4.Tools-and-Methods-Used-in-Cybercrime-part-1.ppt

KalvikarasiR19 59 views 55 slides Jun 19, 2024
Slide 1
Slide 1 of 55
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55

About This Presentation

Cybercrime tools and methodologies


Slide Content

4. Tools and Methods Used in
Cybercrime

Unit4:ToolsandMethodsUsedinCybercrime
•Introduction
•Proxy servers and
anonymizers
•Phishing
•Password cracking
•Keyloggers and spywares
•Virus and Worms
•Trojan horses and
backdoors
•DoSandDDoSattacks
•SQLinjection
•Bufferoverflow
•Attacksonwirelessnetworks
•Phishing(indetail)
•Identitytheft

Introduction
•Basicstagesofanattack:
–Initialuncovering
–Networkprobe
–Crossingthelinetowardelectroniccrime
–Capturingthenetworktraffic
–Grabthedata
–Coveringtracks

ImportantTerms
•Scareware

ImportantTerms
•Scareware
•Malvertising

ImportantTerms
•Scareware
•Malvertising
•Clickjacking

ImportantTerms
•Scareware
•Malvertising
•Clickjacking
•Ransomware

ProxyServersandAnonymizers
•Proxy server is a computer on a network which comes in
between the client (user) and other computers
Internet

ProxyServersandAnonymizers...

ProxyServersandAnonymizers...
•Purposeofproxyserver:
–Hidecompanyserversorsystems
–Caching
–Filterunwantedcontent(ex:advertisements)
–IPaddressmultiplexer

ProxyServersandAnonymizers...
•Anonymizer is an anonymous proxy which
allows the user to browse Internet
anonymously
•Generally used by crackers to cover their
tracks

Typesofproxies
•Transparent –Victim will know you are using a
proxy and can trace your real IP
•Anonymous –Victim will know you are using a
proxy, but, cannot trace your real IP
•Elite –Victim doesn’t know if the
communication is from a proxy or not

Typesofproxies...
TypeofProxy UsingaProxy TraceRealIP Anonymity
Transparent
Anonymous
Elite

ProxySoftwareExamples

Tor vs.VPN
Source:https://thebestvpn.com/tor-vs-vpn/
PrivacyAnonymity

Demonstration
•Proxychains(built-inintoKaliLinux)
–UsesTornetwork
–Needtomodify configfile(/etc/proxychains.conf)
•Anonsurf(availableon Github)
–UsesTornetwork

Phishing
•Steps inphishingcampaign:
1.Planning(gatherinformation)
2.Setup(createemailsorwebsite)
3.Attack(sendthemessagewithfakelinks)
4.Collection(gatherdata)
5.Identitytheftandfraud

Demonstration
•Maltego
•Shodan.io
•FOCA (Fingerprinting Organisations with Collected
Archives)
•Theharvester
•Recon-ng
•SET (Social Engineering Toolkit)

Demonstration...
•Passive reconnaissance –Maltego
–Maltego is a passive and semi-active reconnaissance
software
–Available in commercial and as well as community
editions
–Community edition is free, but has limited functionality

Demonstration...
•Shodan.io
–SearchengineforIoT
–GoogleindexesonlyWWW
–ShodanindexeseverythingconnectedtoInternet
–We cansearchforvariousdevicesusingdifferentfilters

Demonstration...
•FOCA
–Downloadsfilesfromsearchenginesand otherpublicrepositories
–Gathersmeta datafromthosefiles
–Analyzesthatmeta dataandpresentsinterestinginformation

Demonstration...
•theharvester
–Pythontoolfor passivereconnaissance
–Usage:theharvester-dvishnu.edu.in-l100-ball
•-dspecifiesdomain
•-lspecifieslengthofresultstobefetched
•-bspecifiessourcestosearchinformationfrom

Demonstration...
•Recon-ng
–Pythontoolfor passivereconnaissance
–LookandfeelisverysimilartoMetasploit
–Containsseveralmodules(scripts)
–Usage: Demo

Demonstration...
•SET(SocialEngineeringToolkit)
–Open-sourcetooldevelopedbyTrustedSec
–Python-driven
–Standardforsocial-engineeringpenetrationtests
•ngrok
–Reverseproxysoftwareforestablishingatunnelbetweenourmachine
andtheInternet

Demonstration...
•SET(SocialEngineeringToolkit)
Internet
Router
Host Machine
(Windows 8.1)
Guest
Machine 1
(Kali Linux)
Guest
Machine 2
(Metasploitabl
e 2)
Guest
Machine 3
(OWASP
BWA)
Guest
Machine 4
(Ubuntu)
NATNetwork

Demonstration...
•SET(SocialEngineeringToolkit)
Internet
Router
Host Machine
(Windows 8.1)
Guest
10.0.2.15
(Kali Linux)
Guest
Machine 2
(Metasploitabl
e 2)
Guest
Machine 3
(OWASP
BWA)
Guest
10.0.2.6
(Ubuntu)
NATNetwork

ForwardProxyvs.ReverseProxy

PasswordCracking

PasswordCracking
•Purposeofpasswordcracking:
–Torecoveraforgottenpassword
–Testingthestrengthofapassword
–Togainunauthorizedaccesstoasystem

PasswordCracking...
•Manualprocessofpasswordcracking:
1.Find avaliduser account
2.Createalistofpossiblepasswords(dictionary)
3.Rankthepasswordsfromhightolowprobability
4.Key-in eachpassword
5.Tryagainuntilasuccessfulpasswordisfound

