1. CONTENTS
• About cybercrime
• Definition of cybercrime
• Types
• Hacking and its tools
• Denial of service attack and its tools
• Phishing and its example
• SIPRNET
• Virus dissemination
• Cain and abel
• Cyberlaw
• Cyber security
2. What is Cybercrime?
[1]Computer crime, or
cybercrime, refers to any crime
that involves a computer and a
network, where the computers
may or may not have played an
instrumental part in the
commission of a crime. Net
crime refers, more precisely, to
criminal exploitation of the
Internet.
4. Types of Cyber Crime
(This is not exhaustive list of cybercrime)
HACKING
DENIAL OF SERVICE
ATTACK
VIRUS DISSEMINATION
SOFTWARE PIRACY
PORNOGRAPHY
IRC Crime
CREDIT CARD FRAUD
PHISHING
CYBER STALKING
THREATENING
SALAMI ATTACK
5. Hacking…..or Cracking??
A hacker is a person who is
proficient with computers and/or
programming to an expert
level where they know all of the
in's and out's of a system. There
is NO illegality involved with
being a hacker. A cracker is a
hacker who uses his proficiency
for personal gains outside of the
law. EX: stealing data, changing
bank accounts. It's then safe to
say that all crackers are hackers,
but not all hackers are crackers.
6. Hacking tools…
Nmap - scans and detects ports.
Wireshark - it is a sniffer that lets you
capture and interactively browse the
contents of network frames.
LCP – Windows Password Cracker
SuperScan - It is great TCP/IP port scanner
which is widely used for detecting the open
ports or live hosts in given IP ranges
Keyloggers – tracks the keys struck on
keyboard and monitors them.
7. Denial-of-service attack
A denial-of-service attack (DoS attack) is an attempt to make a
computer resource unavailable to its intended users.
DoS attacks are commonly launched from one or more points on
the Internet that are external to the victim’s own system or
network.
The types of DoS attacks are Ping of Death and SYN attacks. A
Ping of Death attack involves a very large Internet Control
Messaging Protocol (ICMP) packet and the receiving computer
gets it in the form of data packets. Then it tries to reassemble it.
When reassembled the packet proves to be too large for the
buffers and overflows it. The consequences may be anything from
reboots to system hangs.
The SYN attack involves the three-way handshake of the TCP/IP
protocol. First the client sends a SYN packet to the server. Then
the server responds with a SYN-ACK. When the client responds
to this, only then does the client-server conversation really start.
Now in a SYN attack the client does not respond to the SYN-
ACK. It waits till just before the service time expires and then
sends another request. This way the server machine remains
engaged.
8. Tools regarding DOS
Trinity is a Linux-based distributed
denial-of-service attack tool that a
hacker can use to launch a massive
IP flood against a victim's targeted
computer. It must first be secretly
installed on a hacked Linux server;
after that, the agent can be remotely
controlled to launch a network
flood. It prevents the hacker from
being identified The major versions
of distributed denial of service
attack tools are Trinoo (or trin00),
TFN, TFN2K and Stacheldraht.
9. Phishing…
The act of sending email that
falsely claims to be from a
legitimate organization. This
is usually combined with a
threat or request for
information: for example,
that an account will close, a
balance is due, or
information is missing from
an account. ...
10.
11. [2]How it is done??
Fake websites-A domain name similar to a legitimate site is
bought, and molded to look exactly like the real thing. The
phisher then sends out messages, either by e-mail, instant
messaging, Facebook messages, text messages, and so forth
to fool a victim into clicking a link to the fake site. The
unsuspecting victim logs in and their credentials logged.
Fake Pop-up -A link was still sent, however, instead of
linking to a fake website, it would link to the actual
website. When the real website loads, a pop-up appears
asking for the user's credentials. The victim, seeing the
legitimate site in the background would think the pop-up
was from a legitimate source and enter their information.
In reality, the pop-up would be the hacker's tool to phish
credentials.
-
12. [3]Security Threats.. How wikileaks break
security of USA network SIPRNET
Siprnet is a communication network
which is being used by the Ministry
of defense USA. It is also called internet
protocol secret network. This network was
shared among foreign officials of USA to
exchange sensitive information. Siprnet is
considered as source of wikileaks
documents which they are broadcasting.
The most astonishing feature is that there
is no current proof…how it occurred…
It was thought that one of its members
Bradely Manning leaked the contents but
wikileaks denied that.
There was no log of evidence that the
system was used out of network terminals
which were allotted.
13. VIRUS DISSEMINATION
A computer virus is a program that
can ‘infect’ other legitimate
programs by modifying them to
include a possibly ‘evolved’ copy
of itself. Viruses can spread
themselves, without the
knowledge or permission of the
users, to potentially large
numbers of programs on many
machines. A computer virus
passes from computer to
computer like a biological virus
passes from person to person.
16. Online Ads – New Virus Spreading
Tools for Hackers
Web ads, unintentionally, have become a
powerful tool in the hands of hackers for
spreading viruses.
Recently, a computer virus in the
advertisement on tomshadware.com has
been discovered which automatically takes
the users to a website which installs
malware.
18. Now let me give you an example of a software
which is easily available…and it sniffs the
packets of the ip addresses connected to the
system on which it is being running…
The name of the software is Cain & Abel and it is a
password recovery tool for Microsoft Operating
Systems. It allows easy recovery of several kind of
passwords by sniffing the network, cracking
encrypted passwords using Dictionary, Brute-
Force and Cryptanalysis attacks, recording VoIP
conversations, decoding scrambled passwords,
recovering wireless network keys, revealing
password boxes, uncovering cached passwords
and analyzing routing protocols
19.
20.
21.
22. CYBERLAW..
Cyberlaw is a constantly evolving
process. As the Internet grows,
numerous legal issues arise. These
issues vary from Domain Names, to
Intellectual Property Rights,
Electronic Commerce, Privacy,
Encryption to Spamming and so on
.Internet in India came in 1995 and
after almost 5 years, India gets ready
to legislate its first Cyberlaw namely
the Information Technology Bill 1999.
The said bill is presently pending in
Parliament.
by :- Mr.Pawan Duggal
Advocate, Supreme Court of India &
Cyberlaw Expert
23. Cyber Safety..
It is a common term used to describe a
set of practices, measures and or
actions you can take to protect your
personal information and your
computer.
24. Top seven cyber safety actions
1.Install OS/Software updates
2.Run antivirus software
3.Prevent Identity theft
4.Turn on personal firewalls
5.Avoid spyware/adware
6.Protect passwords
7.Back up important files