SlideShare a Scribd company logo
1 of 30
Cyber Security and Ethical Hacking
By Mehedi Hasan
Lecture 10:
DOS Attacks, Distributed DOS Attacks, Data Encryption, Data
Hiding and Steganography - Part i
DOS Attack
Each system connected to the internet has limited bandwidth available.
In a DOS attack, an attacker tries to choke or clog or overload all the
available bandwidth on the target system by bombarding it with infinite
or unlimited data.
As a result even legitimate or real customers and clients are no longer
able to connect to the target system, hence disrupting all services
provided by the victim.
Results in loss of revenue, disrupt in services, inconvenience, customer
dissatisfaction and many other problems.
DOS Attack
TYPES OF DOS ATTACKS
PING OF DEATH: A data packet larger then 65,536 bytes sent to target.
TEARDROP: Data is broken down at some source into smaller chunks
and put back together into larger chunks at destination. Overlapping
data fragments are used to crash the target system.
4000 Bytes
Chunk A: 1—1500 bytes
Chunk B: 1501 – 3000 bytes
Chunk C: 3001 – 4000 bytes
What happens when chunk B is carrying 1499-2999 and Chunk C
carrying 2999 – 4000 bytes? Teardrop.
DOS Attack
TYPES OF DOS ATTACKS
Fragmentation Attack: Variation of Teardrop. Identical data fragments
are sent to target system. Chunk B and Chunk C will be identical.
Smurf Attacks: Huge number of PING requests (ICMP Echo Request
packets) are sent to the broadcast address of the target network using
spoofed addresses from within the target network. Infinite loops can
bring down network vary quickly.
Land Attack: Attacker sends infinite packets to the target system from
the target system itself. Some older implementation of TCP/IP were not
able to handle it.
DOS Attack
TYPES OF DOS ATTACKS
Syn Flooding: Exploits the classic 3-way TCP/IP handshake. Attacker
create infinite instances of half open connections by sending infinite
connection requests from spoofed addresses. According to TCP/IP rules,
whenever a system receives a connection request (SYN packet), it must
keep track of that connection for least 75 seconds.
Step 1: Attacker sends SYN packet to target (Spoofing).
Step 2: Target sends SYN/ACK packet to spoofed.
Step 3: Attacker will never reply to the target.
Hence, the target is out of commission and cannot accept any new
connections until one of the old connections get limited out.
DOS Attack
TYPES OF DOS ATTACKS
Syn Flooding: Can lead to 3 different scenarios:
• The spoofed IP address does not exist.
• The Spoofed IP address exists.
• The spoofed IP address is a system within the victim network.
DOS Attack
TYPES OF DOS ATTACKS
Application Specific DOS Attacks: Instead of attacking the entire system,
it is possible for a criminal to DOS attack only specific applications on
the victim system. For example, the criminal can DOS atack only the
FTP, HTTP or SQL application by flooding any of them with infinite
requests, hence bringing them down.
DOS Attack
NPING
Command line packet generator
DOS Attack
Flood the victim with unlimited data
Colasoft Packet Builder
DOS Attack
Metasploit
TCP Flooding using Metasploit
It is possible to execute a DOS attack against various victims using
Metasploit as well.
Use auxiliary/dos/tcp/synflood
Set RHOST www.victim.com
Run
DOS Attack
Metasploit
Apache Range Header DOS Attack (Apache Killer)
This is a DOS attack that affects apache web server prior to version
2.2.20 and exists due to the way it handles requests by criminal for
overlapping ranges of data. It causes a significant increase in the
memory/CPU usinge of victim.
Use auxiliary/dos/tcp/apache_range_dos
Info auxiliary/dos/tcp/apache_range_dos
Set RHOST www.victim.com
Run
DOS Attack
Metasploit
DOS Attack using Metasploit
Filezilla is a popular FTP server for windows platforms. There are two
exploit modules in metasploit that can be used to execute a DOS attack
against some various of the FileZilla Server.
Use auxiliary/dos/windows/ftp/filezilla_admin_user
Use auxiliary/dos/windows/ftp/filezilla_admin_port
Set RHOST www.victim.com
Run
DOS Attack
Distributed DOS Attacks
The objective behind a DOS attack is to flood the Target with as much
