SlideShare a Scribd company logo
Cyber Security and Ethical Hacking
By Mehedi Hasan
Lecture 10:
DOS Attacks, Distributed DOS Attacks, Data Encryption, Data
Hiding and Steganography - Part i
DOS Attack
Each system connected to the internet has limited bandwidth available.
In a DOS attack, an attacker tries to choke or clog or overload all the
available bandwidth on the target system by bombarding it with infinite
or unlimited data.
As a result even legitimate or real customers and clients are no longer
able to connect to the target system, hence disrupting all services
provided by the victim.
Results in loss of revenue, disrupt in services, inconvenience, customer
dissatisfaction and many other problems.
DOS Attack
TYPES OF DOS ATTACKS
PING OF DEATH: A data packet larger then 65,536 bytes sent to target.
TEARDROP: Data is broken down at some source into smaller chunks
and put back together into larger chunks at destination. Overlapping
data fragments are used to crash the target system.
4000 Bytes
Chunk A: 1—1500 bytes
Chunk B: 1501 – 3000 bytes
Chunk C: 3001 – 4000 bytes
What happens when chunk B is carrying 1499-2999 and Chunk C
carrying 2999 – 4000 bytes? Teardrop.
DOS Attack
TYPES OF DOS ATTACKS
Fragmentation Attack: Variation of Teardrop. Identical data fragments
are sent to target system. Chunk B and Chunk C will be identical.
Smurf Attacks: Huge number of PING requests (ICMP Echo Request
packets) are sent to the broadcast address of the target network using
spoofed addresses from within the target network. Infinite loops can
bring down network vary quickly.
Land Attack: Attacker sends infinite packets to the target system from
the target system itself. Some older implementation of TCP/IP were not
able to handle it.
DOS Attack
TYPES OF DOS ATTACKS
Syn Flooding: Exploits the classic 3-way TCP/IP handshake. Attacker
create infinite instances of half open connections by sending infinite
connection requests from spoofed addresses. According to TCP/IP rules,
whenever a system receives a connection request (SYN packet), it must
keep track of that connection for least 75 seconds.
Step 1: Attacker sends SYN packet to target (Spoofing).
Step 2: Target sends SYN/ACK packet to spoofed.
Step 3: Attacker will never reply to the target.
Hence, the target is out of commission and cannot accept any new
connections until one of the old connections get limited out.
DOS Attack
TYPES OF DOS ATTACKS
Syn Flooding: Can lead to 3 different scenarios:
• The spoofed IP address does not exist.
• The Spoofed IP address exists.
• The spoofed IP address is a system within the victim network.
DOS Attack
TYPES OF DOS ATTACKS
Application Specific DOS Attacks: Instead of attacking the entire system,
it is possible for a criminal to DOS attack only specific applications on
the victim system. For example, the criminal can DOS atack only the
FTP, HTTP or SQL application by flooding any of them with infinite
requests, hence bringing them down.
DOS Attack
NPING
Command line packet generator
DOS Attack
Flood the victim with unlimited data
Colasoft Packet Builder
DOS Attack
Metasploit
TCP Flooding using Metasploit
It is possible to execute a DOS attack against various victims using
Metasploit as well.
Use auxiliary/dos/tcp/synflood
Set RHOST www.victim.com
Run
DOS Attack
Metasploit
Apache Range Header DOS Attack (Apache Killer)
This is a DOS attack that affects apache web server prior to version
2.2.20 and exists due to the way it handles requests by criminal for
overlapping ranges of data. It causes a significant increase in the
memory/CPU usinge of victim.
Use auxiliary/dos/tcp/apache_range_dos
Info auxiliary/dos/tcp/apache_range_dos
Set RHOST www.victim.com
Run
DOS Attack
Metasploit
DOS Attack using Metasploit
Filezilla is a popular FTP server for windows platforms. There are two
exploit modules in metasploit that can be used to execute a DOS attack
against some various of the FileZilla Server.
Use auxiliary/dos/windows/ftp/filezilla_admin_user
Use auxiliary/dos/windows/ftp/filezilla_admin_port
Set RHOST www.victim.com
Run
DOS Attack
Distributed DOS Attacks
The objective behind a DOS attack is to flood the Target with as much
