CSL Unit-3
CSL Unit-3
• Trend Micro HouseCall is another antispyware tool that does not require user
installation, so it uses minimal processor and memory resources and disk space.
However, like Malwarebytes, users cannot set automatic scans.
Popularity It is less popular than cryptography. It is more popular and commonly used than
steganography.
Dependability It relies on the key. It doesn't have any parameters.
Goal Its main goal is to offer secure communication. Its main goal is to provide data protection.
Structure of data The structure of data is not frequently altered. The structure of data is allowed to alter while
encrypting.
Attacks name The attack's name in the steganography The attack's name in cryptography is
technique is steganalysis. cryptanalysis.
Supported Security Principles It offers only confidentiality and authentication. It provides security principles, including
integrity, secrecy, authentication, and
non-repudiation.
Implementation It may be utilized on any medium, including It is mainly utilized on text files.
text files, audio-video files, and images.
Mathematical It does not entail many mathematical It involves the use of number theory,
Transformations transformations mathematics, and other tools to manipulate
data.
Techniques Some of the techniques used in steganography It employs techniques such as stream,
are transformed domain embedding, spatial substitution, transpositional, and block ciphers.
domain, and model-based.
DoS and DDoS Attack
• A Denial-of-Service (DoS) attack is an attack meant to shut down a
machine or network, making it inaccessible to its intended users.
• DoS attacks accomplish this by flooding the target with traffic, or sending
it information that triggers a crash.
• Victims of DoS attacks often target web servers of high-profile
organizations such as banking, commerce, and media companies, or
government and trade organizations.
• Though DoS attacks do not typically result in the theft or loss of
significant information or other assets, they can cost the victim a great
deal of time and money to handle.
Classification of DoS attack
• Bandwidth Attack – tries to exhaust the network bandwidth (Ex- UDP
and TCP floods)
• Logic attack – can exploit the vulnerabilities in network software such
as webserver.
• Protocol attacks – exploits the vulnerabilities in communication
protocols.
• Unintentional DoS attack – Sudden increase in genuine traffic of
clients.
Levels of DoS attack
• Flood attack - attackers send a very high volume of traffic to a
system so that it cannot examine and allow permitted
network traffic. For example, an ICMP flood attack occurs
when a system receives too many ICMP ping commands and
must use all its resources to send reply commands.
• Ping of death attack -an attacker crashes, destabilizes, or
freezes computers or services by targeting them with
oversized data packets. This form of DoS attack typically
targets and exploits legacy weaknesses that organizations
may have patched.
Levels of DoS attack
• A SYN flood (half-open attack) is a type of denial-of-service
(DDoS) attack which aims to make a server unavailable to
legitimate traffic by consuming all available server resources. By
repeatedly sending initial connection request (SYN) packets, the
attacker is able to overwhelm all available ports on a targeted
server machine, causing the targeted device to respond to
legitimate traffic sluggishly or not at all.
Levels of DoS attack
Teardrop attack –
A teardrop attack is a denial-of-service (DoS) attack that involves
sending fragmented packets to a target machine. Since the machine
receiving such packets cannot reassemble them due to a bug in TCP/IP
fragmentation reassembly, the packets overlap one another, crashing the
target network device.
Smurf Attack –
A smurf attack is a type of distributed denial of service (DDoS) attack where
an attacker sends an avalanche of ping data packets to its target. It does
this by spoofing the source IP address of the ping to be the victim's, and
sending it to a network broadcast IP address.
Tools for performing DoS Attack
How to prevent from DoS and DDoS attacks
• Implement router filters.
• Install patches to guard against TCP SYN flooding
• Disable any unused network services
• Observe system’s performance
• Routinely examine system security
• Establish and maintain regular backup schedules and policies.
SQL injection
• A SQL injection (SQLi) is a technique that attackers use to gain
unauthorized access to a web application database by adding a
string of malicious code to a database query.
• A SQL injection manipulates Structured Query Language code to
provide access to protected resources, such as sensitive data, or
execute malicious SQL statements. When executed correctly, a
SQL injection can expose intellectual property, customer data or
the administrative credentials of a private business.
• SQL injection attacks can be used to target any application that
uses a SQL database, with websites being the most common
prey.
What an attacker can do?
• Bypassing Logins : by obtaining username and passwords
• Accessing secret data : reconnaissance
• Adding new data or Modifying contents of website:
INSERT/UPDATE
• Shutting down the My SQL server
Steps for SQL Injection attack
1. Search for pages that contains a HTML form like login page,
search page, registration page etc.
2. Identify the suitable form fields like text box, combo box, etc.
3. Inserted crafted code (like a single quote) into the selected form
field and check whether the database is parsing SQL syntax or
not.
