E hi l H ki dEthical Hacking and
Countermeasures
V i 6Version6
Module XLIII
Cyber Warfare- Hacking
Al-Qaida and Terrorism
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.info...
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.news...
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.wire...
Module Objective
This module will familiarize you with:
• Cyber Terrorism Over Internet
• Cyber-Warfare Attacks
• Al-Qaeda...
Module Flow
Cyber Terrorism Over Cyber Support to Terrorist
iInternet Operations
Cyber-Warfare Attacks Cyber Threat to the...
Cyber Terrorism Over Internet
According to http://www.cybercrimes.net/Terrorism, FBI
defined Cyber terrorism as “the use o...
Cyber-Warfare Attacks
Computer virus, logic bombs, and Trojan horse attacks
Cyber Bullying
• It is the use of electronic i...
Cyber-Warfare Attacks (cont’d)
Web vandalism:
• Attacks that deface WebPages, or denial-of-service
attacks
Propaganda:
• P...
Cyber-Warfare Attacks (cont’d)
Distributed Denial-of-Service Attacks:
• Large numbers of computers in one country launch a...
45 Muslim Doctors Planned US
Terror RaidsTerror Raids
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproducti...
Net Attack
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://co...
Al-Qaeda
Al Q d i i t ti l lli f I l i ilit tAl-Qaeda is an international alliance of Islamic militant
organizations found...
Why Terrorists Use Cyber
TechniquesTechniques
The Cyber Division of the FBI states that in the future,
cyber-terrorism may...
Cyber Support to Terrorist
OperationsOperations
Terrorists recognize the benefit of cyber
operations and continue to explo...
Cyber Support to Terrorist
Operations (cont’d)Operations (cont d)
These operations include:
• Planning
• Recruitment
R h
p...
Planning
Terrorists use the cyber Using steganography,
Th i d
Terrorists use the cyber
infrastructure to plan
attacks, com...
Recruitment
R i i h lif bl d f i i iRecruitment is the life-blood of a terrorist organization
and they use multiple method...
Research
Terrorists can tap into thousands of databases, libraries, and newsgroups
around the world to gather information ...
Propaganda
Terrorists use propaganda to discredit their
enemy while making themselves look good
These groups post articles...
Cyber Threat to the Military
Military is linked together through the Global Information
Grid, computers, and computer netw...
Cyber Threat to the Military
(cont’d)(cont d)
Terrorists can hack the following
i f i
• Commercial transactions
informatio...
Russia ‘hired botnets’ for Estonia
Cyber-WarCyber War
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproducti...
NATO Threatens War with
RussiaRussia
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Pr...
Bush on Cyber War: ‘a subject I
can learn a lot about’can learn a lot about
EC-Council
Copyright © by EC-Council
All Right...
E.U. Urged to Launch Coordinated
Effort Against CybercrimeEffort Against Cybercrime
EC-Council
Copyright © by EC-Council
A...
Budget: Eye on Cyber-Terrorism
AttacksAttacks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is St...
Cyber Terror Threat is Growing,
Says ReidSays Reid
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction ...
Terror Web 2.0
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http:...
Table 1: How Websites Support
Objectives of terrorist/Extremist GroupsObjectives of terrorist/Extremist Groups
EC-Council
...
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-C...
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-C...
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-C...
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-C...
Electronic Jihad
Electronic Jihad software is used to let the owner of a
computer give control of his system to creator of...
Electronic Jihad (cont’d)
El t i Jih d P i t f l t i i jih di W b it AlElectronic Jihad Program is a part of long-term vis...
Electronic Jihad: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Electronic Jihad' App Offers
Cyber Terrorism for the MassesCyber Terrorism for the Masses
EC-Council
Copyright © by EC-Cou...
Cyber Jihad – Cyber Firesale
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited...
http://internet-
haganah com/haganah/haganah.com/haganah/
Source: http://internet-haganah.com/
EC-Council
Copyright © by E...
Mujahedeen Secrets Encryption
ProgramProgram
Mujahideen Secrets 2 is a new version of an encryption tool, ostensibly writt...
Mujahedeen Secrets Encryption
Program: Screenshot 1Program: Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights R...
Mujahedeen Secrets Encryption
Program: Screenshot 2Program: Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights R...
Mujahedeen Secrets Encryption
Program: Screenshot 3Program: Screenshot 3
EC-Council
Copyright © by EC-Council
All Rights R...
Summary
Cyber terrorism is the use of computing resources against persons or property
to intimidate or coerce a government...
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Upcoming SlideShare
Loading in …5
×

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism

407 views
251 views

Published on

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
407
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism

