1. TYPES OF ATTACK …(PART 2)
Prof. Neeraj Bhargava
Mrs. Shubha Chaturvedi
Department of Computer Science, School of Engineering & System Sciences
MDS University Ajmer, Rajasthan
2. HACKER
• Hacking is the act of finding the possible entry points that exist in a
computer system or a computer network and finally entering into
them. Hacking is usually done to gain unauthorized access to a
computer system or a computer network, either to harm the systems
or to steal sensitive information available on the computer.
• Hacking is usually legal as long as it is being done to find
weaknesses in a computer or network system for testing purpose.
This sort of hacking is what we call Ethical Hacking.
• A computer expert who does the act of hacking is called a "Hacker".
Hackers are those who seek knowledge, to understand how systems
operate, how they are designed, and then attempt to play with these
systems.
3. CRACKER
• A "Cracker" is a computer user who attempts to
break into copyrighted software or a network
computer system.
• Commonly, cracking is done with the intent to
release the software from programmatic padlocks
so that it can be used without paying royalties.
• Cracking is to expose a system's security flaws.
For the most part, crackers do their craft with the
intent to steal confidential data, acquire free
software, or perform malicious destruction of
files.
4. SPOOFING
• Spoofing is a specific type of cyber-attack in
which someone attempts to use a computer,
device, or network to trick other computer
networks by masquerading as a legitimate entity.
It's one of many tools hackers use to gain access
to computers to mine them for sensitive data, turn
them into zombies (computers taken over for
malicious use), or launch Denial-of-Service (DoS)
attacks. Of the several types of spoofing, IP
spoofing is the most common.
5. Phishing
Phishing attacks are the practice of sending fraudulent
communications that appear to come from a reputable source. It
is usually done through email. The goal is to steal sensitive data
like credit card and login information, or to install malware on the
victim’s machine. Phishing is a common type of cyber attack that
everyone should learn about in order to protect themselves.
• Phishing starts with a fraudulent email or other communication
that is designed to lure a victim. The message is made to look as
though it comes from a trusted sender. If it fools the victim, he or
she is coaxed into providing confidential information, often on a
scam website. Sometimes malware is also downloaded onto the
target’s computer.
6. Sniffing
• It is the process of monitoring and capturing all data packets
that are passing through a computer network using packet
sniffers. Packet Sniffers are used by network administrators to
keep track of data traffic passing through their network. These
are called network protocol analyzers. In the same way,
malicious attackers employ the use of these packet sniffing
tools to capture data packets in a network.
• Data packets captured from a network are used to extract and
steal sensitive information such as passwords, usernames,
credit card information, etc. Attackers install these sniffers in
the system in the form of software or hardware.
7. Port Scanning
• Port scanning is a method of determining which ports on a network are open
and could be receiving or sending data. It is also a process for sending
packets to specific ports on a host and analyzing responses to identify
vulnerabilities.
• The goal behind port and network scanning is to identify the organization of
IP addresses, hosts, and ports to properly determine open or vulnerable
server locations and diagnose security levels.
• After a thorough network scan is complete and a list of active hosts is
compiled, port scanning can take place to identify open ports on a network
that may enable unauthorized access.
• It’s important to note that network and port scanning can be used by both IT
administrators and cybercriminals to verify or check the security policies of
a network and identify vulnerabilities — and in the attackers’ case, to exploit
any potential weak entry points.
8. SQL injection (SQLi)
• SQL injection is a web security vulnerability that allows an
attacker to interfere with the queries that an application makes
to its database. It generally allows an attacker to view data that
they are not normally able to retrieve. This might include data
belonging to other users, or any other data that the application
itself is able to access. In many cases, an attacker can modify or
delete this data, causing persistent changes to the application's
content or behaviour.
• In some situations, an attacker can escalate an SQL injection
attack to compromise the underlying server or other back-end
infrastructure, or perform a denial-of-service attack.
9. Assignment
Q1 .Differentiate between Computer Virus, Worms and
Trojan Horse?
Q2. Difference Between Sniffing and Spoofing ?
Q3. What are ports and port numbers?
Q4. What is the impact of a successful SQL injection
attack?