4. If the database server is parsing SQL input, then use other SQL
commands to retrieve or insert data in the database
SQL injection example
How to prevent SQL injection attacks
• Input validation: This involves replacing single quote with two single
quotes or a double quote, sanitizing the user input by removing
unnecessary special characters, detecting and removing unnecessary
numeric data and making all the input fields as short as possible to limit
the length of the user input.
• Modify error reports: SQL errors must not be displayed to the users.
Website administrator should change the default settings for displaying
detailed SQL errors including the database software name, version, and
stack trace. Instead of a detailed message they can display a
simple message which doesn’t provide any useful information.
• Other preventions:
• Default system accounts for SQL server should never be used
• Isolate database server and web server
• If there are any unused additional stored procedures in the database, they should
be removed
Buffer overflow
Attacks on wireless network
• Sniffing – eavesdropping on network.
Attacker installs sniffers remotely on victim’s system.
gathers required information about active wifi n/w
detection of SSID
Collecting MAC address
collecting frames to crack WEP
Attacks on wireless network
• Spoofing - act of impersonating legitimate entities or devices to
gain unauthorized access or perform malicious activities. It
involves manipulating network protocols and techniques to
deceive network users, administrators, or security systems.
MAC Address Spoofing:
IP Spoofing
• DoS
• MiTM
• Encryption cracking
How to secure wireless networks
• Change the default settings of all the equipments
• Enable WPA/WEP Encryption
• Change the default SSID
• Enable MAC address filtering
• Disable SSID broadcast
• Avoid providing the network a name which can be easily identified
• Connect to only secured wireless network
• Assign static IP address to devices
• Enable firewalls
• Turn off network when not in use for extended period of time
• Periodic and regular monitor of wireless network security
Phishing
• Phishing is a fraudulent practice in which an attacker
masquerades as a reputable entity or person in an email or
other form of communication.
• Attackers commonly use phishing emails to distribute malicious
links or attachments that can extract login credentials, account
numbers and other personal information from victims.
• Deceptive phishing is a popular cybercrime, as it's far easier to
trick someone into clicking on a malicious link in a seemingly
legitimate phishing email than it is to break through a
computer's defenses.
How phishing works
• Phishers can use public sources of information, such as LinkedIn, Facebook and
Twitter, to gather the victim's personal details, work history, interests and
activities.
• These resources are often used to uncover information such as names, job titles
and email addresses of potential victims.
• An attacker can then use information to craft a believable phishing email.
• A victim receives a message that appears to have been sent by a known contact
or organization.
• The attack is then carried out either when the victim clicks on a malicious file
attachment or clicks on a hyperlink connecting them to a malicious website.
• In either case, the attacker's objective is to install malware on the user's device
or direct them to a fake website.
• Fake websites are set up to trick victims into divulging personal and financial
information, such as passwords, account IDs or credit card details.
• Many phishing emails are poorly written and clearly fake, cybercriminals are
using Chatbots to make phishing attacks more real
Types of phishing
Spear phishing attacks are directed at specific individuals or companies.
• These attacks usually employ gathered information specific to the victim to more
successfully represent the message as being authentic.
• Spear phishing emails might include references to co-workers or executives at the victim's
organization, as well as the use of the victim's name, location or other personal
information.
Whaling attacks are a type of spear phishing attack that specifically target senior
executives within an organization with the objective of stealing large sums of sensitive data.
• Attackers research their victims in detail to create a more genuine message, as using
information relevant or specific to a target increases the chances of the attack being
successful.
• A typical Whaling attack targets an employee who can authorize payments, the phishing
message often appears to be a command from an executive to authorize a large payment
to a vendor
Types of phishing..
Pharming is a type of phishing attack that uses domain name system cache poisoning to
redirect users from a legitimate website to a fraudulent one.
• Pharming attempts to trick users into logging in to the fake website using their personal
credentials.
Clone phishing attacks use previously delivered but legitimate emails that contain either
a link or an attachment.
• Attackers make a copy -- or clone -- of the legitimate email and replace links or attached
files with malicious ones.
• Victims are often tricked into clicking on the malicious link or opening the malicious
attachment.
This technique is often used by attackers who have taken control of another victim's
system
• Evil twin attacks occur when hackers try to trick users into connecting to a fake Wi-Fi
network that looks like a legitimate access point.
• The attackers create a duplicate hotspot that sends out its own radio signal and uses
the same name as the real network.
• When the victim connects to the evil twin network, attackers gain access to all
transmissions to or from the victim's devices, including user IDs and passwords.
Types of phishing..
• Voice phishing is a form of phishing that occurs over voice-based media,
including voice over IP -- also called vishing -- or plain old telephone service. This
type of scam uses speech synthesis software to leave voicemails notifying the
victim of suspicious activity in a bank account or credit account.
