SlideShare a Scribd company logo
Different Types of Attacks Information Security
PART - I ,[object Object]
Cryptographic Attacks
Injection Attacks
Privilege esclationBy KoteshwarRao
Attack Act or action that exploits vulnerability  in controlled system. Vulnerability- An information security "vulnerability" is a mistake in software that can be directly used by a hacker to gain access to a system or network.
Types of attacks Cryptographic Attacks Injection Attacks Privilege esclation Phishing DoS Spoofing Malwares
Security Trends
Password guessing attack unauthorized user repeatedly tries to log on to a computer or network by guessing usernames and passwords.
Brute force attack Brute force attack is a type of password guessing attack. In this type of attack, attackers systematically try every conceivable combination to find out the password of a user. Password guessing program Download link : http://portswigger.net/burp/help/intruder.html
Dictionary attack This type of attack uses a dictionary of common words to find out the password of a user. It can also use common words in either upper or lower case to find a password. There are many programs available on the Internet to automate and execute dictionary attacks.
Man in the middle attack occur when an attacker successfully inserts an intermediary software or program between two communicating     systems.
Man in the middle attack(contd..) The MITM attack is very effective because of the nature of the http protocol and data transfer which are all ASCII based. It’s possible to capture a session cookie reading the http header, but it’s also possible to change an amount of money transaction inside the application context,
Man in the middle attack(contd..)
MITM Attack tools        There are several tools to realize a MITM attack. These tools are particularly efficient in LAN network environments, because they implement extra functionalities, like the arp spoof capabilities that permit the interception of communication between hosts.  PacketCreator Ettercap Dsniff Cain e Abel
Cross-Site Scripting in a Nutshell Consider a web site that gathers user input  User input is displayed back to user Validate address, search results, etc. Attacker crafts URL with a script in it and sends to victim Victim clicks on link Script in the URL is sent to server as user input User input displayed; script "reflected" back to client Script runs on client Which state do I live in?  I am a resident of: <SCRIPT LANGUAGE=Javascript>alert ("You are vulnerable to cross-site scripting!");</SCRIPT>
Cross-Site Scripting Overview Attacker intends to obtain sensitive data from victim user that is only accessible from within a valid session with the target site Attacker has analyzed the target site and identified a vulnerable CGI script (one that does not properly filter user supplied input, such as HTML <SCRIPT> tags) The site displays back to the user something the user types in, such as a name, account number, or anything, really Attacker has written a specialized browser script (most likely in JavaScript) that performs an action as a victim user on the target site
Ways of Launching Cross-Site Scripting Attacks Attacker's script must be sent to the victim Inter-user communication within the target site (i.e., message board, etc.) URL provided on a third-party web site (either clicked on by victim user or automatically loaded when visiting a malicious web site) URL embedded in an email or newsgroup posting
How Cross-Site Scripting Attacks Work Victim logs into the target site ,[object Object]
Log in to your account to get this special offer!!!2)	Victim then clicks on a URL or visits a web site that includes the malicious code 3)	Victim user’s browser transmits malicious code to the vulnerable script on the target site as a web request 4)	Target site reflects the malicious code back to the victim user’s browser in the response to the request 5)	Malicious code executes within victim user’s browser under the security context of the target site
How It Works (continued)
When Will The Attack Be Successful? User must be convinced to click on a URL or visit a malicious web site                      AND User must be currently logged into the target site and have a valid session (that has not timed out) Both conditions can be accomplished through social engineering via e-mail or telephone
Cross-Site Scripting Defenses Remove from user input all characters that are meaningful in scripting languages: =<>"'(); You must do this filtering on the server side You cannot do this filtering using Javascript on the client, because the attacker can get around such filtering ,[object Object],Quotes of all kinds (', ", and `)  Semicolons (;), Asterisks (*), Percents (%), Underscores (_) Other shell/scripting metacharacters (=&*?~<>^()[]{}$ ) Your best bet – define characters that are ok (alpha and numeric), and filter everything else out
PART - II Phishing DoS attack Spoofing By RohanBharadwaj
