Cyber crime evolution

42
Cyber Crime Evolution & Ethical Hacking By, Cyber Octe Contact: +91-9824435 Cyber Octet Pvt. Lt (Ahmedabad Cyber Octet

description

Cyber Crime Evolution & Ethical Hacking. a) Statistics of Internet b) What is Cyber Crime c) Types of Cyber Crime d) Who are Hackers e) Effects of Hacking f) Definitions of Hackers g) Types of Hackers h) Skills of Ethical Hackers i) Contact

Transcript of Cyber crime evolution

Page 1: Cyber crime evolution

Cyber Crime Evolution & Ethical Hacking

By, Cyber Octet Contact: +91-9824435293Cyber Octet Pvt. Ltd. (Ahmedabad)

Cyber Octet

Page 2: Cyber crime evolution

Cyber Octet

Falgun Rathod

Ethical Hacker

Penetration Tester

DIE HARD Entrepreneur

Worked for Various GOVT Agencies

Managing Director @ Cyber Octet Pvt. Ltd.

Who am I

Page 3: Cyber crime evolution

Cyber Octet

What is happening when we connect to internet

Lets See

Page 4: Cyber crime evolution

Cyber Octet

Packet 1 When We Try Connecting to Internet ,ARP Broadcasting is done on network Who has 192.168.1.1 Tell 192.168.12.13 to get Default Gateway

Packet 2 Default Gateway (Router) Receives the ARP and Assign MAC Address so that now All Packets are sent through this Default Gateway.

Packet 3 When We try to connect with www.google.com DNS Query sent to know the IP Address of www.google.com in WEB know one knows www.google.com.

Packet 4 DNS Replies with the IP address of www.google.com

Packet 5 SYN Packet is sent to www.google.com on a particular port here is 80 i.e. HTTP

Packet 6 ACK/SYN are sent back to IP Address which asked for www.google.com

Packet 7 ACK is received and finally the Three Way Handshaking Process is Completed

Packet 8 Here now You will be getting HTTP Response and able to open the site

Packet 9 All the Data and Images from the Website is been loaded on your Browser

Page 5: Cyber crime evolution

Cyber Octet

Lets See Some Statistics

Page 6: Cyber crime evolution

Cyber Octet

Page 7: Cyber crime evolution

Cyber Octet

Page 8: Cyber crime evolution

Cyber Octet

What Is Cyber Crime Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music

files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet

Page 9: Cyber crime evolution

Cyber Octet

Cyber Crime Rising In The World Fears about the consequences of cyber attacks, internet hacking and identity fraud are at their highest level in five years, with Australians ranking as among some of most concerned people in the world.

The latest annual survey has shown there has been a large jump in the number of people worried that their personal details held by banks, financial providers and telcos, may fall into the wrong hands

Page 10: Cyber crime evolution

Cyber Octet

India has 42 millions cyber crime victims every year

India lost Rs 34,200 crore to cybercrime last year

In 2012 42 Million People fell victim to Cyber Crime in India and Loss of 8 Billion US Dollars. According to Report of Norton 66% Adults of India has experienced Cyber Crime in their Lifetime. 115000 victims everyday or 80 victims in a minute.

Cyber criminals targeted users of Skype, Facebook and Windows using multiple Exploits in October, according to the latest threat report from security firm GFI Software

Cyber Crime Rising In The World

Page 11: Cyber crime evolution

Cyber Octet

• PHISHING• DENIAL OF SERVICE ATTACK• SOFTWARE PIRACY• CREDIT CARD FRAUD• CYBER STALKING• WEBSITE DEFACEMENT

Types Of Cyber Crime

Page 12: Cyber crime evolution

Cyber Octet

Types Of Cyber Crimes

Phishing

It is technique of pullingOut confidentialinformation from thebank/financialInstitutionalaccount holders byDeceptive means.

Page 13: Cyber crime evolution

Cyber Octet

Types Of Cyber Crimesc

Denial Of Service AttackThis is an act by the criminal, who floods the band width of the

victim’sNetwork or fills his e-mail box with spam mail depriving him of theservices he is entitled to access or provide.

Page 14: Cyber crime evolution

Cyber Octet

Types Of Cyber CrimesSOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crimeCan be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc

Page 15: Cyber crime evolution

Cyber Octet

Types Of Cyber Crimes

CREDIT CARD FRAUDYou simply have to type credit card number into www page off thevendor for online transaction If electronic transactions are not

securedthe credit card numbers can be stolen by the hackers who can misusethis card by impersonating the credit card owner..

Page 16: Cyber crime evolution

Cyber Octet

Types Of Cyber Crimes

CYBER STALKINGThe Criminal follows the victim by sending emails, entering the chatrooms frequently.

Page 17: Cyber crime evolution

Cyber Octet

Types Of Cyber Crimes

CREDIT CARD FRAUDYou simply have to type credit card number into www page off thevendor for online transaction If electronic transactions are not

securedthe credit card numbers can be stolen by the hackers who can misusethis card by impersonating the credit card owner..

