Paragh 1
Paragh 1
Paragh 1
1. Understand the Network Topology: Before implementing any security measures, it's
crucial to understand the network topology. Identify the routers, cameras, and other
devices connected to the network. Determine their roles, IP addresses, and how they
communicate with each other.
2. Update Firmware: Ensure that both the router and camera firmware are up-to-date.
Manufacturers often release security patches and updates to address vulnerabilities.
Regularly check for firmware updates and apply them promptly.
3. Change Default Credentials: Default credentials are often well-known and easily
exploited by attackers. Change the default usernames and passwords for both the router
and cameras to strong, unique credentials.
4. Enable Firewall: Most modern routers come with built-in firewall capabilities. Enable
the firewall on the router and configure it to restrict inbound and outbound traffic based
on specific rules. For example, you can block all incoming traffic except for essential
services like SSH or HTTPS.
5. Configure Access Control Lists (ACLs): Access Control Lists (ACLs) allow you to
control traffic flow based on various parameters such as IP addresses, ports, and
protocols. Configure ACLs on the router to allow only authorized devices to
communicate with the cameras and block all other traffic.
6. Segmentation: Implement network segmentation to isolate the cameras from the rest of
the network. Create separate VLANs (Virtual Local Area Networks) for the cameras and
apply firewall rules to restrict communication between VLANs. This prevents a
compromise of one device from affecting the entire network.
7. Intrusion Detection/Prevention Systems (IDS/IPS): Consider deploying IDS/IPS
solutions to monitor network traffic for suspicious activities and prevent potential attacks
in real-time. These systems can detect and block malicious traffic targeting the cameras
or the router.
8. Regular Security Audits: Conduct regular security audits to identify vulnerabilities and
weaknesses in the network infrastructure. Perform penetration testing to simulate real-
world attacks and assess the effectiveness of security measures.
9. Monitor Logs: Enable logging on the firewall and other network devices to track and
analyze network traffic. Monitor logs for any unusual activity or security events that may
indicate a potential security breach.
10. Physical Security: Lastly, don't overlook physical security. Secure the router and
cameras in locked cabinets or rooms to prevent unauthorized access. Disable physical
interfaces such as USB ports on the router to prevent tampering.
By following these steps, you can significantly improve the security posture of routers and
cameras in your network, mitigating the risk of unauthorized access and exploitation by
malicious actors. Remember that security is an ongoing process, and it's essential to stay vigilant
and proactive in identifying and addressing potential security threats.
When a device wants to communicate with another device on the same network, it needs to know
the MAC address of the target device. ARP enables this process by broadcasting an ARP request
packet containing the IP address of the target device. The device with the matching IP address
responds with an ARP reply packet containing its MAC address. Once the requesting device
receives this reply, it stores the mapping in its ARP cache for future reference.
ARP operates at the link layer of the TCP/IP protocol stack and is critical for the proper
functioning of network communication within LANs (Local Area Networks). It is a stateless
protocol, meaning it does not include any form of authentication or verification, which makes it
susceptible to various security threats such as ARP spoofing.
Overall, ARP plays a fundamental role in facilitating communication between devices on the
same network by resolving IP addresses to MAC addresses, thereby enabling the transmission of
data packets within a local network.
Firewall Concepts
A firewall is a computer network security system that acts as a barrier between a private network
and the internet. It monitors and controls incoming and outgoing network traffic based on
predetermined security rules. Firewalls can be implemented using software, hardware, or a
combination of both to protect against unauthorized access and cyber threats.
By incorporating these key concepts into their design and configuration, organizations can
establish robust defense mechanisms against cyber threats while enabling secure communication
within their networks.
Access Control in Computer Network
Access control is a security strategy that controls who or what can view or utilize
resources in a computer system. It is a fundamental security concept that reduces
risk to the company or organization. In this article, we are going to discuss every
point about access control.
What is Access Control?
