The document discusses various hacking techniques including bait and switch, cookie theft, clickjacking attacks, viruses, trojans, phishing, eavesdropping, fake wireless access points, waterhole attacks, denial of service attacks, and keyloggers. It also discusses the differences between hackers and crackers, as well as profiles some famous black hat hackers like Anonymous, Jonathan James, Adrian Lamo, and Kevin Mitnick. Finally, it outlines 7 areas of risk management: avoidance, prevention, reduction, separation, duplication, and transfer.
The document discusses various hacking techniques including bait and switch, cookie theft, clickjacking attacks, viruses, trojans, phishing, eavesdropping, fake wireless access points, waterhole attacks, denial of service attacks, and keyloggers. It also discusses the differences between hackers and crackers, as well as profiles some famous black hat hackers like Anonymous, Jonathan James, Adrian Lamo, and Kevin Mitnick. Finally, it outlines 7 areas of risk management: avoidance, prevention, reduction, separation, duplication, and transfer.
The document discusses various hacking techniques including bait and switch, cookie theft, clickjacking attacks, viruses, trojans, phishing, eavesdropping, fake wireless access points, waterhole attacks, denial of service attacks, and keyloggers. It also discusses the differences between hackers and crackers, as well as profiles some famous black hat hackers like Anonymous, Jonathan James, Adrian Lamo, and Kevin Mitnick. Finally, it outlines 7 areas of risk management: avoidance, prevention, reduction, separation, duplication, and transfer.
The document discusses various hacking techniques including bait and switch, cookie theft, clickjacking attacks, viruses, trojans, phishing, eavesdropping, fake wireless access points, waterhole attacks, denial of service attacks, and keyloggers. It also discusses the differences between hackers and crackers, as well as profiles some famous black hat hackers like Anonymous, Jonathan James, Adrian Lamo, and Kevin Mitnick. Finally, it outlines 7 areas of risk management: avoidance, prevention, reduction, separation, duplication, and transfer.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 24
The Hacker Attitude
1. The world is full of fascinating
problems waiting to be solved 2. No problem should ever have to be solved twice 3. Freedom is good 4. Attitude is no substitute for competence Hacking Techniques
attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware. This way, they can further install malware or adware on your computer. The ads and download links shown in this technique are very attractive and users are expected to end up clicking on the same Cookie Theft The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker get the access to your cookie, he can even authenticate himself as you on a browser. A popular method to carry out this attack is to encourage a user’s IP packets to pass through attacker’s machine. Also known as SideJacking or Session Hijacking, this attack is easy to carry out if the user is not using SSL (https) for the complete session. On the websites where you enter your password and banking details, its utmost importance for them to make their connections encrypted. ClickJacking Attacks
ClickJacking is also known by a different name.
This behavior is very common in app download, movie streaming, and torrent websites. While they mostly employ this technique to earn advertising, others can use it to steal your personal information. In this type of hacking, the attacker hijacks Virus, Trojan Attacks A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software. A simple way to answer the question "what is Trojan" is it is a type of malware that typically gets hidden as an attachment in an email or a free-to-download file, then transfers onto the user’s device. Once downloaded, the malicious code will execute the task the attacker designed it for, such as gain backdoor access to corporate systems, spy on users’ online activity, or steal sensitive data. Indications of a Trojan being active on a device include unusual activity such as computer settings being changed unexpectedly. Phishing
It is a hacking technique using which a
hacker replicates the most-accessed sites and traps the victim by sending spoofed link. Combined with social engineering, it becomes one of the most deadliest attack vectors. Eavesdropping (Passive Attacks) An eavesdropping attack occurs when a hacker intercepts, deletes, or modifies data that is transmitted between two devices. Eavesdropping, also known as sniffing or snooping, relies on unsecured network communications to access data in transit between devices.
To further explain the definition of "attacked with
eavesdropping", it typically occurs when a user connects to a network in which traffic is not secured or encrypted and sends sensitive business data to a colleague. The data is transmitted across an open network, which gives an attacker the opportunity to exploit a vulnerability and intercept it via various methods. Eavesdropping attacks can often be difficult to spot. Unlike other forms of cyber attacks, the presence of a bug or listening device may not adversely affect the performance of devices and networks. Fake WAP Fake WAP (Wireless Access Point) is a type of hacking attack in which the hacker sets up a wireless router with a convincingly legitimate name in a public spot where people might connect to it. Once they do, the hacker can monitor and even change internet connections to steal sensitive data or force the user to download malware onto their device. Waterhole Attacks
It is a computer attack strategy in which an
attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes. Denial of Service (DoS/DDoS) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. Keylogger Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware. While the programs themselves are legal, with many designed to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other confidential information. Hacker Vs. Cracker The main difference between hackers and crackers can be observed through the following points: Hackers are people who use their knowledge for a good purpose and do not damage the data, whereas a cracker is someone who breaks into the system with a malicious purpose and damages data intentionally. Hackers possess advanced knowledge of computer systems and programming languages, while crackers might not necessarily be so skilled and well-versed with computing knowledge. The hackers work for an organization to improvise their network and solve any issues. Crackers are someone from whom the hacker protects the organization. Crackers work just because a system might be challenging or to get illegal gains. Hacking is ethical, while cracking is illegal and unethical. Hackers have ethical certificates, while the Crackers do not possess any certificates. Hackers continuously work towards making new tools rather than using the existing ones. The crackers, on the other hand, have inadequate computing knowledge to make new tools and use tools already used by other crackers.