data as possible. A DOS attack can inflict limited damage, since there is
1 criminal attacker 1 target. This is where D-DOS attacks come in.
Distributed DOS attacks are multi-tiered, multi-layers sophisticated
modern day versions of DOS attacks, where the criminal first hacks into
and take control over a less sophisticated network (called zombies) and
then uses all system on that network to attack the target.
Distributed DOS atatck can be executed with the help of tools like Tribal
Flood Network (TFN), Trin00, Stacheldraht and others.
Can also be executed through viruses, worms and malware infections
DOS Attack
Cyber terrorism War
Case Study
Low Orbit lon Cannon (LOIC)
It is an open source network stress tool. But can also be used as a dDOS
attack application.
It tries to bring down a server by flooding the victim with infinite
number of TCP or UDP packets. If a lot of people run LOIC against the
same victim simultaneously then it becomes a distributed VOS Attack.
For example, the anonymous hacker group were using IRC channels and
online forums to inform all their supporters about which computer to
attack using LOIC on a specific day.
Http://cisko.fr/
DDOS Attack
DoSHTTP
DDOS Attack
PHP DOS Attacker
DDOS Attack
Botnets and Zombies
A bot is an application or script that can run specific tasks or commands
automatically, for example to execute DOS attacks against the victim. A
system infected with a bot and being controlled remotely by an attacker
is known as a Zombie. Bots or Zombies are controlled from the central
command and control server (C&C). A botnet is a network of computers
on the internet that are infected with some malware or Trojan or bot
and are misused for malicious purposes.
Zombies are recruited into Botnet networks through malware
download, clicking on infected link, P2P through hidden channels like
IRC, Twitter, IM or HTTP.
Such Botnets can be misused from executing DOS Attacks, Spam Click
Fraud and other malicious purposes.
Shark is a popular Botnet.
DDOS Attack
PLUGBOT
DDOS Attack
Guru Plug is a type of plug which allows normal computing in
a small space
DOS and DDOS Attack
Countermeasures
Separate or compartmentalize critical services.
Buy more bandwidth then normally required to count for sudden
attacks. Filter out USELESS/MALICIOUS traffic as early possible.
In case of a attack, disable non critical services and try to keep at least
critical services running.
Disable publicly accessible services.
Balance traffic load on a set of servers.
Regular monitoring and working closely with ISP will always help.
Use antivirus software to detect an remove any bot/trajan/dDOS tools
from your computer.
Analyze traffic patterns to detect source of attack and it by port or by IP
address.
Patch systems regularly. IPSec provides proper verification.
Use scanning tools to detect and remove DDOS tools.
DOS and DDOS Attack
Netflow Analyzer Bandwidth & Traffic Management Tools
http://www.manageengine.com/products/netflow/
Encryption
On the fly file and Disk encryption tools
TrueCrypt
DOS and DDOS Attack
Alternate Data streams or ADS is a feature in windows NTFS
(New technology File System) that contains metadata for
locating files by author or title.
Interestingly, adding additional metadata to a file’s ADS, will
not increase its size or change its functionality. This makes
data stored in the ADS of a file completely hidden. Hence, a
great place for criminals to hide malicious files like Trojan,
keyloggers and spyware.
Alternate Data Streams (ADS)
Data Hiding
How to hide some text inside the ADS of another Text file?
Let us create a text file named test.txt and write some sample
text this is a test file only inside it.
Alternate Data Streams (ADS) Manipulation
Let us now use a clone : to data inside the ADS of the test.txt
file.
Data Hiding
Detection of ADS Streams
Alternate Data Streams (ADS) Manipulation
Alternate stream view. http://www.nirsoft.net
Data Hiding
Steganography
Hide files inside pics, videos and music.
S-Tools
Data Hiding
Steganography
Hermetic : Hide inside a photo.
Data Hiding
Steganography
wbStego4
Hermetic : Hide inside a photo.
Thanks You

