0% found this document useful (0 votes)
2 views73 pages

TYPES OF HACKING

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 73

TYPES OF HACKING

1. Cellular Devices Hacking

2. Website Hacking

3. Network Hacking

4. Email Hacking

5. Ethical Hacking

6. Password Hacking

7. Computer Hacking
ADVANTAGES & DISADVANTAGES OF HACKING:

Advantages of Hacking

To recover lost information, especially in case you lost your password.

To perform penetration testing to strengthen computer and network security.

To put adequate preventative measures in place to prevent security breaches.

To have a computer system that prevents malicious hackers from gaining access.
ADVANTAGES & DISADVANTAGES OF HACKING:

Disadvantages of Hacking

• Hacking is quite dangerous if it is done with harmful intent. It can cause −

• Massive security breach.

• Unauthorized system access on private information.

• Privacy violation.

• Hampering system operation.

• Denial of service attacks.

• Malicious attack on the system.


TYPES OF ATTACKS
1. Malware

2. Phishing

3. SQL Injection Attack

4. Cross-Site Scripting

5. Denial-of-Service (DoS)

6. Session Hijacking and Man-in-the-Middle Attacks

7. Credential Reuse
Types of
Attacks
• 1 Malware
Types of
Attacks
Phishing
Types of
Attacks
SQL Injection Attack
Types of
Attacks
• Cross-Site Scripting (XSS):
Types of
Attacks
• Process of Denial-of-Service (DoS).
Types of
Attacks
• Session Hijacking and Man-in-the-Middle Attacks
Types of
Attacks
• Credential Reuse:
Tips to Prevent Hacking
 Encrypt Files While Storing and Transferring
 Use Browser Extensions to Block Malicious Sites and Harmful Downloads
 Install a Strong Anti-Malware Program
 Sanitize Your PC Manually
 Enable Encryption Using BitLocker for Windows 10
 Enable Two-Factor Authentication
 Don’t Log in Via Existing Third-Party Platforms
 Don’t Share Any Information via HTTP Sites
 Recognize Signs of Fake or Malware-Infected Websites
 Learn to Recognize Fake vs. Legitimate Software and Applications
 Recognize Phishing Emails
 Be Vigilant While Downloading Anything from the Internet
 Beware of Phishing SMS Messages
 Additional Tips on How to Prevent Being Hacked
THE INDIAN IT ACT 2000
 SECTION 3 - AUTHENTICATION OF ELECTRONIC RECORDS BY USE OF DIGITAL SIGNATURE
 SECTION 3A - AUTHENTICATION OF ELECTRONIC RECORDS BY USE OF ELECTRONIC SIGNATURE
 SECTION 4 - ELECTRONIC RECORDS
 SECTION 5 - LEGAL RECOGNITION OF ELECTRONIC SIGNATURES
 SECTION 14 - SECURE ELECTRONIC RECORD
 SECTION 15 - SECURE ELECTRONIC SIGNATURE
 SECTION 18 - FUNCTIONS OF CONTROLLER
 SECTION 21 - LICENCE TO ISSUE ELECTRONIC SIGNATURE CERTIFICATES
 SECTION 22 - APPLICATION FOR LICENSE
 SECTION 43 - PENALTY FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM, ETC
 SECTION 43A - COMPENSATION FOR FAILURE TO PROTECT DATA
TYPES OF STEALTH SCANS

• Inverse Mapping
• Slow Scan
• Half Open Scan
• FIN Scan
• Xmas Tree Scan
• Null Scan
• UDP Scan
• Dumb or Idle Scan
Half Open Scan
FIN Scan
Xmas Tree Scan
NULL Scan
UDP Scan
Dumb Scan
Packet Sniffing

Packet sniffing is a technique for detecting and observing packet data

travelling across a network. Packet sniffing tools are used by network

administrators to monitor and validate network traffic, but hackers

may use similar tools for malicious purposes


Types of packet sniffing
• Hardware Packets Sniffers
 A hardware packet sniffer is a device that connects to a network and analyses it.
 When trying to see the activity of a specific network segment, a hardware packet sniffer comes in handy.
 A hardware packet sniffer can assure that no packets are lost owing to filtering, routing, or other deliberate or
incidental causes by inserting directly into the physical network at the proper spot.
• Software Packets Sniffers
For most network adapters, this is referred to as promiscuous mode.
When a packet sniffer is in promiscuous mode, its capability is reduced to
isolating, reassembling, and reporting any software packets that flow through
the interface, regardless of their destination addresses.
All traffic that and Sniffing goes across the physical network interface is
collected by software packet sniffers.
ARP SPOOFING
• When malicious ARP packets are transmitted to a LAN's default gateway, ARP spoofing, also known as ARP
poisoning
• ARP spoofing attacks are carried out at a low level, which favours the hackers because victims may find it
difficult to notice that their traffic has been tampered with.
SNIFFING COUNTERMEASURES