Page 18: Cyber crime evolution

Cyber Octet

TimeLine

Cost of Resources

Availability of Resources

1965 1975 1995 2005

Soldiers New Tech

Cruise Missile

1945 Today

MissilesICBM & SLBM

StrategicNuclear

Weapons

Precision

Guided

Munitions

Page 19: Cyber crime evolution

Cyber Octet

Who Are Cyber Criminals

Mostly Insiders,Crackers,Foreign Intelligence,Terrorist & Hackers

Page 20: Cyber crime evolution

Cyber Octet

1970’s 1980’s 1990’s 2000’s 2010’s

MIT & Stanford Universities Best Programmers

Gamers Game Hacking &

Copyright Breaking Website

Defacement Cyber Criminals

Time line of Hackers

Page 21: Cyber crime evolution

Cyber Octet

Why Security?

Page 22: Cyber crime evolution

Cyber Octet

Damage to information & theft of information.

Attackers may also use these PCs as "spam zombies" or "spam bots“.

Attackers use backdoors such as Trojan horses, root kits, virus & worms to compromise systems.

Theft/damage of clients or customer/business data, credit card details, and social security numbers, for identity fraud or theft.

Theft of email addresses for spamming, passwords for access to online banking, ISP or web services.

Effects of Hacking

Page 23: Cyber crime evolution

Cyber Octet

Hacking into government systems or servers or network can affect its operations & reputation.

Hacking into company will affect its asset & goodwill.

Effect of Hacking

Page 24: Cyber crime evolution

Cyber Octet

Case Study Of GoogleA British researcher, Jim Ley, discovered (2004) an XSS flaw in Google and provided this proof of concept Phishing page where Google becomes a ‘paying service’. If you would be so kind as to provide your credit card details . Now fixed.

Page 25: Cyber crime evolution

Cyber Octet

Page 26: Cyber crime evolution

Cyber Octet

A hacker is someone who gains unauthorized access to a computer system. Many hackers just like the challenge of breaking through a computer security system.

The terms Hackers and Hacking are being misinterpreted and misunderstood with negative sidelines.

Definition of Hackers?

Page 27: Cyber crime evolution

Cyber Octet

Hackers Crackers

Script Kiddies

Phreakers

Types of Hackers

Page 28: Cyber crime evolution

Cyber Octet

Hackers are the person who tries to break into computer system to get secret information.

Motive/Intent –

To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.

To find possible security vulnerabilities in a system.

They create security awareness by sharing knowledge. It’s a team work.

Hackers

Page 29: Cyber crime evolution

Cyber Octet

An Individuals who break into computers with malicious intent.

Motive/Intent –

To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.

To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.

Effects- Can cause financial losses & image/reputation damages, defamation in the society for individuals or organizations

Crackers

Page 30: Cyber crime evolution

Cyber Octet

Phreaks – These are persons who use computer devices and software to break into phone networks.

Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!

Effects- You may have to big amount of phone bills, for doing nothing!!!

Phreakers

Page 31: Cyber crime evolution

Cyber Octet

Script Kiddies – These are persons not having technical skills to hack computers.

Motive/Intention- They use the available information about known vulnerabilities to break into remote systems.

It’s an act performed for a fun or out of curiosity.

Script Kiddies

Page 32: Cyber crime evolution

Cyber Octet

Hats of Hackers

Page 33: Cyber crime evolution

Cyber Octet

•Individuals professing hacker skills & using them for defensive & are also known as security analysts

White Hat Hackers

•Individuals with extraordinary computing skills, resorting to malicious or destructive activities & are also known as crackers

Black Hat Hackers

•Individuals who work both offensive & defensively at various times

Grey Hat Hackers

Page 34: Cyber crime evolution

Cyber Octet

Reconnaissance

ScanningGaining Access

Maintaining

Access

Clearing Tracks

Hackers Strategies

Page 35: Cyber crime evolution

Cyber Octet

The Hacker who has Right from Concern Authority of Government Body to Hack are known as Ethical Hacker.

Who is Ethical Hacker

Page 36: Cyber crime evolution

Cyber Octet

Platform

Knowledge

•Having depth knowledge of Windows, Unix & LinuxComp

uter Expert

•Should be a computer expert adept at technical solutionSecurit

y Knowle

dge

•Has knowledge of security areas & related issues

Skills of an Ethical Hacker

Page 37: Cyber crime evolution

Cyber Octet

Network

Knowledge

•Has exemplary knowledge of networking and related software & hardwareTechnic

al Knowle

dge

•Has high technical knowledge to launch the sophisticated attacks

Skills of an Ethical Hacker

Page 38: Cyber crime evolution

Cyber Octet

What are Virus Properties of Virus What are Worms Properties of Worms What are Trojans Properties of Trojan

Virus , Worms & Trojans

Page 39: Cyber crime evolution

Cyber Octet

Authentication Bypass

Sql Injection

XSS

CSRF

Website Hacking

Page 40: Cyber crime evolution

Cyber Octet

Questions

Page 41: Cyber crime evolution

Cyber Octet

Thank You

The End

Page 42: Cyber crime evolution

Cyber Octet

[email protected]

[email protected]

www.facebook.com/cyberoctet

www.facebook.com/selfaccelerate

www.cyberoctet.in

Contact