Module 1
Module 1
Module 1
LEARNING OBJECTIVES
.Understand the concept of 'cybererime' and its Understand the concept of hacking and its
effect on the digital world. effect on digital world.
Interpret and apply security mechanisms on Understand the process of ethica! hacking.
various cybercrimes. Interpret and apply security mechanism to
The first faults are theirs that commit them; the second faults are theirs that permit them.
-Thomas Fuller
WHAT IS CYBERCRIME?
sE
If
an individual wants to prevent a cybercrime, he/she has to adopt digital forensic tools to reduce the
vulnerability score. To protect our confidential data or any kind of personal data, the hard drive should be
cleansed using a solution. As the crimes related to computer are increasing day by day, tools required tofight
against the same are being developed faster.
1 . 2 Categories of Cybercrimes
Cybercrimes can be broadly divided into three major categories (Figure 1.2).
Oybercrimes
Cyber-stalking, Computer
email spoofing, etc. vandalism, Cyber
transmitting terrorism
viruses, etc.
humanity can
hardly explained. Cyber harassment could be a distinct cybercrime. Various harassments
and do
can occur in internet, or through the use of internet. This includes sexual, racial, religious, OF other
harassments. P'eople
perpetuating such harassments are guilty of cybercrimes.
NITRODUCTION TO COMPUTER CRIMES AND ETHICAL HACKING 3
of Cybercrimes
13 Types
Cvbercrimes can be broadly divided as:
those that
potentially violent cybercrimes: Violent or potentially violent cybercrimes
are
1. Violent or
further categorized
physical risk to some character or people. They can be
as:
a
pose
(a) Cyber terrorism
1.3.1 Hacking
ethical!
hack, but when you do, it should be
Do not
TIC Raymond, compiler of The New Hacker's Dictionary, defines a hacker as an artless coder. A 'good hack
it.
m answer to a programming difficulty
and 'hacking (Figure 1.3) is the act of doing
a
clever as a hacker:
following five likely characteristics quality
one
ACCording to Raymond, the
language or system.
An Individual who enjoys learning details of a programming instead of simply theorizing it.
An individual who enjoys truly doing the programming
An individual capable of appreciating somebody else's hacking.
An individual who picks up programming quickly.
A n individual who is a professional in a specific programming language or system.
DIGITAL FORENSIC
Try
No
Success?
Yes
Next
Attacker
Attacker sends command for his
bots to attack bank.
A A A ww*so
Internet
Thousands of requests are sent to the
bank website simultaneously.
Bank
Bank is flooded with
requests
and cannot operate effectively.
J9
E
D
AITRODUCTION TO COMPUTER CRIMES AND ETHICAL HACKING
These amounts, unnoticeably taken from collective accounts, add up to a large amount of money. Most people
fail to report such deducttons, often letting it go bccause of the amount involved, which could be a fraction of
a Gent, so as to avoid Suspicion from the unsuspecting customer. A salami attack is a small attack that can be
repeated many times etticiently. T hus, the overall impact of the attack is huge. For example, stcaling the round-ot
amounts from the interest in bank accounts. Even though it is less than I cent per account, when multiplied by
millions of accounts over many months, the adversary can retrieve quite a large amount.
It is also less lhkely to De
noticeable since your average custonmer would assume that the amount was rounded down to the nearest cent
1.3.13 Defamation
Internet is an integral part of our life. It acts as a medium for interacting with people across the globe.
oral
Defamation implies causing harm to a reputed individual in front of others. Harm can be inflicted by
a
words, visuals, or any other means. Cyber defamation is a new concept, and it involves detamation or
or individual by a new or virtual medium. Cyber defamation
is considered to be a cybercrime. yber
person
defamation not only aftects the welfare of the community, but also the victim.
1.3.14 Cyber Stalking
or a group of
medium to threaten s o m e o n e or an individual
Cyber stalking refers to the use of an electronic calls or messages or emails,
This may include wrong allegations, threatening
people or certain organization. Cyber stalking is a crimn-
kind of defamation, wrong identity theft, and many
more.
wrong accusations, any stalkers could be strangers,
harassment laws. It is a kind of online stalking. Cyber
inal offense under various
know you, ex-business partners, enemies, and many
more.
people who you may know, people who
1.4 The Internet Spawns Crime
communication and content
services that is globally accessible. As inte net
The internet is a network of environment. A
in this computer
and selling, crimes are on the rise
provides a lot of options for buying crime in stealing of processor chips,
murder or fraud, the object of
as
represents a tool of crime as in involvement of computers on criminal
or the theme of crime as in hacking
and spreading viruses. The
and spreading viruses,
field of activities such as hacking
rule has been much ampler than the narrow crimes such as child
criminal concepts, and facilitating particular types of
both noteasy for traditional
pornography. about whether a particular work should be considered criminal
Criminal commandment is not just them;
that carry out criminal acts and prosecutes
that investigates those
Or not. It is a law enforcement The implementation of internet
environment.
