Isa Lab Manual
Isa Lab Manual
Isa Lab Manual
PRACTICAL-1
[1.1] AIM: Prepare a case study on recent 2 information security attacks.
Summarize and discuss which part of the CIA triad has been broken in
each.
1. Spear Phishing –
This attack is used to target any specific organization or an
individual for unauthorized access. These types of attacks are not
initiated by any random hacker, but these attacks are initiated by
someone who seeks information related to financial gain or some
important information. Just like the phishing attack spear-phishing
also comes from a trusted source. This type of attack is much
successful. It is considered to be one of the most successful
methods as both of the attacks(that is phishing and spear-phishing)
is an online attack on users.
2. Clone Phishing –
This attack is actually based on copying the email messages that
were sent from a trusted source. Now the hackers alter the
information by adding a link that redirects the user to a malicious or
fake website. Now, this is sent to a large number of users and the
person who initiated it watches who clicks on the attachment that
216170316043(PATEL DARSHIL) 1
ISA(4321603) SEM 2 (IT) BATCH: A2
was sent as a mail. This spreads through the contacts of the user
who has clicked on the attachment.
216170316043(PATEL DARSHIL) 2
ISA(4321603) SEM 2 (IT) BATCH: A2
No.1: Malware
Tools:
1.constructor.
2.Dos
3.Email flooder
4.HackTool
5.Hoax
216170316043(PATEL DARSHIL) 3
ISA(4321603) SEM 2 (IT) BATCH: A2
Drive-by attacks happen when you’re surfing the internet and enter a
website that has malware code on the page, and you inadvertently
download the code. It is also one of the most common ways of
spreading malware. All the hacker has to do is to plant code on the
page.
techniques:
Attacker use any page of web site to put his malware code. when user
visit the page and download any unauthorized app or website, the
malware has enter in victim’s PC/Mobile and harm his data and pc.
216170316043(PATEL DARSHIL) 4