SlideShare a Scribd company logo
UNIVERSAL COLLEGE
OF
ENGINEERING &
TECHNOLOGY
• PREPARED BY :
PARAS KANSAGARA
MECHANICAL BRANCH
ENROLLMENT NO:
130460119039
GUIDED BY :
AAKASH BHATT SIR
MAHANAGAR TELECOM NIGAM LIMITED
MTNL MUMBAI WEBSITE HACKED
ON 14TH AUGUST 2013
WHO IS BEHIND THIS?
Hacker group "Anonymous"
STATE-RUN TELECOM MTNL's WEBSITE MUMBAI WAS HACKED BY A
PAKISTANI HACKER OPERATING FROM Palestine Australia.
Mr.Creepy
from Napsters CrEw
TYPE OF ATTACK
• Anonymous took down the MTNL website through a massive
Distributed Denial of Service (DDoS) attack.
• WHAT IS DDOS?
• A Distributed Denial of Service (DDoS) attack is an attempt to make an
online service unavailable by overwhelming it with traffic from
multiple sources.
• After the attack, MTNL's corporate website could not be accessed.
•How DDoS Attacks Work
• According to this report on eSecurityPlanet, in a DDoS attack, the
incoming traffic flooding the victim originates from many different
sources – potentially hundreds of thousands or more. This effectively
makes it impossible to stop the attack simply by blocking a single IP
address; plus, it is very difficult to distinguish legitimate user traffic
from attack traffic when spread across so many points of origin.
•The Difference Between DoS and DDos Attacks
• A Denial of Service (DoS) attack is different from a DDoS attack. The
DoS attack typically uses one computer and one Internet connection
to flood a targeted system or resource. The DDoS attack uses multiple
computers and Internet connections to flood the targeted resource.
DDoS attacks are often global attacks, distributed viabotnets.
HOW TO HACK? & WHAT TO DO?
• The attacker hacked the website with a Remotely Administrated
Trojan (RAT) written in a Perl script. Perl is a high-level scripting
language supporting the UNIX operating system, which is a computer
operating system like Windows and MacOS.
• The script was used to hold an executable code that delivered specific
functional commands of the attackers via a command and control
(CnC) server.
• This particular RAT came with a server and client file, and attached
itself to an empty port in MTNL’s systems, making the server file
‘listen’ to incoming connections and data going through the ports.
When someone ran the client file, it gave out the IP address and the
trojan starting receiving commands from the attacker and running
them on MTNL computers,”.
• when an MTNL employee clicked on the file that may have arrived as,
say, an innocuous email, the trojan downloads itself onto the system
and enters MTNL’s internal command centre, allowing the attacker to
take control of the user database.
• The Napsters Crew also operate a Facebook profile called ‘CreepAt
Localhost’ where they have put up amessage that reads, “Lol, just
rooted MTNL server, feeling excited”. In another Facebook message,
the group said, “I told you, I am back and unstoppable.
• Hacked homepage if in cache of that customer, should be refreshed,
otherwise it will continue to show old page," MTNL spokesperson had
said.
This type of message leave on the page
• The hacked sites also carried a picture of a young
Pakistani posing with an inappropriate hand gesture
and face painted with the colour of Pakistan’s National
flag with Indian soldiers holding the tricolour standing
in the background.
HOW MANY WEBSITES HACKED BY
ANONYMOUS?
• http://delmarefoods.com/ (Still defaced)
• http://iilgroup.com.pk/ (Still defaced)
• http://inceptapharmapk.com/ (Still defaced)
• http://xoniacream.com/ (Still defaced)
• http://skincarepakistan.com/ (restored)
CONCLUSION/RESULT
• AFTER DDOS ATTACK FIRST KEEP SHUT DOWN SITE IMMEDIATELY.
• BUILD LAYER SECURITY AROUND YOUR SITE
• SWITCH TO HTTP
• USE STRONG PASSWORD AND CHANGE REGULARLY

More Related Content

What's hot

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
DebrajKarmakar
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
SanishShrestha2
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 

What's hot (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Viewers also liked

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Child therapist
Child therapistChild therapist
Child therapist
arttm
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
Mohammed Mahfouz Alhassan
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
Bhagya Bgk
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
business law case studies with solution
business law case studies with solution business law case studies with solution
business law case studies with solution
Yats Bats
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (13)

Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Child therapist
Child therapistChild therapist
Child therapist
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
it act 2000
it act 2000it act 2000
it act 2000
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
business law case studies with solution
business law case studies with solution business law case studies with solution
business law case studies with solution
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to case study on cyber crime

