Tools and Methods Used in Cybercrime
Tools and Methods Used in Cybercrime
Tools and Methods Used in Cybercrime
2. Network Probe:
• Uses invasive techniques to scan the information.
• Ping sweep
• Port scanning tool
3. Crossing the line towards electronic crime (E-Crime):
• Make use of all possible holes on the target system.
• They use common gateway interface (CGI).
• Easiest way to gain an entry is by checking for default login accounts or
empty passwords.
6. Covering Tracks:
• This refers to the activities undertaken by the attacker to extend misuse of
the system without being detected.
• The attacker remain undetected for long periods.
• During this entire 6 stages, the attacker takes optimum care to hide his/her
identity from the first step itself.
Proxy Servers and Anonymizers:
• Proxy server is a computer on the network which acts as an
intermediary for connections with other computers on that network.
• The attacker first connect to a proxy server and establish the connection
with the target system.
• This enables an attacker to surf on the web anonymously and hide the
attack.
Example: A client connects to the proxy server and requests some
services available from a different server.
The proxy server evaluates the request and provides the resource by
establishing the connection to the respective server and requests the
required service on behalf of the client.
• A proxy server can allow an attacker to hide ID.
• A proxy server has following purposes:
1. Keep the systems behind the curtain.
2. Speed up access to a resource (through “caching”). It is usually used to
cache the webpages from a web server.
3. Specialized proxy servers are used to filter unwanted content such as
advertisements.
4. Proxy server can be used as IP address multiplexer to enable to connect
number of computers on the internet, whenever one has only one IP
address.
• Advantage of proxy server: its cache memory can serve all users.
• An anonymizer or an anonymous proxy is a tool that attempts to make
activity on the internet untraceable.
• It accesses the internet on the user’s behalf, protecting personal
information by hiding the source computer’s identifying information.
• In 1997, the first anonymizer software tool was created by Lance
Cottrell, developed by Anonymizer.com
• The anonymizer hides/remove all the identifying information from a
user’s computer while the user surfs on the Internet, which ensures the
privacy of the user.
Phishing:
• Phishing is a process of stealing personal and financial data and can also
infect systems with viruses and a method of online ID theft in various
cases.
Example: While checking E-Mail one day a user finds a message from
the bank threatening him/her to close the bank account if he/she does
not reply immediately.
Although the message seems to be suspicious from the contents of the
message, it is difficult to conclude that it is a false/ fake E-Mail.
• Most people associate Phishing with E-Mail messages that spoof or
mimic banks, credit card companies or other business such as Amazon.
• These messages look authentic and attempt to get users to reveal their
personal information.
• How Phishing works?
1. Planning
2. Setup
3. Attack
4. Collection
5. Identity theft and Fraud
Password Cracking:
• Password is like a key to get an entry into computerized system like a
lock.
• Password cracking is a process of recovering passwords from data that
have been stored in or transmitted by a computer system.
• Usually, an attacker follows a common approach- repeatedly making
guesses for the password.
• The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system administrators to check for easily
crackable passwords.
3. To gain unauthorized access to a system.
• Manual password cracking is to attempt to logon with different
passwords.
• The attacker follows the following steps:
1. Find a valid user account such as an Administrator or Guest;
2. Create a list of possible passwords;
3. Rank the passwords from high to low probability;
4. Key-in each password;
5. Try again until a successful password is found.
1. Back Orifice
2. Bifrost
3. SAP backdoors
4. Onapsis Bizploit
How to Protect from Trojan Horses and Backdoors:
• Follow the following steps to protect the system from Trojan Horses
and backdoors:
3. Multipartite Viruses:
• It is a hybrid of a boot sector and program viruses.
• It infects program files along with the boot record when the infected
program is active.
• When the victim starts the computer system next time, it will infect the
local drive and other programs on the victim’s computer system.
4. Stealth Viruses:
• It camouflages and/or masks itself and so detecting this type of virus is
very difficult.
• It can disguise itself such a way that antivirus software also cannot detect
it thereby preventing spreading into the computer system.
• It alters its file size and conceals itself in the computer memory to remain
in the system undetected.
• The first computer virus, named as BRAIN, was a stealth virus.
• A good antivirus detects a stealth virus lurking on the victim’s system by
checking the areas the virus must have infected by leaving evidence in
memory.
5. Polymorphic Viruses:
• It acts like a ‘Chameleon’ that changes its virus signature every time it
spreads through the system.
• Hence, it is always difficult to detect polymorphic virus with the help of
an antivirus program.
• Polymorphic generators are the routines(i.e., small programs) that can be
linked with the existing viruses.
• The first all-purpose polymorphic generator was the mutation
engine(MTE) published in 1991.
6. Macroviruses:
• Many applications such as Microsoft Word and Microsoft Excel, support
MACRO’s.
• These macros are programmed as a macro embedded in a document.
• Once a macrovirus gets onto a victim’s computer then every document,
he/she produce will be infected.
• This type of virus is relatively new and may get slipped by the antivirus
software if the user does not have the most recent version installed on
his/her system.
7. Active X and Java Control:
• All the web browsers have settings about active X and Java controls.
• Little awareness is needed about managing and controlling these
settings of the web browser to prohibit and allow certain functions to
work- such as enabling or disabling the pop ups, downloading the files
and sound- which invites the threats for the computer system being
targeted by unwanted software(s) floating in cyber space.