difficult in a computer
a procedure more significantly between developed and developing
nations. Wireless communica-
technologies is not uniform, particularly countries, where the inheritance
On systems in many developing
technologies have quickly eclipsed wire Differential of
technological use may mean dissimilar patterns
nmunication was greatly underdeveloped.
threats and vulnerabilities in terms ofcybercrimes
15 Worms Versus Viruses
However, both these terms
Worn malicious that can cause harm to our system.
and viruses
are very different.
are programs
3 DIGITAL FORENSIC
1.5.1 Viruses
A virus (vital information resources under siege) is a software that is designed to duplicate itselt. This is
done by replicating itself into various programs that are stored in the computer. Computer viruses attacn
program or a file, spreading from one workstation to another, leaving intections as
it
themsclves to a
effects while others
omputer virus can range in harshness, some may cause slightly irritating
can damage hardware, software, or files. Almost all viruses are fond of an executable file, which means a
s Cannot affect our computer unless and until we run or release the malicious program. It is signiticant
to make a note that a virus cannot spread without human action, such as running the infected program
(Figure 1.6).
Alter
data
Can Self
mutate replicate
Virus
Passive Steal
transmission information
Software Delete
code data
Figure 1.6 Virus.
1.5.2 Worms
A worm (write once read
many) is similar to a
computer virus by design. It is considered to be a secondary
category virus. A worm
of spreads from computer
without any human action.
to
computer, but unlike virus it has the capability to travel
The main threat with worm is the
So rather than our
a
capability to replicate itself on our system.
and cause a huge
computer sending a
single worm, it could send hundreds or
thousands of copies of itself
devastating
the address book, then the
effect. For example, a worm
sending out a
copy of itself to everyone listed in
Since the
worm
replicates itself to each of the receiver's
address book and it manifests itselt.
worm
copies itself and also travels across
networks, it
consumes more system
bandwidth, causing web servers and memory and nerwork
individual computers to
stop responding (Figure 1.7).
TODUCTION TO COMPUTER CRIMES AND ETHICAL HACKING
9
Alter
data
Can Self
mutate
replicate
Worm
Active Steal
transmission information
Self-
contained Delete
software data
Computers as
Computers as storage
Computers as targets communications
devices
tools
60 SECONDS
Scrolling Instagram
481,000
Tweets Sent
5000 1.1 Millon
GIFS Sent via SWpes
Messenger
187 Million
inder
38 Million
Emails Sent
Messages
936,073
Voice-First iews
Devices Shipped Created By:
Lorilewis
OffhciallyChadd
Prevention of Cybercrime
1.8 better than cure.
Prevention is always
the internet.
while working on
t 15 always better to take certain precautions
as follows:
The 5P's mantra for online security are
1. Precaution
2. Prevention
3. Protection
4. Preservation
5. Perseverance
be followed to prevent cybercrimne.
Glven below are a few steps that can
companies and firms meet these challenges.
education help will
dentitication of exposures through a person whom they do not know,
information
to strangers,
One should avoid disclosing any personal social networking site.
a email while chatting or through anyto strangers online, as incidents of misuse or modification of
or
One must avoid sending any phorograph
photographs are on the rise.
12
DIGITAL FORENSIc
. An
updated anti-virus software to guard against virus attacks
should be maintained
by all netino.
AISo, a backup of data should be takcen regularly to avoid data loss in case of virus contaminationizens.
. A person should send his/her credit card number or debit card number to any site thar ie
never
secured, to guard against frauds. not
6. Parents should keep a watch when their children arc accessing internet, to prevent any kind of hara
arass-
ment or deprivation.
Website owners should kecep a watch on the nctwork traffic, and check for any irregularities, Ir i
is the
responsibility of the website owners to adopt policies for preventing cybercrimes as the number
of
internet users are growing every day.
8. Web servers running on public domain must be segregated physically and protected trom internal netun
ork.
. It is better to use a security program by the corporate body to control intormation on sites.
10. Strict statutory laws need to be passed by the Legislatures, keeping in mind the interest of netizens
ens.
I1. TT department should pass certain guidelines and notifications for the protection of comn
laws to breakdown the criminal activities relating
system and should also up with stringent to
come
Definition of Hacker
1.9 software is termed a hacker. Very often,
The one who is curious about the workings of any computer
advanced knowledge of operative systems and
the hackers are a unit of smart programmers. Hackers have
varied security holes among systems and are therefore
programming languages. They need data concerning
to increase their data and share what they need to be
thereasons for such holes. Hackers perpetually attempt
discovered. Hackers never have dangerous intention like damaging or stealing knowledge.