Lte and future frauds
Lte and future fraudsLte and future frauds
Lte and future fraudsRanjeet Kumar
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
Shaurya Gogia
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
laxmi chandolia
 
CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
SantiagoBrito20
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA PresentationEric Favetta
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
IJEACS
 
Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
janani603976
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
Reza Pahlava
 
network attacks
network attacks network attacks
network attacks
MuskanSony
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
IJERA Editor
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
Nikhil Tripathi
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101
v_raj
 
Threats to Mobile Computing
Threats to Mobile ComputingThreats to Mobile Computing
Threats to Mobile Computing
madhurbyheart
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
IJNSA Journal
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
IJNSA Journal
 

Similar to case study on cyber crime (20)

Lte and future frauds
Lte and future fraudsLte and future frauds
Lte and future frauds
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
Ddos- distributed denial of service
Ddos- distributed denial of service Ddos- distributed denial of service
Ddos- distributed denial of service
 
CPS - Week 1.pptx
CPS - Week 1.pptxCPS - Week 1.pptx
CPS - Week 1.pptx
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
SCADA Presentation
SCADA PresentationSCADA Presentation
SCADA Presentation
 
Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
 
Cloud security
Cloud securityCloud security
Cloud security
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
network attacks
network attacks network attacks
network attacks
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101
 
Threats to Mobile Computing
Threats to Mobile ComputingThreats to Mobile Computing
Threats to Mobile Computing
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISMDISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

case study on cyber crime

  • 2. • PREPARED BY : PARAS KANSAGARA MECHANICAL BRANCH ENROLLMENT NO: 130460119039 GUIDED BY : AAKASH BHATT SIR
  • 3. MAHANAGAR TELECOM NIGAM LIMITED MTNL MUMBAI WEBSITE HACKED ON 14TH AUGUST 2013
  • 4. WHO IS BEHIND THIS? Hacker group "Anonymous" STATE-RUN TELECOM MTNL's WEBSITE MUMBAI WAS HACKED BY A PAKISTANI HACKER OPERATING FROM Palestine Australia. Mr.Creepy from Napsters CrEw
  • 5. TYPE OF ATTACK • Anonymous took down the MTNL website through a massive Distributed Denial of Service (DDoS) attack. • WHAT IS DDOS? • A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. • After the attack, MTNL's corporate website could not be accessed.
  • 6. •How DDoS Attacks Work • According to this report on eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.
  • 7. •The Difference Between DoS and DDos Attacks • A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed viabotnets.
  • 8. HOW TO HACK? & WHAT TO DO? • The attacker hacked the website with a Remotely Administrated Trojan (RAT) written in a Perl script. Perl is a high-level scripting language supporting the UNIX operating system, which is a computer operating system like Windows and MacOS. • The script was used to hold an executable code that delivered specific functional commands of the attackers via a command and control (CnC) server.
  • 9. • This particular RAT came with a server and client file, and attached itself to an empty port in MTNL’s systems, making the server file ‘listen’ to incoming connections and data going through the ports. When someone ran the client file, it gave out the IP address and the trojan starting receiving commands from the attacker and running them on MTNL computers,”. • when an MTNL employee clicked on the file that may have arrived as, say, an innocuous email, the trojan downloads itself onto the system and enters MTNL’s internal command centre, allowing the attacker to take control of the user database.
  • 10.
  • 11. • The Napsters Crew also operate a Facebook profile called ‘CreepAt Localhost’ where they have put up amessage that reads, “Lol, just rooted MTNL server, feeling excited”. In another Facebook message, the group said, “I told you, I am back and unstoppable. • Hacked homepage if in cache of that customer, should be refreshed, otherwise it will continue to show old page," MTNL spokesperson had said.
  • 12. This type of message leave on the page
  • 13. • The hacked sites also carried a picture of a young Pakistani posing with an inappropriate hand gesture and face painted with the colour of Pakistan’s National flag with Indian soldiers holding the tricolour standing in the background.
  • 14. HOW MANY WEBSITES HACKED BY ANONYMOUS? • http://delmarefoods.com/ (Still defaced) • http://iilgroup.com.pk/ (Still defaced) • http://inceptapharmapk.com/ (Still defaced) • http://xoniacream.com/ (Still defaced) • http://skincarepakistan.com/ (restored)
  • 15. CONCLUSION/RESULT • AFTER DDOS ATTACK FIRST KEEP SHUT DOWN SITE IMMEDIATELY. • BUILD LAYER SECURITY AROUND YOUR SITE • SWITCH TO HTTP • USE STRONG PASSWORD AND CHANGE REGULARLY