Thursday, November 28, 2019
Attacks Used to Hack Email Accounts and Their Preventive Measures Essay Example
Attacks Used to Hack Email Accounts and Their Preventive Measures Essay The present-day network threat scenario is unprecedented in both scale and impact. CYBER CRIMINALS has become increasingly confident in their own abilities because of good organization skills and years of experience in evading law enforcement. Armed with sophisticated technical knowledge, a whole bunch of tools and operating systems with exploits, their sole objective today is to cause irreparable damage to the security and business interests of organizations. The biggest ââ¬Å"brand nameâ⬠between all terrorist groups across the world The Al-Qaedaâ⬠, Islamic militant group ââ¬Å"Tehrik-I-Taliban Pakistanâ⬠and many more terrorist organizations perform cyber terrorism i. e. , disrupt attacks against information systems for the primary purpose of stealing confidential information regarding the nationââ¬â¢s security issues and secondary purpose is creating alarm and panic among the cyber army of the nation. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Therefore there is a huge requirement for each and every one of us to know the minimum preventive measures so as to avoid the exploitation of a hacker as he may use our computer as a shield to hide his identity. Our paper discusses on the types on hackers and the main motto behind these people performing these attacks in an attempt to compromise any computer system. Our paper emphasizes on various methods by which passwords can be stolen and then used for personal purpose. A live performance on how an account can be hacked (say facebook) will be demonstrated by using the phishing attack. We will write a custom essay sample on Attacks Used to Hack Email Accounts and Their Preventive Measures specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Attacks Used to Hack Email Accounts and Their Preventive Measures specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Attacks Used to Hack Email Accounts and Their Preventive Measures specifically for you FOR ONLY $16.38 $13.9/page Hire Writer All the preventive measures that needs to be taken to overcomes these problems and stay safe from this cyber world attackers will be briefly explained so as to make everyone technically strong and preventing their computers getting exploitedâ⬠¦ Letââ¬â¢s build a stronger nationâ⬠¦. JAI HINDâ⬠¦ Vamshi Krishna Gudipati A. K. A h4x0r le610n, 4th year b. tech, COMPUTER SCIENCE AND ENGINEERING, WARANGAL INSTITUTE OF TECHNOLOGY AND SCIENCE. Information securityà means protecting information andà information systemsà from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. The terms information security,à computer securityà andà information assuranceà are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting theà confidentiality,à integrityà andà availabilityà of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability ofà dataà regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of aà computer systemà without concern for the information stored or processed by the computer. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security. Governments,à military,à corporations ,à hospitals, and privateà businessesà amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronicà computersà and transmitted acrossà networksà to other computers. WHAT IS HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e. g. software piracy), computer hacking is more difficult to define. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal. There is an aura of mystery that surrounds hacking, and a prestige that accompanies being part of a relatively elite group of individuals who possess technological savvy and are willing to take the risks required to become a true hacker. An interesting alternative view of how hackers positively impact areas such as software development and hacker ideology is presented inà Technology and Pleasure: Considering Hacking Constructive. WHO IS A HACKER In the computer security context, aà hackerà is someone who seeks and exploits weaknesses in a computer or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an openà community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,à they are rarely used in mainstream context. They are subject to the long standingà hacker definition controversyà about the true meaning of the termà hacker. KINDS OF HACKERS White Hat Aà white hat hackerà breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term white hat in Internet slang refers to anà ethical hacker. This classification also includes individuals who performà penetration testsà andà vulnerability assessmentsà within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, courseware, classes, and online training overing the diverse arena of Ethical Hacking. Black Hat A black hat hacker is a hacker who violates computer security for little reason beyond maliciousness or for personal gain (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are the epitome of all that the public fears in a computer criminalâ⬠à Black hat hackers brea k into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the pre-hacking stage. Part 1: Targeting The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they willà portà scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open portsââ¬âthose that do respondââ¬âwill allow a hacker to access the system. Part 2: Research and Information Gathering