4.hacking (Autosaved)
4.hacking (Autosaved)
4.hacking (Autosaved)
• Hacker may just hack the system to show it was vulnerable or he can
be so mischievous that he wants to maintain or persist the connection
in the background without the knowledge of the user.
• This can be done using Trojans, Rootkits or other malicious files. The
aim is to maintain the access to the target until he finishes the tasks
he planned to accomplish in that target.
5. Clearing Track:
• General Phishing
• Spear Phishing
[Source:What is a phishing attack? | Cloudflare]
Types:
• General Phishing
• Phishing attacks prioritize quantity. The messaging in phishing emails, texts
or phone calls are generic and sent to a large group of individuals or
organizations in hopes of increasing the chance of “catching” a victim.
• Phishing attacks via phone calls are often called vishing for voice-phishing.
Attacks via text messages are known as smishing for SMS-phishing
Types:
• Spear phishing
• Spear-phishing is a type of phishing attack that targets specific individuals
or organizations typically through malicious emails.
• The goal of spear phishing is to steal sensitive information such as login
credentials or infect the targets’ device with malware.
• Spear phishers carefully research their targets, so the attack appears to be
from trusted senders in the targets’ life.
• A spear phishing email uses social engineering techniques to urge the
victim to click on a malicious link or attachment.
• Once the victim completes the intended action, the attacker can steal the
credentials of a targeted legitimate user and enter a network undetected
Phishing
Spear Phishing
How a Spear-Phishing Attack Works
• The personalized nature of spear phishing attacks is what makes them dangerous
and easy to fall for. Hackers use reconnaissance methods in their research so they
can increase the likelihood of a successful attack.
• Spear phishers frequent social media sites like Facebook and LinkedIn to gather
personal information about their target.
• They can also map out their target’s network of personal contacts, which gives
them more context to crafting a trustworthy message.
• More sophisticated attackers may also use machine learning algorithms to scan
through massive amounts of data and identify high level individuals they most
want to target.
How a Spear-Phishing Attack Works
• Being equipped with your personal data, spear phishers can then craft a seemingly
legitimate email that grabs their target’s attention.
• Many people let their guard down because of the personalized messages and don’t
think twice before clicking on a link or downloading an attachment.
• However, this mistake can lead to serious consequences such as stolen personal
information or a malware infection.
Type: Whaling
• A whaling attack prioritizes C-level targets. Whaling uses the same
personalized strategy of spear-phishing attacks, except attackers
specifically target higher level management to expose financial and
confidential information.
• Whaling attacks hope to extract more valuable, classified information by
taking down big targets, which can magnify the damage inflicted upon an
organization.
Whaling
• Smishing
• Smishing is an attack that uses text messaging or short message
service (SMS) to execute the attack.
• A common smishing technique is to deliver a message to a cell phone
through SMS that contains a clickable link or a return phone number.
• Vishing
• Vishing has the same purpose as other types of phishing attacks.
• The attackers are still after your sensitive personal or corporate
information.
• This attack is accomplished through a voice call. Hence the “v” rather
than the “ph” in the name.
Brute force attacks (exhaustive search)
• Simple brute force attack—uses a systematic approach to ‘guess’ that doesn’t rely on outside logic.
• Hybrid brute force attacks—starts from external logic to determine which password variation may be
most likely to succeed, and then continues with the simple approach to try many possible variations.
• Dictionary attacks—guesses usernames or passwords using a dictionary of possible strings or phrases.
• Rainbow table attacks—a rainbow table is a precomputed table for reversing cryptographic hash
functions. It can be used to guess a function up to a certain length consisting of a limited set of
characters.
• Reverse brute force attack—uses a common password or collection of passwords against many
possible usernames. Targets a network of users for which the attackers have previously obtained data.
• Credential stuffing—uses previously-known password-username pairs, trying them against multiple
websites. Exploits the fact that many users have the same username and password across different
systems.
Brute Force Attacks (Contd..)
Why Do Brute Force Attacks Occur?
• Hackers want to get into other people’s systems for many reasons.
• Although sometimes their intentions can be unknown or personal, from
general assumptions.
Here are a few common reasons why a brute force attack occurs.
1. Exploit Activity Data for Financial Gains
• Hackers mostly invade systems or websites to gain financial benefits.
Usually, hackers profit from advertising commissions by placing spam ads on
websites.
• Whenever a user clicks an ad, the revenue goes to the hacker. Also, they sell
victims’ activity data at times.
Brute Force Attacks (Contd..)
2. Gain Access to Personal Data
• Hackers may launch a brute force attack to spoof a person’s identity.
They may use personal accounts to get user’s information, including
their medical records and financial details, which are exploited further
to launch wider attacks.
3. Spreading Malware
• Hackers can launch a brute force attack by spreading malware in the
target’s system.
• This helps the attackers access other connected systems and networks
and launch a wider attack against the target.
• Sometimes, the brute force attacks aren’t personal, as hackers may want
to showcase their hacking skills and try to play around with them.
Brute Force Attacks (Contd..)
4. Damage a Company’s Reputation
• Hackers also launch brute attacks to damage a company’s reputation by
stealing their confidential data or altering information.
• They do this in such a way that it goes against the company’s core
values.
Brute Force Attacks (Contd..)