• Patch software and disable any unnecessary services

• Routinely inspect key binaries

• Use a switched network

• Disable kernel loading

• Use of encryption

• Use one-time passwords


PREVENT MALWARE ATTACKS
• Software should always update.
• Always use antivirus and antimalware software into the system and also install
firewalls and security software.
• User should always follow ethics of email.
• Maintain email security gateways
• Be aware of fake links and attachments.
• Do the setting of access control
• Always do the multifactor authentication
• Monitor for abnormal or suspicious activity.
COMPUTER WORM
• Computer worms are replicable in nature hence there is no need of assistance.
• The infected system sends mail to through other system and these
• systems are infected by worms by opening those emails.
• When user open the mail, the worm is automatically gets download and it destroy the program.
• The gets into known condition only after the system is infected.
• Worms are responsible for modify or delete the files of the system in the network.
• Computer worms destroy the data stored in the system.
• All the Security features are exploited by the worms.
• The system setting is also change by some worms.
• Some examples of worms are Morris Worm, Storm Worm, SQLSlammer and so on.
TYPES OF COMPUTER WORMS

• Email Worms

• Internet Worms

• File-Sharing Network Worms

• Instant Message and Chat Room Worms

• IRC Worms (Internet Relay Chat)


Differences B/w
DOS AND DDOS ATTACK

• Ease of detection/mitigation

• Speed of attack

• Traffic volume

• Manner of execution

• Tracing of source(s):
TYPES OF DOS AND DDOS ATTACKS

• Teardrop Attack
TYPES OF DOS AND DDOS ATTACKS

•Flooding Attack
TYPES OF DOS AND DDOS ATTACKS
• IP Fragmentation Attack
TYPES OF DOS AND DDOS ATTACKS
• Volumetric Attack
• Application-based Attack
Brute force attack

The term “brute force” define the The attack in brute force use bots to do In manual brute force credential cracking With the tools the attacker will attempt
simplistic way in which the attack takes their bidding. With this type of attack, is time-consuming, and this can be done things like inputting numerous password
place. The attack is held with guessing the attackers will have a list of real or through using brute force attack software combinations and accessing web
credentials to gain unauthorized access. commonly used credentials and assign and tools to aid them. applications by searching for the correct
Primitive as they are, brute force attacks their bots to attack websites using these session ID, among others
can be very effective. credentials.
Phishing attack

• In organization the Phishing is the biggest cyber threats faced


during the work. As per the Phish Report of
Proofpoint’s 2021, most of the organisations fell
victim to a phishing attack last year.

• The fast growing sophisticated of phishing scams has


contributed to the same objective that is to steal the user
personal data or infect our devices with the new countless
ways.
Types of phishing attack

• Email phishing

• Spear phishing

• Whaling

• Smishing and vishing

• Angler phishing
Man in the middle attack
• While doing this we made some assumption:
1. The data which we are entered is valid,
2. The data is sending to the server in original format or in correct form
3. During the transmission third parties cannot see, intercept or change your data.
• If we are using some websites and online services which are not secure, we could face some security risks
such as phishing, fraud, impersonation, malware, and many others.
The two main types of MITM attacks

• Active session attack


While using internet connection two devices are communicated with each other via network, where the attacker
involve in the communication and stops the original client from communicating with the server and act as
normal and collect all the sensitive information from both the client and then replaces himself within the session

• Passive session attack


In this attack the hacker is passive in nature where he only monitors the data flowing across the network without
interrupting the actual communication as well as he is not modifying any messages, he just collect all the data
which are transferred to between the clients
IOT ATTACK

Gathering of abundant data


Connection of virtual and physical environments
Creation of complex environments
Centralization of architecture

Attack surface areas of the IoT


Devices
Communication channels
Applications and software
Botnets
How Does a Botnet Work ?
Social engineering attack
Social engineering attack techniques

• Baiting

• Scareware

• Pretexting

• Phishing

• Spear phishing
STEGANOGRAPHY TECHNIQUES

• Secure Cover Selection

Secure Cover Selection comes with finding the correct block of image to carry malware to destroy the data.
After this the hackers always compare their chosen image medium with the malware blocks. If an image block is
exactly matches with the malware, the hackers use that image block to fit it into the carrier image, then he will
create an identical image infected with the malware. This image subsequently passes quickly through threat
detection methods.

