chap 3
chap 3
Online attacks
Offline attacks
Non-electronic attacks
🢝Social engineering
🢝Shoulder surfing
🢝Dumpster diving
ONLINE ATTACKS
⚫ An attacker may create a script- automated program- to try each
password
⚫ Most popular online attack;- man-in-the-middle attack or bucket-
brigade attack
⚫ Used to obtain passwords for E-mail accounts on public websites
like gmail, yahoomail
⚫ Also to get passwords for financial websites
OFFLINE ATTACKS
Are performed from a location other than the target where these
passwords reside or are used
Require physical access to the computer and copying the password
TYPES OF PASSWORD ATTACKS
⚫ Password Guessing
◦ Attackers can guess passwords locally or remotely using either a manual or
automated approach
◦ Ex: Adm!n@09
⚫ Dictionary attacks
◦ work on the assumption that most passwords consist of whole words, dates,
or numbers taken from a dictionary.
◦ Ex: Administrator
⚫ Hybrid password
◦ assume that network administrators push users to make their passwords at
least slightly different from a word that appears in a dictionary.
◦ Ex: Adm!n!strator
WEAK PASSWORDS
⚫ The password contains less than eight characters
⚫ The password is a word found in a dictionary (English or foreign)
⚫ The password is a common usage word such as:
⚫ Names of family, pets, friends, co-workers, fantasy characters, etc.
⚫ Computer terms and names, commands, sites, companies, hardware,
software.
⚫ The words "<Company Name>", "sanjose", "sanfran" or any derivation.
⚫ Birthdays and other personal information such as addresses and phone
numbers.
⚫ Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.
⚫ Any of the above spelled backwards.
⚫ Any of the above preceded or followed by a digit (e.g., secret1,1secret
STRONG PASSWORDS
⚫ Contain both upper and lower case characters (e.g., a-z, A-Z)
⚫ Have digits and punctuation characters as well as letters e.g., 0-9, @#$
%^&*()_+|~-=\`{}[]:";'<>?,./)
⚫ Are at least eight alphanumeric characters long.
⚫ Are not a word in any language, slang, dialect, jargon, etc.
⚫ Are not based on personal information, names of family, etc.
⚫ Passwords should never be written down or stored on-line.
⚫ Try to create passwords that can be easily remembered.
⚫ One way to do this is create a password based on a song title, affirmation, or
other phrase.
⚫ For example, the phrase might be: "This May Be One Way To Remember"
⚫ and the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other
variation.
4. KEYLOGGERS
⚫ Keystroke logging, often referred to as keylogging or
keyboard capturing, is the action of recording (or logging) the
keys struck on a keyboard, typically in a covert manner so that
the person using the keyboard is unaware that their actions are
being monitored.
⚫ It has uses in the study of human–computer interaction.
⚫ There are numerous keylogging methods, ranging from hardware
and software-based approaches to acoustic analysis.
SOFTWARE-BASED
KEYLOGGERS
⚫ Software-based keyloggers use the target computer’s operating
system in various ways, including: imitating a virtual machine,
acting as the keyboard driver (kernel-based), using the
application programming interface to watch keyboard strokes
(API-based), recording information submitted on web-based forms
(Form Grabber based) or capturing network traffic associated
with HTTP POST events to steal passwords (Packet analyzers).
⚫ Usually consists of two files DLL and EXE
HARDWARE KEYLOGGERS
installing a hardware circuit between the keyboard and the
computer that logs keyboard stroke activity (keyboard hardware).
Target- ATMs
ACOUSTIC KEYLOGGING
Acoustic keylogging monitors the sound created by each individual
keystroke and uses the subtly different acoustic signature that each
key emits to analyze and determine what the target computer’s
user is typing.
ANTIKEYLOGGER
An anti-keylogger (or anti–keystroke logger) is a type of
software specifically designed for the detection of keystroke logger
software; often, such software will also incorporate the ability to
delete or at least immobilize hidden keystroke logger software on
your computer.
BENEFITS OF ANTIKEYLOGGERS
SPYWARES
Spyware is software that aims to gather information about a
person or organization without their knowledge and that may send
such information to another entity without the consumer's consent,
or that asserts control over a computer without the consumer's
knowledge
5. VIRUS AND WORMS
A computer virus is a malware program that, when executed,
replicates by inserting copies of itself (possibly modified) into other
computer programs, data files, or the boot sector of the hard drive;
when this replication succeeds, the affected areas are then said to
be "infected".
SOME TYPICAL VIRUS
ACTIONS
Display a message to prompt an action
Delete files in the system
Scramble data on a hard disk
Cause erratic screen behavior
Halt the system
Replicate themselves to propagate further harm
VIRUS SPREAD THROUGH
The internet
A stand alone PC
Local networks
DIFFERENCE BETWEEN VIRUS
AND WORM
TYPES OF VIRUSES
Boot sector viruses
Program viruses
Multipartite viruses
Stealth viruses
Polymorphic viruses
Macroviruses
Active X and Java contrl
BOOT SECTOR VIRUSES
⚫ A boot sector virus is a computer virus that infects a storage device's master
boot record (MBR).
⚫ It is not mandatory that a boot sector virus successfully boot the victim's PC
to infect it.
⚫ As a result, even non-bootable media can trigger the spread of boot sector
viruses.
⚫ These viruses copy their infected code either to the floppy disk's boot sector
or to the hard disk's partition table. During start-up, the virus gets loaded to
the computer's memory. As soon as the virus is saved to the memory, it
infects the non-infected disks used by the system.
⚫ The propagation of boot sector viruses has become very rare since the
decline of floppy disks. Also, present-day operating systems include boot-
sector safeguards that make it difficult for boot sector viruses to infect them.
PROGRAM VIRUSES
A program virus becomes active when the program file (usually
with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is
opened.
Once active, the virus will make copies of itself and will infect other
programs on the computer.
MULTIPARTITE VIRUSES
⚫ A multipartite virus is a fast-moving virus that uses file infectors or boot
infectors to attack the boot sector and executable files simultaneously.
⚫ Most viruses either affect the boot sector, the system or the program files.
⚫ The multipartite virus can affect both the boot sector and the program files at
the same time, thus causing more damage than any other kind of virus.
⚫ When the boot sector is infected, simply turning on the computer will trigger a
boot sector virus because it latches on to the hard drive that contains the data
that is needed to start the computer. Once the virus has been triggered,
destructive payloads are launched throughout the program files.
⚫ A multipartite virus infects computer systems multiple times and at different
times. In order for it to be eradicated, the entire virus must be removed from
the system.
⚫ A multipartite virus is also known as a hybrid virus.
STEALTH VIRUSES
⚫ A stealth virus is a hidden computer virus that attacks operating
system processes and averts typical anti-virus or anti-malware
scans. Stealth viruses hide in files, partitions and boot sectors
and are adept at deliberately avoiding detection.
⚫ http://www.victimsite.com/index.php?id=2 order by 1
http://www.victimsite.com/index.php?id=2 order by 2
http://www.victimsite.com/index.php?id=2 order by 3
http://www.victimsite.com/index.php?id=2 order by 4
…..
http://www.victimsite.com/index.php?id=2 order by 8(error)
so now x=8 , The number of column is x-1 i.e, 7.
⚫ Step 4: Displaying the Vulnerable columns:
◦ Using “union select columns_sequence” we can find the
vulnerable part of the table. Replace the “order by n” with this
statement.
◦ And change the id value to negative
◦ Replace the columns_sequence with the no from 1 to x-1(number
of columns) separated with commas(,).
⚫ For eg:
if the number of columns is 7 ,then the query is as follow: