SlideShare a Scribd company logo
HOW CRIMINALS PLAN THE ATTACK
AGENDA
1.Introduction​
2.How Criminals Plans A Attack
• Reconnaissance
• Scrutinizing and Scanning the Gathering
Information
• Attack
3.Summary
INTRODUCTION
Cyber Attack
A cyber attack is any malicious attempt to gain unauthorized access to a
computer, computing system or computer network with the intent to cause
damage. Cyber attacks aim to disable, disrupt, destroy or control computer
systems or to alter, block, delete, manipulate or steal the data held within these
systems.
Cyber Criminals
Cyber criminals are individuals or groups of people who use
computers and networks to commit online crimes. Using malware
programs, they aim to harm other individuals, companies, and
governments.
HOW CRIMINALS PLAN A ATTACK
5
Below are the three phases involved in planning
a cyber-attack:
1.Reconnaissance – this is the information gathering stage
and is usually considered a passive attack.
2.Scanning and scrutinization of the collected data for
validation and accurate identification of existing
vulnerabilities.
3.Launching the attack – entails gaining and maintaining
access to the system.
1. RECONNAISSANCE
• The first step in how cybercriminals plan attacks is
always Reconnaissance. The literal meaning of
reconnaissance is an act of exploring with an aim or goal of
finding someone or something about the target.
• Reconnaissance begins with “Footprinting”.
• Footprinting gives an overview of the victim’s weak points
and suggestions on how they can be exploited. The primary
objective of this phase is to provide the attacker with an
understanding of the victim’s system infrastructure, the
networking ports and services, and any other aspect of
security required for launching attacks.
Thus, an attacker attempts to source data from two different
phases:
1. Passive attacks:
In this phase, an attacker secretly gathers information about their
target; the aim is to acquire the relevant data without the victim
noticing.
2. Active Attacks:
An active attack involves closely examining the network to discover
individual hosts and verify the validity of the gathered information, such
as the type of operating system in use, IP address of the given gadget,
and available services on the network, collected during the passive
attack. It involves the risk of detection and can also be referred to as
“Active reconnaissance”
2.SCRUTINIZING AND SCANNING THE
GATHERED INFORMATION
Scanning is a key step to intelligently examine after as you collect
information about the network infrastructure. The process has the
following objectives;
1. Network scanning is executed to understand better the IP address
and other related information about the computer network system.
2. Port Scanning – to identify any closed or open ports and services
3. Vulnerability scanning – to identify existing weak links within the
system.
5. ATTACK
The attack phase is the last step in the attack process. It involves the
hacker gaining and maintaining full control of the system access. It
comes immediately after scanning and enumeration, and it launched
sequentially as listed in the below steps.
1. Brute force attack or any other relevant method to bypass the
password.
2. Exploit the password.
3. Launch the malicious command or applications.
4. If requires, then hide the files.
5. Cover the tracks, don’t leave any trail that can lead back to you as the
malicious third party. This can be achieved by deleting logs so that
there is no trail for your illicit actions.
SUMMARY
Cybercrime is a complicated and vast
phenomenon. The rapid increase in phones, Wi-
Fi networks, and the internet has increased the
complexity and cyber-attacks. The advancement
in technology has led to an expansion in cyber-
criminality and the cyber victimization of the vast
ignorant population.
THANK YOU

More Related Content

PDF
M1-02-HowCriminalsPlan.pdf
PPSX
Unit 2
PPSX
Unit 2
PPT
unit 2. cyber offences_how criminals plan them.ppt
PDF
Unit 5_Social Engineering and Cyberstalking.pdf
PPTX
Module 2_ Cyber offenses & Cybercrimes(Updated).pptx
PPT
Unit-2 ICS.ppt
PPTX
Cyber warfare introduction
M1-02-HowCriminalsPlan.pdf
Unit 2
Unit 2
unit 2. cyber offences_how criminals plan them.ppt
Unit 5_Social Engineering and Cyberstalking.pdf
Module 2_ Cyber offenses & Cybercrimes(Updated).pptx
Unit-2 ICS.ppt
Cyber warfare introduction

Similar to cyber ppt all topic are covered.pptx (20)