Phishing Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information. Con artists might send millions of fraudulent e-mail messages that appear to come from Web sites you trust, like your bank or credit card company, and request that you provide personal information.
History of Phishing ,[object Object],Phreaking = Experiment with telecommunication networks in 70’s Fishing = Use bait to lure the target ,[object Object],	Target: AOL users 	Purpose: getting account passwords for free time 	Threat level: low 	Techniques: Similar names ( www.ao1.com for www.aol.com ), social  	engineering ,[object Object],	Target: Ebayers and major banks 	Purpose: getting credit card numbers, accounts          	Threat level: medium 	Techniques: Same in 1995, keylogger ,[object Object],	Target: Paypal, banks, ebay 	Purpose: bank accounts 	Threat level: high 	Techniques: browser vulnerabilities, link obfuscation
A bad day phishin’, beats a good day workin’ ,[object Object]
 5% get to the end user – 100,000 (APWG)
 5% click on the phishing link – 5,000 (APWG)
 2% enter data into the phishing site –100 (Gartner)
 $1,200 from each person who enters data (FTC)
 Potential reward: $120,000In 2005 David Levi made over $360,000 from 160 people using an eBay Phishing scam
 Spear-Phishing: Improved Target Selection ,[object Object]
Mine social relationships from public data
Phishing email appears to arrive from someone known to the victim
 Use spoofed identity of trusted organization to gain trust
 Urge victims to update or validate their account
 Threaten to terminate the account if the victims not reply
 Use gift or bonus as a bait
 Security promises
 Context-aware attacks
“Your bid on eBay has won!”
“The books on your Amazon wish list are on sale!”,[object Object]
How To Tell If An E-mail Message is Fraudulent Here are a few phrases to look for if you think an e-mail message is a phishing scam. ,[object Object]
 "If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking. Phishing e-mail might even claim that your response is required because your account might have been compromised.,[object Object]
 "Click the link below to gain access to your account."
HTML-formatted messages can contain links or forms that you can fill out just as you'd fill out a form on a Web site. 
The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony Web site.
,[object Object]
[object Object]
 Always check the site to see if it is secure. Call the phone number if necessary
 Never click on the link on the email. Retype the address in a new window
 Keep your browser updated
 Keep antivirus definitions updated
 Use a firewall,[object Object]
Consequences of DoS Saturate network resources.  Disrupt connections between two computers, thereby preventing communication between services. Disrupt services to a specific computer.
Common DoS Attacks SYN attack PING flood Ping of death Teardrop attack Smurf attack
SYN attack/SYN flooding A SYN attack affects computers running on the TCP/IP protocol. an attacker sends multiple SYN packets to the target computer.  For each SYN packet received, the target computer allocates resources and sends an acknowledgement (SYN-ACK) to the source IP address. Since the target computer does not receive a response from the attacking computer, it attempts to resend the SYN-ACK.  This leaves TCP ports in a half-open state. When an attacker sends TCP SYNs repeatedly, the target computer eventually runs out of resources and is unable to handle any more connections, thereby denying services to legitimate users.
Diagram showins SYN flood
PING flood	 It relies on the ICMP echo command, more popularly known as ping .  In legitimate situations the ping command is used by network administrators to test connectivity between two computers.  In the ping flood attack, it is used to flood large amounts of data packets to the victim’s computer in an attempt to overload it.
Ping flood (contd..)
Ping of death The maximum size for a packet is 65,535 bytes. If one were to send a packet larger than that, the receiving computer would ultimately crash from confusion. Sending a ping of this size is against the rules of the TCP/IP protocol, but hackers can bypass this by cleverly sending the packets in fragments. When the fragments are assembled on the receiving computer, the overall packet size is too great. This will cause a buffer overlflow and crash the device.
Ping of death
Software to ping attack Download Link:- http://www.softpedia.com/progScreenshots/AtTacK-PiNG-Screenshot-80794.html
Teardrop attack Teardrop attacks exploit the reassembly of fragmented IP packets. Fragment offset indicates the starting position of the data contained in a fragmented packet relative to the data of the original unfragmented packet.
Teardrop attack(contd..) When the sum of the offset and size of one fragmented packet differ from that of the next fragmented packet, the packets overlap, and the server attempting to reassemble the packet can crash, especially if it is running an older operating system that has this vulnerability.