  1. 1. E hi l H ki dEthical Hacking and Countermeasures V i 6Version6 Module XLIII Cyber Warfare- Hacking Al-Qaida and Terrorism
  2. 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com
  3. 3. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.news.com/
  4. 4. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.wired.com/
  5. 5. Module Objective This module will familiarize you with: • Cyber Terrorism Over Internet • Cyber-Warfare Attacks • Al-QaedaQ • Why Terrorists Use Cyber Techniques • Cyber Support to Terrorist Operations • Cyber Threat to the Military • Electronic Jihad• Electronic Jihad EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  6. 6. Module Flow Cyber Terrorism Over Cyber Support to Terrorist iInternet Operations Cyber-Warfare Attacks Cyber Threat to the Military Al-Qaeda Electronic Jihad Why Terrorists Use Cyber Techniques EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited q
  7. 7. Cyber Terrorism Over Internet According to http://www.cybercrimes.net/Terrorism, FBI defined Cyber terrorism as “the use of computing resourcesdefined Cyber terrorism as the use of computing resources against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” Cyber-terrorism is the leveraging of a target's computer and information technology particularly via the Internet to causeinformation technology, particularly via the Internet, to cause physical, real-world harm,or severe disruption Cyerb terrorism can weaken countries economy; by doing this it can strip the country of its resources and make it more vulnerable to military attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited vulnerable to military attack
  8. 8. Cyber-Warfare Attacks Computer virus, logic bombs, and Trojan horse attacks Cyber Bullying • It is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, blogs, mobile phones, pagers instant messages and defamatory websitespagers, instant messages, and defamatory websites to bully or harass the others Cyber Stalking • It is the use of the Internet or other electronic means to stalk someone Cyber Stalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • It is used with online harassment and online abuse
  9. 9. Cyber-Warfare Attacks (cont’d) Web vandalism: • Attacks that deface WebPages, or denial-of-service attacks Propaganda: • Political messages can be spread through or to anyone by accessing Internet h i d • Classified information that is not handled securely can be intercepted and even modified making Gathering data: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited can be intercepted and even modified, making espionage possible from other side of the world
  10. 10. Cyber-Warfare Attacks (cont’d) Distributed Denial-of-Service Attacks: • Large numbers of computers in one country launch a DoS attack against systems in another country • Military activities that use computers and satellites for Equipment disruption: • Military activities that use computers and satellites for co-ordination are at risk from this type of attack, putting soldiers at risk • Power, water, fuel, communications, commercial, and Attacking critical infrastructure: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited transportation are all vulnerable to a cyber attack
  11. 11. 45 Muslim Doctors Planned US Terror RaidsTerror Raids EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.telegraph.co.uk/
  12. 12. Net Attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://counterterrorismblog.org/
  13. 13. Al-Qaeda Al Q d i i t ti l lli f I l i ilit tAl-Qaeda is an international alliance of Islamic militant organizations founded in 1988 Al-Qaeda has attacked civilian and military targets in various countries; the most notable being the September k h d i k Ci d11, 2001 attacks that occurred in New York City and Northern Virginia Characteristic terror techniques include use of suicide attacks and simultaneous bombings of different targets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g g
  14. 14. Why Terrorists Use Cyber TechniquesTechniques The Cyber Division of the FBI states that in the future, cyber-terrorism may become a viable option to traditional physical acts of violence due to: • Anonymity • Diverse targets • Low risk of detection Lo risk of personal injur• Low risk of personal injury • Low investment • Operate from nearly any location • Few resources are needed EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  15. 15. Cyber Support to Terrorist OperationsOperations Terrorists recognize the benefit of cyber operations and continue to exploit i f i h l i f i finformation technology in every function of their operations C b f d i f dit d th ft tCyber fraud, ranging from credit card theft to money laundering, is the latest wrinkle in terrorists' use of the Internet Online scams are harder to trace because they are relayed through a sophisticated network of individuals and Web sites worldwideworldwide Groups including al-Qaeda use cyberspace for communications recruiting and EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited for communications, recruiting, and propaganda
  16. 16. Cyber Support to Terrorist Operations (cont’d)Operations (cont d) These operations include: • Planning • Recruitment R h p • Research • Propaganda EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  17. 17. Planning Terrorists use the cyber Using steganography, Th i d Terrorists use the cyber infrastructure to plan attacks, communicate with each other, and posture for future Using steganography, they hide instructions, plans and pictures for their attacks in pictures and posted comments The images and instructions can only be opened using a “private key” or code known l t th i i t posture for future exploitation and posted comments in chat rooms only to the recipients EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  18. 18. Recruitment R i i h lif bl d f i i iRecruitment is the life-blood of a terrorist organization and they use multiple methods to entice new members In addition to traditional methods, such as written publications, local prayer leaders, audio-video cassettes d C i h i i h iand CDs promoting their cause; terrorist groups use their own websites to recruit new members Terrorists provide their view of the history of their organization, its cause, and additional information to encourage potential members to join EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited encourage potential members to join
  19. 19. Research Terrorists can tap into thousands of databases, libraries, and newsgroups around the world to gather information on any subject that they need toaround the world to gather information on any subject that they need to research The information can be in the form of text, maps, satellite images, pictures, orThe information can be in the form of text, maps, satellite images, pictures, or even video material h f h h l h d h hThe use of search engines, such as Google, have made searching the Internet very easy and allows terrorists to obtain critical information Al Qaeda training manual recovered in Afghanistan states: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.”