data as possible. A DOS attack can inflict limited damage, since there is
1 criminal attacker 1 target. This is where D-DOS attacks come in.
Distributed DOS attacks are multi-tiered, multi-layers sophisticated
modern day versions of DOS attacks, where the criminal first hacks into
and take control over a less sophisticated network (called zombies) and
then uses all system on that network to attack the target.
Distributed DOS atatck can be executed with the help of tools like Tribal
Flood Network (TFN), Trin00, Stacheldraht and others.
Can also be executed through viruses, worms and malware infections
DOS Attack
Cyber terrorism War
Case Study
Low Orbit lon Cannon (LOIC)
It is an open source network stress tool. But can also be used as a dDOS
attack application.
It tries to bring down a server by flooding the victim with infinite
number of TCP or UDP packets. If a lot of people run LOIC against the
same victim simultaneously then it becomes a distributed VOS Attack.
For example, the anonymous hacker group were using IRC channels and
online forums to inform all their supporters about which computer to
attack using LOIC on a specific day.
Http://cisko.fr/
DDOS Attack
DoSHTTP
DDOS Attack
PHP DOS Attacker
DDOS Attack
Botnets and Zombies
A bot is an application or script that can run specific tasks or commands
automatically, for example to execute DOS attacks against the victim. A
system infected with a bot and being controlled remotely by an attacker
is known as a Zombie. Bots or Zombies are controlled from the central
command and control server (C&C). A botnet is a network of computers
on the internet that are infected with some malware or Trojan or bot
and are misused for malicious purposes.
Zombies are recruited into Botnet networks through malware
download, clicking on infected link, P2P through hidden channels like
IRC, Twitter, IM or HTTP.
Such Botnets can be misused from executing DOS Attacks, Spam Click
Fraud and other malicious purposes.
Shark is a popular Botnet.
DDOS Attack
PLUGBOT
DDOS Attack
Guru Plug is a type of plug which allows normal computing in
a small space
DOS and DDOS Attack
Countermeasures
Separate or compartmentalize critical services.
Buy more bandwidth then normally required to count for sudden
attacks. Filter out USELESS/MALICIOUS traffic as early possible.
In case of a attack, disable non critical services and try to keep at least
critical services running.
Disable publicly accessible services.
Balance traffic load on a set of servers.
Regular monitoring and working closely with ISP will always help.
Use antivirus software to detect an remove any bot/trajan/dDOS tools
from your computer.
Analyze traffic patterns to detect source of attack and it by port or by IP
address.
Patch systems regularly. IPSec provides proper verification.
Use scanning tools to detect and remove DDOS tools.
DOS and DDOS Attack
Netflow Analyzer Bandwidth & Traffic Management Tools
http://www.manageengine.com/products/netflow/
Encryption
On the fly file and Disk encryption tools
TrueCrypt
DOS and DDOS Attack
Alternate Data streams or ADS is a feature in windows NTFS
(New technology File System) that contains metadata for
locating files by author or title.
Interestingly, adding additional metadata to a file’s ADS, will
not increase its size or change its functionality. This makes
data stored in the ADS of a file completely hidden. Hence, a
great place for criminals to hide malicious files like Trojan,
keyloggers and spyware.
Alternate Data Streams (ADS)
Data Hiding
How to hide some text inside the ADS of another Text file?
Let us create a text file named test.txt and write some sample
text this is a test file only inside it.
Alternate Data Streams (ADS) Manipulation
Let us now use a clone : to data inside the ADS of the test.txt
file.
Data Hiding
Detection of ADS Streams
Alternate Data Streams (ADS) Manipulation
Alternate stream view. http://www.nirsoft.net
Data Hiding
Steganography
Hide files inside pics, videos and music.
S-Tools
Data Hiding
Steganography
Hermetic : Hide inside a photo.
Data Hiding
Steganography
wbStego4
Hermetic : Hide inside a photo.
Thanks You