Access Control is a method of limiting access to a system or resources. Access
control refers to the process of determining who has access to what resources
within a network and under what conditions. It is a fundamental concept in security
that reduces risk to the business or organization. Access control systems perform
identification, authentication, and authorization of users and entities by evaluating
required login credentials that may include passwords, pins, bio-metric scans, or
other authentication factors. Multi-factor authentication requires two or more
authentication factors, which is often an important part of the layered defense to
protect access control systems.
Authentication Factors
Password or PIN
Bio-metric measurement (fingerprint & retina scan)
Card or Key
For computer security, access control includes the authorization, authentication,
and audit of the entity trying to gain access. Access control models have a subject
and an object.
Components of Access Control
Authentication: Authentication is the process of verifying the identity of a user.
User authentication is the process of verifying the identity of a user when that
user logs in to a computer system.
Authorization: Authorization determines the extent of access to the network
and what type of services and resources are accessible by the authenticated
user. Authorization is the method of enforcing policies.
Access: After the successful authentication and authorization, their identity
becomes verified, This allows them to access the resource to which they are
attempting to log in.
Manage: Organizations can manage their access control system by adding and
removing authentication and authorization for users and systems. Managing
these systems can be difficult in modern IT setups that combine cloud services
and physical systems.
Audit: The access control audit method enables organizations to follow the
principle. This allows them to collect data about user activities and analyze it to
identify possible access violations.
Types of Access Control
Attribute-based Access Control (ABAC): In this model, access is granted or
declined by evaluating a set of rules, policies, and relationships using the
attributes of users, systems and environmental conditions.
Discretionary Access Control (DAC): In DAC, the owner of data determines
who can access specific resources.
History-Based Access Control (HBAC): Access is granted or declined by
evaluating the history of activities of the inquiring party that includes behavior,
the time between requests and content of requests.
Identity-Based Access Control (IBAC): By using this model network
administrators can more effectively manage activity and access based on
individual requirements.
Mandatory Access Control (MAC): A control model in which access rights are
regulated by a central authority based on multiple levels of security. Security
Enhanced Linux is implemented using MAC on the Linux operating system .
Organization-Based Access control (OrBAC): This model allows the policy
designer to define a security policy independently of the implementation.
Role-Based Access Control (RBAC): RBAC allows access based on the job
title. RBAC eliminates discretion on a large scale when providing access to
objects. For example, there should not be permissions for human resources
specialist to create network accounts.
Rule-Based Access Control (RAC): RAC method is largely context based.
Example of this would be only allowing students to use the labs during a certain
time of day.
Different access control models are used depending on the compliance
requirements and the security levels of information technology that is to be
protected. Basically access control is of 2 types:
Physical Access Control: Physical access control restricts entry to campuses,
buildings, rooms and physical IT assets.
Logical Access Control: Logical access control limits connections to computer
networks, system files and data.
Challenges of Access Control
Distributed IT Systems: Current IT systems frequently combine internet and
on-premise networks. These systems may be distributed geographically and
comprise various devices, assets, and virtual machines. Access is allowed to all
of these devices, and keeping track of them can be challenging.
Policy Management: Policy makers within the organization create policies, and
the IT department converts the planned policies into code for implementation.
Coordination between these two groups is essential for keeping the access
control system up to date and functioning properly.
Monitoring and Reporting: Organizations must constantly check access
control systems to guarantee compliance with corporate policies and regulatory
laws. Any violations or changes must be recognized and reported immediately.
Access Control Models: Access control mechanisms provide varying levels of
precision. Choosing the right access control strategy for your organization
allows you to balance acceptable security with employee efficiency.
Types of Firewall
Firewalls can be categorized based on their generation.
1. Packet Filtering Firewall
Packet filtering firewall is used to control network access by monitoring outgoing
and incoming packets and allowing them to pass or stop based on source and
destination IP address, protocols, and ports. It analyses traffic at the transport
protocol layer (but mainly uses first 3 layers). Packet firewalls treat each packet in
isolation. They have no ability to tell whether a packet is part of an existing stream
of traffic. Only It can allow or deny the packets based on unique packet headers.
