Unit 3
Unit 3
• Scareware
• Malvertising
• Clickjacking
• Ransomware
⦿ Basic
stages of an attack are described
here to understand how an attacker
can compromise a network here:
1. Initial uncovering:
🞄Two steps involved: 1) Reconnaissance
2) Attacker uncovers information
2. Network Probe
3. Crossing the line toward E-crime
4. Capturing the network
5. Grab the data
6. Covering tracks
⦿ Proxyserver is computer on a network
which acts as an intermediary for
connections with other computers on that
network
⦿ Program viruses:
• Active when program file(usually with extensions .bin,
.com, .exe, .ovl, .drv) is executed
• Makes copy of itself
⦿Multipartite
• Hybrid of a boot sector and program viruses
Viruses:
⦿ Stealth viruses:
• Masks itself
• Antivirus S/W also cannot detect
• Alter its file system and hide in the computer
memory to remain in the system undetected
• 1st computer virus named as Brain
⦿ Polymorphic viruses:
Macroviruses:
• Infect documents produced by victims computer
⦿ Get
into system from no. of ways, including
web browser, via E-Mail, or with S/W
download from the Internet
⦿ Trojans
do not replicate themselves but they
can be equally destructive
⦿ Examples of threats by Trojans:
• Erase, overwrite or corrupt data on computer
• Help to spread other malware
• Deactivate or interfere with antivirus and firewall
• Allow to remote access to your computer
• Upload and download files without user knowledge
• Gather E-Mail address and use them for spam
• Slow down , restart or shutdown the system
• Reinstall themselves after being disable
• Disable task manager or control panel
• Copy fake links to false websites, display porno sites, play
sounds/videos and display images
• Log keystrokes to steal info such as password or credit card no.
⦿It means of access to a computer program that bypass security mechanisms
⦿ Programmer use it for troubleshooting
⦿ Attackers often use backdoors that they detect or install themselves as part of an
exploit
⦿ Works in background and hides from user
⦿ Most dangerous parasite, as it allows a malicious person to perform any possible
action
⦿ Programmer sometimes leave such backdoor in
their software for diagnostic and troubleshooting purpose. Attacker discover these
undocumented features and use them
⦿ Allow an attacker to create, delete, rename, copy or edit any file; change any system
setting, alter window registry; run, control and terminate application; install arbitrary
software
⦿ Attacker spoofs the IP address and floods the N/W of victim with repeated requests
⦿As the IP address is fake, the victim machine keeps waiting for response from
the attacker’s machine for each request
⦿ This consumes the BW of the N/W which then fails to server the legitimate responses
and ultimately breaks down
⦿US Computer Emergency Response defines it:
⦿Logic attack
• Exploit vulnerabilities in n/w s/w such as web server or TCP/IP
stack
⦿Protocol attacks
• Exploit specific feature or implementation bug of some protocol
installed at victim’s system to consume excess amount of its
resources
⦿Unintentional DoS attack
1. Flood attack: (Ping flood)