It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from social engineering, which will be explained below. Aside from social engineering, hackers can also use a technique called dumpster diving. Dumpster diving is when a hacker will literally search through users garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network. Part 3: Finishing The Attack This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many hackers will be caught after this point, lured in or grabbed by any data also known as aà honeypotà (a trap set up by computer security personnel). Grey Hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee. Hacktivists Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment. State Sponsored Hackers Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, ââ¬Å"He who controls the seas controls the world,â⬠and then it was, ââ¬Å"He who controls the air controls the world. â⬠Now itââ¬â¢s all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments. Spy Hackers Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their clientââ¬â¢s goals and get paid. Cyber Terrorists These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder. VARIOUS ATTACKS USED BY A HACKER PHISHING Phishingà is a way of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity in anelectronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out byà e-mailspoofingà orà instant messaging,à and it often directs users to enter details at a fake website whoseà look and feelà are almost identical to the legitimate one. Phishing is an example ofà social engineeringà techniques used to deceive users,à and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents includeà legislation, user training, public awareness, and technical security measures. A phishing technique was described in detail in 1987, and the first recorded use of the term phishing was made in 1996. The term is a variant ofà fishing,à probably influenced byà phreaking,à and alludes to baits used in hopes that the potential victim will bite by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen. KEY LOGGING These areà softwareà programs designed to work on the target computerââ¬â¢sà operating system. From a technical perspective there are five categories: * Hypervisor-based: The keylogger can theoretically reside in aà malwareà hypervisorà running underneath the operating system, which remains untouched. It effectively becomes aà virtual machine. Blue Pillà is a conceptual example. * Kernel-based: This method is difficult both to write and to combat. Such keyloggers reside at theà kernel levelà and are thus difficult to detect, especially for user-mode applications. They are frequently implemented asà rootkitsà that subvert the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboardà device driverà for example, and thus gain access to any information typed on the keyboard as it goes to the operating system. API-based: These keyloggersà hookà keyboardà APIs; the operating system then notifies the keylogger each time a key is pressed and the keylogger simply records it. Windows APIs on such asà GetAsyncKeyState(),à GetForegroundWindow(), etc. are used to poll the state of the keyboard or to subscribe to keyboard events. [1]à These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase inà CPUà usage, and can also miss the occasional key. A more recent example simply polls theà BIOSà for pre-boot authenticationà PINsà that have not been cleared from memory. * Form grabbing based:à Form grabbing-based keyloggers logà web formà submissions by recording the web browsing onsubmit event functions. This records form data before it is passed over the Internet and bypassesà HTTPSà encryption. * Packet analyzers: This involves capturing network traffic associated withà HTTP POSTà events to retrieve unencrypted passwords. Remote accessà softwareà keyloggers These are local software keyloggers with an added feature that allows access to the locally recorded data from a remote location. Remote communication may be achieved using one of these methods: * Data is uploaded to a website, database or anà FTPà server. * Data is periodically emailed to a pre-definedà email address. * Data isà wirelesslyà transmitted by means of an attached hardware system. * The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed. Related features Software Keyloggers may be augmented with features that capture user information without relying on keyboard key presses as the sole input. Some of these features include: * Clipboard logging. Anything that has been copied to theà clipboardà can be captured by the program. * Screen logging. Screenshotsà are taken in order to capture graphics-based information. Applications with screen logging abilities may take screenshots of the whole screen, just one application or even just around the mouse cursor. They may take these screenshots periodically or in response to user behaviours (for example, when a user has clicked the mouse). A practical application used by some keyloggers with this screen logging ability is to take small screenshots around where a mouse has just clicked; these defeat web-based keyboards (for example, the web-based screen keyboards that are often used by banks) and any web-based on-screen keyboard without screenshot protection. * Programmatically capturing the text in aà control. Theà Microsoft Windowsà APIà allows programs to request the text value in some controls. This means that some passwords may be captured, even if they are hidden behind