ProxyServersandAnonymizers...
•Anonymizer is an anonymous proxy which
allows the user to browse Internet
anonymously
•Generally used by crackers to cover their
tracks
Typesofproxies
•Transparent –Victim will know you are using a
proxy and can trace your real IP
•Anonymous –Victim will know you are using a
proxy, but, cannot trace your real IP
•Elite –Victim doesn’t know if the
communication is from a proxy or not
Demonstration...
•Passive reconnaissance –Maltego
–Maltego is a passive and semi-active reconnaissance
software
–Available in commercial and as well as community
editions
–Community edition is free, but has limited functionality
PasswordCracking...
•Guessable password characteristics:
–Blank (no password)
–General passwords like password, admin, 123456, etc.
–Series of letters like QWERTY
–User’s name or login name
–Name of user’s friend/relative/pet
–User’s birth date or birth place
–User’s vehicle number, office number, residence or mobile number
–Name of a celebrity or idol
–Simple modification of the above mentioned passwords (like adding
numbers)
PasswordCracking...
•Online attacks
–Use a program or script
–Attacks the target machine directly
–MITM (also called bucket-brigade or
Janus attack)
•Offline attacks
–Performed on machines other than the target
location
–Requires physical access to the target for
copying password files
Hacker/Cracker
Victim
Machine
Hacker/Cracker
Victim
Machine
Demonstration...
•Hydra (online attack -SSH)
–Scan the victim machine ports for SSH availability
–Command: nmap 192.168.91.160 --top-ports 100 –sV
–Now use Hydra
–Command:
•hydra -l root -P 10-million-password-list-top-1000000.txt -f -V
192.168.91.160 ssh -t 5
•-V prints the username and password combination
•-t maintains number of connections in parallel to the target server
KeyloggerandSpyware
•Keylogger is used to capture passwords and other
information while the user is keying
•Types of keyloggers:
–Software keyloggers
–Hardware keyloggers
TrojanHorseandBackdoor
•Backdoor:
–A backdoor is a means of access to computer program that bypasses
security mechanisms
–Hackers use backdoor to maintain access to the victim system