Isa Lab Manual

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ISA(4321603) SEM 2 (IT) BATCH: A2

PRACTICAL-1
[1.1] AIM: Prepare a case study on recent 2 information security attacks.
Summarize and discuss which part of the CIA triad has been broken in
each.

 There are recently main 2 information security attacks.

 No.1: Phishing Attacks.

Phishing is a type of cybersecurity attack that attempts to obtain data


that are sensitive like Username, Password, and more. It attacks the
user through mail, text, or direct messages. Now the attachment sends
by the attacker is opened by the user because the user thinks that the
email, text, messages came from a trusted source. It is a type of Social
Engineering Attack. For Example, The user may find some messages
like the lottery winner. When the user clicks on the attachment the
malicious code activates that can access sensitive information details.
Or if the user clicks on the link that was sent in the attachment they
may be redirected to a different website that will ask for the login
credentials of the bank.

Types of Phishing Attack :

1. Spear Phishing –
This attack is used to target any specific organization or an
individual for unauthorized access. These types of attacks are not
initiated by any random hacker, but these attacks are initiated by
someone who seeks information related to financial gain or some
important information. Just like the phishing attack spear-phishing
also comes from a trusted source. This type of attack is much
successful. It is considered to be one of the most successful
methods as both of the attacks(that is phishing and spear-phishing)
is an online attack on users.
2. Clone Phishing –
This attack is actually based on copying the email messages that
were sent from a trusted source. Now the hackers alter the
information by adding a link that redirects the user to a malicious or
fake website. Now, this is sent to a large number of users and the
person who initiated it watches who clicks on the attachment that

216170316043(PATEL DARSHIL) 1
ISA(4321603) SEM 2 (IT) BATCH: A2

was sent as a mail. This spreads through the contacts of the user
who has clicked on the attachment.

 There is confidentiality has been broken in Phishing Attacks.

 No.2: Man in the middle (MITM) attack

A man in the middle (MITM) attack is a general term for when a


perpetrator positions himself in a conversation between a user and an
application—either to eavesdrop or to impersonate one of the parties,
making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login


credentials, account details and credit card numbers. Targets are
typically the users of financial applications, SaaS businesses, e-
commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes,


including identity theft, unapproved fund transfers or an illicit password
change.

Additionally, it can be used to gain a foothold inside a secured perimeter


during the infiltration stage of an advanced persistent threat (APT)
assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening


your bank statement, writing down your account details and then
resealing the envelope and delivering it to your door.

 There is confidentiality has been broken in MITM Attack.

216170316043(PATEL DARSHIL) 2
ISA(4321603) SEM 2 (IT) BATCH: A2

[1.2] AIM: Choose any 2 real-world examples of security attacks and


identify techniques and tools used by attackers for active and passive
attacks.

 There are 2 real-world example of security attacks.

 No.1: Malware

Malware can be described as any malicious software that is installed on


your device after a user may click on a dangerous link inadvertently or
open an attachment. There are many forms that malware can take, with
some of the most common being Viruses and Trojans.

Malware (a portmanteau for malicious software) is any software


intentionally designed to cause disruption to a computer, server, client,
or computer network, leak private information, gain unauthorized access
to information or systems, deprive users access to information or which
unknowingly interferes with the user's computer security and privacy. By
contrast, software that causes harm due to some deficiency is typically
described as a software bug.

Many types of malware exist, including computer viruses, worms, Trojan


horses, ransomware, spyware, adware, rogue software, wiper, and
scareware. The defence strategies against malware differs according to
the type of malware but most can be thwarted by installing antivirus
software, firewalls, applying regular patches to reduce zero-day attacks,
securing networks from intrusion, having regular backups and isolating
infected systems. Malware is now being designed to evade antivirus
software detection algorithms.

Tools:

1.constructor.
2.Dos
3.Email flooder
4.HackTool
5.Hoax

216170316043(PATEL DARSHIL) 3
ISA(4321603) SEM 2 (IT) BATCH: A2

 No.2: Drive-By Download Attacks

Drive-by attacks happen when you’re surfing the internet and enter a
website that has malware code on the page, and you inadvertently
download the code. It is also one of the most common ways of
spreading malware. All the hacker has to do is to plant code on the
page.

A common example of this is when you’re on a website and an ad pops


up that has nothing to do with the site’s information. Most times, clicking
the ad will result in malware being downloaded onto your computer.

Unlike other cyber-attacks, a drive-by attack does not need you to do


anything to enable the attack on your computing device.

A popular form of drive-by attack is crypto jacking. This is where there is


code on a website that is stealing your device’s processing power to
mine cryptocurrency. Mining cryptocurrency requires a lot of processing
power, so this attack is not designed to steal any information from you,
but rather steal your computer’s power.

techniques:

Attacker use any page of web site to put his malware code. when user
visit the page and download any unauthorized app or website, the
malware has enter in victim’s PC/Mobile and harm his data and pc.

216170316043(PATEL DARSHIL) 4

You might also like