password masks (usually asterisks). * The recording of every program/folder/window opened including a screenshot of each and every website visited, also including a screenshot of each. REMOTE ADMINSTRATIVE TOOL(RAT) Aà remote administration toolà (aà RAT) is a piece of software that allows a remote operator to control a system as if he has physical access to that system. Whileà desktop sharingà andà remote administrationà have many legal uses, RAT software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victims knowledge, often as payload of aà Trojan horse, and will try to hide its operation from the victim and fromà security software. The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities: * Screen/camera capture or image control * File management (download/upload/execute/etc. ) * Shell control (from command prompt) * Computer control (power off/on/log off if remote feature is supported) * Registry management (query/add/delete/modify) Other software product-specific functions Its primary function is for one computer operator to gain access to remote PCs. One computer will run the client software application, while the other computer(s) operate as the host(s). CLICK-JACKING Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired act ions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page, therefore the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page. Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired actions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page, therefore the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page. Examples A user might receive an email with a link to a video about a news item, but another valid page, say a product page on amazon. com, can be hidden on top or underneath the PLAY button of the news video. The user tries to play the video but actually buys the product from Amazon. Other known exploits include: * tricking users into enabling their webcam and microphone through Flash (which has since been corrected by Adobe); * tricking users into making their social networking profile information public; * making users follow someone on Twitter; share links on Facebook SPAMS Email spam, also known asà junk emailà orà unsolicited bulk emailà (UBE), is a subset ofà electronic spamà involving nearly identical messages sent to numerous recipients byà email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. One subset of UBE isà UCEà (unsolicited commercial email). The opposite of spam, email which one wants, is called ham, us ually when referring to a messages automated analysis (such as Bayesian filtering). Email spam has steadily grown since the early 1990s. Botnets, networks ofà virus-infected computers, are used to send about 80% of spam. Since the expense of the spam is borne mostly by the recipient,à it is effectivelyà postage dueà advertising. The legal status of spam varies from one jurisdiction to another. In the United States, spam was declared to be legal by theà CAN-SPAM Act of 2003à provided the message adheres to certain specifications. ISPsà have attempted to recover the cost of spam through lawsuits against spammers, although they have been mostly unsuccessful in collecting damages despite winning in court. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users address books, and are sold to other spammers. They also use a practice known as email appending or epending in which they use known information about their target (such as a postal address) to search for the targets email address. According to the Message Anti-Abuse Working Group, the amount of spam email was between 88ââ¬â92% of email messages sent in the first half of 2010. PREVENTIVE MEASURES TO OVERCOME THE ATTACKS OF HACKERS KEYLOGGERS SCAN THE FILE WITH ââ¬Å"DR. WEB LINK CHECKERâ⬠BEFORE DOWNLOADING. SCAN THE FILE WITH ONLINE MULTIPLE ANTI-VIRUS ENGINE IE. , www . novirusthanks org USE ANTI KEYLOGGERS LIKE ZEMANA,KEYSCRAMBERS ETC.. RATS STRICTLY FOLLOW THE INSTRUCTIONS OF THE ANTI-VIRUS.. ALWAYS USE AN UPDATED ANTI-VIRUS. DONT DOWNLOAD ANY FILE FROM AN ANONYMOUS WEBSITE. PHISHING ALWAYS TYPE THE COMPLETE URL OF THE INTENDED WEBPAGE FOR LOGIN. USE ANTI-VIRUS WHICH HAS WEB BROWSER INTERGRATION FACILITY TO COMBAT PHISHING LIKE KASPERSKY ETC.. NEVER LOGIN IN ANY LINK WITHOUT VERIFING ITS AUTHENTICATION. SPAM Some Facebook users were fooled into ââ¬Ëverifyingââ¬â¢ their account. Many Facebook walls were flooded with ââ¬Ëverifyà your/my accountââ¬â¢ spam messages/wall posts. My advice to all Facebook users. To get rid of FB spams, do not clickà the link. As simple as that. Clicking the link will just cause you to become one of the spam victims. It will automatically post the same spam messages on different Facebook walls. CONCLUSION * Data Security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. * . The Internet is a scary place. Criminals have the ability to hide behind their computers, or even other peopleââ¬â¢s computers ,they attempt to break into computer to steal personal information or to use it for their own purposes. * So to protect your Data with a firewall so that you are not an easy target to hackers and viruses in the future * When you leave your house, you lock your doors to prevent robbery, why not use a firewall to put a lock on your computer. AUTHORS: G. VAMSHI KRISHNA A. K. A h4x0r le610n, Computer Science amp; Engineering, 4nd year B. Tech, WARANGAL INSTITUTE OF TECHNOLOGY amp; SCIENCE.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.