More Related Content

Viewers also liked

PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA Kak Yong
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of networkKak Yong
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersifKak Yong
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIAKak Yong
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOLKak Yong
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

Viewers also liked (11)

PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Cyber Security Lecture on DOS, DDOS, Encryption and Data Hiding

Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddoskalyan kumar
 
The Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterThe Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterCSCJournals
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalOWASP Delhi
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTDHRUV562167
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxmadlynplamondon
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year projectAmeya Vashishth
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attackHTS Hosting
 

Similar to Cyber Security Lecture on DOS, DDOS, Encryption and Data Hiding (20)

Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
The Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterThe Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration Tester
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
L1803046876
L1803046876L1803046876
L1803046876
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
114331707
114331707114331707
114331707
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 

More from Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdfMehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfMehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxMehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfMehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfMehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdfMehedi Hasan
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingMehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security systemMehedi Hasan
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESMehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxMehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxMehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation trainingMehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensicsMehedi Hasan
 
Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Mehedi Hasan
 

More from Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Cyber Security Lecture on DOS, DDOS, Encryption and Data Hiding

  • 1. Cyber Security and Ethical Hacking By Mehedi Hasan Lecture 10: DOS Attacks, Distributed DOS Attacks, Data Encryption, Data Hiding and Steganography - Part i
  • 2. DOS Attack Each system connected to the internet has limited bandwidth available. In a DOS attack, an attacker tries to choke or clog or overload all the available bandwidth on the target system by bombarding it with infinite or unlimited data. As a result even legitimate or real customers and clients are no longer able to connect to the target system, hence disrupting all services provided by the victim. Results in loss of revenue, disrupt in services, inconvenience, customer dissatisfaction and many other problems.
  • 3. DOS Attack TYPES OF DOS ATTACKS PING OF DEATH: A data packet larger then 65,536 bytes sent to target. TEARDROP: Data is broken down at some source into smaller chunks and put back together into larger chunks at destination. Overlapping data fragments are used to crash the target system. 4000 Bytes Chunk A: 1—1500 bytes Chunk B: 1501 – 3000 bytes Chunk C: 3001 – 4000 bytes What happens when chunk B is carrying 1499-2999 and Chunk C carrying 2999 – 4000 bytes? Teardrop.
  • 4. DOS Attack TYPES OF DOS ATTACKS Fragmentation Attack: Variation of Teardrop. Identical data fragments are sent to target system. Chunk B and Chunk C will be identical. Smurf Attacks: Huge number of PING requests (ICMP Echo Request packets) are sent to the broadcast address of the target network using spoofed addresses from within the target network. Infinite loops can bring down network vary quickly. Land Attack: Attacker sends infinite packets to the target system from the target system itself. Some older implementation of TCP/IP were not able to handle it.
  • 5. DOS Attack TYPES OF DOS ATTACKS Syn Flooding: Exploits the classic 3-way TCP/IP handshake. Attacker create infinite instances of half open connections by sending infinite connection requests from spoofed addresses. According to TCP/IP rules, whenever a system receives a connection request (SYN packet), it must keep track of that connection for least 75 seconds. Step 1: Attacker sends SYN packet to target (Spoofing). Step 2: Target sends SYN/ACK packet to spoofed. Step 3: Attacker will never reply to the target. Hence, the target is out of commission and cannot accept any new connections until one of the old connections get limited out.
  • 6. DOS Attack TYPES OF DOS ATTACKS Syn Flooding: Can lead to 3 different scenarios: • The spoofed IP address does not exist. • The Spoofed IP address exists. • The spoofed IP address is a system within the victim network.
  • 7. DOS Attack TYPES OF DOS ATTACKS Application Specific DOS Attacks: Instead of attacking the entire system, it is possible for a criminal to DOS attack only specific applications on the victim system. For example, the criminal can DOS atack only the FTP, HTTP or SQL application by flooding any of them with infinite requests, hence bringing them down.