4. Damage a Company’s Reputation
• Hackers also launch brute attacks to damage a company’s reputation by
stealing their confidential data or altering information.
• They do this in such a way that it goes against the company’s core
values.
Brute Force Attacks (Contd..)
4. Damage a Company’s Reputation
• Hackers also launch brute attacks to damage a company’s reputation by
stealing their confidential data or altering information.
• They do this in such a way that it goes against the company’s core
values.
How to
Prevent
Brute Force
Attacks
How to Prevent Brute Force Attacks
• Password Length
• The first step towards brute force attack prevention should be a longer
password length.
• Nowadays, many websites and platforms force their users to create a password
of a certain length (8 – 16 characters) so that it’s not easily guessed.
• Password Complexity
• Another important thing is to create a complex password to minify
vulnerabilities.
• Don’t use passwords like “ilovemycountry” or “password123456”; instead,
your password should have a combination of UPPERCASE & lowercase
alphabets and also use numbers and special characters to become more
complex.
• The complexity of the password delays the cracking process.
How to Prevent Brute Force Attacks
• Limit Login Attempts
• Limiting the login attempts on your WordPress admin or any other
admin panel also helps solidify your site’s security against brute force
attacks.
• Modifying the .htaccess file
• Adding a few rules in the .htaccess file further hardens your site’s
security.
• The objective is to allow access to wp-admin to only specific IP
addresses listed in the .htaccess file.
• For example, if your website receives five failed login attempts, it
should block that IP for a certain period to stop further attempts.
How to Prevent Brute Force Attacks
How to Prevent Brute Force Attacks
• Using Captcha
• Captchas are commonly used on websites to prevent bots from executing
automated scripts mainly used in brute force attacks.
• Two-Factor Authentication
• Two Factor Authentication is an extra layer of defense that decreases the
chances of brute force attacks.
• Cloudflare
• Cloudflare is a renowned service for WordPress that usually deals with
CDN and caching.
• Also, it offers a protective shield against Brute Force Attacks.
• It lets users set rules for accessing login pages and set browser integrity
checks.
Popular tools
• Hydra, john the ripper, Hashcat, Ncrack etc.
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks :
• A DoS (Denial of Service) attack aims at preventing, for legitimate users, authorized
access to a system resource .
The attacker uses specialized software to send a flood of data packets
to the target computer with the aim of overloading its resources
• DDoS ( distributed Denial of Service attacks)
• A denial-of-service attack in which the attacker gains illegal administrative access
to as many computers on the Internet as possible and uses the multiple computers
to send a flood of data packets to the target computer
• Attacks are called “distributed” when the attack traffic originates from multiple
hosts.
DOS attack
• Volumetric attacks: the entire bandwidth of a network is consumed
so the authorized clients will not be able to get the resources.
• Flooding the network devices like hubs or switches with numerous
Internet Control Message Protocol (ICMP) echo request/reply packets,
entire bandwidth is consumed, and no other clients are able to
connect with the target network.
Syn flooding:
• Is another attack where an attacker compromises multiple zombies and
simultaneously floods the target with multiple SYN packets. The target
will be overwhelmed by the SYN requests, either it goes down or its
performance is reduced drastically.
Fragmentation attacks
• Fights against the reassembling ability of the target.
• Numerous fragmented packets are sent to the target, making it
difficult for the target to reassemble them & denying access to the
valid clients.
DDoS attack
49/42
• DDoS attacks originate from Internet-connected PCs that are
compromised by malware. These PCs are called “bots” and are
typically under the control of a command-and-control (C&C) server
operated by the attacker or “botmaster”
• “Botnets” are a set of computers controlled by a C&C computer to
execute commands as directed.
• Computers become bots when attackers illicitly install malware that
secretly connects the computer to a botnet; attackers then perform
tasks such as sending spam, hosting or distributing malware, or
attacking other computers.
• Computers in a botnet are often called nodes or zombies.
• The DDoS attacks work in phases. In the first phase, the attacker
compromises the weak machines in the network from around the
world.
• In the second phase, a set of tools (also called malware) is installed on
the compromised systems to attack the victims by controlling them
from a C&C server.
Types of DDoS Attacks
Stream Block
Advantages Sp eed of High d iffu s ion
t ra n s fo r m a t ion Im m u n it y t o
Low err or in s ert ion of
p r o p a ga t ion s ym b o l
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All 76
rights reserved.
DES: The Data Encryption Standard
• Symmetric block cipher
• Developed in 1976 by IBM for the US National
Institute of Standards and Technology (NIST)
85
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
One-Way Hash Function
86
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Digital Signature
87
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Certificates: Trustable Identities and Public
Keys
• A certificate is a public key and an identity
bound together and signed by a certificate
authority.
• A certificate authority is an authority that users
trust to accurately verify identities before
generating certificates that bind those
identities to keys.
88
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Certificate Signing and Hierarchy
89
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Cryptographic Tool Summary
90
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Summary
• Users can authenticate using something they know, something they
are, or something they have
• Systems may use a variety of mechanisms to implement access
control
• Encryption helps prevent attackers from revealing, modifying, or
fabricating messages
• Symmetric and asymmetric encryption have complementary strengths
and weaknesses
• Certificates bind identities to digital signatures
91
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.