protect against them.
What is a Keylogger?
Definition:
A keylogger is a type of surveillance software or hardware that
records all keystrokes typed on a device, typically without the
user’s knowledge.
Types of Keyloggers:
Software Keyloggers: Malicious programs installed on the device.
Hardware Keyloggers: Physical devices that capture keyboard
inputs.
Cloud-Based Keyloggers: Can record keystrokes remotely and
upload data to an attacker’s server.
How Keyloggers Work
Software Keyloggers:
Operate in the background of an infected system.
Capture every keystroke typed, including passwords, emails, and personal data.
Recording Methods:
Monitoring system-level APIs that capture keystrokes.
Recording inputs from hardware devices like keyboards or touchscreen events.
Hardware Keyloggers:
Attached between the keyboard and the computer, they intercept data as it's typed.
Some models are small and undetectable, while others store the captured keystrokes
for later retrieval.
Example:
A software keylogger might run in the background on your computer without your
knowledge, silently logging everything you type, including sensitive information like
passwords or credit card numbers.
Types of Keyloggers
Software Keyloggers:
Rootkit-Based Keyloggers:
These hide themselves within the operating system, making detection more difficult.
Trojan Horse Keyloggers:
Often bundled with malicious software, these keyloggers are delivered through phishing
attacks or software downloads.
Spyware Keyloggers:
Sometimes installed alongside other spyware programs that track online activity, monitor
social media use, and log personal information.
Keylogging Malware:
Designed specifically to capture and transmit keystrokes to a remote attacker.
Hardware Keyloggers:
USB Keyloggers:
Plugged in between the keyboard and the computer, these loggers capture keystrokes, even
on secure systems.
Wireless Keyloggers:
Used on wireless keyboards, these devices capture input without a physical connection.
How Keyloggers Are Installed
Anti-virus/Anti-malware Software:
Good antivirus tools can detect known keyloggers by checking for their signatures or suspicious
behaviors.
Example: Kaspersky, Malwarebytes, or Windows Defender.
Behavioral Analysis:
Detecting unusual system activity, like excessive CPU usage, network activity, or unknown
processes running.
Task Manager and System Monitoring:
Review active processes in the Task Manager (Windows) or Activity Monitor (Mac) for suspicious
entries.
Look for hidden or unrecognized applications running in the background.
Rootkit Detection Tools:
Use specialized tools like GMER or RootkitRevealer to check for hidden keyloggers and rootkits.
Physical Inspection (for Hardware Keyloggers):
Check the keyboard’s physical connection for unexpected devices or cables between the keyboard
and computer.
Keylogger Mitigation Techniques
•Update and Patch Software Regularly:
•Ensure that your operating system and software applications are up-to-date to prevent
exploiting known vulnerabilities.
•Use Comprehensive Security Software:
•Keep antivirus software up-to-date with real-time protection enabled.
•Secure Your Network (VPN/Encryption):
•Use encryption to protect sensitive data in transit. For example, using a VPN (Virtual Private Network) will
ensure that even if a keylogger is recording your keystrokes, the data sent over the internet is encrypted.
•Hardware-Based Security (Smartcards, Key Fobs):
•Use physical authentication devices such as smartcards or USB security tokens (e.g., Yubikey) to add an
extra layer of security.
•Avoid Public Wi-Fi for Sensitive Transactions:
•Man-in-the-Middle (MITM) attacks are a risk on unsecured networks. Avoid accessing sensitive
information over public Wi-Fi.
•Use On-Screen Keyboards (for Specific Tasks):
•For extremely sensitive actions (e.g., entering banking information), use an on-screen keyboard to avoid
hardware keyloggers.
Real-Time Example of Keylogger
Detection
Example:
Demonstrating how a keylogger can be detected using tools like
Wireshark to track outgoing traffic or Procmon to analyze system
calls made by a suspicious process.
Case Study:
How an organization detected a keylogger through unusual network
traffic and behavioral analysis.
Keylogger Protection Best
Practices
Multi-Factor Authentication (MFA):
Even if an attacker captures your password through a keylogger, MFA
can prevent unauthorized access.
Use Strong, Unique Passwords:
Use long and complex passwords that are difficult for attackers to guess,
and avoid reusing passwords across multiple sites.
Monitor Your Accounts Regularly:
Frequently check your bank accounts, social media, and other important
services for unauthorized activity.
Educate Users:
Regularly train employees or family members on how to identify phishing
attacks and suspicious activity that might lead to keylogger infections.
Spyware: Understanding,
Detecting, and Preventing It
Spyware is a type of malicious software designed to secretly
gather information about a user or organization without their
consent. It can track your browsing habits, record keystrokes,
steal sensitive data like login credentials or financial details, and
even alter system settings.
For an advanced audience (e.g., graduate students), the focus
will be on the technical aspects of how spyware works, its impact,
methods of detection, and strategies for prevention. Here's a
structured PowerPoint outline for teaching about spyware:
What is Spyware?
Definition:
Spyware is a type of malware that secretly collects information from a user's
device without their consent.
Types of Data Collected:
Personal Information: Passwords, usernames, credit card details.
Browsing History: Websites visited, search terms, etc.
Keystrokes: Capturing what the user types (keylogging).
System Information: Device details, software installed, IP addresses.
Common Examples:
Adware: Often bundled with other software, tracking user behavior to display ads.
Trojan Horse Spyware: Disguised as legitimate software or files.
Browser Hijackers: Altering browser settings, redirecting searches to malicious
websites.
How Spyware Works
Installation:
Bundled Software: Spyware is often included in free software downloads, disguising itself as a
legitimate program.
Phishing Attacks: Users are tricked into downloading spyware through social engineering
techniques.
Exploiting Vulnerabilities: Spyware can be installed via security flaws in software or browsers
(drive-by downloads).
Data Collection:
Keyboard Monitoring (Keylogging): Logs keystrokes to capture passwords and sensitive data.
Screen Scraping: Captures screenshots or video footage of the user’s screen.
Tracking User Behavior: Monitors browsing activity, search queries, and even location data.
Communication with Attacker:
Command-and-Control Servers: Spyware sends the gathered data back to a remote server
controlled by the attacker.
Persistence: Spyware often installs itself as a persistent background process that is difficult to
detect or remove.
Types of Spyware
Adware:
Displays unwanted advertisements based on browsing history and usage patterns.
Often bundled with free software or downloads.
Trojans/Backdoor Spyware:
Disguised as legitimate software, allowing attackers to gain remote control and collect data.
Often used for espionage or corporate spying.
Browser Hijackers:
Changes browser settings, redirects searches, and alters homepage settings to display
malicious content.
Keyloggers:
Records every keystroke typed, including sensitive information such as passwords and credit
card numbers.
System Monitors:
Monitor system activity and send information like hardware/software configurations, device
details, and network activity.
Common Infection Vectors
Malicious Downloads:
Downloading software, files, or applications from untrusted websites can lead to
spyware infections.
Example: Downloading a "free" video player that comes bundled with spyware.
Phishing Emails:
Users are tricked into clicking on malicious links or downloading attachments
that install spyware.
Drive-By Downloads:
Visiting compromised or malicious websites that automatically download and
install spyware without the user’s knowledge.
Malvertising:
Ads on legitimate websites can contain embedded malicious scripts that install
spyware when clicked.
Real-World Examples of Spyware