More Related Content

Viewers also liked

PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA
Kak Yong
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
Kak Yong
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Ahmed Ghazey
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
Kak Yong
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
Kak Yong
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
Kak Yong
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 

Viewers also liked (11)

PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
WIRELESS TRANSMISSION MEDIA
WIRELESS  TRANSMISSION MEDIAWIRELESS  TRANSMISSION MEDIA
WIRELESS TRANSMISSION MEDIA
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Cyber security & ethical hacking 10

Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
kalyan kumar
 
The Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterThe Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration Tester
CSCJournals
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
OWASP Delhi
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
madlynplamondon
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
Ameya Vashishth
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
Jitendra kadu
 
Internet security
Internet securityInternet security
Internet security
gohel
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
Vihari Piratla
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Professor Lili Saghafi
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
L1803046876
L1803046876L1803046876
L1803046876
IOSR Journals
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
HTS Hosting
 
114331707
114331707114331707
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
Anil Antony
 
Hack the hack
Hack the hackHack the hack
Hack the hack
Shakti Ranjan
 

Similar to Cyber security & ethical hacking 10 (20)

Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
The Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration TesterThe Principles of Modern Attacks Analysis for Penetration Tester
The Principles of Modern Attacks Analysis for Penetration Tester
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
 
cloud computing final year project
cloud computing final year projectcloud computing final year project
cloud computing final year project
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
L1803046876
L1803046876L1803046876
L1803046876
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
114331707
114331707114331707
114331707
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 

More from Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
Mehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
Mehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
Mehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
Mehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
Mehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
Mehedi Hasan
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
Mehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
Mehedi Hasan
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
Mehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
Mehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Mehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
Mehedi Hasan
 
Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16
Mehedi Hasan
 

More from Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16Cyber Security and Ethical hacking 16
Cyber Security and Ethical hacking 16
 