In general use, Cracker hasn’t found much traction.
Famous Hackers While many famous technologists have been considered hackers, including Donald Knuth, Ken Thompson, Vinton Cerf, Steve Jobs and Bill Gates, black hat hackers are more likely to gain notoriety as hackers in mainstream accounts. Gate was also caught breaking into corporate systems as a teenager before founding Microsoft. Some notorious BLACK HAT HACKERS include:
ANONYMOUS is a group of hackers around the world who
meet on online message boards and social networking forums. They mainly focus their efforts on encouraging civil disobedience and/or unrest via DoS attacks publishing victims> personal information online, as well as defacing and defaming websites.
Jonathan James gained notoriety for hacking into multiple
websites, including those of the U.S Dept. of Defense and NASA, as well as for stealing software code when he was a teenager. In 2000, James became the first juvenile, he was just 16 years old to be incarcerated for computer hacking. He committed suicide when he was 25 years old. Adrian Lamo hacked into the system of several organizations, including The New York Times, Microsoft and Yahoo to exploit their security flaws. Lamo was arrested in 2003, convicted in 2004 and sentenced to six months of home detention at his parents; home, two years’ probations and ordered to pay about 65,000 dollars in restitution.
Kevin Mitnick was convicted of a number of criminal
computer crimes after evading authorities for two and a half years. Once one of the FBI’s most want for hacking into networks of 40 high-profile corporations, Mitnick was arrested in 1993 and served five years in a federal prison. After his release, Mitnick founded a cybersecurity firm to help organizations keep their networks safe. Risk Management typically falls into 7 areas:
1. Avoidance- take a close look at want information you
store a what you need to store. For example: 1-2 years after a purchase maybe you don’t need the credit card number anymore and can blank it out with a permanent marker but still keep the receipt in case of a tax audit. 2. Prevention- I think this is self explanatory, prevent access to data, prevent the removal of data from the business , etc. 3. Reduction- Reduce a loss if it does occur. Take measure like placing limits on the amount that can be withdrawn from a bank account at any time. 4. Separation- separate names from credit card numbers whenever possible. Separate user names from passwords ( store them in separate databases). Separate customer data from the internet it on a computer that doesn’t have a internet connection or email account. 5. Duplication- you have actually want to reduce the duplication of customer data as the less duplicates the less chances of theft but you want to duplicate firewalls, etc. 6. Transfer- this is the biggest one, transfer the risk of storing credit card data to a third party processor like PayPal or your bank. Let them take the risk of storing credit cards. Also insurance is a form of transfer as you are transferring your risk to the insurer.
7. Retention- as a last resort, be aware of the risk be risk
your face but if you cannot effectively manage it you must retain it or avoid it ( by not engaging in business) Cyber crime tactics: How to avoid becoming a victim
Cybercrime is on the rise, affecting millions of
consumers and organizations all over the world. Graham Day author of December’s book of the month, Security in the Digital World, says: “ Attackers are slowly discovering all the ways that devices can be used to attack others. As this knowledge develops, the number and sophistication of attacks also increase.”
It’s important to be aware of the tactics cyber
criminals use and how you can protect yourself. Three methods that cyber criminals use to attack as defines Security in the Digital World
1. Social Engineering- the attacker tries to
manipulate you into giving them either your information, or access to your computer so that they can get the information themselves. This can take place through many types of communication, including the telephone (vishing), email (phishing), text messages (smishing) or chats within games or apps. The aim of social engineering is to exploit human nature by targeting common human traits such as the fear of being attacked. 2. Malware- Malware is malicious software that will damage or harm your computer, network or information with the sole intent of infecting your system. Some malware will attempt to take control of the system, allowing the attacker to do anything that they want with it or the information on the device, deny you the device or the information, or benefit from taking control of the device or he information.
Malware is constantly altered by attackers to create new strains
so, it is almost impossible to keep track. Know strains include Trojans, jailbreaks, viruses and worms. 3. Ransomware- Petya, Wanna Cry and not Petya are all strains of ransomware that affected the computer systems organizations worldwide. Ransomware is a type of malware that is delivered by social engineering and block access to the information stored on your device/system. Users will be denied access to their information unless they pay a ‘ ransom’ to the attacker--- usually in an electronic currency such as bitcoin.
This methods may be used on their own, or you could fall
victim to an attack that uses a combination. The attacker uses more than one type of communication to make you more confident that you are not being duped or manipulated.