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
SubhradeepMaji
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
Hemal Joshi
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Email security
Email securityEmail security
Email security
Baliram Yadav
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
Santhosh Prabhu
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
LearningwithRayYT
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Network security
Network securityNetwork security
Network security
 
Email security
Email securityEmail security
Email security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Cia security model
Cia security modelCia security model
Cia security model
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 

Viewers also liked

Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
Netwax Lab
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 
Inventory control management
Inventory control managementInventory control management
Inventory control managementaroramahesh
 
selective inventory control
 selective inventory control selective inventory control
selective inventory controlHimani Chowhan
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 

Viewers also liked (20)

Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Inventory control management
Inventory control managementInventory control management
Inventory control management
 
selective inventory control
 selective inventory control selective inventory control
selective inventory control
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Network security
Network securityNetwork security
Network security
 

Similar to Different types of attacks in internet

Phishing
PhishingPhishing
Phishing
Arpit Patel
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Phishing
PhishingPhishing
Phishing
shivli0769
 
Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)
Balvinder Singh
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
Shethwala Ridhvesh
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
Neeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
Sabyasachi Dasgupta
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
Bretz Harllynne Moltio
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
Muhammad Haroon CISM PCI QSA ISMS LA CPTS CEH
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
Reza Nurfachmi
 
Using OTP prevent Phishing attacks
Using OTP prevent Phishing attacksUsing OTP prevent Phishing attacks
Using OTP prevent Phishing attacksriteshsarode1995
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 

Similar to Different types of attacks in internet (20)

Phishing
PhishingPhishing
Phishing
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Phishing
PhishingPhishing
Phishing
 
Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
 
Using OTP prevent Phishing attacks
Using OTP prevent Phishing attacksUsing OTP prevent Phishing attacks
Using OTP prevent Phishing attacks
 
Web Security
Web SecurityWeb Security
Web Security
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

