Tools and Methods Used in Cybercrime: By: Gurwinder Singh Jatana
Tools and Methods Used in Cybercrime: By: Gurwinder Singh Jatana
Tools and Methods Used in Cybercrime: By: Gurwinder Singh Jatana
• How
• Where
• When
• Who
Trace Vulnerabilities
• Evidence Elliminator
• Traceless
• El Slave
• Winzapper
• Tracks eraser pro
Proxy Server
• Proxy server
• Persistent Cookie
• Session Cookie
The time of expiry of a cookie can be set
when the cookie is created.
By default the cookie is destroyed when the
current browser window is closed, but it can
be made to persist for an arbitrary length of
time after that.
Phishing
Phishing Web sites are well known for suddenly appearing and then
disappearing to reduce the risk of being traced.
Phishing
• One of the most common forms of social
engineering is phishing, or sending an e-mail or
displaying a Web announcement that falsely claims
to be from a legitimate enterprise in an attempt to
trick the user into surrendering private information.
• The user is asked to respond to an e-mail or is
directed to a Web site where he is to update
personal information. However, the Web site is
actually a fake and is set up to steal the user’s
information.
Fake Web Page
Steganography
In October 2001, the New York Times published an article claiming that
al-Qaeda had used steganography technique to prepare and
execute the 11 September 2001 Terrorist attack
Steganography
Steganalysis
• Password
– The password is like a key to get an entry into
computerized system like a lock.
– Sometimes referred to as a logical token
– A secret combination of letters and numbers
that only the user knows
• A password should never be written down
– Must also be of a sufficient length and
complexity so that an attacker cannot easily
guess it (password paradox)
Weak Password
• Blank (None)
• The words like “password”, “passcode” or “admin”.
• Series of letter from QWERTY keyboard, for example
qwerty, asdf or qwertyuiop.
• User’s name or login name.
• Name of user’s friend, relative or pet
• User’s birth place or date of birth
• User’s vehicle number, residence number or mobile
number.
• Name of celebrity who is consdidered to be an idol by
the user.
Example
• Blank
• Passcode, password, admin
• Series of letter from Qwerty keyboard like
asdfg,12345,qwertyuiop
• Users name
• Name of user’s friend/relative/pet
• User’s birth place/DOB, Vehicle
name/number
Authentication
• www.defaultpassword.com
• www.oxid.it
Pwd Cracking Attacks
Offline attacks
Dictionary attack: It attempts to match all the
words from dictionary to get the password.
• Bandwidth attacks
• Logic attacks
• Protocol attacks
• Unintentional DoS attacks
Level of DoS attacks
• Flood attack
• Ping of Death
• Syn
• Teardrop
• Smurf
Tools for doing DoS
• Jolt2
• Nemsey
• Targa
• Crazy Pinger
How to protect from DoS
• Implement router filter.
• Disable any unused or inessential network service.
• Enable quota system on your OS.
• Observe your system performance.
• Routinely examine the physical security.
• Invest in redundant and fault tolerant network
configurations.
• Establish and maintain regular backups.
• Establish and maintain appropriate password
policies.
Detection Tools DoS
• Zombie Zapper
• Remote Intrusion Detector
• Find_DDOS
• DDoSPing
Buffer Overflow
• Buffer overflow
– Occurs when a process attempts to store data
in random access memory (RAM) beyond the
boundaries of a fixed-length storage buffer
– Extra data overflows into the adjacent
memory locations and under certain
conditions may cause the computer to stop
functioning.
• Attackers also use a buffer overflow in
order to compromise a computer
Virus
• Malware
• Vital Information Resources under seize
• For harming the working of system
• It spread themselves without the
knowledge or permission of users, to large
numbers of programs on many machines.
Virus actions
• It is a self-encrypted virus designed to
avoid detection by a scanner.
• Upon infection, the polymorphic
virus duplicates itself by creating usable,
albeit slightly modified, copies of itself.
• Worm
– Program designed to take advantage of a vulnerability
in an application or an operating system in order to
enter a system
– Worms are different from viruses in two regards:
• A worm can travel by itself
• A worm does not require any user action to begin its
execution
– Actions that worms have performed: deleting files on
the computer; allowing the computer to be remote-
controlled by an attacker
Trojan Horse
• Logic bomb
– A computer program or a part of a program
that lies dormant until it is triggered by a
specific logical event
– Once triggered, the program can perform any
number of malicious activities
– Logic bombs are extremely difficult to detect
before they are triggered
Backdoor
• Keylogger
– A small hardware device or a program that
monitors each keystroke a user types on the
computer’s keyboard
– As the user types, the keystrokes are
collected and saved as text
• As a hardware device, a keylogger is a
small device inserted between the
keyboard connector and computer
keyboard port
Hardware Key logger/grabber
Virtual Keyboard (QWERTY)
Virtual Keyboard
Key logger
• Software keyloggers
– Programs that silently capture all keystrokes,
including passwords and sensitive information
– Hide themselves so that they cannot be easily
detected even if a user is searching for them
Spyware