Hacker Cracker
Lots of knowledge and Lots of knowledge and
Experience Experience
Good guyy Bad guy
Strong ethics Poor ethics
Phreakers are people who specialize in attacks on the telephone system. The word, which became popular
in the mid-1980s, is probably a combination of the words phone and freak (Phreakers are also known as
phreaks" or "phone phreaks"). In the early days, phreakers whistled or used an instrument to mimic the
rones of the phone system and then used to route calls and identify payment, especially as a way to avoid
paying for an expensive call. Modern phreaking involves breaking into and manipulating the phone compa-
ny's computer system, making it a specialized kind of hacking.
Recent examples of phreaker from the Web:
In fact, the friends first business venture together was marketing blue boxes to aspiring phreakers.
-Laura Yan, Popular Mechanics, "An Early Hacker Used a Cereal
Box Whistle to Take Over Phone Lines," 20 May 2018
Reconnaissance is nothing more In the gaining a c c e s s phase, true attempt to conceal their
success
attacks are leveled against the
than the steps taken to gather and avoid detection by security
in the second
4
enumerated
evidence and information on the targets professionals.
targets you want to attack.
2 phase.
Gaining Access
Covering tracks
Reconnaissance
1
Take the information you gathered
in recon and actively apply tools
and techniques to gather more
3 In the fourth phase, hackers
attempt to ensure they have a way
back into the machine or system
5
in-depth information on the targets. they've already compromised
1.14.1 Reconnaissance
Reconnaissance is the phase where the attacker gathers information about a target using active or passive
means as shown in Figure 1.12. The tools that are widely used in this process are NMAR Hping, Maltego,
d Google Dorks (these Tools are discussed in later part of this chapter).
1.14.2 Scanning
In scanning, the attacker begins to actively probe a target machine or network for vulnerabilities that can
be exploited as shown in Figure 1.13. The tools used in this process are Nessus, Nexpose, Wireshark, and
NMAP (tools are discussed in later part of this chapter).
HACKING
CRIMES AND ETHICAL
TO COMPUTER
TRODUCTION
seeke to
where an attacker
Reconnaissance refers to the preparatory phase
an attack
Reconn- gather Information about a target prior to launching
alssance for an attack when
noted for ease of entry
Could be the future point of return,
a broad scale
more about the target is known on
cllenis,
include the target organization's
Scanning Heconnalssance target range may
and systems
employees, operations, network,
Passve Reconnaissance
Active reconnaissanceinvolves
Mainta Passive reconnaissance involves
target
Interacting with the
ining acquiring information without means
directly by any
access
directly interacting with the
target calls to the
For example, telephone
For example, searching public help desk or technical
department
Clearing records or news releases
tracks
Scanning
Mainta
ining such as live machines,
information
access Attackers extract
device type, system
Extract port, port status, OS details,
information uptime, etc. to launch attack
Clearing
tracks
Gaining
access
Mainta-
ining Examples include
access password cracking., buffer
The attacker can escalate privileges to overflows, denial of
obtain complete control of the system.
service, session hijacking,
In the process, intermediate systems
Clearing that are connected to it are also
etc.
tracks compromised
Reconn- Maintaining access refers to the phase when the attacker tries
aissance 01 to retain his or her ownership of the system
Gaining
access
Attackers can upload, download, or manipulate data,
03 applications, and configurations on the owned system
Mainta
ining
access
Altackers use the compromised system to launch further
Clearing
tracks
04 attacks
Reconn-
aissance
01 Covering tracks
attacker to
retfers to the activities carrled out
hlde maliclous acts by an
Scanning
access
deleting evidence that might lead to his prosecution
Mainta-
ining
access
03 The attacker overwrites the
logs to avoid suspicion
server, system, and application
Clearing
tracks
Attackers always cover tracks to hide their identity
1. Filetype: You can use this dork to find any kind of file types.
Z. Ext: lt can help you to find files with specific extensions (e.g., .xt, .log. etc.
It can pertorm queries and helps to search for specific text inside any page.
e
4. x
Intitle: It will search for any specific words inside the page title.
website.
inside the URL of any
S. Inurl: It will look out for mentioned words
however, they are indexed and you can get valu
not supposed to be indexed by search engines;
Og files are Dorks, as you see in Figure
l1.17:
able intormation from these Google
O
filetype:log
Settings Toois
News Maps More
All Images
in Preferences
Search for English results only. You can specify your search language
Tip:
the best Instagram viewer
Aztec Lead (@aztec.log)-Ligavieweris
https://viewer.com/aztec.log
aztec.log, Aztec Lead- My presets and project files.