Packet filtering firewall maintains a filtering table that decides whether the packet
will be forwarded or discarded. From the given filtering table, the packets will be
filtered according to the following rules:
Hardware Firewall:
It is physical piece of equipment planned to perform firewall duties. A hardware
firewall can be a computer or a dedicated piece of equipment which serve as a
firewall. Hardware firewall are incorporated into the router that is situated between
the computer and the internet gateway.
Advantages:
Independently run so less prone to cyber-attacks.
Installation is external so resources are free from the server.
Increased bandwidth enables the handling of more data packets per second.
Reduced latency.
VPN connection is also supported for increased security and encryption.
Disadvantages:
Hardware devices can take extra space
A skilled IT person is required
Upgradation challenge as it is not cost-effective because multiple devices need
to be replaced
Working of hardware firewall
A hardware firewall is a physical appliance that is deployed to enforce a network boundary. All
network links crossing this boundary pass through this firewall, which enables it to perform
inspection of both inbound and outbound network traffic and enforce access controls and other
security policies.
Features of a UTM:
Working of UTM:
TELNET
TELNET stands for Teletype Network. It is a type of protocol that enables one computer to
connect to the local computer. It is used as a standard TCP/IP protocol for virtual terminal
service which is provided by ISO. The computer which starts the connection is known as
the local computer.
The computer which is being connected to i.e. which accepts the connection known as
the remote computer.
During telnet operation, whatever is being performed on the remote computer will be
displayed by the local computer. Telnet operates on a client/server principle. The local
computer uses a telnet client program and the remote computers use a telnet server
program.
Advantages of Telnet
1. It provides remote access to someone’s computer system.
2. Telnet allows the user for more access with fewer problems in data
transmission.
3. Telnet saves a lot of time.
4. The oldest system can be connected to a newer system with telnet having
different operating systems.
Disadvantages of Telnet
1. As it is somehow complex, it becomes difficult to beginners in understanding.
2. Data is sent here in form of plain text, that’s why it is not so secured.
3. Some capabilities are disabled because of not proper interlinking of the remote
and local devices.
SSH
The SSH(Secure Shell) is an access credential that is used in the SSH Protocol.
In other words, it is a cryptographic network protocol that is used for transferring
encrypted data over the network. The port number of SSH is 22(Twenty-Two). It
allows you to connect to a server, or multiple servers, without having to remember
or enter your password for each system that is to log remotely from one system to
another. It always comes in key pairs:
Public key – Everyone can see it, no need to protect it. (for encryption
function).
Private key – Stays in computer, must be protected. (for decryption function).
Key pairs can be of the following types:
User Key – If the public key and private key remain with the user.
Host Key – If public key and private key are on a remote system.
Session key – Used when a large amount of data is to be transmitted.
Features of SSH
Encryption: Encrypted data is exchanged between the server and client, which
ensures confidentiality and prevents unauthorized attacks on the system.
Authentication: For authentication, SSH uses public and private key pairs
which provide more security than traditional password authentication.
Data Integrity: SSH provides Data Integrity of the message exchanged during
the communication.
Tunneling: Through SSH we can create secure tunnels for forwarding network
connections over encrypted channels.
SSH Functions
There are multiple functions performed by SSH Function, here below are some
functions:
SSH provides high security as it encrypts all messages of communication
between client and server.
SSH provides confidentiality
SSH allows remote login, hence is a better alternative to TELNET
SSH provides a secure File Transfer Protocol, which means we can transfer
files over the Internet securely
SSH supports tunneling which provides more secure connection communication
SSH Protocol
To provide security between a client and a server the SSH protocol uses
encryption. All user authentication and file transfers are encrypted to protect the
network against attacks.
Para 2
What is Malware Analysis? Malware Analysis is the study or process of determining the
functionality, origin and potential impact of a given malware sample and extracting as much
information from it. The information that is extracted helps to understand the functionality and
scope of malware, how the system was infected and how to defend against similar attacks in
future.