  • 8. DOS Attack NPING Command line packet generator
  • 9. DOS Attack Flood the victim with unlimited data Colasoft Packet Builder
  • 10. DOS Attack Metasploit TCP Flooding using Metasploit It is possible to execute a DOS attack against various victims using Metasploit as well. Use auxiliary/dos/tcp/synflood Set RHOST www.victim.com Run
  • 11. DOS Attack Metasploit Apache Range Header DOS Attack (Apache Killer) This is a DOS attack that affects apache web server prior to version 2.2.20 and exists due to the way it handles requests by criminal for overlapping ranges of data. It causes a significant increase in the memory/CPU usinge of victim. Use auxiliary/dos/tcp/apache_range_dos Info auxiliary/dos/tcp/apache_range_dos Set RHOST www.victim.com Run
  • 12. DOS Attack Metasploit DOS Attack using Metasploit Filezilla is a popular FTP server for windows platforms. There are two exploit modules in metasploit that can be used to execute a DOS attack against some various of the FileZilla Server. Use auxiliary/dos/windows/ftp/filezilla_admin_user Use auxiliary/dos/windows/ftp/filezilla_admin_port Set RHOST www.victim.com Run
  • 13. DOS Attack Distributed DOS Attacks The objective behind a DOS attack is to flood the Target with as much data as possible. A DOS attack can inflict limited damage, since there is 1 criminal attacker 1 target. This is where D-DOS attacks come in. Distributed DOS attacks are multi-tiered, multi-layers sophisticated modern day versions of DOS attacks, where the criminal first hacks into and take control over a less sophisticated network (called zombies) and then uses all system on that network to attack the target. Distributed DOS atatck can be executed with the help of tools like Tribal Flood Network (TFN), Trin00, Stacheldraht and others. Can also be executed through viruses, worms and malware infections
  • 14. DOS Attack Cyber terrorism War Case Study
  • 15. Low Orbit lon Cannon (LOIC) It is an open source network stress tool. But can also be used as a dDOS attack application. It tries to bring down a server by flooding the victim with infinite number of TCP or UDP packets. If a lot of people run LOIC against the same victim simultaneously then it becomes a distributed VOS Attack. For example, the anonymous hacker group were using IRC channels and online forums to inform all their supporters about which computer to attack using LOIC on a specific day. Http://cisko.fr/
  • 18. DDOS Attack Botnets and Zombies A bot is an application or script that can run specific tasks or commands automatically, for example to execute DOS attacks against the victim. A system infected with a bot and being controlled remotely by an attacker is known as a Zombie. Bots or Zombies are controlled from the central command and control server (C&C). A botnet is a network of computers on the internet that are infected with some malware or Trojan or bot and are misused for malicious purposes. Zombies are recruited into Botnet networks through malware download, clicking on infected link, P2P through hidden channels like IRC, Twitter, IM or HTTP. Such Botnets can be misused from executing DOS Attacks, Spam Click Fraud and other malicious purposes. Shark is a popular Botnet.
  • 20. DDOS Attack Guru Plug is a type of plug which allows normal computing in a small space
  • 21. DOS and DDOS Attack Countermeasures Separate or compartmentalize critical services. Buy more bandwidth then normally required to count for sudden attacks. Filter out USELESS/MALICIOUS traffic as early possible. In case of a attack, disable non critical services and try to keep at least critical services running. Disable publicly accessible services. Balance traffic load on a set of servers. Regular monitoring and working closely with ISP will always help. Use antivirus software to detect an remove any bot/trajan/dDOS tools from your computer. Analyze traffic patterns to detect source of attack and it by port or by IP address. Patch systems regularly. IPSec provides proper verification. Use scanning tools to detect and remove DDOS tools.
  • 22. DOS and DDOS Attack Netflow Analyzer Bandwidth & Traffic Management Tools http://www.manageengine.com/products/netflow/
  • 23. Encryption On the fly file and Disk encryption tools TrueCrypt
  • 24. DOS and DDOS Attack Alternate Data streams or ADS is a feature in windows NTFS (New technology File System) that contains metadata for locating files by author or title. Interestingly, adding additional metadata to a file’s ADS, will not increase its size or change its functionality. This makes data stored in the ADS of a file completely hidden. Hence, a great place for criminals to hide malicious files like Trojan, keyloggers and spyware. Alternate Data Streams (ADS)
  • 25. Data Hiding How to hide some text inside the ADS of another Text file? Let us create a text file named test.txt and write some sample text this is a test file only inside it. Alternate Data Streams (ADS) Manipulation Let us now use a clone : to data inside the ADS of the test.txt file.
  • 26. Data Hiding Detection of ADS Streams Alternate Data Streams (ADS) Manipulation Alternate stream view. http://www.nirsoft.net
  • 27. Data Hiding Steganography Hide files inside pics, videos and music. S-Tools
  • 28. Data Hiding Steganography Hermetic : Hide inside a photo.