  20. 20. Propaganda Terrorists use propaganda to discredit their enemy while making themselves look good These groups post articles supporting their agendas on these sites which make them instantlyagendas on these sites, which make them instantly available to the worldwide cyber community Terrorists make use of propaganda to enlist the support of their own public for jihad and to demoralize the enemy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  21. 21. Cyber Threat to the Military Military is linked together through the Global Information Grid, computers, and computer networks Terrorists think that the military is the only vulnerability to command and control systems A major threat to the military deals with the fact that a large percentage of the Global Information Grid is dependent upon commercial telecommunications links and the Internet which are not controlled by DOD EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and the Internet, which are not controlled by DOD (Department of Defense)
  22. 22. Cyber Threat to the Military (cont’d)(cont d) Terrorists can hack the following i f i • Commercial transactions information: • Payrolls • Sensitive research data • Intelligence • Operational plans• Operational plans • Procurement sensitive source selection data • Health records • Personnel records • Weapons systems maintenance records • Logistics operations EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  23. 23. Russia ‘hired botnets’ for Estonia Cyber-WarCyber War EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.itnews.com.au/
  24. 24. NATO Threatens War with RussiaRussia EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.strategypage.com/
  25. 25. Bush on Cyber War: ‘a subject I can learn a lot about’can learn a lot about EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.theregister.co.uk/
  26. 26. E.U. Urged to Launch Coordinated Effort Against CybercrimeEffort Against Cybercrime EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.networkworld.com/
  27. 27. Budget: Eye on Cyber-Terrorism AttacksAttacks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.zdnet.com.au/
  28. 28. Cyber Terror Threat is Growing, Says ReidSays Reid EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.telegraph.co.uk/
  29. 29. Terror Web 2.0 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://analysis.threatswatch.org/
  30. 30. Table 1: How Websites Support Objectives of terrorist/Extremist GroupsObjectives of terrorist/Extremist Groups EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  31. 31. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  32. 32. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  33. 33. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  34. 34. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  35. 35. Electronic Jihad Electronic Jihad software is used to let the owner of a computer give control of his system to creator of e- Jihad h k f ih d h k fThe makers of e-Jihad can then use a network of “zombies” to attack web sites and other Internet servers After installing e-Jihad, the user is asked for a username and password that is sent to a central web server If the user does not have a username yet, he/she can register a new one; he/she can even enter the EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g ; / username of the person who invited him to e-Jihad
  36. 36. Electronic Jihad (cont’d) El t i Jih d P i t f l t i i jih di W b it AlElectronic Jihad Program is a part of long-term vision jihadi Web site Al- jinan.org to use the Internet as a weapon Electronic Jihad allows users to target specific IP addresses for attack in order to take any servers running at those IP addresses offline Application includes a Windows-like interface that lets users choose from a list of target Web sites provided via the Al-jinan site, select an attack speed (weak, medium, or strong), and the click on the "attack" button( , , g), The attacks from jihadists are interested in taking Web sites down and disrupting economies that they do not like EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited disrupting economies that they do not like
  37. 37. Electronic Jihad: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  38. 38. Electronic Jihad' App Offers Cyber Terrorism for the MassesCyber Terrorism for the Masses EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com
  39. 39. Cyber Jihad – Cyber Firesale EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://blogs.csoonline.com/
  40. 40. http://internet- haganah com/haganah/haganah.com/haganah/ Source: http://internet-haganah.com/ EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  41. 41. Mujahedeen Secrets Encryption ProgramProgram Mujahideen Secrets 2 is a new version of an encryption tool, ostensibly written h l Al Q d b h i h Ito help Al Qaeda members encrypt secrets as they communicate on the Internet The first edition file contained several encryption algorithms (including AES 256), 2048-bit encryption keys, ROM compression encryption and encryption256), 2048 bit encryption keys, ROM compression encryption and encryption auto-detection, and file shredding capabilities The second edition contains automatic message/messaging encryption/authentication and file encryption as well as code signing andencryption/authentication and file encryption as well as code signing and checking, and file shredding This toolset provides groups like Al-Qaida to securely transmit and wipe their filfiles Second edition toolset demonstrates a software development lifecycle with l l f hi i i d l i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited some level of sophistication and planning
  42. 42. Mujahedeen Secrets Encryption Program: Screenshot 1Program: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  43. 43. Mujahedeen Secrets Encryption Program: Screenshot 2Program: Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  44. 44. Mujahedeen Secrets Encryption Program: Screenshot 3Program: Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  45. 45. Summary Cyber terrorism is the use of computing resources against persons or property to intimidate or coerce a government the civilian population or any segmentto intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives Cyber terrorism can weaken country’s economy, by doing this it can strip they y y, y g p country of its resources and make it more vulnerable to military attack Groups including al-Qaeda use cyberspace for communications, recruiting,Groups including al Qaeda use cyberspace for communications, recruiting, and propaganda Electronic Jihad software is used to let the owner of a computer give controlElectronic Jihad software is used to let the owner of a computer give control of his system to creator of e-Jihad Electronic Jihad Program is a part of long-term vision for which jihadi Web EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Electronic Jihad Program is a part of long term vision for which jihadi Web site Al-jinan.org has to use the Internet as a weapon
  46. 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  47. 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited

×