This document provides an introduction and overview of network security and cyber attacks. It begins with objectives of the session and introduces concepts like standardization in information security and the OSI security architecture. Next, it discusses different types of security attacks at various layers of the OSI model and the hacker methodology of information gathering, vulnerability assessment, exploitation, and post-exploitation. The document then covers topics such as types of web domains, security of web cameras and CCTV, wireless hacking techniques, industrial control system vulnerabilities, cyber laws, and case studies of ransomware attacks exploiting Windows vulnerabilities.
2. Session 1 objective
Introduction
Real time example of hacking using Kali linux?
Standardization in Information Security & OSI Security
Architecture?
Security Attacks
Review of Attacks, Mechanisms and Services, Network
Security Model
SUMMARY
3. Introduction
What is internet ?
Cyber world is world of binary.
No physical lock does exist.
Google, Amazon, Microsoft and Facebook.
Estimates are that the big four store at least 1,200
petabytes between them. That is 1.2 million
terabytes (one terabyte is 1,000 gigabytes).
4. Why Network/Security Awareness Is Important? (20 Mins)
Mounting a good defence requires understanding
of the offense.
1. Visualizing Live cyber attack in the world using Kali linux tools
2. Check your account is hacked or not?
3. Google as a Tool For Information Gathering
4. Konboot tocrack the windows password demo?
5. Msfvenom to hack androi
6. Live example of online shopping Using Burp Suit Kali linux
7. Tracing any email with protocol based analysis
Hackers way of exploiting system
1. Information Gathering
2. Vulnerability assessment
3. Exploitation and launching attack
4. Gaining control of the system
5. Post exploitation
5. What are Surface, Deep, Dark and Marianas web?
How these sites are browsed ?
Types of Web
6. CCTV/Web camera has following security protocol
SSL/TLS security
IEEE Standard 802.1X
IP-filtering
Public key infrastructure(PKI)
Web Camera/CCTV Security
If no security protocol is configured disaster may
happen
Demo:
inurl:view/Index.Shtml
9. Section 65. Tampering with computer source documents.
Section 66. Computer related offences.
Section 66A. Punishment for sending offensive messages through communication
service, etc.
Section 66B. Punishment for dishonestly receiving stolen computer resource or
communication device. 66C. Punishment for identity theft.
Section 66D. Punishment for cheating by personation by using computer resource.
Section 66E. Punishment for violation of privacy.
Section 66F. Punishment for cyber terrorism.
Section 67. Punishment for publishing or transmitting obscene material in electronic
form.
Section 67A. Punishment for publishing or transmitting of material containing sexually
explicit act, etc., in electronic form.
Section 67B. Punishment for publishing or transmitting of material depicting children in
sexually explicit act, etc., in electronic form.
Section 67C. Preservation and retention of information by intermediaries.
IT Act 2000
10. Section 68. Power of Controller to give directions.
Section 69. Power to issue directions for interception or monitoring or decryption of any
information through any computer resource.
Section 69A. Power to issue directions for blocking for public access of any information
through any computer resource.
Section 69B. Power to authorise to monitor and collect traffic data or information through
any computer resource for cyber security.
Section 70. Protected system.
Section 70A. National nodal agency.
Section 70B. Indian Computer Emergency Response Team to serve as national agency for
incident response.
Section 71. Penalty for misrepresentation.
Section 72. Penalty for Breach of confidentiality and privacy.
Section 72A. Punishment for disclosure of information in breach of lawful contract.
Section 73. Penalty for publishing electronic signature Certificate false in certain particulars.
Section 74. Publication for fraudulent purpose.
Section 75. Act to apply for offence or contravention committed outside India.
Section 76. Confiscation
IT Act 2000
11. A shipping company was attacked by Ransom ware
Phishing mail attack
You can infect computers that aren’t patched, and then you can grab
the passwords from those computers to infect other computers
that are patched.
Exploited complete active directory.
Exploited DC.
Unconditional jump from n/w to n/w
Encrypted MBR
Systems infected >1 million
domain controller @ Ghana
Mirroring isolation backup
Company required reinstall 4000 servers, 45000 PCs
Ransomware attack would cause losses of up to $300 million
A month after cyber attack launched named wannacry1,2
A Case Study of Recent Cyber-Attack
NotPetya
EternalBlue
Vulnerability in
windows/any OS
Srv.sys,445 port
Mimikatz
French security
researcher
Benjamin(Password)
12. Terminology
Security attack:
Security mechanism:
Security service:
Threat:
OSI Security Architecture
Attack
Passive
1. Release of message contents
2. Traffic analysis
Active
1. Masquerade
2. Replay
3. Modification of messages
4. Denial of service
13. DOS (LOIC,HOIC Kali linux)
DDOS (LOIC,HOIC Kali linux)
Brut force
Phishing attack
SQL injection attack
Cross site scripting attack
Eavesdropping attack.
Password attack
Birthday attack
Malware attack
Replay attack
Different Types of Cyber Attacks
Mounting a good defence requires understanding of the
offense.
Caller ID/Email/SMS spoofing
attack (Which layer of OSI ?)
Man in middle attack (Session
hijacking )
IP spoofing attack (Replay
attack) (Which layer of OSI ?)