Different types of attacks in internet

  • 1. Different Types of Attacks Information Security
  • 2.
  • 6. Attack Act or action that exploits vulnerability in controlled system. Vulnerability- An information security "vulnerability" is a mistake in software that can be directly used by a hacker to gain access to a system or network.
  • 7. Types of attacks Cryptographic Attacks Injection Attacks Privilege esclation Phishing DoS Spoofing Malwares
  • 9. Password guessing attack unauthorized user repeatedly tries to log on to a computer or network by guessing usernames and passwords.
  • 10. Brute force attack Brute force attack is a type of password guessing attack. In this type of attack, attackers systematically try every conceivable combination to find out the password of a user. Password guessing program Download link : http://portswigger.net/burp/help/intruder.html
  • 11. Dictionary attack This type of attack uses a dictionary of common words to find out the password of a user. It can also use common words in either upper or lower case to find a password. There are many programs available on the Internet to automate and execute dictionary attacks.
  • 12. Man in the middle attack occur when an attacker successfully inserts an intermediary software or program between two communicating systems.
  • 13. Man in the middle attack(contd..) The MITM attack is very effective because of the nature of the http protocol and data transfer which are all ASCII based. It’s possible to capture a session cookie reading the http header, but it’s also possible to change an amount of money transaction inside the application context,
  • 14. Man in the middle attack(contd..)
  • 15. MITM Attack tools There are several tools to realize a MITM attack. These tools are particularly efficient in LAN network environments, because they implement extra functionalities, like the arp spoof capabilities that permit the interception of communication between hosts. PacketCreator Ettercap Dsniff Cain e Abel
  • 16. Cross-Site Scripting in a Nutshell Consider a web site that gathers user input User input is displayed back to user Validate address, search results, etc. Attacker crafts URL with a script in it and sends to victim Victim clicks on link Script in the URL is sent to server as user input User input displayed; script "reflected" back to client Script runs on client Which state do I live in? I am a resident of: <SCRIPT LANGUAGE=Javascript>alert ("You are vulnerable to cross-site scripting!");</SCRIPT>
  • 17. Cross-Site Scripting Overview Attacker intends to obtain sensitive data from victim user that is only accessible from within a valid session with the target site Attacker has analyzed the target site and identified a vulnerable CGI script (one that does not properly filter user supplied input, such as HTML <SCRIPT> tags) The site displays back to the user something the user types in, such as a name, account number, or anything, really Attacker has written a specialized browser script (most likely in JavaScript) that performs an action as a victim user on the target site
  • 18. Ways of Launching Cross-Site Scripting Attacks Attacker's script must be sent to the victim Inter-user communication within the target site (i.e., message board, etc.) URL provided on a third-party web site (either clicked on by victim user or automatically loaded when visiting a malicious web site) URL embedded in an email or newsgroup posting
  • 19.
  • 20. Log in to your account to get this special offer!!!2) Victim then clicks on a URL or visits a web site that includes the malicious code 3) Victim user’s browser transmits malicious code to the vulnerable script on the target site as a web request 4) Target site reflects the malicious code back to the victim user’s browser in the response to the request 5) Malicious code executes within victim user’s browser under the security context of the target site
  • 21. How It Works (continued)
  • 22. When Will The Attack Be Successful? User must be convinced to click on a URL or visit a malicious web site AND User must be currently logged into the target site and have a valid session (that has not timed out) Both conditions can be accomplished through social engineering via e-mail or telephone
  • 23.
  • 24. PART - II Phishing DoS attack Spoofing By RohanBharadwaj
  • 25. Phishing Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information. Con artists might send millions of fraudulent e-mail messages that appear to come from Web sites you trust, like your bank or credit card company, and request that you provide personal information.
  • 26.
  • 27.
  • 28. 5% get to the end user – 100,000 (APWG)
  • 29. 5% click on the phishing link – 5,000 (APWG)
  • 30. 2% enter data into the phishing site –100 (Gartner)
  • 31. $1,200 from each person who enters data (FTC)
  • 32. Potential reward: $120,000In 2005 David Levi made over $360,000 from 160 people using an eBay Phishing scam
  • 33.
  • 34. Mine social relationships from public data
  • 35. Phishing email appears to arrive from someone known to the victim
  • 36. Use spoofed identity of trusted organization to gain trust
  • 37. Urge victims to update or validate their account
  • 38. Threaten to terminate the account if the victims not reply
  • 39. Use gift or bonus as a bait
  • 42. “Your bid on eBay has won!”
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. Always check the site to see if it is secure. Call the phone number if necessary
  • 49. Never click on the link on the email. Retype the address in a new window
  • 50. Keep your browser updated
  • 51. Keep antivirus definitions updated
  • 52.
  • 53. Consequences of DoS Saturate network resources. Disrupt connections between two computers, thereby preventing communication between services. Disrupt services to a specific computer.
  • 54. Common DoS Attacks SYN attack PING flood Ping of death Teardrop attack Smurf attack
  • 55. SYN attack/SYN flooding A SYN attack affects computers running on the TCP/IP protocol. an attacker sends multiple SYN packets to the target computer. For each SYN packet received, the target computer allocates resources and sends an acknowledgement (SYN-ACK) to the source IP address. Since the target computer does not receive a response from the attacking computer, it attempts to resend the SYN-ACK. This leaves TCP ports in a half-open state. When an attacker sends TCP SYNs repeatedly, the target computer eventually runs out of resources and is unable to handle any more connections, thereby denying services to legitimate users.