PasswordCracking...
•Guessable password characteristics:
–Blank (no password)
–General passwords like password, admin, 123456, etc.
–Series of letters like QWERTY
–User’s name or login name
–Name of user’s friend/relative/pet
–User’s birth date or birth place
–User’s vehicle number, office number, residence or mobile number
–Name of a celebrity or idol
–Simple modification of the above mentioned passwords (like adding
numbers)

PasswordCracking...
•Classification of password cracking attacks:
–Online attacks
–Offline attacks
–Non-electronic attacks (social engineering,
shoulder surfing, dumpster diving etc)

PasswordCracking...
•Online attacks
–Use a program or script
–Attacks the target machine directly
–MITM (also called bucket-brigade or
Janus attack)
•Offline attacks
–Performed on machines other than the target
location
–Requires physical access to the target for
copying password files
Hacker/Cracker
Victim
Machine
Hacker/Cracker
Victim
Machine

PasswordCracking...
Passwordhashingprocess

Strong,Weak,andRandomPasswords
•Refertextbookpages135,136,and137

Demonstration
•OWASPBWA(VulnerableVirtualMachine)
•Hydra(onlineattack-webpage)
•Hydra(onlineattack-SSH)
•CainandAbel(offlineattack)
•JohntheRipper(offlineattack)

Demonstration...
Internet
Router
Host Machine
(Windows 8.1)
Guest
Machine 1
(Kali Linux)
Guest
Machine 2
(Metasploitabl
e 2)
Guest
Machine 3
(OWASP
BWA)
Guest
Machine 4
(Ubuntu)
NATNetwork

Demonstration...
Internet
Router
Host Machine
(Windows 8.1)
Guest
10.0.2.15
(Kali Linux)
Guest
Machine 2
(Metasploitabl
e 2)
Guest
10.0.2.5
(OWASP BWA)
Guest
Machine 4
(Ubuntu)
NATNetwork

Demonstration...
•Hydra(onlineattack-webpage)
–Anonlinepasswordcrackingtool
–Commandoptions:
•-l forusername
•-Lforuserlist
•-pforpassword
•-Pforpasswordlist
•-fexitatfirstsuccessfulresult
•-Vprintusernameandpasswordcombinations
•IPaddress
•http(s)-post-form for form basedauthentication
•<URL>:<FormParameters>:<Failedattemptkeyword>-serviceparameters

Demonstration...
•Hydra (online attack -webpage)
–Example
hydra-l admin-P 10-million-password-list-top-
1000000.txt192.168.91.160 http-post-form
"/dvwa/login.php:username=^USER^&password=^PASS^&
Login=Login:Login failed"–f–V

Demonstration...
•Hydra (online attack -SSH)
–Scan the victim machine ports for SSH availability
–Command: nmap 192.168.91.160 --top-ports 100 –sV
–Now use Hydra
–Command:
•hydra -l root -P 10-million-password-list-top-1000000.txt -f -V
192.168.91.160 ssh -t 5
•-V prints the username and password combination
•-t maintains number of connections in parallel to the target server

Demonstration...
•CainandAbel(offlineattack)
–Dictionaryattack
–Bruteforceattack
–Rainbowtableattack

Demonstration...
•JohntheRipper(offlineattack)
–Oneofthemostpopularpasswordcrackers
–Auto-detectspasswordhashtypes
–AvailableforUnixandWindows
–Availablein3differentversions:
•Freeandopensourceversion
•Professionaledition
•Communityedition

Demonstration...
•John the Ripper (offline attack)
–Example:
•john MD5.txt --wordlist=10-million-password-list-top-
1000000.txt --format=Raw-MD5

KeyloggerandSpyware
•Keylogger is used to capture passwords and other
information while the user is keying
•Types of keyloggers:
–Software keyloggers
–Hardware keyloggers

KeyloggerandSpyware...
•Softwarekeyloggers:
–Softwareprograminstalledonthevictimmachineforkeylogging
–Generallyspreadastrojansorviruses
–AkeyloggergenerallycontainsaDLLfileandanEXEfile

Demonstration
•Nifty keylogger
–Akeyloggerforfirefox
–Add-onthatlogskeysincludingsuchkeysasALT,SHIFT,andBACKSPACE
–Hardtodetectthiskeyloggerthroughanti-virussoftware
–Toaccessthelog,simultaneouslypress ALT +SHIFT+KorALT+SHIFT+O

KeyloggerandSpyware...
•Hardwarekeyloggers:
–Smallhardwaredevices
–Requiresphysicalaccesstothevictimmachine
–GenerallyinstalledonATMs

KeyloggerandSpyware...
Source:https://thehackernews.com/2016/05/usb-charger-keylogger.html

KeyloggerandSpyware...
Source:http://www.keelog.com/airdrive-keylogger/

KeyloggerandSpyware...
•Anti-keylogger:
–Programthatdetectskeyloggers
–PreventsInternetbankingfrauds
–PreventsIDtheft
–ItsecuresE-Mailandinstantmessaging/chatting

KeyloggerandSpyware...
•Spyware:
–Malwareinstalledtospyonvictim’sactivities
–Sometimes,spywareisinstalledpurposefullybyadministration
–Spywaremonitorsvictim’ssurfingpatterns
–Spywarecanalsomodifysystemsettings
–Installanti-spywareforprotection

VirusandWorms
•Typesofvirus:
1.Bootsectorvirus
2.Programvirus
3.Multipartitevirus(bootsector+programvirus)
4.Stealthvirus
5.Polymorphicvirus(changesvirussignature)
6.Macrovirus
7.ActiveXandJavavirus

TrojanHorseandBackdoor
•Backdoor:
–A backdoor is a means of access to computer program that bypasses
security mechanisms
–Hackers use backdoor to maintain access to the victim system