IS Notes
IS Notes
• Cyber threats have increased drastically due to the rise of digital transactions,
IoT devices, and cloud computing.
• Threat: Exposed names, CNICs, credit card details on the dark web.
• Bank's Response: Asked customers to reset their PINs and take security
measures.
• Cybercrime has become more profitable than the drug trade (Europol 2013
report).
• Security breaches can lead to financial loss, reputation damage, and personal
data theft.
1. Confidentiality
2. Integrity
3. Availability
• Types:
• Types:
6. SQL Injection
7. DNS Poisoning
6. Cyber Crime
Cybercrime Motivations:
1. What is Hacking?
• Types of Hackers:
o Grey Hat – Hack without malicious intent but still break rules.
2. Phases of Hacking
Summary
Footprinting
1. Introduction to Footprinting
• It is the first phase of hacking and is used by both hackers (for attacks) and
security professionals (for defense).
2. Types of Footprinting
a) Passive Footprinting
• Sources include:
o Search engines (Google, Bing)
b) Active Footprinting
• Techniques include:
• Example: Using Nmap to scan a company’s web server for open ports.
• Examples:
o Owner name
o Email address
o Phone number
o Server IP address
• Hackers analyze company social media accounts for employee names, job
descriptions, and technology details.
• Example: A LinkedIn job posting mentioning "AWS and Kubernetes" reveals the
company’s cloud setup.
5. Email Footprinting
o IP address of sender
6. Network Footprinting
• Example: tracert example.com shows the number of hops to reach the server.
5. Is Footprinting Legal?
• Ethical hackers must follow cybersecurity laws and get written consent before
scanning a network.
• The attacker sends a phishing email pretending to be from the CEO, asking for
login credentials.
Organizations can reduce the risk of being footprinted by following these measures:
Use Privacy Protection for WHOIS – Many domain registrars offer privacy
protection to hide owner details.
Restrict Social Media Exposure – Employees should avoid posting sensitive
company information online.
Disable Unused Services & Ports – Prevents attackers from finding open entry
points.
Monitor DNS & Web Traffic – Identifies suspicious activity before an attack
happens.
Educate Employees About Phishing – Social engineering is a major risk.
Summary
Scanning
This chapter covers how to analyze and secure networks by scanning for
vulnerabilities, identifying security flaws, and using different scanning techniques.
1. Introduction
• Attackers use scanning as the first step in hacking, while security professionals
use it for defensive measures.
2. Basics of Security
a) Patch Management
• Types of patches:
b) Ports
• Ports are like virtual doors that allow communication between devices.
• Every service (e.g., web browsing, file sharing) uses a specific port number.
c) Protection Methods
d) Security Policies
a) TCP Scan
• Example: Used by hackers to find open ports without triggering security alarms.
c) FIN Scan
d) Null Scan
e) UDP Scan
• Scans UDP (User Datagram Protocol) ports, which do not use handshakes.
• Harder to detect but less reliable.
• Sets multiple TCP flags (FIN, PSH, URG) at once, making the packet look
unusual.
5. Vulnerability Scanning
1. Nmap (Network Mapper) – Scans networks for open ports and running services.