PPTX
cyber security module 2 ppt of first year
PDF
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
PPTX
34088.Chapter-2.pptx
PPTX
FCL-Introduction.pptx
PPTX
Ehtical hacking
PPTX
Introduction ethical hacking
PPTX
Cyberspace and the Law & Cyber Forensics
PPTX
Web hacking 1.0
PPTX
455845434-Chapter-2-Cyber-Security-pptx.pptx
PDF
cybercrime investigation and digital forensics
PDF
Cyber Attack Methodologies
PPTX
cybersecurity subject chapter 1 lec 1-5.pptx
PPTX
Cyber forensic 1
PPTX
Ethical Hacking Overview
PDF
Cyber Security notes on security on safety.pdf
PPTX
Tools and Methods of Reconnaissance in Cybersecurity: A Comprehensive Guide b...
PPT
Cyber Crime.ppt
DOCX
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
PPT
Module 1 Introduction
cyber security module 2 ppt of first year
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
34088.Chapter-2.pptx
FCL-Introduction.pptx
Ehtical hacking
Introduction ethical hacking
Cyberspace and the Law & Cyber Forensics
Web hacking 1.0
455845434-Chapter-2-Cyber-Security-pptx.pptx
cybercrime investigation and digital forensics
Cyber Attack Methodologies
cybersecurity subject chapter 1 lec 1-5.pptx
Cyber forensic 1
Ethical Hacking Overview
Cyber Security notes on security on safety.pdf
Tools and Methods of Reconnaissance in Cybersecurity: A Comprehensive Guide b...
Cyber Crime.ppt
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
Module 1 Introduction
Ad

Recently uploaded (20)

PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
introduction to high performance computing
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Design Guidelines and solutions for Plastics parts
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Artificial Intelligence
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
737-MAX_SRG.pdf student reference guides
Fundamentals of Mechanical Engineering.pptx
Abrasive, erosive and cavitation wear.pdf
Safety Seminar civil to be ensured for safe working.
introduction to high performance computing
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
III.4.1.2_The_Space_Environment.p pdffdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Design Guidelines and solutions for Plastics parts
Nature of X-rays, X- Ray Equipment, Fluoroscopy
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
R24 SURVEYING LAB MANUAL for civil enggi
distributed database system" (DDBS) is often used to refer to both the distri...
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Artificial Intelligence
Fundamentals of safety and accident prevention -final (1).pptx
Soil Improvement Techniques Note - Rabbi
737-MAX_SRG.pdf student reference guides
Ad

cyber ppt all topic are covered.pptx

  • 1. HOW CRIMINALS PLAN THE ATTACK
  • 2. AGENDA 1.Introduction​ 2.How Criminals Plans A Attack • Reconnaissance • Scrutinizing and Scanning the Gathering Information • Attack 3.Summary
  • 3. INTRODUCTION Cyber Attack A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. Cyber Criminals Cyber criminals are individuals or groups of people who use computers and networks to commit online crimes. Using malware programs, they aim to harm other individuals, companies, and governments.
  • 5. 5 Below are the three phases involved in planning a cyber-attack: 1.Reconnaissance – this is the information gathering stage and is usually considered a passive attack. 2.Scanning and scrutinization of the collected data for validation and accurate identification of existing vulnerabilities. 3.Launching the attack – entails gaining and maintaining access to the system.
  • 6. 1. RECONNAISSANCE • The first step in how cybercriminals plan attacks is always Reconnaissance. The literal meaning of reconnaissance is an act of exploring with an aim or goal of finding someone or something about the target. • Reconnaissance begins with “Footprinting”. • Footprinting gives an overview of the victim’s weak points and suggestions on how they can be exploited. The primary objective of this phase is to provide the attacker with an understanding of the victim’s system infrastructure, the networking ports and services, and any other aspect of security required for launching attacks.
  • 7. Thus, an attacker attempts to source data from two different phases: 1. Passive attacks: In this phase, an attacker secretly gathers information about their target; the aim is to acquire the relevant data without the victim noticing. 2. Active Attacks: An active attack involves closely examining the network to discover individual hosts and verify the validity of the gathered information, such as the type of operating system in use, IP address of the given gadget, and available services on the network, collected during the passive attack. It involves the risk of detection and can also be referred to as “Active reconnaissance”
  • 8. 2.SCRUTINIZING AND SCANNING THE GATHERED INFORMATION Scanning is a key step to intelligently examine after as you collect information about the network infrastructure. The process has the following objectives; 1. Network scanning is executed to understand better the IP address and other related information about the computer network system. 2. Port Scanning – to identify any closed or open ports and services 3. Vulnerability scanning – to identify existing weak links within the system.
  • 9. 5. ATTACK The attack phase is the last step in the attack process. It involves the hacker gaining and maintaining full control of the system access. It comes immediately after scanning and enumeration, and it launched sequentially as listed in the below steps. 1. Brute force attack or any other relevant method to bypass the password. 2. Exploit the password. 3. Launch the malicious command or applications. 4. If requires, then hide the files. 5. Cover the tracks, don’t leave any trail that can lead back to you as the malicious third party. This can be achieved by deleting logs so that there is no trail for your illicit actions.
  • 10. SUMMARY Cybercrime is a complicated and vast phenomenon. The rapid increase in phones, Wi- Fi networks, and the internet has increased the complexity and cyber-attacks. The advancement in technology has led to an expansion in cyber- criminality and the cyber victimization of the vast ignorant population.