Least significant Bit


• Palette-Based Technique
Least Significant Bit
0 1 2

0
R G B
1

Lsb implementation in python


Session hijacking

Session hijacking is an attack where a user session is taken over by an attacker.

A session starts when you log into a service and ends when you log out.

for example, your banking application. The attack relies on the attacker’s knowledge of your session

cookie, so it is also called cookie hijacking or cookie side-jacking. Although any computer’s

session could be hijacked, session hijacking most commonly applies to browser sessions and web applications.
PREVENT SESSION HIJACKING

• Avoid public Wi-Fi

• Use a VPN

• Add security software

• Watch out for scams

• Be aware of site security


Web Servers
Causes of webservers being compromised
1. Personal Computer Security
2. Indirect Server Hacks
3. Responding to Phishing Email
4. Outdated Scripts
5. Lack of security policy and procedures
6. Bugs in the operating system and web servers
WEB SERVER ATTACKS
• Dos/DDoS

• DNS Server Hijacking

• Directory Traversal Attacks

• Man in the Middle Attack

• Phishing Attacks

• Website Defacement

• Web Server Misconfiguration

• Web Cache Poisoning

• SSH Brute Force Attacks

• Web Server Password Cracking Attacks


STAGES OF WEB SERVER ATTACKS

• Information Gathering

• Web Server Footprinting

• Website Mirroring

• Vulnerability Scanning

• Session Hijacking

• Web Server Passwords Hacking


COUNTERMEASURES AGAINST WEB SERVER ATTACKS

• Always Keep Your Firewalls and Antivirus Software Updated

• Use Current Versions of Integrated Software

• Use Hosting Companies That Routinely Update Security

• Never Interact Directly with Unsolicited Email

• Always Update Your Scripts and Remove Installation Files

• Never Underestimate Your Site’s Importance to Hackers


WEB APPLICATION
• USER
• WEB SERVER
• WEB APPLICATION SERVER

Web Application Components


UI/UX Web Application Components
Structural Components
Client Component
Server Component
• Models of Web Application Components

• One Web Server, One Database

• Multiple Web Servers, One Database (At a Machine Rather than the Web server)

• Multiple Web Server, Multiple Databases

• Web Application Architecture Layers

• Presentation Layer

• Business Layer

• Data Access Layer

• Data Service Layer


COMMON THREATS TO WEB APPLICATIONS
AND HOW TO AVOID THEM

• Security Misconfiguration

• Malware

• Injection Attacks

• Phishing Scam

• Brute Force
SQL INJECTION

• In a SQL injection attack, an attacker submits an information to a website that has been

deliberately formulated in such a way that it results in that website misinterpreting it and

taking unintended actions

• SQL injection attacks pose a serious security threat to organizations. A successful SQL injection attack

can result in confidential data being deleted, lost or stolen; websites being defaced; unauthorized

access to systems or accounts and, ultimately, compromise of individual machines or entire networks.
SQL injection examples

• Below is an example of how a SQL injection attack could be carried out in practice. The attack is designed to
gain access to all data about a user from the database table USERS without knowing a username or matching
password.
• The SQL application code might be:
• SELECT * FROM Users WHERE Username=’$username’ AND
Password=’$password’
• Using a web interface, when prompted for their username and password, an attack might enter:
• 1′ OR ‘1’ = ‘1
and
1′ OR ‘1’ = ‘1
• By entering this deliberately formulated username and password pair, the attacker has effectively injected two
whole OR conditions into the authentication process.
TYPES OF SQL INJECTIONS

•In-band SQLi
•Error-based SQLi
•Union-based SQLi
•Inferential (Blind) SQLi
 Boolean
 Time-based
• Out-of-band SQLi
SQL INJECTION VULNERABILITIES
• Routine application database audits should be used to determine if your application has been compromised

• Querying the database for common HTML tags used by worms can reveal signs that the application is
spreading malware. These tags include "iframe", "http-equiv="refresh"" or the IP address of known malicious
servers

• An easier way to detect a compromise is by examining webpages created from dynamic content for
unexpected behavior, including the addition of hidden iframes -- code elements used to embed an HTTP
document in another HTTP document -- in the HTML. These routine audits help detect a compromised
system, but this method only allows for fixes to be created after the fact.