Objective:
• to understand Tthe type of malware and its functionality.
• Determine how the system was infected by malware and define if it was a targeted attack
or a phishing attack.
• How malware communicates with attacker.
• Future detection of malware and generating signatures.
Types of Malware Analysis:
• Static analysis – It is a process of analyzing the malware without executing or running it.
This analysis is used to extract as much metadata from malware as possible like P.E
headers strings etc.
• Dynamic analysis – It is process of executing malware and analyzing its functionality
and behavior. This analysis helps to know what malware does during its execution using
debugger.
• Code analysis – It is a process of analyzing/reverse engineering assembly code. It is
combination of both static and dynamic analysis.
• Behavioral analysis – It is the process of analyzing and monitoring the malware after
execution. It involves monitoring the processes, registry entries and network monitoring
to determine the workings of the malware.
Common Steps in Malware Analysis:
• Identification
• Static Analysis
• Dynamic Analysis
• Code Analysis
• Behavioral Analysis
• Reverse Engineering
How it works;
Unlike computer viruses, a Trojan horse requires a user to download the server side of the
application for it to function because it cannot manifest by itself. This means that for the Trojan
to target a device’s system, the executable (.exe) file must be implemented and the software
installed.
Cybercriminals can also utilize social engineering techniques to trick people into installing
malicious software, which can then infect a device with a Trojan. The malicious file may be
hidden in internet links, pop-up ads, or banner advertisements. The malicious file may be hidden
in internet links, pop-up ads, or banner advertisements.
Trojan software can propagate to other computers from a Trojan-infected the computer. A hacker
makes the device into a zombie computer, giving them remote access to it without the user’s
knowledge. The zombie machine can then be used by hackers to spread malware among a botnet
of computers.
A user might, for example, get an email from a friend that has an attachment that likewise
appears to be real. However, the attachment has malicious code that runs on the user’s device and
installs the Trojan. The user may not be aware that anything suspicious has happened because
their machine may continue to function regularly without any signs of it having been infected.
Until the user makes a certain action, such visiting a specific website or banking app, the
malware will remain undiscovered. As a result, the malicious code will be activated and the
Trojan will do the required hacking activity. The malware may destroy itself, go back to being
dormant, or continue to be active on the device, depending on the type of Trojan and how it was
developed.
1. Phishing
Phishing is a cyberattack that leverages email, phone, SMS, social media or other
form of personal communication to entice users to click a malicious link, download
infected files or reveal personal information, such as passwords or account
numbers.
While the most well-known phishing attacks usually involve outlandish claims, such
as a member of a royal family requesting an individual’s banking information, the
modern phishing scam is far more sophisticated. In many cases, a cyber criminal
may masquerade as retailers, service providers or government agencies to extract
personal information that may seem benign such as email addresses, phone
numbers, the user’s date of birth, or the names of family members.
Phishing is one of the most common types of cyberattacks and its prevalence
continues to grow year over year. COVID-19 dramatically increased cyberattacks of
all kinds, including phishing attacks. During the lockdown period, people generally
spent more time online and also experienced heightened emotions — the virtual
recipe for an effective phishing campaign. According to the FBI, phishing was the
top form of cybercrime in 2020, with incidents nearly doubling compared to 2019.
2. Whaling
A whaling attack is a type of phishing attack that also leverages personal
communication to gain access to a user’s device or personal information.
The difference between phishing and whaling has to do with the level of
personalization. While phishing attacks are not personalized and can be replicated
for millions of users, whaling attacks target one person, typically a high-level
executive. This type of attack requires a significant amount of research on that
individual, which is usually done by reviewing their social media activity and other
public behavior. This in-depth research results in more sophisticated outreach and a
higher likelihood of success.
Though whaling attacks require more planning and effort initially, they often have
huge payoffs as the targets have access to high value data or the financial
resources needed to advance a ransomware attack.
3. Baiting
Baiting is a type of social engineering attack wherein scammers make false
promises to users in order to lure them into revealing personal information or
installing malware on the system.