Recently uploaded

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

Cyber security & ethical hacking 10

  • 1. Cyber Security and Ethical Hacking By Mehedi Hasan Lecture 10: DOS Attacks, Distributed DOS Attacks, Data Encryption, Data Hiding and Steganography - Part i
  • 2. DOS Attack Each system connected to the internet has limited bandwidth available. In a DOS attack, an attacker tries to choke or clog or overload all the available bandwidth on the target system by bombarding it with infinite or unlimited data. As a result even legitimate or real customers and clients are no longer able to connect to the target system, hence disrupting all services provided by the victim. Results in loss of revenue, disrupt in services, inconvenience, customer dissatisfaction and many other problems.
  • 3. DOS Attack TYPES OF DOS ATTACKS PING OF DEATH: A data packet larger then 65,536 bytes sent to target. TEARDROP: Data is broken down at some source into smaller chunks and put back together into larger chunks at destination. Overlapping data fragments are used to crash the target system. 4000 Bytes Chunk A: 1—1500 bytes Chunk B: 1501 – 3000 bytes Chunk C: 3001 – 4000 bytes What happens when chunk B is carrying 1499-2999 and Chunk C carrying 2999 – 4000 bytes? Teardrop.
  • 4. DOS Attack TYPES OF DOS ATTACKS Fragmentation Attack: Variation of Teardrop. Identical data fragments are sent to target system. Chunk B and Chunk C will be identical. Smurf Attacks: Huge number of PING requests (ICMP Echo Request packets) are sent to the broadcast address of the target network using spoofed addresses from within the target network. Infinite loops can bring down network vary quickly. Land Attack: Attacker sends infinite packets to the target system from the target system itself. Some older implementation of TCP/IP were not able to handle it.
  • 5. DOS Attack TYPES OF DOS ATTACKS Syn Flooding: Exploits the classic 3-way TCP/IP handshake. Attacker create infinite instances of half open connections by sending infinite connection requests from spoofed addresses. According to TCP/IP rules, whenever a system receives a connection request (SYN packet), it must keep track of that connection for least 75 seconds. Step 1: Attacker sends SYN packet to target (Spoofing). Step 2: Target sends SYN/ACK packet to spoofed. Step 3: Attacker will never reply to the target. Hence, the target is out of commission and cannot accept any new connections until one of the old connections get limited out.
  • 6. DOS Attack TYPES OF DOS ATTACKS Syn Flooding: Can lead to 3 different scenarios: • The spoofed IP address does not exist. • The Spoofed IP address exists. • The spoofed IP address is a system within the victim network.
  • 7. DOS Attack TYPES OF DOS ATTACKS Application Specific DOS Attacks: Instead of attacking the entire system, it is possible for a criminal to DOS attack only specific applications on the victim system. For example, the criminal can DOS atack only the FTP, HTTP or SQL application by flooding any of them with infinite requests, hence bringing them down.
  • 8. DOS Attack NPING Command line packet generator
  • 9. DOS Attack Flood the victim with unlimited data Colasoft Packet Builder
  • 10. DOS Attack Metasploit TCP Flooding using Metasploit It is possible to execute a DOS attack against various victims using Metasploit as well. Use auxiliary/dos/tcp/synflood Set RHOST www.victim.com Run
  • 11. DOS Attack Metasploit Apache Range Header DOS Attack (Apache Killer) This is a DOS attack that affects apache web server prior to version 2.2.20 and exists due to the way it handles requests by criminal for overlapping ranges of data. It causes a significant increase in the memory/CPU usinge of victim. Use auxiliary/dos/tcp/apache_range_dos Info auxiliary/dos/tcp/apache_range_dos Set RHOST www.victim.com Run
  • 12. DOS Attack Metasploit DOS Attack using Metasploit Filezilla is a popular FTP server for windows platforms. There are two exploit modules in metasploit that can be used to execute a DOS attack against some various of the FileZilla Server. Use auxiliary/dos/windows/ftp/filezilla_admin_user Use auxiliary/dos/windows/ftp/filezilla_admin_port Set RHOST www.victim.com Run
  • 13. DOS Attack Distributed DOS Attacks The objective behind a DOS attack is to flood the Target with as much data as possible. A DOS attack can inflict limited damage, since there is 1 criminal attacker 1 target. This is where D-DOS attacks come in. Distributed DOS attacks are multi-tiered, multi-layers sophisticated modern day versions of DOS attacks, where the criminal first hacks into and take control over a less sophisticated network (called zombies) and then uses all system on that network to attack the target. Distributed DOS atatck can be executed with the help of tools like Tribal Flood Network (TFN), Trin00, Stacheldraht and others. Can also be executed through viruses, worms and malware infections
  • 14. DOS Attack Cyber terrorism War Case Study
  • 15. Low Orbit lon Cannon (LOIC) It is an open source network stress tool. But can also be used as a dDOS attack application. It tries to bring down a server by flooding the victim with infinite number of TCP or UDP packets. If a lot of people run LOIC against the same victim simultaneously then it becomes a distributed VOS Attack. For example, the anonymous hacker group were using IRC channels and online forums to inform all their supporters about which computer to attack using LOIC on a specific day. Http://cisko.fr/
  • 18. DDOS Attack Botnets and Zombies A bot is an application or script that can run specific tasks or commands automatically, for example to execute DOS attacks against the victim. A system infected with a bot and being controlled remotely by an attacker is known as a Zombie. Bots or Zombies are controlled from the central command and control server (C&C). A botnet is a network of computers on the internet that are infected with some malware or Trojan or bot and are misused for malicious purposes. Zombies are recruited into Botnet networks through malware download, clicking on infected link, P2P through hidden channels like IRC, Twitter, IM or HTTP. Such Botnets can be misused from executing DOS Attacks, Spam Click Fraud and other malicious purposes. Shark is a popular Botnet.
  • 20. DDOS Attack Guru Plug is a type of plug which allows normal computing in a small space
  • 21. DOS and DDOS Attack Countermeasures Separate or compartmentalize critical services. Buy more bandwidth then normally required to count for sudden attacks. Filter out USELESS/MALICIOUS traffic as early possible. In case of a attack, disable non critical services and try to keep at least critical services running. Disable publicly accessible services. Balance traffic load on a set of servers. Regular monitoring and working closely with ISP will always help. Use antivirus software to detect an remove any bot/trajan/dDOS tools from your computer. Analyze traffic patterns to detect source of attack and it by port or by IP address. Patch systems regularly. IPSec provides proper verification. Use scanning tools to detect and remove DDOS tools.
  • 22. DOS and DDOS Attack Netflow Analyzer Bandwidth & Traffic Management Tools http://www.manageengine.com/products/netflow/
  • 23. Encryption On the fly file and Disk encryption tools TrueCrypt
  • 24. DOS and DDOS Attack Alternate Data streams or ADS is a feature in windows NTFS (New technology File System) that contains metadata for locating files by author or title. Interestingly, adding additional metadata to a file’s ADS, will not increase its size or change its functionality. This makes data stored in the ADS of a file completely hidden. Hence, a great place for criminals to hide malicious files like Trojan, keyloggers and spyware. Alternate Data Streams (ADS)
  • 25. Data Hiding How to hide some text inside the ADS of another Text file? Let us create a text file named test.txt and write some sample text this is a test file only inside it. Alternate Data Streams (ADS) Manipulation Let us now use a clone : to data inside the ADS of the test.txt file.
  • 26. Data Hiding Detection of ADS Streams Alternate Data Streams (ADS) Manipulation Alternate stream view. http://www.nirsoft.net
  • 27. Data Hiding Steganography Hide files inside pics, videos and music. S-Tools
  • 28. Data Hiding Steganography Hermetic : Hide inside a photo.