  • 57. PING flood It relies on the ICMP echo command, more popularly known as ping . In legitimate situations the ping command is used by network administrators to test connectivity between two computers. In the ping flood attack, it is used to flood large amounts of data packets to the victim’s computer in an attempt to overload it.
  • 59. Ping of death The maximum size for a packet is 65,535 bytes. If one were to send a packet larger than that, the receiving computer would ultimately crash from confusion. Sending a ping of this size is against the rules of the TCP/IP protocol, but hackers can bypass this by cleverly sending the packets in fragments. When the fragments are assembled on the receiving computer, the overall packet size is too great. This will cause a buffer overlflow and crash the device.
  • 61. Software to ping attack Download Link:- http://www.softpedia.com/progScreenshots/AtTacK-PiNG-Screenshot-80794.html
  • 62. Teardrop attack Teardrop attacks exploit the reassembly of fragmented IP packets. Fragment offset indicates the starting position of the data contained in a fragmented packet relative to the data of the original unfragmented packet.
  • 63. Teardrop attack(contd..) When the sum of the offset and size of one fragmented packet differ from that of the next fragmented packet, the packets overlap, and the server attempting to reassemble the packet can crash, especially if it is running an older operating system that has this vulnerability.
  • 64. Smurf attack The attacker sends a large amount of ICMP traffic to a broadcast address and uses a victim’s IP address as the source IP so the replies from all the devices that respond to the broadcast address will flood the victim.
  • 65. Spoofing Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address. In IP spoofing, a hacker modifies packet headers by using someone else’s IP address to hide his identity.
  • 67. PART -III MALWARES By ManoharMantry
  • 68. Back Door Back door is a program or account that allows access to a system by skipping the security checks. Many vendors and developers implement back doors to save time and effort by skipping the security checks while troubleshooting. Back door is considered to be a security threat and should be kept with the highest security. If a back door becomes known to attackers and malicious users, they can use it to exploit the system.
  • 69. Backdoor is a secret or unauthorized channel for accessing computer system. In an attack scenario, hackers install backdoors on a machine, once compromised, to access it in an easier manner at later times
  • 70. Virus Definition A virus is a small piece of software that piggybacks on real programs in order to get executed Once it’s running, it spreads by inserting copies of itself into other executable code or documents
  • 71. Computer Virus Timeline 1949 Theories for self-replicating programs are first developed.-John von Newmann. 1981 Apple Viruses 1, 2, and 3 are some of the first viruses “in the world,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games. 1983 Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.” 1986 Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label. 1987 The Lehigh virus, one of the first file viruses, infects command.com files. 1988 One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day. MacMag and the Scores virus cause the first major Macintosh outbreaks. …
  • 72. General virus types While there are thousands of variations of viruses, most fall into one of following generl categories, each of which works slightly differently. Boot sector virus Macro virus Multipartite virus Polymorphic virus Stealth virus E-mail viruses
  • 73. Boot Virus : Replaces or implants itself in the boot sector. This kind of virus can prevent you frombeing able to boot your hard disk. Macro Virus : Written using a simple macro programming language,these viruses affect Microsoft Office applicationssuch as word and excel. A document infected with a macro virus generally modifies a pre-existing, common command(such as save) to trigger to trigger its payload upon execution of that command.
  • 74. Multiparatite Virus :Infects both files and boot sector--a double whammy that can reinfect your system dozen times before it's caught. Polymorphic Virus : Changes code whenever it passes to another machine
  • 75. Stealth Virus: Hides in presence by making an infected file not appear infected. E-mail Virus : An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself dozens of people in victims e-mail address book.
  • 76. Case study-Melissa Virus March 1999 the Melissa virus was the fastest-spreading virus ever seen Someone created the virus as a Word document uploaded to an Internet newsgroup People who downloaded the document and opened it would trigger the virus The virus would then send the document in an e-mail message to the first 50 people in the person's address book
  • 77. Case study-Melissa Virus Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)
  • 78. Prevention Updates Anti-Viruses More secure operating systems e.g. UNIX
  • 79. Worms Worm – A worm is a computer program that has ability to copy itself from machine to machine. Worms normally move around and infect other machines through computer networks. Worms eat up storage space and slows down the computer. But worms don’t alter or delete files.
  • 80. Trojan horses A Trojean horse is simply a computer program that claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). When loaded onto your machine, a Trojan horse can capture information from your system.
  • 81. Trojan horses(contd..) It allows a malicious hacker to remotely control your computer. Trojan horse has no way to replicate automatically.
  • 82. What is Spyware ? Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.
  • 83. What is Adware? Adware are created by advertising companies Comes in the form of popups, unexplained advertising programs on your computer desktop like “Casino Night”. Advertising companies hope to generate money from customers who receive the popups or unexplained programs on their computers. Also a LEGAL program!
  • 84. Conclusion Always use Anti-virus software. Scan external devices when connected to computer. Enable firewall. Read carefully and then click a link.