• SMS phishing, or smishing, is a mobile device-oriented phishing attack that uses
text messaging to convince victims to disclose account credentials or install
malware.
• Page hijack attacks redirect the victim to a compromised website that's the
duplicate of the page they intended to visit. The attacker uses a cross-site
scripting attack to insert malware on the duplicate website and redirects the victim
to that site.
Phishing techniques
• URL spoofing. Attackers use JavaScript to place a picture of a legitimate
URL over a browser's address bar. The URL is revealed by hovering over
an embedded link and can also be changed using JavaScript.
• Link manipulation. Often referred to as URL hiding, this technique is used
in many common types of phishing. Attackers create a malicious URL
that's displayed as if it were linking to a legitimate site or webpage, but the
actual link points to a malicious web resource.
• Link shortening. Attackers can use link shortening services, like Bitly, to
hide the link destination. Victims have no way of knowing if the shortened
URL points to a legitimate website or to a malicious website.
• Homograph spoofing. This type of attack depends on URLs that were
created using different characters to read exactly like a trusted domain
name. For example, attackers can register domains that use slightly
different character sets that are close enough to established, well-known
domains.
Phishing techniques…
• Graphical rendering. Rendering all or part of a message as a graphical image
sometimes enables attackers to bypass phishing defenses. Some security
software products scan emails for particular phrases or terms common in phishing
emails. Rendering the message as an image bypasses this.
• Covert redirect. Attackers trick victims into providing personal information by
redirecting them to a supposed trusted source that asks them for authorization to
connect to another website. The redirected URL is an intermediate, malicious page
that solicits authentication information from the victim. This happens before
forwarding the victim's browser to the legitimate site.
• Chatbots. Attackers use AI-enabled chatbots to remove obvious grammatical and
spelling errors that commonly appear in phishing emails. Phishing emails using an
AI chatbot might make the phishing message sound more complex and real,
making it harder to detect.
• AI voice generators. Attackers use AI voice generator tools to sound like a
personal authority or family figure over a phone call. This further personalizes the
phishing attempt, increasing its likeliness to work. Attackers just need a voice
sample using a small audio clip of the victim's manager or family member.
Types of phishing scams
• Deceptive phishing
• Malware based phishing
• Keyloggers
• Session hijacking
• Web trojans
• System reconfiguration attacks
• Man in the middle phishing
• Search engine phishing
Phishing Countermeasures
• Keep antivirus up to-date
• Do not click on hyperlinks in Emails
• Take advantage of anti-spam software
• Verify https
• Use anti-spyware software
• Get educated
• Firewall
• Use backup system images
• Do not enter sensitive financial information in pop up windows
Identity theft
• Identity theft is the crime of obtaining the personal or financial
information of another person to use their identity to commit
fraud, such as making unauthorized transactions or purchases.
• Identity theft is committed in many different ways and its victims
are typically left with damage to their credit, finances, and
reputation.
• True name identity theft means attacker uses the victim’s
personal information to open a fake new account in the victim’s
name
• Account takeover identity theft means attacker uses the victim’s
personal information to gain access to existing account
Types of Identity Theft
• Financial Identity Theft
In financial identity theft, someone uses another person's identity
or information to obtain credit, goods, services, or benefits.
• Criminal identity theft
In criminal identity theft, a criminal poses as another person
during an arrest to try to avoid a summons, prevent the discovery
of a warrant issued in their real name or avoid an arrest or
conviction record
Medical Identity Theft
Someone poses as another person to obtain free medical care.
Types..
• Tax Identity Theft
Tax identity theft occurs when someone uses your personal
information, including your Social Security Number, to file a
bogus state or federal tax return in your name and collect a
refund.
• Child Identity Theft
In child identity theft, someone uses a child's identity for various
forms of personal gain.
The fraudster may use the child's name and Social Security
Number to obtain a residence, find employment, obtain loans, or
avoid arrest on outstanding warrants.
Techniques
• Dumpster diving
• Shoulder surfing
• Phishing and spam e-mail
• Data breaches
• Credit card theft
• Wi fi hacking
• ATM Skimmers
• Mobile phone theft
Warning Signs of Identity Theft
• Some clear indicators of identity theft include bills for items that you
didn't buy. These can be seen on your credit card or received via
email or other means.
• Calls from debt collectors regarding accounts that you didn't open,
and your loan applications being denied when you believed your
credit is in good standing.
• Other warning signs include bounced checks,
• unexplainable medical bills,
• utilities being shut off,
• inability to sign into accounts,
• hard inquiries into your credit report not caused by your actions,
• new credit cards in your name that you didn't apply for.
Steps to prevent identity theft
• Check your credit card statement periodically
• Shred unsolicited credit card applications
• Monitor your account statements for any unauthorised transactions
• Follow up with creditors in case there are fraudulent transactions
• Do not respond to spam E-mails.