• Recovering an application from an exploited state, especially when data may have been altered, can be an
extremely costly process and does not prevent future attacks.
PREVENT SQL INJECTION

• Train and maintain awareness

• Don’t trust any user input

• Use whitelists, not blacklists

• Adopt the latest technologies

• Employ verified mechanisms

• Scan regularly
Introduction to Wireless network

• A wireless network is a set of two or more devices connected with each other via radio
waves within a limited space range.

• Most wireless LANs (WLANs) are based on the IEEE 802.11standards and amendments,
such as 802.11a, 802.11b, 802.11g, and802.11n. The 802.11 standard included only
rudimentary security features and was fraught with vulnerabilities.

• The 802.11i amendment is the latest security solution that addressesthe 802.11
weaknesses.

• The Wi-Fi Alliance created additional security certifications known as Wi-Fi Protected
Access (WPA) and WPA2 to fill the gap between the original 802.11 standard and the
• Kismet:- Kismet is a powerful tool for wireless sniffing that is found in Kali distribution.
It latest 802.11i
can also amendment.
be downloaded from its official webpage − https://www.kismetwireless.net.
'Wireless encryption techniques
• WEP: Wired Equivalent Privacy
• WPA: Wi-Fi Protected Access
• WPA2: Wi-Fi Protected Access with EAP

Wireless encryption algorithms


• WEP: Wired Equivalent Privacy
• WPA: Wi-Fi Protected Access
• WPA2: Wi-Fi Protected Access with EAP
• TKIP
• AES
• 9 EAP
• CCMP

• 802.11 I
• LEAP
Wireless Sniffing
• Email traffic

• FTP passwords

• Web traffics

• Telnet passwords

• Router configuration

• Chat sessions

• DNS traffic
Types of Sniffing,
• Passive Sniffing
• Active Sniffing
• Active Sniffing Techniques
• MAC Flooding
• • DHCP Attacks
• • DNS Poisoning
• • Spoofing Attacks
• • ARP Poisoning
Wireless hacking techniques,

• Cracking encryption and


authentication mechanisms
• Eavesdropping or sniffing
• Denial of Service
• AP masquerading or spoofing
Rogue
• MAC spoofing
Cryptography and its Objectives
• Cryptography is the study of encryption and encryption algorithms. In a practical
sense, encryption is the conversion of messages from a comprehensible form
(clear text) into an incomprehensible one (cipher text), and back again.

• The purpose of encryption is to render data unreadable by interceptors or


eavesdroppers who do not know the secret of how to decrypt the message.
Encryption attempts to ensure secrecy in communications.

• Cryptography defines the techniques used in encryption. Everyone has secrets,


and when it is necessary to transfer that secret information from one person to
another, it's very important to protect that information or data during the
transfer.
Confidentiality:
Integrity:
Authentication:
Nonrepudiation
Digital signatures
Confirmation services
Cryptography and its Objectives
Confidentiality:
Integrity:
Authentication:
Nonrepudiation
Digital signatures
Confirmation services.
Cryptography types,
• Symmetric encryption (secret key cryptography)

• Asymmetric encryption
(public key cryptography
Cryptography attacks,
• Cipher text only attack
• Known-plain text attack
• Chosen-plaintext
• Chosen-cipher text attack
• Chosen key attack
• Adaptive chosen-plain text attack
• Timing attack
• Rubber hose attack
DES and AES, Digital signatures

AES
What is Pen Testing

• Pen Testing is also known as Penetration testing.

• It is a type of Security testing used to cover vulnerabilities, threats and risks


that an attacker could exploit in software applications, networks or web
applications and also used to test the insecurity of an application.

• It is conducted to find the security risk which might be present in the system.

• If a system is not secured, then any attacker can disrupt or take authorized
access to that system.

• Security risk is normally an accidental error that occurs while developing and
implementing the software. For example, configuration errors, design errors,
and software bugs, etc.

• A penetration test simulates methods that intruders use to gain unauthorized


access to an organization’s network and systems and to compromise them.
Types and techniques of pen testing,

• Black Box

• Grey Box

• White Box

• External Penetration Testing

• Internal Penetration Testing


Steps of penetration testing method
Automated penetration testing tools.
The following should be considered the top pen testing tools in a hacker’s toolkit:

Nessus
GFI LANguard
Retina
CORE IMPACT
ISS Internet Scanner
X-Scan:
Security Auditor’s Research Assistant
QualysGuard
Security Administrator’s Integrated Network Tool6
Microsoft Baseline Security Analyzer

You might also like