Picbear
@suzy.log Instagram Profile |
picbear.club/suzy.log Translate this page
07. 07suzy.
Mar 14, 2018 Check @suzy.log instagram profile. 90.
mogu.log- Picbear
picbear.club/mogu.log- Translate this page
Mar 12, 2018 - Check mogu @mogu.log instagram profile. E(18a ) {LOES5ROF
britishshorthair Sapporo Japan.
1.15.1.3 Maltego
lt is a tremendous tool to trace down footprints of any target you wish to match. This piece of software
package has been developed by Paterva, and it is a part of the Kali UNIX system distribution.
Using Maltego can enable you to launch intelligence activity ne testes against specific targets.
of the simplest things this sofrware package includes is about their "decision 'transforms". Tlranstorms
are oftered without charge in some cases, and on orhers, you will realize industrial versions solely. They
are
going to assist you to run a unique quite tests and
knowledge integration with external application
NTRODuCTION TO COMPUTER CRIMES ANDETHICAL HACKING 19
In order to use wish to open a free account on thcir website, after that, you will
Maltego, you a
launch
renlacement machine or run transtorms on the target from Associate in Nursing existing one. Once you have
chosen your transtorms, Maltego app can begin running all the transforms from Maltego servers. Finally
Malrego can show you the results for the desired targets, such as IP, domains, AS numbers, and far additional.
1.15.2.1 Nexpose
Nexpose vulnerability scanner, developed by Rapid7, which is an open-source tool is developed by Kapia
nd is used to scan the vulnerabilities and performs various network checks as:
itselt to new
5. Nexpose may
be integrated with a Metaspoilt framework.
1.15.2.2 Wireshark
2. Turn on firewall: Typically, we have a tendency to close up windows firewall so as to put in some
package. From a security purpose of read, forever we must always activate firewalls. Hardware firewall
1s another smart choice to install. It acts as an associate isolator between external network and your
internal systems.
Contact your internet service supplier: It's a decent apply to contact your ISP within the case of
result necd their own and
policy for any malicious intrusion.
pointers
hacking as a of they
Summary
Criminalization is a social phenomenon, which has however, it is an intrusion into your privacy. Wipe
witnessed an increasing trend in the last tew years. them out with this piece of package. Nowadays,
Crime investigation analysis is a field where digital hackers' hindrance has become a task for everyone.
forensic investigation plays a vital role in terms of It is not the responsibility of the supervisor of our
predicting and analyzing criminals. There is the company. After all, he/she will install every protection
anti-spyware program. As if viruses were not enough, within the company's network; however, if you let a
corporationsfrom around the world determined to deadly disease in due to your carelessness, he/she will
make programs that might develop knowledge from not be ready to stop it. The same goes for your PC
data for his/her databases. reception. Keep in mind that there hacker
are new
your PC so as to amass
it should not be as dangerous as a deadly disease; tricks every day. Therefore, you need to be ready
Key Termns
.Bot: For 'robot - a program used for a specific Cookie: Cookies are text files sent from your Web
function such as keeping a port open or launching browser to a server, usually to customize intorma-
a flood of packets in a distributed denial-of-ser- tion from a website.
vice attack. Cracking: To break into a secure computer
Cracking: Malicious or criminal hacking. system, frequently to do damage or gain tinan-
Unauthorized penetration of computer systems cially, though sometimes in political protest.
and networks, abuse of privilege, unauthorized Firewall: A system using hardware, sofrware, or
use of services. both to prevent unauthorized access to a system
Easter egg: Undocumented, unauthorized program or machine.
functions in a production program; a kind of Trojan Hash: A hash is a number generated by an algo-
rithm from a string of characters in a message or
horse
Identity theft: Creating a false identity using other string.
someone else's identity, identitying information (e.g., IRC: Internet relay chat is a protocol used by both
name, social security number, birthday) to create groups and for one-on-one conversations. Often
new credit cards or establish loans which then go into utilized by hackers to communicate or share files.
default and affect the original victims credit record. Malware: A software program designed to hijack»
Malware: Malicious softrware, including Trojan damage, or steal information from a device or
horses, viruses, worms, logic bombs, exploits, and system.
time bombs.
Zombie: A program inserted into
Packet sniffer: Sniffers are programs designed to
a vulnerable detect and capture certain types of data. Packet
system to await further instructions; sniffers are designed to detect packets travelling
of a distributed usually part
denial-of-service (DDoS) attack. online.