Baiting scams can be in the form of tempting ads or online promotions, such as free
game or movie downloads, music streaming or phone upgrades. The attacker hopes
that the password the target uses to claim the offer is one they have also used on
other sites, which can allow the hacker to access the victim’s data or sell the
information to other criminals on the dark web.
Baiting can also be in a physical form, most commonly via a malware-infected flash
drive. The attacker would leave the infected flash drive in an area where the victim
is most likely to see it. This would prompt the victim to insert the flash drive into the
computer to find out who it belongs to. In the meantime, malware is installed
automatically.
4. Diversion theft
Diversion theft is a cyberattack that originated offline. In this attack, a thief
persuades a courier to pick up or drop off a package in the wrong location, deliver
an incorrect package or deliver a package to the wrong recipient.
Diversion theft has since been adapted as an online scheme. The malicious actor
steals confidential information by tricking the user into sending it to the wrong
recipient.
In this attack scenario, the scammer closely monitors the executive’s behavior and
uses spoofing to create a fake email account. Through impersonation, the attacker
sends an email requesting their subordinates make wire transfers, change banking
details and carry out other money-related tasks.
BEC can result in huge financial losses for companies. Unlike other cyber scams,
these attacks do not rely on malicious URLS or malware that can be caught by
cybersecurity tools, like firewalls or endpoint detection and response (EDR)
systems. Rather, BEC attacks are carried out strictly by personal behaviour, which
is often harder to monitor and manage, especially in large organizations.
6. Smishing / SMS-phishing
SMS-phishing, or smishing, is a social engineering attack conducted specifically
through SMS messages. In this attack, scammers attempt to lure the user into
clicking on a link which directs them to a malicious site. Once on the site, the victim
is then prompted to download malicious software and content.
A smishing attack requires little effort for threat actors and is often carried out by
simply purchasing a spoofed number and setting up the malicious link.
For example, the attacker may pose as an IT support technician and call a computer
user to address a common IT issue, such as slow network speeds or system
patching to acquire the user’s login credentials. Once the credentials are
exchanged, this information is used to gain access to other sensitive data stored on
the device and its applications, or it is sold on the dark web.
8. Pretexting
Pretexting is a form of social engineering that involves composing plausible
scenarios, or pretext, that are likely to convince victims to share valuable and
sensitive data.
9. Honeytrap
A honeytrap attack is a social engineering technique that specifically targets
individuals looking for love on online dating websites or social media. The criminal
befriends the victim by creating a fictional persona and setting up a fake online
profile. Over time, the criminal takes advantage of the relationship and tricks the
victim into giving them money, extracting personal information, or installing
malware.
10. Tailgating/Piggybacking
Tailgating, also known as piggybacking, is a physical breach whereby an attacker
gains access to a physical facility by asking the person entering ahead of them to
hold the door or grant them access. The attacker may impersonate a delivery driver
or other plausible identity to increase their chances. Once inside the facility, the
criminal can use their time to conduct reconnaissance, steal unattended devices or
access confidential files.
11.Shoulder Sniffing:
12.Eavesdropping:
Eavesdropping, in the context of ethical hacking, involves listening in on
communications between individuals or devices to gather intelligence about
potential security risks. Ethical hackers may use tools like packet sniffers or
network monitoring software to intercept and analyze data exchanged over
unsecured channels. By eavesdropping on conversations or electronic
communications, security professionals can assess the effectiveness of
encryption methods, communication protocols, and access controls implemented
by the target organization.
Identity Theft:
How Identity Theft Relates to Ethical Hacking:
Ethical hackers play a crucial role in preventing identity theft by conducting penetration
testing, vulnerability assessments, and security audits. These proactive measures help
organizations identify and address security gaps before cybercriminals can exploit them
for nefarious purposes. By working closely with cybersecurity teams, ethical hackers
contribute to the development of robust security protocols that safeguard sensitive
personal information from unauthorized access.